Commit 212dbf6b authored by Alexandre Delanoë's avatar Alexandre Delanoë

[DEVOPS] nginx frames config

parent 4d7f6e96
Pipeline #1410 failed with stage
##
# You should look at the following URL's in order to grasp a solid understanding
# of Nginx configuration files in order to fully unleash the power of Nginx.
# https://www.nginx.com/resources/wiki/start/
# https://www.nginx.com/resources/wiki/start/topics/tutorials/config_pitfalls/
# https://wiki.debian.org/Nginx/DirectoryStructure
#
# In most cases, administrators will remove this file from sites-enabled/ and
# leave it as reference inside of sites-available where it will continue to be
# updated by the nginx packaging team.
#
# This file will automatically load configuration files provided by other
# applications, such as Drupal or Wordpress. These applications will be made
# available underneath a path with that package name, such as /drupal8.
#
# Please see /usr/share/doc/nginx-doc/examples/ for more detailed examples.
##
# Default server configuration
#
#upstream backend_istex{
# server 127.0.0.1:8080;
#}
#upstream backend_cillex{
# server 127.0.0.1:7080;
#}
#events {
# worker_connections 2000;
#}
server {
server_name write.frame.gargantext.org;
location / {
# include proxy_params;
proxy_pass http://localhost:3000;
# proxy_http_version 1.1;
# proxy_set_header Upgrade $http_upgrade;
# proxy_set_header Connection "upgrade";
# proxy_set_header Host $host;
# proxy_cookie_path / "/; secure; HttpOnly; SameSite=lax";
#proxy_set_header X-Real-IP $remote_addr;
# proxy_cookie_domain $host $host;
# proxy_ignore_headers Cache-Control Expires Set-Cookie;
}
listen 443 ssl; # managed by Certbot
ssl_certificate /etc/letsencrypt/live/searx.frame.gargantext.org/fullchain.pem; # managed by Certbot
ssl_certificate_key /etc/letsencrypt/live/searx.frame.gargantext.org/privkey.pem; # managed by Certbot
include /etc/letsencrypt/options-ssl-nginx.conf; # managed by Certbot
ssl_dhparam /etc/letsencrypt/ssl-dhparams.pem; # managed by Certbot
}
server {
server_name write2.frame.gargantext.org;
location / {
# include proxy_params;
proxy_pass http://localhost:3001;
# proxy_http_version 1.1;
# proxy_set_header Upgrade $http_upgrade;
# proxy_set_header Connection "upgrade";
# proxy_set_header Host $host;
# proxy_cookie_path / "/; secure; HttpOnly; SameSite=lax";
#proxy_set_header X-Real-IP $remote_addr;
# proxy_cookie_domain $host $host;
# proxy_ignore_headers Cache-Control Expires Set-Cookie;
}
listen 443 ssl; # managed by Certbot
ssl_certificate /etc/letsencrypt/live/write2.frame.gargantext.org/fullchain.pem; # managed by Certbot
ssl_certificate_key /etc/letsencrypt/live/write2.frame.gargantext.org/privkey.pem; # managed by Certbot
include /etc/letsencrypt/options-ssl-nginx.conf; # managed by Certbot
ssl_dhparam /etc/letsencrypt/ssl-dhparams.pem; # managed by Certbot
}
server {
server_name calc.frame.gargantext.org;
location / {
include proxy_params;
proxy_pass http://localhost:8000;
}
listen 443 ssl; # managed by Certbot
ssl_certificate /etc/letsencrypt/live/searx.frame.gargantext.org/fullchain.pem; # managed by Certbot
ssl_certificate_key /etc/letsencrypt/live/searx.frame.gargantext.org/privkey.pem; # managed by Certbot
include /etc/letsencrypt/options-ssl-nginx.conf; # managed by Certbot
ssl_dhparam /etc/letsencrypt/ssl-dhparams.pem; # managed by Certbot
}
#server {
# server_name hackmd.gargantext.org;
# location / {
# include proxy_params;
# proxy_pass http://localhost:8000;
# }
#
# listen 443 ssl; # managed by Certbot
# ssl_certificate /etc/letsencrypt/live/cillex.gargantext.org/fullchain.pem; # managed by Certbot
# ssl_certificate_key /etc/letsencrypt/live/cillex.gargantext.org/privkey.pem; # managed by Certbot
# include /etc/letsencrypt/options-ssl-nginx.conf; # managed by Certbot
# ssl_dhparam /etc/letsencrypt/ssl-dhparams.pem; # managed by Certbot
#
#}
server {
server_name istex.frame.gargantext.org;
location / {
include proxy_params;
proxy_pass http://localhost:8080;
}
listen 443 ssl; # managed by Certbot
ssl_certificate /etc/letsencrypt/live/searx.frame.gargantext.org/fullchain.pem; # managed by Certbot
ssl_certificate_key /etc/letsencrypt/live/searx.frame.gargantext.org/privkey.pem; # managed by Certbot
include /etc/letsencrypt/options-ssl-nginx.conf; # managed by Certbot
ssl_dhparam /etc/letsencrypt/ssl-dhparams.pem; # managed by Certbot
}
server {
server_name istex.gargantext.org;
location / {
include proxy_params;
proxy_pass http://localhost:8080;
}
listen 443 ssl; # managed by Certbot
ssl_certificate /etc/letsencrypt/live/searx.frame.gargantext.org/fullchain.pem; # managed by Certbot
ssl_certificate_key /etc/letsencrypt/live/searx.frame.gargantext.org/privkey.pem; # managed by Certbot
include /etc/letsencrypt/options-ssl-nginx.conf; # managed by Certbot
ssl_dhparam /etc/letsencrypt/ssl-dhparams.pem; # managed by Certbot
}
server {
server_name searx.frame.gargantext.org;
location / {
include proxy_params;
proxy_pass http://localhost:8181;
}
listen 443 ssl; # managed by Certbot
ssl_certificate /etc/letsencrypt/live/searx.frame.gargantext.org/fullchain.pem; # managed by Certbot
ssl_certificate_key /etc/letsencrypt/live/searx.frame.gargantext.org/privkey.pem; # managed by Certbot
include /etc/letsencrypt/options-ssl-nginx.conf; # managed by Certbot
ssl_dhparam /etc/letsencrypt/ssl-dhparams.pem; # managed by Certbot
}
# Virtual Host configuration for example.com
#
# You can move that to a different file under sites-available/ and symlink that
# to sites-enabled/ to enable it.
#
#server {
# listen 80;
# listen [::]:80;
#
# server_name example.com;
#
# root /var/www/example.com;
# index index.html;
#
# location / {
# try_files $uri $uri/ =404;
# }
#}
server {
if ($host = cillex.gargantext.org) {
return 301 https://$host$request_uri;
} # managed by Certbot
server_name cillex.gargantext.org;
return 404; # managed by Certbot
listen 443 ssl; # managed by Certbot
ssl_certificate /etc/letsencrypt/live/searx.frame.gargantext.org/fullchain.pem; # managed by Certbot
ssl_certificate_key /etc/letsencrypt/live/searx.frame.gargantext.org/privkey.pem; # managed by Certbot
include /etc/letsencrypt/options-ssl-nginx.conf; # managed by Certbot
ssl_dhparam /etc/letsencrypt/ssl-dhparams.pem; # managed by Certbot
}
server {
if ($host = searx.frame.gargantext.org) {
return 301 https://$host$request_uri;
} # managed by Certbot
server_name searx.frame.gargantext.org;
listen 80;
return 404; # managed by Certbot
}
server {
if ($host = istex.frame.gargantext.org) {
return 301 https://$host$request_uri;
} # managed by Certbot
server_name istex.frame.gargantext.org;
listen 80;
return 404; # managed by Certbot
}
server {
if ($host = calc.frame.gargantext.org) {
return 301 https://$host$request_uri;
} # managed by Certbot
server_name calc.frame.gargantext.org;
listen 80;
return 404; # managed by Certbot
}
server {
if ($host = write.frame.gargantext.org) {
return 301 https://$host$request_uri;
} # managed by Certbot
server_name write.frame.gargantext.org;
listen 80;
return 404; # managed by Certbot
}
server {
if ($host = write2.frame.gargantext.org) {
return 301 https://$host$request_uri;
} # managed by Certbot
server_name write2.frame.gargantext.org;
listen 80;
return 404; # managed by Certbot
}
server {
if ($host = istex.gargantext.org) {
return 301 https://$host$request_uri;
} # managed by Certbot
server_name istex.gargantext.org;
listen 80;
return 404; # managed by Certbot
}
server {
if ($host = cillex.gargantext.org) {
return 301 https://$host$request_uri;
} # managed by Certbot
server_name cillex.gargantext.org;
listen 80;
return 404; # managed by Certbot
}
Markdown is supported
0% or
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment