Преглед изворни кода

Updates exempes/caddy2/Caddyfile to SSL Grade A+

pull/652/head
0hlov3 пре 5 година
родитељ
комит
c366e26360
1 измењених фајлова са 49 додато и 19 уклоњено
  1. +49
    -19
      examples/caddy2/Caddyfile

+ 49
- 19
examples/caddy2/Caddyfile Прегледај датотеку

@@ -27,13 +27,17 @@ matrix.DOMAIN.tld {
} }


header { header {
Access-Control-Allow-Origin *
Strict-Transport-Security "mag=age=31536000;"
X-Frame-Options "DENY"
# Enable HTTP Strict Transport Security (HSTS) to force clients to always connect via HTTPS
Strict-Transport-Security "max-age=31536000; includeSubDomains; preload"
# Enable cross-site filter (XSS) and tell browser to block detected attacks
X-XSS-Protection "1; mode=block"
# Prevent some browsers from MIME-sniffing a response away from the declared Content-Type
X-Content-Type-Options "nosniff"
# Disallow the site to be rendered within a frame (clickjacking protection)
X-Frame-Options "DENY"
# X-Robots-Tag
X-Robots-Tag "noindex, noarchive, nofollow"
167,9 79% 167,9 79%
Strict-Transport-Security "mag=age=31536000;"
X-Frame-Options "DENY"
X-XSS-Protection "1; mode=block"
} }


# Cache # Cache
@@ -78,23 +82,36 @@ matrix.DOMAIN.tld {
} }
} }


:8448 {
handle {
encode zstd gzip
matrix.DOMAIN.tld:8448 {
handle {
encode zstd gzip


reverse_proxy localhost:8448 {
header_up X-Forwarded-Port {http.request.port}
header_up X-Forwarded-Proto {http.request.scheme}
header_up X-Forwarded-TlsProto {tls_protocol}
header_up X-Forwarded-TlsCipher {tls_cipher}
header_up X-Forwarded-HttpsProto {proto}
}
}
reverse_proxy 127.0.0.1:8048 {
header_up X-Forwarded-Port {http.request.port}
header_up X-Forwarded-Proto {http.request.scheme}
header_up X-Forwarded-TlsProto {tls_protocol}
header_up X-Forwarded-TlsCipher {tls_cipher}
header_up X-Forwarded-HttpsProto {proto}
}
}
} }


dimension.DOMAIN.tld { dimension.DOMAIN.tld {


tls {$CADDY_TLS}
tls {$CADDY_TLS}

header {
# Enable HTTP Strict Transport Security (HSTS) to force clients to always connect via HTTPS
Strict-Transport-Security "max-age=31536000; includeSubDomains; preload"
# Enable cross-site filter (XSS) and tell browser to block detected attacks
X-XSS-Protection "1; mode=block"
# Prevent some browsers from MIME-sniffing a response away from the declared Content-Type
X-Content-Type-Options "nosniff"
# Disallow the site to be rendered within a frame (clickjacking protection)
X-Frame-Options "DENY"
# X-Robots-Tag
X-Robots-Tag "noindex, noarchive, nofollow"
}


handle { handle {
encode zstd gzip encode zstd gzip
@@ -111,7 +128,20 @@ dimension.DOMAIN.tld {


element.DOMAIN.tld { element.DOMAIN.tld {


tls {$CADDY_TLS}
tls {$CADDY_TLS}

header {
# Enable HTTP Strict Transport Security (HSTS) to force clients to always connect via HTTPS
Strict-Transport-Security "max-age=31536000; includeSubDomains; preload"
# Enable cross-site filter (XSS) and tell browser to block detected attacks
X-XSS-Protection "1; mode=block"
# Prevent some browsers from MIME-sniffing a response away from the declared Content-Type
X-Content-Type-Options "nosniff"
# Disallow the site to be rendered within a frame (clickjacking protection)
X-Frame-Options "DENY"
# X-Robots-Tag
X-Robots-Tag "noindex, noarchive, nofollow"
}


handle { handle {
encode zstd gzip encode zstd gzip


Loading…
Откажи
Сачувај