Skip to content
Projects
Groups
Snippets
Help
This project
Loading...
Sign in / Register
Toggle navigation
C
configuration
Overview
Overview
Details
Activity
Cycle Analytics
Repository
Repository
Files
Commits
Branches
Tags
Contributors
Graph
Compare
Charts
Issues
0
Issues
0
List
Board
Labels
Milestones
Merge Requests
0
Merge Requests
0
CI / CD
CI / CD
Pipelines
Jobs
Schedules
Charts
Wiki
Wiki
Snippets
Snippets
Members
Members
Collapse sidebar
Close sidebar
Activity
Graph
Charts
Create a new issue
Jobs
Commits
Issue Boards
Open sidebar
OpenEdx
configuration
Commits
92ac20ad
Commit
92ac20ad
authored
8 years ago
by
Kevin Falcone
Committed by
GitHub
8 years ago
Browse files
Options
Browse Files
Download
Plain Diff
Merge pull request #2947 from open-craft/ekolpakov/insights_ssl
Enabling SSL for insights
parents
12936481
a397c586
Hide whitespace changes
Inline
Side-by-side
Showing
2 changed files
with
10 additions
and
0 deletions
+10
-0
playbooks/roles/insights/defaults/main.yml
+1
-0
playbooks/roles/nginx/templates/edx/app/nginx/sites-available/insights.j2
+9
-0
No files found.
playbooks/roles/insights/defaults/main.yml
View file @
92ac20ad
...
...
@@ -127,6 +127,7 @@ INSIGHTS_CONFIG:
INSIGHTS_NEWRELIC_APPNAME
:
"
{{
COMMON_ENVIRONMENT
}}-{{
COMMON_DEPLOYMENT
}}-analytics-api"
INSIGHTS_PIP_EXTRA_ARGS
:
"
-i
{{
COMMON_PYPI_MIRROR_URL
}}"
INSIGHTS_NGINX_PORT
:
"
18110"
INSIGHTS_NGINX_SSL_PORT
:
"
18113"
INSIGHTS_GUNICORN_WORKERS
:
"
2"
INSIGHTS_GUNICORN_EXTRA
:
"
"
INSIGHTS_COURSE_API_URL
:
"
{{
INSIGHTS_LMS_BASE
}}/api/course_structure/v0/"
...
...
This diff is collapsed.
Click to expand it.
playbooks/roles/nginx/templates/edx/app/nginx/sites-available/insights.j2
View file @
92ac20ad
...
...
@@ -7,6 +7,15 @@ upstream insights_app_server {
server {
listen {{ INSIGHTS_NGINX_PORT }} default_server;
{% if NGINX_ENABLE_SSL %}
listen {{ INSIGHTS_NGINX_SSL_PORT }} ssl;
ssl_certificate /etc/ssl/certs/{{ NGINX_SSL_CERTIFICATE|basename }};
ssl_certificate_key /etc/ssl/private/{{ NGINX_SSL_KEY|basename }};
# request the browser to use SSL for all connections
add_header Strict-Transport-Security "max-age=31536000; includeSubDomains";
{% endif %}
location ~ ^/static/(?P<file>.*) {
root {{ COMMON_DATA_DIR }}/{{ insights_service_name }};
try_files /staticfiles/$file =404;
...
...
This diff is collapsed.
Click to expand it.
Write
Preview
Markdown
is supported
0%
Try again
or
attach a new file
Attach a file
Cancel
You are about to add
0
people
to the discussion. Proceed with caution.
Finish editing this message first!
Cancel
Please
register
or
sign in
to comment