pre-commit run --all-files, workaround nginx

This commit is contained in:
Aminda Suomalainen 2024-06-06 20:19:30 +03:00
parent 6a58feed11
commit 29dc1af193
Signed by: Mikaela
SSH Key Fingerprint: SHA256:CXLULpqNBdUKB6E6fLA1b/4SzG0HvKD19PbIePU175Q
9 changed files with 36 additions and 22 deletions

View File

@ -22,6 +22,11 @@ max_line_length = 78
# Opinionated affecting only display, better to not set # Opinionated affecting only display, better to not set
#tab_width = #tab_width =
# https://github.com/jxddk/prettier-plugin-nginx/issues/8
[*.nginx]
insert_final_newline = unset
indent_style = unset
# *nix, just in case # *nix, just in case
[*.{bash,sh}] [*.{bash,sh}]
# .gitattributes ! # .gitattributes !

View File

@ -33,6 +33,7 @@ repos:
# types to add. # types to add.
exclude_types: [svg, tsv] exclude_types: [svg, tsv]
- id: end-of-file-fixer - id: end-of-file-fixer
exclude: ^etc\/nginx\/.*$
- id: check-yaml - id: check-yaml
- id: check-added-large-files - id: check-added-large-files
# These are not from `pre-commit sample-config` # These are not from `pre-commit sample-config`

View File

@ -5,7 +5,7 @@
# software. # software.
# WIP: migration from i3status # WIP: migration from i3status
# contains: (disk /, disk/home,) load, ipv6, wireless, ethernet, battery, volume, (utc) time, (local time) # contains: (disk /, disk/home,) load, ipv6, wireless, ethernet, battery, volume, (utc) time, (local time)
[theme] [theme]
name = "solarized-dark" name = "solarized-dark"

View File

@ -75,20 +75,28 @@ lb_strategy = 'p2'
# file = '/var/log/dnscrypt-proxy/nx.log' # file = '/var/log/dnscrypt-proxy/nx.log'
[sources] [sources]
[sources.'public-resolvers'] [sources.'public-resolvers']
#url = 'https://download.dnscrypt.info/resolvers-list/v2/public-resolvers.md' #url = 'https://download.dnscrypt.info/resolvers-list/v2/public-resolvers.md'
urls = ['https://raw.githubusercontent.com/DNSCrypt/dnscrypt-resolvers/master/v2/public-resolvers.md', 'https://download.dnscrypt.info/resolvers-list/v2/public-resolvers.md', 'https://cdn.staticaly.com/gh/DNSCrypt/dnscrypt-resolvers/master/v2/public-resolvers.md', 'https://evilvibes.com/list/public-resolvers.md'] urls = [
cache_file = '/var/cache/dnscrypt-proxy/public-resolvers.md' 'https://raw.githubusercontent.com/DNSCrypt/dnscrypt-resolvers/master/v2/public-resolvers.md',
minisign_key = 'RWQf6LRCGA9i53mlYecO4IzT51TGPpvWucNSCh1CBM0QTaLn73Y7GFO3' 'https://download.dnscrypt.info/resolvers-list/v2/public-resolvers.md',
refresh_delay = 72 'https://cdn.staticaly.com/gh/DNSCrypt/dnscrypt-resolvers/master/v2/public-resolvers.md',
prefix = 'public-' 'https://evilvibes.com/list/public-resolvers.md',
]
cache_file = '/var/cache/dnscrypt-proxy/public-resolvers.md'
minisign_key = 'RWQf6LRCGA9i53mlYecO4IzT51TGPpvWucNSCh1CBM0QTaLn73Y7GFO3'
refresh_delay = 72
prefix = 'public-'
[sources.'opennic'] [sources.'opennic']
urls = ['https://raw.githubusercontent.com/DNSCrypt/dnscrypt-resolvers/master/v2/opennic.md', 'https://download.dnscrypt.info/resolvers-list/v2/opennic.md'] urls = [
minisign_key = 'RWQf6LRCGA9i53mlYecO4IzT51TGPpvWucNSCh1CBM0QTaLn73Y7GFO3' 'https://raw.githubusercontent.com/DNSCrypt/dnscrypt-resolvers/master/v2/opennic.md',
refresh_delay = 72 'https://download.dnscrypt.info/resolvers-list/v2/opennic.md',
cache_file = '/var/cache/dnscrypt-proxy/opennic.md' ]
prefix = 'opennic-' minisign_key = 'RWQf6LRCGA9i53mlYecO4IzT51TGPpvWucNSCh1CBM0QTaLn73Y7GFO3'
refresh_delay = 72
cache_file = '/var/cache/dnscrypt-proxy/opennic.md'
prefix = 'opennic-'
# 2.0.23 recommended so onions won't be attempted without proxy enabled # 2.0.23 recommended so onions won't be attempted without proxy enabled
# (5c9edfccfe67474bee2836ada67f955f10e43357) # (5c9edfccfe67474bee2836ada67f955f10e43357)

View File

@ -13,4 +13,4 @@ server {
location / { location / {
proxy_pass http://[::1]:9050; proxy_pass http://[::1]:9050;
} }
} }

View File

@ -47,4 +47,4 @@ server {
#location ~ /\.ht { #location ~ /\.ht {
# deny all; # deny all;
#} #}
} }

View File

@ -27,10 +27,10 @@ server {
ssl_prefer_server_ciphers on; ssl_prefer_server_ciphers on;
# Enable this if your want HSTS (recommended) # Enable this if your want HSTS (recommended)
add_header Strict-Transport-Security add_header Strict-Transport-Security
"max-age=15552000; includeSubdomains; preload"; "max-age=15552000; includeSubdomains; preload";
add_header X-Frame-Options SAMEORIGIN; add_header X-Frame-Options SAMEORIGIN;
add_header Content-Security-Policy add_header Content-Security-Policy
upgrade-insecure-requests; upgrade-insecure-requests;
add_header X-Xss-Protection "1; mode=block" always; add_header X-Xss-Protection "1; mode=block" always;
add_header X-Content-Type-Options "nosniff" always; add_header X-Content-Type-Options "nosniff" always;
# OCSP Stapling --- # OCSP Stapling ---
@ -84,4 +84,4 @@ server {
location ~ /\.ht { location ~ /\.ht {
deny all; deny all;
} }
} }

View File

@ -5,7 +5,7 @@ server {
listen [::]:443; listen [::]:443;
# Enable this if your want HSTS (recommended) # Enable this if your want HSTS (recommended)
add_header Strict-Transport-Security add_header Strict-Transport-Security
"max-age=15552000; includeSubdomains; preload"; "max-age=15552000; includeSubdomains; preload";
add_header X-Frame-Options SAMEORIGIN; add_header X-Frame-Options SAMEORIGIN;
add_header Content-Security-Policy upgrade-insecure-requests; add_header Content-Security-Policy upgrade-insecure-requests;
add_header X-Xss-Protection "1; mode=block" always; add_header X-Xss-Protection "1; mode=block" always;
@ -17,4 +17,4 @@ server {
location / { location / {
proxy_pass http://localhost:8080; proxy_pass http://localhost:8080;
} }
} }

View File

@ -6,7 +6,7 @@ server {
listen [::]:443; listen [::]:443;
# Enable this if your want HSTS (recommended) # Enable this if your want HSTS (recommended)
add_header Strict-Transport-Security add_header Strict-Transport-Security
"max-age=15552000; includeSubdomains; preload"; "max-age=15552000; includeSubdomains; preload";
add_header X-Frame-Options SAMEORIGIN; add_header X-Frame-Options SAMEORIGIN;
add_header Content-Security-Policy upgrade-insecure-requests; add_header Content-Security-Policy upgrade-insecure-requests;
add_header X-Xss-Protection "1; mode=block" always; add_header X-Xss-Protection "1; mode=block" always;
@ -57,4 +57,4 @@ server {
location ~ /\.ht { location ~ /\.ht {
deny all; deny all;
} }
} }