Merge pull request #308 from NebulousLabs/caddy-purge
This commit is contained in:
commit
77303a9f14
|
@ -17,8 +17,8 @@ services:
|
||||||
|
|
||||||
caddy:
|
caddy:
|
||||||
build:
|
build:
|
||||||
context: .
|
context: ./docker/caddy
|
||||||
dockerfile: ./docker/caddy/Dockerfile
|
dockerfile: Dockerfile
|
||||||
container_name: caddy
|
container_name: caddy
|
||||||
restart: on-failure
|
restart: on-failure
|
||||||
env_file:
|
env_file:
|
||||||
|
@ -37,10 +37,15 @@ services:
|
||||||
- nginx
|
- nginx
|
||||||
|
|
||||||
nginx:
|
nginx:
|
||||||
image: openresty/openresty:1.15.8.3-2-xenial
|
build:
|
||||||
|
context: .
|
||||||
|
dockerfile: ./docker/nginx/Dockerfile
|
||||||
container_name: nginx
|
container_name: nginx
|
||||||
restart: on-failure
|
restart: on-failure
|
||||||
|
env_file:
|
||||||
|
- .env
|
||||||
volumes:
|
volumes:
|
||||||
|
- ./docker/nginx/nginx.conf:/usr/local/openresty/nginx/conf/nginx.conf:ro
|
||||||
- ./docker/nginx/conf.d:/etc/nginx/conf.d:ro
|
- ./docker/nginx/conf.d:/etc/nginx/conf.d:ro
|
||||||
- ./docker/data/nginx/cache:/data/nginx/cache
|
- ./docker/data/nginx/cache:/data/nginx/cache
|
||||||
- ./docker/data/nginx/logs:/usr/local/openresty/nginx/logs
|
- ./docker/data/nginx/logs:/usr/local/openresty/nginx/logs
|
||||||
|
@ -57,6 +62,7 @@ services:
|
||||||
dockerfile: Dockerfile
|
dockerfile: Dockerfile
|
||||||
container_name: handshake
|
container_name: handshake
|
||||||
restart: on-failure
|
restart: on-failure
|
||||||
|
command: hnd --log-console=false
|
||||||
environment:
|
environment:
|
||||||
- HSD_HTTP_HOST=0.0.0.0
|
- HSD_HTTP_HOST=0.0.0.0
|
||||||
- HSD_NETWORK=main
|
- HSD_NETWORK=main
|
||||||
|
@ -90,7 +96,7 @@ services:
|
||||||
- 3100
|
- 3100
|
||||||
depends_on:
|
depends_on:
|
||||||
- handshake
|
- handshake
|
||||||
- caddy
|
- nginx
|
||||||
|
|
||||||
health-check:
|
health-check:
|
||||||
build:
|
build:
|
||||||
|
@ -104,11 +110,9 @@ services:
|
||||||
networks:
|
networks:
|
||||||
- shared
|
- shared
|
||||||
environment:
|
environment:
|
||||||
- PORTAL_URL=caddy
|
- PORTAL_URL=nginx
|
||||||
- HOSTNAME=health-check
|
|
||||||
- NODE_TLS_REJECT_UNAUTHORIZED=0
|
|
||||||
expose:
|
expose:
|
||||||
- 3100
|
- 3100
|
||||||
depends_on:
|
depends_on:
|
||||||
- docker-host
|
- docker-host
|
||||||
- caddy
|
- nginx
|
||||||
|
|
|
@ -1,91 +1,16 @@
|
||||||
(webserver) {
|
|
||||||
root * /home/user/public_html
|
|
||||||
file_server
|
|
||||||
encode zstd gzip
|
|
||||||
|
|
||||||
@skylink {
|
|
||||||
path_regexp skylink ^/([a-zA-Z0-9-_]{46}(/.*)?)$
|
|
||||||
}
|
|
||||||
|
|
||||||
@skylink_file {
|
|
||||||
path_regexp skylink_file ^/file/([a-zA-Z0-9-_]{46}(/.*)?)$
|
|
||||||
}
|
|
||||||
|
|
||||||
@options {
|
|
||||||
method OPTIONS
|
|
||||||
}
|
|
||||||
|
|
||||||
@blacklist {
|
|
||||||
method GET
|
|
||||||
path /blacklist
|
|
||||||
}
|
|
||||||
|
|
||||||
@portals {
|
|
||||||
method GET
|
|
||||||
path /portals
|
|
||||||
}
|
|
||||||
|
|
||||||
# OPTIONS headers to allow CORS https://enable-cors.org
|
|
||||||
handle @options {
|
|
||||||
header {
|
|
||||||
Access-Control-Allow-Origin *
|
|
||||||
Access-Control-Allow-Methods GET,POST,OPTIONS
|
|
||||||
Access-Control-Allow-Headers DNT,User-Agent,X-Requested-With,If-Modified-Since,Cache-Control,Content-Type,Range
|
|
||||||
Access-Control-Max-Age 1728000
|
|
||||||
}
|
|
||||||
respond 204
|
|
||||||
}
|
|
||||||
|
|
||||||
reverse_proxy /health-check health-check:3100
|
|
||||||
reverse_proxy /hns/* handshake-api:3100
|
|
||||||
reverse_proxy /hnsres/* handshake-api:3100
|
|
||||||
|
|
||||||
reverse_proxy @blacklist nginx:80 {
|
|
||||||
header_up User-Agent Sia-Agent
|
|
||||||
header_down Access-Control-Allow-Origin *
|
|
||||||
}
|
|
||||||
reverse_proxy @portals nginx:80 {
|
|
||||||
header_up User-Agent Sia-Agent
|
|
||||||
header_down Access-Control-Allow-Origin *
|
|
||||||
}
|
|
||||||
reverse_proxy /stats nginx:80 {
|
|
||||||
header_up User-Agent Sia-Agent
|
|
||||||
header_down Access-Control-Allow-Origin *
|
|
||||||
}
|
|
||||||
reverse_proxy /statsdown nginx:80 {
|
|
||||||
header_up User-Agent Sia-Agent
|
|
||||||
header_down Access-Control-Allow-Origin *
|
|
||||||
}
|
|
||||||
reverse_proxy @skylink nginx:80 {
|
|
||||||
header_up User-Agent Sia-Agent
|
|
||||||
header_down Access-Control-Expose-Headers skynet-file-metadata
|
|
||||||
header_down Access-Control-Allow-Origin *
|
|
||||||
}
|
|
||||||
reverse_proxy @skylink_file nginx:80 {
|
|
||||||
header_up User-Agent Sia-Agent
|
|
||||||
header_down Access-Control-Expose-Headers skynet-file-metadata
|
|
||||||
header_down Access-Control-Allow-Origin *
|
|
||||||
}
|
|
||||||
reverse_proxy /skynet/skyfile* nginx:80 {
|
|
||||||
header_up User-Agent Sia-Agent
|
|
||||||
header_up Authorization "Basic {env.SIA_API_AUTHORIZATION}"
|
|
||||||
header_down Access-Control-Allow-Origin *
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
(custom.domain) {
|
(custom.domain) {
|
||||||
{$DOMAIN_NAME} {
|
{$DOMAIN_NAME} {
|
||||||
tls {$EMAIL_ADDRESS}
|
tls {$EMAIL_ADDRESS}
|
||||||
import webserver
|
reverse_proxy nginx:80
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
(siasky.net) {
|
(siasky.net) {
|
||||||
siasky.net, *.siasky.net {
|
siasky.net, *.siasky.net {
|
||||||
tls {
|
tls {
|
||||||
dns cloudflare {env.CLOUDFLARE_AUTH_TOKEN}
|
dns route53
|
||||||
}
|
}
|
||||||
import webserver
|
reverse_proxy nginx:80
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@ -94,7 +19,7 @@
|
||||||
tls internal {
|
tls internal {
|
||||||
on_demand
|
on_demand
|
||||||
}
|
}
|
||||||
import webserver
|
reverse_proxy nginx:80
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|
|
@ -1,20 +1,7 @@
|
||||||
FROM node:12.18.0 AS client-builder
|
|
||||||
|
|
||||||
COPY src ./src
|
|
||||||
COPY static ./static
|
|
||||||
COPY gatsby-config.js .
|
|
||||||
COPY package.json .
|
|
||||||
COPY yarn.lock .
|
|
||||||
|
|
||||||
ENV CYPRESS_INSTALL_BINARY 0
|
|
||||||
RUN yarn --frozen-lockfile
|
|
||||||
RUN yarn build
|
|
||||||
|
|
||||||
FROM caddy:2.1.1-builder AS caddy-builder
|
FROM caddy:2.1.1-builder AS caddy-builder
|
||||||
|
|
||||||
RUN caddy-builder github.com/caddy-dns/cloudflare
|
RUN caddy-builder github.com/caddy-dns/cloudflare github.com/caddy-dns/route53
|
||||||
|
|
||||||
FROM caddy:2.1.1
|
FROM caddy:2.1.1
|
||||||
|
|
||||||
COPY --from=client-builder /public /home/user/public_html
|
|
||||||
COPY --from=caddy-builder /usr/bin/caddy /usr/bin/caddy
|
COPY --from=caddy-builder /usr/bin/caddy /usr/bin/caddy
|
||||||
|
|
|
@ -0,0 +1,15 @@
|
||||||
|
FROM node:14.5 AS webportal-builder
|
||||||
|
|
||||||
|
COPY src ./src
|
||||||
|
COPY static ./static
|
||||||
|
COPY gatsby-config.js .
|
||||||
|
COPY package.json .
|
||||||
|
COPY yarn.lock .
|
||||||
|
|
||||||
|
ENV CYPRESS_INSTALL_BINARY 0
|
||||||
|
RUN yarn --frozen-lockfile
|
||||||
|
RUN yarn build
|
||||||
|
|
||||||
|
FROM openresty/openresty:1.15.8.3-2-xenial
|
||||||
|
|
||||||
|
COPY --from=webportal-builder /public /var/www/webportal
|
|
@ -21,7 +21,7 @@ real_ip_header X-Forwarded-For;
|
||||||
# The upload siad can be run in normal mode. Set the port to '9980' if
|
# The upload siad can be run in normal mode. Set the port to '9980' if
|
||||||
# you do not want to run your portal in the double siad setup.
|
# you do not want to run your portal in the double siad setup.
|
||||||
upstream siad-upload {
|
upstream siad-upload {
|
||||||
server docker-host:9970;
|
server docker-host:9980;
|
||||||
}
|
}
|
||||||
|
|
||||||
upstream siad-download {
|
upstream siad-download {
|
||||||
|
@ -41,39 +41,103 @@ server {
|
||||||
client_body_buffer_size 128k;
|
client_body_buffer_size 128k;
|
||||||
client_max_body_size 128k;
|
client_max_body_size 128k;
|
||||||
|
|
||||||
rewrite "^(/([a-zA-Z0-9-_]{46})[^/]{0})$" $1/ permanent;
|
location / {
|
||||||
rewrite "^(/hns/[^/]+)[^/]{0}$" $1/ permanent;
|
include /etc/nginx/conf.d/include/cors;
|
||||||
|
|
||||||
|
root /var/www/webportal;
|
||||||
|
}
|
||||||
|
|
||||||
location /blacklist {
|
location /blacklist {
|
||||||
|
include /etc/nginx/conf.d/include/cors;
|
||||||
|
|
||||||
proxy_cache skynet;
|
proxy_cache skynet;
|
||||||
proxy_cache_valid any 1m; # cache blacklist for 1 minute
|
proxy_cache_valid any 1m; # cache blacklist for 1 minute
|
||||||
|
proxy_set_header User-Agent: Sia-Agent;
|
||||||
|
proxy_pass http://siad-download/skynet/blacklist;
|
||||||
|
}
|
||||||
|
|
||||||
|
location /skynet/blacklist {
|
||||||
|
include /etc/nginx/conf.d/include/cors;
|
||||||
|
|
||||||
|
proxy_cache skynet;
|
||||||
|
proxy_cache_valid any 1m; # cache blacklist for 1 minute
|
||||||
|
proxy_set_header User-Agent: Sia-Agent;
|
||||||
proxy_pass http://siad-download/skynet/blacklist;
|
proxy_pass http://siad-download/skynet/blacklist;
|
||||||
}
|
}
|
||||||
|
|
||||||
location /portals {
|
location /portals {
|
||||||
|
include /etc/nginx/conf.d/include/cors;
|
||||||
|
|
||||||
proxy_cache skynet;
|
proxy_cache skynet;
|
||||||
proxy_cache_valid any 1m; # cache portals for 1 minute
|
proxy_cache_valid any 1m; # cache portals for 1 minute
|
||||||
|
proxy_set_header User-Agent: Sia-Agent;
|
||||||
|
proxy_pass http://siad-download/skynet/portals;
|
||||||
|
}
|
||||||
|
|
||||||
|
location /skynet/portals {
|
||||||
|
include /etc/nginx/conf.d/include/cors;
|
||||||
|
|
||||||
|
proxy_cache skynet;
|
||||||
|
proxy_cache_valid any 1m; # cache portals for 1 minute
|
||||||
|
proxy_set_header User-Agent: Sia-Agent;
|
||||||
proxy_pass http://siad-download/skynet/portals;
|
proxy_pass http://siad-download/skynet/portals;
|
||||||
}
|
}
|
||||||
|
|
||||||
location /stats {
|
location /stats {
|
||||||
|
include /etc/nginx/conf.d/include/cors;
|
||||||
|
|
||||||
proxy_cache skynet;
|
proxy_cache skynet;
|
||||||
proxy_cache_valid any 1m; # cache stats for 1 minute
|
proxy_cache_valid any 1m; # cache stats for 1 minute
|
||||||
|
proxy_set_header User-Agent: Sia-Agent;
|
||||||
|
proxy_pass http://siad-upload/skynet/stats;
|
||||||
|
}
|
||||||
|
|
||||||
|
location /skynet/stats {
|
||||||
|
include /etc/nginx/conf.d/include/cors;
|
||||||
|
|
||||||
|
proxy_cache skynet;
|
||||||
|
proxy_cache_valid any 1m; # cache stats for 1 minute
|
||||||
|
proxy_set_header User-Agent: Sia-Agent;
|
||||||
proxy_pass http://siad-upload/skynet/stats;
|
proxy_pass http://siad-upload/skynet/stats;
|
||||||
}
|
}
|
||||||
|
|
||||||
location /statsdown {
|
location /statsdown {
|
||||||
|
include /etc/nginx/conf.d/include/cors;
|
||||||
|
|
||||||
proxy_cache skynet;
|
proxy_cache skynet;
|
||||||
proxy_cache_valid any 1m; # cache stats for 1 minute
|
proxy_cache_valid any 1m; # cache stats for 1 minute
|
||||||
|
proxy_set_header User-Agent: Sia-Agent;
|
||||||
proxy_pass http://siad-download/skynet/stats;
|
proxy_pass http://siad-download/skynet/stats;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
location /health-check {
|
||||||
|
include /etc/nginx/conf.d/include/cors;
|
||||||
|
|
||||||
|
proxy_pass http://health-check:3100;
|
||||||
|
}
|
||||||
|
|
||||||
|
location /hns {
|
||||||
|
include /etc/nginx/conf.d/include/cors;
|
||||||
|
|
||||||
|
proxy_pass http://handshake-api:3100;
|
||||||
|
}
|
||||||
|
|
||||||
|
location /hnsres {
|
||||||
|
include /etc/nginx/conf.d/include/cors;
|
||||||
|
|
||||||
|
proxy_pass http://handshake-api:3100;
|
||||||
|
}
|
||||||
|
|
||||||
location /skynet/skyfile {
|
location /skynet/skyfile {
|
||||||
|
include /etc/nginx/conf.d/include/cors;
|
||||||
|
include /etc/nginx/conf.d/include/sia-auth;
|
||||||
|
|
||||||
limit_conn uploads_by_ip 10; # ddos protection: max 10 uploads at a time
|
limit_conn uploads_by_ip 10; # ddos protection: max 10 uploads at a time
|
||||||
client_max_body_size 1000M; # make sure to limit the size of upload to a sane value
|
client_max_body_size 1000M; # make sure to limit the size of upload to a sane value
|
||||||
proxy_read_timeout 600;
|
proxy_read_timeout 600;
|
||||||
proxy_request_buffering off; # stream uploaded files through the proxy as it comes in
|
proxy_request_buffering off; # stream uploaded files through the proxy as it comes in
|
||||||
proxy_set_header Expect $http_expect;
|
proxy_set_header Expect $http_expect;
|
||||||
|
proxy_set_header User-Agent: Sia-Agent;
|
||||||
|
|
||||||
# Extract 3 sets of 2 characters from $request_id and assign to $dir1, $dir2, $dir3
|
# Extract 3 sets of 2 characters from $request_id and assign to $dir1, $dir2, $dir3
|
||||||
# respectfully. The rest of the $request_id is going to be assigned to $dir4.
|
# respectfully. The rest of the $request_id is going to be assigned to $dir4.
|
||||||
|
@ -93,11 +157,15 @@ server {
|
||||||
}
|
}
|
||||||
|
|
||||||
location ~ "/skynet/skyfile/(.+)" {
|
location ~ "/skynet/skyfile/(.+)" {
|
||||||
|
include /etc/nginx/conf.d/include/cors;
|
||||||
|
include /etc/nginx/conf.d/include/sia-auth;
|
||||||
|
|
||||||
limit_conn uploads_by_ip 10; # ddos protection: max 10 uploads at a time
|
limit_conn uploads_by_ip 10; # ddos protection: max 10 uploads at a time
|
||||||
client_max_body_size 1000M; # make sure to limit the size of upload to a sane value
|
client_max_body_size 1000M; # make sure to limit the size of upload to a sane value
|
||||||
proxy_read_timeout 600;
|
proxy_read_timeout 600;
|
||||||
proxy_request_buffering off; # stream uploaded files through the proxy as it comes in
|
proxy_request_buffering off; # stream uploaded files through the proxy as it comes in
|
||||||
proxy_set_header Expect $http_expect;
|
proxy_set_header Expect $http_expect;
|
||||||
|
proxy_set_header User-Agent: Sia-Agent;
|
||||||
|
|
||||||
# we need to explicitly use set directive here because $1 will contain the siapath with
|
# we need to explicitly use set directive here because $1 will contain the siapath with
|
||||||
# decoded whitespaces and set will re-encode it for us before passing it to proxy_pass
|
# decoded whitespaces and set will re-encode it for us before passing it to proxy_pass
|
||||||
|
@ -108,6 +176,8 @@ server {
|
||||||
}
|
}
|
||||||
|
|
||||||
location ~ "^/([a-zA-Z0-9-_]{46}(/.*)?)$" {
|
location ~ "^/([a-zA-Z0-9-_]{46}(/.*)?)$" {
|
||||||
|
include /etc/nginx/conf.d/include/cors;
|
||||||
|
|
||||||
limit_conn downloads_by_ip 100; # ddos protection: max 100 downloads at a time
|
limit_conn downloads_by_ip 100; # ddos protection: max 100 downloads at a time
|
||||||
|
|
||||||
# we need to explicitly use set directive here because $1 will contain the skylink with
|
# we need to explicitly use set directive here because $1 will contain the skylink with
|
||||||
|
@ -115,6 +185,7 @@ server {
|
||||||
set $skylink $1;
|
set $skylink $1;
|
||||||
|
|
||||||
proxy_read_timeout 600;
|
proxy_read_timeout 600;
|
||||||
|
proxy_set_header User-Agent: Sia-Agent;
|
||||||
# proxy this call to siad /skynet/skylink/ endpoint (make sure the ip is correct)
|
# proxy this call to siad /skynet/skylink/ endpoint (make sure the ip is correct)
|
||||||
proxy_pass http://siad-download/skynet/skylink/$skylink$is_args$args;
|
proxy_pass http://siad-download/skynet/skylink/$skylink$is_args$args;
|
||||||
|
|
||||||
|
@ -130,6 +201,8 @@ server {
|
||||||
}
|
}
|
||||||
|
|
||||||
location ~ "^/file/([a-zA-Z0-9-_]{46}(/.*)?)$" {
|
location ~ "^/file/([a-zA-Z0-9-_]{46}(/.*)?)$" {
|
||||||
|
include /etc/nginx/conf.d/include/cors;
|
||||||
|
|
||||||
limit_conn downloads_by_ip 100; # ddos protection: max 100 downloads at a time
|
limit_conn downloads_by_ip 100; # ddos protection: max 100 downloads at a time
|
||||||
|
|
||||||
# we need to explicitly use set directive here because $1 will contain the skylink with
|
# we need to explicitly use set directive here because $1 will contain the skylink with
|
||||||
|
@ -137,6 +210,7 @@ server {
|
||||||
set $skylink $1;
|
set $skylink $1;
|
||||||
|
|
||||||
proxy_read_timeout 600;
|
proxy_read_timeout 600;
|
||||||
|
proxy_set_header User-Agent: Sia-Agent;
|
||||||
# proxy this call to siad /skynet/skylink/ endpoint (make sure the ip is correct)
|
# proxy this call to siad /skynet/skylink/ endpoint (make sure the ip is correct)
|
||||||
# this alias also adds attachment=true url param to force download the file
|
# this alias also adds attachment=true url param to force download the file
|
||||||
proxy_pass http://siad-download/skynet/skylink/$skylink?attachment=true&$args;
|
proxy_pass http://siad-download/skynet/skylink/$skylink?attachment=true&$args;
|
||||||
|
|
|
@ -0,0 +1,4 @@
|
||||||
|
more_set_headers 'Access-Control-Allow-Origin: *';
|
||||||
|
more_set_headers 'Access-Control-Allow-Methods: GET, POST, OPTIONS, PUT, DELETE';
|
||||||
|
more_set_headers 'Access-Control-Allow-Headers: DNT,User-Agent,X-Requested-With,If-Modified-Since,Cache-Control,Content-Type,Range';
|
||||||
|
more_set_headers 'Access-Control-Expose-Headers: Content-Length,Content-Range';
|
|
@ -0,0 +1,18 @@
|
||||||
|
# enables gzip compression
|
||||||
|
gzip on;
|
||||||
|
|
||||||
|
# set the gzip compression level (1-9)
|
||||||
|
gzip_comp_level 6;
|
||||||
|
|
||||||
|
# tells proxies to cache both gzipped and regular versions of a resource
|
||||||
|
gzip_vary on;
|
||||||
|
|
||||||
|
# informs NGINX to not compress anything smaller than the defined size
|
||||||
|
gzip_min_length 256;
|
||||||
|
|
||||||
|
# compress data even for clients that are connecting via proxies if a response header includes
|
||||||
|
# the "expired", "no-cache", "no-store", "private", and "Authorization" parameters
|
||||||
|
gzip_proxied expired no-cache no-store private auth;
|
||||||
|
|
||||||
|
# enables the types of files that can be compressed
|
||||||
|
gzip_types text/plain text/css application/json application/x-javascript text/xml application/xml application/xml+rss text/javascript application/vnd.ms-fontobject application/x-font-ttf font/opentype image/svg+xml image/x-icon;
|
|
@ -0,0 +1,9 @@
|
||||||
|
if ($request_method = 'OPTIONS') {
|
||||||
|
add_header 'Access-Control-Allow-Origin' '*';
|
||||||
|
add_header 'Access-Control-Allow-Methods' 'GET, POST, OPTIONS';
|
||||||
|
add_header 'Access-Control-Allow-Headers' 'DNT,User-Agent,X-Requested-With,If-Modified-Since,Cache-Control,Content-Type,Range';
|
||||||
|
add_header 'Access-Control-Max-Age' 1728000; # valid for 20 days
|
||||||
|
add_header 'Content-Type' 'text/plain; charset=utf-8';
|
||||||
|
add_header 'Content-Length' 0;
|
||||||
|
return 204;
|
||||||
|
}
|
|
@ -0,0 +1,10 @@
|
||||||
|
rewrite_by_lua_block {
|
||||||
|
-- local b64 = require("ngx.base64")
|
||||||
|
-- pull apipassword from SIA_API_AUTHORIZATION environment variable
|
||||||
|
-- local apipassword = os.getenv("SIA_API_AUTHORIZATION")
|
||||||
|
-- encode the user:password authorization string
|
||||||
|
-- (in our case user is empty so it is just :password)
|
||||||
|
-- local content = b64.encode_base64url(":" .. apipassword)
|
||||||
|
-- set authorization header with proper base64 encoded string
|
||||||
|
ngx.req.set_header("Authorization", "Basic " .. os.getenv("SIA_API_AUTHORIZATION"))
|
||||||
|
}
|
|
@ -0,0 +1,64 @@
|
||||||
|
# nginx.conf -- docker-openresty
|
||||||
|
#
|
||||||
|
# This file is installed to:
|
||||||
|
# `/usr/local/openresty/nginx/conf/nginx.conf`
|
||||||
|
# and is the file loaded by nginx at startup,
|
||||||
|
# unless the user specifies otherwise.
|
||||||
|
#
|
||||||
|
# It tracks the upstream OpenResty's `nginx.conf`, but removes the `server`
|
||||||
|
# section and adds this directive:
|
||||||
|
# `include /etc/nginx/conf.d/*.conf;`
|
||||||
|
#
|
||||||
|
# The `docker-openresty` file `nginx.vh.default.conf` is copied to
|
||||||
|
# `/etc/nginx/conf.d/default.conf`. It contains the `server section
|
||||||
|
# of the upstream `nginx.conf`.
|
||||||
|
#
|
||||||
|
# See https://github.com/openresty/docker-openresty/blob/master/README.md#nginx-config-files
|
||||||
|
#
|
||||||
|
|
||||||
|
# expose environment variables
|
||||||
|
env SIA_API_AUTHORIZATION;
|
||||||
|
|
||||||
|
#user nobody;
|
||||||
|
worker_processes 1;
|
||||||
|
|
||||||
|
#error_log logs/error.log;
|
||||||
|
#error_log logs/error.log notice;
|
||||||
|
#error_log logs/error.log info;
|
||||||
|
|
||||||
|
#pid logs/nginx.pid;
|
||||||
|
|
||||||
|
|
||||||
|
events {
|
||||||
|
worker_connections 1024;
|
||||||
|
}
|
||||||
|
|
||||||
|
|
||||||
|
http {
|
||||||
|
include mime.types;
|
||||||
|
default_type application/octet-stream;
|
||||||
|
|
||||||
|
#log_format main '$remote_addr - $remote_user [$time_local] "$request" '
|
||||||
|
# '$status $body_bytes_sent "$http_referer" '
|
||||||
|
# '"$http_user_agent" "$http_x_forwarded_for"';
|
||||||
|
|
||||||
|
#access_log logs/access.log main;
|
||||||
|
|
||||||
|
# See Move default writable paths to a dedicated directory (#119)
|
||||||
|
# https://github.com/openresty/docker-openresty/issues/119
|
||||||
|
client_body_temp_path /var/run/openresty/nginx-client-body;
|
||||||
|
proxy_temp_path /var/run/openresty/nginx-proxy;
|
||||||
|
fastcgi_temp_path /var/run/openresty/nginx-fastcgi;
|
||||||
|
uwsgi_temp_path /var/run/openresty/nginx-uwsgi;
|
||||||
|
scgi_temp_path /var/run/openresty/nginx-scgi;
|
||||||
|
|
||||||
|
sendfile on;
|
||||||
|
#tcp_nopush on;
|
||||||
|
|
||||||
|
#keepalive_timeout 0;
|
||||||
|
keepalive_timeout 65;
|
||||||
|
|
||||||
|
#gzip on;
|
||||||
|
|
||||||
|
include /etc/nginx/conf.d/*.conf;
|
||||||
|
}
|
|
@ -5,7 +5,7 @@ async function uploadCheck(done) {
|
||||||
const time = process.hrtime();
|
const time = process.hrtime();
|
||||||
|
|
||||||
superagent
|
superagent
|
||||||
.post(`https://${process.env.PORTAL_URL}/skynet/skyfile`)
|
.post(`http://${process.env.PORTAL_URL}/skynet/skyfile`)
|
||||||
.attach("file", "package.json", "package.json")
|
.attach("file", "package.json", "package.json")
|
||||||
.end((err, res) => {
|
.end((err, res) => {
|
||||||
const statusCode = (res && res.statusCode) || (err && err.statusCode) || null;
|
const statusCode = (res && res.statusCode) || (err && err.statusCode) || null;
|
||||||
|
@ -22,7 +22,7 @@ async function uploadCheck(done) {
|
||||||
function downloadCheck(done) {
|
function downloadCheck(done) {
|
||||||
const time = process.hrtime();
|
const time = process.hrtime();
|
||||||
|
|
||||||
superagent.get(`https://${process.env.PORTAL_URL}`).end((err, res) => {
|
superagent.get(`http://${process.env.PORTAL_URL}`).end((err, res) => {
|
||||||
const statusCode = (res && res.statusCode) || (err && err.statusCode) || null;
|
const statusCode = (res && res.statusCode) || (err && err.statusCode) || null;
|
||||||
|
|
||||||
done({
|
done({
|
||||||
|
|
|
@ -9,7 +9,7 @@ const bodyparser = require("body-parser");
|
||||||
|
|
||||||
require("./schedule");
|
require("./schedule");
|
||||||
|
|
||||||
const host = process.env.HOSTNAME || "localhost";
|
const host = process.env.HOSTNAME || "0.0.0.0";
|
||||||
const port = process.env.PORT || 3100;
|
const port = process.env.PORT || 3100;
|
||||||
|
|
||||||
const server = express();
|
const server = express();
|
||||||
|
|
|
@ -24,7 +24,7 @@ docker-compose --version # sanity check
|
||||||
# CLOUDFLARE_AUTH_TOKEN - cloudflare auth token for ssl generation (just for siasky.net)
|
# CLOUDFLARE_AUTH_TOKEN - cloudflare auth token for ssl generation (just for siasky.net)
|
||||||
if ! [ -f /home/user/skynet-webportal/.env ]; then
|
if ! [ -f /home/user/skynet-webportal/.env ]; then
|
||||||
HSD_API_KEY=$(openssl rand -base64 32) # generate safe random key for handshake
|
HSD_API_KEY=$(openssl rand -base64 32) # generate safe random key for handshake
|
||||||
printf "DOMAIN_NAME=example.com\nEMAIL_ADDRESS=email@example.com\nSIA_API_AUTHORIZATION=\nCLOUDFLARE_AUTH_TOKEN=\nHSD_API_KEY=${HSD_API_KEY}\n" > /home/user/skynet-webportal/.env
|
printf "DOMAIN_NAME=example.com\nEMAIL_ADDRESS=email@example.com\nSIA_API_AUTHORIZATION=\nCLOUDFLARE_AUTH_TOKEN=\nHSD_API_KEY=${HSD_API_KEY}\nAWS_ACCESS_KEY_ID=\nAWS_SECRET_ACCESS_KEY=\n" > /home/user/skynet-webportal/.env
|
||||||
fi
|
fi
|
||||||
|
|
||||||
# Start docker container with nginx and client
|
# Start docker container with nginx and client
|
||||||
|
|
Reference in New Issue