Commit Graph

61 Commits

Author SHA1 Message Date
3kami3 79c3ace80b https://gitlab.com/gitlab-org/gitlab-ce/merge_requests/9623#note_24573655
Fixed issues pointed out.
2017-03-03 22:20:29 +09:00
3kami3 1bc5dab7b4 Add real_ip setting to nginx example.
ref)
https://docs.gitlab.com/omnibus/settings/nginx.html#configuring-gitlab-trusted_proxies-and-the-nginx-real_ip-module
2017-03-01 23:16:38 +09:00
Nick Thomas eb09395b2b Upgrade NGINX configuration files to add websocket support 2016-12-12 12:58:42 +00:00
Jacob Vosmaer 427c9f0b5b Revert "Defend against 'Host' header injection"
This reverts commit 47b5b44139.

See https://gitlab.com/gitlab-org/gitlab-ce/issues/17877#note_13488047
2016-08-08 13:02:44 +02:00
Jacob Vosmaer 47b5b44139 Defend against 'Host' header injection
Closes https://gitlab.com/gitlab-org/gitlab-ce/issues/17877 .

This change adds 'defense in depth' against 'Host' HTTP header
injection. It affects normal users in the following way. Suppose your
GitLab server has IP address 1.2.3.4 and hostname gitlab.example.com.
Currently, if you enter 1.2.3.4 in your browser, you get redirected to
1.2.3.4/users/sign_in. After this change, you get redirected from
1.2.3.4 to gitlab.example.com/users/sign_in. This is because the
address you typed in the address bar of your browser ('1.2.3.4'),
which gets stored in the 'Host' header, is now being overwritten to
'gitlab.example.com' in NGINX.

In this change we also make NGINX clear the 'X-Forwarded-Host' header
because Ruby on Rails also uses that header the same wayas the 'Host'
header.

We think that for most GitLab servers this is the right behavior, and
if not then administrators can change this behavior themselves at the
NGINX level.
2016-07-12 19:50:20 +02:00
Robert Speicher d85f65ef4e Add a branded 503 static error page
[ci skip]

Closes https://gitlab.com/gitlab-org/gitlab-ce/issues/15398
2016-04-22 16:26:42 -04:00
Artem Sidorenko fb5c2147a9 Do not serve anything via nginx as we have workhorse
Otherwise this might 'hide' problems
https://github.com/gitlabhq/gitlabhq/issues/10053#issuecomment-188919319
2016-03-11 15:04:04 +01:00
Jacob Vosmaer d597a0a21a Pass all requests from NGINX to gitlab-workhorse 2015-12-11 16:42:40 +01:00
Robert Speicher f1710073b4 Fix alignment
[ci skip]
2015-11-27 14:39:55 -05:00
Jacob Vosmaer 295d378e9a Repeat "client_max_body_size 0" everywhere
It turns out that if we do not the declaration from
"location /" wins.
2015-11-27 13:56:26 +01:00
Robert Speicher c8074b6b11 Merge branch 'client-max-body-size' into 'master'
Do not limit workhorse POST/PUT size in NGINX

Limiting, if any, should happen in gitlab-workhorse.

See merge request !1831
2015-11-19 14:41:44 +00:00
Jacob Vosmaer 372dcc217e Do not limit workhorse POST/PUT size in NGINX
Limiting, if any, should happen in gitlab-workhorse.
2015-11-19 13:51:18 +01:00
Drew Blessing cab6efa53f Deploy page should be shown for all pages not just root 2015-11-18 09:53:08 -06:00
Marin Jankovski 14032d8eb1 Add support for git lfs. 2015-11-16 12:39:13 +01:00
Kamil Trzcinski 7e4e3fb3b6 Fix nginx config to use @gitlab-workhorse 2015-11-10 12:51:51 +01:00
Kamil Trzcinski d0e3e823a2 Implement Build Artifacts
- Offloads uploading to GitLab Workhorse
- Use /authorize request for fast uploading
- Added backup recipes for artifacts
- Support download acceleration using X-Sendfile
2015-11-10 12:51:50 +01:00
Jacob Vosmaer c5132e94e1 Switch to gitlab-workhorse 2015-10-29 14:21:24 +01:00
Jacob Vosmaer 033a879cc9 Fix NGINX API download regex
Users are allowed to supply namespace%2Fproject instead of a numeric ID
2015-10-14 11:14:43 +02:00
Jacob Vosmaer cb13980db8 Let gitlab-git-http-server handle archive downloads
This change relies on changes in gitlab_git and gitlab-git-http-server.
2015-10-08 17:12:00 +02:00
Jacob Vosmaer 783791fd08 The good stuff needs NGINX 1.7.11 2015-09-07 14:59:32 +02:00
Jacob Vosmaer 8d59b1ac45 Do not let NGINX buffer Git HTTP requests
Before this change NGINX would convert a chunked HTTP POST (e.g.
git push) into a HTTP 1.0 single large POST. This creates an
unnecessary delay, and it creates unnecessary memory pressure on
gitlab-git-http-server.

For the response ('proxy_buffering') I am less sure that NGINX 's
buffering behavior is harmful, but it still makes more sense to me
not to interfere with gitlab-git-http-server (and the Golang net/http
server).
2015-09-07 13:05:29 +02:00
Jacob Vosmaer 4027a26e7b Replace grack with gitlab-git-http-server 2015-08-31 15:30:15 +02:00
Jacob Vosmaer d3305df7aa Experimental support for gitlab-git-http-server
https://gitlab.com/gitlab-org/gitlab-git-http-server

This change introduces the GITLAB_GRACK_AUTH_ONLY environment
variable. When set, Grack requests to GitLab will only respond with
the user's GL_ID (if the request is OK) or an error. This allows
gitlab-git-http-server to use the main GitLab application as an
authentication and authorization backend.

If we like how this works we should drop the GITLAB_GRACK_AUTH_ONLY
variable at some point in the future.
2015-07-28 14:33:19 +02:00
Dmitriy Zaporozhets bcb07929fe Merge branch 'nginx_defaulthost_documentation' into 'master'
Close #178 Nginx conf default_host documentation

This closes #178
We're just making it clear that some nginx installs such as by default on recent Ubuntu's, the /etc/nginx/sites-enabled/default file will conflict the listen line of the gitlab nginx conf's due to the default_server directive.

changed installation.md to identify the issue to a user
added notes to both nginx configs for gitlab and gitlab-ssl
[ci-skip

See merge request !225
2015-06-22 13:22:58 +00:00
Marin Jankovski df346e9507 Add a note that changing example configuration files requires changing omnibus-gitlab. 2015-06-11 15:11:37 +02:00
Douwe Maan d513ca584a Revert "Merge branch 'go-get-workaround-nginx' of https://github.com/mattes/gitlabhq into mattes-go-get-workaround-nginx"
This reverts commit 51349ca3c8, reversing
changes made to b180476bd6.
2015-03-03 11:21:48 +01:00
Marin Jankovski 51349ca3c8 Merge branch 'go-get-workaround-nginx' of https://github.com/mattes/gitlabhq into mattes-go-get-workaround-nginx
Conflicts:
	lib/support/nginx/gitlab
	lib/support/nginx/gitlab-ssl
2015-02-20 15:47:34 -08:00
Douwe Maan 26d57a648c Restore nginx config a little more. 2015-02-20 23:32:39 +01:00
Douwe Maan 08874d2b51 Make changes to nginx config less likely to break something. 2015-02-20 23:27:17 +01:00
Douwe Maan eb210f4a18 Modify nginx config to let /uploads go through to unicorn. 2015-02-20 12:22:53 +01:00
mattes 2c9b357324 remove optional html tags 2014-12-31 18:37:31 -08:00
mattes 56f211aa50 allow for private repositories 2014-12-31 18:37:31 -08:00
Luke Ashe-Browne e338e85d1b fixed typo 2014-12-03 13:35:27 +00:00
Luke Ashe-Browne 32c6fe5385 adding notes to gitlab nginx conf
We want to make users aware that the nginx default config will conflict
with the gitlab default_server conf file.
2014-12-03 10:43:27 +00:00
Marin Jankovski 70f30abd84 Merge pull request #8273 from bbodenmiller/nginx-updates
Nginx updates
2014-11-10 10:20:44 +01:00
Ben Bodenmiller 271a352079 minor updates & formatting changes
minor updates @ formatting changes to match other versions of file.
Unify formatting of
https://github.com/gitlabhq/gitlabhq/blob/master/lib/support/nginx/gitlab,
https://github.com/gitlabhq/gitlabhq/blob/master/lib/support/nginx/gitlab-ssl,
&
https://gitlab.com/gitlab-org/omnibus-gitlab/blob/master/files/gitlab-cookbooks/gitlab/templates/default/nginx-gitlab-http.conf.erb
2014-11-08 23:33:27 -08:00
Hugo Osvaldo Barrera e3098b69e7 Don't enable IPv4 *only* on nginx.
The current configuration sample files only enable IPv4 by default, making the
server inaccesible for many remote hosts (and an increasing amount every day).

Enable IPv4 and IPv6 by default. Older servers with no external IPv6
connectivity will not fail since they'll have a local-link IPv6 address to bind
to anyway.
2014-11-03 11:25:31 -03:00
Ben Bodenmiller 25ee53c3ae fail_timeout=0 as recommended by Unicorn
Set's fail_timeout=0 as recommended by
http://unicorn.bogomips.org/Unicorn/Configurator.html#method-i-timeout
when Unicorn is running behind nginx.
2014-09-12 02:19:38 -07:00
Ben Bodenmiller 3663354cb9 unify nginx config files 2014-08-23 01:08:12 -07:00
Sytse Sijbrandij 8aff39a6d0 Simplify the ssl setup file. 2014-08-04 15:57:59 +02:00
GitLab fdcc5ddec1 Ensure sidekiq is displayed by setting X-Frame-Options. 2014-06-03 17:06:27 +02:00
Marin Jankovski 636ec6d3a0 Update warnings about relative url support. 2014-05-13 17:59:08 +02:00
Dmitriy Zaporozhets 5307dd5f74 Comment gzip: off be default 2014-04-07 15:47:20 +00:00
Dmitriy Zaporozhets 563fec7349
Disable compression to prevent BREACH attack
Signed-off-by: Dmitriy Zaporozhets <dmitriy.zaporozhets@gmail.com>
2014-04-03 13:03:16 +03:00
Marin Jankovski 8af94ed755 Add gzip compression for assets to nginx example. 2014-03-24 14:59:09 +01:00
dosire 6bf5215b23 Some people are getting the error 'The remote end hung up unexpectedly' due to large chuncks. 2014-03-10 09:11:19 +01:00
Jacob Vosmaer 5de16dee76 Add a custom 502 page 2014-01-28 10:19:22 +01:00
Dmitriy Zaporozhets c3ae30b60e Merge branch 'upload-limits' into 'master'
Upload Limits

Better documentation for the upload limit. Please have a hard time when they need to change the upload limits, see https://gitlab.com/gitlab-org/gitlab-ce/issues/5
2014-01-27 12:44:14 +00:00
Jacob Vosmaer abae128915 Use either/or to present options 2014-01-27 11:59:15 +01:00
Jacob Vosmaer 7b32be6eb1 Explain what we know about Nginx chunked requests 2014-01-27 11:19:45 +01:00