2020-06-22 09:54:01 +00:00
|
|
|
proxy_cache_path /data/nginx/cache levels=1:2 keys_zone=skynet:10m max_size=10g use_temp_path=off;
|
|
|
|
limit_req_zone $binary_remote_addr zone=stats_by_ip:10m rate=10r/m;
|
|
|
|
limit_conn_zone $binary_remote_addr zone=uploads_by_ip:10m;
|
|
|
|
limit_conn_zone $binary_remote_addr zone=downloads_by_ip:10m;
|
|
|
|
limit_req_status 429;
|
|
|
|
limit_conn_status 429;
|
|
|
|
|
|
|
|
# since we are proxying request to nginx from caddy, access logs will contain caddy's ip address
|
|
|
|
# as the request address so we need to use real_ip_header module to use ip address from
|
|
|
|
# X-Forwarded-For header as a real ip address of the request
|
|
|
|
set_real_ip_from 10.0.0.0/8;
|
2020-09-16 12:21:22 +00:00
|
|
|
set_real_ip_from 127.0.0.1/32;
|
2020-06-22 09:54:01 +00:00
|
|
|
set_real_ip_from 172.16.0.0/12;
|
|
|
|
set_real_ip_from 192.168.0.0/16;
|
|
|
|
real_ip_header X-Forwarded-For;
|
|
|
|
|
2020-07-28 11:22:07 +00:00
|
|
|
upstream siad {
|
2020-07-08 12:09:54 +00:00
|
|
|
server sia:9980;
|
2020-06-22 09:54:01 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
server {
|
|
|
|
listen 80 default_server;
|
|
|
|
listen [::]:80 default_server;
|
|
|
|
|
2020-09-29 10:35:34 +00:00
|
|
|
# understand the regex https://regex101.com/r/BGQvi6/6
|
|
|
|
server_name "~^(((?<base32_subdomain>([a-z0-9]{55}))|(?<hns_domain>[^\.]+)\.hns)\.)?((?<portal_domain>[^.]+)\.)?(?<domain>[^.]+)\.(?<tld>[^.]+)$";
|
2020-09-10 15:14:43 +00:00
|
|
|
|
2020-06-22 09:54:01 +00:00
|
|
|
# ddos protection: closing slow connections
|
|
|
|
client_body_timeout 5s;
|
|
|
|
client_header_timeout 5s;
|
|
|
|
|
|
|
|
# Increase the body buffer size, to ensure the internal POSTs can always
|
|
|
|
# parse the full POST contents into memory.
|
|
|
|
client_body_buffer_size 128k;
|
|
|
|
client_max_body_size 128k;
|
|
|
|
|
2020-07-27 13:40:26 +00:00
|
|
|
location / {
|
2020-09-24 14:33:07 +00:00
|
|
|
# This is only safe workaround to reroute based on some conditions
|
2020-09-10 15:14:43 +00:00
|
|
|
# See https://www.nginx.com/resources/wiki/start/topics/depth/ifisevil/
|
|
|
|
recursive_error_pages on;
|
2020-09-24 14:33:07 +00:00
|
|
|
|
|
|
|
# redirect links with base32 encoded skylink in subdomain
|
2020-09-29 10:35:34 +00:00
|
|
|
error_page 460 = @base32_subdomain;
|
2020-09-24 14:33:07 +00:00
|
|
|
if ($base32_subdomain != "") {
|
2020-09-29 10:35:34 +00:00
|
|
|
return 460;
|
2020-09-10 15:14:43 +00:00
|
|
|
}
|
|
|
|
|
2020-09-24 14:33:07 +00:00
|
|
|
# redirect links with handshake domain on hns subdomain
|
2020-09-29 10:35:34 +00:00
|
|
|
error_page 461 = @hns_domain;
|
2020-09-24 14:33:07 +00:00
|
|
|
if ($hns_domain != "") {
|
2020-09-29 10:35:34 +00:00
|
|
|
return 461;
|
2020-09-24 14:33:07 +00:00
|
|
|
}
|
|
|
|
|
2020-07-27 15:04:21 +00:00
|
|
|
include /etc/nginx/conf.d/include/cors;
|
|
|
|
|
2020-07-27 13:40:26 +00:00
|
|
|
root /var/www/webportal;
|
|
|
|
}
|
2020-07-27 09:30:55 +00:00
|
|
|
|
2020-10-16 12:59:36 +00:00
|
|
|
location /docs {
|
|
|
|
proxy_pass https://nebulouslabs.github.io/skynet-docs;
|
|
|
|
}
|
|
|
|
|
2020-06-23 16:20:59 +00:00
|
|
|
location /blacklist {
|
2020-07-27 15:04:21 +00:00
|
|
|
include /etc/nginx/conf.d/include/cors;
|
|
|
|
|
2020-06-23 16:20:59 +00:00
|
|
|
proxy_cache skynet;
|
|
|
|
proxy_cache_valid any 1m; # cache blacklist for 1 minute
|
2020-07-27 13:40:26 +00:00
|
|
|
proxy_set_header User-Agent: Sia-Agent;
|
2020-07-28 11:22:07 +00:00
|
|
|
proxy_pass http://siad/skynet/blacklist;
|
2020-06-23 16:20:59 +00:00
|
|
|
}
|
|
|
|
|
2020-07-27 15:37:17 +00:00
|
|
|
location /skynet/blacklist {
|
|
|
|
include /etc/nginx/conf.d/include/cors;
|
|
|
|
|
|
|
|
proxy_cache skynet;
|
|
|
|
proxy_cache_valid any 1m; # cache blacklist for 1 minute
|
|
|
|
proxy_set_header User-Agent: Sia-Agent;
|
2020-07-28 11:22:07 +00:00
|
|
|
proxy_pass http://siad/skynet/blacklist;
|
2020-07-27 15:37:17 +00:00
|
|
|
}
|
|
|
|
|
2020-06-22 09:54:01 +00:00
|
|
|
location /portals {
|
2020-07-27 15:04:21 +00:00
|
|
|
include /etc/nginx/conf.d/include/cors;
|
|
|
|
|
2020-06-22 09:54:01 +00:00
|
|
|
proxy_cache skynet;
|
|
|
|
proxy_cache_valid any 1m; # cache portals for 1 minute
|
2020-07-27 13:40:26 +00:00
|
|
|
proxy_set_header User-Agent: Sia-Agent;
|
2020-07-28 11:22:07 +00:00
|
|
|
proxy_pass http://siad/skynet/portals;
|
2020-06-22 09:54:01 +00:00
|
|
|
}
|
|
|
|
|
2020-07-27 15:37:17 +00:00
|
|
|
location /skynet/portals {
|
|
|
|
include /etc/nginx/conf.d/include/cors;
|
|
|
|
|
|
|
|
proxy_cache skynet;
|
|
|
|
proxy_cache_valid any 1m; # cache portals for 1 minute
|
|
|
|
proxy_set_header User-Agent: Sia-Agent;
|
2020-07-28 11:22:07 +00:00
|
|
|
proxy_pass http://siad/skynet/portals;
|
2020-07-27 15:37:17 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
location /stats {
|
|
|
|
include /etc/nginx/conf.d/include/cors;
|
|
|
|
|
|
|
|
proxy_cache skynet;
|
2020-07-29 09:06:53 +00:00
|
|
|
proxy_cache_valid any 10m; # cache stats for 10 minutes
|
2020-07-27 15:37:17 +00:00
|
|
|
proxy_set_header User-Agent: Sia-Agent;
|
2020-07-29 09:06:53 +00:00
|
|
|
proxy_read_timeout 5m; # extend the read timeout
|
2020-07-28 11:22:07 +00:00
|
|
|
proxy_pass http://siad/skynet/stats;
|
2020-07-27 15:37:17 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
location /skynet/stats {
|
2020-07-27 15:04:21 +00:00
|
|
|
include /etc/nginx/conf.d/include/cors;
|
|
|
|
|
2020-06-22 09:54:01 +00:00
|
|
|
proxy_cache skynet;
|
2020-07-29 09:06:53 +00:00
|
|
|
proxy_cache_valid any 10m; # cache stats for 10 minutes
|
2020-07-27 13:40:26 +00:00
|
|
|
proxy_set_header User-Agent: Sia-Agent;
|
2020-07-29 09:06:53 +00:00
|
|
|
proxy_read_timeout 5m; # extend the read timeout
|
2020-07-28 11:22:07 +00:00
|
|
|
proxy_pass http://siad/skynet/stats;
|
2020-06-22 09:54:01 +00:00
|
|
|
}
|
|
|
|
|
2020-07-27 13:40:26 +00:00
|
|
|
location /health-check {
|
2020-07-27 15:04:21 +00:00
|
|
|
include /etc/nginx/conf.d/include/cors;
|
|
|
|
|
2020-07-27 13:40:26 +00:00
|
|
|
proxy_pass http://health-check:3100;
|
|
|
|
}
|
|
|
|
|
|
|
|
location /hns {
|
2020-07-31 13:25:57 +00:00
|
|
|
include /etc/nginx/conf.d/include/proxy-buffer;
|
2020-07-27 15:04:21 +00:00
|
|
|
|
2020-09-21 16:29:47 +00:00
|
|
|
# variable definititions - we need to define a variable to be able to access it in lua by ngx.var.something
|
2020-09-16 12:37:14 +00:00
|
|
|
set $skylink ''; # placeholder for the raw 46 bit skylink
|
|
|
|
set $rest ''; # placeholder for the rest of the url that gets appended to skylink (path and args)
|
|
|
|
|
|
|
|
# resolve handshake domain by requesting to /hnsres endpoint and assign correct values to $skylink and $rest
|
2020-09-15 15:09:22 +00:00
|
|
|
access_by_lua_block {
|
|
|
|
local json = require('cjson')
|
2020-09-21 16:29:47 +00:00
|
|
|
|
|
|
|
-- match the request_uri and extract the hns domain and anything that is passed in the uri after it
|
|
|
|
-- example: /hns/something/foo/bar?baz=1 matches:
|
|
|
|
-- > hns_domain_name: something
|
|
|
|
-- > request_uri_rest: /foo/bar/?baz=1
|
2020-09-16 12:21:22 +00:00
|
|
|
local hns_domain_name, request_uri_rest = string.match(ngx.var.request_uri, "/hns/([^/?]+)(.*)")
|
2020-09-21 16:29:47 +00:00
|
|
|
|
|
|
|
-- make a get request to /hnsres endpoint with the domain name from request_uri
|
2020-09-15 15:09:22 +00:00
|
|
|
local hnsres_res = ngx.location.capture("/hnsres/" .. hns_domain_name)
|
2020-09-16 15:06:09 +00:00
|
|
|
|
2020-09-21 16:29:47 +00:00
|
|
|
-- we want to fail with a generic 404 when /hnsres returns anything but 200 OK with a skylink
|
2020-09-16 15:06:09 +00:00
|
|
|
if hnsres_res.status ~= ngx.HTTP_OK then
|
|
|
|
ngx.exit(ngx.HTTP_NOT_FOUND)
|
|
|
|
end
|
|
|
|
|
2020-09-21 16:29:47 +00:00
|
|
|
-- since /hnsres endpoint response is a json, we need to decode it before we access it
|
|
|
|
-- example response: '{"skylink":"sia://XABvi7JtJbQSMAcDwnUnmp2FKDPjg8_tTTFP4BwMSxVdEg"}'
|
2020-09-15 15:09:22 +00:00
|
|
|
local hnsres_json = json.decode(hnsres_res.body)
|
2020-09-21 16:29:47 +00:00
|
|
|
|
2020-11-03 15:18:23 +00:00
|
|
|
if hnsres_json.skylink then
|
|
|
|
-- try to match the skylink with sia:// prefix
|
|
|
|
local skylink, skylink_rest = string.match(hnsres_json.skylink, "sia://([^/?]+)(.*)")
|
|
|
|
|
|
|
|
-- in case the skylink did not match, assume that there is no sia:// prefix and try to match again
|
|
|
|
if skylink == nil then
|
|
|
|
skylink, skylink_rest = string.match(hnsres_json.skylink, "/?([^/?]+)(.*)")
|
|
|
|
end
|
2020-11-04 11:04:24 +00:00
|
|
|
elseif hnsres_json.registry then
|
2020-11-03 15:18:23 +00:00
|
|
|
local publickey = hnsres_json.registry.publickey
|
|
|
|
local datakey = hnsres_json.registry.datakey
|
|
|
|
|
|
|
|
-- make a get request to /skynet/registry endpoint with the credentials from text record
|
|
|
|
local registry_res = ngx.location.capture("/skynet/registry?publickey=" .. publickey .. "&datakey=" .. datakey)
|
|
|
|
|
|
|
|
-- we want to fail with a generic 404 when /skynet/registry returns anything but 200 OK
|
|
|
|
if registry_res.status ~= ngx.HTTP_OK then
|
|
|
|
ngx.exit(ngx.HTTP_NOT_FOUND)
|
|
|
|
end
|
|
|
|
|
|
|
|
-- since /skynet/registry endpoint response is a json, we need to decode it before we access it
|
|
|
|
local registry_json = json.decode(registry_res.body)
|
2020-11-04 10:54:38 +00:00
|
|
|
-- response will contain a hex encoded skylink, we need to decode it
|
2020-11-03 15:18:23 +00:00
|
|
|
local data = (registry_json.data:gsub('..', function (cc)
|
|
|
|
return string.char(tonumber(cc, 16))
|
|
|
|
end))
|
2020-09-21 16:29:47 +00:00
|
|
|
|
2020-11-03 15:18:23 +00:00
|
|
|
skylink = data
|
2020-09-21 16:29:47 +00:00
|
|
|
end
|
2020-09-15 15:09:22 +00:00
|
|
|
|
2020-11-04 11:04:24 +00:00
|
|
|
-- fail with a generic 404 if skylink has not been extracted from a valid /hnsres response for some reason
|
|
|
|
if not skylink then
|
|
|
|
ngx.exit(ngx.HTTP_NOT_FOUND)
|
|
|
|
end
|
|
|
|
|
2020-09-15 15:09:22 +00:00
|
|
|
ngx.var.skylink = skylink
|
2020-09-21 16:29:47 +00:00
|
|
|
if request_uri_rest == "/" and skylink_rest ~= "" and skylink_rest ~= "/" then
|
2020-09-16 12:21:22 +00:00
|
|
|
ngx.var.rest = skylink_rest
|
2020-09-15 15:09:22 +00:00
|
|
|
else
|
2020-09-16 12:21:22 +00:00
|
|
|
ngx.var.rest = request_uri_rest
|
2020-09-15 15:09:22 +00:00
|
|
|
end
|
|
|
|
}
|
|
|
|
|
2020-09-16 12:21:22 +00:00
|
|
|
# overwrite the Cache-Control header to only cache for 60s in case the domain gets updated
|
|
|
|
more_set_headers 'Cache-Control: public, max-age=60';
|
|
|
|
|
2020-09-16 12:37:14 +00:00
|
|
|
# we proxy to another nginx location rather than directly to siad because we don't want to deal with caching here
|
2020-09-16 12:21:22 +00:00
|
|
|
proxy_pass http://127.0.0.1/$skylink$rest;
|
2020-09-15 15:09:22 +00:00
|
|
|
|
2020-09-16 12:37:14 +00:00
|
|
|
# in case siad returns location header, we need to replace the skylink with the domain name
|
2020-09-15 15:09:22 +00:00
|
|
|
header_filter_by_lua_block {
|
2020-09-16 12:21:22 +00:00
|
|
|
if ngx.header.location then
|
2020-09-21 16:29:47 +00:00
|
|
|
-- match hns domain from the request_uri
|
2020-09-16 12:21:22 +00:00
|
|
|
local hns_domain_name = string.match(ngx.var.request_uri, "/hns/([^/?]+)")
|
2020-09-15 15:09:22 +00:00
|
|
|
|
2020-09-21 16:29:47 +00:00
|
|
|
-- match location redirect part after the skylink
|
|
|
|
local location_rest = string.match(ngx.header.location, "[^/?]+(.*)");
|
|
|
|
|
|
|
|
-- because siad will set the location header to ie. XABvi7JtJbQSMAcDwnUnmp2FKDPjg8_tTTFP4BwMSxVdEg/index.html
|
|
|
|
-- we need to replace the skylink with the domain_name so we are not redirected to skylink
|
|
|
|
ngx.header.location = hns_domain_name .. location_rest
|
2020-09-15 15:09:22 +00:00
|
|
|
end
|
|
|
|
}
|
2020-07-27 13:40:26 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
location /hnsres {
|
2020-07-27 15:04:21 +00:00
|
|
|
include /etc/nginx/conf.d/include/cors;
|
|
|
|
|
2020-07-27 13:40:26 +00:00
|
|
|
proxy_pass http://handshake-api:3100;
|
|
|
|
}
|
|
|
|
|
2020-10-15 10:15:10 +00:00
|
|
|
location /skynet/registry {
|
|
|
|
include /etc/nginx/conf.d/include/cors;
|
|
|
|
include /etc/nginx/conf.d/include/sia-auth;
|
|
|
|
|
|
|
|
proxy_set_header User-Agent: Sia-Agent;
|
2020-10-27 12:36:31 +00:00
|
|
|
proxy_read_timeout 600; # siad should timeout with 404 after 5 minutes
|
2020-10-15 10:15:10 +00:00
|
|
|
proxy_pass http://siad/skynet/registry;
|
|
|
|
}
|
|
|
|
|
2020-06-22 09:54:01 +00:00
|
|
|
location /skynet/skyfile {
|
2020-07-27 15:04:21 +00:00
|
|
|
include /etc/nginx/conf.d/include/cors;
|
2020-07-28 09:19:03 +00:00
|
|
|
include /etc/nginx/conf.d/include/sia-auth;
|
2020-07-27 15:04:21 +00:00
|
|
|
|
2020-06-22 09:54:01 +00:00
|
|
|
limit_conn uploads_by_ip 10; # ddos protection: max 10 uploads at a time
|
|
|
|
client_max_body_size 1000M; # make sure to limit the size of upload to a sane value
|
|
|
|
proxy_read_timeout 600;
|
|
|
|
proxy_request_buffering off; # stream uploaded files through the proxy as it comes in
|
|
|
|
proxy_set_header Expect $http_expect;
|
2020-07-27 13:40:26 +00:00
|
|
|
proxy_set_header User-Agent: Sia-Agent;
|
2020-06-22 09:54:01 +00:00
|
|
|
|
|
|
|
# Extract 3 sets of 2 characters from $request_id and assign to $dir1, $dir2, $dir3
|
|
|
|
# respectfully. The rest of the $request_id is going to be assigned to $dir4.
|
|
|
|
# We use those variables to automatically generate a unique path for the uploaded file.
|
|
|
|
# This ensures that not all uploaded files end up in the same directory, which is something
|
|
|
|
# that causes performance issues in the renter.
|
|
|
|
# Example path result: /af/24/9b/c5ec894920ccc45634dc9a8065
|
|
|
|
if ($request_id ~* "(\w{2})(\w{2})(\w{2})(\w+)") {
|
|
|
|
set $dir1 $1;
|
|
|
|
set $dir2 $2;
|
|
|
|
set $dir3 $3;
|
|
|
|
set $dir4 $4;
|
|
|
|
}
|
|
|
|
|
|
|
|
# proxy this call to siad endpoint (make sure the ip is correct)
|
2020-07-28 11:22:07 +00:00
|
|
|
proxy_pass http://siad/skynet/skyfile/$dir1/$dir2/$dir3/$dir4$is_args$args;
|
2020-06-22 09:54:01 +00:00
|
|
|
}
|
|
|
|
|
2020-09-23 13:51:37 +00:00
|
|
|
location ~ "^/(([a-zA-Z0-9-_]{46}|[a-z0-9]{55})(/.*)?)$" {
|
2020-07-27 15:04:21 +00:00
|
|
|
include /etc/nginx/conf.d/include/cors;
|
2020-07-31 13:25:57 +00:00
|
|
|
include /etc/nginx/conf.d/include/proxy-buffer;
|
2020-09-01 13:26:48 +00:00
|
|
|
include /etc/nginx/conf.d/include/proxy-cache-downloads;
|
2020-07-27 15:04:21 +00:00
|
|
|
|
2020-07-16 16:31:03 +00:00
|
|
|
limit_conn downloads_by_ip 100; # ddos protection: max 100 downloads at a time
|
2020-07-30 19:15:21 +00:00
|
|
|
add_header Cache-Control "public, max-age=86400"; # allow consumer to cache response
|
2020-06-22 09:54:01 +00:00
|
|
|
|
|
|
|
# we need to explicitly use set directive here because $1 will contain the skylink with
|
|
|
|
# decoded whitespaces and set will re-encode it for us before passing it to proxy_pass
|
|
|
|
set $skylink $1;
|
|
|
|
|
|
|
|
proxy_read_timeout 600;
|
2020-07-27 13:40:26 +00:00
|
|
|
proxy_set_header User-Agent: Sia-Agent;
|
2020-06-22 09:54:01 +00:00
|
|
|
# proxy this call to siad /skynet/skylink/ endpoint (make sure the ip is correct)
|
2020-07-28 11:22:07 +00:00
|
|
|
proxy_pass http://siad/skynet/skylink/$skylink$is_args$args;
|
2020-06-22 09:54:01 +00:00
|
|
|
}
|
|
|
|
|
2020-09-24 14:33:07 +00:00
|
|
|
location @base32_subdomain {
|
|
|
|
include /etc/nginx/conf.d/include/proxy-buffer;
|
|
|
|
|
|
|
|
proxy_pass http://127.0.0.1/$base32_subdomain/$request_uri;
|
|
|
|
}
|
|
|
|
|
|
|
|
location @hns_domain {
|
2020-09-10 15:14:43 +00:00
|
|
|
include /etc/nginx/conf.d/include/proxy-buffer;
|
|
|
|
|
2020-09-24 14:33:07 +00:00
|
|
|
proxy_pass http://127.0.0.1/hns/$hns_domain/$request_uri;
|
2020-09-10 15:14:43 +00:00
|
|
|
}
|
|
|
|
|
2020-06-22 09:54:01 +00:00
|
|
|
location ~ "^/file/([a-zA-Z0-9-_]{46}(/.*)?)$" {
|
2020-07-31 13:25:57 +00:00
|
|
|
include /etc/nginx/conf.d/include/proxy-buffer;
|
2020-07-27 15:04:21 +00:00
|
|
|
|
2020-09-23 13:51:37 +00:00
|
|
|
proxy_pass http://127.0.0.1/$uri?attachment=true&$args;
|
2020-06-22 09:54:01 +00:00
|
|
|
}
|
|
|
|
}
|