- Apr 18, 2022
-
-
Evangelos Foutras authored
This brings it in line with the non-JSON "reduced" log format.
-
- Oct 03, 2021
-
-
- Jun 16, 2021
-
-
Kristian Klausen authored
To be used as we begin migrating Flyspray tasks to GitLab. Fix #320
-
- May 03, 2021
-
-
Closes #317.
-
- Apr 08, 2021
-
-
A extra access_log entry was added with the following commands: $ cd roles $ grep -lr access_log | xargs -P 1 -n 1 sed -i '/access_log/ s/\(.*\)\( \)\(\(reduced\|main\);$\)/\1 \3\n\1.json json_\3/'
-
- Oct 22, 2020
-
-
- Sep 23, 2020
-
-
Sven-Hendrik Haase authored
-
- Sep 05, 2020
-
-
Jakub Klinkovský authored
-
Jakub Klinkovský authored
This is much cleaner because the nginx role does not have to set the fastcgi_cache variable to "false" by default, which was overridden by host_vars/apollo.archlinux.org to "wiki", but the value was still hardcoded in the config. At first, I was wondering that the cache "zone" name should be generalized to improve the configuration (from the original per-host to per-service), but that would be an overkill since the fastcgi cache is used only for the wiki...
-
- Jun 17, 2020
-
-
also use systemd instead of service module
-
- Jun 12, 2020
-
-
Frederik Schwan authored
-
- Oct 13, 2019
-
-
Sven-Hendrik Haase authored
This allows you to add snippets for toplevel nginx configuration directives that can't go into the http level. Use this for loading modules and such.
-
- Sep 05, 2019
-
-
Jan Alexander Steffens (heftig) authored
Enables TLS 1.3.
-
Jan Alexander Steffens (heftig) authored
-
Jan Alexander Steffens (heftig) authored
-
- Sep 01, 2019
-
-
Jelle van der Waa authored
These are static requests for JS/CSS assets which are the topmost request for the wiki. Caching these in nginx helps a lot to turn down the load.
-
- May 14, 2019
-
-
Florian Pritz authored
service Some machines use certbot, but don't have nginx so we shouldn't force the reload here. Signed-off-by:
Florian Pritz <bluewind@xinu.at>
-
- Mar 24, 2019
-
-
Florian Pritz authored
Signed-off-by:
Florian Pritz <bluewind@xinu.at>
-
- Feb 16, 2019
-
-
Florian Pritz authored
This is changed globally because it is probably fine for other services too. Some AUR RPC requests apparently manage to hit the 4k default limit and if they do, they get an empty response. This is an easier fix to the problam than changing the maximum request length in each AUR helper. Signed-off-by:
Florian Pritz <bluewind@xinu.at>
-
- Nov 18, 2018
-
-
Florian Pritz authored
This is mostly to resolve issues on luna where nginx is hitting the limit, but the higher limit won't hurt other machines so I'm not putting it in a variable for now. Signed-off-by:
Florian Pritz <bluewind@xinu.at>
-
- Nov 08, 2018
-
-
Florian Pritz authored
Running it too close to 00:00 UTC just leads to errors all the time. Running it at other times work fine so let's randomize things. Signed-off-by:
Florian Pritz <bluewind@xinu.at>
-
- Aug 17, 2018
-
-
Phillip Smith (fukawi2) authored
-
Phillip Smith (fukawi2) authored
-
- Aug 15, 2018
-
-
Phillip Smith (fukawi2) authored
-
- Aug 14, 2018
-
-
Phillip Smith (fukawi2) authored
-
- Jun 25, 2018
-
-
Florian Pritz authored
The discovery script now uses a regex and no longer cares where exactly accounting is enabled. Follow systemd upstream by enabling it by default. Signed-off-by:
Florian Pritz <bluewind@xinu.at>
-
- May 30, 2018
-
-
Florian Pritz authored
Signed-off-by:
Florian Pritz <bluewind@xinu.at>
-
Florian Pritz authored
For proxy/fastcgi/uwsgi blocks, logging is still set to the old format, but for everything else (= static data) a reduced format is used that excludes items that no longer make sense (request_time, remote_user) and those that are personal information all the time (remote_addr, http_x_forwarded_for). Signed-off-by:
Florian Pritz <bluewind@xinu.at>
-
- Apr 23, 2018
-
-
Jelle van der Waa authored
Chrome reports that our JavaScript is not compressed with gzip/brotli, this is due to chrome receiving javascript as application type: application/javascript.
-
- Mar 21, 2018
-
-
Florian Pritz authored
Disable firewall because python2 module is not avaible and the tasks fail which makes the playbooks fail and leads to handlers not being run. https://github.com/ansible/ansible/issues/24855 Signed-off-by:
Florian Pritz <bluewind@xinu.at>
-
- Mar 05, 2018
-
-
Phillip Smith (fukawi2) authored
-
- Feb 28, 2018
-
-
Florian Pritz authored
Signed-off-by:
Florian Pritz <bluewind@xinu.at>
-
- Feb 19, 2018
-
-
Florian Pritz authored
Signed-off-by:
Florian Pritz <bluewind@xinu.at>
-
Florian Pritz authored
This is the same as used on luna and as expected by the zabbix nginx monitoring service. Signed-off-by:
Florian Pritz <bluewind@xinu.at>
-
- Oct 20, 2017
-
-
Bartłomiej Piotrowski authored
-
- Jul 05, 2017
-
-
Bartłomiej Piotrowski authored
-
- Feb 10, 2017
-
-
Giancarlo Razzolini authored
To correctly be safe for CVE-2016-1247, we need all nginx log dirs to be owned by both user and group root. Also, since nginx childs runs as http user, the directories permissions must be 0755, so the http user can descent into it. Since the logrotate will create the log files as http:log, the nginx childs will be able to write to the logs, but will not be able to create files inside those dirs, fully preventing CVE-2016-1247.
-
- Feb 05, 2017
-
-
Florian Pritz authored
CVE-2016-1247 is a symlink attack on the log dir of nginx since a reopening of the logs (triggered by logrotate) opens the logs as nginx instead of root. logrotate creates the proper log files already so nginx doesn't need write permissions to those directories. Signed-off-by:
Florian Pritz <bluewind@xinu.at>
-
Florian Pritz authored
Signed-off-by:
Florian Pritz <bluewind@xinu.at>
-
- Jan 29, 2017
-
-
Giancarlo Razzolini authored
One of the things missing from the preload submission was that we included the STS header on http connections also. Using this: https://trac.nginx.org/nginx/ticket/289#comment:3 we are able to only include the STS header on https connections.
-