Selasa, 18 September 2018

Owncloud X maria DB

Install OwnCloud On Ubuntu 16.04 LTS With Nginx, MariaDB And PHP 7.1 And Let’s Encrypt SSL/TLS

When you decide to host your own self-hosted cloud storage services, don’t ignore OwnCloud… Many other open source cloud services are forks of OwnCloud… and OwnCloud works better when hosted with HTTPS or SSL/TLS…
OwnCloud is an open source, self-hosted file sync and share app platform that enables private cloud services on users’ own servers and environments. OwnCloud provides similar functions like DropBox and other cloud storage services, and it’s free to download and install on your own servers without paying service providers.
In today’s environments, OwnCloud is frequently being installed with SSL/TLS encryption so that all traffic to and from the platform is protected over HTTPS. This is a great way to secure your data on OwnCloud.
This brief tutorial shows students and new users steps to install and configure OwnCloud on Ubuntu 17.04 / 17.10 Servers with Nginx, MariaDB, PHP and Let’s Encrypt support to host OwnCloud in their own environments.
To learn how to install OwnCloud on your servers, follow the steps below:
To get started with installing OwnCloud, follow the steps below:

Step 1: Install Nginx

OwnCloud requires a webserver to function and the second most popular webserver in used today is Nginx. So, go and install Nginx on Ubuntu by running the commands below:
sudo apt install nginx
Next, run the commands below to stop, start and enable Nginx service to always start up with the server boots.
sudo systemctl stop nginx.service
sudo systemctl start nginx.service
sudo systemctl enable nginx.service

Step 2: Install MariaDB

OwnCloud also requires a database server to function.. and MariaDB database server is a great place to start. To install it run the commands below.
sudo apt-get install mariadb-server mariadb-client
After installing, the commands below can be used to stop, start and enable MariaDB service to always start up when the server boots.
sudo systemctl stop mysql.service
sudo systemctl start mysql.service
sudo systemctl enable mysql.service
After that, run the commands below to secure MariaDB server.
sudo mysql_secure_installation
When prompted, answer the questions below by following the guide.
  • Enter current password for root (enter for none): Just press the Enter
  • Set root password? [Y/n]: Y
  • New password: Enter password
  • Re-enter new password: Repeat password
  • Remove anonymous users? [Y/n]: Y
  • Disallow root login remotely? [Y/n]: Y
  • Remove test database and access to it? [Y/n]:  Y
  • Reload privilege tables now? [Y/n]:  Y
Restart MariaDB server
sudo systemctl restart mysql.service

Step 3: Install PHP-FPM And Related Modules

PHP 7.1 isn’t available on Ubuntu default repositories… in order to install it, you will have to get it from third-party repositories.
Run the commands below to add the below third party repository to upgrade to PHP 7.1
sudo apt-get install software-properties-common
sudo add-apt-repository ppa:ondrej/php
Then update and upgrade to PHP 7.1
sudo apt update
Run the commands below to install PHP 7.1 and related modules.
sudo apt install php7.1-fpm php7.1-common php7.1-mbstring php7.1-xmlrpc php7.1-soap php7.1-apcu php7.1-smbclient php7.1-ldap php7.1-redis php7.1-gd php7.1-xml php7.1-intl php7.1-json php7.1-imagick php7.1-mysql php7.1-cli php7.1-mcrypt php7.1-ldap php7.1-zip php7.1-curl
After install PHP 7.1, run the commands below to open PHP-FPM default file.
sudo nano /etc/php/7.1/fpm/php.ini
Then make the change the following lines below in the file and save.
file_uploads = On
allow_url_fopen = On
memory_limit = 256M
upload_max_filesize = 64M
max_execution_time = 360
cgi.fix_pathinfo = 0
date.timezone = America/Chicago

Step 4: Create OwnCloud Database

Now that you’ve install all the packages that are required, continue below to start configuring the servers. First run the commands below to create OwnCloud database.
Run the commands below to logon to the database server. When prompted for a password, type the root password you created above.
sudo mysql -u root -p
Then create a database called owncloud
CREATE DATABASE owncloud;
Create a database user called ownclouduser with new password
CREATE USER 'ownclouduser'@'localhost' IDENTIFIED BY 'new_password_here';
Then grant the user full access to the database.
GRANT ALL ON owncloud.* TO 'ownclouduser'@'localhost' IDENTIFIED BY 'user_password_here' WITH GRANT OPTION;
Finally, save your changes and exit.
FLUSH PRIVILEGES;
EXIT;

Step 5: Download OwnCloud Latest Release

Next, visit OwnCloud site to download your free copy by running the commands below.
After downloading, run the commands below to extract the download file into Nginx root directory.
cd /tmp && wget https://download.owncloud.org/community/owncloud-10.0.3.zip
unzip owncloud-10.0.3.zip
sudo mv owncloud /var/www/html/owncloud
Then run the commands below to set the correct permissions for OwnCloud to function.
sudo chown -R www-data:www-data /var/www/html/owncloud/
sudo chmod -R 755 /var/www/html/owncloud/

Step 6: Configure Nginx

Finally, configure Nginx site configuration file for OwnCloud. This file will control how users access OwnCloud content. Run the commands below to create a new configuration file called owncloud
sudo nano /etc/nginx/sites-available/owncloud
Then copy and paste the content below into the file and save it. Replace the highlighted line with your own domain name and directory root location.
server {
    listen 80;
    listen [::]:80;
    root /var/www/html/owncloud;
    index  index.php index.html index.htm;
    server_name  example.com www.example.com;

    location / {
        rewrite ^ /index.php$uri;
    }

    location ~ ^/(?:build|tests|config|lib|3rdparty|templates|data)/ {
        return 404;
    }
    location ~ ^/(?:\.|autotest|occ|issue|indie|db_|console) {
        return 404;
    }

    location ~ ^/(?:index|remote|public|cron|core/ajax/update|status|ocs/v[12]|updater/.+|ocs-provider/.+|core/templates/40[34])\.php(?:$|/) {
        include snippets/fastcgi-php.conf;
        fastcgi_pass unix:/var/run/php/php7.1-fpm.sock;
        fastcgi_param SCRIPT_FILENAME $document_root$fastcgi_script_name;
        include fastcgi_params;
        fastcgi_intercept_errors on;
        fastcgi_request_buffering off;
    }

    location ~ ^/(?:updater|ocs-provider)(?:$|/) {
        try_files $uri $uri/ =404;
        index index.php;
    }

    location ~* \.(?:svg|gif|png|html|ttf|woff|ico|jpg|jpeg)$ {
        try_files $uri /index.php$uri$is_args$args;
        access_log off;
    }

}
Save the file and exit.

Step 7: Enable The OwnCloud Site

After configuring the VirtualHost above, enable it by running the commands below
sudo ln -s /etc/nginx/sites-available/owncloud /etc/nginx/sites-enabled/

Step 8 : Restart Nginx

To load all the settings above, restart Apache2 by running the commands below.
sudo systemctl restart nginx.service

STEP 9: OBTAIN AND CONFIGURE LET’S ENCRYPT SSL CERTIFICATES

Now that the OwnCloud configuration is done, continue below to get Let’s Encrypt installed and configured. Let’s Encrypt now provides a NGinx module to automate this process. To get the client/module installed on Ubuntu, run the commands below
sudo add-apt-repository ppa:certbot/certbot
sudo apt-get update
sudo apt-get install python-certbot-nginx
After that run the commands below to obtain your free Let’s Encrypt SSL/TLS certificate for your site.
sudo certbot --nginx -m admin@example.com -d example.com -d www.example.com
After running the above commands, you should get prompted to accept the licensing terms. If everything is checked, the client should automatically install the free SSL/TLS certificate and configure the Nginx site to use the certs.
Please read the Terms of Service at
https://letsencrypt.org/documents/LE-SA-v1.2-November-15-2017.pdf. You must
agree in order to register with the ACME server at
https://acme-v01.api.letsencrypt.org/directory
-------------------------------------------------------------------------------
(A)gree/(C)ancel: A
Choose Yes ( Y ) to share your email address
Would you be willing to share your email address with the Electronic Frontier
Foundation, a founding partner of the Let's Encrypt project and the non-profit
organization that develops Certbot? We'd like to send you email about EFF and
our work to encrypt the web, protect its users and defend digital rights.
-------------------------------------------------------------------------------
(Y)es/(N)o: Y
This is how easy is it to obtain your free SSL/TLS certificate for your Nginx powered website.
Please choose whether or not to redirect HTTP traffic to HTTPS, removing HTTP access.
-------------------------------------------------------------------------------
1: No redirect - Make no further changes to the webserver configuration.
2: Redirect - Make all requests redirect to secure HTTPS access. Choose this for
new sites, or if you're confident your site works on HTTPS. You can undo this
change by editing your web server's configuration.
-------------------------------------------------------------------------------
Select the appropriate number [1-2] then [enter] (press 'c' to cancel): 2
Pick option 2 to redirect all traffic over HTTPS. This is important!
After that, the SSL client should install the cert and configure your website to redirect all traffic over HTTPS.
Congratulations! You have successfully enabled https://example.com and
https://www.example.com

You should test your configuration at:
https://www.ssllabs.com/ssltest/analyze.html?d=example.com
https://www.ssllabs.com/ssltest/analyze.html?d=www.example.com
-------------------------------------------------------------------------------

IMPORTANT NOTES:
 - Congratulations! Your certificate and chain have been saved at:
   /etc/letsencrypt/live/example.com/fullchain.pem
   Your key file has been saved at:
   /etc/letsencrypt/live/example.com/privkey.pem
   Your cert will expire on 2018-02-24. To obtain a new or tweaked
   version of this certificate in the future, simply run certbot again
   with the "certonly" option. To non-interactively renew *all* of
   your certificates, run "certbot renew"
 - If you like Certbot, please consider supporting our work by:

   Donating to ISRG / Let's Encrypt:   https://letsencrypt.org/donate
   Donating to EFF:                    https://eff.org/donate-le
The highlighted code block should be added to your Nginx OwnCloud site configuration file automatically by Let’s Encrypt certbot. Your OwnCloud site is ready to be used over HTTPS.
server {
    listen 80;
    listen [::]:80;
    root /var/www/html/owncloud;
    index  index.php index.html index.htm;
    server_name  example.com www.example.com;

    location / {
        rewrite ^ /index.php$uri;
    }

    location ~ ^/(?:build|tests|config|lib|3rdparty|templates|data)/ {
        return 404;
    }
    location ~ ^/(?:\.|autotest|occ|issue|indie|db_|console) {
        return 404;
    }

    location ~ ^/(?:index|remote|public|cron|core/ajax/update|status|ocs/v[12]|updater/.+|ocs-provider/.+|core/templates/40[34])\.php(?:$|/) {
        include snippets/fastcgi-php.conf;
        fastcgi_pass unix:/var/run/php/php7.1-fpm.sock;
        fastcgi_param SCRIPT_FILENAME $document_root$fastcgi_script_name;
        include fastcgi_params;
        fastcgi_intercept_errors on;
        fastcgi_request_buffering off;
    }

    location ~ ^/(?:updater|ocs-provider)(?:$|/) {
        try_files $uri $uri/ =404;
        index index.php;
    }

    location ~* \.(?:svg|gif|png|html|ttf|woff|ico|jpg|jpeg)$ {
        try_files $uri /index.php$uri$is_args$args;
        access_log off;
    }

    listen 443 ssl; # managed by Certbot
    ssl_certificate /etc/letsencrypt/live/example.com/fullchain.pem; # managed by Certbot
    ssl_certificate_key /etc/letsencrypt/live/example.com/privkey.pem; # managed by Certbot
    include /etc/letsencrypt/options-ssl-nginx.conf; # managed by Certbot
    ssl_dhparam /etc/letsencrypt/ssl-dhparams.pem; # managed by Certbot

    if ($scheme != "https") {
        return 301 https://$host$request_uri;
    } # managed by Certbot

    # Redirect non-https traffic to https
    # if ($scheme != "https") {
    #     return 301 https://$host$request_uri;
    # } # managed by Certbot

}
Then open your browser and browse to the server domain name followed by install. You should see OwnCloud setup wizard to complete. Please follow the wizard carefully.

Https://Example.Com

You should then see OwnCloud setup page.. Connect to the database using the information you created and continue. Select the database server installed on your systems by clicking it as shown in the image below
owncloud_ubuntu
Click Finish setup and you’re done.
Enjoy!
owncloud ubuntu
Congratulations! You have successfully installed OwnCloud on Ubuntu `17.04 / 17.10 with Let’s Encrypt support.
To setup a process to automatically renew the certificates, add a cron job to execute the renewal process.
sudo crontab -e
Then add the line below and save.
0 1 * * * /usr/bin/certbot renew & > /dev/null
The cron job will attempt to renew 30 days before expiring
Enjoy!

Tidak ada komentar:

Posting Komentar