Compare commits

..

1 Commits

Author SHA1 Message Date
bcfeaeab02 desktop-ka0lmmj 2024-01-01 19:21:43 -07:00
19 changed files with 86 additions and 299 deletions

3
.gitignore vendored
View File

@ -1,2 +1 @@
conf/includes/localhost.crt nginx-1.20.1
conf/includes/localhost.key

View File

@ -1,11 +1,11 @@
location / { location /
{
proxy_pass http://localhost:5555;
proxy_http_version 1.1; proxy_http_version 1.1;
proxy_set_header Upgrade $http_upgrade;
proxy_set_header Connection keep-alive;
proxy_set_header Host $http_host;
proxy_cache_bypass $http_upgrade; proxy_cache_bypass $http_upgrade;
proxy_pass http://localhost:5555;
proxy_set_header Host $http_host;
proxy_set_header Connection keep-alive;
proxy_set_header Upgrade $http_upgrade;
proxy_set_header X-Forwarded-Proto https;
} }
# sc create "Baget-5555" start= delayed-auto DisplayName="Baget-5555" binPath= "C:\Users\phares\AppData\Local\IFXApps\BaGet\src\BaGet\bin\Release\net6.0\win-x64\publish\BaGet.exe" obj= "infineon\phares" password= "" # sc create "Baget-5555" start= delayed-auto DisplayName="Baget-5555" binPath= "C:\Users\phares\AppData\Local\IFXApps\BaGet\src\BaGet\bin\Release\net6.0\win-x64\publish\BaGet.exe" obj= "infineon\phares" password= ""

View File

@ -1 +1 @@
location / { proxy_pass http://localhost:5010; } location / { proxy_pass http://localhost:5006; }

View File

@ -1,2 +0,0 @@
location / { proxy_pass http://localhost:5003; }
# http://localhost:5003/Background?set_is_primary_instance=false&a

View File

@ -1,8 +0,0 @@
location / {
proxy_hide_header Authorization;
if ($http_Authorization != "Basic asdf") {
return 401;
}
proxy_set_header Authorization "Basic asdf";
proxy_pass http://localhost:3000;
}

View File

@ -1,25 +0,0 @@
server {
server_name phares3757.ddns.net;
location / {
proxy_pass http://localhost:8007/;
proxy_set_header Host $host;
proxy_set_header Upgrade $http_upgrade;
proxy_set_header Connection upgrade;
proxy_set_header Accept-Encoding gzip;
}
listen [::]:443 ssl ipv6only=on; # managed by Certbot
listen 443 ssl; # managed by Certbot
ssl_certificate /etc/letsencrypt/live/phares3757.ddns.net/fullchain.pem; # managed by Certbot
ssl_certificate_key /etc/letsencrypt/live/phares3757.ddns.net/privkey.pem; # managed by Certbot
include /etc/letsencrypt/options-ssl-nginx.conf; # managed by Certbot
ssl_dhparam /etc/letsencrypt/ssl-dhparams.pem; # managed by Certbot
}
server {
if ($host = phares3757.ddns.net) {
return 301 https://$host$request_uri;
} # managed by Certbot
listen 80;
listen [::]:80;
server_name phares3757.ddns.net;
return 404; # managed by Certbot
}

View File

@ -1,8 +0,0 @@
server {
listen 8008 default_server;
listen [::]:8008 default_server;
## Trun on /cgi-bin/ support to run CGI apps ##
include /etc/nginx/fcgiwrap.conf;
root /var/www/html;
server_name _;
}

View File

@ -1,6 +1,6 @@
[req] [req]
default_bits = 2048 default_bits = 2048
default_keyfile = localhost.key default_keyfile = desktop-ka0lmmj.key
distinguished_name = req_distinguished_name distinguished_name = req_distinguished_name
req_extensions = req_ext req_extensions = req_ext
x509_extensions = v3_ca x509_extensions = v3_ca
@ -11,13 +11,13 @@ countryName_default = US
stateOrProvinceName = State or Province Name (full name) stateOrProvinceName = State or Province Name (full name)
stateOrProvinceName_default = Arizona stateOrProvinceName_default = Arizona
localityName = Locality Name (eg, city) localityName = Locality Name (eg, city)
localityName_default = Mesa localityName_default = Anthem
organizationName = Organization Name (eg, company) organizationName = Organization Name (eg, company)
organizationName_default = localhost organizationName_default = Phares
organizationalUnitName = organizationalunit organizationalUnitName = organizationalunit
organizationalUnitName_default = Development organizationalUnitName_default = Development
commonName = Common Name (e.g. server FQDN or YOUR name) commonName = Common Name (e.g. server FQDN or YOUR name)
commonName_default = eaf-staging.mes.infineon.com commonName_default = mike.desktop
commonName_max = 64 commonName_max = 64
[req_ext] [req_ext]
@ -27,16 +27,11 @@ subjectAltName = @alt_names
subjectAltName = @alt_names subjectAltName = @alt_names
[alt_names] [alt_names]
DNS.1 = eaf-staging.mes.infineon.com DNS.1 = chelsea.desktop
DNS.2 = http://mestsa07ec.ec.local/ DNS.1 = desktop-ka0lmmj
DNS.3 = localhost DNS.2 = localhost
DNS.4 = 127.0.0.1 DNS.3 = 127.0.0.1
# https://webscoot.io/blog/create-self-signed-certificate-ubuntu-windows-nginx/ # https://webscoot.io/blog/create-self-signed-certificate-ubuntu-windows-nginx/
# cd "C:\Program Files\Git\usr\bin" # cd "C:\Program Files\Git\usr\bin"
# openssl # openssl req -x509 -nodes -days 365 -newkey rsa:2048 -keyout L:\Git\NGINX-Conf\conf\includes\desktop-ka0lmmj.key -out L:\Git\NGINX-Conf\conf\includes\desktop-ka0lmmj.crt -config L:\Git\NGINX-Conf\conf\includes\desktop-ka0lmmj.conf
# req -x509 -nodes -days 365 -newkey rsa:2048 -keyout L:\Git\NGINX-Conf\conf\includes\localhost.key -out L:\Git\NGINX-Conf\conf\includes\localhost.crt -config L:\Git\NGINX-Conf\conf\includes\localhost.conf
# openssl
# pkcs12 -in L:\git\NGINX-Conf\conf\includes\ec-server.pfx -nocerts -out L:\Git\NGINX-Conf\conf\includes\ec-server.key
# openssl
# pkcs12 -in L:\git\NGINX-Conf\conf\includes\ec-server.pfx -clcerts -nokeys -out L:\Git\NGINX-Conf\conf\includes\ec-server.crt

View File

@ -0,0 +1,23 @@
-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----

View File

@ -0,0 +1,28 @@
-----BEGIN PRIVATE KEY-----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-----END PRIVATE KEY-----

View File

@ -1,29 +0,0 @@
location ~* .(3gp|apng|avi|avif|bmp|css|cur|flv|gif|htm|html|ico|jfif|jpeg|jpg|js|mid|mov|mp3|mp4|mpeg|mpg|ogg|pdf|php|pjp|pjpeg|png|svg|tif|tiff|txt|wav|webp|wmf|wml|wmv|xml|xml)$ {
expires 1d;
index index.html index.htm;
# ln -s /etc/nginx/sites-available/json /etc/nginx/sites-enabled/
# ln -s /srv/samba/share/637998119172547651 /var/www/html/637998119172547651
# ln -s /var/www/html/NGINdeX.io /var/www/html/637998119172547651/NGINdeX.io
# ln -s /srv/git /var/www/html/637998119172547651/git
# root /var/www/html/637998119172547651;
# mklink /J "D:\Tmp\Phares\www\pictures" "D:\Documents\Pictures"
# mklink /J "D:\Tmp\Phares\www\NGINdeX.io" "L:\Git\NGINdeX.io"
root "D://Tmp//phares//www";
}
location / {
index index.html index.htm;
# root /var/www/html/637998119172547651;
# mklink /J "D:\Tmp\Phares\www\pictures" "D:\Documents\Pictures"
# mklink /J "D:\Tmp\Phares\www\NGINdeX.io" "L:\Git\NGINdeX.io"
root "D://Tmp//phares//www";
# First attempt to serve request as file, then
autoindex on;
# Send the data in JSON
autoindex_format json;
addition_types application/json;
# Calling from SERVERNAME/autoindex/*
add_before_body /NGINdeX.io/header.html;
add_after_body /NGINdeX.io/footer.html;
# Need to tell that we are sending HTML
add_header Content-Type text/html;
}

View File

@ -1,31 +0,0 @@
-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----

View File

@ -1,37 +0,0 @@
Bag Attributes
localKeyID: 01 00 00 00
subject=CN = mestsa07ec.ec.local
issuer=C = DE, O = Infineon Technologies AG, CN = Infineon Technologies AG EC CA
-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----

View File

@ -1,37 +0,0 @@
Bag Attributes
Microsoft Local Key set: <No Values>
localKeyID: 01 00 00 00
Microsoft CSP Name: Microsoft RSA SChannel Cryptographic Provider
friendlyName: te-InfineonECServer-0ebec69d-5716-4924-bd1a-35b09db88d23
Key Attributes
X509v3 Key Usage: 10
-----BEGIN ENCRYPTED PRIVATE KEY-----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-----END ENCRYPTED PRIVATE KEY-----

View File

@ -1 +0,0 @@
nocert

Binary file not shown.

View File

@ -1,18 +1,13 @@
# location ~ /admin(.*)/$ {
location ~* .(3gp|apng|avi|avif|bmp|css|cur|flv|gif|htm|html|ico|jfif|jpeg|jpg|js|mid|mov|mp3|mp4|mpeg|mpg|ogg|pdf|php|pjp|pjpeg|png|svg|tif|tiff|txt|wav|webp|wmf|wml|wmv|xml|xml)$ { location ~* .(3gp|apng|avi|avif|bmp|css|cur|flv|gif|htm|html|ico|jfif|jpeg|jpg|js|mid|mov|mp3|mp4|mpeg|mpg|ogg|pdf|php|pjp|pjpeg|png|svg|tif|tiff|txt|wav|webp|wmf|wml|wmv|xml|xml)$ {
expires 1d; expires 1d;
index index.html index.htm; index index.html index.htm;
# ln -s /etc/nginx/sites-available/json /etc/nginx/sites-enabled/
# ln -s /srv/samba/share/637998119172547651 /var/www/html/637998119172547651
# ln -s /var/www/html/NGINdeX.io /var/www/html/637998119172547651/NGINdeX.io
# ln -s /srv/git /var/www/html/637998119172547651/git
# root /var/www/html/637998119172547651;
# mklink /J "D:\Tmp\Phares\www\pictures" "D:\Documents\Pictures" # mklink /J "D:\Tmp\Phares\www\pictures" "D:\Documents\Pictures"
# mklink /J "D:\Tmp\Phares\www\NGINdeX.io" "L:\GitHub\NGINdeX.io" # mklink /J "D:\Tmp\Phares\www\NGINdeX.io" "L:\GitHub\NGINdeX.io"
root "D://Tmp//phares//www"; root "D://Tmp//phares//www";
} }
location / { location / {
index index.html index.htm; index index.html index.htm;
# root /var/www/html/637998119172547651;
# mklink /J "D:\Tmp\Phares\www\pictures" "D:\Documents\Pictures" # mklink /J "D:\Tmp\Phares\www\pictures" "D:\Documents\Pictures"
# mklink /J "D:\Tmp\Phares\www\NGINdeX.io" "L:\GitHub\NGINdeX.io" # mklink /J "D:\Tmp\Phares\www\NGINdeX.io" "L:\GitHub\NGINdeX.io"
root "D://Tmp//phares//www"; root "D://Tmp//phares//www";

View File

@ -1,4 +0,0 @@
location / {
root "D://wwwroot";
try_files $uri $uri/ /index.html =404;
}

View File

@ -3,91 +3,20 @@ events {
worker_connections 1024; worker_connections 1024;
} }
http { http {
include "includes/mime.types"; include "includes/mime.types";
default_type application/octet-stream; default_type application/octet-stream;
sendfile on; sendfile on;
keepalive_timeout 65; keepalive_timeout 65;
server { server {
listen 80; listen 443 ssl http2;
listen 443 ssl http2; listen [::]:443 ssl http2;
listen [::]:443 ssl http2; server_name localhost;
server_name *.mes.infineon.com; ssl_certificate "includes/desktop-ka0lmmj.crt";
# http://eaf-staging.mes.infineon.com/Background?set_is_primary_instance=true ssl_certificate_key "includes/desktop-ka0lmmj.key";
# ssl_certificate "includes/ec-server.cer"; ssl_protocols TLSv1.2 TLSv1.1 TLSv1;
ssl_certificate "includes/ec-server.crt"; # include "includes/html.conf";
ssl_certificate_key "includes/ec-server.key"; location / { proxy_pass http://localhost:8384; }
ssl_password_file "includes/ec-server.pass"; error_page 500 502 503 504 /50x.html;
ssl_protocols TLSv1.2 TLSv1.1 TLSv1; include "includes/html-error.conf";
include "includes/EAF-Viewer.Server.conf"; }
} }
server {
listen 80;
listen 443 ssl http2;
listen [::]:443 ssl http2;
server_name mestsa07ec.*;
# http://mestsa07ec.infineon.com/Background?set_is_primary_instance=true&a
# ssl_certificate "includes/localhost.crt";
# ssl_certificate_key "includes/localhost.key";
# ssl_certificate "includes/ec-server.cer";
ssl_certificate "includes/ec-server.crt";
ssl_certificate_key "includes/ec-server.key";
ssl_password_file "includes/ec-server.pass";
ssl_protocols TLSv1.2 TLSv1.1 TLSv1;
include "includes/EDA Viewer.conf";
}
server {
listen 5050;
server_name localhost;
include "includes/html.conf";
error_page 500 502 503 504 /50x.html;
include "includes/html-error.conf";
}
server {
listen 4430;
server_name iscn5cg1325c0x.infineon.com;
include "includes/BaGet.conf";
}
server {
listen 5051;
server_name localhost;
include "includes/www.conf";
}
server {
listen 5052;
server_name localhost;
include "includes/json.conf";
}
server {
listen 5053;
server_name localhost;
include "includes/ProgramData.conf";
}
server {
listen 8011;
server_name localhost;
include "includes/Gogs.conf";
}
# server {
# listen 8080;
# server_name ~(oi-metrology-viewer-archive).mes.infineon.com;
# location / {
# include "includes/Archive.conf";
# }
# }
# server {
# listen 8080;
# server_name ~(oi-metrology-viewer-prod).mes.infineon.com;
# location / {
# include "includes/Viewer.conf";
# }
# }
server {
listen 8088;
server_name *.mes.infineon.com;
include "includes/EAF-Viewer.Server.conf";
}
}
# mklink /J "C:\Users\mikep\AppData\Local\PharesApps\nginx-1.20.1\conf" "L:\Git\NGINX-Conf\conf"
# cd "C:\Users\ECMESEAF\AppData\Local\IFXApps\nginx-1.20.1"
# .\nginx -t
# .\nginx -s reload