diff options
Diffstat (limited to 'installation')
| -rwxr-xr-x | installation/init.d/pleroma | 1 | ||||
| -rw-r--r-- | installation/pleroma.service | 4 | ||||
| -rw-r--r-- | installation/pleroma.vcl | 6 | 
3 files changed, 8 insertions, 3 deletions
diff --git a/installation/init.d/pleroma b/installation/init.d/pleroma index 384536f7e..e908cda1b 100755 --- a/installation/init.d/pleroma +++ b/installation/init.d/pleroma @@ -8,6 +8,7 @@ pidfile="/var/run/pleroma.pid"  directory=/opt/pleroma  healthcheck_delay=60  healthcheck_timer=30 +export $(cat /opt/pleroma/config/pleroma.env)  : ${pleroma_port:-4000} diff --git a/installation/pleroma.service b/installation/pleroma.service index 5dcbc1387..63e83ed6e 100644 --- a/installation/pleroma.service +++ b/installation/pleroma.service @@ -17,6 +17,8 @@ Environment="MIX_ENV=prod"  Environment="HOME=/var/lib/pleroma"  ; Path to the folder containing the Pleroma installation.  WorkingDirectory=/opt/pleroma +; Path to the environment file. the file contains RELEASE_COOKIE and etc  +EnvironmentFile=/opt/pleroma/config/pleroma.env  ; Path to the Mix binary.  ExecStart=/usr/bin/mix phx.server @@ -29,8 +31,6 @@ ProtectHome=true  ProtectSystem=full  ; Sets up a new /dev mount for the process and only adds API pseudo devices like /dev/null, /dev/zero or /dev/random but not physical devices. Disabled by default because it may not work on devices like the Raspberry Pi.  PrivateDevices=false -; Ensures that the service process and all its children can never gain new privileges through execve(). -NoNewPrivileges=true  ; Drops the sysadmin capability from the daemon.  CapabilityBoundingSet=~CAP_SYS_ADMIN diff --git a/installation/pleroma.vcl b/installation/pleroma.vcl index 154747aa6..13dad784c 100644 --- a/installation/pleroma.vcl +++ b/installation/pleroma.vcl @@ -1,3 +1,4 @@ +# Recommended varnishncsa logging format: '%h %l %u %t "%m %{X-Forwarded-Proto}i://%{Host}i%U%q %H" %s %b "%{Referer}i" "%{User-agent}i"'  vcl 4.1;  import std; @@ -14,8 +15,11 @@ acl purge {  sub vcl_recv {      # Redirect HTTP to HTTPS      if (std.port(server.ip) != 443) { +      set req.http.X-Forwarded-Proto = "http";        set req.http.x-redir = "https://" + req.http.host + req.url;        return (synth(750, "")); +    } else { +      set req.http.X-Forwarded-Proto = "https";      }      # CHUNKED SUPPORT @@ -105,7 +109,7 @@ sub vcl_hash {  sub vcl_backend_fetch {      # Be more lenient for slow servers on the fediverse -    if bereq.url ~ "^/proxy/" { +    if (bereq.url ~ "^/proxy/") {        set bereq.first_byte_timeout = 300s;      }  | 
