From 0344b168276f80189e2254c75a762aff5b517b6b Mon Sep 17 00:00:00 2001 From: Aleksander Machniak <alec@alec.pl> Date: Sun, 22 May 2016 06:32:57 -0400 Subject: [PATCH] Fix priority icon(s) position --- .htaccess | 45 +++++++++++++++++++++++++++++++++++---------- 1 files changed, 35 insertions(+), 10 deletions(-) diff --git a/.htaccess b/.htaccess index 59e5dca..99d25b7 100644 --- a/.htaccess +++ b/.htaccess @@ -1,6 +1,4 @@ -# AddDefaultCharset UTF-8 -AddType text/x-component .htc - +# WARNING: For PHP 7 the module name in the line below need to be modified! <IfModule mod_php5.c> php_flag display_errors Off php_flag log_errors On @@ -43,13 +41,6 @@ SetOutputFilter DEFLATE </IfModule> -<IfModule mod_headers.c> -# replace 'append' with 'merge' for Apache version 2.2.9 and later -#Header append Cache-Control public env=!NO_CACHE -# for better privacy/security ask browsers to not set the Referer -#Header set Content-Security-Policy "referrer no-referrer" -</IfModule> - <IfModule mod_expires.c> ExpiresActive On ExpiresDefault "access plus 1 month" @@ -60,3 +51,37 @@ <IfModule mod_autoindex.c> Options -Indexes </ifModule> + +<IfModule mod_headers.c> +# replace 'append' with 'merge' for Apache version 2.2.9 and later +#Header append Cache-Control public env=!NO_CACHE + +# Optional security header +# Only increased security if the browser support those features +# Be careful! Testing is required! They should be adusted to your intallation / user environment + +# HSTS - HTTP Strict Transport Security +#Header always set Strict-Transport-Security "max-age=31536000; preload" env=HTTPS + +# HPKP - HTTP Public Key Pinning +# Only template - fill with your values +#Header always set Public-Key-Pins "max-age=3600; report-uri=\"\"; pin-sha256=\"\"; pin-sha256=\"\"" env=HTTPS + +# X-Xss-Protection +# This header is used to configure the built in reflective XSS protection found in Internet Explorer, Chrome and Safari (Webkit). +#Header set X-XSS-Protection "1; mode=block" + +# X-Frame-Options +# The X-Frame-Options header (RFC), or XFO header, protects your visitors against clickjacking attacks +# Already set by php code! Do not activate both options +#Header set X-Frame-Options SAMEORIGIN + +# X-Content-Type-Options +# It prevents Google Chrome and Internet Explorer from trying to mime-sniff the content-type of a response away from the one being declared by the server. +#Header set X-Content-Type-Options: "nosniff" + +# CSP - Content Security Policy +# for better privacy/security ask browsers to not set the Referer +# more flags for script, stylesheets and images available, read RFC for more information +#Header set Content-Security-Policy "referrer no-referrer" +</IfModule> -- Gitblit v1.9.1