Last active
April 19, 2018 19:58
-
-
Save hasangilak/c120a573cffff351cc2d7bac73fa4602 to your computer and use it in GitHub Desktop.
owncloud nginx conf with no ssl
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
user www-data; | |
worker_processes 4; | |
pid /run/nginx.pid; | |
daemon off; | |
load_module modules/ngx_http_dav_ext_module.so; | |
events { | |
worker_connections 2048; | |
multi_accept on; | |
use epoll; | |
#load_module modules/ngx_http_dav_ext_module.so; | |
} | |
http { | |
server_tokens off; | |
sendfile on; | |
tcp_nopush on; | |
tcp_nodelay on; | |
keepalive_timeout 15; | |
types_hash_max_size 2048; | |
client_max_body_size 20M; | |
include /etc/nginx/mime.types; | |
default_type application/octet-stream; | |
access_log /dev/stdout; | |
error_log /dev/stderr; | |
gzip on; | |
gzip_disable "msie6"; | |
ssl_protocols TLSv1 TLSv1.1 TLSv1.2; | |
ssl_ciphers 'ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS'; | |
include /etc/nginx/conf.d/*.conf; | |
include /etc/nginx/sites-available/*.conf; | |
open_file_cache off; # Disabled for issue 619 | |
charset UTF-8; | |
} | |
server { | |
listen 80; | |
server_name owncloud.gilak.me; | |
# Add headers to serve security related headers | |
# Before enabling Strict-Transport-Security headers please read into this topic first. | |
#add_header Strict-Transport-Security "max-age=15552000; includeSubDomains"; | |
add_header X-Content-Type-Options nosniff; | |
add_header X-Frame-Options "SAMEORIGIN"; | |
add_header X-XSS-Protection "1; mode=block"; | |
add_header X-Robots-Tag none; | |
add_header X-Download-Options noopen; | |
add_header X-Permitted-Cross-Domain-Policies none; | |
# Path to the root of your installation | |
root /var/www/owncloud.gilak.me/; | |
location = /robots.txt { | |
allow all; | |
log_not_found off; | |
access_log off; | |
} | |
# The following 2 rules are only needed for the user_webfinger app. | |
# Uncomment it if you're planning to use this app. | |
#rewrite ^/.well-known/host-meta /public.php?service=host-meta last; | |
#rewrite ^/.well-known/host-meta.json /public.php?service=host-meta-json last; | |
location = /.well-known/carddav { | |
return 301 $scheme://$host/remote.php/dav; | |
} | |
location = /.well-known/caldav { | |
return 301 $scheme://$host/remote.php/dav; | |
} | |
# set max upload size | |
client_max_body_size 512M; | |
fastcgi_buffers 64 4K; | |
# Disable gzip to avoid the removal of the ETag header | |
# Enabling gzip would also make your server vulnerable to BREACH | |
# if no additional measures are done. See https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=773332 | |
gzip off; | |
# Uncomment if your server is build with the ngx_pagespeed module | |
# This module is currently not supported. | |
#pagespeed off; | |
error_page 403 /core/templates/403.php; | |
error_page 404 /core/templates/404.php; | |
location / { | |
rewrite ^ /index.php$uri; | |
} | |
location ~ ^/(?:build|tests|config|lib|3rdparty|templates|data)/ { | |
return 404; | |
} | |
location ~ ^/(?:\.|autotest|occ|issue|indie|db_|console) { | |
return 404; | |
} | |
location ~ ^/(?:index|remote|public|cron|core/ajax/update|status|ocs/v[12]|updater/.+|ocs-provider/.+|core/templates/40[34])\.php(?:$|/) { | |
fastcgi_split_path_info ^(.+\.php)(/.*)$; | |
include fastcgi_params; | |
fastcgi_param SCRIPT_FILENAME $document_root$fastcgi_script_name; | |
fastcgi_param SCRIPT_NAME $fastcgi_script_name; # necessary for owncloud to detect the contextroot https://github.com/owncloud/core/blob/v10.0.0/lib/private/AppFramework/Http/Request.php#L603 | |
fastcgi_param PATH_INFO $fastcgi_path_info; | |
fastcgi_param modHeadersAvailable true; #Avoid sending the security headers twice | |
fastcgi_param front_controller_active true; | |
fastcgi_read_timeout 180; # increase default timeout e.g. for long running carddav/ caldav syncs with 1000+ entries | |
fastcgi_pass php-upstream; | |
fastcgi_intercept_errors on; | |
fastcgi_request_buffering off; #Available since NGINX 1.7.11 | |
} | |
location ~ ^/(?:updater|ocs-provider)(?:$|/) { | |
try_files $uri $uri/ =404; | |
index index.php; | |
} | |
# Adding the cache control header for js and css files | |
# Make sure it is BELOW the PHP block | |
location ~ \.(?:css|js)$ { | |
try_files $uri /index.php$uri$is_args$args; | |
add_header Cache-Control "max-age=15778463"; | |
# Add headers to serve security related headers (It is intended to have those duplicated to the ones above) | |
# Before enabling Strict-Transport-Security headers please read into this topic first. | |
#add_header Strict-Transport-Security "max-age=15552000; includeSubDomains"; | |
add_header X-Content-Type-Options nosniff; | |
add_header X-Frame-Options "SAMEORIGIN"; | |
add_header X-XSS-Protection "1; mode=block"; | |
add_header X-Robots-Tag none; | |
add_header X-Download-Options noopen; | |
add_header X-Permitted-Cross-Domain-Policies none; | |
# Optional: Don't log access to assets | |
access_log off; | |
} | |
location ~ \.(?:svg|gif|png|html|ttf|woff|ico|jpg|jpeg|map)$ { | |
add_header Cache-Control "public, max-age=7200"; | |
try_files $uri /index.php$uri$is_args$args; | |
# Optional: Don't log access to other assets | |
access_log off; | |
} | |
} |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment