-
Notifications
You must be signed in to change notification settings - Fork 215
/
nginx.conf
247 lines (200 loc) · 8.55 KB
/
nginx.conf
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
worker_processes 1;
events {worker_connections 1024;}
http {
charset utf-8;
default_type application/json;
include mime.types;
# timeouts are configured slightly higher than gateway read-timeout of 60 seconds
proxy_connect_timeout 70; # seconds, default: 60
proxy_send_timeout 70; # seconds, default: 60
proxy_read_timeout 70; # seconds, default: 60
send_timeout 70; # seconds, default: 60
client_header_buffer_size 8k; # allow longer URIs + headers (default: 1k)
large_client_header_buffers 4 16k;
merge_slashes off; # allow multiple slashes
map $http_authorization $authentication {
default "Authentication required";
"~Bearer" "off";
# the above means: if we get a request containing an "Authorization: Bearer ..." header, set "off" to $authentication
}
map $http_authorization $nginx_auth_user {
default "nginx:${remote_user}";
"~Bearer" "";
}
server {
listen 80;
listen [::]:80;
server_name ditto.eclipseprojects.io;
# required for let's encrypt:
location ^~ /.well-known/acme-challenge {
default_type text/plain;
allow all;
}
location / { # the default location redirects to https
return 301 https://$server_name$request_uri;
}
# api - also accessible via plain HTTP for health check
location /status {
include nginx-cors.conf;
proxy_pass http://gateway:8080/status;
proxy_http_version 1.1;
proxy_set_header Host $http_host;
proxy_set_header X-Real-IP $remote_addr;
proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for;
proxy_set_header Connection '';
chunked_transfer_encoding off;
proxy_buffering off;
proxy_cache off;
}
# api - also accessible via plain HTTP (in order to connect from "weak IoT devices")
location /api {
include nginx-cors.conf;
auth_basic $authentication;
auth_basic_user_file nginx.htpasswd;
proxy_pass http://gateway:8080/api;
proxy_http_version 1.1;
proxy_set_header Host $http_host;
proxy_set_header X-Real-IP $remote_addr;
proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for;
proxy_set_header X-Forwarded-User $remote_user;
proxy_set_header x-ditto-pre-authenticated $nginx_auth_user;
proxy_set_header Connection '';
chunked_transfer_encoding off;
proxy_buffering off;
proxy_cache off;
}
# ws - also accessible via plain HTTP (in order to connect from "weak IoT devices")
location /ws {
auth_basic $authentication;
auth_basic_user_file nginx.htpasswd;
proxy_pass http://gateway:8080/ws;
proxy_http_version 1.1;
proxy_set_header Host $http_host;
proxy_set_header X-Real-IP $remote_addr;
proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for;
proxy_set_header X-Forwarded-User $remote_user;
proxy_set_header x-ditto-pre-authenticated $nginx_auth_user;
proxy_set_header Upgrade $http_upgrade;
proxy_set_header Connection "upgrade";
proxy_read_timeout 1d;
proxy_send_timeout 1d;
}
}
server {
listen 443 default_server ssl;
listen [::]:443 ssl;
server_name ditto.eclipseprojects.io;
server_tokens off;
ssl_certificate /etc/letsencrypt/live/ditto.eclipseprojects.io/fullchain.pem;
ssl_certificate_key /etc/letsencrypt/live/ditto.eclipseprojects.io/privkey.pem;
ssl_buffer_size 8k;
ssl_dhparam /etc/ssl/certs/dhparam-2048.pem;
ssl_protocols TLSv1.2 TLSv1.1 TLSv1;
ssl_prefer_server_ciphers on;
ssl_ciphers ECDH+AESGCM:ECDH+AES256:ECDH+AES128:DH+3DES:!ADH:!AECDH:!MD5;
ssl_ecdh_curve secp384r1;
ssl_session_tickets off;
# OCSP stapling
ssl_stapling on;
ssl_stapling_verify on;
resolver 8.8.8.8;
# required for let's encrypt:
location ^~ /.well-known/acme-challenge {
default_type text/plain;
allow all;
}
location / {
index index.html;
}
# api
location /api {
include nginx-cors.conf;
auth_basic $authentication;
auth_basic_user_file nginx.htpasswd;
proxy_pass http://gateway:8080/api;
proxy_http_version 1.1;
proxy_set_header Host $http_host;
proxy_set_header X-Real-IP $remote_addr;
proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for;
proxy_set_header X-Forwarded-User $remote_user;
proxy_set_header x-ditto-pre-authenticated $nginx_auth_user;
proxy_set_header Connection '';
chunked_transfer_encoding off;
proxy_buffering off;
proxy_cache off;
}
# ws
location /ws {
auth_basic $authentication;
auth_basic_user_file nginx.htpasswd;
proxy_pass http://gateway:8080/ws;
proxy_http_version 1.1;
proxy_set_header Host $http_host;
proxy_set_header X-Real-IP $remote_addr;
proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for;
proxy_set_header X-Forwarded-User $remote_user;
proxy_set_header x-ditto-pre-authenticated $nginx_auth_user;
proxy_set_header Upgrade $http_upgrade;
proxy_set_header Connection "upgrade";
proxy_read_timeout 1d;
proxy_send_timeout 1d;
}
# status
location /status {
include nginx-cors.conf;
proxy_pass http://gateway:8080/overall/status;
proxy_http_version 1.1;
proxy_set_header Host $http_host;
proxy_set_header X-Real-IP $remote_addr;
proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for;
proxy_set_header X-Forwarded-User $remote_user;
}
# stats
location /stats {
include nginx-cors.conf;
proxy_pass http://gateway:8080/stats;
proxy_http_version 1.1;
proxy_set_header Host $http_host;
proxy_set_header X-Real-IP $remote_addr;
proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for;
proxy_set_header X-Forwarded-User $remote_user;
}
# devops
location /devops {
include nginx-cors.conf;
proxy_pass http://gateway:8080/devops;
proxy_http_version 1.1;
proxy_set_header Host $http_host;
proxy_set_header X-Real-IP $remote_addr;
proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for;
proxy_set_header X-Forwarded-User $remote_user;
}
# swagger
location /apidoc/ {
proxy_pass http://swagger-ui:8080/;
proxy_http_version 1.1;
proxy_set_header Host $http_host;
}
# location /nodered {
# proxy_pass http://node-red:1880/nodered;
# proxy_http_version 1.1;
# proxy_set_header Host $host;
# proxy_set_header Upgrade $http_upgrade;
# proxy_set_header Connection 'upgrade';
# proxy_set_header Host $host;
# proxy_cache_bypass $http_upgrade;
# }
location /oauth2/google/token {
# set $args '';
proxy_set_body $request_body&client_secret=TODOinsertOauth2clientSecret;
# Google DNS:
resolver 8.8.8.8;
resolver_timeout 5s;
set $google_token_uri "https://www.googleapis.com/oauth2/v4/token";
proxy_pass $google_token_uri;
proxy_ssl_session_reuse off;
proxy_set_header Host "www.googleapis.com";
proxy_set_header X-Forwarded-For "www.googleapis.com";
}
}
}