From c50e8db4a6cfef8f0460987ee672b51e9079e3ef Mon Sep 17 00:00:00 2001 From: =?UTF-8?q?nicole=20miko=C5=82ajczyk?= Date: Fri, 21 Nov 2025 19:54:05 +0100 Subject: [PATCH] readme: fix example nginx configuration display MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Signed-off-by: nicole mikołajczyk --- README.md | 16 ++++++++-------- 1 file changed, 8 insertions(+), 8 deletions(-) diff --git a/README.md b/README.md index bd70397df..a9deda0c3 100644 --- a/README.md +++ b/README.md @@ -29,14 +29,14 @@ rm pl-fe.zip ``` **Note**: Some Fediverse software (Akkoma, Mitra) use Content Security Policy configuration which disallows the usage of inline styles, which are used by pl-fe for color schemes. [Mangane README](https://github.com/BDX-town/Mangane/) suggests using server configuration to override the default CSP header: -> -> Here is an example configuration for nginx: -> ``` -> # add style-src for mangane -> proxy_hide_header Content-Security-Policy; -> add_header Content-Security-Policy "upgrade-insecure-requests;script-src 'self';connect-src 'self' blob: https://example.com wss://example.com;media-src 'self' https:;img-src 'self' data: blob: https:;default-src 'none';base-uri 'self';frame-ancestors 'none';style-src 'self' 'unsafe-inline';font-src 'self';manifest-src 'self';" always; -> ``` -> *Please replace https://example.com with your own domain* + +
+Here is an example configuration for nginx: +
# add style-src for mangane
+proxy_hide_header Content-Security-Policy;
+add_header Content-Security-Policy "upgrade-insecure-requests;script-src 'self';connect-src 'self' blob: https://example.com wss://example.com;media-src 'self' https:;img-src 'self' data: blob: https:;default-src 'none';base-uri 'self';frame-ancestors 'none';style-src 'self' 'unsafe-inline';font-src 'self';manifest-src 'self';" always;
+Please replace https://example.com with your own domain +
## Repository