centos7 上设置的 certbot 和 nginx 子域
certbot and nginx subdomain set on centos7
我正在尝试使用 Let's Encrypt 的 certbot 提供的 ssl 加密在 Centos7 服务器上的 nginx 中设置一个具有一个子域(暂时)的网站。
我已经成功安装了 nginx,我已经设置了我的域:example.com
www.example.com
和 ci.example.com
并毫无问题地获得了颁发的证书(我的浏览器显示 'secured' 并且它会自动从 http 请求重定向到 https。)
现在我想让 ci.example.com
代理到 localhost:6500 端口(proxy_pass
我相信它被调用)。我试过以下:
this blog post from 2014 但 nginx 一直服务于标准 "Welcome to Nginx page"。
所有其他 articles/tutorials 适用于旧版本的 nginx(不使用 /etc/nginx/nginx.conf.
这里是/etc/nginx/nginx.conf
http {
log_format main '$remote_addr - $remote_user [$time_local] "$request" '
'$status $body_bytes_sent "$http_referer" '
'"$http_user_agent" "$http_x_forwarded_for"';
access_log /var/log/nginx/access.log main;
sendfile on;
tcp_nopush on;
tcp_nodelay on;
keepalive_timeout 65;
types_hash_max_size 2048;
include /etc/nginx/mime.types;
default_type application/octet-stream;
# Load modular configuration files from the /etc/nginx/conf.d directory.
# See http://nginx.org/en/docs/ngx_core_module.html#include
# for more information.
include /etc/nginx/conf.d/*.conf;
server {
server_name example.com www.example.com;
root /usr/share/nginx/html;
# Load configuration files for the default server block.
include /etc/nginx/default.d/*.conf;
location / {
}
error_page 404 /404.html;
location = /40x.html {
}
error_page 500 502 503 504 /50x.html;
location = /50x.html {
}
listen [::]:443 ssl ipv6only=on; # managed by Certbot
listen 443 ssl; # managed by Certbot
ssl_certificate /etc/letsencrypt/live/example.com/fullchain.pem; # managed by Certbot
ssl_certificate_key /etc/letsencrypt/live/example.com/privkey.pem; # managed by Certbot
include /etc/letsencrypt/options-ssl-nginx.conf; # managed by Certbot
ssl_dhparam /etc/letsencrypt/ssl-dhparams.pem; # managed by Certbot
server {
if ($host = www.example.com) {
return 301 https://$host$request_uri;
} # managed by Certbot
if ($host = example.com) {
return 301 https://$host$request_uri;
} # managed by Certbot
if ($host = ci.example.com) {
return 301 https://$host$request_uri;
} #added by me
listen 80 default_server;
listen [::]:80 default_server;
server_name example.com www.example.com;
return 404; # managed by Certbot
我已经弄明白了,并把它留给后代。
在我 运行 certbot --nginx 命令之前我没有正确设置 nginx。
这是你应该做的:
来自全新安装的 Centos 7
通过sudo yum update -y
确保 Centos 是最新的
然后通过安装nginx:sudo yum install nginx -y
它是默认设置,但这确保它是最新的。
然后按照 this 指南获得不安全 http://ci.yoursite.com
和 http://www.yoursite.com
随心所欲地工作。
注意 - 如果您遇到无法启动 nginx 的问题,原因是: [emerg] open() "/usr/share/nginx/logs/ci.yoursite.access.log" failed (13: Permission denied)
使用:su -c "setenforce 0"
它将SELinux设置为permissive模式并允许nginx启动。
然后跟随:
This guide 让 Let's Encrypt 和 Certbot --nginx 正常工作。
你的最终 /etc/nginx/conf.d/ci.yourserver.conf
应该看起来像这样重新路由到本例中的端口 6500:
server {
server_name ci.example.com;
access_log logs/ci.example.access.log main;
root /var/www/ci.example.com/html;
index index.html index.htm;
location / {
proxy_pass http://localhost:6500;
proxy_set_header Host $host;
proxy_set_header X-Real-IP $remote_addr;
proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for;
proxy_connect_timeout 150;
proxy_send_timeout 100;
proxy_read_timeout 100;
proxy_buffers 4 32k;
client_max_body_size 8m;
client_body_buffer_size 128k;
proxy_set_header Upgrade $http_upgrade;
proxy_set_header Connection "Upgrade";
}
listen [::]:443 ssl ipv6only=on; # managed by Certbot
listen 443 ssl; # managed by Certbot
ssl_certificate /etc/letsencrypt/live/ci.example.com/fullchain.pem; # managed by Certbot
ssl_certificate_key /etc/letsencrypt/live/ci.example.com/privkey.pem; # managed by Certbot
include /etc/letsencrypt/options-ssl-nginx.conf; # managed by Certbot
ssl_dhparam /etc/letsencrypt/ssl-dhparams.pem; # managed by Certbot
}
server {
if ($host = ci.example.com) {
return 301 https://$host$request_uri;
} # managed by Certbot
listen 80;
listen [::]:80;
server_name ci.example.com;
return 404; # managed by Certbot
}
我正在尝试使用 Let's Encrypt 的 certbot 提供的 ssl 加密在 Centos7 服务器上的 nginx 中设置一个具有一个子域(暂时)的网站。
我已经成功安装了 nginx,我已经设置了我的域:example.com
www.example.com
和 ci.example.com
并毫无问题地获得了颁发的证书(我的浏览器显示 'secured' 并且它会自动从 http 请求重定向到 https。)
现在我想让 ci.example.com
代理到 localhost:6500 端口(proxy_pass
我相信它被调用)。我试过以下:
this blog post from 2014 但 nginx 一直服务于标准 "Welcome to Nginx page"。
所有其他 articles/tutorials 适用于旧版本的 nginx(不使用 /etc/nginx/nginx.conf.
这里是/etc/nginx/nginx.conf
http {
log_format main '$remote_addr - $remote_user [$time_local] "$request" '
'$status $body_bytes_sent "$http_referer" '
'"$http_user_agent" "$http_x_forwarded_for"';
access_log /var/log/nginx/access.log main;
sendfile on;
tcp_nopush on;
tcp_nodelay on;
keepalive_timeout 65;
types_hash_max_size 2048;
include /etc/nginx/mime.types;
default_type application/octet-stream;
# Load modular configuration files from the /etc/nginx/conf.d directory.
# See http://nginx.org/en/docs/ngx_core_module.html#include
# for more information.
include /etc/nginx/conf.d/*.conf;
server {
server_name example.com www.example.com;
root /usr/share/nginx/html;
# Load configuration files for the default server block.
include /etc/nginx/default.d/*.conf;
location / {
}
error_page 404 /404.html;
location = /40x.html {
}
error_page 500 502 503 504 /50x.html;
location = /50x.html {
}
listen [::]:443 ssl ipv6only=on; # managed by Certbot
listen 443 ssl; # managed by Certbot
ssl_certificate /etc/letsencrypt/live/example.com/fullchain.pem; # managed by Certbot
ssl_certificate_key /etc/letsencrypt/live/example.com/privkey.pem; # managed by Certbot
include /etc/letsencrypt/options-ssl-nginx.conf; # managed by Certbot
ssl_dhparam /etc/letsencrypt/ssl-dhparams.pem; # managed by Certbot
server {
if ($host = www.example.com) {
return 301 https://$host$request_uri;
} # managed by Certbot
if ($host = example.com) {
return 301 https://$host$request_uri;
} # managed by Certbot
if ($host = ci.example.com) {
return 301 https://$host$request_uri;
} #added by me
listen 80 default_server;
listen [::]:80 default_server;
server_name example.com www.example.com;
return 404; # managed by Certbot
我已经弄明白了,并把它留给后代。
在我 运行 certbot --nginx 命令之前我没有正确设置 nginx。
这是你应该做的:
来自全新安装的 Centos 7
通过sudo yum update -y
然后通过安装nginx:sudo yum install nginx -y
它是默认设置,但这确保它是最新的。
然后按照 this 指南获得不安全 http://ci.yoursite.com
和 http://www.yoursite.com
随心所欲地工作。
注意 - 如果您遇到无法启动 nginx 的问题,原因是: [emerg] open() "/usr/share/nginx/logs/ci.yoursite.access.log" failed (13: Permission denied)
使用:su -c "setenforce 0"
它将SELinux设置为permissive模式并允许nginx启动。
然后跟随: This guide 让 Let's Encrypt 和 Certbot --nginx 正常工作。
你的最终 /etc/nginx/conf.d/ci.yourserver.conf
应该看起来像这样重新路由到本例中的端口 6500:
server {
server_name ci.example.com;
access_log logs/ci.example.access.log main;
root /var/www/ci.example.com/html;
index index.html index.htm;
location / {
proxy_pass http://localhost:6500;
proxy_set_header Host $host;
proxy_set_header X-Real-IP $remote_addr;
proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for;
proxy_connect_timeout 150;
proxy_send_timeout 100;
proxy_read_timeout 100;
proxy_buffers 4 32k;
client_max_body_size 8m;
client_body_buffer_size 128k;
proxy_set_header Upgrade $http_upgrade;
proxy_set_header Connection "Upgrade";
}
listen [::]:443 ssl ipv6only=on; # managed by Certbot
listen 443 ssl; # managed by Certbot
ssl_certificate /etc/letsencrypt/live/ci.example.com/fullchain.pem; # managed by Certbot
ssl_certificate_key /etc/letsencrypt/live/ci.example.com/privkey.pem; # managed by Certbot
include /etc/letsencrypt/options-ssl-nginx.conf; # managed by Certbot
ssl_dhparam /etc/letsencrypt/ssl-dhparams.pem; # managed by Certbot
}
server {
if ($host = ci.example.com) {
return 301 https://$host$request_uri;
} # managed by Certbot
listen 80;
listen [::]:80;
server_name ci.example.com;
return 404; # managed by Certbot
}