- PHP 7.4 support - Improved Webp images support with Cloudflare (Issue [#95](https://github.com/WordOps/WordOps/issues/95)). Nginx will not serve webp images alternative with Cloudflare IP ranges. - Stack upgrade for adminer - Check acme.sh installation and setup acme.sh if needed before issuing certificate - Add `--ufw` to `wo stack status` - Add Nginx directive `gzip_static on;` to serve precompressed assets with Cache-Enabler or WP-Rocket. (Issue [#207](https://github.com/WordOps/WordOps/issues/207)) - Previous `--php73` & `--php73=off` flags are replaced by `--php72`, `--php73`, `--php74` to switch site's php version - phpMyAdmin updated to v4.9.2 - Adminer updated to v4.7.5 - Replace dot and dashes by underscores in database names (Issue [#206](https://github.com/WordOps/WordOps/issues/206)) - Increased database name length to 32 characters from domain name + 8 random characters - typo error in motd-news script (Issue [#204](https://github.com/WordOps/WordOps/issues/204)) - Install Nginx before ngxblocker - WordOps install/update script text color - Issue with MySQL stack on Raspbian 9/10 - Typo error (PR [#205](https://github.com/WordOps/WordOps/pull/205)) - php version in `wo debug` (PR [#209](https://github.com/WordOps/WordOps/pull/209)) - SSL certificates expiration display with shared wildcard certificates
97 lines
3.1 KiB
Plaintext
97 lines
3.1 KiB
Plaintext
# WordPress COMMON SETTINGS - WordOps {{release}}
|
|
# DO NOT MODIFY, ALL CHANGES WILL BE LOST AFTER AN WordOps (wo) UPDATE
|
|
# Limit access to avoid brute force attack
|
|
location = /wp-login.php {
|
|
limit_req zone=one burst=1 nodelay;
|
|
include fastcgi_params;
|
|
fastcgi_pass {{upstream}};
|
|
}
|
|
# Prevent DoS attacks on wp-cron
|
|
location = /wp-cron.php {
|
|
limit_req zone=two burst=1 nodelay;
|
|
include fastcgi_params;
|
|
fastcgi_pass {{upstream}};
|
|
}
|
|
# Prevent DoS attacks with xmlrpc.php
|
|
location = /xmlrpc.php {
|
|
limit_req zone=two burst=1 nodelay;
|
|
include fastcgi_params;
|
|
fastcgi_pass {{upstream}};
|
|
}
|
|
# Disable wp-config.txt
|
|
location = /wp-config.txt {
|
|
deny all;
|
|
access_log off;
|
|
log_not_found off;
|
|
}
|
|
location = /robots.txt {
|
|
# Some WordPress plugin gererate robots.txt file
|
|
# Refer #340 issue
|
|
try_files $uri $uri/ /index.php?$args @robots;
|
|
access_log off;
|
|
log_not_found off;
|
|
}
|
|
# fallback for robots.txt with default wordpress rules
|
|
location @robots {
|
|
return 200 "User-agent: *\nDisallow: /wp-admin/\nAllow: /wp-admin/admin-ajax.php\n";
|
|
}
|
|
# webp rewrite rules for jpg and png images
|
|
# try to load alternative image.png.webp before image.png
|
|
location /wp-content/uploads {
|
|
location ~ \.(png|jpe?g)$ {
|
|
add_header Vary "Accept-Encoding";
|
|
more_set_headers 'Access-Control-Allow-Origin : *';
|
|
more_set_headers "Cache-Control : public, no-transform";
|
|
access_log off;
|
|
log_not_found off;
|
|
expires max;
|
|
try_files $uri$webp_suffix $uri =404;
|
|
}
|
|
location ~* \.(php|gz|log|zip|tar|rar|xz)$ {
|
|
#Prevent Direct Access Of PHP Files & BackupsFrom Web Browsers
|
|
deny all;
|
|
}
|
|
}
|
|
# webp rewrite rules for EWWW testing image
|
|
location /wp-content/plugins/ewww-image-optimizer/images {
|
|
location ~ \.(png|jpe?g)$ {
|
|
add_header Vary "Accept-Encoding";
|
|
more_set_headers 'Access-Control-Allow-Origin : *';
|
|
more_set_headers "Cache-Control : public, no-transform";
|
|
access_log off;
|
|
log_not_found off;
|
|
expires max;
|
|
try_files $uri$webp_suffix $uri =404;
|
|
}
|
|
location ~ \.php$ {
|
|
#Prevent Direct Access Of PHP Files From Web Browsers
|
|
deny all;
|
|
}
|
|
}
|
|
# enable gzip on static assets - php files are forbidden
|
|
location /wp-content/cache {
|
|
# Cache css & js files
|
|
location ~* \.(?:css(\.map)?|js(\.map)?|.html)$ {
|
|
more_set_headers 'Access-Control-Allow-Origin : *';
|
|
access_log off;
|
|
log_not_found off;
|
|
expires 30d;
|
|
}
|
|
location ~ \.php$ {
|
|
#Prevent Direct Access Of PHP Files From Web Browsers
|
|
deny all;
|
|
}
|
|
}
|
|
# Deny access to any files with a .php extension in the uploads directory
|
|
# Works in sub-directory installs and also in multisite network
|
|
# Keep logging the requests to parse later (or to pass to firewall utilities such as fail2ban)
|
|
location ~* /(?:uploads|files)/.*\.php$ {
|
|
deny all;
|
|
}
|
|
# mitigate DoS attack CVE with WordPress script concatenation
|
|
# add the following line to wp-config.php
|
|
# define( 'CONCATENATE_SCRIPTS', false );
|
|
location ~ \/wp-admin\/load-(scripts|styles).php {
|
|
deny all;
|
|
}
|