Skip to content
This repository has been archived by the owner on Aug 10, 2020. It is now read-only.

on apt Update conflict nginx files #6

Open
kangarooo opened this issue Jun 12, 2017 · 1 comment
Open

on apt Update conflict nginx files #6

kangarooo opened this issue Jun 12, 2017 · 1 comment

Comments

@kangarooo
Copy link

kangarooo commented Jun 12, 2017

Ubuntu 16.04 64bit
did sudo apt update sudo apt upgrade
later one up updates asks this and i pressed to check differences and looks like its some easy eangine lines in both but witch one is real? How this came if if did before ee update and it told all is ok - i have latest version. So if this one isnt easy engines, then this one might overwrite something from ee and ee will not work some cache app part maybe?

Configuration file '/etc/nginx/nginx.conf'
==> Modified (by you or by a script) since installation.
==> Package distributor has shipped an updated version.
What would you like to do about it ? Your options are:
Y or I : install the package maintainer's version
N or O : keep your currently-installed version
D : show the differences between the versions
Z : start a shell to examine the situation
The default action is to keep your current version.
*** nginx.conf (Y/I/N/O/D/Z) [default=N] ?

--- /etc/nginx/nginx.conf 2016-12-31 02:29:22.546504768 +0200
+++ /etc/nginx/nginx.conf.dpkg-new 2017-03-27 11:44:22.000000000 +0300
@@ -21,7 +21,7 @@

    server_tokens off;
    reset_timedout_connection on;
  •   add_header X-Powered-By "EasyEngine 3.7.4";
    
  •   # add_header X-Powered-By "EasyEngine";
      add_header rt-Fastcgi-Cache $upstream_cache_status;
    
      # Limit Request
    

@@ -42,9 +42,9 @@
ssl_session_cache shared:SSL:20m;
ssl_session_timeout 10m;
ssl_prefer_server_ciphers on;

  •   ssl_ciphers ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-DSS-AES128-GCM-SHA256:kEDH+AESGCM:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA:ECDHE-ECDSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-DSS-AES128-SHA256:DHE-RSA-AES256-SHA256:DHE-DSS-AES256-SHA:DHE-RSA-AES256-SHA:ECDHE-RSA-DES-CBC3-SHA:ECDHE-ECDSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:AES:CAMELLIA:DES-CBC3-SHA:!aNULL:!eNULL:!EXPORT:!DES:!RC4:!MD5:!PSK:!aECDH:!EDH-DSS-DES-CBC3-SHA:!EDH-RSA-DES-CBC3-SHA:!KRB5-DES-CBC3-SHA;
    
  •   ssl_ciphers "EECDH+AESGCM:EDH+AESGCM:AES256+EECDH:AES256+EDH";
      ssl_protocols TLSv1 TLSv1.1 TLSv1.2;
    
  •   ##
      # Basic Settings
      ##
    

(END)

sadsaf
asdsdf

@kangarooo
Copy link
Author

kangarooo commented Jun 12, 2017

How to do now after choosing wrong a reconfiguration to ask this question again so i can choose other one? And how to know witch package it is if not possible to find somehow last upgrades reconfiguration.

Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.
Labels
None yet
Projects
None yet
Development

No branches or pull requests

1 participant