... | ... | @@ -198,3 +198,103 @@ Démarrer Diaspora |
|
|
```
|
|
|
# systemctl restart diaspora.target
|
|
|
```
|
|
|
|
|
|
## Configuration Nginx
|
|
|
|
|
|
Créer /etc/nginx/sites-available/diaspora
|
|
|
|
|
|
```
|
|
|
# Proxy destination
|
|
|
# Add as many server directives as you want
|
|
|
# Also takes a socket, like unix:/path/to/some/socket.sock
|
|
|
upstream diaspora_server {
|
|
|
server unix:/srv/diaspora/diaspora/tmp/diaspora.sock fail_timeout=0;
|
|
|
}
|
|
|
|
|
|
# Camo support
|
|
|
#upstream camo {
|
|
|
# server 127.0.0.1:8081;
|
|
|
#}
|
|
|
|
|
|
|
|
|
server {
|
|
|
listen [::]:80;
|
|
|
listen 80;
|
|
|
server_name diaspora.itopie.ch;
|
|
|
return 301 https://diaspora.itopie.ch$request_uri;
|
|
|
}
|
|
|
|
|
|
server {
|
|
|
listen [::]:443 ssl spdy; # Same rules as for listen [::]:80 apply.
|
|
|
listen 443 ssl spdy;
|
|
|
server_name diaspora.domain.tld;
|
|
|
root /srv/diaspora/diaspora/public;
|
|
|
|
|
|
# Configure maximum picture size
|
|
|
# Note that Diaspora has a client side check set at 4M
|
|
|
client_max_body_size 5M;
|
|
|
client_body_buffer_size 256K;
|
|
|
|
|
|
# SSL setup
|
|
|
|
|
|
# This file should also include any necessary intermediate certificates.
|
|
|
# For example for StartSSL that would be
|
|
|
https://www.startssl.com/certs/class1/sha2/pem/sub.class1.server.sha2.ca.pem
|
|
|
# For Let's Encrypt use /etc/letsencrypt/live/diaspora.example.org/fullchain.pem
|
|
|
# and /etc/letsencrypt/diaspora.example.org/privkey.pem
|
|
|
ssl_certificate /etc/letsencrypt/live/your-domain/fullchain.pem;
|
|
|
ssl_certificate_key /etc/letsencrypt/live/your-domain/privkey.pem;
|
|
|
|
|
|
|
|
|
# Taken from https://wiki.mozilla.org/Security/Server_Side_TLS
|
|
|
# You might want to make these global
|
|
|
|
|
|
# generate with openssl dhparam 2048 > /path/to/dhparam.pem
|
|
|
ssl_dhparam /etc/ssl/certs/dhparam.pem;
|
|
|
|
|
|
ssl_protocols TLSv1 TLSv1.1 TLSv1.2;
|
|
|
ssl_ciphers
|
|
|
'ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-DSS-AES128-GCM-SHA256:kEDH+AESGCM:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA:ECDHE-ECDSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-DSS-AES128-SHA256:DHE-RSA-AES256-SHA256:DHE-DSS-AES256-SHA:DHE-RSA-AES256-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128:AES256:AES:!aNULL:!eNULL:!EXPORT:!DES:!RC4:!MD5:!PSK';
|
|
|
ssl_session_timeout 5m;
|
|
|
ssl_prefer_server_ciphers on;
|
|
|
ssl_session_cache shared:SSL:50m;
|
|
|
|
|
|
# Proxy if requested file not found
|
|
|
try_files $uri @diaspora;
|
|
|
|
|
|
access_log /var/log/nginx/diaspora.your-domain.access.log;
|
|
|
error_log /var/log/nginx/diaspora.your-domain.error.log;
|
|
|
|
|
|
location /assets/ {
|
|
|
expires max;
|
|
|
add_header Cache-Control public;
|
|
|
}
|
|
|
|
|
|
# Camo support
|
|
|
#location /camo/ {
|
|
|
# proxy_redirect off;
|
|
|
# proxy_pass http://camo/;
|
|
|
# break;
|
|
|
#}
|
|
|
|
|
|
location @diaspora {
|
|
|
proxy_set_header X-Real-IP $remote_addr;
|
|
|
proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for;
|
|
|
proxy_set_header X-Forwarded-Proto https;
|
|
|
proxy_set_header Host $http_host;
|
|
|
proxy_redirect off;
|
|
|
|
|
|
proxy_pass http://diaspora_server;
|
|
|
}
|
|
|
}
|
|
|
```
|
|
|
|
|
|
Activate configuration
|
|
|
```
|
|
|
ln -s /etc/nginx/sites-available/diaspora /etc/nginx/sites-enabled/diaspora
|
|
|
```
|
|
|
|
|
|
Restart nginx
|
|
|
```
|
|
|
systemctl restart nginx
|
|
|
``` |
|
|
\ No newline at end of file |