PSA: If you want to allow uploads larger than 1MB to your site, you’ll also have to set client_max_body_size 100M
in any nginx config that sits in front of your site.
For reference, here’s the full nginx config I use:
nginx config for other sites on same host
server {
if ($host = discourse.mysite.org) {
return 301 https://$host$request_uri;
} # managed by Certbot
if ($host = backupname.mysite.org) {
return 301 https://$host$request_uri;
} # managed by Certbot
listen 80; listen [::]:80;
server_name discourse.mysite.org;
server_name backupname.mysite.org;
location / {
proxy_pass http://unix:/var/discourse/shared/mysite/nginx.http.sock:;
proxy_set_header Host $http_host;
proxy_http_version 1.1;
proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for;
proxy_set_header X-Forwarded-Proto $scheme;
proxy_set_header X-Real-IP $remote_addr;
}
}
# nginx 1.14.1 | intermediate profile | OpenSSL 1.1.0f | link
server {
listen 443 ssl http2; listen [::]:443 ssl http2;
server_name discourse.mysite.org;
server_name backupname.mysite.org;
# from discourse examples
http2_idle_timeout 5m; # up from 3m default
client_max_body_size 50M; # allow 50M uploads
location / {
proxy_pass http://unix:/var/discourse/shared/mysite/nginx.http.sock:;
proxy_set_header Host $http_host;
proxy_http_version 1.1;
proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for;
proxy_set_header X-Forwarded-Proto https;
proxy_set_header X-Real-IP $remote_addr;
}
ssl_certificate /etc/letsencrypt/live/backupname.mysite.org/fullchain.pem; # managed by Certbot
ssl_certificate_key /etc/letsencrypt/live/backupname.mysite.org/privkey.pem; # managed by Certbot
###### https://mozilla.github.io/server-side-tls/ssl-config-generator/ ####
ssl_session_timeout 1d;
ssl_session_cache shared:SSL:50m;
ssl_session_tickets off;
# modern configuration. tweak to your needs.
ssl_protocols TLSv1.2;
ssl_ciphers 'ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256';
ssl_prefer_server_ciphers on;
# HSTS (ngx_http_headers_module is required) (15768000 seconds = 6 months)
add_header Strict-Transport-Security max-age=15768000;
# OCSP Stapling ---
# fetch OCSP records from URL in ssl_certificate and cache them
ssl_stapling on;
ssl_stapling_verify on;
## verify chain of trust of OCSP response using Root CA and Intermediate certs
ssl_trusted_certificate /etc/letsencrypt/live/backupname.mysite.org/chain.pem;
resolver 1.1.1.1;
}