Compare commits

..

3 Commits

Author SHA1 Message Date
a2e550e546 CORS 2025-03-31 07:43:18 -07:00
a7d76c071c Cert 2025-03-20 14:57:04 -07:00
0209a4fa98 After request
Backlog
mestsa003.infineon.com
proxy_set_header X-Forwarded-Proto https;
ssl
2023-09-18 16:05:41 -07:00
17 changed files with 295 additions and 116 deletions

5
.gitignore vendored
View File

@ -1 +1,4 @@
nginx-1.20.1 conf/includes/localhost.crt
conf/includes/localhost.key
conf/includes/localhost.x.crt
conf/includes/localhost.x.key

View File

@ -1,11 +1,11 @@
location / location / {
{
proxy_pass http://localhost:5555;
proxy_http_version 1.1; proxy_http_version 1.1;
proxy_set_header Upgrade $http_upgrade;
proxy_set_header Connection keep-alive;
proxy_set_header Host $http_host;
proxy_cache_bypass $http_upgrade; proxy_cache_bypass $http_upgrade;
proxy_pass http://localhost:5555;
proxy_set_header Host $http_host;
proxy_set_header Connection keep-alive;
proxy_set_header Upgrade $http_upgrade;
proxy_set_header X-Forwarded-Proto https;
} }
# sc create "Baget-5555" start= delayed-auto DisplayName="Baget-5555" binPath= "C:\Users\phares\AppData\Local\IFXApps\BaGet\src\BaGet\bin\Release\net6.0\win-x64\publish\BaGet.exe" obj= "infineon\phares" password= "" # sc create "Baget-5555" start= delayed-auto DisplayName="Baget-5555" binPath= "C:\Users\phares\AppData\Local\IFXApps\BaGet\src\BaGet\bin\Release\net6.0\win-x64\publish\BaGet.exe" obj= "infineon\phares" password= ""

View File

@ -0,0 +1,31 @@
location / {
root "D://Web-sites//Backlog";
index index.html index.htm;
if ($request_method = 'OPTIONS') {
add_header 'Access-Control-Allow-Origin' '*';
add_header 'Access-Control-Allow-Methods' 'GET, POST, OPTIONS';
#
# Custom headers and headers various browsers *should* be OK with but aren't
#
add_header 'Access-Control-Allow-Headers' 'DNT,User-Agent,X-Requested-With,If-Modified-Since,Cache-Control,Content-Type,Range';
#
# Tell client that this pre-flight info is valid for 20 days
#
add_header 'Access-Control-Max-Age' 1728000;
add_header 'Content-Type' 'text/plain; charset=utf-8';
add_header 'Content-Length' 0;
return 204;
}
if ($request_method = 'POST') {
add_header 'Access-Control-Allow-Origin' '*' always;
add_header 'Access-Control-Allow-Methods' 'GET, POST, OPTIONS' always;
add_header 'Access-Control-Allow-Headers' 'DNT,User-Agent,X-Requested-With,If-Modified-Since,Cache-Control,Content-Type,Range' always;
add_header 'Access-Control-Expose-Headers' 'Content-Length,Content-Range' always;
}
if ($request_method = 'GET') {
add_header 'Access-Control-Allow-Origin' '*' always;
add_header 'Access-Control-Allow-Methods' 'GET, POST, OPTIONS' always;
add_header 'Access-Control-Allow-Headers' 'DNT,User-Agent,X-Requested-With,If-Modified-Since,Cache-Control,Content-Type,Range' always;
add_header 'Access-Control-Expose-Headers' 'Content-Length,Content-Range' always;
}
}

View File

@ -1 +1 @@
location / { proxy_pass http://localhost:5006; } location / { proxy_pass http://localhost:5004; }

View File

@ -0,0 +1 @@
location / { proxy_pass http://localhost:5003; }

View File

@ -0,0 +1,20 @@
-----BEGIN CERTIFICATE REQUEST-----
MIIDQDCCAigCAQAwgZYxCzAJBgNVBAYTAlVTMRAwDgYDVQQIDAdBcml6b25hMQ0w
CwYDVQQHDARNZXNhMS0wKwYDVQQKDCRJbmZpbmVvbiBUZWNobm9sb2dpZXMgQW1l
cmljYXMgQ29ycC4xFDASBgNVBAsMC0RldmVsb3BtZW50MSEwHwYDVQQDDBhlYWYt
ZGV2Lm1lcy5pbmZpbmVvbi5jb20wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEK
AoIBAQDm+btRAJ4nY6ORIF0W7shQkJGd3YCLQJoUTPY6BDHsDKrbB1aB/2SgcKvl
BbsZhbtpxJa5VOsfg45miNoiAh+KuJre4HK8MUSzRSAgfBu8oUdq+8d7EggGu2n6
wlZd+eSzNVoeD/8x67y5r1N3RiH1zYSh1IlT7BHEEmaqQ3LurgOm+fKdYMZVWjKg
wBEmDSze3C+Wb5C9zncR2ZHbgfGwUt6bleCh6KZPTgY/9ctk/xMN6WQzFEU/5i/3
u745Ev843qvi4WlViR1ByjctWGjpNWdvghkyqpQUss/e4xIEkzjFHGCtvL7dJwpL
Wb4voCSDLPC5wXTZGAiRfq5Aug6NAgMBAAGgZDBiBgkqhkiG9w0BCQ4xVTBTMFEG
A1UdEQRKMEiCGGVhZi1kZXYubWVzLmluZmluZW9uLmNvbYIWbWVzdHNhMDAzLmlu
ZmluZW9uLmNvbYIJbG9jYWxob3N0ggkxMjcuMC4wLjEwDQYJKoZIhvcNAQELBQAD
ggEBALeuwqZK4d8mrTbLUOPpvWckJ5C6oY2jymTvfoSGO7VsOPSikT0sdYVFX5WV
Jj5/x+rogGa4ZOTyPSogJsYIUJ+I8xd/K4r1si1YFzkeJnslfkWUlCMC1txxFV/A
3dkok0Q+kgFi0JsX12HYGRy5Qwrq2BNIHYM+1mrdm2F30vu071Y9bjnPrLTWiQQZ
5yZnWB6MLTvwnNyKAItWH2iC01/Z2R0YYaS6/i/v7ma2fRtkbH5D2NqQtpCVZ2GJ
5I0I/5EpmZMl0H+efLj4lHXfi41bKaVsgVwJdWvRBF2+2Lt6u7wnqJHiO9mXMUCd
ATTwZ+wI6KhBr4sfiOw/yVlSYA4=
-----END CERTIFICATE REQUEST-----

View File

@ -0,0 +1,25 @@
server {
server_name phares3757.ddns.net;
location / {
proxy_pass http://localhost:8007/;
proxy_set_header Host $host;
proxy_set_header Upgrade $http_upgrade;
proxy_set_header Connection upgrade;
proxy_set_header Accept-Encoding gzip;
}
listen [::]:443 ssl ipv6only=on; # managed by Certbot
listen 443 ssl; # managed by Certbot
ssl_certificate /etc/letsencrypt/live/phares3757.ddns.net/fullchain.pem; # managed by Certbot
ssl_certificate_key /etc/letsencrypt/live/phares3757.ddns.net/privkey.pem; # managed by Certbot
include /etc/letsencrypt/options-ssl-nginx.conf; # managed by Certbot
ssl_dhparam /etc/letsencrypt/ssl-dhparams.pem; # managed by Certbot
}
server {
if ($host = phares3757.ddns.net) {
return 301 https://$host$request_uri;
} # managed by Certbot
listen 80;
listen [::]:80;
server_name phares3757.ddns.net;
return 404; # managed by Certbot
}

View File

@ -0,0 +1,8 @@
server {
listen 8008 default_server;
listen [::]:8008 default_server;
## Trun on /cgi-bin/ support to run CGI apps ##
include /etc/nginx/fcgiwrap.conf;
root /var/www/html;
server_name _;
}

View File

@ -1,37 +0,0 @@
[req]
default_bits = 2048
default_keyfile = desktop-ka0lmmj.key
distinguished_name = req_distinguished_name
req_extensions = req_ext
x509_extensions = v3_ca
[req_distinguished_name]
countryName = Country Name (2 letter code)
countryName_default = US
stateOrProvinceName = State or Province Name (full name)
stateOrProvinceName_default = Arizona
localityName = Locality Name (eg, city)
localityName_default = Anthem
organizationName = Organization Name (eg, company)
organizationName_default = Phares
organizationalUnitName = organizationalunit
organizationalUnitName_default = Development
commonName = Common Name (e.g. server FQDN or YOUR name)
commonName_default = mike.desktop
commonName_max = 64
[req_ext]
subjectAltName = @alt_names
[v3_ca]
subjectAltName = @alt_names
[alt_names]
DNS.1 = chelsea.desktop
DNS.1 = desktop-ka0lmmj
DNS.2 = localhost
DNS.3 = 127.0.0.1
# https://webscoot.io/blog/create-self-signed-certificate-ubuntu-windows-nginx/
# cd "C:\Program Files\Git\usr\bin"
# openssl req -x509 -nodes -days 365 -newkey rsa:2048 -keyout L:\Git\NGINX-Conf\conf\includes\desktop-ka0lmmj.key -out L:\Git\NGINX-Conf\conf\includes\desktop-ka0lmmj.crt -config L:\Git\NGINX-Conf\conf\includes\desktop-ka0lmmj.conf

View File

@ -1,23 +0,0 @@
-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----

View File

@ -1,28 +0,0 @@
-----BEGIN PRIVATE KEY-----
MIIEvgIBADANBgkqhkiG9w0BAQEFAASCBKgwggSkAgEAAoIBAQClG3ncOfn5TWB8
sRumOUbpiGUTZDdkZkw8inLDdi5HoEOIuCbniHefsBTSE+xDOJhFXkuiUeVDqRXF
00DQIiJ6GY1URAaaStUNQ7T4Izu8ToOBPb61B0Q0msWTb4lFUsiDN2inRFYX6SJP
7Eyfraa7KCxlgHZyagcGvWY+eHoNm2EXwfiCnf3tNPFPGmevlFk1wV0ovY4SSq4p
/s6wYcovt8bKCrSTIInxi5g8LffSOyhwy2jcAQojOBNEfCmSbcWiNVxLV6C6Sw71
iOffvKkMBigBFXv1PgzM8z5e9ZsWdVIxWEUuBPOhjfEfTXN6ooRUQjA2kfDvkG17
1p7QaLTxAgMBAAECggEABvhPF4aMiJNVRYpJ/SVJmrH291+5jWfao8sh72GxsDUi
KLdCcC+FAkUiCeDMrmVJG1OQ3JI5vBabHFHv2GF6hF5IBrTE9RY/4nqXXQrKuqcz
Wr0/K9/5x4E5okDZAgfNvmlURgxm2IVPXSGf9fU0Fs5KOoI27dtPPt/3vR8joueZ
EMur9yjnN91cxfH9jV73jbM5Q7sSCfKEr5MdxzyXtTz55dmZ77EcFWg4EZ/N6ZVB
JWg3fU+bWk+L7eN1aR6Vd2ds5S+PTPs11CukuwZlPVv2vkNuHWSK84cNXZ6bx5Gs
2S3GEowo7/Vaj7sEMVg68Yb2WgWyhbFohVV5RHAeyQKBgQDO5MP6iDL1KeFRWomF
dSA9YrUeRF+XPjmjCaLan/adIzCN34eU28G5sixoQFm3tVwbAvojhZngJxF21Q5M
mKRbqoDCVtVgkA5p/qWTRUHno0G0Gc5amB0I8oXlWuPZAz7lg6Td8XRxtmy+bi3H
PbacgfqeWuCeHBJCUirLnphwSQKBgQDMS7MBf5g8UB4SLh6JwgWiD4PA3kxhoZjP
P/odaotzktgDTG8Ki7PqvqTgoRoknkLcdwCZRcjfqqm6qhTU7gkpAvg5zfk8YQO4
aysBWxJ7khZGnIIGvh9Cg4FJXLeJozUXKIB/zwU22lfNJG8VYNG9Hg9eOh3V9BT5
pceTN5tvaQKBgQCiKD9Kj5GRAiAtiU6cIW8BbeoTLPfXLNgz5wuTWykJhFk7+WTk
0VEHYJTZqQYorKbiLPUs/jvaqgRQJTEt6712cy60IybepkoF3aacxP2gth57MHbC
HtMy/hLf7tsCbj7P2NxRcDwaHCcjImwS61XDWUS69PN0OQA+pvQP3+AOsQKBgFiN
S2cP3nXuKEqrEPOXVQe8/9f+w07iU7EpwwkzIIUVFmq/m7YPfgn3XtI7InDS5JpZ
ProxJHPGrtFJXcQ59WCAeAXeQPUp/AnY8gghaK6FUQCEYFv51uTmyYh6FtgjFSUX
mjNMEa+IDtzNuRSkJeV6fSDTwhD2Po1DjXFDfi1ZAoGBAJUrphHp5z7IOe6yw0Ui
PU8fsA33uaNFy5M97MCygNRt/7elizodVKLZfqyoXKJ1YvCkPax8P+T78OWq0sre
Zv7dL1zKJlUnvw05Pu+/O0gTc/8yBNotuiU5dFIQd/yVEbFlOFGC9mcZBcMBdbkm
+kjLk2e0xy0iI6NZMLtix6B2
-----END PRIVATE KEY-----

View File

@ -0,0 +1,39 @@
-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----

View File

@ -0,0 +1,30 @@
-----BEGIN ENCRYPTED PRIVATE KEY-----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-----END ENCRYPTED PRIVATE KEY-----

View File

@ -0,0 +1 @@
https://intranet.infineon.com/

View File

@ -1,15 +1,20 @@
# location ~ /admin(.*)/$ {
location ~* .(3gp|apng|avi|avif|bmp|css|cur|flv|gif|htm|html|ico|jfif|jpeg|jpg|js|mid|mov|mp3|mp4|mpeg|mpg|ogg|pdf|php|pjp|pjpeg|png|svg|tif|tiff|txt|wav|webp|wmf|wml|wmv|xml|xml)$ { location ~* .(3gp|apng|avi|avif|bmp|css|cur|flv|gif|htm|html|ico|jfif|jpeg|jpg|js|mid|mov|mp3|mp4|mpeg|mpg|ogg|pdf|php|pjp|pjpeg|png|svg|tif|tiff|txt|wav|webp|wmf|wml|wmv|xml|xml)$ {
expires 1d; expires 1d;
index index.html index.htm; index index.html index.htm;
# ln -s /etc/nginx/sites-available/json /etc/nginx/sites-enabled/
# ln -s /srv/samba/share/637998119172547651 /var/www/html/637998119172547651
# ln -s /var/www/html/NGINdeX.io /var/www/html/637998119172547651/NGINdeX.io
# ln -s /srv/git /var/www/html/637998119172547651/git
# root /var/www/html/637998119172547651;
# mklink /J "D:\Tmp\Phares\www\pictures" "D:\Documents\Pictures" # mklink /J "D:\Tmp\Phares\www\pictures" "D:\Documents\Pictures"
# mklink /J "D:\Tmp\Phares\www\NGINdeX.io" "L:\GitHub\NGINdeX.io" # mklink /J "D:\Tmp\Phares\www\NGINdeX.io" "L:\Git\NGINdeX.io"
root "D://Tmp//phares//www"; root "D://Tmp//phares//www";
} }
location / { location / {
index index.html index.htm; index index.html index.htm;
# root /var/www/html/637998119172547651;
# mklink /J "D:\Tmp\Phares\www\pictures" "D:\Documents\Pictures" # mklink /J "D:\Tmp\Phares\www\pictures" "D:\Documents\Pictures"
# mklink /J "D:\Tmp\Phares\www\NGINdeX.io" "L:\GitHub\NGINdeX.io" # mklink /J "D:\Tmp\Phares\www\NGINdeX.io" "L:\Git\NGINdeX.io"
root "D://Tmp//phares//www"; root "D://Tmp//phares//www";
# First attempt to serve request as file, then # First attempt to serve request as file, then
autoindex on; autoindex on;

View File

@ -0,0 +1,45 @@
[req]
default_bits = 2048
default_keyfile = localhost.key
distinguished_name = req_distinguished_name
req_extensions = req_ext
x509_extensions = v3_ca
[req_distinguished_name]
countryName = Country Name (2 letter code)
countryName_default = US
stateOrProvinceName = State or Province Name (full name)
stateOrProvinceName_default = Arizona
localityName = Locality Name (eg, city)
localityName_default = Mesa
organizationName = Organization Name (eg, company)
organizationName_default = Infineon Technologies Americas Corp.
organizationalUnitName = organizationalunit
organizationalUnitName_default = Development
commonName = Common Name (e.g. server FQDN or YOUR name)
commonName_default = eaf-dev.mes.infineon.com
commonName_max = 64
[req_ext]
subjectAltName = @alt_names
[v3_ca]
subjectAltName = @alt_names
[alt_names]
DNS.1 = eaf-dev.mes.infineon.com
DNS.2 = mestsa003.infineon.com
DNS.3 = localhost
DNS.4 = 127.0.0.1
# https://webscoot.io/blog/create-self-signed-certificate-ubuntu-windows-nginx/
# cd "C:\Program Files\Git\usr\bin"
# openssl
# req -x509 -nodes -days 365 -newkey rsa:2048 -keyout L:\Git\NGINX-Conf\conf\includes\localhost.key -out L:\Git\NGINX-Conf\conf\includes\localhost.crt -config L:\Git\NGINX-Conf\conf\includes\localhost.conf
# openssl
# req -newkey rsa:2048 -keyout L:\Git\NGINX-Conf\conf\includes\localhost.key -out L:\Git\NGINX-Conf\conf\includes\certificate-signing-request.csr -config L:\Git\NGINX-Conf\conf\includes\localhost.conf
# https://intranet.infineon.com/
# openssl
# pkcs12 -in L:\git\NGINX-Conf\conf\includes\ec-server.pfx -nocerts -out L:\Git\NGINX-Conf\conf\includes\ec-server.key
# openssl
# pkcs12 -in L:\git\NGINX-Conf\conf\includes\ec-server.pfx -clcerts -nokeys -out L:\Git\NGINX-Conf\conf\includes\ec-server.crt

View File

@ -3,20 +3,79 @@ events {
worker_connections 1024; worker_connections 1024;
} }
http { http {
include "includes/mime.types"; include "includes/mime.types";
default_type application/octet-stream; default_type application/octet-stream;
sendfile on; sendfile on;
keepalive_timeout 65; keepalive_timeout 65;
server { server {
listen 443 ssl http2; # listen 80;
listen [::]:443 ssl http2; listen 443 ssl http2;
server_name localhost; listen [::]:443 ssl http2;
ssl_certificate "includes/desktop-ka0lmmj.crt"; server_name localhost;
ssl_certificate_key "includes/desktop-ka0lmmj.key"; # ssl_certificate "includes/localhost.crt";
ssl_protocols TLSv1.2 TLSv1.1 TLSv1; # ssl_certificate_key "includes/localhost.key";
# include "includes/html.conf"; ssl_certificate "includes/eaf-dev.mes.infineon.com.cer";
location / { proxy_pass http://localhost:8384; } ssl_password_file "includes/eaf-dev.mes.infineon.com.pass";
error_page 500 502 503 504 /50x.html; ssl_certificate_key "includes/eaf-dev.mes.infineon.com.key";
include "includes/html-error.conf"; ssl_protocols TLSv1.2 TLSv1.1 TLSv1;
} # include "includes/html.conf";
# include "includes/BaGet.conf";
include "includes/Backlog.conf";
error_page 500 502 503 504 /50x.html;
include "includes/html-error.conf";
}
server {
listen 4430;
server_name iscn5cg1325c0x.infineon.com;
include "includes/BaGet.conf";
}
server {
listen 5051;
server_name localhost;
include "includes/www.conf";
}
server {
listen 5052;
server_name localhost;
include "includes/json.conf";
}
server {
listen 5053;
server_name localhost;
include "includes/ProgramData.conf";
}
# server {
# listen 80;
# server_name eaf-dev.*;
# include "includes/ProgramData.conf";
# include "includes/EAF-Viewer.Server.conf";
# }
# server {
# listen 80;
# server_name mestsa003.infineon.com;
# include "includes/EDA Viewer.conf";
# }
# server {
# listen 8080;
# server_name ~(oi-metrology-viewer-archive).mes.infineon.com;
# location / {
# include "includes/Archive.conf";
# }
# }
# server {
# listen 8080;
# server_name ~(oi-metrology-viewer-prod).mes.infineon.com;
# location / {
# include "includes/Viewer.conf";
# }
# }
# server {
# listen 8088;
# server_name *.mes.infineon.com;
# include "includes/EAF-Viewer.Server.conf";
# }
} }
# mklink /J "C:\Users\mesedasvc\AppData\Local\IFXApps\nginx-1.20.1\conf" "L:\Git\NGINX-Conf\conf"
# cd "C:\Users\ECMESEAF\AppData\Local\IFXApps\nginx-1.20.1"
# .\nginx -t
# .\nginx -s reload