Skip to content
Snippets Groups Projects
Commit 5f451c13 authored by nimrod's avatar nimrod
Browse files

Nginx: Set the file type in Vim.

parent 0ae42b8d
No related branches found
No related tags found
No related merge requests found
Showing
with 20 additions and 0 deletions
# vim: ft=nginx
server {
listen 80 default_server;
listen [::]:80 default_server;
......
# vim: ft=nginx
# The resolver for the Docker network.
resolver 127.0.0.11 valid=30s;
gzip on;
......
# vim: ft=nginx
server {
listen 80;
listen [::]:80;
......
# vim: ft=nginx
location = /ads.txt {
if ($scheme = http) {
return 301 https://$host$request_uri;
......
# vim: ft=nginx
allow 62.219.131.121; # ns1.shore.co.il
# vim: ft=nginx
allow 163.172.74.36; # ns4.shore.co.il
# vim: ft=nginx
allow 127.0.0.0/8;
allow 10.0.0.0/8;
allow 192.168.0.0/16;
......
# vim: ft=nginx
include snippets/allow-ns1.conf;
include snippets/allow-ns4.conf;
include snippets/allow-private-ips.conf;
# vim: ft=nginx
# add_headers are inherited from previous level if and only if there are no
# add_header directives defined on the current level. So any time there's an
# add_header directive there should be an `include snippets/common-headers.conf`
......
# vim: ft=nginx
auth_request /validate;
location = /validate {
......
# vim: ft=nginx
proxy_set_header X-Forwarded-Host $host;
proxy_set_header X-Forwarded-Proto $scheme;
proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for;
......
# vim: ft=nginx
proxy_ssl_verify on;
proxy_ssl_verify_depth 3;
proxy_ssl_name auth.shore.co.il;
......
# vim: ft=nginx
location / { return 301 https://$host$request_uri; }
# vim: ft=nginx
location / { return 301 https://www.$host$request_uri; }
# vim: ft=nginx
location = /robots.txt {
add_header Content-Type "text/plain; charset=utf-8";
return 200 "User-agent: *\nDisallow:\n";
......
# vim: ft=nginx
location = /robots.txt {
add_header Content-Type "text/plain; charset=utf-8";
return 200 "User-agent: *\nDisallow: *\n";
......
# vim: ft=nginx
location = /.well-known/security.txt {
if ($scheme = http) {
return 301 https://$host$request_uri;
......
# vim: ft=nginx
add_header Strict-Transport-Security "max-age=31536000; includeSubDomains; preload";
add_header Expect-CT "max-age=86400, enforce, report-uri=\"https://www.shore.co.il/about\"";
include snippets/common-headers.conf;
......
# vim: ft=nginx
if ($http_Upgrade-Insecure-Requests = 1) { return 301 https://$host$request_uri; }
# vim: ft=nginx
# send all requests to the `/validate` endpoint for authorization
auth_request /validate;
......
0% Loading or .
You are about to add 0 people to the discussion. Proceed with caution.
Please register or to comment