diff --git a/caddy/Caddyfile b/caddy/Caddyfile index c272ce6..30467b9 100644 --- a/caddy/Caddyfile +++ b/caddy/Caddyfile @@ -105,40 +105,27 @@ gregknoppcpa.bayarea-cc.com { iitwelders.bayarea-cc.com { encode zstd gzip - # Reverse-Proxy auf das geogeblockte Ziel - reverse_proxy https://iitwelders.com { - # Origin-Host/SNI korrekt setzen, damit kein Redirect mehr zurück kommt - header_up Host iitwelders.com - header_up X-Forwarded-Host {host} - header_up X-Forwarded-Proto {scheme} - header_up X-Forwarded-For {remote_host} - header_up Accept-Encoding identity - - transport http { - tls_server_name iitwelders.com - } - - # Falls der Origin doch mal absolute Redirects schickt: - # Location-Header auf Proxy-Domain mappen (einfacher Standardfall) - header_down Location https://iitwelders.bayarea-cc.com{uri} - } - - # --- Body-Rewriting: harte Links im HTML/CSS/JS umbiegen --- - # HTML @html header Content-Type text/html* replace_response @html { s "https://iitwelders.com" "https://iitwelders.bayarea-cc.com" s "//iitwelders.com" "//iitwelders.bayarea-cc.com" } - # CSS/JS/JSON (falls dort absolute URLs vorkommen) @assets header Content-Type text/css* text/javascript* application/javascript* application/json* replace_response @assets { s "https://iitwelders.com" "https://iitwelders.bayarea-cc.com" s "//iitwelders.com" "//iitwelders.bayarea-cc.com" } - # Healthcheck (optional) + reverse_proxy https://iitwelders.com { + header_up Host iitwelders.com + header_up Accept-Encoding identity + transport http { + tls_server_name iitwelders.com + } + header_down Location https://iitwelders.bayarea-cc.com{uri} + } + @health path /_health respond @health "ok" 200 } diff --git a/caddy/docker-compose.yml b/caddy/docker-compose.yml index 175d2b5..ed0680a 100644 --- a/caddy/docker-compose.yml +++ b/caddy/docker-compose.yml @@ -1,6 +1,6 @@ services: caddy: - image: custom-caddy:2.9.1 + image: custom-caddy:2.9.1-rr1 build: context: . dockerfile: Dockerfile.caddy