This repository has been archived on 2022-10-07. You can view files and clone it, but cannot push or open issues or pull requests.
skynet-webportal/docker/nginx/conf.d/client.conf

246 lines
8.4 KiB
Plaintext
Raw Normal View History

proxy_cache_path /data/nginx/cache levels=1:2 keys_zone=skynet:10m max_size=10g use_temp_path=off;
limit_req_zone $binary_remote_addr zone=stats_by_ip:10m rate=10r/m;
limit_conn_zone $binary_remote_addr zone=uploads_by_ip:10m;
limit_conn_zone $binary_remote_addr zone=downloads_by_ip:10m;
limit_req_status 429;
limit_conn_status 429;
2020-09-23 12:36:19 +00:00
# since we are proxying request to nginx from caddy, access logs will contain caddy's ip address
# as the request address so we need to use real_ip_header module to use ip address from
# X-Forwarded-For header as a real ip address of the request
set_real_ip_from 10.0.0.0/8;
2020-09-16 12:21:22 +00:00
set_real_ip_from 127.0.0.1/32;
set_real_ip_from 172.16.0.0/12;
set_real_ip_from 192.168.0.0/16;
real_ip_header X-Forwarded-For;
2020-07-28 11:22:07 +00:00
upstream siad {
server sia:9980;
}
server {
listen 80 default_server;
listen [::]:80 default_server;
# parse subdomain (a base32 encoded Skylink) into custom variable
2020-09-11 09:21:39 +00:00
server_name "~^([a-z0-9]{55})\..*$";
set $subdomain $1;
# ddos protection: closing slow connections
client_body_timeout 5s;
client_header_timeout 5s;
# Increase the body buffer size, to ensure the internal POSTs can always
# parse the full POST contents into memory.
client_body_buffer_size 128k;
client_max_body_size 128k;
2020-07-27 13:40:26 +00:00
location / {
# The only safe thing to do inside an if in a location block is return
# or rewrite, since we need to proxy_pass we have to work our way around
# using a custom error code.
#
# See https://www.nginx.com/resources/wiki/start/topics/depth/ifisevil/
error_page 418 = @subdomain;
recursive_error_pages on;
if ($subdomain != "") {
return 418;
}
2020-07-27 15:04:21 +00:00
include /etc/nginx/conf.d/include/cors;
2020-07-27 13:40:26 +00:00
root /var/www/webportal;
}
2020-07-27 09:30:55 +00:00
2020-06-23 16:20:59 +00:00
location /blacklist {
2020-07-27 15:04:21 +00:00
include /etc/nginx/conf.d/include/cors;
2020-06-23 16:20:59 +00:00
proxy_cache skynet;
proxy_cache_valid any 1m; # cache blacklist for 1 minute
2020-07-27 13:40:26 +00:00
proxy_set_header User-Agent: Sia-Agent;
2020-07-28 11:22:07 +00:00
proxy_pass http://siad/skynet/blacklist;
2020-06-23 16:20:59 +00:00
}
2020-07-27 15:37:17 +00:00
location /skynet/blacklist {
include /etc/nginx/conf.d/include/cors;
proxy_cache skynet;
proxy_cache_valid any 1m; # cache blacklist for 1 minute
proxy_set_header User-Agent: Sia-Agent;
2020-07-28 11:22:07 +00:00
proxy_pass http://siad/skynet/blacklist;
2020-07-27 15:37:17 +00:00
}
location /portals {
2020-07-27 15:04:21 +00:00
include /etc/nginx/conf.d/include/cors;
proxy_cache skynet;
proxy_cache_valid any 1m; # cache portals for 1 minute
2020-07-27 13:40:26 +00:00
proxy_set_header User-Agent: Sia-Agent;
2020-07-28 11:22:07 +00:00
proxy_pass http://siad/skynet/portals;
}
2020-07-27 15:37:17 +00:00
location /skynet/portals {
include /etc/nginx/conf.d/include/cors;
proxy_cache skynet;
proxy_cache_valid any 1m; # cache portals for 1 minute
proxy_set_header User-Agent: Sia-Agent;
2020-07-28 11:22:07 +00:00
proxy_pass http://siad/skynet/portals;
2020-07-27 15:37:17 +00:00
}
location /stats {
include /etc/nginx/conf.d/include/cors;
proxy_cache skynet;
2020-07-29 09:06:53 +00:00
proxy_cache_valid any 10m; # cache stats for 10 minutes
2020-07-27 15:37:17 +00:00
proxy_set_header User-Agent: Sia-Agent;
2020-07-29 09:06:53 +00:00
proxy_read_timeout 5m; # extend the read timeout
2020-07-28 11:22:07 +00:00
proxy_pass http://siad/skynet/stats;
2020-07-27 15:37:17 +00:00
}
location /skynet/stats {
2020-07-27 15:04:21 +00:00
include /etc/nginx/conf.d/include/cors;
proxy_cache skynet;
2020-07-29 09:06:53 +00:00
proxy_cache_valid any 10m; # cache stats for 10 minutes
2020-07-27 13:40:26 +00:00
proxy_set_header User-Agent: Sia-Agent;
2020-07-29 09:06:53 +00:00
proxy_read_timeout 5m; # extend the read timeout
2020-07-28 11:22:07 +00:00
proxy_pass http://siad/skynet/stats;
}
2020-07-27 13:40:26 +00:00
location /health-check {
2020-07-27 15:04:21 +00:00
include /etc/nginx/conf.d/include/cors;
2020-07-27 13:40:26 +00:00
proxy_pass http://health-check:3100;
}
location /hns {
2020-07-31 13:25:57 +00:00
include /etc/nginx/conf.d/include/proxy-buffer;
2020-07-27 15:04:21 +00:00
2020-09-16 12:37:14 +00:00
set $skylink ''; # placeholder for the raw 46 bit skylink
set $rest ''; # placeholder for the rest of the url that gets appended to skylink (path and args)
2020-09-23 12:36:19 +00:00
2020-09-16 12:37:14 +00:00
# resolve handshake domain by requesting to /hnsres endpoint and assign correct values to $skylink and $rest
2020-09-15 15:09:22 +00:00
access_by_lua_block {
local json = require('cjson')
2020-09-16 12:21:22 +00:00
local hns_domain_name, request_uri_rest = string.match(ngx.var.request_uri, "/hns/([^/?]+)(.*)")
2020-09-15 15:09:22 +00:00
local hnsres_res = ngx.location.capture("/hnsres/" .. hns_domain_name)
2020-09-16 15:06:09 +00:00
if hnsres_res.status ~= ngx.HTTP_OK then
ngx.exit(ngx.HTTP_NOT_FOUND)
end
2020-09-15 15:09:22 +00:00
local hnsres_json = json.decode(hnsres_res.body)
2020-09-16 12:21:22 +00:00
local skylink_prefix, skylink, skylink_rest = string.match(hnsres_json.skylink, "(sia://)([^/?]+)(.*)")
2020-09-15 15:09:22 +00:00
ngx.var.skylink = skylink
2020-09-16 12:21:22 +00:00
if request_uri_rest == "" or (request_uri_rest == "/" and skylink_rest ~= "") then
ngx.var.rest = skylink_rest
2020-09-15 15:09:22 +00:00
else
2020-09-16 12:21:22 +00:00
ngx.var.rest = request_uri_rest
2020-09-15 15:09:22 +00:00
end
}
2020-09-16 12:21:22 +00:00
# overwrite the Cache-Control header to only cache for 60s in case the domain gets updated
more_set_headers 'Cache-Control: public, max-age=60';
2020-09-23 12:36:19 +00:00
2020-09-16 12:37:14 +00:00
# we proxy to another nginx location rather than directly to siad because we don't want to deal with caching here
2020-09-16 12:21:22 +00:00
proxy_pass http://127.0.0.1/$skylink$rest;
2020-09-15 15:09:22 +00:00
2020-09-16 12:37:14 +00:00
# in case siad returns location header, we need to replace the skylink with the domain name
2020-09-15 15:09:22 +00:00
header_filter_by_lua_block {
2020-09-16 12:21:22 +00:00
if ngx.header.location then
local hns_domain_name = string.match(ngx.var.request_uri, "/hns/([^/?]+)")
local location = string.gsub(ngx.header.location, ngx.var.skylink, hns_domain_name)
2020-09-15 15:09:22 +00:00
2020-09-16 12:21:22 +00:00
ngx.header.location = location
2020-09-15 15:09:22 +00:00
end
}
2020-07-27 13:40:26 +00:00
}
location /hnsres {
2020-07-27 15:04:21 +00:00
include /etc/nginx/conf.d/include/cors;
2020-07-27 13:40:26 +00:00
proxy_pass http://handshake-api:3100;
}
location /skynet/skyfile {
2020-07-27 15:04:21 +00:00
include /etc/nginx/conf.d/include/cors;
2020-07-28 09:19:03 +00:00
include /etc/nginx/conf.d/include/sia-auth;
2020-07-27 15:04:21 +00:00
limit_conn uploads_by_ip 10; # ddos protection: max 10 uploads at a time
client_max_body_size 1000M; # make sure to limit the size of upload to a sane value
proxy_read_timeout 600;
proxy_request_buffering off; # stream uploaded files through the proxy as it comes in
proxy_set_header Expect $http_expect;
2020-07-27 13:40:26 +00:00
proxy_set_header User-Agent: Sia-Agent;
# Extract 3 sets of 2 characters from $request_id and assign to $dir1, $dir2, $dir3
# respectfully. The rest of the $request_id is going to be assigned to $dir4.
# We use those variables to automatically generate a unique path for the uploaded file.
# This ensures that not all uploaded files end up in the same directory, which is something
# that causes performance issues in the renter.
# Example path result: /af/24/9b/c5ec894920ccc45634dc9a8065
if ($request_id ~* "(\w{2})(\w{2})(\w{2})(\w+)") {
set $dir1 $1;
set $dir2 $2;
set $dir3 $3;
set $dir4 $4;
}
# proxy this call to siad endpoint (make sure the ip is correct)
2020-07-28 11:22:07 +00:00
proxy_pass http://siad/skynet/skyfile/$dir1/$dir2/$dir3/$dir4$is_args$args;
}
location ~ "^/([a-zA-Z0-9-_]{46}(/.*)?)$" {
2020-07-27 15:04:21 +00:00
include /etc/nginx/conf.d/include/cors;
2020-07-31 13:25:57 +00:00
include /etc/nginx/conf.d/include/proxy-buffer;
2020-09-01 13:26:48 +00:00
include /etc/nginx/conf.d/include/proxy-cache-downloads;
2020-07-27 15:04:21 +00:00
limit_conn downloads_by_ip 100; # ddos protection: max 100 downloads at a time
2020-07-30 19:15:21 +00:00
add_header Cache-Control "public, max-age=86400"; # allow consumer to cache response
# we need to explicitly use set directive here because $1 will contain the skylink with
# decoded whitespaces and set will re-encode it for us before passing it to proxy_pass
set $skylink $1;
proxy_read_timeout 600;
2020-07-27 13:40:26 +00:00
proxy_set_header User-Agent: Sia-Agent;
# proxy this call to siad /skynet/skylink/ endpoint (make sure the ip is correct)
2020-07-28 11:22:07 +00:00
proxy_pass http://siad/skynet/skylink/$skylink$is_args$args;
}
location @subdomain {
include /etc/nginx/conf.d/include/cors;
include /etc/nginx/conf.d/include/proxy-buffer;
include /etc/nginx/conf.d/include/proxy-cache-downloads;
limit_conn downloads_by_ip 100; # ddos protection: max 100 downloads at a time
add_header Cache-Control "public, max-age=86400"; # allow consumer to cache response
proxy_read_timeout 600;
proxy_set_header User-Agent: Sia-Agent;
# proxy this call to siad /skynet/skylink/ endpoint (make sure the ip is correct)
proxy_pass http://siad/skynet/skylink/$subdomain/$request_uri;
}
location ~ "^/file/([a-zA-Z0-9-_]{46}(/.*)?)$" {
2020-07-27 15:04:21 +00:00
include /etc/nginx/conf.d/include/cors;
2020-07-31 13:25:57 +00:00
include /etc/nginx/conf.d/include/proxy-buffer;
2020-09-01 13:26:48 +00:00
include /etc/nginx/conf.d/include/proxy-cache-downloads;
2020-07-27 15:04:21 +00:00
limit_conn downloads_by_ip 100; # ddos protection: max 100 downloads at a time
2020-07-30 19:15:21 +00:00
add_header Cache-Control "public, max-age=86400"; # allow consumer to cache response
# we need to explicitly use set directive here because $1 will contain the skylink with
# decoded whitespaces and set will re-encode it for us before passing it to proxy_pass
set $skylink $1;
proxy_read_timeout 600;
2020-07-27 13:40:26 +00:00
proxy_set_header User-Agent: Sia-Agent;
# proxy this call to siad /skynet/skylink/ endpoint (make sure the ip is correct)
# this alias also adds attachment=true url param to force download the file
2020-07-28 11:22:07 +00:00
proxy_pass http://siad/skynet/skylink/$skylink?attachment=true&$args;
}
}