Commit Graph

12 Commits

Author SHA1 Message Date
Arkadiusz Michał Ryś
e13f7afcb8
Fix traefik rule priority for media router (#4244)
* Add option to serve media files locally using nginx

* Fix nginx media location and storage issue

* Fix traefik django-media typo

* Add certresolver property to web-media-router

* Add trailing slash in nginx configuration to avoid path traversal exploits

* Remove autoindexing from nginx configuration so nginx uses its default off setting

* Use nginx to serve media files if cloud provider is None

* Add back warning about lack of media files without Docker or Cloud providers

* Update documentation

* Fix typos and rephrase

Co-authored-by: Arkadiusz Ryś <arkadiusz.michal.rys@gmail.com>

* Change Traefik media router rule generation to force priority

The web-secure-router could end up having priority over the web-media-router when the www subdomain was used.
This fix adds the www subdomain to the web-media-router if it's also present in the web-secure-router rule.
Traefik looks at the length of rules to determine priority when no explicit priority is set.
The web-media-router needs to always have priority over the web-secure-router in order for the media files to be served.

* Add space to Traefik rule

---------

Co-authored-by: Bruno Alla <alla.brunoo@gmail.com>
Co-authored-by: Bruno Alla <browniebroke@users.noreply.github.com>
2023-04-04 10:25:06 +01:00
Arkadiusz Michał Ryś
06369bfd4c
Add option to serve media files locally using nginx (#2457)
* Add option to serve media files locally using nginx

* Fix nginx media location and storage issue

* Fix traefik django-media typo

* Add certresolver property to web-media-router

* Add trailing slash in nginx configuration to avoid path traversal exploits

* Remove autoindexing from nginx configuration so nginx uses its default off setting

* Use nginx to serve media files if cloud provider is None

* Add back warning about lack of media files without Docker or Cloud providers

* Update documentation

* Fix typos and rephrase

Co-authored-by: Arkadiusz Ryś <arkadiusz.michal.rys@gmail.com>

---------

Co-authored-by: Bruno Alla <alla.brunoo@gmail.com>
Co-authored-by: Bruno Alla <browniebroke@users.noreply.github.com>
2023-03-04 18:36:11 +00:00
Bruno Alla
c382894934 Fix pre-commit hook issues 2021-04-07 20:57:04 +01:00
Arnav Choudhury
2408fc7756 Added a comment to relevant part of documentation. Also removed the unnecessary scheme key as the default value for scheme is https anyway 2020-09-18 22:14:18 +05:30
Arnav Choudhury
35b89997ef Made Traefik conf much easier to understand and improved redirect response to entrypoint as opposed to middleware layer that is hit after entrypoint and routing layers. 2020-09-17 22:22:42 +05:30
Sudarshan Wadkar
9cf47898f4
Only consider TLDs while adding www route
Instead of checking for `.co.XX` on best effort basis, we only check for
the single dot in the domain_name indicating no subdomain usage.
2020-04-24 19:43:38 +05:30
Sudarshan Wadkar
4021286be0
Add condition to include .co.XX TLDs
This is best effort checking of domain names and creating the traefik
rules. These two checks should cover most of the use cases.
2020-04-24 19:43:38 +05:30
Sudarshan Wadkar
cafc0ac1f3
Conditionally add www host to traefik router
If the domain_name entered contains subdomains, e.g. `api.example.com`
then do *not* add an additional `www.api.example.com` route to traefik

If the user enters only the domain `example.com` then add the optional
`www.example.com` Host to the traefik routers.
2020-04-24 19:43:37 +05:30
Tevak
0df3087d3d Traefik - Also redirect wwww. to service. 2020-04-04 17:26:24 +02:00
Demetris Stavrou
1a7bcccd94 Added celery cookiecutter condition in Traefik configuration 2020-02-18 11:01:56 +02:00
Demetris Stavrou
86c9b3cb28 Flower now served by Traefik 2020-02-04 15:04:47 +02:00
Denis Savran
c76b3066d6 Upgrade to Traefik v2 2019-11-29 21:35:40 +03:00