From db98ee173e9304ed36c744d132009ea47cdb0492 Mon Sep 17 00:00:00 2001 From: faulty Date: Wed, 1 Feb 2023 12:35:39 +0100 Subject: [PATCH] mod: remove nginx line --- custom/cryptpad/conf.d/cryptpad.conf | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/custom/cryptpad/conf.d/cryptpad.conf b/custom/cryptpad/conf.d/cryptpad.conf index 3b38345..b948ad6 100644 --- a/custom/cryptpad/conf.d/cryptpad.conf +++ b/custom/cryptpad/conf.d/cryptpad.conf @@ -43,7 +43,7 @@ server { set $api_domain "${main_domain}"; set $files_domain "${main_domain}"; - # nginx doesn't let you set server_name via variables, so you need to hardcode your domains here + # nginx doesn't let you set server_name via variables, so you need to hardcore your domains here server_name pad.ixvd.net pad.sandbox.neo.ixvd.net; # You'll need to Set the path to your certificates and keys here @@ -162,7 +162,7 @@ server { # because of bugs in Chromium-based browsers that incorrectly ignore headers that are supposed to enable # the use of some modern APIs that we require when javascript is run in a cross-origin context. # We've applied other sandboxing techniques to mitigate the risk of running WebAssembly in this privileged scope - if ($uri ~ ^\/unsafeiframe\/inner\.html.*$) { set $unsafe 1; } + # if ($uri ~ ^\/unsafeiframe\/inner\.html.*$) { set $unsafe 1; } # privileged contexts allow a few more rights than unprivileged contexts, though limits are still applied if ($unsafe) {