From af2a0e8e3ea6863bd0a4c1623bb5ee1ea5b88432 Mon Sep 17 00:00:00 2001 From: Adar Nimrod <nimrod@shore.co.il> Date: Sat, 7 May 2022 12:00:18 +0300 Subject: [PATCH] Set the Vim file type. Prettier editing. --- conf.d/default.conf | 1 + conf.d/global.conf | 1 + conf.d/status.conf | 1 + snippets/ads-txt.conf | 1 + snippets/allow-ns1.conf | 1 + snippets/allow-ns4.conf | 1 + snippets/allow-private-ips.conf | 1 + snippets/allow-shore-ips.conf | 1 + snippets/common-headers.conf | 1 + snippets/ldap-auth.conf | 1 + snippets/matrix-well-known.conf | 1 + snippets/proxy-headers.conf | 1 + snippets/proxy-ssl.conf | 1 + snippets/redirect-https.conf | 1 + snippets/redirect-www.conf | 1 + snippets/robots-allow-all.conf | 1 + snippets/robots-disallow-all.conf | 1 + snippets/security-txt.conf | 1 + snippets/ssl-common.conf | 1 + snippets/ssl-legacy.conf | 1 + snippets/ssl-modern.conf | 1 + snippets/upgrade-secure.conf | 1 + snippets/vouch.conf | 1 + snippets/websockets.conf | 1 + snippets/www-acme-challenge.conf | 1 + 25 files changed, 25 insertions(+) diff --git a/conf.d/default.conf b/conf.d/default.conf index 8d37f41..3fed2c0 100644 --- a/conf.d/default.conf +++ b/conf.d/default.conf @@ -1,3 +1,4 @@ +# vim: ft=nginx server { listen 80 default_server; listen [::]:80 default_server; diff --git a/conf.d/global.conf b/conf.d/global.conf index 608fe8d..b3623a9 100644 --- a/conf.d/global.conf +++ b/conf.d/global.conf @@ -1,3 +1,4 @@ +# vim: ft=nginx # The resolver for the Docker network. resolver 127.0.0.11 valid=30s; gzip on; diff --git a/conf.d/status.conf b/conf.d/status.conf index 6ecb7d8..22dab12 100644 --- a/conf.d/status.conf +++ b/conf.d/status.conf @@ -1,3 +1,4 @@ +# vim: ft=nginx server { listen 80; listen [::]:80; diff --git a/snippets/ads-txt.conf b/snippets/ads-txt.conf index b074c08..acd9b93 100644 --- a/snippets/ads-txt.conf +++ b/snippets/ads-txt.conf @@ -1,3 +1,4 @@ +# vim: ft=nginx location = /ads.txt { if ($scheme = http) { return 301 https://$host$request_uri; diff --git a/snippets/allow-ns1.conf b/snippets/allow-ns1.conf index bdadb24..6cdf88b 100644 --- a/snippets/allow-ns1.conf +++ b/snippets/allow-ns1.conf @@ -1 +1,2 @@ +# vim: ft=nginx allow 62.219.131.121; # ns1.shore.co.il diff --git a/snippets/allow-ns4.conf b/snippets/allow-ns4.conf index 5e39f40..395de01 100644 --- a/snippets/allow-ns4.conf +++ b/snippets/allow-ns4.conf @@ -1 +1,2 @@ +# vim: ft=nginx allow 163.172.74.36; # ns4.shore.co.il diff --git a/snippets/allow-private-ips.conf b/snippets/allow-private-ips.conf index 154262a..5e798a0 100644 --- a/snippets/allow-private-ips.conf +++ b/snippets/allow-private-ips.conf @@ -1,3 +1,4 @@ +# vim: ft=nginx allow 127.0.0.0/8; allow 10.0.0.0/8; allow 192.168.0.0/16; diff --git a/snippets/allow-shore-ips.conf b/snippets/allow-shore-ips.conf index 709b549..8fed410 100644 --- a/snippets/allow-shore-ips.conf +++ b/snippets/allow-shore-ips.conf @@ -1,3 +1,4 @@ +# vim: ft=nginx include snippets/allow-ns1.conf; include snippets/allow-ns4.conf; include snippets/allow-private-ips.conf; diff --git a/snippets/common-headers.conf b/snippets/common-headers.conf index e97cb68..22a7e89 100644 --- a/snippets/common-headers.conf +++ b/snippets/common-headers.conf @@ -1,3 +1,4 @@ +# vim: ft=nginx # add_headers are inherited from previous level if and only if there are no # add_header directives defined on the current level. So any time there's an # add_header directive there should be an `include snippets/common-headers.conf` diff --git a/snippets/ldap-auth.conf b/snippets/ldap-auth.conf index cba7d38..e5c51c8 100644 --- a/snippets/ldap-auth.conf +++ b/snippets/ldap-auth.conf @@ -1,3 +1,4 @@ +# vim: ft=nginx auth_request /validate; location = /validate { diff --git a/snippets/matrix-well-known.conf b/snippets/matrix-well-known.conf index 1962eec..e499bb8 100644 --- a/snippets/matrix-well-known.conf +++ b/snippets/matrix-well-known.conf @@ -1,3 +1,4 @@ +# vim: ft=nginx location = /.well-known/matrix/server { return 200 "{\"m.server\": \"matrix.shore.co.il:443\"}"; } diff --git a/snippets/proxy-headers.conf b/snippets/proxy-headers.conf index e142036..19fe814 100644 --- a/snippets/proxy-headers.conf +++ b/snippets/proxy-headers.conf @@ -1,3 +1,4 @@ +# vim: ft=nginx proxy_set_header X-Forwarded-Host $host; proxy_set_header X-Forwarded-Proto $scheme; proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for; diff --git a/snippets/proxy-ssl.conf b/snippets/proxy-ssl.conf index 547d081..4c17a50 100644 --- a/snippets/proxy-ssl.conf +++ b/snippets/proxy-ssl.conf @@ -1,3 +1,4 @@ +# vim: ft=nginx proxy_ssl_verify on; proxy_ssl_verify_depth 3; proxy_ssl_server_name on; diff --git a/snippets/redirect-https.conf b/snippets/redirect-https.conf index 991d593..28f510e 100644 --- a/snippets/redirect-https.conf +++ b/snippets/redirect-https.conf @@ -1 +1,2 @@ +# vim: ft=nginx location / { return 301 https://$host$request_uri; } diff --git a/snippets/redirect-www.conf b/snippets/redirect-www.conf index 2d89d75..5394062 100644 --- a/snippets/redirect-www.conf +++ b/snippets/redirect-www.conf @@ -1 +1,2 @@ +# vim: ft=nginx location / { return 301 https://www.$host$request_uri; } diff --git a/snippets/robots-allow-all.conf b/snippets/robots-allow-all.conf index 627aee5..81fdd7c 100644 --- a/snippets/robots-allow-all.conf +++ b/snippets/robots-allow-all.conf @@ -1,3 +1,4 @@ +# vim: ft=nginx location = /robots.txt { add_header Content-Type "text/plain; charset=utf-8"; return 200 "User-agent: *\nDisallow:\n"; diff --git a/snippets/robots-disallow-all.conf b/snippets/robots-disallow-all.conf index 03d5031..c5001aa 100644 --- a/snippets/robots-disallow-all.conf +++ b/snippets/robots-disallow-all.conf @@ -1,3 +1,4 @@ +# vim: ft=nginx location = /robots.txt { add_header Content-Type "text/plain; charset=utf-8"; return 200 "User-agent: *\nDisallow: *\n"; diff --git a/snippets/security-txt.conf b/snippets/security-txt.conf index c1f0d21..5ce6a55 100644 --- a/snippets/security-txt.conf +++ b/snippets/security-txt.conf @@ -1,3 +1,4 @@ +# vim: ft=nginx location = /.well-known/security.txt { if ($scheme = http) { return 301 https://$host$request_uri; diff --git a/snippets/ssl-common.conf b/snippets/ssl-common.conf index b8ed307..3f0c270 100644 --- a/snippets/ssl-common.conf +++ b/snippets/ssl-common.conf @@ -1,3 +1,4 @@ +# vim: ft=nginx add_header Strict-Transport-Security "max-age=31536000; includeSubDomains; preload"; add_header Expect-CT "max-age=86400, enforce, report-uri=\"https://www.shore.co.il/about\""; include snippets/common-headers.conf; diff --git a/snippets/ssl-legacy.conf b/snippets/ssl-legacy.conf index 4e569dd..f03f493 100644 --- a/snippets/ssl-legacy.conf +++ b/snippets/ssl-legacy.conf @@ -1,3 +1,4 @@ +# vim: ft=nginx include snippets/ssl-common.conf; ssl_protocols TLSv1 TLSv1.1 TLSv1.2 TLSv1.3; ssl_ciphers !AESCCM:!kRSA:!3DES:!RC4:!DES:!MD5:!aNULL:!NULL:AESGCM+ECDH:ECDH+CHACHA20:AES256+ECDH:AES128:CHACHA20:+SHA1; diff --git a/snippets/ssl-modern.conf b/snippets/ssl-modern.conf index f555122..ea0b317 100644 --- a/snippets/ssl-modern.conf +++ b/snippets/ssl-modern.conf @@ -1,3 +1,4 @@ +# vim: ft=nginx include snippets/ssl-common.conf; ssl_protocols TLSv1.2 TLSv1.3; ssl_ciphers HIGH:!NULL:!AES128:!ARIA128:!CAMELLIA128:!SHA1; diff --git a/snippets/upgrade-secure.conf b/snippets/upgrade-secure.conf index 2abc805..3d1b4e6 100644 --- a/snippets/upgrade-secure.conf +++ b/snippets/upgrade-secure.conf @@ -1 +1,2 @@ +# vim: ft=nginx if ($http_Upgrade-Insecure-Requests = 1) { return 301 https://$host$request_uri; } diff --git a/snippets/vouch.conf b/snippets/vouch.conf index 9571b80..c731657 100644 --- a/snippets/vouch.conf +++ b/snippets/vouch.conf @@ -1,3 +1,4 @@ +# vim: ft=nginx # send all requests to the `/validate` endpoint for authorization auth_request /validate; diff --git a/snippets/websockets.conf b/snippets/websockets.conf index 64b7e37..0f494e9 100644 --- a/snippets/websockets.conf +++ b/snippets/websockets.conf @@ -1,3 +1,4 @@ +# vim: ft=nginx proxy_set_header Upgrade $http_upgrade; proxy_set_header Connection "Upgrade"; proxy_read_timeout 36000s; diff --git a/snippets/www-acme-challenge.conf b/snippets/www-acme-challenge.conf index ba3c0b7..db17b30 100644 --- a/snippets/www-acme-challenge.conf +++ b/snippets/www-acme-challenge.conf @@ -1 +1,2 @@ +# vim: ft=nginx location /.well-known/acme-challenge/ { root /var/www/www.shore.co.il; } -- GitLab