diff options
author | max.bra | 2017-11-02 12:22:09 +0100 |
---|---|---|
committer | max.bra | 2017-11-02 12:22:09 +0100 |
commit | 688e6f6cbdd019356c4ffb4177bb2557510ae2b8 (patch) | |
tree | c54eb5ac76e4cea85b8ebfe63b6a88657d802181 /fix_redirect.patch | |
parent | 033d32553be8c531fe36a4f0a1645b096f0617e3 (diff) | |
download | aur-688e6f6cbdd019356c4ffb4177bb2557510ae2b8.tar.gz |
more nginx config
Diffstat (limited to 'fix_redirect.patch')
-rw-r--r-- | fix_redirect.patch | 15 |
1 files changed, 0 insertions, 15 deletions
diff --git a/fix_redirect.patch b/fix_redirect.patch deleted file mode 100644 index f042d7813fd7..000000000000 --- a/fix_redirect.patch +++ /dev/null @@ -1,15 +0,0 @@ ---- a/advanced/index.php 2017-10-30 16:27:08.583096709 -0400 -+++ b/advanced/index.php 2017-10-30 16:28:06.884263996 -0400 -@@ -10,7 +10,10 @@ function validIP($address){ - } - - $uri = escapeshellcmd($_SERVER['REQUEST_URI']); --$serverName = escapeshellcmd($_SERVER['SERVER_NAME']); -+// To retain the functionality of the block page when directly accessing blacklisted domains -+// See: https://github.com/pi-hole/pi-hole/wiki/Nginx-Configuration -+// $serverName = escapeshellcmd($_SERVER['SERVER_NAME']); -+$serverName = escapeshellcmd($_SERVER['HTTP_HOST']); - - // If the server name is 'pi.hole', it's likely a user trying to get to the admin panel. - // Let's be nice and redirect them. - |