-
-
Save davewongillies/6897161 to your computer and use it in GitHub Desktop.
Revisions
-
davewongillies revised this gist
Oct 9, 2013 . 1 changed file with 0 additions and 2 deletions.There are no files selected for viewing
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters. Learn more about bidirectional Unicode charactersOriginal file line number Diff line number Diff line change @@ -1,5 +1,3 @@ Configuring Nginx to serve SSL content is straight forward, once you have your certificate and key ready: ``` server { -
davewongillies renamed this gist
Oct 9, 2013 . 1 changed file with 0 additions and 0 deletions.There are no files selected for viewing
File renamed without changes. -
davewongillies renamed this gist
Oct 9, 2013 . 1 changed file with 2 additions and 0 deletions.There are no files selected for viewing
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters. Learn more about bidirectional Unicode charactersOriginal file line number Diff line number Diff line change @@ -1,3 +1,5 @@ Serving Django apps behind SSL with Nginx ==================== Configuring Nginx to serve SSL content is straight forward, once you have your certificate and key ready: ``` server { -
davewongillies revised this gist
Oct 9, 2013 . 1 changed file with 1 addition and 1 deletion.There are no files selected for viewing
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters. Learn more about bidirectional Unicode charactersOriginal file line number Diff line number Diff line change @@ -28,7 +28,7 @@ But you will find, as I did, that Django makes redirections from https to http U When Django does a redirection, it composes an absolute URI based on the one in the request object. And the request object uses its method `build_absolute_uri()` to make this URI, which in turn calls another `HttpRequest` method, `is_secure()`, to check whether to use http or https. OK, that was all an intro. The interesting bit I want to share is that this `is_secure()` method works differently under Django 1.3 or 1.4. Under 1.3 it only checks whether an environment variable named "https" exists and its value is "on": ``` def is_secure(self): return os.environ.get("HTTPS") == "on" -
davewongillies revised this gist
Oct 9, 2013 . 1 changed file with 3 additions and 3 deletions.There are no files selected for viewing
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters. Learn more about bidirectional Unicode charactersOriginal file line number Diff line number Diff line change @@ -24,9 +24,9 @@ server { } ``` But you will find, as I did, that Django makes redirections from https to http URLs when you use an `HttpResponseRedirect` object. When Django does a redirection, it composes an absolute URI based on the one in the request object. And the request object uses its method `build_absolute_uri()` to make this URI, which in turn calls another `HttpRequest` method, `is_secure()`, to check whether to use http or https. OK, that was all an intro. The interesting bit I want to share is that this is_secure() method works differently under Django 1.3 or 1.4. Under 1.3 it only checks whether an environment variable named "https" exists and its value is "on": ``` @@ -35,7 +35,7 @@ def is_secure(self): ``` So if you want to make sure you serve secure URLs all the way, you need to setup that environment var. But under 1.4 it does another check before doing that one. It looks for the HTTP header `X-Forwarded-Proto`, and if it is present, it returns True (https request). This header has to be added to in the Nginx configuration for the secure server so it is passed to gunicorn: ``` location / { proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for; -
davewongillies revised this gist
Oct 9, 2013 . 1 changed file with 1 addition and 1 deletion.There are no files selected for viewing
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters. Learn more about bidirectional Unicode charactersOriginal file line number Diff line number Diff line change @@ -41,7 +41,7 @@ location / { proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for; proxy_set_header Host $http_host; proxy_redirect off; proxy_set_header X-Forwarded-Proto $scheme proxy_pass http://unix:/sourcepath/run/app.sock; } ``` -
davewongillies revised this gist
Oct 9, 2013 . 1 changed file with 5 additions and 2 deletions.There are no files selected for viewing
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters. Learn more about bidirectional Unicode charactersOriginal file line number Diff line number Diff line change @@ -41,7 +41,10 @@ location / { proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for; proxy_set_header Host $http_host; proxy_redirect off; proxy_set_header X-Forwarded-Proto https; proxy_pass http://unix:/sourcepath/run/app.sock; } ``` NB X-Forwarded-Proto === I've wasted hours of my life trying to figure out why `X-Forwarded-Protocol` didn't work. Well its because at some point in time, either it worked or the collective consciousness of the Internet got it wrong and perpetuated this incorrect information. The correct `proxy_set_header` is in fact `X-Forwarded-Proto`. Hopefully this tidbit will save you from wasting hours of your life like I did. -
davewongillies revised this gist
Oct 9, 2013 . 1 changed file with 2 additions and 1 deletion.There are no files selected for viewing
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters. Learn more about bidirectional Unicode charactersOriginal file line number Diff line number Diff line change @@ -36,7 +36,8 @@ def is_secure(self): So if you want to make sure you serve secure URLs all the way, you need to setup that environment var. But under 1.4 it does another check before doing that one. It looks for the HTTP header X-Forwarded-Protocol, and if it is present, it returns True (https request). This header has to be added to in the Ningx configuration for the secure server so it is passed to gunicorn: ``` location / { proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for; proxy_set_header Host $http_host; proxy_redirect off; -
davewongillies revised this gist
Oct 9, 2013 . 1 changed file with 5 additions and 4 deletions.There are no files selected for viewing
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters. Learn more about bidirectional Unicode charactersOriginal file line number Diff line number Diff line change @@ -29,17 +29,18 @@ But you will find, as I did, that Django makes redirections from https to http U When Django does a redirection, it composes an absolute URI based on the one in the request object. And the request object uses its method build_absolute_uri() to make this URI, which in turn calls another HttpRequest method, is_secure(), to check whether to use http or https. OK, that was all an intro. The interesting bit I want to share is that this is_secure() method works differently under Django 1.3 or 1.4. Under 1.3 it only checks whether an environment variable named "https" exists and its value is "on": ``` def is_secure(self): return os.environ.get("HTTPS") == "on" ``` So if you want to make sure you serve secure URLs all the way, you need to setup that environment var. But under 1.4 it does another check before doing that one. It looks for the HTTP header X-Forwarded-Protocol, and if it is present, it returns True (https request). This header has to be added to in the Ningx configuration for the secure server so it is passed to gunicorn: ```location / { proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for; proxy_set_header Host $http_host; proxy_redirect off; proxy_set_header X-Forwarded-Protocol https; proxy_pass http://unix:/sourcepath/run/app.sock; } ``` -
davewongillies revised this gist
Oct 9, 2013 . 1 changed file with 2 additions and 2 deletions.There are no files selected for viewing
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters. Learn more about bidirectional Unicode charactersOriginal file line number Diff line number Diff line change @@ -1,5 +1,5 @@ Configuring Nginx to serve SSL content is straight forward, once you have your certificate and key ready: ``` server { listen 443 default ssl; root /path/to/source; @@ -22,7 +22,7 @@ server { } } ``` But you will find, as I did, that Django makes redirections from https to http URLs when you use an HttpResponseRedirect object. -
AJ revised this gist
Aug 3, 2012 . 1 changed file with 18 additions and 2 deletions.There are no files selected for viewing
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters. Learn more about bidirectional Unicode charactersOriginal file line number Diff line number Diff line change @@ -24,6 +24,22 @@ server { } </code> But you will find, as I did, that Django makes redirections from https to http URLs when you use an HttpResponseRedirect object. When Django does a redirection, it composes an absolute URI based on the one in the request object. And the request object uses its method build_absolute_uri() to make this URI, which in turn calls another HttpRequest method, is_secure(), to check whether to use http or https. OK, that was all an intro. The interesting bit I want to share is that this is_secure() method works differently under Django 1.3 or 1.4. Under 1.3 it only checks whether an environment variable named "https" exists and its value is "on": def is_secure(self): return os.environ.get("HTTPS") == "on" So if you want to make sure you serve secure URLs all the way, you need to setup that environment var. But under 1.4 it does another check before doing that one. It looks for the HTTP header X-Forwarded-Protocol, and if it is present, it returns True (https request). This header has to be added to in the Ningx configuration for the secure server so it is passed to gunicorn: location / { proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for; proxy_set_header Host $http_host; proxy_redirect off; proxy_set_header X-Forwarded-Protocol https; proxy_pass http://unix:/sourcepath/run/app.sock; } -
AJ revised this gist
Aug 1, 2012 . 1 changed file with 6 additions and 2 deletions.There are no files selected for viewing
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters. Learn more about bidirectional Unicode charactersOriginal file line number Diff line number Diff line change @@ -1,4 +1,4 @@ Configuring Nginx to serve SSL content is straight forward, once you have your certificate and key ready: <code> server { listen 443 default ssl; @@ -22,4 +22,8 @@ server { } } </code> But you will find, as I did, that Django makes redirections from secured to unsecured URLs when it calls an HttpResponseRedirect object. This happens because the HttpResponseRedirect code uses -
AJ created this gist
Aug 1, 2012 .There are no files selected for viewing
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters. Learn more about bidirectional Unicode charactersOriginal file line number Diff line number Diff line change @@ -0,0 +1,25 @@ Configuring Nginx to server SSL content is straight forward, once you have your certificate and key ready: <code> server { listen 443 default ssl; root /path/to/source; server_name mydomain; ssl_certificate /path/to/cert; ssl_certificate_key /path/to/key; client_max_body_size 10M; access_log /var/log/nginx/alog.log; error_log /var/log/nginx/elog.log; location / { proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for; proxy_set_header Host $http_host; proxy_redirect off; proxy_pass http://unix:/sourcepath/run/app.sock; } } </code>