Add robots handling
This commit is contained in:
parent
ba554095f1
commit
4408d67d35
@ -6,9 +6,10 @@ server {
|
|||||||
|
|
||||||
server_name hostname.of.your.server;
|
server_name hostname.of.your.server;
|
||||||
|
|
||||||
include snippets/universal_paths.conf;
|
|
||||||
include snippets/hsts.conf;
|
include snippets/hsts.conf;
|
||||||
include snippets/quic.conf;
|
include snippets/quic.conf;
|
||||||
|
include snippets/robots.conf;
|
||||||
|
include snippets/universal_paths.conf;
|
||||||
|
|
||||||
ssl_certificate /etc/letsencrypt/live/hostname.of.your.server/fullchain.pem;
|
ssl_certificate /etc/letsencrypt/live/hostname.of.your.server/fullchain.pem;
|
||||||
ssl_certificate_key /etc/letsencrypt/live/hostname.of.your.server/privkey.pem;
|
ssl_certificate_key /etc/letsencrypt/live/hostname.of.your.server/privkey.pem;
|
||||||
|
@ -10,12 +10,13 @@ server {
|
|||||||
ssl_certificate_key /etc/letsencrypt/live/miniflux.yourdomain.tld/privkey.pem;
|
ssl_certificate_key /etc/letsencrypt/live/miniflux.yourdomain.tld/privkey.pem;
|
||||||
ssl_trusted_certificate /etc/letsencrypt/live/miniflux.yourdomain.tld/chain.pem;
|
ssl_trusted_certificate /etc/letsencrypt/live/miniflux.yourdomain.tld/chain.pem;
|
||||||
|
|
||||||
include snippets/universal_paths.conf;
|
|
||||||
include snippets/hsts.conf;
|
include snippets/hsts.conf;
|
||||||
include snippets/security.conf;
|
include snippets/security.conf;
|
||||||
include snippets/cross-origin-security.conf;
|
include snippets/cross-origin-security.conf;
|
||||||
include snippets/quic.conf;
|
include snippets/quic.conf;
|
||||||
include snippets/proxy.conf;
|
include snippets/proxy.conf;
|
||||||
|
include snippets/robots.conf;
|
||||||
|
include snippets/universal_paths.conf;
|
||||||
|
|
||||||
proxy_hide_header Content-Security-Policy;
|
proxy_hide_header Content-Security-Policy;
|
||||||
add_header Content-Security-Policy "default-src 'none'; connect-src 'self'; frame-src *; img-src *; manifest-src 'self'; script-src 'self'; style-src 'self' 'unsafe-inline'; base-uri 'none'; block-all-mixed-content; form-action 'self'; frame-ancestors 'self'; upgrade-insecure-requests";
|
add_header Content-Security-Policy "default-src 'none'; connect-src 'self'; frame-src *; img-src *; manifest-src 'self'; script-src 'self'; style-src 'self' 'unsafe-inline'; base-uri 'none'; block-all-mixed-content; form-action 'self'; frame-ancestors 'self'; upgrade-insecure-requests";
|
||||||
|
@ -10,11 +10,12 @@ server {
|
|||||||
ssl_certificate_key /etc/letsencrypt/live/cloud.yourdomain.tld/privkey.pem;
|
ssl_certificate_key /etc/letsencrypt/live/cloud.yourdomain.tld/privkey.pem;
|
||||||
ssl_trusted_certificate /etc/letsencrypt/live/cloud.yourdomain.tld/chain.pem;
|
ssl_trusted_certificate /etc/letsencrypt/live/cloud.yourdomain.tld/chain.pem;
|
||||||
|
|
||||||
include snippets/universal_paths.conf;
|
|
||||||
include snippets/hsts.conf;
|
include snippets/hsts.conf;
|
||||||
include snippets/security.conf;
|
include snippets/security.conf;
|
||||||
include snippets/quic.conf;
|
include snippets/quic.conf;
|
||||||
include snippets/proxy.conf;
|
include snippets/proxy.conf;
|
||||||
|
include snippets/robots.conf;
|
||||||
|
include snippets/universal_paths.conf;
|
||||||
|
|
||||||
add_header Cross-Origin-Resource-Policy "same-origin" always;
|
add_header Cross-Origin-Resource-Policy "same-origin" always;
|
||||||
add_header Cross-Origin-Opener-Policy "same-origin" always;
|
add_header Cross-Origin-Opener-Policy "same-origin" always;
|
||||||
|
@ -10,13 +10,14 @@ server {
|
|||||||
ssl_certificate_key /etc/letsencrypt/live/uptime.yourdomain.tld/privkey.pem;
|
ssl_certificate_key /etc/letsencrypt/live/uptime.yourdomain.tld/privkey.pem;
|
||||||
ssl_trusted_certificate /etc/letsencrypt/live/uptime.yourdomain.tld/chain.pem;
|
ssl_trusted_certificate /etc/letsencrypt/live/uptime.yourdomain.tld/chain.pem;
|
||||||
|
|
||||||
include snippets/universal_paths.conf;
|
|
||||||
include snippets/hsts.conf;
|
include snippets/hsts.conf;
|
||||||
include snippets/security.conf;
|
include snippets/security.conf;
|
||||||
include snippets/cross-origin-security.conf;
|
include snippets/cross-origin-security.conf;
|
||||||
include snippets/quic.conf;
|
include snippets/quic.conf;
|
||||||
include snippets/proxy.conf;
|
include snippets/proxy.conf;
|
||||||
proxy_hide_header Content-Security-Policy;
|
proxy_hide_header Content-Security-Policy;
|
||||||
|
include snippets/universal_paths.conf;
|
||||||
|
|
||||||
add_header Content-Security-Policy "default-src 'none'; connect-src 'self'; img-src 'self' data:; frame-src 'self'; manifest-src 'self'; object-src 'self'; script-src 'self' 'unsafe-eval' 'unsafe-inline'; style-src 'self' 'unsafe-inline'; base-uri 'none'; block-all-mixed-content; form-action 'none'; frame-ancestors 'self'; upgrade-insecure-requests";
|
add_header Content-Security-Policy "default-src 'none'; connect-src 'self'; img-src 'self' data:; frame-src 'self'; manifest-src 'self'; object-src 'self'; script-src 'self' 'unsafe-eval' 'unsafe-inline'; style-src 'self' 'unsafe-inline'; base-uri 'none'; block-all-mixed-content; form-action 'none'; frame-ancestors 'self'; upgrade-insecure-requests";
|
||||||
|
|
||||||
location / {
|
location / {
|
||||||
|
@ -10,12 +10,13 @@ server {
|
|||||||
ssl_certificate_key /etc/letsencrypt/live/vault.yourdomain.tld/privkey.pem;
|
ssl_certificate_key /etc/letsencrypt/live/vault.yourdomain.tld/privkey.pem;
|
||||||
ssl_trusted_certificate /etc/letsencrypt/live/vault.yourdomain.tld/chain.pem;
|
ssl_trusted_certificate /etc/letsencrypt/live/vault.yourdomain.tld/chain.pem;
|
||||||
|
|
||||||
include snippets/universal_paths.conf;
|
|
||||||
include snippets/hsts.conf;
|
include snippets/hsts.conf;
|
||||||
include snippets/security.conf;
|
include snippets/security.conf;
|
||||||
include snippets/cross-origin-security.conf;
|
include snippets/cross-origin-security.conf;
|
||||||
include snippets/quic.conf;
|
include snippets/quic.conf;
|
||||||
include snippets/proxy.conf;
|
include snippets/proxy.conf;
|
||||||
|
include snippets/robots.conf;
|
||||||
|
include snippets/universal_paths.conf;
|
||||||
|
|
||||||
location / {
|
location / {
|
||||||
proxy_pass http://vaultwarden:8080;
|
proxy_pass http://vaultwarden:8080;
|
||||||
|
8
etc/nginx/snippets/robots.conf
Normal file
8
etc/nginx/snippets/robots.conf
Normal file
@ -0,0 +1,8 @@
|
|||||||
|
proxy_hide_header X-Robots-Tag;
|
||||||
|
add_header X-Robots-Tag "noindex, nofollow" always;
|
||||||
|
|
||||||
|
location = /robots.txt {
|
||||||
|
root /srv/nginx;
|
||||||
|
allow all;
|
||||||
|
access_log off;
|
||||||
|
}
|
2
setup.sh
2
setup.sh
@ -66,6 +66,7 @@ fi
|
|||||||
# Setup webroot for NGINX
|
# Setup webroot for NGINX
|
||||||
## Explicitly using /var/srv here because SELinux does not follow symlinks
|
## Explicitly using /var/srv here because SELinux does not follow symlinks
|
||||||
sudo semanage fcontext -a -t httpd_sys_content_t "$(realpath /srv/nginx)(/.*)?"
|
sudo semanage fcontext -a -t httpd_sys_content_t "$(realpath /srv/nginx)(/.*)?"
|
||||||
|
unpriv curl -s https://raw.githubusercontent.com/GrapheneOS/infrastructure/main/srv/nginx/robots.txt | sudo tee /srv/nginx/robots.txt > /dev/null
|
||||||
sudo mkdir -p /srv/nginx/.well-known/acme-challenge
|
sudo mkdir -p /srv/nginx/.well-known/acme-challenge
|
||||||
sudo chmod -R 755 /srv/nginx/.well-known/acme-challenge
|
sudo chmod -R 755 /srv/nginx/.well-known/acme-challenge
|
||||||
|
|
||||||
@ -122,6 +123,7 @@ unpriv curl -s https://raw.githubusercontent.com/TommyTran732/NGINX-Configs/main
|
|||||||
unpriv curl -s https://raw.githubusercontent.com/TommyTran732/NGINX-Configs/main/etc/nginx/snippets/quic.conf | sudo tee /etc/nginx/snippets/quic.conf > /dev/null
|
unpriv curl -s https://raw.githubusercontent.com/TommyTran732/NGINX-Configs/main/etc/nginx/snippets/quic.conf | sudo tee /etc/nginx/snippets/quic.conf > /dev/null
|
||||||
unpriv curl -s https://raw.githubusercontent.com/TommyTran732/NGINX-Configs/main/etc/nginx/snippets/security.conf | sudo tee /etc/nginx/snippets/security.conf > /dev/null
|
unpriv curl -s https://raw.githubusercontent.com/TommyTran732/NGINX-Configs/main/etc/nginx/snippets/security.conf | sudo tee /etc/nginx/snippets/security.conf > /dev/null
|
||||||
unpriv curl -s https://raw.githubusercontent.com/TommyTran732/NGINX-Configs/main/etc/nginx/snippets/cross-origin-security.conf | sudo tee /etc/nginx/snippets/cross-origin-security.conf > /dev/null
|
unpriv curl -s https://raw.githubusercontent.com/TommyTran732/NGINX-Configs/main/etc/nginx/snippets/cross-origin-security.conf | sudo tee /etc/nginx/snippets/cross-origin-security.conf > /dev/null
|
||||||
|
unpriv curl -s https://raw.githubusercontent.com/TommyTran732/NGINX-Configs/main/etc/nginx/snippets/robots.conf | sudo tee /etc/nginx/snippets/robots.conf > /dev/null
|
||||||
unpriv curl -s https://raw.githubusercontent.com/TommyTran732/NGINX-Configs/main/etc/nginx/snippets/universal_paths.conf | sudo tee /etc/nginx/snippets/universal_paths.conf > /dev/null
|
unpriv curl -s https://raw.githubusercontent.com/TommyTran732/NGINX-Configs/main/etc/nginx/snippets/universal_paths.conf | sudo tee /etc/nginx/snippets/universal_paths.conf > /dev/null
|
||||||
|
|
||||||
if [ "${ip_pinning}" = '0' ]; then
|
if [ "${ip_pinning}" = '0' ]; then
|
||||||
|
2
srv/nginx/robots.txt
Normal file
2
srv/nginx/robots.txt
Normal file
@ -0,0 +1,2 @@
|
|||||||
|
User-agent: *
|
||||||
|
Disallow: /
|
Loading…
x
Reference in New Issue
Block a user