Przeglądaj źródła

Merge pull request #1476 from altsalt/caddy2-wellknown

added .well-known path to Caddy2 example, closes #1442
pull/1477/head
Slavi Pantaleev 4 lat temu
committed by GitHub
rodzic
commit
d5403fefcc
Nie znaleziono w bazie danych klucza dla tego podpisu ID klucza GPG: 4AEE18F83AFDEB23
1 zmienionych plików z 24 dodań i 11 usunięć
  1. +24
    -11
      examples/caddy2/Caddyfile

+ 24
- 11
examples/caddy2/Caddyfile Wyświetl plik

@@ -27,6 +27,10 @@ matrix.DOMAIN.tld {
not path /matrix/static-files/* not path /matrix/static-files/*
} }


@wellknown {
path /.well-known/matrix/*
}

header { header {
# Enable HTTP Strict Transport Security (HSTS) to force clients to always connect via HTTPS # Enable HTTP Strict Transport Security (HSTS) to force clients to always connect via HTTPS
Strict-Transport-Security "max-age=31536000; includeSubDomains; preload" Strict-Transport-Security "max-age=31536000; includeSubDomains; preload"
@@ -69,6 +73,15 @@ matrix.DOMAIN.tld {
} }
} }


handle @wellknown {
encode zstd gzip
root * /matrix/static-files
header Cache-Control max-age=14400
header Content-Type application/json
header Access-Control-Allow-Origin *
file_server
}

handle { handle {
encode zstd gzip encode zstd gzip


@@ -102,17 +115,17 @@ element.DOMAIN.tld {
# tls your@email.com # tls your@email.com


header { header {
# Enable HTTP Strict Transport Security (HSTS) to force clients to always connect via HTTPS
Strict-Transport-Security "max-age=31536000; includeSubDomains; preload"
# Enable cross-site filter (XSS) and tell browser to block detected attacks
X-XSS-Protection "1; mode=block"
# Prevent some browsers from MIME-sniffing a response away from the declared Content-Type
X-Content-Type-Options "nosniff"
# Disallow the site to be rendered within a frame (clickjacking protection)
X-Frame-Options "DENY"
# X-Robots-Tag
X-Robots-Tag "noindex, noarchive, nofollow"
}
# Enable HTTP Strict Transport Security (HSTS) to force clients to always connect via HTTPS
Strict-Transport-Security "max-age=31536000; includeSubDomains; preload"
# Enable cross-site filter (XSS) and tell browser to block detected attacks
X-XSS-Protection "1; mode=block"
# Prevent some browsers from MIME-sniffing a response away from the declared Content-Type
X-Content-Type-Options "nosniff"
# Disallow the site to be rendered within a frame (clickjacking protection)
X-Frame-Options "DENY"
# X-Robots-Tag
X-Robots-Tag "noindex, noarchive, nofollow"
}


handle { handle {
encode zstd gzip encode zstd gzip


Ładowanie…
Anuluj
Zapisz