准备

以下设置基于 LNMP,并使用 LNMP 的相关命令、配置等。

添加虚拟主机

使用如下命令添加 vhost:

lnmp vhost add

说明:

  • 使用域名 vault.bitwarden.in

  • 使用 lnmp 自带的 Let's Encrypt 创建 SSL 证书

  • 其他如 Rewrite rule、PHP Pathinfo、access log、databse、ftp 等全部选 no

虚拟主机 vault.bitwarden.in 的 Nginx 配置文件位置:/usr/local/nginx/conf/vhost/vault.bitwarden.in.conf

其默认的完整内容如下:

server
{
listen 80;
#listen [::]:80;
server_name vault.bitwarden.in ;
index index.html index.htm index.php default.html default.htm default.php;
root /home/wwwroot/vault.bitwarden.in;
include rewrite/none.conf;
#error_page 404 /404.html;
# Deny access to PHP files in specific directory
#location ~ /(wp-content|uploads|wp-includes|images)/.*\.php$ { deny all; }
include enable-php.conf;
location ~ .*\.(gif|jpg|jpeg|png|bmp|swf)$
{
expires 30d;
}
location ~ .*\.(js|css)?$
{
expires 12h;
}
location ~ /.well-known {
allow all;
}
location ~ /\.
{
deny all;
}
access_log off;
}
server
{
listen 443 ssl http2;
#listen [::]:443 ssl http2;
server_name vault.bitwarden.in ;
index index.html index.htm index.php default.html default.htm default.php;
root /home/wwwroot/vault.bitwarden.in;
ssl_certificate /usr/local/nginx/conf/ssl/vault.bitwarden.in/fullchain.cer;
ssl_certificate_key /usr/local/nginx/conf/ssl/vault.bitwarden.in/vault.bitwarden.in.key;
ssl_session_timeout 5m;
ssl_protocols TLSv1 TLSv1.1 TLSv1.2 TLSv1.3;
ssl_prefer_server_ciphers on;
ssl_ciphers "TLS13-AES-256-GCM-SHA384:TLS13-CHACHA20-POLY1305-SHA256:TLS13-AES-128-GCM-SHA256:TLS13-AES-128-CCM-8-SHA256:TLS13-AES-128-CCM-SHA256:EECDH+CHACHA20:EECDH+CHACHA20-draft:EECDH+AES128:RSA+AES128:EECDH+AES256:RSA+AES256:EECDH+3DES:RSA+3DES:!MD5";
ssl_session_cache builtin:1000 shared:SSL:10m;
# openssl dhparam -out /usr/local/nginx/conf/ssl/dhparam.pem 2048
ssl_dhparam /usr/local/nginx/conf/ssl/dhparam.pem;
include rewrite/none.conf;
#error_page 404 /404.html;
# Deny access to PHP files in specific directory
#location ~ /(wp-content|uploads|wp-includes|images)/.*\.php$ { deny all; }
include enable-php.conf;
location ~ .*\.(gif|jpg|jpeg|png|bmp|swf)$
{
expires 30d;
}
location ~ .*\.(js|css)?$
{
expires 12h;
}
location ~ /.well-known {
allow all;
}
location ~ /\.
{
deny all;
}
access_log off;
}

我们需要修改此文件,以添加如下功能:

设置反向代理

设置反向代理以使用 LNMP 生成并自动更新的免费 Let's Encrypt 证书。

参考 Nginx (by shauder)

vault.bitwarden.in.conf 配置文件的 server { listen 443; 语句块内的第一个 location 块上方添加如下内容:

client_max_body_size 128M; #允许大型附件
location / {
proxy_pass http://127.0.0.1:8443;
proxy_set_header Host $host;
proxy_set_header X-Real-IP $remote_addr;
proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for;
proxy_set_header X-Forwarded-Proto $scheme;
}
location /notifications/hub {
proxy_pass http://127.0.0.1:3012;
proxy_set_header Upgrade $http_upgrade;
proxy_set_header Connection "upgrade";
}
location /notifications/hub/negotiate {
proxy_pass http://127.0.0.1:8443;
}
location /admin {
proxy_set_header Host $host;
proxy_set_header X-Real-IP $remote_addr;
proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for;
proxy_set_header X-Forwarded-Proto $scheme;
proxy_pass http://127.0.0.1:8443;
}

设置 http 跳转到 https

server { listen 80; 语句块内的 root ... 行下方添加一行:

return 301 https://$server_name$request_uri;

另外,还要删除如下两个 location 语句块。不删除的话会导致无法解析 vaultwarden 实例内容。

location ~ .*\.(gif|jpg|jpeg|png|bmp|swf)$
{
expires 30d;
}
location ~ .*\.(js|css)?$
{
expires 12h;
}

上面所有设置和修改完成后的 vault.bitwarden.in.conf 文件的完整内容如下:

server
{
listen 80;
#listen [::]:80;
server_name vault.bitwarden.in ;
index index.html index.htm index.php default.html default.htm default.php;
root /home/wwwroot/vault.bitwarden.in;
return 301 https://$server_name$request_uri; #设置 http 跳转到 https
include rewrite/none.conf;
#error_page 404 /404.html;
# Deny access to PHP files in specific directory
#location ~ /(wp-content|uploads|wp-includes|images)/.*\.php$ { deny all; }
include enable-php.conf;
access_log off;
}
server
{
listen 443 ssl http2;
#listen [::]:443 ssl http2;
server_name vault.bitwarden.in ;
index index.html index.htm index.php default.html default.htm default.php;
root /home/wwwroot/vault.bitwarden.in;
ssl_certificate /usr/local/nginx/conf/ssl/vault.bitwarden.in/fullchain.cer;
ssl_certificate_key /usr/local/nginx/conf/ssl/vault.bitwarden.in/vault.bitwarden.in.key;
ssl_session_timeout 5m;
ssl_protocols TLSv1 TLSv1.1 TLSv1.2 TLSv1.3;
ssl_prefer_server_ciphers on;
ssl_ciphers "TLS13-AES-256-GCM-SHA384:TLS13-CHACHA20-POLY1305-SHA256:TLS13-AES-128-GCM-SHA256:TLS13-AES-128-CCM-8-SHA256:TLS13-AES-128-CCM-SHA256:EECDH+CHACHA20:EECDH+CHACHA20-draft:EECDH+AES128:RSA+AES128:EECDH+AES256:RSA+AES256:EECDH+3DES:RSA+3DES:!MD5";
ssl_session_cache builtin:1000 shared:SSL:10m;
# openssl dhparam -out /usr/local/nginx/conf/ssl/dhparam.pem 2048
ssl_dhparam /usr/local/nginx/conf/ssl/dhparam.pem;
include rewrite/none.conf;
#error_page 404 /404.html;
# Deny access to PHP files in specific directory
#location ~ /(wp-content|uploads|wp-includes|images)/.*\.php$ { deny all; }
include enable-php.conf;
#==设置反向代理开始==#
client_max_body_size 128M; #允许大型附件
location / {
proxy_pass http://127.0.0.1:8443;
proxy_set_header Host $host;
proxy_set_header X-Real-IP $remote_addr;
proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for;
proxy_set_header X-Forwarded-Proto $scheme;
}
location /notifications/hub {
proxy_pass http://127.0.0.1:3012;
proxy_set_header Upgrade $http_upgrade;
proxy_set_header Connection "upgrade";
}
location /notifications/hub/negotiate {
proxy_pass http://127.0.0.1:8443;
}
location /admin {
proxy_set_header Host $host;
proxy_set_header X-Real-IP $remote_addr;
proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for;
proxy_set_header X-Forwarded-Proto $scheme;
proxy_pass http://127.0.0.1:8443;
}
#==设置反向代理结束==#
location ~ /.well-known {
allow all;
}
location ~ /\.
{
deny all;
}
access_log off;
}

重启 nginx 使配置生效:

/etc/init.d/nginx restart

其他

在 Vultr 实例上开放相应的外部访问端口

Vultr 实例默认开启了 443 端口,如果你使用非 443 端口,需要在 Vultr 后台或在 CentOS 上添加相应的防火墙规则。