Replaced all instances of add_header with more_set_headers

This commit is contained in:
2023-11-10 21:50:13 +01:00
parent dfe30fd752
commit a4e5c20193
29 changed files with 57 additions and 57 deletions

View File

@@ -56,7 +56,7 @@ server {
# listen 80 default_server;
# listen [::]:80 default_server;
# server_name planetposen.no *.leifsopplevelser.no ruterna.no *.kevinmidboe.com kevinmidboe.com knowit.vin seasoned.show request.movie *.schleppe.cloud *.k9e.no;
# add_header Upgrading Connection;
# more_set_headers Upgrading Connection;
# return 302 https://$host$request_uri;
#}

View File

@@ -5,7 +5,7 @@ server {
server_name adtech.schleppe.cloud;
add_header Upgrading Connection;
more_set_headers Upgrading Connection;
return 302 https://$host$request_uri;
}

View File

@@ -5,7 +5,7 @@ server {
server_name blockchain.schleppe.cloud;
add_header Upgrading Connection;
more_set_headers Upgrading Connection;
return 302 https://$host$request_uri;
}

View File

@@ -5,7 +5,7 @@ server {
server_name blog.kevinmidboe.com;
add_header Upgrading Connection;
more_set_headers Upgrading Connection;
return 302 https://$host$request_uri;
}

View File

@@ -5,7 +5,7 @@ server {
server_name brew.schleppe.cloud beer.schleppe.cloud;
add_header Upgrading Connection;
more_set_headers Upgrading Connection;
return 302 https://$host$request_uri;
}
@@ -24,9 +24,9 @@ server {
resolver 10.0.0.72;
proxy_pass http://brewpi.schleppe:8080;
add_header 'Access-Control-Allow-Origin' 'brewpi.schleppe.cloud beer.schleppe.cloud';
add_header 'Access-Control-Allow-Methods' 'GET, POST, OPTIONS';
add_header 'Access-Control-Allow-Headers' 'Content-Type';
more_set_headers 'Access-Control-Allow-Origin' 'brewpi.schleppe.cloud beer.schleppe.cloud';
more_set_headers 'Access-Control-Allow-Methods' 'GET, POST, OPTIONS';
more_set_headers 'Access-Control-Allow-Headers' 'Content-Type';
proxy_set_header X-Real-IP $remote_addr;
proxy_set_header X-Forwarded-for $proxy_add_x_forwarded_for;
@@ -53,9 +53,9 @@ server {
resolver 10.0.0.72;
proxy_pass http://brewpi.schleppe:8080;
add_header 'Access-Control-Allow-Origin' 'brewpi.schleppe.cloud beer.schleppe.cloud';
add_header 'Access-Control-Allow-Methods' 'GET, POST, OPTIONS';
add_header 'Access-Control-Allow-Headers' 'Content-Type';
more_set_headers 'Access-Control-Allow-Origin' 'brewpi.schleppe.cloud beer.schleppe.cloud';
more_set_headers 'Access-Control-Allow-Methods' 'GET, POST, OPTIONS';
more_set_headers 'Access-Control-Allow-Headers' 'Content-Type';
proxy_set_header X-Real-IP $remote_addr;
proxy_set_header X-Forwarded-for $proxy_add_x_forwarded_for;

View File

@@ -5,7 +5,7 @@ server {
server_name castdeck.schleppe.cloud;
add_header Upgrading Connection;
more_set_headers Upgrading Connection;
return 302 https://$host$request_uri;
}
@@ -24,9 +24,9 @@ server {
resolver 10.0.0.72;
proxy_pass http://castdeck.schleppe:80;
add_header 'Access-Control-Allow-Origin' '*';
add_header 'Access-Control-Allow-Methods' 'GET, POST, OPTIONS';
add_header 'Access-Control-Allow-Headers' 'Content-Type';
more_set_headers 'Access-Control-Allow-Origin' '*';
more_set_headers 'Access-Control-Allow-Methods' 'GET, POST, OPTIONS';
more_set_headers 'Access-Control-Allow-Headers' 'Content-Type';
proxy_set_header Host $host;
}

View File

@@ -5,7 +5,7 @@ server {
server_name drone.schleppe.cloud;
add_header Upgrading Connection;
more_set_headers Upgrading Connection;
return 302 https://$host$request_uri;
}

View File

@@ -15,7 +15,7 @@ server {
server_name kibana.schleppe.cloud elastic.schleppe.cloud es.schleppe.cloud elastic.keivnmidboe.com;
add_header Upgrading Connection;
more_set_headers Upgrading Connection;
return 302 https://$host$request_uri;
}
@@ -44,7 +44,7 @@ server {
resolver 10.0.0.72;
proxy_pass https://elastic;
add_header X-Upstream $upstream_addr always;
more_set_headers X-Upstream $upstream_addr always;
}
ssl_certificate /etc/letsencrypt/live/elastic.schleppe.cloud-0001/fullchain.pem; # managed by Certbot
@@ -62,7 +62,7 @@ server {
resolver 10.0.0.72;
proxy_pass http://elastic;
add_header X-Upstream $upstream_addr always;
more_set_headers X-Upstream $upstream_addr always;
}
ssl_certificate /etc/letsencrypt/live/elastic.schleppe.cloud/fullchain.pem; # managed by Certbot
@@ -80,7 +80,7 @@ server {
resolver 10.0.0.72;
proxy_pass http://elastic;
add_header X-Upstream $upstream_addr always;
more_set_headers X-Upstream $upstream_addr always;
}
ssl_certificate /etc/letsencrypt/live/elastic.kevinmidboe.com-0001/fullchain.pem; # managed by Certbot

View File

@@ -13,9 +13,9 @@ server {
location / {
proxy_http_version 1.1;
add_header 'Access-Control-Allow-Origin' 'fjordmap.schleppe.cloud';
add_header 'Access-Control-Allow-Methods' 'GET, POST, OPTIONS';
add_header 'Access-Control-Allow-Headers' 'Content-Type';
more_set_headers 'Access-Control-Allow-Origin' 'fjordmap.schleppe.cloud';
more_set_headers 'Access-Control-Allow-Methods' 'GET, POST, OPTIONS';
more_set_headers 'Access-Control-Allow-Headers' 'Content-Type';
proxy_set_header Upgrade $http_upgrade;
proxy_set_header Connection "Upgrade";

View File

@@ -5,7 +5,7 @@ server {
server_name git.schleppe.cloud;
add_header Upgrading Connection;
more_set_headers Upgrading Connection;
return 302 https://$host$request_uri;
}

View File

@@ -14,7 +14,7 @@ server {
server_name grafana.schleppe.cloud;
add_header Upgrading Connection;
more_set_headers Upgrading Connection;
return 302 https://$host$request_uri;
}

View File

@@ -26,6 +26,6 @@ server {
proxy_set_header X-Real-IP $remote_addr;
proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for;
proxy_set_header X-Forwarded-Proto $http_x_forwarded_proto;
add_header Strict-Transport-Security "max-age=15552000; includeSubDomains" always;
more_set_headers Strict-Transport-Security "max-age=15552000; includeSubDomains" always;
}
}

View File

@@ -11,9 +11,9 @@ server {
location / {
proxy_http_version 1.1;
add_header 'Access-Control-Allow-Origin' 'hitler.kevinmidboe.com';
add_header 'Access-Control-Allow-Methods' 'GET, POST, OPTIONS';
add_header 'Access-Control-Allow-Headers' 'Content-Type';
more_set_headers 'Access-Control-Allow-Origin' 'hitler.kevinmidboe.com';
more_set_headers 'Access-Control-Allow-Methods' 'GET, POST, OPTIONS';
more_set_headers 'Access-Control-Allow-Headers' 'Content-Type';
proxy_set_header Upgrade $http_upgrade;
proxy_set_header Connection "Upgrade";

View File

@@ -11,7 +11,7 @@ server {
server_name hive.schleppe.cloud;
add_header Upgrading Connection;
more_set_headers Upgrading Connection;
return 302 https://$host$request_uri;
}

View File

@@ -14,7 +14,7 @@ server {
resolver 10.0.0.72;
proxy_http_version 1.1;
add_header Proxy Bifrost;
more_set_headers Proxy Bifrost;
proxy_set_header Upgrade $http_upgrade;
proxy_set_header Connection "Upgrade";
proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for;

View File

@@ -5,7 +5,7 @@ server {
server_name kevinmidboe.com;
add_header Upgrading Connection;
more_set_headers Upgrading Connection;
return 302 https://$host$request_uri;
}

View File

@@ -8,7 +8,7 @@ server {
server_name *.leifsopplevelser.no leifsopplevelser.no;
add_header Upgrading Connection;
more_set_headers Upgrading Connection;
return 302 https://$host$request_uri;
}

View File

@@ -17,7 +17,7 @@ server {
server_name .lottis.vin .vinlottis.no aller.vin knowit.vin;
add_header Upgrading Connection;
more_set_headers Upgrading Connection;
return 302 https://$host$request_uri;
}
@@ -137,7 +137,7 @@ server {
proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for;
proxy_set_header Host $host;
add_header 'Access-Control-Allow-Headers' 'Content-Type, vinlottis-admin';
more_set_headers 'Access-Control-Allow-Headers' 'Content-Type, vinlottis-admin';
}
ssl_certificate /etc/letsencrypt/live/aller.lottis.vin/fullchain.pem; # managed by Certbot
@@ -161,7 +161,7 @@ server {
proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for;
proxy_set_header Host $host;
add_header 'Access-Control-Allow-Headers' 'Content-Type';
more_set_headers 'Access-Control-Allow-Headers' 'Content-Type';
}
ssl_certificate /etc/letsencrypt/live/aller.vin/fullchain.pem; # managed by Certbot
ssl_certificate_key /etc/letsencrypt/live/aller.vin/privkey.pem; # managed by Certbot

View File

@@ -5,7 +5,7 @@ server {
server_name maps.schleppe.cloud;
add_header Upgrading Connection;
more_set_headers Upgrading Connection;
return 302 https://$host$request_uri;
}

View File

@@ -5,7 +5,7 @@ server {
server_name memestream.schleppe.cloud;
add_header Upgrading Connection;
more_set_headers Upgrading Connection;
return 302 https://$host$request_uri;
}

View File

@@ -5,7 +5,7 @@ server {
server_name mondrian.schleppe.cloud;
add_header Upgrading Connection;
more_set_headers Upgrading Connection;
return 302 https://$host$request_uri;
}

View File

@@ -77,7 +77,7 @@ server {
resolver 10.0.0.72;
proxy_pass http://planetposen-backend/api;
# add_header 'Access-Control-Allow-Origin' 'planet.schleppe.cloud';
# more_set_headers 'Access-Control-Allow-Origin' 'planet.schleppe.cloud';
more_set_headers 'Access-Control-Allow-Origin *';
more_set_headers 'Access-Control-Allow-Methods GET, POST, OPTIONS';
more_set_headers 'Access-Control-Allow-Headers Content-Type';

View File

@@ -5,7 +5,7 @@ server {
server_name sonarr.schleppe.cloud tau.schleppe.cloud;
add_header Upgrading Connection;
more_set_headers Upgrading Connection;
return 302 https://$host$request_uri;
}

View File

@@ -7,9 +7,9 @@ server {
location / {
proxy_http_version 1.1;
add_header 'Access-Control-Allow-Origin' '*';
add_header 'Access-Control-Allow-Methods' 'GET, POST, OPTIONS';
add_header 'Access-Control-Allow-Headers' 'Content-Type';
more_set_headers 'Access-Control-Allow-Origin' '*';
more_set_headers 'Access-Control-Allow-Methods' 'GET, POST, OPTIONS';
more_set_headers 'Access-Control-Allow-Headers' 'Content-Type';
proxy_set_header Upgrade $http_upgrade;
proxy_set_header Connection "Upgrade";

View File

@@ -5,7 +5,7 @@ server {
server_name .request.movie;
add_header Upgrading Connection;
more_set_headers Upgrading Connection;
return 302 https://$host$request_uri;
}

View File

@@ -7,9 +7,9 @@ server {
location / {
proxy_http_version 1.1;
add_header 'Access-Control-Allow-Origin' 'lottis.vin';
add_header 'Access-Control-Allow-Methods' 'GET, POST, OPTIONS';
add_header 'Access-Control-Allow-Headers' 'Content-Type';
more_set_headers 'Access-Control-Allow-Origin' 'lottis.vin';
more_set_headers 'Access-Control-Allow-Methods' 'GET, POST, OPTIONS';
more_set_headers 'Access-Control-Allow-Headers' 'Content-Type';
proxy_set_header Upgrade $http_upgrade;
proxy_set_header Connection "Upgrade";

View File

@@ -5,7 +5,7 @@ server {
server_name schleppe.cloud;
add_header Upgrading Connection;
more_set_headers Upgrading Connection;
return 302 https://$host$request_uri;
}

View File

@@ -5,7 +5,7 @@ server {
server_name wagovipps.schleppe.cloud;
add_header Upgrading Connection;
more_set_headers Upgrading Connection;
return 302 https://$host$request_uri;
}
@@ -25,8 +25,8 @@ server {
proxy_set_header X-Real-IP $remote_addr;
proxy_set_header X-Forwarded-for $proxy_add_x_forwarded_for;
add_header 'Access-Control-Allow-Methods' 'GET, POST, PUT, OPTIONS';
add_header 'Access-Control-Allow-Headers' 'Content-Type';
more_set_headers 'Access-Control-Allow-Methods' 'GET, POST, PUT, OPTIONS';
more_set_headers 'Access-Control-Allow-Headers' 'Content-Type';
}
ssl_certificate /etc/letsencrypt/live/wagovipps.schleppe.cloud/fullchain.pem; # managed by Certbot

View File

@@ -5,7 +5,7 @@ server {
server_name warden.schleppe.cloud;
add_header Upgrading Connection;
more_set_headers Upgrading Connection;
return 302 https://$host$request_uri;
}