update telize

Signed-off-by: Jess Frazelle <acidburn@google.com>
This commit is contained in:
Jess Frazelle 2017-06-05 16:20:42 -04:00
parent 2acc9e3b4e
commit a22f3334af
No known key found for this signature in database
GPG Key ID: 18F3685C0022BFF3
3 changed files with 96 additions and 95 deletions

View File

@ -19,7 +19,7 @@ COPY telize.conf /etc/nginx/conf.d/telize.conf
EXPOSE 80 443
ENV TELIZE_VERSION 1.07
ENV TELIZE_VERSION master
RUN buildDeps=' \
curl \
@ -29,9 +29,9 @@ RUN buildDeps=' \
&& apt-get update && apt-get install -y $buildDeps --no-install-recommends \
&& rm -rf /var/lib/apt/lists/* \
&& mkdir -p /usr/share/GeoIP \
&& curl -sSL https://geolite.maxmind.com/download/geoip/database/GeoLiteCountry/GeoIP.dat.gz -o /usr/share/GeoIP/GeoIP.dat.gz \
&& curl -sSL http://geolite.maxmind.com/download/geoip/database/GeoLiteCity.dat.gz -o /usr/share/GeoIP/GeoLiteCity.dat.gz \
&& curl -sSL http://download.maxmind.com/download/geoip/database/asnum/GeoIPASNum.dat.gz -o /usr/share/GeoIP/GeoIPASNum.dat.gz \
&& curl -sSL https://geolite.maxmind.com/download/geoip/database/GeoIPv6.dat.gz -o /usr/share/GeoIP/GeoIPv6.dat.gz \
&& curl -sSL http://geolite.maxmind.com/download/geoip/database/GeoLiteCityv6-beta/GeoLiteCityv6.dat.gz -o /usr/share/GeoIP/GeoLiteCityv6.dat.gz \
&& curl -sSL http://download.maxmind.com/download/geoip/database/asnum/GeoIPASNumv6.dat.gz -o /usr/share/GeoIP/GeoIPASNumv6.dat.gz \
&& gunzip /usr/share/GeoIP/*gz \
&& git clone --depth 1 --branch "${TELIZE_VERSION}" https://github.com/fcambus/telize.git /usr/src/telize \
&& ( \

View File

@ -96,15 +96,15 @@ http {
# GeoIP
##
map_hash_bucket_size 128;
map_hash_max_size 4096;
map_hash_bucket_size 64;
map_hash_max_size 8192;
include /etc/nginx/timezone.conf;
include /etc/nginx/timezone-offset.conf;
geoip_country /usr/share/GeoIP/GeoIP.dat;
geoip_city /usr/share/GeoIP/GeoLiteCity.dat;
geoip_org /usr/share/GeoIP/GeoIPASNum.dat;
geoip_country /usr/share/GeoIP/GeoIPv6.dat;
geoip_city /usr/share/GeoIP/GeoLiteCityv6.dat;
geoip_org /usr/share/GeoIP/GeoIPASNumv6.dat;
# Virtual hosts
include /etc/nginx/conf.d/telize.conf;

View File

@ -1,13 +1,13 @@
###############################################################################
# #
# Telize 1.05 #
# Copyright (c) 2013-2016, Frederic Cambus #
# http://www.telize.com #
# Telize 1.07 #
# Copyright (c) 2013-2017, Frederic Cambus #
# https://www.telize.com #
# #
# Created: 2013-08-15 #
# Last Updated: 2016-01-05 #
# Last Updated: 2017-02-07 #
# #
# Telize is released under the BSD 3-Clause license. #
# Telize is released under the BSD 2-Clause license. #
# See LICENSE file for details. #
# #
###############################################################################
@ -28,25 +28,22 @@ server {
keepalive_timeout 0;
gzip off;
## Deny illegal Host headers
if ($http_referer ~* ^(rwandair.com|m.rwandair.com|stage-rwandair.mobiashara.com)$ ) {
return 444;
}
location ~ /ip$ {
add_header Cache-Control no-cache;
charset off;
default_type text/plain;
echo $remote_addr;
content_by_lua_block {
ngx.say(ngx.var.remote_addr)
}
}
location ~ /jsonip$ {
charset utf-8;
default_type application/json;
content_by_lua '
content_by_lua_block {
local cjson = require("cjson")
local json = cjson.encode({
@ -59,7 +56,8 @@ server {
ngx.say(callback, "(", json, ");")
else
ngx.say(json)
end';
end
}
}
location ~ /geoip/?(?<ip>.*) {
@ -67,7 +65,8 @@ server {
set $ip $remote_addr;
}
# Uncomment when using Telize behind a load balancer, and comment the directive setting X-Real-IP
# Uncomment when using Telize behind a load balancer, and
# comment the directive setting X-Real-IP
# proxy_set_header X-Forwarded-For $ip;
proxy_set_header X-Real-IP $ip;
@ -87,17 +86,20 @@ server {
add_header Access-Control-Allow-Origin $cors_origin;
}
more_set_headers "Cache-Control: no-cache";
content_by_lua '
content_by_lua_block {
local cjson = require("cjson")
local iconv = require("iconv")
local cd = iconv.new("utf-8","iso-8859-15")
ngx.header["Cache-Control"] = "no-cache";
-- Check for invalid IP addresses
if ngx.var.remote_addr == "127.0.0.1" then
ngx.status = ngx.HTTP_BAD_REQUEST
ngx.say(cjson.encode({code = 401, message = "Input string is not a valid IP address"}))
ngx.say(cjson.encode({
code = 401,
message = "Input string is not a valid IP address"
}))
ngx.exit(ngx.HTTP_OK)
end
@ -156,8 +158,7 @@ server {
ngx.say(callback, "(", json, ");")
else
ngx.say(json)
end';
end
}
}
}
# vi: ft=nginx