知乎专栏 |
绑定IP地址
listen 80; 相当于0.0.0.0:80监听所有接口上的IP地址 listen 192.168.0.1 80; listen 192.168.0.1:80;
配置默认主机 default_server
server { listen 80; server_name acc.example.net; ... } server { listen 80 default_server; server_name www.example.org; ... }
# cat /etc/nginx/conf.d/images.conf server { listen 80; server_name images.example.com; #charset koi8-r; access_log /var/log/nginx/images.access.log main; location / { root /www/images; index index.html index.htm; } #error_page 404 /404.html; # redirect server error pages to the static page /50x.html # error_page 500 502 503 504 /50x.html; location = /50x.html { root /usr/share/nginx/html; } # proxy the PHP scripts to Apache listening on 127.0.0.1:80 # #location ~ \.php$ { # proxy_pass http://127.0.0.1; #} # pass the PHP scripts to FastCGI server listening on 127.0.0.1:9000 # #location ~ \.php$ { # root html; # fastcgi_pass 127.0.0.1:9000; # fastcgi_index index.php; # fastcgi_param SCRIPT_FILENAME /scripts$fastcgi_script_name; # include fastcgi_params; #} # deny access to .htaccess files, if Apache's document root # concurs with nginx's one # #location ~ /\.ht { # deny all; #} }
使用通配符匹配
server_name *.example.com server_name www.*;
正则匹配
server_name ~^(.+)\.example\.com$; server_name ~^(www\.)?(.+)$;
泛解析主机
server { listen 80; server_name example.org www.example.org; ... } server { listen 80; server_name *.example.org; ... } server { listen 80; server_name mail.*; ... } server { listen 80; server_name ~^(?<user>.+)\.example\.net$; ... }
location / { root /www; index index.html index.htm; }
location 匹配到特定的 path 将拒绝用户访问。
location ~ /\.ht { deny all; } location ~ ^/(config|include)/ { deny all; break; }
引用document_root之外的资源需要 root 绝对路径指向目标文件夹
location / { root /www/example.com/m.example.com; try_files $uri $uri/ @proxy; } location ^~ /module/ { root /www/example.com/www.example.com; } # 下面的写法是错误的,通过error_log 我们可以看到被定为到/www/example.com/m.example.com/module location /module/ { root /www/example.com/www.example.com; }
location ~ \.php$ { root /opt/netkiller.cn/cms.netkiller.cn; fastcgi_pass 127.0.0.1:9000; fastcgi_index index.php; fastcgi_param SCRIPT_FILENAME /opt/netkiller.cn/cms.netkiller.cn$fastcgi_script_name; include fastcgi_params; }
location = /favicon.ico { log_not_found off; access_log off; } location = /robots.txt { allow all; log_not_found off; access_log off; }
为每个host创建一个目录太麻烦,
server { listen 80; server_name www.netkiller.cn news.netkiller.cn bbs.netkiller.cn; charset utf-8; access_log /var/log/nginx/test.access.log main; location / { root /www/netkiller.cn/$host; index index.html index.htm; } }
处理主机名中的域
server { listen 80; server_name *.example.com example.com; if ($host = 'example.com' ) { rewrite ^/(.*)$ http://www.example.com/$1 permanent; } if ( $host ~* (.*)\.(.*)\.(.*)) { set $subdomain $1; set $domain $2.$3; } root /www/$domain/$subdomain; index index.html index.php; location ~ .*\.(php|shtml)?$ { fastcgi_pass 127.0.0.1:9000; fastcgi_index index.php; include fcgi.conf; } }
或者采用这种格式 /www/example.com/www.example.com
root /www/$domain/$host;
更简洁的方法,只需在 /www/下面创建 域名目录即可例如/www/www.example.com
server { listen 80; server_name *.example.com example.com; if ($host = 'example.com' ) { rewrite ^/(.*)$ http://www.example.com/$1 permanent; } root /www/$host; index index.html index.php; location ~ .*\.(php|shtml)?$ { fastcgi_pass 127.0.0.1:9000; fastcgi_index index.php; include fcgi.conf; } }
案例
server { listen 80; listen 443 ssl http2; server_name report.netkiller.cn; include /etc/nginx/default.d/*.conf; access_log /var/log/nginx/report.netkiller.cn.access.log; error_log /var/log/nginx/report.netkiller.cn.error.log; error_page 497 https://$host$uri?$args; if ($scheme = http) { return 301 https://$server_name$request_uri; } location / { root /opt/netkiller.cn/report.netkiller.cn; index index.html; } location /api/ { proxy_set_header Host $host; proxy_set_header X-Real-IP $remote_addr; proxy_set_header REMOTE-HOST $remote_addr; proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for; proxy_pass http://dashboard.netkiller.cn:8080/; } location /file/download { proxy_set_header Host $host; proxy_set_header X-Real-IP $remote_addr; proxy_set_header REMOTE-HOST $remote_addr; proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for; proxy_pass http://dashboard.netkiller.cn:8080; } error_page 404 /404.html; location = /40x.html { } error_page 500 502 503 504 /50x.html; location = /50x.html { } }
⚠️注意,两个 proxy_pass 的区别:
/api/ 匹配后等效 /api/* = http://dashboard.netkiller.cn:8080/*
/file/download 匹配等效 /file/download/* = http://dashboard.netkiller.cn:8080/file/download/*
root 定位目录,例如 http://www.netkiller.cn/static/neo.js
location ^~ /static/ { root /usr/share/nginx/dev/; autoindex on; }
定位结果 /usr/share/nginx/dev/static/neo.js
我们不希望出现 static 这层目录,就需要使用 alias 替代 root
location ^~ /static/ { alias /usr/share/nginx/dev/; autoindex on; }
最终文件路径是 /usr/share/nginx/dev/neo.js
server { listen 80; server_name www.example.com example.com; location / { try_files $uri $uri/ /index.php?/$request_uri; } location /example { alias /www/example/; index index.php index.html; } error_page 500 502 503 504 /50x.html; location = /50x.html { root /usr/share/nginx/html; } location ~ \.php$ { root html; fastcgi_pass 127.0.0.1:9000; fastcgi_index index.php; fastcgi_param SCRIPT_FILENAME /www/example$fastcgi_script_name; include fastcgi_params; } location ~ /\.ht { deny all; } }
mkdir /etc/nginx/ssl
cp your_ssl_certificate to /etc/nginx/ssl
# HTTPS server # server { listen 443; server_name localhost; root html; index index.html index.htm; ssl on; #ssl_certificate cert.pem; ssl_certificate ssl/example.com.pem; ssl_certificate_key ssl/example.com.key; ssl_session_timeout 5m; ssl_protocols SSLv3 TLSv1; ssl_ciphers ALL:!ADH:!EXPORT56:RC4+RSA:+HIGH:+MEDIUM:+LOW:+SSLv3:+EXP; ssl_prefer_server_ciphers on; location / { try_files $uri $uri/ /index.html; } }
configtest
$ sudo service nginx configtest Testing nginx configuration: nginx.
443 port test
$ openssl s_client -connect www.example.com:443
创建自颁发证书,SSL有两种证书模式,单向认证和双向认证,下面是单向认证模式。
mkdir -p /etc/pki/nginx/private/ cd /etc/pki/nginx/ openssl req -x509 -nodes -days 365 -newkey rsa:4096 -keyout /etc/pki/nginx/private/server.key -out /etc/pki/nginx/server.crt
建议使用域名命名证书
openssl req -x509 -nodes -days 365 -newkey rsa:4096 -keyout /etc/nginx/ssl/api.netkiller.cn.key -out /etc/nginx/ssl/api.netkiller.cn.crt Generating a 4096 bit RSA private key ..........++ ..............................................++ writing new private key to '/etc/nginx/ssl/api.netkiller.cn.key' ----- You are about to be asked to enter information that will be incorporated into your certificate request. What you are about to enter is what is called a Distinguished Name or a DN. There are quite a few fields but you can leave some blank For some fields there will be a default value, If you enter '.', the field will be left blank. ----- Country Name (2 letter code) [XX]:CN State or Province Name (full name) []:Guangdong Locality Name (eg, city) [Default City]:Shenzhen Organization Name (eg, company) [Default Company Ltd]:CF Organizational Unit Name (eg, section) []:CF Common Name (eg, your name or your server's hostname) []:api.netkiller.cn Email Address []:netkiller@msn.com
注意: Common Name (eg, your name or your server's hostname) []:api.netkiller.cn 要跟你的 nginx server_name api.netkiller.cn 一样。
Nginx 配置 spdy
upstream api.netkiller.cn { #server api1.netkiller.cn:7000; #server api2.netkiller.cn backup; } server { listen 443 ssl spdy; server_name api.netkiller.cn; ssl_certificate /etc/nginx/ssl/api.netkiller.cn.crt; ssl_certificate_key /etc/nginx/ssl/api.netkiller.cn.key; ssl_session_cache shared:SSL:20m; ssl_session_timeout 60m; ssl_protocols TLSv1 TLSv1.1 TLSv1.2; charset utf-8; access_log /var/log/nginx/api.netkiller.cn.access.log; error_log /var/log/nginx/api.netkiller.cn.error.log; location / { proxy_pass http://api.netkiller.cn; proxy_http_version 1.1; proxy_set_header Host $host; proxy_set_header X-Real-IP $remote_addr; proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for; proxy_ignore_client_abort on; } #location / { # proxy_pass http://127.0.0.1:7000; #} }
spdy 是google提出的标准,现在已经归入 http2 标准,Nginx 1.10 之后建议使用 http2 替代 spdy.
server { listen 443 ssl http2; ssl_certificate server.crt; ssl_certificate_key server.key; }
497 - normal request was sent to HTTPS
#让http请求重定向到https请求 server { listen 80; error_page 497 https://$host$uri?$args; rewrite ^(.*)$ https://$host$1 permanent; }
server { listen 80 listen 443 ssl http2; ssl_certificate server.crt; ssl_certificate_key server.key; error_page 497 https://$host$uri?$args; if ($scheme = http) { return 301 https://$server_name$request_uri; } }
touch /etc/pki/CA/index.txt echo 00 > /etc/pki/CA/serial 制作 CA 私钥 openssl genrsa -out ca.key 2048 制作 CA 根证书(公钥) openssl req -new -x509 -days 3650 -key ca.key -out ca.crt
服务器端证书
制作服务端私钥 openssl genrsa -out server.pem 2048 openssl rsa -in server.pem -out server.key 生成签发请求 openssl req -new -key server.pem -out server.csr 用 CA 签发 openssl x509 -req -sha256 -in server.csr -CA ca.crt -CAkey ca.key -CAcreateserial -days 3650 -out server.crt
生成客户端证书
openssl genrsa -des3 -out client.key 2048 openssl req -new -key client.key -out client.csr 生成签发请求 openssl req -new -key server.pem -out server.csr 用 CA 签发 openssl ca -in client.csr -cert ca.crt -keyfile ca.key -out client.crt -days 3650
cat client.crt client.key > soap.pem
$header = array( 'local_cert' => "soap.pem", //client.pem文件路径 'passphrase' => "passw0rd" //client证书密码 ); $client = new SoapClient(FILE_WSDL, $header);
例 35.1. Nginx SSL 双向认证,证书生成过程
root@VM_7_221_centos /etc/nginx/ssl % openssl genrsa -out ca.key 2048 Generating RSA private key, 2048 bit long modulus ...................................................+++ ......................................+++ e is 65537 (0x10001) root@VM_7_221_centos /etc/nginx/ssl % openssl req -new -x509 -days 3650 -key ca.key -out ca.crt You are about to be asked to enter information that will be incorporated into your certificate request. What you are about to enter is what is called a Distinguished Name or a DN. There are quite a few fields but you can leave some blank For some fields there will be a default value, If you enter '.', the field will be left blank. ----- Country Name (2 letter code) [XX]:CN State or Province Name (full name) []:GD Locality Name (eg, city) [Default City]:Shenzhen Organization Name (eg, company) [Default Company Ltd]:GW Organizational Unit Name (eg, section) []:DEV Common Name (eg, your name or your server's hostname) []:api.netkiller.cn Email Address []:netkiller@msn.com
root@VM_7_221_centos /etc/nginx/ssl % openssl genrsa -out server.pem 2048 Generating RSA private key, 2048 bit long modulus .............+++ ........................................................+++ e is 65537 (0x10001) root@VM_7_221_centos /etc/nginx/ssl % openssl rsa -in server.pem -out server.key writing RSA key root@VM_7_221_centos /etc/nginx/ssl % openssl req -new -key server.pem -out server.csr You are about to be asked to enter information that will be incorporated into your certificate request. What you are about to enter is what is called a Distinguished Name or a DN. There are quite a few fields but you can leave some blank For some fields there will be a default value, If you enter '.', the field will be left blank. ----- Country Name (2 letter code) [XX]:CN State or Province Name (full name) []:GD Locality Name (eg, city) [Default City]:Shenzhen Organization Name (eg, company) [Default Company Ltd]:GW Organizational Unit Name (eg, section) []:DEV Common Name (eg, your name or your server's hostname) []:api.netkiller.cn Email Address []:netkiller@msn.com Please enter the following 'extra' attributes to be sent with your certificate request A challenge password []: An optional company name []: root@VM_7_221_centos /etc/nginx/ssl % openssl x509 -req -sha256 -in server.csr -CA ca.crt -CAkey ca.key -CAcreateserial -days 3650 -out server.crt Signature ok subject=/C=CN/ST=GD/L=Shenzhen/O=GW/OU=DEV/CN=api.netkiller.cn/emailAddress=netkiller@msn.com Getting CA Private Key
mkdir /etc/nginx/ssl cp server.crt server.key ca.crt /etc/nginx/ssl cd /etc/nginx/ssl
/etc/nginx/conf.d/api.netkiller.cn.conf
server { listen 443 ssl; server_name api.netkiller.cn; access_log off; ssl on; ssl_certificate /etc/nginx/ssl/server.crt; ssl_certificate_key /etc/nginx/ssl/server.key; ssl_client_certificate /etc/nginx/ssl/ca.crt; ssl_verify_client on; location / { proxy_pass http://localhost:8443; } }
重启 nginx 服务器
root@VM_7_221_centos /etc/nginx % systemctl restart nginx
首先直接请求
root@VM_7_221_centos /etc/nginx % curl -k https://api.netkiller.cn/ <html> <head><title>400 No required SSL certificate was sent</title></head> <body bgcolor="white"> <center><h1>400 Bad Request</h1></center> <center>No required SSL certificate was sent</center> <hr><center>nginx</center> </body> </html>
使用证书请求
curl --insecure --key client.key --cert ./client.crt:123456 https://api.netkiller.cn
注意: --cert 参数需要写入路径和密码
expires 格式
例 35.2. Expires Examples
expires 1 January, 1970, 00:00:01 GMT; expires 60s; expires 30m; expires 24h; expires 1d; expires max; expires off; expires 24h; expires modified +24h; expires @15h30m; expires 0; expires -1; expires epoch; add_header Cache-Control private;
注意:expires仅仅适用于200, 204, 301, 302,304
单个文件匹配
location ~* \.css$ { expires 30d; }
扩展名匹配
#图片类资源缓存5天,并且不记录请求日志 location ~ .*\.(ico|gif|jpg|jpeg|png|bmp|swf)$ { expires 5d; access_log off; } #css/js 缓存一天,不记录请求日志 location ~ .*\.(js|css)$ { access_log off; expires 1d; add_header Pragma public; add_header Cache-Control "public"; }
location ~ .*\.(htm|html|gif|jpg|jpeg|png|bmp|swf|ioc|rar|zip|txt|flv|mid|doc|ppt|pdf|xls|mp3|wma)$ { expires 30d; } location ~ .*\.(js|css)$ { expires 1h; }
location ~* \.(js|css|jpg|jpeg|gif|png|swf)$ { if (-f $request_filename) { expires 1h; break; } } location ~* \.(jpg|jpeg|gif|css|png|js|ico)$ { expires max; } #cache control: all statics are cacheable for 24 hours location / { if ($request_uri ~* \.(ico|css|js|gif|jpe?g|png)$) { expires 72h; break; } }
例 35.3. nginx expires
location ~ .*\.(gif|jpg|jpeg|png|bmp|swf|ico)$ { expires 1d; access_log off; } location ~ .*\.(js|css)$ { expires 1d; access_log off; } location ~ .*\.(html|htm)$ { expires 1d; access_log off; }
add_header 实例
location ~* \.(?:ico|css|js|gif|jpe?g|png)$ { expires 30d; add_header Pragma public; add_header Cache-Control "public"; }
more_set_headers 实例
location ~ \.(ico|pdf|flv|jp?g|png|gif|js|css|webp|swf)(\.gz)?(\?.*)?$ { more_set_headers 'Cache-Control: max-age=86400'; ... proxy_cache_valid 200 2592000; ... }
s-maxage 作用于 Proxy
location ~ \.(ico|pdf|flv|jp?g|png|gif|js|css|webp|swf)(\.gz)?(\?.*)?$ { more_set_headers 'Cache-Control: s-maxage=86400'; }
if ($request_uri ~* "\.(ico|css|js|gif|jpe?g|png)\?[0-9]+$") { expires max; break; }
下面例子是缓存 /detail/html/5/4/321035.html, 但排除 /detail/html/5/4/0.html
if ($request_uri ~ ^/detail/html/[0-9]+/[0-9]/[^0][0-9]+\.html ) { expires 1d; }
#防止access文件被下载 location ~ /\.ht { deny all; }
location ~ ^/upload/.*\.php$ { deny all; } location ~ ^/static/images/.*\.php$ { deny all; }
location ~ /\.ht { deny all; } location ~ .*\.(sqlite|sq3)$ { deny all; }
IP 地址
location / { deny 192.168.0.1; allow 192.168.1.0/24; allow 10.1.1.0/16; allow 2001:0db8::/32; deny all; }
限制IP访问*.php文件
location ~ ^/private/.*\.php$ { allow 222.222.22.35; allow 192.168.1.0/249; deny all; }
开启目录浏览
# vim /etc/nginx/sites-enabled/default location / { autoindex on; }
# /etc/init.d/nginx reload Reloading nginx configuration: nginx.
另外Nginx的目录流量有两个比较有用的参数,可以根据自己的需求添加:
autoindex_exact_size off; 默认为on,显示出文件的确切大小,单位是bytes。 改为off后,显示出文件的大概大小,单位是kB或者MB或者GB autoindex_localtime on; 默认为off,显示的文件时间为GMT时间。 改为on后,显示的文件时间为文件的服务器时间
301 跳转
server { listen 80; server_name m.example.com; location / { return 301 $scheme://www.example.com$request_uri; } } server { listen 80; listen 443 ssl; server_name www.old-name.com; return 301 $scheme://www.new-name.com$request_uri; }
# 相关页面设置Cache-Control头信息
if ($request_uri ~* "^/$|^/news/.+/|^/info/.+/") { add_header Cache-Control max-age=3600; } if ($request_uri ~* "^/suggest/|^/categories/") { add_header Cache-Control max-age=86400; }
add_header Nginx-Cache "HIT from www.example.com"; or add_header Nginx-Cache "$upstream_cache_status from www.example.com";
location ~* \.(eot|ttf|woff)$ { add_header Access-Control-Allow-Origin *; } location /js/ { add_header Access-Control-Allow-Origin https://www.mydomain.com/; add_header Access-Control-Allow-Methods GET,OPTIONS; add_header Access-Control-Allow-Headers *; }
location / { if ($request_method = OPTIONS ) { add_header Access-Control-Allow-Origin "http://example.com"; add_header Access-Control-Allow-Methods "GET, OPTIONS"; add_header Access-Control-Allow-Headers "Authorization"; add_header Access-Control-Allow-Credentials "true"; add_header Content-Length 0; add_header Content-Type text/plain; return 200; } }
允许 所有头部 所有域 所有方法
server { ... location / { add_header 'Access-Control-Allow-Origin' '*'; add_header 'Access-Control-Allow-Headers' '*'; add_header 'Access-Control-Allow-Methods' '*'; # OPTIONS 直接返回204 if ($request_method = 'OPTIONS') { return 204; } } ... }
使用 $http_origin 变量
add_header 'Access-Control-Allow-Origin' $http_origin; add_header 'Access-Control-Allow-Credentials' 'true'; add_header 'Access-Control-Allow-Methods' 'GET, POST, OPTIONS'; add_header 'Access-Control-Allow-Headers' 'DNT,web-token,app-token,Authorization,Accept,Origin,Keep-Alive,User-Agent,X-Mx-ReqToken,X-Data-Type,X-Auth-Token,X-Requested-With,If-Modified-Since,Cache-Control,Content-Type,Range'; add_header 'Access-Control-Expose-Headers' 'Content-Length,Content-Range'; if ($request_method = 'OPTIONS') { add_header 'Access-Control-Max-Age' 1728000; add_header 'Content-Type' 'text/plain; charset=utf-8'; add_header 'Content-Length' 0; return 204; }