Skip to content
Snippets Groups Projects
Verified Commit 0c8e0b59 authored by Andrej Ramašeuski's avatar Andrej Ramašeuski
Browse files

Local dev setup

parent 7ae9a1f8
No related branches found
No related tags found
No related merge requests found
FROM node:16.9-alpine as build FROM node:16.9-alpine as build
ARG BUILD_REACT_APP_STYLEGUIDE_URL ENV REACT_APP_STYLEGUIDE_URL="https://styleguide.pirati.cz/2.7.1"
ENV REACT_APP_STYLEGUIDE_URL=${BUILD_REACT_APP_STYLEGUIDE_URL}
RUN mkdir -p /home/node/cf RUN mkdir -p /home/node/cf
......
services:
app:
image: cf
ports:
- "3000:80"
gzip on; #gzip on;
gzip_disable "MSIE [1-6]\\.(?!.*SV1)"; #gzip_disable "MSIE [1-6]\\.(?!.*SV1)";
gzip_proxied any; #gzip_proxied any;
gzip_comp_level 5; #gzip_comp_level 5;
gzip_types text/plain text/css application/javascript application/x-javascript text/xml application/xml application/rss+xml text/javascript image/x-icon image/bmp image/svg+xml; #gzip_types text/plain text/css application/javascript application/x-javascript text/xml application/xml application/rss+xml text/javascript image/x-icon image/bmp image/svg+xml;
gzip_vary on; #gzip_vary on;
server { server {
listen 80; listen 80;
...@@ -14,15 +14,15 @@ server { ...@@ -14,15 +14,15 @@ server {
try_files $uri $uri/ /index.html; try_files $uri $uri/ /index.html;
# X-Frame-Options is to prevent from clickJacking attack # X-Frame-Options is to prevent from clickJacking attack
add_header X-Frame-Options SAMEORIGIN; # add_header X-Frame-Options SAMEORIGIN;
# disable content-type sniffing on some browsers. # disable content-type sniffing on some browsers.
add_header X-Content-Type-Options nosniff; # add_header X-Content-Type-Options nosniff;
# This header enables the Cross-site scripting (XSS) filter # This header enables the Cross-site scripting (XSS) filter
add_header X-XSS-Protection "1; mode=block"; # add_header X-XSS-Protection "1; mode=block";
# This will enforce HTTP browsing into HTTPS and avoid ssl stripping attack # This will enforce HTTP browsing into HTTPS and avoid ssl stripping attack
add_header Strict-Transport-Security "max-age=31536000; includeSubdomains;"; # add_header Strict-Transport-Security "max-age=31536000; includeSubdomains;";
add_header Referrer-Policy "no-referrer-when-downgrade"; # add_header Referrer-Policy "no-referrer-when-downgrade";
add_header Cache-Control "no-store, no-cache, must-revalidate"; # add_header Cache-Control "no-store, no-cache, must-revalidate";
} }
location /static { location /static {
...@@ -30,9 +30,9 @@ server { ...@@ -30,9 +30,9 @@ server {
access_log off; access_log off;
# This will enforce HTTP browsing into HTTPS and avoid ssl stripping attack # This will enforce HTTP browsing into HTTPS and avoid ssl stripping attack
add_header Strict-Transport-Security "max-age=31536000; includeSubdomains;"; # add_header Strict-Transport-Security "max-age=31536000; includeSubdomains;";
add_header Referrer-Policy "no-referrer-when-downgrade"; # add_header Referrer-Policy "no-referrer-when-downgrade";
add_header Cache-Control "public"; # add_header Cache-Control "public";
} }
error_page 500 502 503 504 /50x.html; error_page 500 502 503 504 /50x.html;
......
0% Loading or .
You are about to add 0 people to the discussion. Proceed with caution.
Please register or to comment