diff options
| author | kaniini <nenolod@gmail.com> | 2018-11-06 07:37:04 +0000 | 
|---|---|---|
| committer | kaniini <nenolod@gmail.com> | 2018-11-06 07:37:04 +0000 | 
| commit | 0f6c4635a64e89cc72921456e6cfa3d488d894bf (patch) | |
| tree | 0cd453db55a45911ec84f5797f3af9d02a9ded26 /installation | |
| parent | 0f75ed33f94faca8cb370b91f9a32b7aa6f4c420 (diff) | |
| parent | 800d233631c37f75d17ddc1fbad7ac0e44366b1a (diff) | |
| download | pleroma-0f6c4635a64e89cc72921456e6cfa3d488d894bf.tar.gz pleroma-0f6c4635a64e89cc72921456e6cfa3d488d894bf.zip | |
Merge branch 'use-the-same-example-domain-and-use-it-as-variable' into 'develop'
Use the same example domain and use it as variable
See merge request pleroma/pleroma!423
Diffstat (limited to 'installation')
| -rw-r--r-- | installation/caddyfile-pleroma.example | 16 | ||||
| -rw-r--r-- | installation/pleroma-apache.conf | 35 | ||||
| -rw-r--r-- | installation/pleroma.nginx | 8 | 
3 files changed, 36 insertions, 23 deletions
| diff --git a/installation/caddyfile-pleroma.example b/installation/caddyfile-pleroma.example index 2c1efde2d..305f2aa79 100644 --- a/installation/caddyfile-pleroma.example +++ b/installation/caddyfile-pleroma.example @@ -1,4 +1,10 @@ -social.domain.tld  { +# default Caddyfile config for Pleroma +# +# Simple installation instructions: +# 1. Replace 'example.tld' with your instance's domain wherever it appears. +# 2. Copy this section into your Caddyfile and restart Caddy. + +example.tld  {    log /var/log/caddy/pleroma_access.log    errors /var/log/caddy/pleroma_error.log @@ -9,7 +15,7 @@ social.domain.tld  {      transparent    } -  tls user@domain.tld { +  tls {      # Remove the rest of the lines in here, if you want to support older devices      key_type p256      ciphers ECDHE-ECDSA-WITH-CHACHA20-POLY1305 ECDHE-RSA-WITH-CHACHA20-POLY1305 ECDHE-ECDSA-AES256-GCM-SHA384 ECDHE-RSA-AES256-GCM-SHA384 ECDHE-ECDSA-AES128-GCM-SHA256 ECDHE-RSA-AES128-GCM-SHA256 @@ -22,15 +28,15 @@ social.domain.tld  {      Referrer-Policy "same-origin"      Strict-Transport-Security "max-age=31536000; includeSubDomains;"      Expect-CT "enforce, max-age=2592000" -    Content-Security-Policy "default-src 'none'; base-uri 'self'; form-action 'self'; frame-ancestors 'none'; img-src 'self' data: https:; media-src 'self' https:; style-src 'self' 'unsafe-inline'; font-src 'self'; script-src 'self'; connect-src 'self' wss://social.domain.tld; upgrade-insecure-requests;" +    Content-Security-Policy "default-src 'none'; base-uri 'self'; form-action 'self'; frame-ancestors 'none'; img-src 'self' data: https:; media-src 'self' https:; style-src 'self' 'unsafe-inline'; font-src 'self'; script-src 'self'; connect-src 'self' wss://{host}; upgrade-insecure-requests;"    }    # If you do not want remote frontends to be able to access your Pleroma backend server, remove these lines.    # If you want to allow all origins access, remove the origin lines.    # To use this directive, you need the http.cors plugin for Caddy.    cors / { -    origin https://halcyon.domain.tld -    origin https://pinafore.domain.tld +    origin https://halcyon.example.tld +    origin https://pinafore.example.tld      methods POST,PUT,DELETE,GET,PATCH,OPTIONS      allowed_headers Authorization,Content-Type,Idempotency-Key      exposed_headers Link,X-RateLimit-Reset,X-RateLimit-Limit,X-RateLimit-Remaining,X-Request-Id diff --git a/installation/pleroma-apache.conf b/installation/pleroma-apache.conf index 992c0c900..fb777983e 100644 --- a/installation/pleroma-apache.conf +++ b/installation/pleroma-apache.conf @@ -1,24 +1,31 @@ -#Example configuration for when Apache httpd and Pleroma are on the same host. -#Needed modules: headers proxy proxy_http proxy_wstunnel rewrite ssl -#This assumes a Debian style Apache config. Put this in /etc/apache2/sites-available -#Install your TLS certificate, possibly using Let's Encrypt. -#Replace 'pleroma.example.com' with your instance's domain wherever it appears - -ServerName pleroma.example.com +# default Apache site config for Pleroma +# +# needed modules: define headers proxy proxy_http proxy_wstunnel rewrite ssl +# +# Simple installation instructions: +# 1. Install your TLS certificate, possibly using Let's Encrypt. +# 2. Replace 'example.tld' with your instance's domain wherever it appears. +# 3. This assumes a Debian style Apache config. Copy this file to +#    /etc/apache2/sites-available/ and then add a symlink to it in +#    /etc/apache2/sites-enabled/ by running 'a2ensite pleroma-apache.conf', then restart Apache. + +Define servername example.tld + +ServerName ${servername}  ServerTokens Prod  ErrorLog ${APACHE_LOG_DIR}/error.log  CustomLog ${APACHE_LOG_DIR}/access.log combined  <VirtualHost *:80> -    Redirect permanent / https://pleroma.example.com +    Redirect permanent / https://${servername}  </VirtualHost>  <VirtualHost *:443>      SSLEngine on -    SSLCertificateFile      /etc/letsencrypt/live/pleroma.example.com/cert.pem -    SSLCertificateKeyFile   /etc/letsencrypt/live/pleroma.example.com/privkey.pem -    SSLCertificateChainFile /etc/letsencrypt/live/pleroma.example.com/fullchain.pem +    SSLCertificateFile      /etc/letsencrypt/live/${servername}/cert.pem +    SSLCertificateKeyFile   /etc/letsencrypt/live/${servername}/privkey.pem +    SSLCertificateChainFile /etc/letsencrypt/live/${servername}/fullchain.pem      # Mozilla modern configuration, tweak to your needs      SSLProtocol             all -SSLv3 -TLSv1 -TLSv1.1 @@ -31,7 +38,7 @@ CustomLog ${APACHE_LOG_DIR}/access.log combined      Header always set X-Frame-Options "DENY"      Header always set X-Content-Type-Options "nosniff"      Header always set Referrer-Policy same-origin -    Header always set Content-Security-Policy "default-src 'none'; base-uri 'self'; form-action 'self'; frame-ancestors 'none'; img-src 'self' data: https:; media-src 'self' https:; style-src 'self' 'unsafe-inline'; font-src 'self'; script-src 'self'; connect-src 'self' wss://pleroma.example.tld; upgrade-insecure-requests;" +    Header always set Content-Security-Policy "default-src 'none'; base-uri 'self'; form-action 'self'; frame-ancestors 'none'; img-src 'self' data: https:; media-src 'self' https:; style-src 'self' 'unsafe-inline'; font-src 'self'; script-src 'self'; connect-src 'self' wss://${servername}; upgrade-insecure-requests;"      # Uncomment this only after you get HTTPS working.      # Header always set Strict-Transport-Security "max-age=31536000; includeSubDomains" @@ -45,7 +52,7 @@ CustomLog ${APACHE_LOG_DIR}/access.log combined      ProxyPass / http://localhost:4000/      ProxyPassReverse / http://localhost:4000/ -    RequestHeader set Host "pleroma.example.com" +    RequestHeader set Host ${servername}      ProxyPreserveHost On  </VirtualHost> @@ -53,4 +60,4 @@ CustomLog ${APACHE_LOG_DIR}/access.log combined  SSLUseStapling          on  SSLStaplingResponderTimeout 5  SSLStaplingReturnResponderErrors off -SSLStaplingCache        shmcb:/var/run/ocsp(128000)
\ No newline at end of file +SSLStaplingCache        shmcb:/var/run/ocsp(128000) diff --git a/installation/pleroma.nginx b/installation/pleroma.nginx index f648336ca..6dc2c9760 100644 --- a/installation/pleroma.nginx +++ b/installation/pleroma.nginx @@ -10,8 +10,8 @@ proxy_cache_path /tmp/pleroma-media-cache levels=1:2 keys_zone=pleroma_media_cac                   inactive=720m use_temp_path=off;  server { -    listen         80;      server_name    example.tld; +    listen         80;      return         301 https://$server_name$request_uri;      # Uncomment this if you need to use the 'webroot' method with certbot. Make sure @@ -46,7 +46,7 @@ server {      ssl_ecdh_curve X25519:prime256v1:secp384r1:secp521r1;      ssl_stapling on;      ssl_stapling_verify on; -     +      server_name example.tld;      gzip_vary on; @@ -77,8 +77,8 @@ server {          add_header X-Content-Type-Options "nosniff" always;          add_header Referrer-Policy "same-origin" always;          add_header X-Download-Options "noopen" always; -        add_header Content-Security-Policy "default-src 'none'; base-uri 'self'; form-action *; frame-ancestors 'none'; img-src 'self' data: https:; media-src 'self' https:; style-src 'self' 'unsafe-inline'; font-src 'self'; script-src 'self'; connect-src 'self' wss://example.tld; upgrade-insecure-requests;" always; -         +        add_header Content-Security-Policy "default-src 'none'; base-uri 'self'; form-action *; frame-ancestors 'none'; img-src 'self' data: https:; media-src 'self' https:; style-src 'self' 'unsafe-inline'; font-src 'self'; script-src 'self'; connect-src 'self' wss://$server_name; upgrade-insecure-requests;" always; +          # Uncomment this only after you get HTTPS working.          # add_header Strict-Transport-Security "max-age=31536000; includeSubDomains" always; | 
