mirror of
https://iceshrimp.dev/Crimekillz/jointrashposs.git
synced 2024-11-24 01:39:07 +01:00
88 lines
3.4 KiB
Markdown
88 lines
3.4 KiB
Markdown
|
# Nginx 설정
|
||
|
1. `/etc/nginx/conf.d/misskey.conf` 또는 `/etc/nginx/sites-available/misskey.conf` 파일을 만들고 다음 예시를 복사해 주세요.\
|
||
|
(파일 이름이 굳이 "misskey"일 필요는 없습니다.)
|
||
|
2. 다음과 같이 수정해 주세요:
|
||
|
1. example.tld를 미리 준비해 둔 도메인으로 변경해주세요.\
|
||
|
`ssl_certificate`와 `ssl_certificate_key`는 Let's Encrypt로부터 받은 인증서 경로여야 합니다.
|
||
|
2. Cloudflare와 같은 CDN을 활용하고 있다면, "If it's behind another reverse proxy or CDN, remove the following."으로부터 4줄을 지워주세요.
|
||
|
3. `/etc/nginx/sites-available/misskey.conf` 파일을 만들었다면, symlink로 `/etc/nginx/sites-enabled/misskey.conf`에 연결해주세요.\
|
||
|
`sudo ln -s /etc/nginx/sites-available/misskey.conf /etc/nginx/sites-enabled/misskey.conf`
|
||
|
4. `sudo nginx -t`를 실행해 설정 파일이 정상적으로 로드되는지 확인해주세요.
|
||
|
5. `sudo systemctl restart nginx`를 실행해 nginx를 재실행해주세요.
|
||
|
|
||
|
## Nginx 설정 예시
|
||
|
|
||
|
```nginx
|
||
|
# For WebSocket
|
||
|
map $http_upgrade $connection_upgrade {
|
||
|
default upgrade;
|
||
|
'' close;
|
||
|
}
|
||
|
|
||
|
proxy_cache_path /tmp/nginx_cache levels=1:2 keys_zone=cache1:16m max_size=1g inactive=720m use_temp_path=off;
|
||
|
|
||
|
server {
|
||
|
listen 80;
|
||
|
listen [::]:80;
|
||
|
server_name example.tld;
|
||
|
|
||
|
# For SSL domain validation
|
||
|
root /var/www/html;
|
||
|
location /.well-known/acme-challenge/ { allow all; }
|
||
|
location /.well-known/pki-validation/ { allow all; }
|
||
|
location / { return 301 https://$server_name$request_uri; }
|
||
|
}
|
||
|
|
||
|
server {
|
||
|
listen 443 ssl http2;
|
||
|
listen [::]:443 ssl http2;
|
||
|
server_name example.tld;
|
||
|
|
||
|
ssl_session_timeout 1d;
|
||
|
ssl_session_cache shared:ssl_session_cache:10m;
|
||
|
ssl_session_tickets off;
|
||
|
|
||
|
# To use Let's Encrypt certificate
|
||
|
ssl_certificate /etc/letsencrypt/live/example.tld/fullchain.pem;
|
||
|
ssl_certificate_key /etc/letsencrypt/live/example.tld/privkey.pem;
|
||
|
|
||
|
# To use Debian/Ubuntu's self-signed certificate (For testing or before issuing a certificate)
|
||
|
#ssl_certificate /etc/ssl/certs/ssl-cert-snakeoil.pem;
|
||
|
#ssl_certificate_key /etc/ssl/private/ssl-cert-snakeoil.key;
|
||
|
|
||
|
# SSL protocol settings
|
||
|
ssl_protocols TLSv1.2 TLSv1.3;
|
||
|
ssl_ciphers ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384;
|
||
|
ssl_prefer_server_ciphers off;
|
||
|
ssl_stapling on;
|
||
|
ssl_stapling_verify on;
|
||
|
|
||
|
# Change to your upload limit
|
||
|
client_max_body_size 80m;
|
||
|
|
||
|
# Proxy to Node
|
||
|
location / {
|
||
|
proxy_pass http://127.0.0.1:3000;
|
||
|
proxy_set_header Host $host;
|
||
|
proxy_http_version 1.1;
|
||
|
proxy_redirect off;
|
||
|
|
||
|
# If it's behind another reverse proxy or CDN, remove the following.
|
||
|
proxy_set_header X-Real-IP $remote_addr;
|
||
|
proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for;
|
||
|
proxy_set_header X-Forwarded-Proto https;
|
||
|
|
||
|
# For WebSocket
|
||
|
proxy_set_header Upgrade $http_upgrade;
|
||
|
proxy_set_header Connection $connection_upgrade;
|
||
|
|
||
|
# Cache settings
|
||
|
proxy_cache cache1;
|
||
|
proxy_cache_lock on;
|
||
|
proxy_cache_use_stale updating;
|
||
|
proxy_force_ranges on;
|
||
|
add_header X-Cache $upstream_cache_status;
|
||
|
}
|
||
|
}
|
||
|
```
|