|
|
|
|
1471
|
echo " ssl_ciphers '$SSL_CIPHERS';" >> $filename
|
1471
|
echo " ssl_ciphers '$SSL_CIPHERS';" >> $filename
|
1472
|
}
|
1472
|
}
|
1473
|
|
1473
|
|
|
|
1474
|
+function nginx_disable_sniffing {
|
|
|
1475
|
+ domain_name=$1
|
|
|
1476
|
+ filename=/etc/nginx/sites-available/$domain_name
|
|
|
1477
|
+ echo ' add_header X-Frame-Options DENY;' >> $filename
|
|
|
1478
|
+ echo ' add_header X-Content-Type-Options nosniff;' >> $filename
|
|
|
1479
|
+ echo '' >> $filename
|
|
|
1480
|
+}
|
|
|
1481
|
+
|
1474
|
function set_repo_commit {
|
1482
|
function set_repo_commit {
|
1475
|
repo_dir=$1
|
1483
|
repo_dir=$1
|
1476
|
repo_commit_name=$2
|
1484
|
repo_commit_name=$2
|
|
|
|
|
6502
|
echo ' limit_req zone=req_limit_per_ip burst=10 nodelay;' >> /etc/nginx/sites-available/$OWNCLOUD_DOMAIN_NAME
|
6510
|
echo ' limit_req zone=req_limit_per_ip burst=10 nodelay;' >> /etc/nginx/sites-available/$OWNCLOUD_DOMAIN_NAME
|
6503
|
echo '' >> /etc/nginx/sites-available/$OWNCLOUD_DOMAIN_NAME
|
6511
|
echo '' >> /etc/nginx/sites-available/$OWNCLOUD_DOMAIN_NAME
|
6504
|
nginx_ssl $OWNCLOUD_DOMAIN_NAME
|
6512
|
nginx_ssl $OWNCLOUD_DOMAIN_NAME
|
6505
|
- echo ' add_header X-Frame-Options DENY;' >> /etc/nginx/sites-available/$OWNCLOUD_DOMAIN_NAME
|
|
|
6506
|
- echo ' add_header X-Content-Type-Options nosniff;' >> /etc/nginx/sites-available/$OWNCLOUD_DOMAIN_NAME
|
|
|
|
|
6513
|
+ nginx_disable_sniffing $OWNCLOUD_DOMAIN_NAME
|
6507
|
echo ' add_header Strict-Transport-Security max-age=15768000;' >> /etc/nginx/sites-available/$OWNCLOUD_DOMAIN_NAME
|
6514
|
echo ' add_header Strict-Transport-Security max-age=15768000;' >> /etc/nginx/sites-available/$OWNCLOUD_DOMAIN_NAME
|
6508
|
echo ' # if you want to be able to access the site via HTTP' >> /etc/nginx/sites-available/$OWNCLOUD_DOMAIN_NAME
|
6515
|
echo ' # if you want to be able to access the site via HTTP' >> /etc/nginx/sites-available/$OWNCLOUD_DOMAIN_NAME
|
6509
|
echo ' # then replace the above with the following:' >> /etc/nginx/sites-available/$OWNCLOUD_DOMAIN_NAME
|
6516
|
echo ' # then replace the above with the following:' >> /etc/nginx/sites-available/$OWNCLOUD_DOMAIN_NAME
|
|
|
|
|
6578
|
echo ' limit_conn conn_limit_per_ip 10;' >> /etc/nginx/sites-available/$OWNCLOUD_DOMAIN_NAME
|
6585
|
echo ' limit_conn conn_limit_per_ip 10;' >> /etc/nginx/sites-available/$OWNCLOUD_DOMAIN_NAME
|
6579
|
echo ' limit_req zone=req_limit_per_ip burst=10 nodelay;' >> /etc/nginx/sites-available/$OWNCLOUD_DOMAIN_NAME
|
6586
|
echo ' limit_req zone=req_limit_per_ip burst=10 nodelay;' >> /etc/nginx/sites-available/$OWNCLOUD_DOMAIN_NAME
|
6580
|
echo '' >> /etc/nginx/sites-available/$OWNCLOUD_DOMAIN_NAME
|
6587
|
echo '' >> /etc/nginx/sites-available/$OWNCLOUD_DOMAIN_NAME
|
6581
|
- echo ' add_header X-Frame-Options DENY;' >> /etc/nginx/sites-available/$OWNCLOUD_DOMAIN_NAME
|
|
|
6582
|
- echo ' add_header X-Content-Type-Options nosniff;' >> /etc/nginx/sites-available/$OWNCLOUD_DOMAIN_NAME
|
|
|
|
|
6588
|
+ nginx_disable_sniffing $OWNCLOUD_DOMAIN_NAME
|
6583
|
echo ' add_header Strict-Transport-Security max-age=15768000;' >> /etc/nginx/sites-available/$OWNCLOUD_DOMAIN_NAME
|
6589
|
echo ' add_header Strict-Transport-Security max-age=15768000;' >> /etc/nginx/sites-available/$OWNCLOUD_DOMAIN_NAME
|
6584
|
echo ' # if you want to be able to access the site via HTTP' >> /etc/nginx/sites-available/$OWNCLOUD_DOMAIN_NAME
|
6590
|
echo ' # if you want to be able to access the site via HTTP' >> /etc/nginx/sites-available/$OWNCLOUD_DOMAIN_NAME
|
6585
|
echo ' # then replace the above with the following:' >> /etc/nginx/sites-available/$OWNCLOUD_DOMAIN_NAME
|
6591
|
echo ' # then replace the above with the following:' >> /etc/nginx/sites-available/$OWNCLOUD_DOMAIN_NAME
|
|
|
|
|
6899
|
echo " server_name $GIT_DOMAIN_NAME;" >> /etc/nginx/sites-available/$GIT_DOMAIN_NAME
|
6905
|
echo " server_name $GIT_DOMAIN_NAME;" >> /etc/nginx/sites-available/$GIT_DOMAIN_NAME
|
6900
|
echo ' access_log off;' >> /etc/nginx/sites-available/$GIT_DOMAIN_NAME
|
6906
|
echo ' access_log off;' >> /etc/nginx/sites-available/$GIT_DOMAIN_NAME
|
6901
|
echo " error_log /var/log/nginx/${GIT_DOMAIN_NAME}_error.log $WEBSERVER_LOG_LEVEL;" >> /etc/nginx/sites-available/$GIT_DOMAIN_NAME
|
6907
|
echo " error_log /var/log/nginx/${GIT_DOMAIN_NAME}_error.log $WEBSERVER_LOG_LEVEL;" >> /etc/nginx/sites-available/$GIT_DOMAIN_NAME
|
6902
|
- echo ' add_header X-Frame-Options DENY;' >> /etc/nginx/sites-available/$GIT_DOMAIN_NAME
|
|
|
6903
|
- echo ' add_header X-Content-Type-Options nosniff;' >> /etc/nginx/sites-available/$GIT_DOMAIN_NAME
|
|
|
|
|
6908
|
+ nginx_disable_sniffing $GIT_DOMAIN_NAME
|
6904
|
echo ' limit_conn conn_limit_per_ip 10;' >> /etc/nginx/sites-available/$GIT_DOMAIN_NAME
|
6909
|
echo ' limit_conn conn_limit_per_ip 10;' >> /etc/nginx/sites-available/$GIT_DOMAIN_NAME
|
6905
|
echo ' limit_req zone=req_limit_per_ip burst=10 nodelay;' >> /etc/nginx/sites-available/$GIT_DOMAIN_NAME
|
6910
|
echo ' limit_req zone=req_limit_per_ip burst=10 nodelay;' >> /etc/nginx/sites-available/$GIT_DOMAIN_NAME
|
6906
|
echo ' location / {' >> /etc/nginx/sites-available/$GIT_DOMAIN_NAME
|
6911
|
echo ' location / {' >> /etc/nginx/sites-available/$GIT_DOMAIN_NAME
|
|
|
|
|
6925
|
echo ' limit_req zone=req_limit_per_ip burst=10 nodelay;' >> /etc/nginx/sites-available/$GIT_DOMAIN_NAME
|
6930
|
echo ' limit_req zone=req_limit_per_ip burst=10 nodelay;' >> /etc/nginx/sites-available/$GIT_DOMAIN_NAME
|
6926
|
echo '' >> /etc/nginx/sites-available/$GIT_DOMAIN_NAME
|
6931
|
echo '' >> /etc/nginx/sites-available/$GIT_DOMAIN_NAME
|
6927
|
nginx_ssl $GIT_DOMAIN_NAME
|
6932
|
nginx_ssl $GIT_DOMAIN_NAME
|
6928
|
- echo ' add_header X-Frame-Options DENY;' >> /etc/nginx/sites-available/$GIT_DOMAIN_NAME
|
|
|
6929
|
- echo ' add_header X-Content-Type-Options nosniff;' >> /etc/nginx/sites-available/$GIT_DOMAIN_NAME
|
|
|
|
|
6933
|
+ nginx_disable_sniffing $GIT_DOMAIN_NAME
|
6930
|
echo ' add_header Strict-Transport-Security max-age=0;' >> /etc/nginx/sites-available/$GIT_DOMAIN_NAME
|
6934
|
echo ' add_header Strict-Transport-Security max-age=0;' >> /etc/nginx/sites-available/$GIT_DOMAIN_NAME
|
6931
|
echo '' >> /etc/nginx/sites-available/$GIT_DOMAIN_NAME
|
6935
|
echo '' >> /etc/nginx/sites-available/$GIT_DOMAIN_NAME
|
6932
|
echo ' location / {' >> /etc/nginx/sites-available/$GIT_DOMAIN_NAME
|
6936
|
echo ' location / {' >> /etc/nginx/sites-available/$GIT_DOMAIN_NAME
|
|
|
|
|
6960
|
echo ' limit_conn conn_limit_per_ip 10;' >> /etc/nginx/sites-available/$GIT_DOMAIN_NAME
|
6964
|
echo ' limit_conn conn_limit_per_ip 10;' >> /etc/nginx/sites-available/$GIT_DOMAIN_NAME
|
6961
|
echo ' limit_req zone=req_limit_per_ip burst=10 nodelay;' >> /etc/nginx/sites-available/$GIT_DOMAIN_NAME
|
6965
|
echo ' limit_req zone=req_limit_per_ip burst=10 nodelay;' >> /etc/nginx/sites-available/$GIT_DOMAIN_NAME
|
6962
|
echo '' >> /etc/nginx/sites-available/$GIT_DOMAIN_NAME
|
6966
|
echo '' >> /etc/nginx/sites-available/$GIT_DOMAIN_NAME
|
6963
|
- echo ' add_header X-Frame-Options DENY;' >> /etc/nginx/sites-available/$GIT_DOMAIN_NAME
|
|
|
6964
|
- echo ' add_header X-Content-Type-Options nosniff;' >> /etc/nginx/sites-available/$GIT_DOMAIN_NAME
|
|
|
|
|
6967
|
+ nginx_disable_sniffing $GIT_DOMAIN_NAME
|
6965
|
echo ' add_header Strict-Transport-Security max-age=0;' >> /etc/nginx/sites-available/$GIT_DOMAIN_NAME
|
6968
|
echo ' add_header Strict-Transport-Security max-age=0;' >> /etc/nginx/sites-available/$GIT_DOMAIN_NAME
|
6966
|
echo '' >> /etc/nginx/sites-available/$GIT_DOMAIN_NAME
|
6969
|
echo '' >> /etc/nginx/sites-available/$GIT_DOMAIN_NAME
|
6967
|
echo ' location / {' >> /etc/nginx/sites-available/$GIT_DOMAIN_NAME
|
6970
|
echo ' location / {' >> /etc/nginx/sites-available/$GIT_DOMAIN_NAME
|
|
|
|
|
7661
|
echo ' client_max_body_size 20m;' >> /etc/nginx/sites-available/$WIKI_DOMAIN_NAME
|
7664
|
echo ' client_max_body_size 20m;' >> /etc/nginx/sites-available/$WIKI_DOMAIN_NAME
|
7662
|
echo ' client_body_buffer_size 128k;' >> /etc/nginx/sites-available/$WIKI_DOMAIN_NAME
|
7665
|
echo ' client_body_buffer_size 128k;' >> /etc/nginx/sites-available/$WIKI_DOMAIN_NAME
|
7663
|
echo '' >> /etc/nginx/sites-available/$WIKI_DOMAIN_NAME
|
7666
|
echo '' >> /etc/nginx/sites-available/$WIKI_DOMAIN_NAME
|
7664
|
- echo ' add_header X-Frame-Options DENY;' >> /etc/nginx/sites-available/$WIKI_DOMAIN_NAME
|
|
|
7665
|
- echo ' add_header X-Content-Type-Options nosniff;' >> /etc/nginx/sites-available/$WIKI_DOMAIN_NAME
|
|
|
|
|
7667
|
+ nginx_disable_sniffing $WIKI_DOMAIN_NAME
|
7666
|
echo '' >> /etc/nginx/sites-available/$WIKI_DOMAIN_NAME
|
7668
|
echo '' >> /etc/nginx/sites-available/$WIKI_DOMAIN_NAME
|
7667
|
echo ' limit_conn conn_limit_per_ip 10;' >> /etc/nginx/sites-available/$WIKI_DOMAIN_NAME
|
7669
|
echo ' limit_conn conn_limit_per_ip 10;' >> /etc/nginx/sites-available/$WIKI_DOMAIN_NAME
|
7668
|
echo ' limit_req zone=req_limit_per_ip burst=10 nodelay;' >> /etc/nginx/sites-available/$WIKI_DOMAIN_NAME
|
7670
|
echo ' limit_req zone=req_limit_per_ip burst=10 nodelay;' >> /etc/nginx/sites-available/$WIKI_DOMAIN_NAME
|
|
|
|
|
7745
|
echo ' limit_req zone=req_limit_per_ip burst=10 nodelay;' >> /etc/nginx/sites-available/$WIKI_DOMAIN_NAME
|
7747
|
echo ' limit_req zone=req_limit_per_ip burst=10 nodelay;' >> /etc/nginx/sites-available/$WIKI_DOMAIN_NAME
|
7746
|
echo '' >> /etc/nginx/sites-available/$WIKI_DOMAIN_NAME
|
7748
|
echo '' >> /etc/nginx/sites-available/$WIKI_DOMAIN_NAME
|
7747
|
nginx_ssl $WIKI_DOMAIN_NAME
|
7749
|
nginx_ssl $WIKI_DOMAIN_NAME
|
7748
|
- echo ' add_header X-Frame-Options DENY;' >> /etc/nginx/sites-available/$WIKI_DOMAIN_NAME
|
|
|
7749
|
- echo ' add_header X-Content-Type-Options nosniff;' >> /etc/nginx/sites-available/$WIKI_DOMAIN_NAME
|
|
|
|
|
7750
|
+ nginx_disable_sniffing $WIKI_DOMAIN_NAME
|
7750
|
echo ' add_header Strict-Transport-Security "max-age=0;";' >> /etc/nginx/sites-available/$WIKI_DOMAIN_NAME
|
7751
|
echo ' add_header Strict-Transport-Security "max-age=0;";' >> /etc/nginx/sites-available/$WIKI_DOMAIN_NAME
|
7751
|
echo '' >> /etc/nginx/sites-available/$WIKI_DOMAIN_NAME
|
7752
|
echo '' >> /etc/nginx/sites-available/$WIKI_DOMAIN_NAME
|
7752
|
echo ' # rewrite to front controller as default rule' >> /etc/nginx/sites-available/$WIKI_DOMAIN_NAME
|
7753
|
echo ' # rewrite to front controller as default rule' >> /etc/nginx/sites-available/$WIKI_DOMAIN_NAME
|
|
|
|
|
7829
|
echo ' limit_conn conn_limit_per_ip 10;' >> /etc/nginx/sites-available/$WIKI_DOMAIN_NAME
|
7830
|
echo ' limit_conn conn_limit_per_ip 10;' >> /etc/nginx/sites-available/$WIKI_DOMAIN_NAME
|
7830
|
echo ' limit_req zone=req_limit_per_ip burst=10 nodelay;' >> /etc/nginx/sites-available/$WIKI_DOMAIN_NAME
|
7831
|
echo ' limit_req zone=req_limit_per_ip burst=10 nodelay;' >> /etc/nginx/sites-available/$WIKI_DOMAIN_NAME
|
7831
|
echo '' >> /etc/nginx/sites-available/$WIKI_DOMAIN_NAME
|
7832
|
echo '' >> /etc/nginx/sites-available/$WIKI_DOMAIN_NAME
|
7832
|
- echo ' add_header X-Frame-Options DENY;' >> /etc/nginx/sites-available/$WIKI_DOMAIN_NAME
|
|
|
7833
|
- echo ' add_header X-Content-Type-Options nosniff;' >> /etc/nginx/sites-available/$WIKI_DOMAIN_NAME
|
|
|
|
|
7833
|
+ nginx_disable_sniffing $WIKI_DOMAIN_NAME
|
7834
|
echo ' add_header Strict-Transport-Security "max-age=0;";' >> /etc/nginx/sites-available/$WIKI_DOMAIN_NAME
|
7834
|
echo ' add_header Strict-Transport-Security "max-age=0;";' >> /etc/nginx/sites-available/$WIKI_DOMAIN_NAME
|
7835
|
echo '' >> /etc/nginx/sites-available/$WIKI_DOMAIN_NAME
|
7835
|
echo '' >> /etc/nginx/sites-available/$WIKI_DOMAIN_NAME
|
7836
|
echo ' # rewrite to front controller as default rule' >> /etc/nginx/sites-available/$WIKI_DOMAIN_NAME
|
7836
|
echo ' # rewrite to front controller as default rule' >> /etc/nginx/sites-available/$WIKI_DOMAIN_NAME
|
|
|
|
|
8000
|
echo ' limit_conn conn_limit_per_ip 10;' >> /etc/nginx/sites-available/$FULLBLOG_DOMAIN_NAME
|
8000
|
echo ' limit_conn conn_limit_per_ip 10;' >> /etc/nginx/sites-available/$FULLBLOG_DOMAIN_NAME
|
8001
|
echo ' limit_req zone=req_limit_per_ip burst=10 nodelay;' >> /etc/nginx/sites-available/$FULLBLOG_DOMAIN_NAME
|
8001
|
echo ' limit_req zone=req_limit_per_ip burst=10 nodelay;' >> /etc/nginx/sites-available/$FULLBLOG_DOMAIN_NAME
|
8002
|
echo '' >> /etc/nginx/sites-available/$FULLBLOG_DOMAIN_NAME
|
8002
|
echo '' >> /etc/nginx/sites-available/$FULLBLOG_DOMAIN_NAME
|
8003
|
- echo ' add_header X-Frame-Options DENY;' >> /etc/nginx/sites-available/$FULLBLOG_DOMAIN_NAME
|
|
|
8004
|
- echo ' add_header X-Content-Type-Options nosniff;' >> /etc/nginx/sites-available/$FULLBLOG_DOMAIN_NAME
|
|
|
|
|
8003
|
+ nginx_disable_sniffing $FULLBLOG_DOMAIN_NAME
|
8005
|
echo '' >> /etc/nginx/sites-available/$FULLBLOG_DOMAIN_NAME
|
8004
|
echo '' >> /etc/nginx/sites-available/$FULLBLOG_DOMAIN_NAME
|
8006
|
echo ' # Always redirect the login page to https' >> /etc/nginx/sites-available/$FULLBLOG_DOMAIN_NAME
|
8005
|
echo ' # Always redirect the login page to https' >> /etc/nginx/sites-available/$FULLBLOG_DOMAIN_NAME
|
8007
|
echo ' location /login {' >> /etc/nginx/sites-available/$FULLBLOG_DOMAIN_NAME
|
8006
|
echo ' location /login {' >> /etc/nginx/sites-available/$FULLBLOG_DOMAIN_NAME
|
|
|
|
|
8086
|
echo ' limit_req zone=req_limit_per_ip burst=10 nodelay;' >> /etc/nginx/sites-available/$FULLBLOG_DOMAIN_NAME
|
8085
|
echo ' limit_req zone=req_limit_per_ip burst=10 nodelay;' >> /etc/nginx/sites-available/$FULLBLOG_DOMAIN_NAME
|
8087
|
echo '' >> /etc/nginx/sites-available/$FULLBLOG_DOMAIN_NAME
|
8086
|
echo '' >> /etc/nginx/sites-available/$FULLBLOG_DOMAIN_NAME
|
8088
|
nginx_ssl $FULLBLOG_DOMAIN_NAME
|
8087
|
nginx_ssl $FULLBLOG_DOMAIN_NAME
|
8089
|
- echo ' add_header X-Frame-Options DENY;' >> /etc/nginx/sites-available/$FULLBLOG_DOMAIN_NAME
|
|
|
8090
|
- echo ' add_header X-Content-Type-Options nosniff;' >> /etc/nginx/sites-available/$FULLBLOG_DOMAIN_NAME
|
|
|
|
|
8088
|
+ nginx_disable_sniffing $FULLBLOG_DOMAIN_NAME
|
8091
|
echo ' add_header Strict-Transport-Security "max-age=0;";' >> /etc/nginx/sites-available/$FULLBLOG_DOMAIN_NAME
|
8089
|
echo ' add_header Strict-Transport-Security "max-age=0;";' >> /etc/nginx/sites-available/$FULLBLOG_DOMAIN_NAME
|
8092
|
echo '' >> /etc/nginx/sites-available/$FULLBLOG_DOMAIN_NAME
|
8090
|
echo '' >> /etc/nginx/sites-available/$FULLBLOG_DOMAIN_NAME
|
8093
|
echo ' # rewrite to front controller as default rule' >> /etc/nginx/sites-available/$FULLBLOG_DOMAIN_NAME
|
8091
|
echo ' # rewrite to front controller as default rule' >> /etc/nginx/sites-available/$FULLBLOG_DOMAIN_NAME
|
|
|
|
|
8170
|
echo ' limit_conn conn_limit_per_ip 10;' >> /etc/nginx/sites-available/$FULLBLOG_DOMAIN_NAME
|
8168
|
echo ' limit_conn conn_limit_per_ip 10;' >> /etc/nginx/sites-available/$FULLBLOG_DOMAIN_NAME
|
8171
|
echo ' limit_req zone=req_limit_per_ip burst=10 nodelay;' >> /etc/nginx/sites-available/$FULLBLOG_DOMAIN_NAME
|
8169
|
echo ' limit_req zone=req_limit_per_ip burst=10 nodelay;' >> /etc/nginx/sites-available/$FULLBLOG_DOMAIN_NAME
|
8172
|
echo '' >> /etc/nginx/sites-available/$FULLBLOG_DOMAIN_NAME
|
8170
|
echo '' >> /etc/nginx/sites-available/$FULLBLOG_DOMAIN_NAME
|
8173
|
- echo ' add_header X-Frame-Options DENY;' >> /etc/nginx/sites-available/$FULLBLOG_DOMAIN_NAME
|
|
|
8174
|
- echo ' add_header X-Content-Type-Options nosniff;' >> /etc/nginx/sites-available/$FULLBLOG_DOMAIN_NAME
|
|
|
|
|
8171
|
+ nginx_disable_sniffing $FULLBLOG_DOMAIN_NAME
|
8175
|
echo ' add_header Strict-Transport-Security "max-age=0;";' >> /etc/nginx/sites-available/$FULLBLOG_DOMAIN_NAME
|
8172
|
echo ' add_header Strict-Transport-Security "max-age=0;";' >> /etc/nginx/sites-available/$FULLBLOG_DOMAIN_NAME
|
8176
|
echo '' >> /etc/nginx/sites-available/$FULLBLOG_DOMAIN_NAME
|
8173
|
echo '' >> /etc/nginx/sites-available/$FULLBLOG_DOMAIN_NAME
|
8177
|
echo ' # rewrite to front controller as default rule' >> /etc/nginx/sites-available/$FULLBLOG_DOMAIN_NAME
|
8174
|
echo ' # rewrite to front controller as default rule' >> /etc/nginx/sites-available/$FULLBLOG_DOMAIN_NAME
|
|
|
|
|
8394
|
echo ' deny all;' >> /etc/nginx/sites-available/$RSS_READER_DOMAIN_NAME
|
8391
|
echo ' deny all;' >> /etc/nginx/sites-available/$RSS_READER_DOMAIN_NAME
|
8395
|
echo ' }' >> /etc/nginx/sites-available/$RSS_READER_DOMAIN_NAME
|
8392
|
echo ' }' >> /etc/nginx/sites-available/$RSS_READER_DOMAIN_NAME
|
8396
|
echo '' >> /etc/nginx/sites-available/$RSS_READER_DOMAIN_NAME
|
8393
|
echo '' >> /etc/nginx/sites-available/$RSS_READER_DOMAIN_NAME
|
8397
|
- echo ' add_header X-Frame-Options DENY;' >> /etc/nginx/sites-available/$RSS_READER_DOMAIN_NAME
|
|
|
8398
|
- echo ' add_header X-Content-Type-Options nosniff;' >> /etc/nginx/sites-available/$RSS_READER_DOMAIN_NAME
|
|
|
|
|
8394
|
+ nginx_disable_sniffing $RSS_READER_DOMAIN_NAME
|
8399
|
echo ' client_max_body_size 15m;' >> /etc/nginx/sites-available/$RSS_READER_DOMAIN_NAME
|
8395
|
echo ' client_max_body_size 15m;' >> /etc/nginx/sites-available/$RSS_READER_DOMAIN_NAME
|
8400
|
echo '' >> /etc/nginx/sites-available/$RSS_READER_DOMAIN_NAME
|
8396
|
echo '' >> /etc/nginx/sites-available/$RSS_READER_DOMAIN_NAME
|
8401
|
echo ' set $mobile_rewrite do_not_perform;' >> /etc/nginx/sites-available/$RSS_READER_DOMAIN_NAME
|
8397
|
echo ' set $mobile_rewrite do_not_perform;' >> /etc/nginx/sites-available/$RSS_READER_DOMAIN_NAME
|
|
|
|
|
8660
|
echo '' >> $microblog_nginx_site
|
8656
|
echo '' >> $microblog_nginx_site
|
8661
|
echo ' # Security' >> $microblog_nginx_site
|
8657
|
echo ' # Security' >> $microblog_nginx_site
|
8662
|
nginx_ssl $MICROBLOG_DOMAIN_NAME
|
8658
|
nginx_ssl $MICROBLOG_DOMAIN_NAME
|
8663
|
- echo ' add_header X-Frame-Options DENY;' >> $microblog_nginx_site
|
|
|
8664
|
- echo ' add_header X-Content-Type-Options nosniff;' >> $microblog_nginx_site
|
|
|
|
|
8659
|
+ nginx_disable_sniffing $MICROBLOG_DOMAIN_NAME
|
8665
|
echo ' add_header Strict-Transport-Security max-age=15768000;' >> $microblog_nginx_site
|
8660
|
echo ' add_header Strict-Transport-Security max-age=15768000;' >> $microblog_nginx_site
|
8666
|
echo '' >> $microblog_nginx_site
|
8661
|
echo '' >> $microblog_nginx_site
|
8667
|
echo ' # Logs' >> $microblog_nginx_site
|
8662
|
echo ' # Logs' >> $microblog_nginx_site
|
|
|
|
|
8735
|
echo ' deny all;' >> $microblog_nginx_site
|
8730
|
echo ' deny all;' >> $microblog_nginx_site
|
8736
|
echo ' }' >> $microblog_nginx_site
|
8731
|
echo ' }' >> $microblog_nginx_site
|
8737
|
echo '' >> $microblog_nginx_site
|
8732
|
echo '' >> $microblog_nginx_site
|
8738
|
- echo ' add_header X-Frame-Options DENY;' >> $microblog_nginx_site
|
|
|
8739
|
- echo ' add_header X-Content-Type-Options nosniff;' >> $microblog_nginx_site
|
|
|
|
|
8733
|
+ nginx_disable_sniffing $MICROBLOG_DOMAIN_NAME
|
8740
|
echo ' client_max_body_size 15m;' >> $microblog_nginx_site
|
8734
|
echo ' client_max_body_size 15m;' >> $microblog_nginx_site
|
8741
|
echo '}' >> $microblog_nginx_site
|
8735
|
echo '}' >> $microblog_nginx_site
|
8742
|
|
8736
|
|
|
|
|
|
9124
|
echo ' limit_req zone=req_limit_per_ip burst=10 nodelay;' >> /etc/nginx/sites-available/$HUBZILLA_DOMAIN_NAME
|
9118
|
echo ' limit_req zone=req_limit_per_ip burst=10 nodelay;' >> /etc/nginx/sites-available/$HUBZILLA_DOMAIN_NAME
|
9125
|
echo '' >> /etc/nginx/sites-available/$HUBZILLA_DOMAIN_NAME
|
9119
|
echo '' >> /etc/nginx/sites-available/$HUBZILLA_DOMAIN_NAME
|
9126
|
nginx_ssl $HUBZILLA_DOMAIN_NAME
|
9120
|
nginx_ssl $HUBZILLA_DOMAIN_NAME
|
9127
|
- echo ' add_header X-Frame-Options DENY;' >> /etc/nginx/sites-available/$HUBZILLA_DOMAIN_NAME
|
|
|
9128
|
- echo ' add_header X-Content-Type-Options nosniff;' >> /etc/nginx/sites-available/$HUBZILLA_DOMAIN_NAME
|
|
|
|
|
9121
|
+ nginx_disable_sniffing $HUBZILLA_DOMAIN_NAME
|
9129
|
echo ' add_header Strict-Transport-Security max-age=15768000;' >> /etc/nginx/sites-available/$HUBZILLA_DOMAIN_NAME
|
9122
|
echo ' add_header Strict-Transport-Security max-age=15768000;' >> /etc/nginx/sites-available/$HUBZILLA_DOMAIN_NAME
|
9130
|
echo '' >> /etc/nginx/sites-available/$HUBZILLA_DOMAIN_NAME
|
9123
|
echo '' >> /etc/nginx/sites-available/$HUBZILLA_DOMAIN_NAME
|
9131
|
echo ' # rewrite to front controller as default rule' >> /etc/nginx/sites-available/$HUBZILLA_DOMAIN_NAME
|
9124
|
echo ' # rewrite to front controller as default rule' >> /etc/nginx/sites-available/$HUBZILLA_DOMAIN_NAME
|
|
|
|
|
9201
|
echo ' limit_conn conn_limit_per_ip 10;' >> /etc/nginx/sites-available/$HUBZILLA_DOMAIN_NAME
|
9194
|
echo ' limit_conn conn_limit_per_ip 10;' >> /etc/nginx/sites-available/$HUBZILLA_DOMAIN_NAME
|
9202
|
echo ' limit_req zone=req_limit_per_ip burst=10 nodelay;' >> /etc/nginx/sites-available/$HUBZILLA_DOMAIN_NAME
|
9195
|
echo ' limit_req zone=req_limit_per_ip burst=10 nodelay;' >> /etc/nginx/sites-available/$HUBZILLA_DOMAIN_NAME
|
9203
|
echo '' >> /etc/nginx/sites-available/$HUBZILLA_DOMAIN_NAME
|
9196
|
echo '' >> /etc/nginx/sites-available/$HUBZILLA_DOMAIN_NAME
|
9204
|
- echo ' add_header X-Frame-Options DENY;' >> /etc/nginx/sites-available/$HUBZILLA_DOMAIN_NAME
|
|
|
9205
|
- echo ' add_header X-Content-Type-Options nosniff;' >> /etc/nginx/sites-available/$HUBZILLA_DOMAIN_NAME
|
|
|
|
|
9197
|
+ nginx_disable_sniffing $HUBZILLA_DOMAIN_NAME
|
9206
|
echo ' add_header Strict-Transport-Security max-age=15768000;' >> /etc/nginx/sites-available/$HUBZILLA_DOMAIN_NAME
|
9198
|
echo ' add_header Strict-Transport-Security max-age=15768000;' >> /etc/nginx/sites-available/$HUBZILLA_DOMAIN_NAME
|
9207
|
echo '' >> /etc/nginx/sites-available/$HUBZILLA_DOMAIN_NAME
|
9199
|
echo '' >> /etc/nginx/sites-available/$HUBZILLA_DOMAIN_NAME
|
9208
|
echo ' # rewrite to front controller as default rule' >> /etc/nginx/sites-available/$HUBZILLA_DOMAIN_NAME
|
9200
|
echo ' # rewrite to front controller as default rule' >> /etc/nginx/sites-available/$HUBZILLA_DOMAIN_NAME
|
|
|
|
|
9512
|
echo ' limit_req zone=req_limit_per_ip burst=10 nodelay;' >> /etc/nginx/sites-available/$MEDIAGOBLIN_DOMAIN_NAME
|
9504
|
echo ' limit_req zone=req_limit_per_ip burst=10 nodelay;' >> /etc/nginx/sites-available/$MEDIAGOBLIN_DOMAIN_NAME
|
9513
|
echo '' >> /etc/nginx/sites-available/$MEDIAGOBLIN_DOMAIN_NAME
|
9505
|
echo '' >> /etc/nginx/sites-available/$MEDIAGOBLIN_DOMAIN_NAME
|
9514
|
nginx_ssl $MEDIAGOBLIN_DOMAIN_NAME
|
9506
|
nginx_ssl $MEDIAGOBLIN_DOMAIN_NAME
|
9515
|
- echo ' add_header X-Frame-Options DENY;' >> /etc/nginx/sites-available/$MEDIAGOBLIN_DOMAIN_NAME
|
|
|
9516
|
- echo ' add_header X-Content-Type-Options nosniff;' >> /etc/nginx/sites-available/$MEDIAGOBLIN_DOMAIN_NAME
|
|
|
|
|
9507
|
+ nginx_disable_sniffing $MEDIAGOBLIN_DOMAIN_NAME
|
9517
|
echo ' add_header Strict-Transport-Security max-age=0;' >> /etc/nginx/sites-available/$MEDIAGOBLIN_DOMAIN_NAME
|
9508
|
echo ' add_header Strict-Transport-Security max-age=0;' >> /etc/nginx/sites-available/$MEDIAGOBLIN_DOMAIN_NAME
|
9518
|
echo '' >> /etc/nginx/sites-available/$MEDIAGOBLIN_DOMAIN_NAME
|
9509
|
echo '' >> /etc/nginx/sites-available/$MEDIAGOBLIN_DOMAIN_NAME
|
9519
|
echo ' location / {' >> /etc/nginx/sites-available/$MEDIAGOBLIN_DOMAIN_NAME
|
9510
|
echo ' location / {' >> /etc/nginx/sites-available/$MEDIAGOBLIN_DOMAIN_NAME
|