mirror of
https://github.com/KeyZox71/knl_meowscendence.git
synced 2025-10-13 18:44:45 +02:00
「🔨」 fix: should be good to go
This commit is contained in:
@ -9,38 +9,6 @@ include:
|
||||
- ./api-base/compose.yml
|
||||
- ./ELK/compose.yml
|
||||
|
||||
services:
|
||||
proxy:
|
||||
container_name: transcendence-proxy
|
||||
build:
|
||||
dockerfile: docker/proxy/Dockerfile
|
||||
context: ../
|
||||
volumes:
|
||||
- log-nginx:/var/log/front
|
||||
environment:
|
||||
- TZ=Europe/Paris
|
||||
depends_on:
|
||||
user-api:
|
||||
condition: service_started
|
||||
auth-api:
|
||||
condition: service_started
|
||||
networks:
|
||||
- front
|
||||
- traefik-back
|
||||
restart: unless-stopped
|
||||
healthcheck:
|
||||
disable: true
|
||||
labels:
|
||||
- traefik.enable=true
|
||||
- traefik.docker.network=traefik-back
|
||||
|
||||
- traefik.http.routers.trans.rule=Host(`trans.kanel.ovh`)
|
||||
- traefik.http.routers.trans.entrypoints=websecure
|
||||
- traefik.http.routers.trans.tls=true
|
||||
- traefik.http.routers.trans.tls.certresolver=letsencrypt
|
||||
- traefik.http.routers.trans.service=trans
|
||||
- traefik.http.services.trans.loadbalancer.server.port=80
|
||||
|
||||
networks:
|
||||
traefik-back:
|
||||
external: true
|
||||
|
@ -1,11 +1,9 @@
|
||||
services:
|
||||
front:
|
||||
container_name: transcendence-front
|
||||
proxy:
|
||||
container_name: transcendence-proxy
|
||||
build:
|
||||
dockerfile: docker/proxy/Dockerfile.prod
|
||||
context: ../../
|
||||
ports:
|
||||
- ${OUT_PORT}:443
|
||||
volumes:
|
||||
- log-nginx:/var/log/front
|
||||
environment:
|
||||
@ -17,4 +15,21 @@ services:
|
||||
condition: service_started
|
||||
networks:
|
||||
- front
|
||||
- traefik-back
|
||||
restart: unless-stopped
|
||||
healthcheck:
|
||||
disable: true
|
||||
labels:
|
||||
- traefik.enable=true
|
||||
- traefik.docker.network=traefik-back
|
||||
|
||||
- traefik.http.routers.trans.rule=Host(`trans.kanel.ovh`)
|
||||
- traefik.http.routers.trans.entrypoints=websecure
|
||||
- traefik.http.routers.trans.tls=true
|
||||
- traefik.http.routers.trans.tls.certresolver=letsencrypt
|
||||
- traefik.http.routers.trans.service=trans
|
||||
- traefik.http.services.trans.loadbalancer.server.port=80
|
||||
|
||||
networks:
|
||||
traefik-back:
|
||||
external: true
|
||||
|
@ -4,6 +4,12 @@ server {
|
||||
|
||||
listen 443 ssl;
|
||||
|
||||
ssl_certificate /etc/nginx/certs/fullchain.pem;
|
||||
ssl_certificate_key /etc/nginx/certs/privkey.pem;
|
||||
|
||||
ssl_protocols TLSv1.2 TLSv1.3;
|
||||
ssl_ciphers HIGH:!aNULL:!MD5;
|
||||
|
||||
modsecurity on;
|
||||
|
||||
add_header X-Frame-Options "SAMEORIGIN" always;
|
||||
@ -40,6 +46,12 @@ server {
|
||||
}
|
||||
}
|
||||
|
||||
server {
|
||||
listen 80;
|
||||
server_name example.com;
|
||||
return 301 https://$host$request_uri;
|
||||
}
|
||||
|
||||
server {
|
||||
listen 8080;
|
||||
location /nginx_status {
|
||||
|
@ -3,14 +3,14 @@ import { readFile } from "fs/promises";
|
||||
|
||||
export const rpc_url = process.env.AVAX_RPC_URL;
|
||||
export const contract_addr = process.env.AVAX_CONTRACT_ADDR;
|
||||
export const owner_priv_key = process.env.AVAX_PRIVATE_KEY;
|
||||
export const owner_priv_key = process.env.AVAX_PRIVATE_KEY || "0x00000000000000000000000000000000000000000000";
|
||||
|
||||
const provider = new ethers.JsonRpcProvider(rpc_url);
|
||||
|
||||
const wallet = new ethers.Wallet(owner_priv_key, provider);
|
||||
|
||||
async function loadContract() {
|
||||
try {
|
||||
const wallet = new ethers.Wallet(owner_priv_key, provider);
|
||||
const contractABI = JSON.parse(await readFile(new URL('../contract/scoreStore.json', import.meta.url)));
|
||||
|
||||
const contract = new ethers.Contract(contract_addr, contractABI, wallet);
|
||||
|
Reference in New Issue
Block a user