mirror of
https://github.com/xiaoxinpro/nginx-proxy-manager-zh.git
synced 2025-01-22 12:58:13 -05:00
Adds squid to dev/CI stacks
- for testing forwarded ip address later
This commit is contained in:
parent
5aeb99b856
commit
b01817bc7f
92
docker/dev/squid.conf
Normal file
92
docker/dev/squid.conf
Normal file
@ -0,0 +1,92 @@
|
|||||||
|
# WELCOME TO SQUID 6.6
|
||||||
|
# ----------------------------
|
||||||
|
#
|
||||||
|
# This is the documentation for the Squid configuration file.
|
||||||
|
# This documentation can also be found online at:
|
||||||
|
# http://www.squid-cache.org/Doc/config/
|
||||||
|
#
|
||||||
|
# You may wish to look at the Squid home page and wiki for the
|
||||||
|
# FAQ and other documentation:
|
||||||
|
# http://www.squid-cache.org/
|
||||||
|
# https://wiki.squid-cache.org/SquidFaq
|
||||||
|
# https://wiki.squid-cache.org/ConfigExamples
|
||||||
|
#
|
||||||
|
|
||||||
|
# Example rule allowing access from your local networks.
|
||||||
|
# Adapt to list your (internal) IP networks from where browsing
|
||||||
|
# should be allowed
|
||||||
|
acl localnet src 0.0.0.1-0.255.255.255 # RFC 1122 "this" network (LAN)
|
||||||
|
acl localnet src 10.0.0.0/8 # RFC 1918 local private network (LAN)
|
||||||
|
acl localnet src 100.64.0.0/10 # RFC 6598 shared address space (CGN)
|
||||||
|
acl localnet src 169.254.0.0/16 # RFC 3927 link-local (directly plugged) machines
|
||||||
|
acl localnet src 172.0.0.0/8
|
||||||
|
acl localnet src 192.168.0.0/16 # RFC 1918 local private network (LAN)
|
||||||
|
acl localnet src fc00::/7 # RFC 4193 local private network range
|
||||||
|
acl localnet src fe80::/10 # RFC 4291 link-local (directly plugged) machines
|
||||||
|
|
||||||
|
acl SSL_ports port 443
|
||||||
|
acl Safe_ports port 80 # http
|
||||||
|
acl Safe_ports port 81
|
||||||
|
acl Safe_ports port 443 # https
|
||||||
|
|
||||||
|
#
|
||||||
|
# Recommended minimum Access Permission configuration:
|
||||||
|
#
|
||||||
|
# Deny requests to certain unsafe ports
|
||||||
|
http_access deny !Safe_ports
|
||||||
|
|
||||||
|
# Deny CONNECT to other than secure SSL ports
|
||||||
|
http_access deny CONNECT !SSL_ports
|
||||||
|
|
||||||
|
# Only allow cachemgr access from localhost
|
||||||
|
http_access allow localhost manager
|
||||||
|
http_access deny manager
|
||||||
|
|
||||||
|
# This default configuration only allows localhost requests because a more
|
||||||
|
# permissive Squid installation could introduce new attack vectors into the
|
||||||
|
# network by proxying external TCP connections to unprotected services.
|
||||||
|
http_access allow localhost
|
||||||
|
|
||||||
|
# The two deny rules below are unnecessary in this default configuration
|
||||||
|
# because they are followed by a "deny all" rule. However, they may become
|
||||||
|
# critically important when you start allowing external requests below them.
|
||||||
|
|
||||||
|
# Protect web applications running on the same server as Squid. They often
|
||||||
|
# assume that only local users can access them at "localhost" ports.
|
||||||
|
http_access deny to_localhost
|
||||||
|
|
||||||
|
# Protect cloud servers that provide local users with sensitive info about
|
||||||
|
# their server via certain well-known link-local (a.k.a. APIPA) addresses.
|
||||||
|
http_access deny to_linklocal
|
||||||
|
|
||||||
|
#
|
||||||
|
# INSERT YOUR OWN RULE(S) HERE TO ALLOW ACCESS FROM YOUR CLIENTS
|
||||||
|
#
|
||||||
|
include /etc/squid/conf.d/*.conf
|
||||||
|
|
||||||
|
# For example, to allow access from your local networks, you may uncomment the
|
||||||
|
# following rule (and/or add rules that match your definition of "local"):
|
||||||
|
# http_access allow localnet
|
||||||
|
|
||||||
|
# And finally deny all other access to this proxy
|
||||||
|
http_access deny all
|
||||||
|
|
||||||
|
# Squid normally listens to port 3128
|
||||||
|
http_port 3128
|
||||||
|
|
||||||
|
# Leave coredumps in the first cache dir
|
||||||
|
coredump_dir /var/spool/squid
|
||||||
|
|
||||||
|
#
|
||||||
|
# Add any of your own refresh_pattern entries above these.
|
||||||
|
#
|
||||||
|
refresh_pattern ^ftp: 1440 20% 10080
|
||||||
|
refresh_pattern -i (/cgi-bin/|\?) 0 0% 0
|
||||||
|
refresh_pattern \/(Packages|Sources)(|\.bz2|\.gz|\.xz)$ 0 0% 0 refresh-ims
|
||||||
|
refresh_pattern \/Release(|\.gpg)$ 0 0% 0 refresh-ims
|
||||||
|
refresh_pattern \/InRelease$ 0 0% 0 refresh-ims
|
||||||
|
refresh_pattern \/(Translation-.*)(|\.bz2|\.gz|\.xz)$ 0 0% 0 refresh-ims
|
||||||
|
# example pattern for deb packages
|
||||||
|
#refresh_pattern (\.deb|\.udeb)$ 129600 100% 129600
|
||||||
|
refresh_pattern . 0 20% 4320
|
||||||
|
|
@ -22,6 +22,7 @@ services:
|
|||||||
networks:
|
networks:
|
||||||
fulltest:
|
fulltest:
|
||||||
aliases:
|
aliases:
|
||||||
|
- npm
|
||||||
- website1.example.com
|
- website1.example.com
|
||||||
- website2.example.com
|
- website2.example.com
|
||||||
- website3.example.com
|
- website3.example.com
|
||||||
@ -92,13 +93,25 @@ services:
|
|||||||
dockerfile: test/cypress/Dockerfile
|
dockerfile: test/cypress/Dockerfile
|
||||||
environment:
|
environment:
|
||||||
CYPRESS_baseUrl: 'http://fullstack:81'
|
CYPRESS_baseUrl: 'http://fullstack:81'
|
||||||
|
HTTP_PROXY: 'http://squid:3128'
|
||||||
|
HTTPS_PROXY: 'http://squid:3128'
|
||||||
volumes:
|
volumes:
|
||||||
- 'cypress_logs:/results'
|
- 'cypress_logs:/results'
|
||||||
- './dev/resolv.conf:/etc/resolv.conf:ro'
|
- './dev/resolv.conf:/etc/resolv.conf:ro'
|
||||||
|
- '/etc/localtime:/etc/localtime:ro'
|
||||||
command: cypress run --browser chrome --config-file=cypress/config/ci.js
|
command: cypress run --browser chrome --config-file=cypress/config/ci.js
|
||||||
networks:
|
networks:
|
||||||
- fulltest
|
- fulltest
|
||||||
|
|
||||||
|
squid:
|
||||||
|
image: ubuntu/squid
|
||||||
|
volumes:
|
||||||
|
- './dev/squid.conf:/etc/squid/squid.conf:ro'
|
||||||
|
- './dev/resolv.conf:/etc/resolv.conf:ro'
|
||||||
|
- '/etc/localtime:/etc/localtime:ro'
|
||||||
|
networks:
|
||||||
|
- fulltest
|
||||||
|
|
||||||
volumes:
|
volumes:
|
||||||
cypress_logs:
|
cypress_logs:
|
||||||
npm_data_ci:
|
npm_data_ci:
|
||||||
|
@ -12,7 +12,11 @@ services:
|
|||||||
- 3081:81
|
- 3081:81
|
||||||
- 3443:443
|
- 3443:443
|
||||||
networks:
|
networks:
|
||||||
- nginx_proxy_manager
|
nginx_proxy_manager:
|
||||||
|
aliases:
|
||||||
|
- website1.example.com
|
||||||
|
- website2.example.com
|
||||||
|
- website3.example.com
|
||||||
environment:
|
environment:
|
||||||
PUID: 1000
|
PUID: 1000
|
||||||
PGID: 1000
|
PGID: 1000
|
||||||
@ -65,6 +69,17 @@ services:
|
|||||||
depends_on:
|
depends_on:
|
||||||
- npm
|
- npm
|
||||||
|
|
||||||
|
squid:
|
||||||
|
image: ubuntu/squid
|
||||||
|
container_name: npm_squid
|
||||||
|
volumes:
|
||||||
|
- './dev/squid.conf:/etc/squid/squid.conf:ro'
|
||||||
|
- '/etc/localtime:/etc/localtime:ro'
|
||||||
|
networks:
|
||||||
|
- nginx_proxy_manager
|
||||||
|
ports:
|
||||||
|
- 8128:3128
|
||||||
|
|
||||||
volumes:
|
volumes:
|
||||||
npm_data:
|
npm_data:
|
||||||
name: npm_core_data
|
name: npm_core_data
|
||||||
|
@ -15,8 +15,8 @@ module.exports = defineConfig({
|
|||||||
return require("../plugins/index.js")(on, config);
|
return require("../plugins/index.js")(on, config);
|
||||||
},
|
},
|
||||||
env: {
|
env: {
|
||||||
swaggerBase: '{{baseUrl}}/api/schema',
|
swaggerBase: 'http://npm:81/api/schema',
|
||||||
},
|
},
|
||||||
baseUrl: 'http://localhost:1234',
|
baseUrl: 'http://npm:81',
|
||||||
}
|
}
|
||||||
});
|
});
|
||||||
|
@ -15,8 +15,8 @@ module.exports = defineConfig({
|
|||||||
return require("../plugins/index.js")(on, config);
|
return require("../plugins/index.js")(on, config);
|
||||||
},
|
},
|
||||||
env: {
|
env: {
|
||||||
swaggerBase: '{{baseUrl}}/api/schema',
|
swaggerBase: 'http://npm:81/api/schema',
|
||||||
},
|
},
|
||||||
baseUrl: 'http://localhost:1234',
|
baseUrl: 'http://npm:81',
|
||||||
}
|
}
|
||||||
});
|
});
|
||||||
|
@ -19,8 +19,8 @@
|
|||||||
"mocha-junit-reporter": "^2.2.1"
|
"mocha-junit-reporter": "^2.2.1"
|
||||||
},
|
},
|
||||||
"scripts": {
|
"scripts": {
|
||||||
"cypress": "cypress open --config-file=cypress/config/dev.js --config baseUrl=${BASE_URL:-http://127.0.0.1:3081}",
|
"cypress": "HTTP_PROXY=127.0.0.1:8128 HTTPS_PROXY=127.0.0.1:8128 cypress open --config-file=cypress/config/dev.js",
|
||||||
"cypress:headless": "cypress run --config-file=cypress/config/dev.js --config baseUrl=${BASE_URL:-http://127.0.0.1:3081}"
|
"cypress:headless": "HTTP_PROXY=127.0.0.1:8128 HTTPS_PROXY=127.0.0.1:8128 cypress run --config-file=cypress/config/dev.js"
|
||||||
},
|
},
|
||||||
"author": "",
|
"author": "",
|
||||||
"license": "ISC"
|
"license": "ISC"
|
||||||
|
Loading…
Reference in New Issue
Block a user