diff --git a/Dockerfile b/Dockerfile
index 8be794a875884ba455ced628c357cf810399faaa..909ece399d39706ca3d38b191e16b173f8bc42e3 100644
--- a/Dockerfile
+++ b/Dockerfile
@@ -1,8 +1,6 @@
 FROM node:16.9-alpine as build
 
-ARG BUILD_REACT_APP_STYLEGUIDE_URL
-
-ENV REACT_APP_STYLEGUIDE_URL=${BUILD_REACT_APP_STYLEGUIDE_URL}
+ENV REACT_APP_STYLEGUIDE_URL="https://styleguide.pirati.cz/2.7.1"
 
 RUN mkdir -p /home/node/cf
 
diff --git a/compose.yaml b/compose.yaml
new file mode 100644
index 0000000000000000000000000000000000000000..0ea70edb9d429446d6d475d97fd6da219e896dee
--- /dev/null
+++ b/compose.yaml
@@ -0,0 +1,6 @@
+services:
+  app:
+    image: cf
+    ports:
+      - "3000:80"
+
diff --git a/docker/nginx.conf b/docker/nginx.conf
index 2392006522d67ec1e1c8b876488049e20a62574f..2fa58a1cbb9d93dfb1d28c46a69de9f59577dc2f 100644
--- a/docker/nginx.conf
+++ b/docker/nginx.conf
@@ -1,9 +1,9 @@
-gzip on;
-gzip_disable "MSIE [1-6]\\.(?!.*SV1)";
-gzip_proxied any;
-gzip_comp_level 5;
-gzip_types text/plain text/css application/javascript application/x-javascript text/xml application/xml application/rss+xml text/javascript image/x-icon image/bmp image/svg+xml;
-gzip_vary on;
+#gzip on;
+#gzip_disable "MSIE [1-6]\\.(?!.*SV1)";
+#gzip_proxied any;
+#gzip_comp_level 5;
+#gzip_types text/plain text/css application/javascript application/x-javascript text/xml application/xml application/rss+xml text/javascript image/x-icon image/bmp image/svg+xml;
+#gzip_vary on;
 
 server {
   listen 80;
@@ -14,15 +14,15 @@ server {
     try_files $uri $uri/ /index.html;
 
     # X-Frame-Options is to prevent from clickJacking attack
-    add_header X-Frame-Options SAMEORIGIN;
+#    add_header X-Frame-Options SAMEORIGIN;
     # disable content-type sniffing on some browsers.
-    add_header X-Content-Type-Options nosniff;
+#    add_header X-Content-Type-Options nosniff;
     # This header enables the Cross-site scripting (XSS) filter
-    add_header X-XSS-Protection "1; mode=block";
+#    add_header X-XSS-Protection "1; mode=block";
     # This will enforce HTTP browsing into HTTPS and avoid ssl stripping attack
-    add_header Strict-Transport-Security "max-age=31536000; includeSubdomains;";
-    add_header Referrer-Policy "no-referrer-when-downgrade";
-    add_header Cache-Control "no-store, no-cache, must-revalidate";
+#    add_header Strict-Transport-Security "max-age=31536000; includeSubdomains;";
+#    add_header Referrer-Policy "no-referrer-when-downgrade";
+#    add_header Cache-Control "no-store, no-cache, must-revalidate";
   }
 
   location /static {
@@ -30,9 +30,9 @@ server {
     access_log off;
 
     # This will enforce HTTP browsing into HTTPS and avoid ssl stripping attack
-    add_header Strict-Transport-Security "max-age=31536000; includeSubdomains;";
-    add_header Referrer-Policy "no-referrer-when-downgrade";
-    add_header Cache-Control "public";
+#    add_header Strict-Transport-Security "max-age=31536000; includeSubdomains;";
+#    add_header Referrer-Policy "no-referrer-when-downgrade";
+#    add_header Cache-Control "public";
   }
 
   error_page   500 502 503 504  /50x.html;