generated from nginx/template-repository
-
Notifications
You must be signed in to change notification settings - Fork 101
NGINX App Protect 5.7 / 4.15 Release #571
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Merged
Merged
Changes from all commits
Commits
Show all changes
88 commits
Select commit
Hold shift + click to select a range
81fd8a2
feat: Add information about IP groups for NAP-WAF 5.7 (#562)
kudriavitsky fddf29b
Merge branch 'main' into nap-release-5.7
ADubhlaoich 4f69882
chore: add IP intelligence (#616)
mouraddmeiri c898f90
feat: Improve NAP-WAF brute force and login-pages documentation (#609)
kudriavitsky dfc25ee
Merge branch 'main' into nap-release-5.7
ADubhlaoich f5de946
feat: add IP intelligence (new) (#622)
mouraddmeiri 9db7a2c
Merge branch 'main' into nap-release-5.7
ADubhlaoich fe9f6e0
Update configuration.md
ohad-perets 737cef1
add ipi to configuration table
ohad-perets 027a26a
remove xff from ip groups example
ohad-perets 11921cd
Merge branch 'main' into nap-release-5.7
ADubhlaoich f4660b8
feat: Remove redundant content
ADubhlaoich f8fedc0
feat: Update IP feature links
ADubhlaoich 4c2691d
Update install.md (#650)
kudriavitsky 44f4b7d
Merge branch 'main' into nap-release-5.7
ADubhlaoich 1b319ce
feat: Add placeholder release pages
ADubhlaoich 7d8f146
Update about-4.15.md
ohad-perets d7808ab
Update about-5.7.md
ohad-perets 337d455
Update about-4.15.md
ohad-perets 4d9b35c
Update about-5.7.md
ohad-perets 3079aca
Update ip-groups-overview.md (#679)
kudriavitsky d0f58a2
Update ip-groups-override-rules.md (#680)
kudriavitsky 08cd183
Update about-4.15.md
ohad-perets d449557
Update about-5.7.md
ohad-perets 78fb5cb
feat: Update overview.md (#651)
kudriavitsky 0dfb1c0
Update deploy-on-docker.md
ohad-perets a5ccc4c
Update deploy-with-helm.md
ohad-perets 3499bbb
Update install.md
ohad-perets 4b9f094
Update overview.md
ohad-perets 85a17f4
Update troubleshooting.md
ohad-perets 73d7f35
Update install.md
ohad-perets 1b584c5
Update upgrade-nap-waf.md
ohad-perets 039a688
Update deploy-with-manifests.md
ohad-perets df3dbc2
Update install.md
ohad-perets 39360d8
Update about-5.7.md
ohad-perets 50f2177
Update about-4.15.md
ohad-perets 5aa316f
Update ip-groups-override-rules.md
ohad-perets 893d1f7
Update ip-groups-overview.md
ohad-perets 150f76e
Update configuration.md
ohad-perets 1708b8a
Update configuration.md
ohad-perets b6d0c54
Update configuration.md
ohad-perets 606b0f3
Update ip-groups-override-rules.md (#711)
kudriavitsky 89e9b47
Merge branch 'main' into nap-release-5.7
ADubhlaoich 118a1fd
Update install.md
ohad-perets c50d9fd
Update install.md
ohad-perets 08d3d9d
Create build-rocky.md
ohad-perets eddc8bb
Create build-rocky.md
ohad-perets e1a561f
Update deploy-with-helm.md
ohad-perets 7eb2004
Update deploy-with-manifests.md
ohad-perets 20d29c1
Update build-rocky.md
ohad-perets f7122b9
Update build-rocky.md
ohad-perets f392846
Update deploy-on-docker.md
ohad-perets 7797ada
Update Generated Documentation (#723)
ohad-perets 5cba050
Update about-4.15.md
ohad-perets 2397377
Update about-5.7.md
ohad-perets 13dfebf
feat: Last minute changes for IP intelligence (#722)
mouraddmeiri 0500694
Update policy.json (#724)
kudriavitsky 0ae1680
Update policy.html (#726)
kudriavitsky f571041
Merge branch 'main' into nap-release-5.7
ADubhlaoich 3dbf3fe
feat: Update release dates
ADubhlaoich 35af817
Update install.md
ohad-perets 3724435
Merge branch 'nap-release-5.7' of github.com:nginx/documentation into…
ADubhlaoich 9e6ca07
Update about-4.15.md
ohad-perets 09366a0
Update about-5.7.md
ohad-perets 602d7f2
Update ip-intelligence-conf.md
ohad-perets 4c6203f
Update ip-intelligence-conf.md
ohad-perets b04c275
chore: add manifest and helm vars (#729)
mouraddmeiri ec943dc
Update install.md
ohad-perets 0d0047a
Update ip-intelligence-conf.md
ohad-perets b1a03c2
Update content/includes/nap-waf/ip-intelligence.md
ohad-perets a46dadb
Update content/nap-waf/v4/configuration-guide/configuration.md
ohad-perets 40a7251
Merge branch 'main' into nap-release-5.7
ADubhlaoich 927aa51
Update content/includes/nap-waf/config/common/ip-intelligence-conf.md
ADubhlaoich 40fe954
feat: Escape JSON properly
ADubhlaoich 8faf586
Merge branch 'main' into nap-release-5.7
ADubhlaoich f864dfa
Create forward-proxy-settings
ohad-perets 958f90a
Rename forward-proxy-settings to forward-proxy-settings.md
ohad-perets 51338c2
Create forward-proxy-conf.md
ohad-perets 336b4ec
Update configuration.md
ohad-perets 4dd3f37
Update configuration.md
ohad-perets e7cb677
Update ip-intelligence-conf.md
ohad-perets 53dbf90
Update forward-proxy-conf.md
ohad-perets e334c89
Delete content/includes/nap-waf/forward-proxy-settings.md
ohad-perets d3b81d4
Update forward-proxy-conf.md
ohad-perets c6d2836
Merge branch 'main' into nap-release-5.7
ADubhlaoich e445a42
Update forward-proxy-conf.md
ohad-perets a6444e3
Merge branch 'main' into nap-release-5.7
ADubhlaoich b7cfc7c
feat: Update date for releases
ADubhlaoich File filter
Filter by extension
Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
There are no files selected for viewing
20 changes: 20 additions & 0 deletions
20
content/includes/nap-waf/config/common/forward-proxy-conf.md
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,20 @@ | ||
Enable Forward Proxy Settings for IP Intelligence Client. | ||
|
||
To configure proxy settings, edit the client configuration file: | ||
Path: | ||
```shell | ||
/etc/app_protect/tools/iprepd.cfg | ||
``` | ||
Example configuration: | ||
```shell | ||
EnableProxy=True | ||
ProxyHost=5.1.2.4 | ||
ProxyPort=8080 | ||
ProxyUsername=admin # Optional | ||
ProxyPassword=admin # Optional | ||
CACertPath=/etc/ssl/certs/ca-certificates.crt # Optional | ||
``` | ||
After saving the changes, restart the client to apply the new settings. | ||
```shell | ||
/opt/app_protect/bin/iprepd /etc/app_protect/tools/iprepd.cfg > ipi.log 2>&1 & | ||
``` |
62 changes: 62 additions & 0 deletions
62
content/includes/nap-waf/config/common/ip-groups-override-rules.md
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,62 @@ | ||
#### IP-Address-Lists feature as part of Override Rules feature. | ||
|
||
The Override Rules feature allows you to override original or parent policy settings. | ||
|
||
Rules are defined using specific conditions, which can include an IP Address Lists based on the declarative policy JSON schema. | ||
|
||
When triggered, the rule is applied to the _clientIp_ attribute using the _matches_ function. | ||
|
||
'clientIp.matches(ipAddressLists["standalone"])' | ||
|
||
Here is a policy example: | ||
|
||
```json | ||
{ | ||
"policy": { | ||
"name": "ip_group_override_rule", | ||
"template": { | ||
"name": "POLICY_TEMPLATE_NGINX_BASE" | ||
}, | ||
"applicationLanguage": "utf-8", | ||
"caseInsensitive": false, | ||
"enforcementMode": "blocking", | ||
"ip-address-lists": [ | ||
{ | ||
"name": "standalone", | ||
"ipAddresses": [ | ||
{ | ||
"ipAddress": "1.1.1.1/32" | ||
} | ||
] | ||
} | ||
], | ||
"override-rules": [ | ||
{ | ||
"name": "myRule1", | ||
"condition": "clientIp.matches(ipAddressLists['standalone'])", | ||
"actionType": "extend-policy", | ||
"override": { | ||
"policy": { | ||
"enforcementMode": "transparent" | ||
} | ||
} | ||
} | ||
] | ||
} | ||
} | ||
``` | ||
|
||
The previous example policy contains an IP address lists with the name "standalone", used for the override rule condition "clientIp.matches(ipAddressLists['standalone'])". | ||
The condition means that the rule enforcement is applied and override base policy enforcement when clientIp is matched to one of ipAddresses in ipAddressList with name "standalone". | ||
The value used for the override condition must exist and exactly match the name in "ip-address-lists". | ||
|
||
#### Possible errors | ||
|
||
| Error text | Input | Explanation | | ||
| -----------| ------------- | ------------ | | ||
| _Invalid field invalidList_ | _clientIp.matches(invalidList['standalone']);_ | An incorrect keyword was used instead of _ipAddressLists_ | | ||
| _Invalid value empty string_ | _clientIp.matches(ipAddressLists['']_ | An empty name was provided | | ||
| _Failed to compile policy - 'ipGroupOverridePolicy'_ | _uri.matches(ipAddressLists['standalone']);_ | Used _ipAddressLists_ without the _clientIP_ attribute | | ||
|
||
|
||
|
81 changes: 81 additions & 0 deletions
81
content/includes/nap-waf/config/common/ip-groups-overview.md
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,81 @@ | ||
IP address lists is a feature to organize lists of allowed and forbidden IP addresses across several lists with common attributes. | ||
|
||
This allows you to control unique policy settings for incoming requests based on specific IP addresses. | ||
|
||
Each IP address list contains a unique name, enforcement type (_always_, _never_ and _policy-default_), and list of IP addresses. | ||
|
||
|
||
An example of a declarative policy using IP address lists configuration: | ||
|
||
```json | ||
{ | ||
"policy": { | ||
"name": "IpGroups_policy", | ||
"template": { | ||
"name": "POLICY_TEMPLATE_NGINX_BASE" | ||
}, | ||
"applicationLanguage": "utf-8", | ||
"caseInsensitive": false, | ||
"enforcementMode": "blocking", | ||
"ip-address-lists": [ | ||
{ | ||
"name": "Standalone", | ||
"description": "Optional Description", | ||
"blockRequests": "policy-default", | ||
"setGeolocation": "IN", | ||
"ipAddresses": [ | ||
{ | ||
"ipAddress": "1.2.3.4/32" | ||
}, | ||
{ | ||
"ipAddress": "1111:fc00:0:112::2" | ||
} | ||
] | ||
} | ||
] | ||
} | ||
} | ||
|
||
``` | ||
The example with IP-Group definition in external file external_ip_groups.json: | ||
|
||
```json | ||
{ | ||
"policy": { | ||
"name": "IpGroups_policy2", | ||
"template": { | ||
"name": "POLICY_TEMPLATE_NGINX_BASE" | ||
}, | ||
"applicationLanguage": "utf-8", | ||
"caseInsensitive": false, | ||
"enforcementMode": "blocking", | ||
"ip-address-lists": [ | ||
{ | ||
"name": "external_ip_groups", | ||
"description": "Optional Description", | ||
"blockRequests": "always", | ||
"setGeolocation": "IL", | ||
"$ref": "file:///tmp/policy/external_ip_groups.json" | ||
} | ||
] | ||
} | ||
} | ||
``` | ||
Example of the file external_ip_groups.json | ||
|
||
```json | ||
{ | ||
"name": "External IP address lists", | ||
"description": "Optional Description", | ||
"blockRequests": "always", | ||
"setGeolocation": "IR", | ||
"ipAddresses": [ | ||
{ | ||
"ipAddress": "66.51.41.21" | ||
}, | ||
{ | ||
"ipAddress": "66.52.42.22" | ||
} | ||
] | ||
} | ||
``` |
121 changes: 121 additions & 0 deletions
121
content/includes/nap-waf/config/common/ip-intelligence-conf.md
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,121 @@ | ||
|
||
|
||
NGINX App Protect WAF provides an IP Intelligence feature, which allows customizing the enforcement based on the source IP of the request to limit access from IP addresses with questionable reputation. Please note that: | ||
- The IP intelligence feature is **disabled** by default and needs to be installed, enabled, and configured within the policy. | ||
- To review the installation steps, please refer to the administration guide: [App Protect v4]({{< ref "/nap-waf/v4/admin-guide/install.md#Prerequisites" >}}) / [App Protect v5]({{< ref "/nap-waf/v5/admin-guide/install.md#Prerequisites" >}}) | ||
- The system must have an active Internet connection and a working DNS. | ||
- If NGINX App Protect is behind a firewall, ensure external access to vector.brightcloud.com over port 443 - this is the IP Intelligence server used for data retrieval. | ||
- If NGINX App Protect accesses the Internet through a forward proxy server, ensure that it is configured correctly [App Protect v4]({{< ref "/nap-waf/v4/configuration-guide/configuration.md#ip-intelligence-forward-proxy-configuration" >}}) / [App Protect v5]({{< ref "/nap-waf/v5/configuration-guide/configuration.md##ip-intelligence-forward-proxy-configuration" >}}). | ||
|
||
Once installed, make sure to enable the feature in the two relevant sections of the policy: | ||
1. By enabling the corresponding violation in the violation list: `"name": "VIOL_MALICIOUS_IP"` and assigning the appropriate `block` and `alarm` values to the violation. | ||
|
||
2. By enabling the feature in the corresponding IP Intelligence JSON section: `"ip-intelligence": {"enabled": true}` and defining actions for the IP Intelligence categories listed below. | ||
|
||
An example policy where both elements are enabled, and all the IP intelligence categories are configured to `block` and `alarm` can be found here: | ||
|
||
```json | ||
{ | ||
"policy": { | ||
"name": "ip_intelligency_policy", | ||
"template": { | ||
"name": "POLICY_TEMPLATE_NGINX_BASE" | ||
}, | ||
"applicationLanguage": "utf-8", | ||
"caseInsensitive": false, | ||
"enforcementMode": "blocking", | ||
"blocking-settings": { | ||
"violations": [ | ||
{ | ||
"name": "VIOL_MALICIOUS_IP", | ||
"alarm": true, | ||
"block": true | ||
} | ||
] | ||
}, | ||
"ip-intelligence": { | ||
"enabled": true, | ||
"ipIntelligenceCategories": [ | ||
{ | ||
"category": "Anonymous Proxy", | ||
"alarm": true, | ||
"block": true | ||
}, | ||
{ | ||
"category": "BotNets", | ||
"alarm": true, | ||
"block": true | ||
}, | ||
{ | ||
"category": "Cloud-based Services", | ||
"alarm": true, | ||
"block": true | ||
}, | ||
{ | ||
"category": "Denial of Service", | ||
"alarm": true, | ||
"block": true | ||
}, | ||
{ | ||
"category": "Infected Sources", | ||
"alarm": true, | ||
"block": true | ||
}, | ||
{ | ||
"category": "Mobile Threats", | ||
"alarm": true, | ||
"block": true | ||
}, | ||
{ | ||
"category": "Phishing Proxies", | ||
"alarm": true, | ||
"block": true | ||
}, | ||
{ | ||
"category": "Scanners", | ||
"alarm": true, | ||
"block": true | ||
}, | ||
{ | ||
"category": "Spam Sources", | ||
"alarm": true, | ||
"block": true | ||
}, | ||
{ | ||
"category": "Tor Proxies", | ||
"alarm": true, | ||
"block": true | ||
}, | ||
{ | ||
"category": "Web Attacks", | ||
"alarm": true, | ||
"block": true | ||
}, | ||
{ | ||
"category": "Windows Exploits", | ||
"alarm": true, | ||
"block": true | ||
} | ||
] | ||
} | ||
} | ||
} | ||
``` | ||
|
||
This policy will basically block `"block": true` all IP addresses that are part of any threat category and add a log entry `"alarm": true` for the transaction. | ||
|
||
The IP address database is managed by an external provider and is constantly updated (every 1 minute by default). The database also categorizes IP addresses into one or more threat categories. These are the same categories that can be configured individually in the IP intelligence section: | ||
ADubhlaoich marked this conversation as resolved.
Show resolved
Hide resolved
|
||
- Anonymous Proxy | ||
- BotNets | ||
- Cloud-based Services | ||
- Denial of Service | ||
- Infected Sources | ||
- Mobile Threats | ||
- Phishing Proxies | ||
- Scanners | ||
- Spam Sources | ||
- Tor Proxies | ||
- Web Attacks | ||
- Windows Exploits | ||
|
||
Note that since the IP address database is constantly updated, IP address enforcement is also expected to change. IP Addresses may be added, removed, or moved from one category to another based on the reported activity of the IP address. |
41 changes: 41 additions & 0 deletions
41
content/includes/nap-waf/config/v5/build-nginx-image-oss/build-rocky.md
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,41 @@ | ||
```dockerfile | ||
# syntax=docker/dockerfile:1 | ||
|
||
# Base Image | ||
FROM rockylinux:9 | ||
|
||
# Install NGINX OSS and NGINX App Protect WAF v5 module | ||
RUN --mount=type=secret,id=nginx-crt,dst=/etc/ssl/nginx/nginx-repo.crt,mode=0644 \ | ||
--mount=type=secret,id=nginx-key,dst=/etc/ssl/nginx/nginx-repo.key,mode=0644 \ | ||
dnf -y install wget ca-certificates yum-utils \ | ||
&& wget -P /etc/yum.repos.d https://cs.nginx.com/static/files/dependencies.repo \ | ||
&& echo "[nginx-mainline]" > /etc/yum.repos.d/nginx.repo \ | ||
&& echo "name=nginx mainline repo" >> /etc/yum.repos.d/nginx.repo \ | ||
&& echo "baseurl=http://nginx.org/packages/mainline/centos/\$releasever/\$basearch/" >> /etc/yum.repos.d/nginx.repo \ | ||
&& echo "gpgcheck=1" >> /etc/yum.repos.d/nginx.repo \ | ||
&& echo "enabled=1" >> /etc/yum.repos.d/nginx.repo \ | ||
&& echo "gpgkey=https://nginx.org/keys/nginx_signing.key" >> /etc/yum.repos.d/nginx.repo \ | ||
&& echo "module_hotfixes=true" >> /etc/yum.repos.d/nginx.repo \ | ||
&& echo "[app-protect-x-oss]" > /etc/yum.repos.d/app-protect-${UBI_VERSION}-x-oss.repo \ | ||
&& echo "name=nginx-app-protect repo" >> /etc/yum.repos.d/app-protect-${UBI_VERSION}-x-oss.repo \ | ||
&& echo "baseurl=https://pkgs.nginx.com/app-protect-x-oss/centos/${UBI_VERSION}/\$basearch/" >> /etc/yum.repos.d/app-protect-${UBI_VERSION}-x-oss.repo \ | ||
&& echo "sslclientcert=/etc/ssl/nginx/nginx-repo.crt" >> /etc/yum.repos.d/app-protect-${UBI_VERSION}-x-oss.repo \ | ||
&& echo "sslclientkey=/etc/ssl/nginx/nginx-repo.key" >> /etc/yum.repos.d/app-protect-${UBI_VERSION}-x-oss.repo \ | ||
&& echo "gpgcheck=0" >> /etc/yum.repos.d/app-protect-${UBI_VERSION}-x-oss.repo \ | ||
&& echo "enabled=1" >> /etc/yum.repos.d/app-protect-${UBI_VERSION}-x-oss.repo \ | ||
&& dnf clean all \ | ||
&& dnf install -y app-protect-module-oss \ | ||
&& dnf clean all \ | ||
&& rm -rf /var/cache/dnf \ | ||
&& ln -sf /dev/stdout /var/log/nginx/access.log \ | ||
&& ln -sf /dev/stderr /var/log/nginx/error.log | ||
|
||
# Expose port | ||
EXPOSE 80 | ||
|
||
# Define stop signal | ||
STOPSIGNAL SIGQUIT | ||
|
||
# Set default command | ||
CMD ["nginx", "-g", "daemon off;"] | ||
``` |
35 changes: 35 additions & 0 deletions
35
content/includes/nap-waf/config/v5/build-nginx-image-plus/build-rocky.md
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,35 @@ | ||
```dockerfile | ||
# syntax=docker/dockerfile:1 | ||
|
||
# Base Image | ||
FROM rockylinux:9 | ||
|
||
# Install NGINX Plus and NGINX App Protect WAF v5 module | ||
RUN --mount=type=secret,id=nginx-crt,dst=/etc/ssl/nginx/nginx-repo.crt,mode=0644 \ | ||
--mount=type=secret,id=nginx-key,dst=/etc/ssl/nginx/nginx-repo.key,mode=0644 \ | ||
dnf -y install wget ca-certificates \ | ||
&& wget -P /etc/yum.repos.d https://cs.nginx.com/static/files/dependencies.repo \ | ||
&& wget -P /etc/yum.repos.d https://cs.nginx.com/static/files/${NGINX_PLUS_REPO} \ | ||
&& echo "[app-protect-x-plus]" > /etc/yum.repos.d/app-protect-${UBI_VERSION}-x-plus.repo \ | ||
&& echo "name=nginx-app-protect repo" >> /etc/yum.repos.d/app-protect-${UBI_VERSION}-x-plus.repo \ | ||
&& echo "baseurl=https://pkgs.nginx.com/app-protect-x-plus/centos/${UBI_VERSION}/\$basearch/" >> /etc/yum.repos.d/app-protect-${UBI_VERSION}-x-plus.repo \ | ||
&& echo "sslclientcert=/etc/ssl/nginx/nginx-repo.crt" >> /etc/yum.repos.d/app-protect-${UBI_VERSION}-x-plus.repo \ | ||
&& echo "sslclientkey=/etc/ssl/nginx/nginx-repo.key" >> /etc/yum.repos.d/app-protect-${UBI_VERSION}-x-plus.repo \ | ||
&& echo "gpgcheck=0" >> /etc/yum.repos.d/app-protect-${UBI_VERSION}-x-plus.repo \ | ||
&& echo "enabled=1" >> /etc/yum.repos.d/app-protect-${UBI_VERSION}-x-plus.repo \ | ||
&& dnf clean all \ | ||
&& dnf install -y app-protect-module-plus \ | ||
&& dnf clean all \ | ||
&& rm -rf /var/cache/dnf \ | ||
&& ln -sf /dev/stdout /var/log/nginx/access.log \ | ||
&& ln -sf /dev/stderr /var/log/nginx/error.log | ||
|
||
# Expose port | ||
EXPOSE 80 | ||
|
||
# Define stop signal | ||
STOPSIGNAL SIGQUIT | ||
|
||
# Set default command | ||
CMD ["nginx", "-g", "daemon off;"] | ||
``` |
Oops, something went wrong.
Oops, something went wrong.
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
Uh oh!
There was an error while loading. Please reload this page.