Commit Graph

127 Commits

Author SHA1 Message Date
jeroenpraat 448906e217 Prerequisites and cronjobs (#183)
* Prerequisites and cronjobs

* We probably we don't even support Windows and Mac
2017-05-01 16:59:28 +02:00
Nolan Lawson 718daad4a8 Add photos and avatars to static/immutable cache (#184) 2017-05-01 16:57:16 +02:00
ThibG 9430d2e2d9 Document how to use WEB_DOMAIN along with common pitfalls (#149)
* Create Serving_a_different_domain.md

Add extensive documentation for WEB_DOMAIN, as the feature is ill-documented and may be confusing.

* Fix Serving_a_different_domain.md

* Webfinger discovery workaround has made its way to v1.3.0
2017-05-01 16:45:18 +02:00
Nolan Lawson f0a863feec Recommend HTTP/2 in the nginx config (#178) 2017-05-01 16:35:16 +02:00
Noëlle Anthony befab7b7c3 Include explicit production environment (#172)
These tasks sometimes fail under non-Docker installations when the administrator tries to run them without explicitly requesting the production environment.
2017-05-01 16:32:47 +02:00
Bjarni Rúnar Einarsson 72ed10378f Avoid hard-coding ciphers into configuration (#171)
* Avoid hard-coding ciphers into configuration

This change allows OpenSSL to choose the most appropriate available cipher(s) from the HIGH cipher suite. This is sufficient to get an A on the SSLLabs.com tests suite. If MEDIUM is allowed as well, the grade drops to a B which is still more than adequate for most deployments.

This type of configuration would prevent problems such as the current inability of Tusky on Android 7 devices to connect to some Mastodon instances.

The main benefit though, is this delegates the decisions about which ciphers are "good" and which ciphers are "bad" to the experts; the distribution security teams and the OpenSSL developers. If a weakness is found in a particular cipher it will get moved from HIGH to one of the lower classes (or removed entirely) and this will get deployed just like any other security update. Similarly, if new stronger ciphers are standardized (such as Curve 25519) - these will immediately become available without needing to change the configuration.

Hope this helps!

Note: I have not been able to test this change with Mastodon myself. I am using these settings in production elsewhere though, and they work quite well. Alternately, if people don't want to trust the OpenSSL definitions, please consider taking a look at https://wiki.mozilla.org/Security/Server_Side_TLS and implementing the recommendations from there.

* Also avoid SHA1

As requested during review. :)

* Fix a typo in the ssl_ciphers line

I wrote !SHA1, should have written just !SHA. Very sorry about the noise.
2017-04-27 22:25:39 +02:00
Nolan Lawson 79f58d8b13 Fix typo in BgBouncer-guide.md (#168) 2017-04-27 22:24:59 +02:00
wxcafé 938575a679 Revert "Avoid hard-coding ciphers into configuration (#122)" (#170)
This reverts commit fc79d23ad0.
2017-04-27 22:15:37 +02:00
Bjarni Rúnar Einarsson fc79d23ad0 Avoid hard-coding ciphers into configuration (#122)
* Avoid hard-coding ciphers into configuration

This change allows OpenSSL to choose the most appropriate available cipher(s) from the HIGH cipher suite. This is sufficient to get an A on the SSLLabs.com tests suite. If MEDIUM is allowed as well, the grade drops to a B which is still more than adequate for most deployments.

This type of configuration would prevent problems such as the current inability of Tusky on Android 7 devices to connect to some Mastodon instances.

The main benefit though, is this delegates the decisions about which ciphers are "good" and which ciphers are "bad" to the experts; the distribution security teams and the OpenSSL developers. If a weakness is found in a particular cipher it will get moved from HIGH to one of the lower classes (or removed entirely) and this will get deployed just like any other security update. Similarly, if new stronger ciphers are standardized (such as Curve 25519) - these will immediately become available without needing to change the configuration.

Hope this helps!

Note: I have not been able to test this change with Mastodon myself. I am using these settings in production elsewhere though, and they work quite well. Alternately, if people don't want to trust the OpenSSL definitions, please consider taking a look at https://wiki.mozilla.org/Security/Server_Side_TLS and implementing the recommendations from there.

* Also avoid SHA1

As requested during review. :)
2017-04-27 22:13:27 +02:00
Nolan Lawson 0282f3d7e4 Update Tuning.md to mention `STREAMING_CLUSTER_NUM` (#151)
* Update Tuning.md to mention `STREAMING_CLUSTER_NUM`

This is a new option as documented here: bb04a9be52/.env.production.sample (L90-L92)

* note number of cores - 1
2017-04-27 20:02:47 +02:00
Nolan Lawson 5f371e9264 Fix typo 2017-04-27 07:37:52 -07:00
Nolan Lawson dcc2945e59 Add a bit more about logging 2017-04-27 07:37:02 -07:00
Nolan Lawson cd3d3f9fa0 Add PgBouncer guide 2017-04-27 07:29:44 -07:00
zorun 371864c39e Development: Fix bundle install instructions and expand on running rails (#133) 2017-04-27 11:15:53 +02:00
wxcafé 64a1c834b2 Docker-guide consistency 2017-04-27 10:56:41 +02:00
178inaba fbb0f346c3 Add yarn install option 2017-04-24 22:21:23 +09:00
Christian Quest 8fca29162d munin graph for your mastodon instance 2017-04-23 18:51:37 +02:00
Eugen 645fd80eff Merge pull request #134 from zorun/letsencrypt
Production guide: add support for let's encrypt in the nginx config
2017-04-23 06:00:14 +02:00
Nolan Lawson 8bc1fd2194 only add cache-control, remove comment 2017-04-22 17:09:39 -07:00
Nolan Lawson 32f4c5319f add nginx config for static assets 2017-04-22 16:19:53 -07:00
Baptiste Jonglez a8d244ad42 Production guide: add support for let's encrypt in the nginx config
This notably fixes potential issues like this one https://github.com/tootsuite/mastodon/issues/1665
2017-04-22 18:44:22 +02:00
Alan deLevie 4fc9c889ef Fixing typos in Docker-Guide.md (rails -> rake) (#112) 2017-04-22 10:38:15 +02:00
Ash Furrow 22c52995ad Adds note about persisting volumes. (#113) 2017-04-22 00:34:36 +02:00
Gervais Gwenaël 9efa9b69d8 Small URL error in Resources-needed.md (#116)
Corrected "https://mastodon.technllogy" to "https://mastodon.technology"
2017-04-22 00:29:06 +02:00
cubefoo 553d04cf43 update nginx ssl config (#120)
To further increase security add a strong Diffie-Hellman group, which is standard practice when setting up ssl certs. Anyone who can setup letsencrypt can also setup a DH group.
2017-04-22 00:28:43 +02:00
Nate Berkopec 7bde3a602a Make tuning.md a little more accurate 2017-04-21 12:16:27 -06:00
James fa8d76c406 Add administration section on how to create users while registration is closed (#107) 2017-04-20 20:08:05 +02:00
Chris Castle 85ff981217 Fix bad quote char in IAM policy (#108) 2017-04-20 20:07:32 +02:00
Tachibana waita 509793419d add git fetch line to upgrade section (#110) 2017-04-20 20:06:21 +02:00
Eugen 38fcd2a5c9 Merge pull request #98 from ashfurrow/docker-update
Updates Docker Update Instructions for git
2017-04-20 14:46:56 +02:00
wxcafé 3c211890df Fixes update section 2017-04-20 02:17:52 +02:00
Simon ffe2935f5c Add cost estimate column (#91)
* Add cost estimate column

To give interested admin an idea of what expected costs might be.

* Add estimate for mastodon.technology 

based on blog post

* Fix missing header dashes
2017-04-20 01:09:09 +02:00
Sergiusz Bazański 95a6040458 Mention `yarn install` in production upgrade guide (#62) 2017-04-19 18:44:07 +02:00
Aaron Coburn 18e4c617a2 Update link (#93)
Fix typo
2017-04-19 18:36:28 +02:00
Ben Hamill 43692e45b0 Mention Yarn in Dev Docs (#100)
Adds a mention of `yarn install` in the development guide so people know
to, well, run it.
2017-04-19 18:28:13 +02:00
wxcafé a6f0fbc043 Might have not been a good idea 2017-04-19 18:21:28 +02:00
wxcafé 507de093a6 Adds disk usage and fixes info for my instance 2017-04-19 17:03:35 +02:00
Ash Furrow 24e97522a6
Updates update instructions. 2017-04-18 20:58:59 -04:00
Matt Jankowski 4b67a3574b Import from main repo README (#82)
* Add docker guide from main repo readme

* Add maintenance tasks doc to running section

* Clean up markdown in prod guide

* Move guidance to use tagged releases to docs

* Move local domain and host config to docs repo

* Title of page

* Update Production-guide.md
2017-04-18 16:32:47 +02:00
Ash Furrow d0f619f23a Added documentation. (#85) 2017-04-18 16:14:57 +02:00
Florent Viel 1a82d42d76 fix typo (#86) 2017-04-18 16:14:20 +02:00
wxcafé 1dee21633b Adds the mastodon-admin Mailing list 2017-04-17 17:49:49 +02:00
Boris Mann 1388d60f42 Updated Mailgun instructions (#76)
This is not quite step-by-step yet, but at least indicates that you need to do more than just adding the Mailgun add on.
2017-04-17 17:14:55 +02:00
Ashley 18b243df0d Make it clearer that installing 'vagrant-hostsupdater' is optional (#78) 2017-04-17 17:14:14 +02:00
Erwan Leboucher 0b5cb11d08 Use the united command for daily task (#81)
commit of mastodon here e17f9d5e1a
2017-04-17 17:13:15 +02:00
Valentin Lorentz 35abda9b20 Fix bandwidth units for oc.todon.fr (#80)
* Fix bandwidth units for oc.todon.fr

(+ round the values a bit)

* Fix units again

* Consistency
2017-04-17 17:12:50 +02:00
Lukas Burk 124a1c1646 Add users:clear rake task to admin guide (#73) 2017-04-17 02:07:34 +02:00
Dolf RATTMANN a893d018ba Prevent people from pulling master in production (#71) 2017-04-17 00:32:34 +02:00
Naouak 9c1972673a Customization with custom.scss documentation (#56)
* Customization with custom.scss documentation

* Update Customizing.md
2017-04-17 00:26:17 +02:00
wxcafé eb32fc9738 Specifies to run the latest tagged release 2017-04-16 16:14:31 +02:00