discourse/config/nginx.sample.conf

273 lines
8.2 KiB
Plaintext
Raw Normal View History

# Additional MIME types that you'd like nginx to handle go in here
types {
2014-05-14 01:08:29 -04:00
text/csv csv;
}
2013-02-05 14:16:51 -05:00
upstream discourse {
server unix:/var/www/discourse/tmp/sockets/thin.0.sock;
server unix:/var/www/discourse/tmp/sockets/thin.1.sock;
server unix:/var/www/discourse/tmp/sockets/thin.2.sock;
server unix:/var/www/discourse/tmp/sockets/thin.3.sock;
2013-02-05 14:16:51 -05:00
}
2014-07-14 20:30:27 -04:00
proxy_cache_path /var/nginx/cache keys_zone=one:10m max_size=200m;
2017-12-10 17:29:47 -05:00
# see: https://meta.discourse.org/t/x/74060
proxy_buffer_size 8k;
2013-11-17 23:53:36 -05:00
# If you are going to use Puma, use these:
#
# upstream discourse {
# server unix:/var/www/discourse/tmp/sockets/puma.sock;
2013-11-17 23:53:36 -05:00
# }
2014-01-09 00:39:30 -05:00
# attempt to preserve the proto, must be in http context
map $http_x_forwarded_proto $thescheme {
default $scheme;
https https;
}
log_format log_discourse '[$time_local] "$http_host" $remote_addr "$request" "$http_user_agent" "$sent_http_x_discourse_route" $status $bytes_sent "$http_referer" $upstream_response_time $request_time "$sent_http_x_discourse_username"';
2013-02-05 14:16:51 -05:00
server {
access_log /var/log/nginx/access.log log_discourse;
2013-02-05 14:16:51 -05:00
listen 80;
gzip on;
gzip_vary on;
2013-02-05 14:16:51 -05:00
gzip_min_length 1000;
gzip_comp_level 5;
2017-08-01 17:25:25 -04:00
gzip_types application/json text/css application/x-javascript application/javascript image/svg+xml;
2018-01-08 21:28:05 -05:00
gzip_proxied any;
2013-02-05 14:16:51 -05:00
# Uncomment and configure this section for HTTPS support
# NOTE: Put your ssl cert in your main nginx config directory (/etc/nginx)
#
# rewrite ^/(.*) https://enter.your.web.hostname.here/$1 permanent;
#
# listen 443 ssl;
# ssl_certificate your-hostname-cert.pem;
# ssl_certificate_key your-hostname-cert.key;
# ssl_protocols TLSv1 TLSv1.1 TLSv1.2;
# ssl_ciphers HIGH:!aNULL:!MD5;
#
server_name enter.your.web.hostname.here;
2014-05-14 01:08:29 -04:00
server_tokens off;
2013-02-05 14:16:51 -05:00
sendfile on;
keepalive_timeout 65;
# maximum file upload size (keep up to date when changing the corresponding site setting)
2015-02-22 18:50:09 -05:00
client_max_body_size 10m;
2013-02-05 14:16:51 -05:00
# path to discourse's public directory
set $public /var/www/discourse/public;
# without weak etags we get zero benefit from etags on dynamically compressed content
# further more etags are based on the file in nginx not sha of data
# use dates, it solves the problem fine even cross server
etag off;
# prevent direct download of backups
location ^~ /backups/ {
internal;
}
# bypass rails stack with a cheap 204 for favicon.ico requests
location /favicon.ico {
return 204;
2015-12-21 07:14:36 -05:00
access_log off;
log_not_found off;
}
2013-02-05 14:16:51 -05:00
location / {
root $public;
add_header ETag "";
# auth_basic on;
# auth_basic_user_file /etc/nginx/htpasswd;
location ~* (assets|plugins|uploads)/.*\.(eot|ttf|woff|woff2|ico)$ {
expires 1y;
2017-02-23 17:37:53 -05:00
add_header Cache-Control public,immutable;
add_header Access-Control-Allow-Origin *;
}
location = /srv/status {
access_log off;
log_not_found off;
proxy_set_header Host $http_host;
proxy_set_header X-Real-IP $remote_addr;
proxy_set_header X-Request-Start "t=${msec}";
proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for;
proxy_set_header X-Forwarded-Proto $thescheme;
proxy_pass http://discourse;
break;
}
# some minimal caching here so we don't keep asking
# longer term we should increas probably to 1y
location ~ ^/javascripts/ {
expires 1d;
add_header Cache-Control public,immutable;
}
location ~ ^/assets/(?<asset_path>.+)$ {
expires 1y;
# asset pipeline enables this
2016-06-07 02:58:36 -04:00
# brotli_static on;
gzip_static on;
2017-02-23 17:37:53 -05:00
add_header Cache-Control public,immutable;
# HOOK in asset location (used for extensibility)
# TODO I don't think this break is needed, it just breaks out of rewrite
break;
}
location ~ ^/plugins/ {
expires 1y;
2017-02-23 17:37:53 -05:00
add_header Cache-Control public,immutable;
}
2014-12-28 05:10:03 -05:00
# cache emojis
2017-07-20 18:22:59 -04:00
location ~ /images/emoji/ {
2014-12-28 05:10:03 -05:00
expires 1y;
2017-02-23 17:37:53 -05:00
add_header Cache-Control public,immutable;
2014-12-28 05:10:03 -05:00
}
location ~ ^/uploads/ {
2014-07-14 00:26:25 -04:00
# NOTE: it is really annoying that we can't just define headers
# at the top level and inherit.
#
# proxy_set_header DOES NOT inherit, by design, we must repeat it,
# otherwise headers are not set correctly
proxy_set_header Host $http_host;
proxy_set_header X-Real-IP $remote_addr;
proxy_set_header X-Request-Start "t=${msec}";
2014-07-14 00:26:25 -04:00
proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for;
proxy_set_header X-Forwarded-Proto $thescheme;
proxy_set_header X-Sendfile-Type X-Accel-Redirect;
proxy_set_header X-Accel-Mapping $public/=/downloads/;
2013-02-05 14:16:51 -05:00
expires 1y;
2017-02-23 17:37:53 -05:00
add_header Cache-Control public,immutable;
2013-02-05 14:16:51 -05:00
## optional upload anti-hotlinking rules
#valid_referers none blocked mysite.com *.mysite.com;
#if ($invalid_referer) { return 403; }
# custom CSS
2014-05-14 01:08:29 -04:00
location ~ /stylesheet-cache/ {
try_files $uri =404;
}
2014-07-14 00:26:25 -04:00
# this allows us to bypass rails
location ~* \.(gif|png|jpg|jpeg|bmp|tif|tiff|svg|ico|webp)$ {
2014-05-14 01:08:29 -04:00
try_files $uri =404;
}
# thumbnails & optimized images
location ~ /_?optimized/ {
2014-05-14 01:08:29 -04:00
try_files $uri =404;
}
2013-02-05 14:16:51 -05:00
proxy_pass http://discourse;
break;
}
2014-09-24 02:51:14 -04:00
location ~ ^/admin/backups/ {
2014-07-14 20:30:27 -04:00
proxy_set_header Host $http_host;
proxy_set_header X-Real-IP $remote_addr;
proxy_set_header X-Request-Start "t=${msec}";
2014-07-14 20:30:27 -04:00
proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for;
proxy_set_header X-Forwarded-Proto $thescheme;
proxy_set_header X-Sendfile-Type X-Accel-Redirect;
proxy_set_header X-Accel-Mapping $public/=/downloads/;
proxy_pass http://discourse;
break;
}
2014-07-14 00:26:25 -04:00
# This big block is needed so we can selectively enable
# acceleration for backups and avatars
# see note about repetition above
location ~ ^/(svg-sprite/|letter_avatar/|user_avatar|highlight-js|stylesheets|theme-javascripts|favicon/proxied|service-worker) {
2014-07-14 00:26:25 -04:00
proxy_set_header Host $http_host;
proxy_set_header X-Real-IP $remote_addr;
proxy_set_header X-Request-Start "t=${msec}";
2014-07-14 00:26:25 -04:00
proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for;
proxy_set_header X-Forwarded-Proto $thescheme;
# if Set-Cookie is in the response nothing gets cached
# this is double bad cause we are not passing last modified in
proxy_ignore_headers "Set-Cookie";
proxy_hide_header "Set-Cookie";
2018-04-10 21:02:03 -04:00
proxy_hide_header "X-Discourse-Username";
proxy_hide_header "X-Runtime";
2014-07-14 20:30:27 -04:00
# note x-accel-redirect can not be used with proxy_cache
proxy_cache one;
2018-04-10 21:02:03 -04:00
proxy_cache_key "$scheme,$host,$request_uri";
2014-07-14 20:30:27 -04:00
proxy_cache_valid 200 301 302 7d;
proxy_cache_valid any 1m;
proxy_pass http://discourse;
break;
}
location /letter_avatar_proxy/ {
# Don't send any client headers to the avatars service
proxy_method GET;
proxy_pass_request_headers off;
proxy_pass_request_body off;
# Don't let cookies interrupt caching, and don't pass them to the
# client
proxy_ignore_headers "Set-Cookie";
proxy_hide_header "Set-Cookie";
2018-04-10 21:02:03 -04:00
proxy_hide_header "X-Discourse-Username";
proxy_hide_header "X-Runtime";
proxy_cache one;
2018-04-10 21:02:03 -04:00
# shared in multisite
proxy_cache_key $request_uri;
proxy_cache_valid 200 7d;
proxy_cache_valid 404 1m;
2016-01-03 17:52:11 -05:00
proxy_set_header Connection "";
proxy_pass https://avatars.discourse.org/;
2016-01-04 00:13:44 -05:00
break;
}
2016-01-04 00:13:44 -05:00
# we need buffering off for message bus
location /message-bus/ {
proxy_set_header X-Request-Start "t=${msec}";
2016-01-04 00:13:44 -05:00
proxy_set_header Host $http_host;
proxy_set_header X-Real-IP $remote_addr;
proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for;
proxy_set_header X-Forwarded-Proto $thescheme;
proxy_http_version 1.1;
proxy_buffering off;
proxy_pass http://discourse;
break;
}
2014-07-14 00:26:25 -04:00
# this means every file in public is tried first
try_files $uri @discourse;
}
location /downloads/ {
internal;
alias $public/;
}
location @discourse {
proxy_set_header Host $http_host;
proxy_set_header X-Request-Start "t=${msec}";
proxy_set_header X-Real-IP $remote_addr;
proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for;
proxy_set_header X-Forwarded-Proto $thescheme;
proxy_pass http://discourse;
2013-02-05 14:16:51 -05:00
}
}