Commit graph

127 commits

Author SHA1 Message Date
jeroenpraat
448906e217 Prerequisites and cronjobs (#183)
* Prerequisites and cronjobs

* We probably we don't even support Windows and Mac
2017-05-01 16:59:28 +02:00
Nolan Lawson
718daad4a8 Add photos and avatars to static/immutable cache (#184) 2017-05-01 16:57:16 +02:00
ThibG
9430d2e2d9 Document how to use WEB_DOMAIN along with common pitfalls (#149)
* Create Serving_a_different_domain.md

Add extensive documentation for WEB_DOMAIN, as the feature is ill-documented and may be confusing.

* Fix Serving_a_different_domain.md

* Webfinger discovery workaround has made its way to v1.3.0
2017-05-01 16:45:18 +02:00
Nolan Lawson
f0a863feec Recommend HTTP/2 in the nginx config (#178) 2017-05-01 16:35:16 +02:00
Noëlle Anthony
befab7b7c3 Include explicit production environment (#172)
These tasks sometimes fail under non-Docker installations when the administrator tries to run them without explicitly requesting the production environment.
2017-05-01 16:32:47 +02:00
Bjarni Rúnar Einarsson
72ed10378f Avoid hard-coding ciphers into configuration (#171)
* Avoid hard-coding ciphers into configuration

This change allows OpenSSL to choose the most appropriate available cipher(s) from the HIGH cipher suite. This is sufficient to get an A on the SSLLabs.com tests suite. If MEDIUM is allowed as well, the grade drops to a B which is still more than adequate for most deployments.

This type of configuration would prevent problems such as the current inability of Tusky on Android 7 devices to connect to some Mastodon instances.

The main benefit though, is this delegates the decisions about which ciphers are "good" and which ciphers are "bad" to the experts; the distribution security teams and the OpenSSL developers. If a weakness is found in a particular cipher it will get moved from HIGH to one of the lower classes (or removed entirely) and this will get deployed just like any other security update. Similarly, if new stronger ciphers are standardized (such as Curve 25519) - these will immediately become available without needing to change the configuration.

Hope this helps!

Note: I have not been able to test this change with Mastodon myself. I am using these settings in production elsewhere though, and they work quite well. Alternately, if people don't want to trust the OpenSSL definitions, please consider taking a look at https://wiki.mozilla.org/Security/Server_Side_TLS and implementing the recommendations from there.

* Also avoid SHA1

As requested during review. :)

* Fix a typo in the ssl_ciphers line

I wrote !SHA1, should have written just !SHA. Very sorry about the noise.
2017-04-27 22:25:39 +02:00
Nolan Lawson
79f58d8b13 Fix typo in BgBouncer-guide.md (#168) 2017-04-27 22:24:59 +02:00
wxcafé
938575a679 Revert "Avoid hard-coding ciphers into configuration (#122)" (#170)
This reverts commit fc79d23ad0.
2017-04-27 22:15:37 +02:00
Bjarni Rúnar Einarsson
fc79d23ad0 Avoid hard-coding ciphers into configuration (#122)
* Avoid hard-coding ciphers into configuration

This change allows OpenSSL to choose the most appropriate available cipher(s) from the HIGH cipher suite. This is sufficient to get an A on the SSLLabs.com tests suite. If MEDIUM is allowed as well, the grade drops to a B which is still more than adequate for most deployments.

This type of configuration would prevent problems such as the current inability of Tusky on Android 7 devices to connect to some Mastodon instances.

The main benefit though, is this delegates the decisions about which ciphers are "good" and which ciphers are "bad" to the experts; the distribution security teams and the OpenSSL developers. If a weakness is found in a particular cipher it will get moved from HIGH to one of the lower classes (or removed entirely) and this will get deployed just like any other security update. Similarly, if new stronger ciphers are standardized (such as Curve 25519) - these will immediately become available without needing to change the configuration.

Hope this helps!

Note: I have not been able to test this change with Mastodon myself. I am using these settings in production elsewhere though, and they work quite well. Alternately, if people don't want to trust the OpenSSL definitions, please consider taking a look at https://wiki.mozilla.org/Security/Server_Side_TLS and implementing the recommendations from there.

* Also avoid SHA1

As requested during review. :)
2017-04-27 22:13:27 +02:00
Nolan Lawson
0282f3d7e4 Update Tuning.md to mention STREAMING_CLUSTER_NUM (#151)
* Update Tuning.md to mention `STREAMING_CLUSTER_NUM`

This is a new option as documented here: bb04a9be52/.env.production.sample (L90-L92)

* note number of cores - 1
2017-04-27 20:02:47 +02:00
Nolan Lawson
5f371e9264 Fix typo 2017-04-27 07:37:52 -07:00
Nolan Lawson
dcc2945e59 Add a bit more about logging 2017-04-27 07:37:02 -07:00
Nolan Lawson
cd3d3f9fa0 Add PgBouncer guide 2017-04-27 07:29:44 -07:00
zorun
371864c39e Development: Fix bundle install instructions and expand on running rails (#133) 2017-04-27 11:15:53 +02:00
wxcafé
64a1c834b2 Docker-guide consistency 2017-04-27 10:56:41 +02:00
178inaba
fbb0f346c3 Add yarn install option 2017-04-24 22:21:23 +09:00
Christian Quest
8fca29162d munin graph for your mastodon instance 2017-04-23 18:51:37 +02:00
Eugen
645fd80eff Merge pull request #134 from zorun/letsencrypt
Production guide: add support for let's encrypt in the nginx config
2017-04-23 06:00:14 +02:00
Nolan Lawson
8bc1fd2194 only add cache-control, remove comment 2017-04-22 17:09:39 -07:00
Nolan Lawson
32f4c5319f add nginx config for static assets 2017-04-22 16:19:53 -07:00
Baptiste Jonglez
a8d244ad42 Production guide: add support for let's encrypt in the nginx config
This notably fixes potential issues like this one https://github.com/tootsuite/mastodon/issues/1665
2017-04-22 18:44:22 +02:00
Alan deLevie
4fc9c889ef Fixing typos in Docker-Guide.md (rails -> rake) (#112) 2017-04-22 10:38:15 +02:00
Ash Furrow
22c52995ad Adds note about persisting volumes. (#113) 2017-04-22 00:34:36 +02:00
Gervais Gwenaël
9efa9b69d8 Small URL error in Resources-needed.md (#116)
Corrected "https://mastodon.technllogy" to "https://mastodon.technology"
2017-04-22 00:29:06 +02:00
cubefoo
553d04cf43 update nginx ssl config (#120)
To further increase security add a strong Diffie-Hellman group, which is standard practice when setting up ssl certs. Anyone who can setup letsencrypt can also setup a DH group.
2017-04-22 00:28:43 +02:00
Nate Berkopec
7bde3a602a Make tuning.md a little more accurate 2017-04-21 12:16:27 -06:00
James
fa8d76c406 Add administration section on how to create users while registration is closed (#107) 2017-04-20 20:08:05 +02:00
Chris Castle
85ff981217 Fix bad quote char in IAM policy (#108) 2017-04-20 20:07:32 +02:00
Tachibana waita
509793419d add git fetch line to upgrade section (#110) 2017-04-20 20:06:21 +02:00
Eugen
38fcd2a5c9 Merge pull request #98 from ashfurrow/docker-update
Updates Docker Update Instructions for git
2017-04-20 14:46:56 +02:00
wxcafé
3c211890df Fixes update section 2017-04-20 02:17:52 +02:00
Simon
ffe2935f5c Add cost estimate column (#91)
* Add cost estimate column

To give interested admin an idea of what expected costs might be.

* Add estimate for mastodon.technology 

based on blog post

* Fix missing header dashes
2017-04-20 01:09:09 +02:00
Sergiusz Bazański
95a6040458 Mention yarn install in production upgrade guide (#62) 2017-04-19 18:44:07 +02:00
Aaron Coburn
18e4c617a2 Update link (#93)
Fix typo
2017-04-19 18:36:28 +02:00
Ben Hamill
43692e45b0 Mention Yarn in Dev Docs (#100)
Adds a mention of `yarn install` in the development guide so people know
to, well, run it.
2017-04-19 18:28:13 +02:00
wxcafé
a6f0fbc043 Might have not been a good idea 2017-04-19 18:21:28 +02:00
wxcafé
507de093a6 Adds disk usage and fixes info for my instance 2017-04-19 17:03:35 +02:00
Ash Furrow
24e97522a6
Updates update instructions. 2017-04-18 20:58:59 -04:00
Matt Jankowski
4b67a3574b Import from main repo README (#82)
* Add docker guide from main repo readme

* Add maintenance tasks doc to running section

* Clean up markdown in prod guide

* Move guidance to use tagged releases to docs

* Move local domain and host config to docs repo

* Title of page

* Update Production-guide.md
2017-04-18 16:32:47 +02:00
Ash Furrow
d0f619f23a Added documentation. (#85) 2017-04-18 16:14:57 +02:00
Florent Viel
1a82d42d76 fix typo (#86) 2017-04-18 16:14:20 +02:00
wxcafé
1dee21633b Adds the mastodon-admin Mailing list 2017-04-17 17:49:49 +02:00
Boris Mann
1388d60f42 Updated Mailgun instructions (#76)
This is not quite step-by-step yet, but at least indicates that you need to do more than just adding the Mailgun add on.
2017-04-17 17:14:55 +02:00
Ashley
18b243df0d Make it clearer that installing 'vagrant-hostsupdater' is optional (#78) 2017-04-17 17:14:14 +02:00
Erwan Leboucher
0b5cb11d08 Use the united command for daily task (#81)
commit of mastodon here e17f9d5e1a
2017-04-17 17:13:15 +02:00
Valentin Lorentz
35abda9b20 Fix bandwidth units for oc.todon.fr (#80)
* Fix bandwidth units for oc.todon.fr

(+ round the values a bit)

* Fix units again

* Consistency
2017-04-17 17:12:50 +02:00
Lukas Burk
124a1c1646 Add users:clear rake task to admin guide (#73) 2017-04-17 02:07:34 +02:00
Dolf RATTMANN
a893d018ba Prevent people from pulling master in production (#71) 2017-04-17 00:32:34 +02:00
Naouak
9c1972673a Customization with custom.scss documentation (#56)
* Customization with custom.scss documentation

* Update Customizing.md
2017-04-17 00:26:17 +02:00
wxcafé
eb32fc9738 Specifies to run the latest tagged release 2017-04-16 16:14:31 +02:00