Skip to content
Snippets Groups Projects
Commit 5f451c13 authored by nimrod's avatar nimrod
Browse files

Nginx: Set the file type in Vim.

parent 0ae42b8d
No related branches found
No related tags found
No related merge requests found
Showing
with 20 additions and 0 deletions
# vim: ft=nginx
server { server {
listen 80 default_server; listen 80 default_server;
listen [::]:80 default_server; listen [::]:80 default_server;
......
# vim: ft=nginx
# The resolver for the Docker network. # The resolver for the Docker network.
resolver 127.0.0.11 valid=30s; resolver 127.0.0.11 valid=30s;
gzip on; gzip on;
......
# vim: ft=nginx
server { server {
listen 80; listen 80;
listen [::]:80; listen [::]:80;
......
# vim: ft=nginx
location = /ads.txt { location = /ads.txt {
if ($scheme = http) { if ($scheme = http) {
return 301 https://$host$request_uri; return 301 https://$host$request_uri;
......
# vim: ft=nginx
allow 62.219.131.121; # ns1.shore.co.il allow 62.219.131.121; # ns1.shore.co.il
# vim: ft=nginx
allow 163.172.74.36; # ns4.shore.co.il allow 163.172.74.36; # ns4.shore.co.il
# vim: ft=nginx
allow 127.0.0.0/8; allow 127.0.0.0/8;
allow 10.0.0.0/8; allow 10.0.0.0/8;
allow 192.168.0.0/16; allow 192.168.0.0/16;
......
# vim: ft=nginx
include snippets/allow-ns1.conf; include snippets/allow-ns1.conf;
include snippets/allow-ns4.conf; include snippets/allow-ns4.conf;
include snippets/allow-private-ips.conf; include snippets/allow-private-ips.conf;
# vim: ft=nginx
# add_headers are inherited from previous level if and only if there are no # add_headers are inherited from previous level if and only if there are no
# add_header directives defined on the current level. So any time there's an # add_header directives defined on the current level. So any time there's an
# add_header directive there should be an `include snippets/common-headers.conf` # add_header directive there should be an `include snippets/common-headers.conf`
......
# vim: ft=nginx
auth_request /validate; auth_request /validate;
location = /validate { location = /validate {
......
# vim: ft=nginx
proxy_set_header X-Forwarded-Host $host; proxy_set_header X-Forwarded-Host $host;
proxy_set_header X-Forwarded-Proto $scheme; proxy_set_header X-Forwarded-Proto $scheme;
proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for; proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for;
......
# vim: ft=nginx
proxy_ssl_verify on; proxy_ssl_verify on;
proxy_ssl_verify_depth 3; proxy_ssl_verify_depth 3;
proxy_ssl_name auth.shore.co.il; proxy_ssl_name auth.shore.co.il;
......
# vim: ft=nginx
location / { return 301 https://$host$request_uri; } location / { return 301 https://$host$request_uri; }
# vim: ft=nginx
location / { return 301 https://www.$host$request_uri; } location / { return 301 https://www.$host$request_uri; }
# vim: ft=nginx
location = /robots.txt { location = /robots.txt {
add_header Content-Type "text/plain; charset=utf-8"; add_header Content-Type "text/plain; charset=utf-8";
return 200 "User-agent: *\nDisallow:\n"; return 200 "User-agent: *\nDisallow:\n";
......
# vim: ft=nginx
location = /robots.txt { location = /robots.txt {
add_header Content-Type "text/plain; charset=utf-8"; add_header Content-Type "text/plain; charset=utf-8";
return 200 "User-agent: *\nDisallow: *\n"; return 200 "User-agent: *\nDisallow: *\n";
......
# vim: ft=nginx
location = /.well-known/security.txt { location = /.well-known/security.txt {
if ($scheme = http) { if ($scheme = http) {
return 301 https://$host$request_uri; return 301 https://$host$request_uri;
......
# vim: ft=nginx
add_header Strict-Transport-Security "max-age=31536000; includeSubDomains; preload"; add_header Strict-Transport-Security "max-age=31536000; includeSubDomains; preload";
add_header Expect-CT "max-age=86400, enforce, report-uri=\"https://www.shore.co.il/about\""; add_header Expect-CT "max-age=86400, enforce, report-uri=\"https://www.shore.co.il/about\"";
include snippets/common-headers.conf; include snippets/common-headers.conf;
......
# vim: ft=nginx
if ($http_Upgrade-Insecure-Requests = 1) { return 301 https://$host$request_uri; } if ($http_Upgrade-Insecure-Requests = 1) { return 301 https://$host$request_uri; }
# vim: ft=nginx
# send all requests to the `/validate` endpoint for authorization # send all requests to the `/validate` endpoint for authorization
auth_request /validate; auth_request /validate;
......
0% Loading or .
You are about to add 0 people to the discussion. Proceed with caution.
Please register or to comment