Last active
April 20, 2018 09:59
-
-
Save kosztkas/6a4361fddff1aed73fa2c64d85e04961 to your computer and use it in GitHub Desktop.
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
upstream php-handler { | |
server 127.0.0.1:9000; | |
# Depending on your used PHP version | |
#server unix:/var/run/php5-fpm.sock; | |
server unix:/var/run/php7-fpm.sock; | |
} | |
server { | |
listen 80; | |
server_name cloud.example.com; | |
# For Lets Encrypt, this needs to be served via HTTP | |
location /.well-known/acme-challenge/ { | |
root /var/www/owncloud; # Specify here where the challenge file is placed | |
} | |
# enforce https | |
location / { | |
return 301 https://$server_name$request_uri; | |
} | |
} | |
server { | |
listen 443 ssl http2; | |
server_name cloud.example.com; | |
ssl_certificate /etc/ssl/nginx/cloud.example.com.crt; | |
ssl_certificate_key /etc/ssl/nginx/cloud.example.com.key; | |
# Example SSL/TLS configuration. Please read into the manual of NGINX before applying these. | |
ssl_session_timeout 5m; | |
ssl_protocols TLSv1 TLSv1.1 TLSv1.2; | |
ssl_ciphers "-ALL:EECDH+AES256:EDH+AES256:AES256-SHA:EECDH+AES:EDH+AES:!ADH:!NULL:!aNULL:!eNULL:!EXPORT:!LOW:!MD5:!3DES:!PSK:!SRP:!DSS:!AESGCM:!RC4"; | |
ssl_dhparam /etc/nginx/ssl/dhparam.pem; | |
ssl_prefer_server_ciphers on; | |
keepalive_timeout 70; | |
ssl_stapling on; | |
ssl_stapling_verify on; | |
# Add headers to serve security related headers | |
# Before enabling Strict-Transport-Security headers please read into this topic first. | |
#add_header Strict-Transport-Security "max-age=15552000; includeSubDomains"; | |
add_header X-Content-Type-Options nosniff; | |
add_header X-Frame-Options "SAMEORIGIN"; | |
add_header X-XSS-Protection "1; mode=block"; | |
add_header X-Robots-Tag none; | |
add_header X-Download-Options noopen; | |
add_header X-Permitted-Cross-Domain-Policies none; | |
# Path to the root of your installation | |
root /var/www/; | |
location = /robots.txt { | |
allow all; | |
log_not_found off; | |
access_log off; | |
} | |
# The following 2 rules are only needed for the user_webfinger app. | |
# Uncomment it if you're planning to use this app. | |
#rewrite ^/.well-known/host-meta /owncloud/public.php?service=host-meta last; | |
#rewrite ^/.well-known/host-meta.json /owncloud/public.php?service=host-meta-json last; | |
location = /.well-known/carddav { | |
return 301 $scheme://$host/owncloud/remote.php/dav; | |
} | |
location = /.well-known/caldav { | |
return 301 $scheme://$host/owncloud/remote.php/dav; | |
} | |
location ^~ /owncloud { | |
# set max upload size | |
client_max_body_size 512M; | |
fastcgi_buffers 8 4K; # Please see note 1 | |
fastcgi_ignore_headers X-Accel-Buffering; # Please see note 2 | |
# Disable gzip to avoid the removal of the ETag header | |
# Enabling gzip would also make your server vulnerable to BREACH | |
# if no additional measures are done. See https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=773332 | |
gzip off; | |
# Uncomment if your server is build with the ngx_pagespeed module | |
# This module is currently not supported. | |
#pagespeed off; | |
error_page 403 /owncloud/core/templates/403.php; | |
error_page 404 /owncloud/core/templates/404.php; | |
location /owncloud { | |
rewrite ^ /owncloud/index.php$uri; | |
} | |
location ~ ^/owncloud/(?:build|tests|config|lib|3rdparty|templates|data)/ { | |
return 404; | |
} | |
location ~ ^/owncloud/(?:\.|autotest|occ|issue|indie|db_|console) { | |
return 404; | |
} | |
location ~ ^/owncloud/(?:index|remote|public|cron|core/ajax/update|status|ocs/v[12]|updater/.+|ocs-provider/.+|core/templates/40[34])\.php(?:$|/) { | |
fastcgi_split_path_info ^(.+\.php)(/.*)$; | |
include fastcgi_params; | |
fastcgi_param SCRIPT_FILENAME $document_root$fastcgi_script_name; | |
fastcgi_param SCRIPT_NAME $fastcgi_script_name; # necessary for owncloud to detect the context root https://github.com/owncloud/core/blob/v10.0.0/lib/private/AppFramework/Http/Request.php#L603 | |
fastcgi_param PATH_INFO $fastcgi_path_info; | |
fastcgi_param HTTPS on; | |
fastcgi_param modHeadersAvailable true; #Avoid sending the security headers twice | |
# EXPERIMENTAL: active the following if you need to get rid of the 'index.php' in the URLs | |
#fastcgi_param front_controller_active true; | |
fastcgi_read_timeout 180; # increase default timeout e.g. for long running carddav/ caldav syncs with 1000+ entries | |
fastcgi_pass php-handler; | |
fastcgi_intercept_errors on; | |
fastcgi_request_buffering off; #Available since NGINX 1.7.11 | |
} | |
location ~ ^/owncloud/(?:updater|ocs-provider)(?:$|/) { | |
try_files $uri $uri/ =404; | |
index index.php; | |
} | |
# Adding the cache control header for js and css files | |
# Make sure it is BELOW the PHP block | |
location ~ /owncloud/.*\.(?:css|js) { | |
try_files $uri /owncloud/index.php$uri$is_args$args; | |
add_header Cache-Control "max-age=15778463"; | |
# Add headers to serve security related headers (It is intended to have those duplicated to the ones above) | |
# Before enabling Strict-Transport-Security headers please read into this topic first. | |
#add_header Strict-Transport-Security "max-age=15552000; includeSubDomains"; | |
add_header X-Content-Type-Options nosniff; | |
add_header X-Frame-Options "SAMEORIGIN"; | |
add_header X-XSS-Protection "1; mode=block"; | |
add_header X-Robots-Tag none; | |
add_header X-Download-Options noopen; | |
add_header X-Permitted-Cross-Domain-Policies none; | |
# Optional: Don't log access to assets | |
access_log off; | |
} | |
location ~ /owncloud/.*\.(?:svg|gif|png|html|ttf|woff|ico|jpg|jpeg|map) { | |
try_files $uri /owncloud/index.php$uri$is_args$args; | |
add_header Cache-Control "public, max-age=7200"; | |
# Optional: Don't log access to other assets | |
access_log off; | |
} | |
} | |
} |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment