All notable changes to this project will be documented in this file.
The format is based on Keep a Changelog, and this project adheres to Semantic Versioning.
- Added the ability to enable HSTS in custom server fragments configurations, to enable it you will need to add in the server definition the
#hstsheader
annotation
-
Added HSTS header in the server definition
catch-all-server.conf
andfrom-to-www.conf
, if enabled it will automatically add the header in the following servers:- default.conf
- subfolder.conf
- catch-all-server.conf
- from-to-www.conf
- Add the support in the
redirects.map
file to use$host$request_uri
as key (left-side) to manage multiple domains on the same nginx instance. - Add the new
1.23.1-alpine
image.
- New
NGINX_HSTS_MAX_AGE
,NGINX_HSTS_INCLUDE_SUBDOMAINS
,NGINX_HSTS_PRELOAD
environment variables to control theStrict-Transport-Security
header. By default the HSTS header is disabled.
- The
NGINX_HIDE_DRUPAL_HEADERS
environment variable to hide the drupal information from the response headers is active by default.
- New Nginx
1.21.6
version available.
- New
NGINX_HIDE_DRUPAL_HEADERS
environment variable to hide the drupal information from the response headers (default: the headers are visible) - New
NGINX_HIDE_SENSITIVE_HEADERS
environment variable to hide all the sensitive information from the response headers (default: the headers will be removed)
- New
HIDE_GOOGLE_GCS_HEADERS
environment variable to hide the google response headers coming from the google object storage bucket (default: the headers are hidden)
-
New
NGINX_XFRAME_OPTION_ENABLE
environment variable to enable X-Frame Options header to indicate whether or not a browser should be allowed to render a page in a frame, iframe, embed, object (default: the header is enabled with "SAMEORIGIN" value) -
New
NGINX_XFRAME_OPTION_VALUE
environment variable to assign a specific value to the X-Frame Options header . Possible values: SAMEORIGIN , DENY. Default: SAMEORIGIN