From 24f58201cdf8405f4173995dbbc21258ee7adeee Mon Sep 17 00:00:00 2001 From: Bob Mottram Date: Mon, 5 Mar 2018 18:15:29 +0000 Subject: [PATCH] Change function name --- src/freedombone-app-akaunting | 8 ++++---- src/freedombone-app-dokuwiki | 8 ++++---- src/freedombone-app-edith | 8 ++++---- src/freedombone-app-etherpad | 8 ++++---- src/freedombone-app-friendica | 8 ++++---- src/freedombone-app-ghost | 8 ++++---- src/freedombone-app-gnusocial | 8 ++++---- src/freedombone-app-gogs | 8 ++++---- src/freedombone-app-htmly | 8 ++++---- src/freedombone-app-hubzilla | 8 ++++---- src/freedombone-app-jitsi | 4 ++-- src/freedombone-app-kanboard | 8 ++++---- src/freedombone-app-keyserver | 8 ++++---- src/freedombone-app-koel | 4 ++-- src/freedombone-app-lychee | 8 ++++---- src/freedombone-app-mailpile | 8 ++++---- src/freedombone-app-matrix | 16 ++++++++-------- src/freedombone-app-mediagoblin | 8 ++++---- src/freedombone-app-movim | 8 ++++---- src/freedombone-app-nextcloud | 8 ++++---- src/freedombone-app-peertube | 4 ++-- src/freedombone-app-pelican | 8 ++++---- src/freedombone-app-pleroma | 8 ++++---- src/freedombone-app-postactiv | 8 ++++---- src/freedombone-app-privatebin | 8 ++++---- src/freedombone-app-radicale | 4 ++-- src/freedombone-app-riot | 8 ++++---- src/freedombone-app-scuttlebot | 4 ++-- src/freedombone-app-searx | 4 ++-- src/freedombone-app-tahoelafs | 4 ++-- src/freedombone-app-turtl | 8 ++++---- src/freedombone-template | 4 ++-- src/freedombone-utils-turn | 8 ++++---- src/freedombone-utils-web | 10 +++++----- 34 files changed, 125 insertions(+), 125 deletions(-) diff --git a/src/freedombone-app-akaunting b/src/freedombone-app-akaunting index 6887c7a4..b6a8d7c8 100755 --- a/src/freedombone-app-akaunting +++ b/src/freedombone-app-akaunting @@ -372,8 +372,8 @@ function install_akaunting { function_check nginx_ssl nginx_ssl "$AKAUNTING_DOMAIN_NAME" - function_check nginx_disable_sniffing - nginx_disable_sniffing "$AKAUNTING_DOMAIN_NAME" + function_check nginx_security_options + nginx_security_options "$AKAUNTING_DOMAIN_NAME" { echo ' add_header Strict-Transport-Security max-age=15768000;'; echo ''; @@ -415,8 +415,8 @@ function install_akaunting { function_check nginx_compress nginx_compress "$AKAUNTING_DOMAIN_NAME" echo '' >> "$akaunting_nginx_site" - function_check nginx_disable_sniffing - nginx_disable_sniffing "$AKAUNTING_DOMAIN_NAME" + function_check nginx_security_options + nginx_security_options "$AKAUNTING_DOMAIN_NAME" { echo ''; echo ' access_log /dev/null;'; echo ' error_log /dev/null;'; diff --git a/src/freedombone-app-dokuwiki b/src/freedombone-app-dokuwiki index 04f3dcd8..d0abd68a 100755 --- a/src/freedombone-app-dokuwiki +++ b/src/freedombone-app-dokuwiki @@ -380,8 +380,8 @@ function install_dokuwiki { echo ' proxy_read_timeout 86400s;'; } >> "/etc/nginx/sites-available/$DOKUWIKI_DOMAIN_NAME" function_check nginx_ssl nginx_ssl "$DOKUWIKI_DOMAIN_NAME" - function_check nginx_disable_sniffing - nginx_disable_sniffing "$DOKUWIKI_DOMAIN_NAME" + function_check nginx_security_options + nginx_security_options "$DOKUWIKI_DOMAIN_NAME" { echo ' add_header Strict-Transport-Security "max-age=0;";'; echo ''; echo ' # rewrite to front controller as default rule'; @@ -458,8 +458,8 @@ function install_dokuwiki { echo ' index index.php;'; echo ' charset utf-8;'; echo ' proxy_read_timeout 86400s;'; } >> "/etc/nginx/sites-available/$DOKUWIKI_DOMAIN_NAME" - function_check nginx_disable_sniffing - nginx_disable_sniffing "$DOKUWIKI_DOMAIN_NAME" + function_check nginx_security_options + nginx_security_options "$DOKUWIKI_DOMAIN_NAME" { echo ' add_header Strict-Transport-Security "max-age=0;";'; echo ''; echo ' # rewrite to front controller as default rule'; diff --git a/src/freedombone-app-edith b/src/freedombone-app-edith index 7abd6cbb..29590dc1 100755 --- a/src/freedombone-app-edith +++ b/src/freedombone-app-edith @@ -341,8 +341,8 @@ function install_edith { function_check nginx_ssl nginx_ssl "$EDITH_DOMAIN_NAME" - function_check nginx_disable_sniffing - nginx_disable_sniffing "$EDITH_DOMAIN_NAME" + function_check nginx_security_options + nginx_security_options "$EDITH_DOMAIN_NAME" { echo ' add_header Strict-Transport-Security max-age=15768000;'; echo ''; @@ -379,8 +379,8 @@ function install_edith { function_check nginx_compress nginx_compress "$EDITH_DOMAIN_NAME" echo '' >> "$edith_nginx_site" - function_check nginx_disable_sniffing - nginx_disable_sniffing "$EDITH_DOMAIN_NAME" + function_check nginx_security_options + nginx_security_options "$EDITH_DOMAIN_NAME" { echo ''; echo ' access_log /dev/null;'; echo ' error_log /dev/null;'; diff --git a/src/freedombone-app-etherpad b/src/freedombone-app-etherpad index 033ab528..3502e507 100755 --- a/src/freedombone-app-etherpad +++ b/src/freedombone-app-etherpad @@ -557,8 +557,8 @@ function install_etherpad { function_check nginx_ssl nginx_ssl "$ETHERPAD_DOMAIN_NAME" - function_check nginx_disable_sniffing - nginx_disable_sniffing "$ETHERPAD_DOMAIN_NAME" + function_check nginx_security_options + nginx_security_options "$ETHERPAD_DOMAIN_NAME" { echo ' add_header Strict-Transport-Security max-age=15768000;'; echo ''; @@ -584,8 +584,8 @@ function install_etherpad { echo " listen 127.0.0.1:$ETHERPAD_ONION_PORT default_server;"; echo " server_name $ETHERPAD_ONION_HOSTNAME;"; echo ''; } >> "$etherpad_nginx_site" - function_check nginx_disable_sniffing - nginx_disable_sniffing "$ETHERPAD_DOMAIN_NAME" + function_check nginx_security_options + nginx_security_options "$ETHERPAD_DOMAIN_NAME" { echo ''; echo ' # Logs'; echo ' access_log /dev/null;'; diff --git a/src/freedombone-app-friendica b/src/freedombone-app-friendica index 1f87a3e1..0d3447bb 100755 --- a/src/freedombone-app-friendica +++ b/src/freedombone-app-friendica @@ -419,8 +419,8 @@ function install_friendica { echo ' access_log /dev/null;'; } >> "/etc/nginx/sites-available/$FRIENDICA_DOMAIN_NAME" function_check nginx_ssl nginx_ssl "$FRIENDICA_DOMAIN_NAME" - function_check nginx_disable_sniffing - nginx_disable_sniffing "$FRIENDICA_DOMAIN_NAME" + function_check nginx_security_options + nginx_security_options "$FRIENDICA_DOMAIN_NAME" { echo ' add_header Strict-Transport-Security max-age=15768000;'; echo ''; echo ' # rewrite to front controller as default rule'; @@ -493,7 +493,7 @@ function install_friendica { echo ' # rewrite to front controller as default rule'; echo ' location / {'; } > "/etc/nginx/sites-available/$FRIENDICA_DOMAIN_NAME" nginx_limits "$FRIENDICA_DOMAIN_NAME" - nginx_disable_sniffing "$FRIENDICA_DOMAIN_NAME" + nginx_security_options "$FRIENDICA_DOMAIN_NAME" { echo " rewrite ^/(.*) /index.php?q=\$uri&\$args last;"; echo ' }'; echo ''; @@ -515,7 +515,7 @@ function install_friendica { echo ' # or a unix socket'; echo ' location ~* \.php$ {'; } >> "/etc/nginx/sites-available/$FRIENDICA_DOMAIN_NAME" nginx_limits "$FRIENDICA_DOMAIN_NAME" - nginx_disable_sniffing "$FRIENDICA_DOMAIN_NAME" + nginx_security_options "$FRIENDICA_DOMAIN_NAME" { echo ' # Zero-day exploit defense.'; echo ' # http://forum.nginx.org/read.php?2,88845,page=3'; echo " # Won't work properly (404 error) if the file is not stored on this"; diff --git a/src/freedombone-app-ghost b/src/freedombone-app-ghost index 7548341e..6f5f348e 100755 --- a/src/freedombone-app-ghost +++ b/src/freedombone-app-ghost @@ -518,8 +518,8 @@ function install_ghost { echo ''; } >> "/etc/nginx/sites-available/${GHOST_DOMAIN_NAME}" function_check nginx_ssl nginx_ssl "${GHOST_DOMAIN_NAME}" - function_check nginx_disable_sniffing - nginx_disable_sniffing "${GHOST_DOMAIN_NAME}" + function_check nginx_security_options + nginx_security_options "${GHOST_DOMAIN_NAME}" { echo ' add_header Strict-Transport-Security max-age=0;'; echo ''; echo ' location / {'; } >> "/etc/nginx/sites-available/${GHOST_DOMAIN_NAME}" @@ -550,8 +550,8 @@ function install_ghost { echo ' access_log /dev/null;'; echo " error_log /dev/null;"; echo ''; } >> "/etc/nginx/sites-available/${GHOST_DOMAIN_NAME}" - function_check nginx_disable_sniffing - nginx_disable_sniffing "${GHOST_DOMAIN_NAME}" + function_check nginx_security_options + nginx_security_options "${GHOST_DOMAIN_NAME}" { echo ' add_header Strict-Transport-Security max-age=0;'; echo ''; echo ' location / {'; } >> "/etc/nginx/sites-available/${GHOST_DOMAIN_NAME}" diff --git a/src/freedombone-app-gnusocial b/src/freedombone-app-gnusocial index 7ce948d7..6526f37f 100755 --- a/src/freedombone-app-gnusocial +++ b/src/freedombone-app-gnusocial @@ -707,8 +707,8 @@ function install_gnusocial_main { function_check nginx_ssl nginx_ssl "$GNUSOCIAL_DOMAIN_NAME" - function_check nginx_disable_sniffing - nginx_disable_sniffing "$GNUSOCIAL_DOMAIN_NAME" + function_check nginx_security_options + nginx_security_options "$GNUSOCIAL_DOMAIN_NAME" { echo ' add_header Strict-Transport-Security max-age=15768000;'; echo ''; @@ -756,8 +756,8 @@ function install_gnusocial_main { function_check nginx_compress nginx_compress "$GNUSOCIAL_DOMAIN_NAME" echo '' >> "$gnusocial_nginx_site" - function_check nginx_disable_sniffing - nginx_disable_sniffing "$GNUSOCIAL_DOMAIN_NAME" + function_check nginx_security_options + nginx_security_options "$GNUSOCIAL_DOMAIN_NAME" { echo ''; echo ' # Logs'; echo ' access_log /dev/null;'; diff --git a/src/freedombone-app-gogs b/src/freedombone-app-gogs index 1d08c575..945dc78d 100755 --- a/src/freedombone-app-gogs +++ b/src/freedombone-app-gogs @@ -591,8 +591,8 @@ function install_gogs { echo ''; } >> "/etc/nginx/sites-available/${GIT_DOMAIN_NAME}" function_check nginx_ssl nginx_ssl "${GIT_DOMAIN_NAME}" - function_check nginx_disable_sniffing - nginx_disable_sniffing "${GIT_DOMAIN_NAME}" + function_check nginx_security_options + nginx_security_options "${GIT_DOMAIN_NAME}" { echo ' add_header Strict-Transport-Security max-age=0;'; echo ''; echo ' location / {'; } >> "/etc/nginx/sites-available/${GIT_DOMAIN_NAME}" @@ -623,8 +623,8 @@ function install_gogs { echo ' access_log /dev/null;'; echo " error_log /dev/null;"; echo ''; } >> "/etc/nginx/sites-available/${GIT_DOMAIN_NAME}" - function_check nginx_disable_sniffing - nginx_disable_sniffing "${GIT_DOMAIN_NAME}" + function_check nginx_security_options + nginx_security_options "${GIT_DOMAIN_NAME}" { echo ' add_header Strict-Transport-Security max-age=0;'; echo ''; echo ' location / {'; } >> "/etc/nginx/sites-available/${GIT_DOMAIN_NAME}" diff --git a/src/freedombone-app-htmly b/src/freedombone-app-htmly index c4b77968..bdf6a57f 100755 --- a/src/freedombone-app-htmly +++ b/src/freedombone-app-htmly @@ -460,8 +460,8 @@ function install_htmly_website { echo ' proxy_read_timeout 86400s;'; } >> "/etc/nginx/sites-available/$HTMLY_DOMAIN_NAME" function_check nginx_ssl nginx_ssl "$HTMLY_DOMAIN_NAME" - function_check nginx_disable_sniffing - nginx_disable_sniffing "$HTMLY_DOMAIN_NAME" + function_check nginx_security_options + nginx_security_options "$HTMLY_DOMAIN_NAME" { echo ' add_header Strict-Transport-Security "max-age=0;";'; echo ''; echo ' # rewrite to front controller as default rule'; @@ -542,8 +542,8 @@ function install_htmly_website_onion { echo ' index index.php;'; echo ' charset utf-8;'; echo ' proxy_read_timeout 86400s;'; } >> "/etc/nginx/sites-available/$HTMLY_DOMAIN_NAME" - function_check nginx_disable_sniffing - nginx_disable_sniffing "$HTMLY_DOMAIN_NAME" + function_check nginx_security_options + nginx_security_options "$HTMLY_DOMAIN_NAME" { echo ' add_header Strict-Transport-Security "max-age=0;";'; echo ''; echo ' # rewrite to front controller as default rule'; diff --git a/src/freedombone-app-hubzilla b/src/freedombone-app-hubzilla index 0cfd0430..20aaccbc 100755 --- a/src/freedombone-app-hubzilla +++ b/src/freedombone-app-hubzilla @@ -421,8 +421,8 @@ function install_hubzilla { echo ' access_log /dev/null;'; } >> "/etc/nginx/sites-available/$HUBZILLA_DOMAIN_NAME" function_check nginx_ssl nginx_ssl "$HUBZILLA_DOMAIN_NAME" - function_check nginx_disable_sniffing - nginx_disable_sniffing "$HUBZILLA_DOMAIN_NAME" + function_check nginx_security_options + nginx_security_options "$HUBZILLA_DOMAIN_NAME" { echo ' add_header Strict-Transport-Security max-age=15768000;'; echo ''; echo ' # rewrite to front controller as default rule'; @@ -494,7 +494,7 @@ function install_hubzilla { echo ' # rewrite to front controller as default rule'; echo ' location / {'; } > "/etc/nginx/sites-available/$HUBZILLA_DOMAIN_NAME" nginx_limits "$HUBZILLA_DOMAIN_NAME" - nginx_disable_sniffing "$HUBZILLA_DOMAIN_NAME" + nginx_security_options "$HUBZILLA_DOMAIN_NAME" { echo " rewrite ^/(.*) /index.php?q=\$uri&\$args last;"; echo ' }'; echo ''; @@ -516,7 +516,7 @@ function install_hubzilla { echo ' # or a unix socket'; echo ' location ~* \.php$ {'; } >> "/etc/nginx/sites-available/$HUBZILLA_DOMAIN_NAME" nginx_limits "$HUBZILLA_DOMAIN_NAME" - nginx_disable_sniffing "$HUBZILLA_DOMAIN_NAME" + nginx_security_options "$HUBZILLA_DOMAIN_NAME" { echo ' # Zero-day exploit defense.'; echo ' # http://forum.nginx.org/read.php?2,88845,page=3'; echo " # Won't work properly (404 error) if the file is not stored on this"; diff --git a/src/freedombone-app-jitsi b/src/freedombone-app-jitsi index 0a87e522..c82f192e 100755 --- a/src/freedombone-app-jitsi +++ b/src/freedombone-app-jitsi @@ -286,8 +286,8 @@ function install_jitsi { function_check nginx_ssl nginx_ssl ${JITSI_DOMAIN_NAME} - function_check nginx_disable_sniffing - nginx_disable_sniffing ${JITSI_DOMAIN_NAME} + function_check nginx_security_options + nginx_security_options ${JITSI_DOMAIN_NAME} { echo ' add_header Strict-Transport-Security max-age=15768000;'; echo ''; diff --git a/src/freedombone-app-kanboard b/src/freedombone-app-kanboard index 43edb7d2..7c936fbf 100755 --- a/src/freedombone-app-kanboard +++ b/src/freedombone-app-kanboard @@ -468,8 +468,8 @@ function install_kanboard { function_check nginx_ssl nginx_ssl "$KANBOARD_DOMAIN_NAME" - function_check nginx_disable_sniffing - nginx_disable_sniffing "$KANBOARD_DOMAIN_NAME" + function_check nginx_security_options + nginx_security_options "$KANBOARD_DOMAIN_NAME" { echo ' add_header Strict-Transport-Security max-age=15768000;'; echo ''; @@ -517,8 +517,8 @@ function install_kanboard { function_check nginx_compress nginx_compress "$KANBOARD_DOMAIN_NAME" echo '' >> "$kanboard_nginx_site" - function_check nginx_disable_sniffing - nginx_disable_sniffing "$KANBOARD_DOMAIN_NAME" + function_check nginx_security_options + nginx_security_options "$KANBOARD_DOMAIN_NAME" { echo ''; echo ' # Logs'; echo ' access_log /dev/null;'; diff --git a/src/freedombone-app-keyserver b/src/freedombone-app-keyserver index ecb9998c..157555b0 100755 --- a/src/freedombone-app-keyserver +++ b/src/freedombone-app-keyserver @@ -742,8 +742,8 @@ function install_keyserver { function_check nginx_ssl nginx_ssl $KEYSERVER_DOMAIN_NAME - function_check nginx_disable_sniffing - nginx_disable_sniffing $KEYSERVER_DOMAIN_NAME + function_check nginx_security_options + nginx_security_options $KEYSERVER_DOMAIN_NAME { echo ' add_header Strict-Transport-Security max-age=15768000;'; echo ''; @@ -792,8 +792,8 @@ function install_keyserver { echo ' return 404;'; echo ' }'; echo ''; } >> $keyserver_nginx_site - function_check nginx_disable_sniffing - nginx_disable_sniffing $KEYSERVER_DOMAIN_NAME + function_check nginx_security_options + nginx_security_options $KEYSERVER_DOMAIN_NAME { echo ''; echo ' # Logs'; echo ' access_log /dev/null;'; diff --git a/src/freedombone-app-koel b/src/freedombone-app-koel index d4664832..0666f066 100755 --- a/src/freedombone-app-koel +++ b/src/freedombone-app-koel @@ -553,8 +553,8 @@ function install_koel_main { function_check nginx_ssl mobile nginx_ssl "$KOEL_DOMAIN_NAME" - function_check nginx_disable_sniffing - nginx_disable_sniffing "$KOEL_DOMAIN_NAME" + function_check nginx_security_options + nginx_security_options "$KOEL_DOMAIN_NAME" { echo ' add_header Strict-Transport-Security max-age=15768000;'; echo ''; diff --git a/src/freedombone-app-lychee b/src/freedombone-app-lychee index 18cf05e3..1e034dd6 100755 --- a/src/freedombone-app-lychee +++ b/src/freedombone-app-lychee @@ -270,8 +270,8 @@ function install_lychee_website { echo ' proxy_read_timeout 86400s;'; } >> "/etc/nginx/sites-available/$LYCHEE_DOMAIN_NAME" function_check nginx_ssl nginx_ssl "$LYCHEE_DOMAIN_NAME" - function_check nginx_disable_sniffing - nginx_disable_sniffing "$LYCHEE_DOMAIN_NAME" + function_check nginx_security_options + nginx_security_options "$LYCHEE_DOMAIN_NAME" { echo ' add_header Strict-Transport-Security "max-age=0;";'; echo ''; echo ' # rewrite to front controller as default rule'; @@ -331,8 +331,8 @@ function install_lychee_website_onion { echo ' index index.html;'; echo ' charset utf-8;'; echo ' proxy_read_timeout 86400s;'; } >> "/etc/nginx/sites-available/$LYCHEE_DOMAIN_NAME" - function_check nginx_disable_sniffing - nginx_disable_sniffing "$LYCHEE_DOMAIN_NAME" + function_check nginx_security_options + nginx_security_options "$LYCHEE_DOMAIN_NAME" { echo ' add_header Strict-Transport-Security "max-age=0;";'; echo ''; echo ' # rewrite to front controller as default rule'; diff --git a/src/freedombone-app-mailpile b/src/freedombone-app-mailpile index 5becd87c..f8329920 100755 --- a/src/freedombone-app-mailpile +++ b/src/freedombone-app-mailpile @@ -248,8 +248,8 @@ function install_mailpile { function_check nginx_ssl nginx_ssl $MAILPILE_DOMAIN_NAME - function_check nginx_disable_sniffing - nginx_disable_sniffing $MAILPILE_DOMAIN_NAME + function_check nginx_security_options + nginx_security_options $MAILPILE_DOMAIN_NAME { echo ' add_header Strict-Transport-Security max-age=15768000;'; echo ''; @@ -280,8 +280,8 @@ function install_mailpile { echo " listen 127.0.0.1:$MAILPILE_ONION_PORT default_server;"; echo " server_name $MAILPILE_ONION_HOSTNAME;"; echo ''; } >> $mailpile_nginx_site - function_check nginx_disable_sniffing - nginx_disable_sniffing $MAILPILE_DOMAIN_NAME + function_check nginx_security_options + nginx_security_options $MAILPILE_DOMAIN_NAME { echo ''; echo ' # Logs'; echo ' access_log /dev/null;'; diff --git a/src/freedombone-app-matrix b/src/freedombone-app-matrix index 5f7ac49b..8c86acb7 100755 --- a/src/freedombone-app-matrix +++ b/src/freedombone-app-matrix @@ -135,8 +135,8 @@ function matrix_nginx { function_check nginx_ssl nginx_ssl ${MATRIX_DOMAIN_NAME} - function_check nginx_disable_sniffing - nginx_disable_sniffing ${MATRIX_DOMAIN_NAME} + function_check nginx_security_options + nginx_security_options ${MATRIX_DOMAIN_NAME} { echo ' add_header Strict-Transport-Security max-age=15768000;'; echo ''; @@ -164,8 +164,8 @@ function matrix_nginx { function_check nginx_ssl nginx_ssl ${MATRIX_DOMAIN_NAME} - function_check nginx_disable_sniffing - nginx_disable_sniffing ${MATRIX_DOMAIN_NAME} + function_check nginx_security_options + nginx_security_options ${MATRIX_DOMAIN_NAME} { echo ' add_header Strict-Transport-Security max-age=15768000;'; echo ''; @@ -193,8 +193,8 @@ function matrix_nginx { echo " listen 127.0.0.1:$MATRIX_FEDERATION_ONION_PORT default_server;"; echo " server_name $MATRIX_DOMAIN_NAME;"; echo ''; } >> $matrix_nginx_site - function_check nginx_disable_sniffing - nginx_disable_sniffing $MATRIX_DOMAIN_NAME + function_check nginx_security_options + nginx_security_options $MATRIX_DOMAIN_NAME { echo ''; echo ' # Logs'; echo ' access_log /dev/null;'; @@ -214,8 +214,8 @@ function matrix_nginx { echo " listen 127.0.0.1:$MATRIX_ONION_PORT default_server;"; echo " server_name $MATRIX_DOMAIN_NAME;"; echo ''; } >> $matrix_nginx_site - function_check nginx_disable_sniffing - nginx_disable_sniffing $MATRIX_DOMAIN_NAME + function_check nginx_security_options + nginx_security_options $MATRIX_DOMAIN_NAME { echo ''; echo ' # Logs'; echo ' access_log /dev/null;'; diff --git a/src/freedombone-app-mediagoblin b/src/freedombone-app-mediagoblin index 3c8a7160..ed959f42 100755 --- a/src/freedombone-app-mediagoblin +++ b/src/freedombone-app-mediagoblin @@ -381,8 +381,8 @@ function install_mediagoblin { echo ''; } >> "/etc/nginx/sites-available/$MEDIAGOBLIN_DOMAIN_NAME" function_check nginx_ssl nginx_ssl "$MEDIAGOBLIN_DOMAIN_NAME" - function_check nginx_disable_sniffing - nginx_disable_sniffing "$MEDIAGOBLIN_DOMAIN_NAME" + function_check nginx_security_options + nginx_security_options "$MEDIAGOBLIN_DOMAIN_NAME" function_check nginx_limits nginx_limits "$MEDIAGOBLIN_DOMAIN_NAME" 800m { echo ''; @@ -438,8 +438,8 @@ function install_mediagoblin { echo ' default_type application/octet-stream;'; echo ' sendfile on;'; echo ''; } >> "/etc/nginx/sites-available/$MEDIAGOBLIN_DOMAIN_NAME" - function_check nginx_disable_sniffing - nginx_disable_sniffing "$MEDIAGOBLIN_DOMAIN_NAME" + function_check nginx_security_options + nginx_security_options "$MEDIAGOBLIN_DOMAIN_NAME" function_check nginx_limits nginx_limits "$MEDIAGOBLIN_DOMAIN_NAME" 800m { echo ''; diff --git a/src/freedombone-app-movim b/src/freedombone-app-movim index ee01d9ca..2d533aa6 100755 --- a/src/freedombone-app-movim +++ b/src/freedombone-app-movim @@ -444,8 +444,8 @@ function install_movim { function_check nginx_ssl nginx_ssl "$MOVIM_DOMAIN_NAME" - function_check nginx_disable_sniffing - nginx_disable_sniffing "$MOVIM_DOMAIN_NAME" + function_check nginx_security_options + nginx_security_options "$MOVIM_DOMAIN_NAME" { echo ' add_header Strict-Transport-Security max-age=15768000;'; echo ''; @@ -506,8 +506,8 @@ function install_movim { function_check nginx_compress nginx_compress "$MOVIM_DOMAIN_NAME" echo '' >> "$movim_nginx_site" - function_check nginx_disable_sniffing - nginx_disable_sniffing "$MOVIM_DOMAIN_NAME" + function_check nginx_security_options + nginx_security_options "$MOVIM_DOMAIN_NAME" { echo ''; echo ' # Logs'; echo ' access_log /dev/null;'; diff --git a/src/freedombone-app-nextcloud b/src/freedombone-app-nextcloud index b2516b40..ba5acead 100755 --- a/src/freedombone-app-nextcloud +++ b/src/freedombone-app-nextcloud @@ -490,8 +490,8 @@ function install_nextcloud_main { function_check nginx_ssl nginx_ssl "$NEXTCLOUD_DOMAIN_NAME" mobile - function_check nginx_disable_sniffing - nginx_disable_sniffing "$NEXTCLOUD_DOMAIN_NAME" + function_check nginx_security_options + nginx_security_options "$NEXTCLOUD_DOMAIN_NAME" { echo ' add_header Strict-Transport-Security max-age=15768000;'; echo ''; @@ -554,8 +554,8 @@ function install_nextcloud_main { echo " listen 127.0.0.1:$NEXTCLOUD_ONION_PORT default_server;"; echo " server_name $NEXTCLOUD_DOMAIN_NAME;"; echo ''; } >> "$nextcloud_nginx_site" - function_check nginx_disable_sniffing - nginx_disable_sniffing "$NEXTCLOUD_DOMAIN_NAME" + function_check nginx_security_options + nginx_security_options "$NEXTCLOUD_DOMAIN_NAME" { echo ''; echo ' # Logs'; echo ' access_log /dev/null;'; diff --git a/src/freedombone-app-peertube b/src/freedombone-app-peertube index 0289364a..e0e28f3f 100755 --- a/src/freedombone-app-peertube +++ b/src/freedombone-app-peertube @@ -376,8 +376,8 @@ function peertube_setup_web { function_check nginx_ssl nginx_ssl "$PEERTUBE_DOMAIN_NAME" mobile - function_check nginx_disable_sniffing - nginx_disable_sniffing "$PEERTUBE_DOMAIN_NAME" + function_check nginx_security_options + nginx_security_options "$PEERTUBE_DOMAIN_NAME" { echo ' add_header Strict-Transport-Security max-age=15768000;'; echo ''; diff --git a/src/freedombone-app-pelican b/src/freedombone-app-pelican index a27b72d6..c6809ab2 100755 --- a/src/freedombone-app-pelican +++ b/src/freedombone-app-pelican @@ -84,8 +84,8 @@ function install_pelican_website { echo ' charset utf-8;'; } >> "/etc/nginx/sites-available/$PELICAN_DOMAIN_NAME" function_check nginx_ssl nginx_ssl "$PELICAN_DOMAIN_NAME" - function_check nginx_disable_sniffing - nginx_disable_sniffing "$PELICAN_DOMAIN_NAME" + function_check nginx_security_options + nginx_security_options "$PELICAN_DOMAIN_NAME" { echo ' add_header Strict-Transport-Security "max-age=0;";'; echo ''; echo ' location / {'; } >> "/etc/nginx/sites-available/$PELICAN_DOMAIN_NAME" @@ -125,8 +125,8 @@ function install_pelican_website_onion { echo " error_log /dev/null;"; echo ' index index.html;'; echo ' charset utf-8;'; } >> "/etc/nginx/sites-available/$PELICAN_DOMAIN_NAME" - function_check nginx_disable_sniffing - nginx_disable_sniffing "$PELICAN_DOMAIN_NAME" + function_check nginx_security_options + nginx_security_options "$PELICAN_DOMAIN_NAME" { echo ' add_header Strict-Transport-Security "max-age=0;";'; echo ''; echo ' location / {'; } >> "/etc/nginx/sites-available/$PELICAN_DOMAIN_NAME" diff --git a/src/freedombone-app-pleroma b/src/freedombone-app-pleroma index aad01bab..0df55e69 100755 --- a/src/freedombone-app-pleroma +++ b/src/freedombone-app-pleroma @@ -1029,8 +1029,8 @@ function install_pleroma { function_check nginx_ssl nginx_ssl "$PLEROMA_DOMAIN_NAME" - function_check nginx_disable_sniffing - nginx_disable_sniffing "$PLEROMA_DOMAIN_NAME" + function_check nginx_security_options + nginx_security_options "$PLEROMA_DOMAIN_NAME" { echo ' add_header Strict-Transport-Security max-age=15768000;'; echo ''; @@ -1069,8 +1069,8 @@ function install_pleroma { function_check nginx_compress nginx_compress "$PLEROMA_DOMAIN_NAME" echo '' >> "$pleroma_nginx_site" - function_check nginx_disable_sniffing - nginx_disable_sniffing "$PLEROMA_DOMAIN_NAME" + function_check nginx_security_options + nginx_security_options "$PLEROMA_DOMAIN_NAME" { echo ''; echo ' # Logs'; echo ' access_log /dev/null;'; diff --git a/src/freedombone-app-postactiv b/src/freedombone-app-postactiv index 9c9b9d61..23678cf6 100755 --- a/src/freedombone-app-postactiv +++ b/src/freedombone-app-postactiv @@ -721,8 +721,8 @@ function install_postactiv_main { function_check nginx_ssl nginx_ssl "$POSTACTIV_DOMAIN_NAME" - function_check nginx_disable_sniffing - nginx_disable_sniffing "$POSTACTIV_DOMAIN_NAME" + function_check nginx_security_options + nginx_security_options "$POSTACTIV_DOMAIN_NAME" { echo ' add_header Strict-Transport-Security max-age=15768000;'; echo ''; @@ -767,8 +767,8 @@ function install_postactiv_main { echo " listen 127.0.0.1:$POSTACTIV_ONION_PORT default_server;"; echo " server_name $POSTACTIV_ONION_HOSTNAME;"; echo ''; } >> "$postactiv_nginx_site" - function_check nginx_disable_sniffing - nginx_disable_sniffing "$POSTACTIV_DOMAIN_NAME" + function_check nginx_security_options + nginx_security_options "$POSTACTIV_DOMAIN_NAME" echo '' >> "$postactiv_nginx_site" function_check nginx_compress nginx_compress "$POSTACTIV_DOMAIN_NAME" diff --git a/src/freedombone-app-privatebin b/src/freedombone-app-privatebin index e68c2338..3c2e4c24 100755 --- a/src/freedombone-app-privatebin +++ b/src/freedombone-app-privatebin @@ -351,8 +351,8 @@ function install_privatebin { function_check nginx_ssl nginx_ssl "$PRIVATEBIN_DOMAIN_NAME" - function_check nginx_disable_sniffing - nginx_disable_sniffing "$PRIVATEBIN_DOMAIN_NAME" + function_check nginx_security_options + nginx_security_options "$PRIVATEBIN_DOMAIN_NAME" { echo ' add_header Strict-Transport-Security max-age=15768000;'; echo ''; @@ -393,8 +393,8 @@ function install_privatebin { function_check nginx_compress nginx_compress "$PRIVATEBIN_DOMAIN_NAME" echo '' >> "$privatebin_nginx_site" - function_check nginx_disable_sniffing - nginx_disable_sniffing "$PRIVATEBIN_DOMAIN_NAME" + function_check nginx_security_options + nginx_security_options "$PRIVATEBIN_DOMAIN_NAME" { echo ''; echo ' # Logs'; echo ' access_log /dev/null;'; diff --git a/src/freedombone-app-radicale b/src/freedombone-app-radicale index 19cfe5b3..3c1f2080 100755 --- a/src/freedombone-app-radicale +++ b/src/freedombone-app-radicale @@ -476,8 +476,8 @@ function install_radicale { echo ''; } > "/etc/nginx/sites-available/${DEFAULT_DOMAIN_NAME}" function_check nginx_ssl nginx_ssl "${DEFAULT_DOMAIN_NAME}" mobile - function_check nginx_disable_sniffing - nginx_disable_sniffing "${DEFAULT_DOMAIN_NAME}" + function_check nginx_security_options + nginx_security_options "${DEFAULT_DOMAIN_NAME}" { echo ''; echo " server_name ${DEFAULT_DOMAIN_NAME};"; diff --git a/src/freedombone-app-riot b/src/freedombone-app-riot index f711aa2a..8b537b59 100755 --- a/src/freedombone-app-riot +++ b/src/freedombone-app-riot @@ -279,8 +279,8 @@ function install_riot { function_check nginx_ssl nginx_ssl $RIOT_DOMAIN_NAME - function_check nginx_disable_sniffing - nginx_disable_sniffing $RIOT_DOMAIN_NAME + function_check nginx_security_options + nginx_security_options $RIOT_DOMAIN_NAME { echo ' add_header Strict-Transport-Security max-age=15768000;'; echo ''; @@ -306,8 +306,8 @@ function install_riot { echo " listen 127.0.0.1:$RIOT_ONION_PORT default_server;"; echo " server_name $RIOT_ONION_HOSTNAME;"; echo ''; } >> $riot_nginx_site - function_check nginx_disable_sniffing - nginx_disable_sniffing $RIOT_DOMAIN_NAME + function_check nginx_security_options + nginx_security_options $RIOT_DOMAIN_NAME { echo ''; echo ' # Logs'; echo ' access_log /dev/null;'; diff --git a/src/freedombone-app-scuttlebot b/src/freedombone-app-scuttlebot index f19da997..3c96b4b5 100755 --- a/src/freedombone-app-scuttlebot +++ b/src/freedombone-app-scuttlebot @@ -317,8 +317,8 @@ function scuttlebot_git_setup { function_check nginx_ssl nginx_ssl $SCUTTLEBOT_DOMAIN_NAME - function_check nginx_disable_sniffing - nginx_disable_sniffing $SCUTTLEBOT_DOMAIN_NAME + function_check nginx_security_options + nginx_security_options $SCUTTLEBOT_DOMAIN_NAME fi { echo ''; diff --git a/src/freedombone-app-searx b/src/freedombone-app-searx index 0d2365da..913d01dd 100755 --- a/src/freedombone-app-searx +++ b/src/freedombone-app-searx @@ -967,8 +967,8 @@ function install_searx { echo ' access_log /dev/null;'; echo " error_log /var/log/searx_error.log $WEBSERVER_LOG_LEVEL;"; echo ''; } > /etc/nginx/sites-available/searx - function_check nginx_disable_sniffing - nginx_disable_sniffing searx + function_check nginx_security_options + nginx_security_options searx { echo ' add_header Strict-Transport-Security max-age=0;'; echo ''; echo ' location / {'; } >> /etc/nginx/sites-available/searx diff --git a/src/freedombone-app-tahoelafs b/src/freedombone-app-tahoelafs index a73edf10..4d37e489 100755 --- a/src/freedombone-app-tahoelafs +++ b/src/freedombone-app-tahoelafs @@ -608,8 +608,8 @@ function create_tahoelafs_web { echo " listen 127.0.0.1:$TAHOELAFS_ONION_PORT default_server;"; echo " server_name $TAHOELAFS_ONION_HOSTNAME;"; echo ''; } > "$tahoelafs_nginx_site" - function_check nginx_disable_sniffing - nginx_disable_sniffing tahoelafs + function_check nginx_security_options + nginx_security_options tahoelafs { echo ''; echo ' # Logs'; echo ' access_log /dev/null;'; diff --git a/src/freedombone-app-turtl b/src/freedombone-app-turtl index 2017377d..2075398c 100755 --- a/src/freedombone-app-turtl +++ b/src/freedombone-app-turtl @@ -674,8 +674,8 @@ function install_turtl_nginx { function_check nginx_ssl nginx_ssl $TURTL_DOMAIN_NAME - function_check nginx_disable_sniffing - nginx_disable_sniffing $TURTL_DOMAIN_NAME + function_check nginx_security_options + nginx_security_options $TURTL_DOMAIN_NAME { echo ' add_header Strict-Transport-Security max-age=15768000;'; echo ''; @@ -698,8 +698,8 @@ function install_turtl_nginx { echo " listen 127.0.0.1:${TURTL_ONION_PORT};"; echo " server_name ${TURTL_ONION_HOSTNAME};"; echo ''; } >> $turtl_nginx_site - function_check nginx_disable_sniffing - nginx_disable_sniffing $TURTL_DOMAIN_NAME + function_check nginx_security_options + nginx_security_options $TURTL_DOMAIN_NAME { echo ''; echo ' # Logs'; echo ' access_log /dev/null;'; diff --git a/src/freedombone-template b/src/freedombone-template index be5b11b3..242fbacb 100755 --- a/src/freedombone-template +++ b/src/freedombone-template @@ -665,7 +665,7 @@ if [ $app_onion_only ]; then echo " echo ' # Security' >> \$${app_name}_nginx_site" echo " nginx_ssl \$${app_name_upper}_DOMAIN_NAME" echo '' - echo " nginx_disable_sniffing \$${app_name_upper}_DOMAIN_NAME" + echo " nginx_security_options \$${app_name_upper}_DOMAIN_NAME" echo '' echo " echo ' add_header Strict-Transport-Security max-age=15768000;' >> \$${app_name}_nginx_site" echo " echo '' >> \$${app_name}_nginx_site" @@ -709,7 +709,7 @@ echo " echo \" server_name \$${app_name_upper}_ONION_HOSTNAME;\" >> \$${ap echo " echo '' >> \$${app_name}_nginx_site" echo " nginx_compress \$${app_name_upper}_DOMAIN_NAME" echo " echo '' >> \$${app_name}_nginx_site" -echo " nginx_disable_sniffing \$${app_name_upper}_DOMAIN_NAME" +echo " nginx_security_options \$${app_name_upper}_DOMAIN_NAME" echo " echo '' >> \$${app_name}_nginx_site" echo " echo ' # Logs' >> \$${app_name}_nginx_site" echo " echo ' access_log /dev/null;' >> \$${app_name}_nginx_site" diff --git a/src/freedombone-utils-turn b/src/freedombone-utils-turn index d85b79f7..c2334ace 100755 --- a/src/freedombone-utils-turn +++ b/src/freedombone-utils-turn @@ -81,8 +81,8 @@ function install_turn { function_check nginx_ssl nginx_ssl "${DEFAULT_DOMAIN_NAME}" - function_check nginx_disable_sniffing - nginx_disable_sniffing "${DEFAULT_DOMAIN_NAME}" + function_check nginx_security_options + nginx_security_options "${DEFAULT_DOMAIN_NAME}" { echo ' add_header Strict-Transport-Security max-age=15768000;'; echo ''; @@ -109,8 +109,8 @@ function install_turn { echo " listen 127.0.0.1:$TURN_ONION_PORT default_server;"; echo " server_name $DEFAULT_DOMAIN_NAME;"; echo ''; } >> "$turn_nginx_site" - function_check nginx_disable_sniffing - nginx_disable_sniffing "$DEFAULT_DOMAIN_NAME" + function_check nginx_security_options + nginx_security_options "$DEFAULT_DOMAIN_NAME" { echo ''; echo ' # Logs'; echo ' access_log /dev/null;'; diff --git a/src/freedombone-utils-web b/src/freedombone-utils-web index 62bf5ac4..afadfc05 100755 --- a/src/freedombone-utils-web +++ b/src/freedombone-utils-web @@ -71,7 +71,7 @@ function validate_domain_name { fi } -function nginx_disable_sniffing { +function nginx_security_options { domain_name=$1 filename=/etc/nginx/sites-available/$domain_name { echo ' add_header X-Frame-Options DENY;'; @@ -913,8 +913,8 @@ function create_default_web_site { function_check nginx_ssl nginx_ssl "$DEFAULT_DOMAIN_NAME" mobile - function_check nginx_disable_sniffing - nginx_disable_sniffing "$DEFAULT_DOMAIN_NAME" + function_check nginx_security_options + nginx_security_options "$DEFAULT_DOMAIN_NAME" { echo ' add_header Strict-Transport-Security max-age=15768000;'; echo ''; @@ -946,8 +946,8 @@ function create_default_web_site { echo " listen 127.0.0.1:$DEFAULT_DOMAIN_ONION_PORT default_server;"; echo " server_name $DEFAULT_DOMAIN_NAME;"; echo ''; } >> "$nginx_site" - function_check nginx_disable_sniffing - nginx_disable_sniffing "$DEFAULT_DOMAIN_NAME" + function_check nginx_security_options + nginx_security_options "$DEFAULT_DOMAIN_NAME" { echo ''; echo ' # Logs'; echo ' access_log /dev/null;';