-
Notifications
You must be signed in to change notification settings - Fork 0
/
nginx.conf
55 lines (39 loc) · 1.75 KB
/
nginx.conf
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
# this allows you to call directives such as "env" in your own conf files
# http://nginx.org/en/docs/ngx_core_module.html#env
#
# and load dynamic modules via load_module
# http://nginx.org/en/docs/ngx_core_module.html#load_module
include /etc/nginx/main.d/*.conf;
worker_processes 1;
error_log /var/log/nginx/error.log warn;
pid /var/run/nginx.pid;
events {
worker_connections 1024;
}
http {
include /etc/nginx/mime.types;
default_type application/octet-stream;
log_format quic '$remote_addr - $remote_user [$time_local] "$request" '
'$status $body_bytes_sent "$http_referer" '
'"$http_user_agent" "$http_x_forwarded_for" "$http3"';
access_log /var/log/nginx/access.log quic;
sendfile on;
#tcp_nopush on;
keepalive_timeout 65;
# security, reveal less information about ourselves
server_tokens off; # disables emitting nginx version in error messages and in the “Server” response header field
more_clear_headers 'Server';
more_clear_headers 'X-Powered-By';
# prevent clickjacking attacks
more_set_headers 'X-Frame-Options: SAMEORIGIN';
# help to prevent cross-site scripting exploits
more_set_headers 'X-XSS-Protection: 1; mode=block';
# help to prevent Cross-Site Scripting (XSS) and data injection attacks
# https://developer.mozilla.org/en-US/docs/Web/HTTP/CSP
more_set_headers "Content-Security-Policy: object-src 'none'; frame-ancestors 'self'; form-action 'self'; block-all-mixed-content; sandbox allow-forms allow-same-origin allow-scripts allow-popups allow-downloads; base-uri 'self';";
# enable response compression
gzip on;
brotli on;
brotli_static on;
include /etc/nginx/conf.d/*.conf;
}