Jump to content

Nginx 1.9.2 / PrestaPricing / 450 not allowed


Recommended Posts

Bonjour à tous,

 

J'utilise le module prestapricing via un serveur nginx et lors de la connexion via l'application, j'obtiens : 

 

18:54:17:06 HTTP connection request result:: HTTP/1.1 405 Not Allowed<\r><\n>Server: nginx centminmod<\r><\n>Date: Thu, 16 Jul 2015 16:54:17 GMT<\r><\n>Content-Type: text/html; charset=utf-8<\r><\n>Content-Length: 166<\r><\n>Connection: keep-alive<\r><\n><\r><\n>

 

Des utilisateurs confrontés à ce type de problème ?

Link to comment
Share on other sites


# redirect from non-www to www 

# uncomment, save file and restart Nginx to enable

server {

            listen   80;

            server_name xx.xx.fr;

            rewrite ^ https://$host$request_uri? permanent;

#return 302 https://$server_name$request_uri;

       }

 

 

server {

 

 

  listen 443 ssl spdy;

   

server_name xx.xx.fr;

ssl_dhparam /usr/local/nginx/conf/ssl/xx.xx.fr/dhparam.pem;

ssl_certificate /usr/local/nginx/conf/ssl/xx.xx.fr/xx_fr-unified.crt;

ssl_certificate_key /usr/local/nginx/conf/ssl/xx.xx.fr/xx_fr.key;

 

 

ssl_protocols TLSv1 TLSv1.1 TLSv1.2;

        ssl_session_cache      shared:SSL:10m;

        ssl_session_timeout  10m;

        ssl_ciphers ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-DSS-AES128-GCM-SHA256:kEDH+AESGCM:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA:ECDHE-ECDSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-DSS-AES128-SHA256:DHE-RSA-AES256-SHA256:DHE-DSS-AES256-SHA:DHE-RSA-AES256-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:AES:CAMELLIA:DES-CBC3-SHA:!aNULL:!eNULL:!EXPORT:!DES:!RC4:!MD5:!PSK:!aECDH:!EDH-DSS-DES-CBC3-SHA:!EDH-RSA-DES-CBC3-SHA:!KRB5-DES-CBC3-SHA:!CAMELLIA;

        ssl_prefer_server_ciphers   on;

add_header Alternate-Protocol  443:npn-spdy/3;

        add_header Strict-Transport-Security "max-age=31536000";

 

 

 

 

# enable ocsp stapling

        resolver 8.8.8.8;

        ssl_stapling on;

        ssl_stapling_verify on;

        ssl_trusted_certificate /usr/local/nginx/conf/ssl/xx.xx.fr/ssl-trusted.crt;

 

 

index index.html index.htm index.php;

charset utf-8;

 

 

        rewrite ^/api/?(.*)$ /webservice/dispatcher.php?url=$1 last;

        rewrite ^/([0-9])(\-[_a-zA-Z0-9-]*)?(-[0-9]+)?/.+\.jpg$ /img/p/$1/$1$2$3.jpg last;

        rewrite ^/([0-9])([0-9])(\-[_a-zA-Z0-9-]*)?(-[0-9]+)?/.+\.jpg$ /img/p/$1/$2/$1$2$3$4.jpg last;

        rewrite ^/([0-9])([0-9])([0-9])(\-[_a-zA-Z0-9-]*)?(-[0-9]+)?/.+\.jpg$ /img/p/$1/$2/$3/$1$2$3$4$5.jpg last;

        rewrite ^/([0-9])([0-9])([0-9])([0-9])(\-[_a-zA-Z0-9-]*)?(-[0-9]+)?/.+\.jpg$ /img/p/$1/$2/$3/$4/$1$2$3$4$5$6.jpg last;

        rewrite ^/([0-9])([0-9])([0-9])([0-9])([0-9])(\-[_a-zA-Z0-9-]*)?(-[0-9]+)?/.+\.jpg$ /img/p/$1/$2/$3/$4/$5/$1$2$3$4$5$6$7.jpg last;

        rewrite ^/([0-9])([0-9])([0-9])([0-9])([0-9])([0-9])(\-[_a-zA-Z0-9-]*)?(-[0-9]+)?/.+\.jpg$ /img/p/$1/$2/$3/$4/$5/$6/$1$2$3$4$5$6$7$8.jpg last;

        rewrite ^/([0-9])([0-9])([0-9])([0-9])([0-9])([0-9])([0-9])(\-[_a-zA-Z0-9-]*)?(-[0-9]+)?/.+\.jpg$ /img/p/$1/$2/$3/$4/$5/$6/$7/$1$2$3$4$5$6$7$8$9.jpg last;

        rewrite ^/([0-9])([0-9])([0-9])([0-9])([0-9])([0-9])([0-9])([0-9])(\-[_a-zA-Z0-9-]*)?(-[0-9]+)?/.+\.jpg$ /img/p/$1/$2/$3/$4/$5/$6/$7/$8/$1$2$3$4$5$6$7$8$9$10.jpg last;

        rewrite ^/c/([0-9]+)(\-[\.*_a-zA-Z0-9-]*)(-[0-9]+)?/.+\.jpg$ /img/c/$1$2$3.jpg last;

        rewrite ^/c/([a-zA-Z_-]+)(-[0-9]+)?/.+\.jpg$ /img/c/$1$2.jpg last;

        rewrite ^/images_ie/?([^/]+)\.(jpe?g|png|gif)$ /js/jquery/plugins/fancybox/images/$1.$2 last;

rewrite ^/order$ /index.php?controller=order last;

        if (!-e $request_filename){

        rewrite ^(.*)$ /index.php last;

    }

 

 

    # Redirect needed to "hide" index.php

 

 

 

 

# ngx_pagespeed & ngx_pagespeed handler

include /usr/local/nginx/conf/pagespeed.conf;

include /usr/local/nginx/conf/pagespeedhandler.conf;

include /usr/local/nginx/conf/pagespeedstatslog.conf;

 

 

# limit_conn limit_per_ip 16;

# ssi  on;

 

 

 access_log /home/nginx/domains/xx.xx.fr/log/access.log combined buffer=32k;

 error_log /home/nginx/domains/xx.xx.fr/log/error.log;

 

 

root /home/nginx/domains/xx.xx.fr/public;

 

 

location / {

 

 

try_files $uri $uri/ /index.php?q=$uri&$args;

error_page 405 =200 $uri;

root /home/nginx/domains/xx.xx.fr/public;

 

 

# block common exploits, sql injections etc

#include /usr/local/nginx/conf/block.conf;

 

 

# Enables directory listings when index file not found

#autoindex  on;

 

 

# Shows file listing times as local time

#autoindex_localtime on;

 

 

# Enable for vBulletin usage WITHOUT vbSEO installed

#try_files $uri $uri/ /index.php;

 

 

  }

 

 

location /c {

    rewrite ^/c/([0-9]+)(\-[\.*_a-zA-Z0-9-]*)(-[0-9]+)?/.+\.jpg$ /img/p/$1$2$3.jpg last;

    rewrite ^/c/([a-zA-Z_-]+)(-[0-9]+)?/.+\.jpg$ /img/p/$1$2.jpg last;

  }

 

 

location /p {

    rewrite ^/p/([0-9]+)(\-[\.*_a-zA-Z0-9-]*)(-[0-9]+)?/.+\.jpg$ /img/p/$1$2$3.jpg last;

    rewrite ^/p/([a-zA-Z_-]+)(-[0-9]+)?/.+\.jpg$ /img/p/$1$2.jpg last;

  }

 

 

location /images_ie {

    rewrite ^/images_ie/?([^/]+)\.(jpe?g|png|gif)$ /js/jquery/plugins/fancybox/images/$1.$2 last;

  }

 

 

# Don't log robots.txt or favicon.ico files

location ~* ^/(favicon.ico|robots.txt)$ {

access_log off;

log_not_found off;

  }

# Custom 404 page

error_page 404 /index.php?controller=404;

 

 

location ~* ^.+.(gif|jpg|jpeg|png|wmv|avi|mpg|mpeg|mp4|htm|html|js|css|mp3|swf|ico|flv|xml) {

access_log off;

expires 30d;

  }

 

 

# Deny access to .htaccess

location ~ /\.ht {

deny all;

  }

 

 

# Block everything else in these directories

location ~ ^/img/cms/ {

deny all;

  }  

 

 

# Block everything else in these directories

location ~ ^/(adminxx/backups|adminxx/export|adminxx/import|adminxx/tabs|classes|config|docs|download|localization|log|override|tools|translations)/ {

deny all;

  }

  

# Block all files with these extensions

location ~ \.(md|tpl)$ {

deny all;

 

 

}

# Directories explicitly allowed in directories blocked below

location ~ ^/docs/csv_import/ {

allow all;

}

  

  include /usr/local/nginx/conf/staticfiles.conf;

  include /usr/local/nginx/conf/php.conf;

  include /usr/local/nginx/conf/drop.conf;

  #include /usr/local/nginx/conf/errorpage.conf;

}

Link to comment
Share on other sites

Create an account or sign in to comment

You need to be a member in order to leave a comment

Create an account

Sign up for a new account in our community. It's easy!

Register a new account

Sign in

Already have an account? Sign in here.

Sign In Now
×
×
  • Create New...