X-Git-Url: https://git.openstreetmap.org/chef.git/blobdiff_plain/981b586040b3fe307a4855e58e846da75555aa05..522d47be66d1f2d0e8b6f89913e2b45f89dd730e:/cookbooks/tilecache/templates/default/nginx_tile.conf.erb diff --git a/cookbooks/tilecache/templates/default/nginx_tile.conf.erb b/cookbooks/tilecache/templates/default/nginx_tile.conf.erb index 149ddd001..40b13c371 100644 --- a/cookbooks/tilecache/templates/default/nginx_tile.conf.erb +++ b/cookbooks/tilecache/templates/default/nginx_tile.conf.erb @@ -1,17 +1,31 @@ # DO NOT EDIT - This file is being maintained by Chef upstream tile_cache_backend { - server 127.0.0.1:8080; - <% @caches.each do |cache| -%> - <% if cache[:hostname] != node[:hostname] -%> - #Server <%= cache[:hostname] %> - <% cache.ipaddresses(:family => :inet, :role => :external).sort.each do |address| -%> - server <%= address %> backup; - <% end -%> - <% end -%> - <% end -%> - - keepalive 32; + server 127.0.0.1; + + # Add the other caches to relieve pressure if local squid failing + # Balancer: round-robin +<% @caches.each do |cache| -%> +<% if cache[:hostname] != node[:hostname] -%> +<% if node[:tilecache][:tile_siblings].include? cache[:fqdn] -%> +<% cache.ipaddresses(:family => :inet, :role => :external).sort.each do |address| -%> + server <%= address %> backup; # Server <%= cache[:hostname] %> +<% end -%> +<% end -%> +<% end -%> +<% end -%> + + keepalive 256; +} + +# Geo Map of tile caches +geo $tile_cache { + default 0; +<% @caches.each do |cache| -%> +<% cache.ipaddresses(:family => :inet, :role => :external).sort.each do |address| -%> + <%= address %> 1; # <%= cache[:hostname] %> +<% end -%> +<% end -%> } # Rates table based on current cookie value @@ -25,9 +39,35 @@ map $cookie_qos_token $cookie_qos_token_set { } map $http_user_agent $approved_scraper { - default ''; # Not approved - '~^JOSM\/' 'JOSM'; - '~^Mozilla\/5\.0\ QGIS\/' 'QGIS'; + default 0; # Not approved + '~^JOSM\/' 1; # JOSM + '~^Mozilla\/5\.0\ QGIS\/' 1; # QGIS +} + +map $http_user_agent $denied_scraper { + default 0; # Not denied + '~^Python\-urllib\/' 1; # Library Default + '~^python\-requests\/' 1; # Library Default + '~^node\-fetch\/' 1; # Library Default + '~^R$' 1; # Library Default + '~^Java\/' 1; # Library Default + '~^tiles$' 1; # Library Default + '~^Dalvik\/' 1; # Library Default + '~^runtastic' 1; # App + 'Mozilla/4.0' 1; # Fake + 'Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1)' 1; # Fake +} + +map $http_referer $denied_referer { + default 0; # Not denied + 'http://www.openstreetmap.org/' 1; # Faked + 'http://www.openstreetmap.org' 1; # Faked + 'http://openstreetmap.org/' 1; # Faked + 'http://openstreetmap.org' 1; # Faked + 'http://www.osm.org/' 1; # Faked + 'http://www.osm.org' 1; # Faked + 'http://osm.org/' 1; # Faked + 'http://osm.org' 1; # Faked } # Limit Cache-Control header to only approved User-Agents @@ -61,6 +101,8 @@ server { proxy_connect_timeout 5s; + # Preserve host header. + proxy_set_header Host $host; # Do not pass cookies to backends. proxy_set_header Cookie ''; # Do not pass Accept-Encoding to backends. @@ -85,7 +127,16 @@ server { # Allow Higher Traffic Rate from Approved User-Agents which do not support cookies (uses nginx Map) if ($approved_scraper) { - set $limit_rate 32768; + set $limit_rate 65536; + } + + if ($denied_scraper) { + set $limit_rate 512; + return 429; + } + if ($denied_referer) { + set $limit_rate 512; + return 418; } # Strip any ?query parameters from urls @@ -96,11 +147,3 @@ server { proxy_set_header Pragma $limit_http_pragma; } } - -# Convert all http requests to https -server { - listen 80 default_server; - listen [::]:80 default_server; - server_name _; - return 301 https://$host$request_uri; -}