Created
December 7, 2015 23:07
-
-
Save walterheck/b9037d643e06d6940f2a to your computer and use it in GitHub Desktop.
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
[root@gitlab gitlab]# cat /var/opt/gitlab/nginx/conf/gitlab-http.conf | |
# This file is managed by gitlab-ctl. Manual changes will be | |
# erased! To change the contents below, edit /etc/gitlab/gitlab.rb | |
# and run `sudo gitlab-ctl reconfigure`. | |
## GitLab | |
## Modified from https://gitlab.com/gitlab-org/gitlab-ce/blob/master/lib/support/nginx/gitlab-ssl & https://gitlab.com/gitlab-org/gitlab-ce/blob/master/lib/support/nginx/gitlab | |
## | |
## Lines starting with two hashes (##) are comments with information. | |
## Lines starting with one hash (#) are configuration parameters that can be uncommented. | |
## | |
################################## | |
## CHUNKED TRANSFER ## | |
################################## | |
## | |
## It is a known issue that Git-over-HTTP requires chunked transfer encoding [0] | |
## which is not supported by Nginx < 1.3.9 [1]. As a result, pushing a large object | |
## with Git (i.e. a single large file) can lead to a 411 error. In theory you can get | |
## around this by tweaking this configuration file and either: | |
## - installing an old version of Nginx with the chunkin module [2] compiled in, or | |
## - using a newer version of Nginx. | |
## | |
## At the time of writing we do not know if either of these theoretical solutions works. | |
## As a workaround users can use Git over SSH to push large files. | |
## | |
## [0] https://git.kernel.org/cgit/git/git.git/tree/Documentation/technical/http-protocol.txt#n99 | |
## [1] https://github.com/agentzh/chunkin-nginx-module#status | |
## [2] https://github.com/agentzh/chunkin-nginx-module | |
## | |
################################### | |
## configuration ## | |
################################### | |
upstream gitlab { | |
server unix:/var/opt/gitlab/gitlab-rails/sockets/gitlab.socket fail_timeout=0; | |
} | |
upstream gitlab-workhorse { | |
server unix:/var/opt/gitlab/gitlab-workhorse/socket; | |
} | |
server { | |
listen *:443 ssl spdy; | |
server_name gitlab.olindata.vm; | |
server_tokens off; ## Don't show the nginx version number, a security best practice | |
root /opt/gitlab/embedded/service/gitlab-rails/public; | |
## Increase this if you want to upload large attachments | |
## Or if you want to accept large git objects over http | |
client_max_body_size 250m; | |
## Strong SSL Security | |
## https://raymii.org/s/tutorials/Strong_SSL_Security_On_nginx.html & https://cipherli.st/ | |
ssl on; | |
ssl_certificate /etc/gitlab/ssl/gitlab.olindata.vm.crt; | |
ssl_certificate_key /etc/gitlab/ssl/gitlab.olindata.vm.key; | |
# GitLab needs backwards compatible ciphers to retain compatibility with Java IDEs | |
ssl_ciphers 'ECDHE-RSA-AES256-GCM-SHA384:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA256:ECDHE-RSA-AES256-SHA:ECDHE-RSA-AES128-SHA:ECDHE-RSA-DES-CBC3-SHA:AES256-GCM-SHA384:AES128-GCM-SHA256:AES256-SHA256:AES128-SHA256:AES256-SHA:AES128-SHA:DES-CBC3-SHA:!aNULL:!eNULL:!EXPORT:!DES:!MD5:!PSK:!RC4'; | |
ssl_protocols TLSv1 TLSv1.1 TLSv1.2; | |
ssl_prefer_server_ciphers on; | |
ssl_session_cache builtin:1000 shared:SSL:10m; | |
ssl_session_timeout 5m; | |
## Individual nginx logs for this GitLab vhost | |
access_log /var/log/gitlab/nginx/gitlab_access.log gitlab_access; | |
error_log /var/log/gitlab/nginx/gitlab_error.log; | |
location / { | |
## Serve static files from defined root folder. | |
## @gitlab is a named location for the upstream fallback, see below. | |
try_files $uri /index.html $uri.html @gitlab; | |
} | |
location /uploads/ { | |
## If you use HTTPS make sure you disable gzip compression | |
## to be safe against BREACH attack. | |
gzip off; | |
## https://github.com/gitlabhq/gitlabhq/issues/694 | |
## Some requests take more than 30 seconds. | |
proxy_read_timeout 300; | |
proxy_connect_timeout 300; | |
proxy_redirect off; | |
proxy_set_header Host $http_host; | |
proxy_set_header X-Real-IP $remote_addr; | |
proxy_set_header X-Forwarded-Ssl on; | |
proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for; | |
proxy_set_header X-Forwarded-Proto https; | |
proxy_set_header X-Frame-Options SAMEORIGIN; | |
proxy_pass http://gitlab; | |
} | |
## If a file, which is not found in the root folder is requested, | |
## then the proxy passes the request to the upsteam (gitlab unicorn). | |
location @gitlab { | |
## If you use HTTPS make sure you disable gzip compression | |
## to be safe against BREACH attack. | |
gzip off; | |
## https://github.com/gitlabhq/gitlabhq/issues/694 | |
## Some requests take more than 30 seconds. | |
proxy_read_timeout 300; | |
proxy_connect_timeout 300; | |
proxy_redirect off; | |
proxy_set_header Host $http_host; | |
proxy_set_header X-Real-IP $remote_addr; | |
proxy_set_header X-Forwarded-Ssl on; | |
proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for; | |
proxy_set_header X-Forwarded-Proto https; | |
proxy_set_header X-Frame-Options SAMEORIGIN; | |
proxy_pass http://gitlab; | |
} | |
location ~ ^/[\w\.-]+/[\w\.-]+/gitlab-lfs/objects { | |
client_max_body_size 0; | |
# 'Error' 418 is a hack to re-use the @gitlab-workhorse block | |
error_page 418 = @gitlab-workhorse; | |
return 418; | |
} | |
location ~ ^/[\w\.-]+/[\w\.-]+/(info/refs|git-upload-pack|git-receive-pack)$ { | |
client_max_body_size 0; | |
# 'Error' 418 is a hack to re-use the @gitlab-workhorse block | |
error_page 418 = @gitlab-workhorse; | |
return 418; | |
} | |
location ~ ^/[\w\.-]+/[\w\.-]+/repository/archive { | |
client_max_body_size 0; | |
# 'Error' 418 is a hack to re-use the @gitlab-workhorse block | |
error_page 418 = @gitlab-workhorse; | |
return 418; | |
} | |
location ~ ^/api/v3/projects/.*/repository/archive { | |
client_max_body_size 0; | |
# 'Error' 418 is a hack to re-use the @gitlab-workhorse block | |
error_page 418 = @gitlab-workhorse; | |
return 418; | |
} | |
# Build artifacts should be submitted to this location | |
location ~ ^/[\w\.-]+/[\w\.-]+/builds/download { | |
client_max_body_size 0; | |
# 'Error' 418 is a hack to re-use the @gitlab-workhorse block | |
error_page 418 = @gitlab-workhorse; | |
return 418; | |
} | |
# Build artifacts should be submitted to this location | |
location ~ /ci/api/v1/builds/[0-9]+/artifacts { | |
client_max_body_size 0; | |
# 'Error' 418 is a hack to re-use the @gitlab-workhorse block | |
error_page 418 = @gitlab-workhorse; | |
return 418; | |
} | |
location @gitlab-workhorse { | |
client_max_body_size 0; | |
## If you use HTTPS make sure you disable gzip compression | |
## to be safe against BREACH attack. | |
gzip off; | |
## https://github.com/gitlabhq/gitlabhq/issues/694 | |
## Some requests take more than 30 seconds. | |
proxy_read_timeout 300; | |
proxy_connect_timeout 300; | |
proxy_redirect off; | |
proxy_set_header Host $http_host; | |
proxy_set_header X-Real-IP $remote_addr; | |
proxy_set_header X-Forwarded-Ssl on; | |
proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for; | |
proxy_set_header X-Forwarded-Proto https; | |
proxy_pass http://gitlab-workhorse; | |
} | |
## Enable gzip compression as per rails guide: | |
## http://guides.rubyonrails.org/asset_pipeline.html#gzip-compression | |
## WARNING: If you are using relative urls remove the block below | |
## See config/application.rb under "Relative url support" for the list of | |
## other files that need to be changed for relative url support | |
location ~ ^/(assets)/ { | |
root /opt/gitlab/embedded/service/gitlab-rails/public; | |
gzip_static on; # to serve pre-gzipped version | |
expires max; | |
add_header Cache-Control public; | |
} | |
error_page 502 /502.html; | |
} |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment