Commit graph

141 commits

Author SHA1 Message Date
Aral Balkan
c84f141e22
Add Mac development environment setup instructions. Closes #250 2017-05-16 16:04:50 +02:00
Eugen Rochko
1f202dedc1 Merge pull request #203 from wolfyshy/master
Update Apache configuration a bit
2017-05-07 00:51:34 +02:00
Eugen Rochko
a8da345a79 Merge pull request #209 from suoko/patch-1
Updated Administration-guide.md
2017-05-07 00:45:13 +02:00
Eugen Rochko
530ce36181 Merge pull request #212 from suoko/patch-2
Update Administration-guide.md
2017-05-07 00:43:43 +02:00
Eugen Rochko
07309d26dd Merge pull request #202 from takayamaki/fix_pgbouncer_guide
fix section "Configuring userlist.txt" of PgBouncer-guide.md
2017-05-07 00:42:03 +02:00
takayamaki
0b79565316 fix section "Configuring userlist.txt" of PgBouncer-guide.md
fix order of username and password when generating hash with md5sum
https://pgbouncer.github.io/config.html#authentication-file-format
2017-05-07 05:09:42 +09:00
suoko
fd3927b956 Update Administration-guide.md
Update for those using docker
2017-05-06 13:53:15 +02:00
William Pitcock
04efe7f909 scalingo guide: major improvements
- better limitation docs
- add instructions for adding custom domains
- add upgrading instructions
2017-05-05 22:35:05 -05:00
suoko
7f5258ce84 Updated Administration-guide.md
This way you can assign admininistration priviledges to users on some configurations
2017-05-05 21:05:34 +02:00
Eugen Rochko
d75b3d41c6 Merge pull request #207 from d6rkaiz/patch-3
Instructions for installing on CentOS
2017-05-05 02:01:05 +02:00
Isao Sugimoto
a3097c94e5 Instructions for installing on CentOS
related: #13
2017-05-05 04:33:04 +09:00
ABCanG
efefa29739 update how to launch application with vagrant 2017-05-04 16:45:37 +09:00
Wolfyshy LeLoupe
38ddc33afc Update Apache configuration a bit
This is the configuration we use on https://generous.horse and it includes the Cache-Control and Referrer-Policy headers.
2017-05-03 19:28:56 -05:00
ThibG
01c5d5a29c Add note on PuSH issue with Mastodon v1.3.2 2017-05-03 09:32:18 +02:00
jeroenpraat
448906e217 Prerequisites and cronjobs (#183)
* Prerequisites and cronjobs

* We probably we don't even support Windows and Mac
2017-05-01 16:59:28 +02:00
Nolan Lawson
718daad4a8 Add photos and avatars to static/immutable cache (#184) 2017-05-01 16:57:16 +02:00
ThibG
9430d2e2d9 Document how to use WEB_DOMAIN along with common pitfalls (#149)
* Create Serving_a_different_domain.md

Add extensive documentation for WEB_DOMAIN, as the feature is ill-documented and may be confusing.

* Fix Serving_a_different_domain.md

* Webfinger discovery workaround has made its way to v1.3.0
2017-05-01 16:45:18 +02:00
Nolan Lawson
f0a863feec Recommend HTTP/2 in the nginx config (#178) 2017-05-01 16:35:16 +02:00
Noëlle Anthony
befab7b7c3 Include explicit production environment (#172)
These tasks sometimes fail under non-Docker installations when the administrator tries to run them without explicitly requesting the production environment.
2017-05-01 16:32:47 +02:00
Bjarni Rúnar Einarsson
72ed10378f Avoid hard-coding ciphers into configuration (#171)
* Avoid hard-coding ciphers into configuration

This change allows OpenSSL to choose the most appropriate available cipher(s) from the HIGH cipher suite. This is sufficient to get an A on the SSLLabs.com tests suite. If MEDIUM is allowed as well, the grade drops to a B which is still more than adequate for most deployments.

This type of configuration would prevent problems such as the current inability of Tusky on Android 7 devices to connect to some Mastodon instances.

The main benefit though, is this delegates the decisions about which ciphers are "good" and which ciphers are "bad" to the experts; the distribution security teams and the OpenSSL developers. If a weakness is found in a particular cipher it will get moved from HIGH to one of the lower classes (or removed entirely) and this will get deployed just like any other security update. Similarly, if new stronger ciphers are standardized (such as Curve 25519) - these will immediately become available without needing to change the configuration.

Hope this helps!

Note: I have not been able to test this change with Mastodon myself. I am using these settings in production elsewhere though, and they work quite well. Alternately, if people don't want to trust the OpenSSL definitions, please consider taking a look at https://wiki.mozilla.org/Security/Server_Side_TLS and implementing the recommendations from there.

* Also avoid SHA1

As requested during review. :)

* Fix a typo in the ssl_ciphers line

I wrote !SHA1, should have written just !SHA. Very sorry about the noise.
2017-04-27 22:25:39 +02:00
Nolan Lawson
79f58d8b13 Fix typo in BgBouncer-guide.md (#168) 2017-04-27 22:24:59 +02:00
wxcafé
938575a679 Revert "Avoid hard-coding ciphers into configuration (#122)" (#170)
This reverts commit fc79d23ad0.
2017-04-27 22:15:37 +02:00
Bjarni Rúnar Einarsson
fc79d23ad0 Avoid hard-coding ciphers into configuration (#122)
* Avoid hard-coding ciphers into configuration

This change allows OpenSSL to choose the most appropriate available cipher(s) from the HIGH cipher suite. This is sufficient to get an A on the SSLLabs.com tests suite. If MEDIUM is allowed as well, the grade drops to a B which is still more than adequate for most deployments.

This type of configuration would prevent problems such as the current inability of Tusky on Android 7 devices to connect to some Mastodon instances.

The main benefit though, is this delegates the decisions about which ciphers are "good" and which ciphers are "bad" to the experts; the distribution security teams and the OpenSSL developers. If a weakness is found in a particular cipher it will get moved from HIGH to one of the lower classes (or removed entirely) and this will get deployed just like any other security update. Similarly, if new stronger ciphers are standardized (such as Curve 25519) - these will immediately become available without needing to change the configuration.

Hope this helps!

Note: I have not been able to test this change with Mastodon myself. I am using these settings in production elsewhere though, and they work quite well. Alternately, if people don't want to trust the OpenSSL definitions, please consider taking a look at https://wiki.mozilla.org/Security/Server_Side_TLS and implementing the recommendations from there.

* Also avoid SHA1

As requested during review. :)
2017-04-27 22:13:27 +02:00
Nolan Lawson
0282f3d7e4 Update Tuning.md to mention STREAMING_CLUSTER_NUM (#151)
* Update Tuning.md to mention `STREAMING_CLUSTER_NUM`

This is a new option as documented here: bb04a9be52/.env.production.sample (L90-L92)

* note number of cores - 1
2017-04-27 20:02:47 +02:00
Nolan Lawson
5f371e9264 Fix typo 2017-04-27 07:37:52 -07:00
Nolan Lawson
dcc2945e59 Add a bit more about logging 2017-04-27 07:37:02 -07:00
Nolan Lawson
cd3d3f9fa0 Add PgBouncer guide 2017-04-27 07:29:44 -07:00
zorun
371864c39e Development: Fix bundle install instructions and expand on running rails (#133) 2017-04-27 11:15:53 +02:00
wxcafé
64a1c834b2 Docker-guide consistency 2017-04-27 10:56:41 +02:00
178inaba
fbb0f346c3 Add yarn install option 2017-04-24 22:21:23 +09:00
Christian Quest
8fca29162d munin graph for your mastodon instance 2017-04-23 18:51:37 +02:00
Eugen
645fd80eff Merge pull request #134 from zorun/letsencrypt
Production guide: add support for let's encrypt in the nginx config
2017-04-23 06:00:14 +02:00
Nolan Lawson
8bc1fd2194 only add cache-control, remove comment 2017-04-22 17:09:39 -07:00
Nolan Lawson
32f4c5319f add nginx config for static assets 2017-04-22 16:19:53 -07:00
Baptiste Jonglez
a8d244ad42 Production guide: add support for let's encrypt in the nginx config
This notably fixes potential issues like this one https://github.com/tootsuite/mastodon/issues/1665
2017-04-22 18:44:22 +02:00
Alan deLevie
4fc9c889ef Fixing typos in Docker-Guide.md (rails -> rake) (#112) 2017-04-22 10:38:15 +02:00
Ash Furrow
22c52995ad Adds note about persisting volumes. (#113) 2017-04-22 00:34:36 +02:00
Gervais Gwenaël
9efa9b69d8 Small URL error in Resources-needed.md (#116)
Corrected "https://mastodon.technllogy" to "https://mastodon.technology"
2017-04-22 00:29:06 +02:00
cubefoo
553d04cf43 update nginx ssl config (#120)
To further increase security add a strong Diffie-Hellman group, which is standard practice when setting up ssl certs. Anyone who can setup letsencrypt can also setup a DH group.
2017-04-22 00:28:43 +02:00
Nate Berkopec
7bde3a602a Make tuning.md a little more accurate 2017-04-21 12:16:27 -06:00
James
fa8d76c406 Add administration section on how to create users while registration is closed (#107) 2017-04-20 20:08:05 +02:00
Chris Castle
85ff981217 Fix bad quote char in IAM policy (#108) 2017-04-20 20:07:32 +02:00
Tachibana waita
509793419d add git fetch line to upgrade section (#110) 2017-04-20 20:06:21 +02:00
Eugen
38fcd2a5c9 Merge pull request #98 from ashfurrow/docker-update
Updates Docker Update Instructions for git
2017-04-20 14:46:56 +02:00
wxcafé
3c211890df Fixes update section 2017-04-20 02:17:52 +02:00
Simon
ffe2935f5c Add cost estimate column (#91)
* Add cost estimate column

To give interested admin an idea of what expected costs might be.

* Add estimate for mastodon.technology 

based on blog post

* Fix missing header dashes
2017-04-20 01:09:09 +02:00
Sergiusz Bazański
95a6040458 Mention yarn install in production upgrade guide (#62) 2017-04-19 18:44:07 +02:00
Aaron Coburn
18e4c617a2 Update link (#93)
Fix typo
2017-04-19 18:36:28 +02:00
Ben Hamill
43692e45b0 Mention Yarn in Dev Docs (#100)
Adds a mention of `yarn install` in the development guide so people know
to, well, run it.
2017-04-19 18:28:13 +02:00
wxcafé
a6f0fbc043 Might have not been a good idea 2017-04-19 18:21:28 +02:00