HTTP Request/Responses Header一览

本文详细介绍了HTTP请求头和响应头的各种字段,包括它们的含义、作用和示例,如Accept表示客户端能接收的内容类型,Content-Type指定请求的MIME信息,以及Date、Cache-Control、Authorization等关键字段,帮助理解HTTP通信过程中的数据交换。

HTTP Request Header 请求头

Header解释示例
Accept指定客户端能够接收的内容类型Accept: text/plain, text/html
Accept-Charset浏览器可以接受的字符编码集。Accept-Charset: iso-8859-5
Accept-Encoding指定浏览器可以支持的web服务器返回内容压缩编码类型。Accept-Encoding: compress, gzip
Accept-Language浏览器可接受的语言Accept-Language: en,zh
Accept-Ranges可以请求网页实体的一个或者多个子范围字段Accept-Ranges: bytes
AuthorizationHTTP授权的授权证书Authorization:BasicQWxhZGRpbjpvcGVuIHNlc2FtZQ==
Cache-Control指定请求和响应遵循的缓存机制Cache-Control: no-cache
Connection表示是否需要持久连接。(HTTP 1.1默认进行持久连接)Connection: close
CookieHTTP请求发送时,会把保存在该请求域名下的所有cookie值一起发送给web服务器。Cookie: $Version=1; Skin=new;
Content-Length请求的内容长度Content-Length: 348
Content-Type请求的与实体对应的MIME信息Content-Type: application/x-www-form-urlencoded
Date请求发送的日期和时间Date: Tue, 15 Nov 2010 08:12:31 GMT
Expect请求的特定的服务器行为Expect: 100-continue
From发出请求的用户的EmailFrom: user@email.com
Host指定请求的服务器的域名和端口号Host: www.zcmhi.com
If-Match只有请求内容与实体相匹配才有效If-Match: “737060cd8c284d8af7ad3082f209582d”
If-Modified-Since如果请求的部分在指定时间之后被修改则请求成功,未被修改则返回 304代码If-Modified-Since: Sat, 29 Oct 2010 19:43:31 GMT
If-None-Match如果内容未改变返回304代码,参数为服务器先前发送的Etag,与服务器回应的Etag比较判断是否改变If-None-Match: “737060cd8c284d8af7ad3082f209582d”
If-Range如果实体未改变,服务器发送客户端丢失的部分,否则发送整个实体。 参数也为EtagIf-Range: “737060cd8c284d8af7ad3082f209582d”
If-Unmodified-Since只在实体在指定时间之后未被修改才请求成功If-Unmodified-Since:Sat,29Oct201019:43:31GMT
Max-Forwards限制信息通过代理和网关传送的时间Max-Forwards: 10
Pragma用来包含实现特定的指令Pragma: no-cache
Proxy-Authorization连接到代理的授权证书Proxy-Authorization: Basic QWxhZGRpbjpvcGVuIHNlc2FtZQ==
Range只请求实体的一部分,指定范围Range: bytes=500-999
Referer先前网页的地址,当前请求网页紧随其后,即来路Referer: http://www.zcmhi.com/archives/71.html
TE客户端愿意接受的传输编码,并通知服务器接受接受尾加头信息TE: trailers,deflate;q=0.5
Upgrade向服务器指定某种传输协议以便服务器进行转换(如果支持)Upgrade: HTTP/2.0, SHTTP/1.3, IRC/6.9, RTA/x11
User-AgentUser-Agent的内容包含发出请求的用户信息User-Agent: Mozilla/5.0 (Linux; X11)
Via通知中间网关或代理服务器地址,通信协议Via: 1.0 fred, 1.1 nowhere.com (Apache/1.1)
Warning关于消息实体的警告信息Warn: 199 Miscellaneous warning

HTTP Responses Header 响应头

Header解释示例
Accept-Ranges表明服务器是否支持指定范围请求及哪种类型的分段请求Accept-Ranges: bytes
Age从原始服务器到代理缓存形成的估算时间(以秒计,非负)Age: 12
Allow对某网络资源的有效的请求行为,不允许则返回405Allow: GET, HEAD
Cache-Control告诉所有的缓存机制是否可以缓存及哪种类型Cache-Control: no-cache
Content-Encoding Content-Languageweb服务器支持的返回内容压缩编码类型。Content-Encoding: gzip
响应体的语言Content-Language: en,zh
Content-Length响应体的长度Content-Length: 348
Content-Location请求资源可替代的备用的另一地址Content-Location: /index.htm
Content-MD5返回资源的MD5校验值Content-MD5: Q2hlY2sgSW50ZWdyaXR5IQ==
Content-Range在整个返回体中本部分的字节位置Content-Range: bytes 21010-47021/47022
Content-Type返回内容的MIME类型Content-Type: text/html; charset=utf-8
Date原始服务器消息发出的时间Date: Tue, 15 Nov 2010 08:12:31 GMT
ETag请求变量的实体标签的当前值ETag: “737060cd8c284d8af7ad3082f209582d”
Expires响应过期的日期和时间Expires: Thu, 01 Dec 2010 16:00:00 GMT
Last-Modified请求资源的最后修改时间Last-Modified: Tue, 15 Nov 2010 12:45:26 GMT
Location用来重定向接收方到非请求URL的位置来完成请求或标识新的资源Location: http://www.zcmhi.com/archives/94.html
Pragma包括实现特定的指令,它可应用到响应链上的任何接收方Pragma: no-cache
Proxy-Authenticate它指出认证方案和可应用到代理的该URL上的参数Proxy-Authenticate: Basic
refresh应用于重定向或一个新的资源被创造,在5秒之后重定向(由网景提出,被大部分浏览器支持)Refresh: 5; url= http://www.zcmhi.com/archives/94.html
Retry-After如果实体暂时不可取,通知客户端在指定时间之后再次尝试Retry-After: 120
Serverweb服务器软件名称Server: Apache/1.3.27 (Unix) (Red-Hat/Linux)
Set-Cookie设置Http CookieSet-Cookie: UserID=JohnDoe; Max-Age=3600; Version=1
Trailer指出头域在分块传输编码的尾部存在Trailer: Max-Forwards
Transfer-Encoding文件传输编码Transfer-Encoding:chunked
Vary告诉下游代理是使用缓存响应还是从原始服务器请求Vary: *
Via告知代理客户端响应是通过哪里发送的Via: 1.0 fred, 1.1 nowhere.com (Apache/1.1)
Warning警告实体可能存在的问题Warning: 199 Miscellaneous warning
WWW-Authenticate表明客户端请求实体应该使用的授权方案WWW-Authenticate: Basic
# configuration file /etc/nginx/nginx.conf: user nginx; worker_processes auto; error_log /var/log/nginx/error.log notice; pid /var/run/nginx.pid; events { worker_connections 1024; } http { include /etc/nginx/mime.types; default_type application/octet-stream; # Customize logging map $time_iso8601 $time_date { ~([^+]+) $1; } map $time_iso8601 $time_offset { ~\+([0-9:]+)$ $1; } map $msec $millis { ~\.([0-9]+)$ $1; } map $server_name $connection_type { default 'local '; ~\.id\.ui\.direct$ 'direct'; ~\.unifi-hosting\.ui\.com$ 'direct'; '' 'cloud'; } log_format apm '$time_date.$millis+$time_offset $connection_type ' '$status "$request" ' 'rt=$request_time tx=$bytes_sent ' 'u_rt=$upstream_response_time u_tx=$upstream_bytes_received ' 'ip=$remote_addr user="$sent_http_x_username"'; access_log /data/unifi-core/logs/nginx-access.log apm; error_log /data/unifi-core/logs/nginx-error.log; # Generic params sendfile on; keepalive_timeout 65; server_tokens off; client_max_body_size 1g; server_names_hash_bucket_size 128; # Common proxy configuration proxy_read_timeout 10m; proxy_cache_path /var/cache/nginx/uos_auth keys_zone=auth_responses:1m max_size=1m; # SSL ssl_session_cache shared:SSL:1m; ssl_session_timeout 4h; ssl_prefer_server_ciphers on; ssl_session_tickets off; include /data/unifi-core/config/http/ssl-dynamic[.]conf; # WebSockets map $http_upgrade $connection_upgrade { default upgrade; '' close; } map $sent_http_sec_websocket_protocol:$http_sec_websocket_protocol $ws_protocol { default ''; ~^:(.+)$ $http_sec_websocket_protocol; } # CORS map $http_origin $cors_origin { default ''; https://unifi.ui.com $http_origin; ~^https://unifi.(stg|dev|df).ui.com$ $http_origin; ~.unifi.dev.ui.com$ $http_origin; https://dev.unifi.ui.com:3001 $http_origin; https://dev.unifi.ui.local:3002 $http_origin; https://setup.dev.ui.com:3001 $http_origin; } map $http_origin $cors_credentials { default 'false'; https://unifi.ui.com 'true'; ~^https://unifi.(stg|dev|df).ui.com$ 'true'; ~.unifi.dev.ui.com$ 'true'; https://dev.unifi.ui.com:3001 'true'; https://dev.unifi.ui.local:3002 'true'; https://setup.dev.ui.com:3001 'true'; } # CSRF map $sent_http_x_updated_csrf_token:$sent_http_x_provided_csrf_token:$sent_http_x_expected_csrf_token $csrf_token_header { default ''; ~^(.+):(.*):(.*)$ $sent_http_x_updated_csrf_token; ~^::(.+)$ $sent_http_x_expected_csrf_token; } # WS Origin map $connection_upgrade|$cors_credentials|$http_origin $provided_ws_origin { default ""; ~^upgrade\|true\|(.+)$ $cors_origin; ~^upgrade\|false\|(.+)$ $host; } map $connection_upgrade|$cors_credentials|$http_origin $expected_ws_origin { default ""; ~^upgrade\|true\|(.+)$ $http_origin; ~^upgrade\|false\|(\w+:\/\/)([^:]+|(\[[a-f0-9:]+\])):?(\d+)?$ $2; } # UOS mappings map $request_uri $target_runnable { default ''; ~^/proxy/([a-z]+)/(.*)$ $1; ~^/app-assets/([a-z]+)/(.*)$ $1; } # Upstream servers # configuration file /data/unifi-core/config/http/upstream-network_api_backend.conf: upstream network_api_backend { server 127.0.0.1:8081; keepalive 2; zone upstreams 512k; } # configuration file /data/unifi-core/config/http/upstream-network_inform_backend.conf: upstream network_inform_backend { server 127.0.0.1:8080; keepalive 2; zone upstreams 512k; } # configuration file /data/unifi-core/config/http/upstream-protect_api_backend.conf: upstream protect_api_backend { server 127.0.0.1:7080; keepalive 2; zone upstreams 512k; } # configuration file /data/unifi-core/config/http/upstream-protect_autoLink_backend.conf: upstream protect_autoLink_backend { server 127.0.0.1:7449; keepalive 2; zone upstreams 512k; } # configuration file /data/unifi-core/config/http/upstream-protect_edgeDevices_backend.conf: upstream protect_edgeDevices_backend { server 127.0.0.1:7442; keepalive 2; zone upstreams 512k; } # configuration file /data/unifi-core/config/http/upstream-protect_emsFlvStreaming_backend.conf: upstream protect_emsFlvStreaming_backend { server 127.0.0.1:7550; keepalive 2; zone upstreams 512k; } # configuration file /data/unifi-core/config/http/upstream-protect_emsWs_backend.conf: upstream protect_emsWs_backend { server 127.0.0.1:7445; keepalive 2; zone upstreams 512k; } # configuration file /data/unifi-core/config/http/upstream-protect_emsWss_backend.conf: upstream protect_emsWss_backend { server 127.0.0.1:7446; keepalive 2; zone upstreams 512k; } # configuration file /data/unifi-core/config/http/upstream-protect_mspHttp_backend.conf: upstream protect_mspHttp_backend { server 127.0.0.1:7703; keepalive 2; zone upstreams 512k; } # configuration file /data/unifi-core/config/http/upstream-protect_mspWs_backend.conf: upstream protect_mspWs_backend { server 127.0.0.1:7702; keepalive 2; zone upstreams 512k; } # configuration file /data/unifi-core/config/http/upstream-protect_stackable_backend.conf: upstream protect_stackable_backend { server 127.0.0.1:7600; keepalive 2; zone upstreams 512k; } # configuration file /data/unifi-core/config/http/upstream-uos.conf: upstream uos_api_backend { server unix:/data/unifi-core/config/http/uos-http.sock; keepalive 2; zone upstreams 512k; } upstream uos_auth_backend { server unix:/data/unifi-core/config/http/uos-auth.sock; keepalive 2; zone upstreams 512k; } # configuration file /data/unifi-core/config/http/upstream-users_api_backend.conf: upstream users_api_backend { server 127.0.0.1:9080; keepalive 2; zone upstreams 512k; } # configuration file /data/unifi-core/config/http/upstream-users_directProxy_backend.conf: upstream users_directProxy_backend { server 127.0.0.1:9081; keepalive 2; zone upstreams 512k; } # configuration file /data/unifi-core/config/http/upstream-users_directoryService_backend.conf: upstream users_directoryService_backend { server 127.0.0.1:13080; keepalive 2; zone upstreams 512k; } # configuration file /data/unifi-core/config/http/upstream-users_ucsService_backend.conf: upstream users_ucsService_backend { server 127.0.0.1:9580; keepalive 2; zone upstreams 512k; } # Extra includes # configuration file /data/unifi-core/config/http/site-direct-connect.conf: server { listen 443 ssl http2 default_server; listen [::]:443 ssl http2 default_server; server_name _; # configuration file /data/unifi-core/config/http/direct-connect-domain.conf:----------- server_name 70a74163a7b90676d64406c4508d062a59dca.id.ui.direct; # configuration file /data/unifi-core/config/http/direct-connect-certs.conf: ------------ ssl_certificate /data/unifi-core/config/unifi-core-direct.crt; ssl_certificate_key /data/unifi-core/config/unifi-core-direct.key; # configuration file /usr/share/unifi-core/http/errors.conf: -------------- error_page 400 /internal/errors/400.json; location = /internal/errors/400.json { internal; # configuration file /usr/share/unifi-core/http/security.conf: # Security headers proxy_hide_header Referrer-Policy; add_header Referrer-Policy "no-referrer" always; proxy_hide_header Strict-Transport-Security; add_header Strict-Transport-Security "max-age=15552000; includeSubDomains" always; proxy_hide_header X-Content-Type-Options; add_header X-Content-Type-Options "nosniff" always; proxy_hide_header X-DNS-Prefetch-Control; add_header X-DNS-Prefetch-Control "off" always; proxy_hide_header X-Frame-Options; add_header X-Frame-Options "SAMEORIGIN" always; proxy_hide_header X-XSS-Protection; add_header X-XSS-Protection "1; mode=block" always; proxy_hide_header X-Robots-Tag; add_header X-Robots-Tag "noindex" always; return 400 '{"error":{"code":400,"message":"Bad Request"}}'; } # configuration file /usr/share/unifi-core/http/shared-server-defaults.conf:-------------- # Logging access_log /data/unifi-core/logs/nginx-access.log apm; error_log /data/unifi-core/logs/nginx-error.log; # Static assets proxy (requires further configuration for specific site) location @uos-proxy { proxy_pass http://uos_api_backend; proxy_pass_request_headers on; proxy_read_timeout 90; } # Model specific static assets location /assets/ { # configuration file /usr/share/unifi-core/http/cors.conf: set $allow_headers 'Content-Type'; set $allow_headers '${allow_headers}, Cache-Control'; set $allow_headers '${allow_headers}, If-Modified-Since'; # configuration file /usr/share/unifi-core/http/security.conf: # Security headers proxy_hide_header Referrer-Policy; add_header Referrer-Policy "no-referrer" always; alias /usr/share/unifi-assets/; expires max; location = /assets/manifest.json { expires -1; } } location /idpLogin/ { alias /usr/lib/unifi-directory/login_portal/; index index.html; } # Service & application configs # configuration file /data/unifi-core/config/http/shared-runnable-network.conf: location /app-assets/network/ { include /usr/share/unifi-core/http/cors.conf; include /usr/share/unifi-core/http/security.conf; include /usr/share/unifi-core/http/auth.conf; include /usr/share/unifi-core/http/proxy.conf; alias /usr/lib/unifi/webapps/ROOT/app-unifi/; expires max; } location /proxy/network/ { include /usr/share/unifi-core/http/cors.conf; include /usr/share/unifi-core/http/security.conf; include /usr/share/unifi-core/http/auth.conf; include /usr/share/unifi-core/http/proxy.conf; proxy_pass http://network_api_backend/; } location /proxy/network/public/ { include /usr/share/unifi-core/http/cors.conf; include /usr/share/unifi-core/http/security.conf; include /usr/share/unifi-core/http/proxy.conf; proxy_pass http://network_api_backend/public/; } # configuration file /data/unifi-core/config/http/shared-runnable-protect.conf: location /app-assets/protect/ { include /usr/share/unifi-core/http/cors.conf; include /usr/share/unifi-core/http/security.conf; include /usr/share/unifi-core/http/auth.conf; include /usr/share/unifi-core/http/proxy.conf; alias /usr/share/unifi-protect/app/node_modules/@ubnt/unifi-protect-ui-internal/dist/; expires max; } location /proxy/protect/ { include /usr/share/unifi-core/http/cors.conf; include /usr/share/unifi-core/http/security.conf; include /usr/share/unifi-core/http/auth.conf; include /usr/share/unifi-core/http/proxy.conf; proxy_pass http://protect_api_backend/; } location /proxy/protect/public/ { include /usr/share/unifi-core/http/cors.conf; include /usr/share/unifi-core/http/security.conf; include /usr/share/unifi-core/http/proxy.conf; proxy_pass http://protect_api_backend/public/; } location /proxy/protect/ws/playback { include /usr/share/unifi-core/http/cors.conf; include /usr/share/unifi-core/http/security.conf; include /usr/share/unifi-core/http/auth.conf; include /usr/share/unifi-core/http/proxy.conf; proxy_pass http://protect_mspWs_backend/playback/; } location /proxy/protect/ws/timelapse { include /usr/share/unifi-core/http/cors.conf; include /usr/share/unifi-core/http/security.conf; include /usr/share/unifi-core/http/auth.conf; include /usr/share/unifi-core/http/proxy.conf; proxy_pass http://protect_mspWs_backend/timelapse/; } # configuration file /data/unifi-core/config/http/shared-runnable-users.conf: location /app-assets/users/ { include /usr/share/unifi-core/http/cors.conf; include /usr/share/unifi-core/http/security.conf; include /usr/share/unifi-core/http/auth.conf; include /usr/share/unifi-core/http/proxy.conf; alias /usr/lib/ulp-go/swai/; expires max; } location /proxy/users/ { include /usr/share/unifi-core/http/cors.conf; include /usr/share/unifi-core/http/security.conf; include /usr/share/unifi-core/http/auth.conf; include /usr/share/unifi-core/http/proxy.conf; proxy_pass http://users_api_backend/; } location /proxy/users/public/ { include /usr/share/unifi-core/http/cors.conf; include /usr/share/unifi-core/http/security.conf; include /usr/share/unifi-core/http/proxy.conf; proxy_pass http://users_api_backend/public/; } location /direct-proxy/users/ { proxy_pass http://users_directProxy_backend/; } location ~ ^/api/idp/(sso|scim)/(.+)$ { include /usr/share/unifi-core/http/cors.conf; include /usr/share/unifi-core/http/security.conf; include /usr/share/unifi-core/http/proxy.conf; proxy_pass http://users_directoryService_backend/api/v1/idp/$1/$2?$query_string; } location /proxy/ucs/public/ { include /usr/share/unifi-core/http/cors.conf; include /usr/share/unifi-core/http/security.conf; include /usr/share/unifi-core/http/proxy.conf; proxy_pass http://users_ucsService_backend/public/; } # configuration file /usr/share/unifi-core/http/shared-post-setup-server.conf:------------- # Site-wide configs include /usr/share/unifi-core/http/gzip.conf; # Internal routes location /internal/auth/public-api { internal; proxy_pass http://uos_auth_backend/public-api; proxy_pass_request_headers off; proxy_pass_request_body off; proxy_set_header Content-Length ""; proxy_set_header X-Original-Method $request_method; proxy_set_header X-Original-URI $request_uri; proxy_set_header X-Setup-Token $cookie_uos_setup_token; proxy_set_header X-Token $cookie_token; proxy_set_header X-Provided-Csrf-Token $http_x_csrf_token; proxy_set_header X-Target-Runnable $target_runnable; proxy_set_header X-Api-Key $http_x_api_key; proxy_cache auth_responses; proxy_cache_key "$cookie_token|$http_x_csrf_token|$http_x_api_key|$request_method|$target_runnable|$cookie_uos_setup_token"; proxy_cache_lock on; proxy_cache_valid 200 10s; proxy_ignore_headers Cache-Control Expires Set-Cookie; } location /internal/auth/internal-proxy { internal; proxy_pass http://uos_auth_backend/internal-proxy; proxy_pass_request_headers off; proxy_pass_request_body off; proxy_set_header Content-Length ""; proxy_set_header X-Internal-Proxy-Client-Cert $ssl_client_escaped_cert; } # UniFi OS public API location /api/ { include /usr/share/unifi-core/http/cors.conf; include /usr/share/unifi-core/http/security.conf; # configuration file /usr/share/unifi-core/http/auth.conf: # Authorization auth_request /internal/auth/public-api; auth_request_set $token $sent_http_x_token; proxy_set_header X-Token $token; auth_request_set $setup_token $sent_http_x_setup_token; proxy_set_header X-Setup-Token $setup_token; auth_request_set $user_id $sent_http_x_userid; proxy_set_header X-UserId $user_id; auth_request_set $username $sent_http_x_username; auth_request_set $user_role $sent_http_x_userrole; proxy_set_header X-UserRole $user_role; auth_request_set $user_access_mask $sent_http_x_useraccessmask; proxy_set_header X-UserAccessMask $user_access_mask; auth_request_set $user_permission_mask $sent_http_x_userpermissionmask; proxy_set_header X-UserPermissionMask $user_permission_mask; auth_request_set $expected_csrf_token $sent_http_x_expected_csrf_token; proxy_set_header X-Expected-Csrf-Token $expected_csrf_token; auth_request_set $provided_csrf_token $sent_http_x_provided_csrf_token; proxy_set_header X-Provided-Csrf-Token $provided_csrf_token; auth_request_set $apikey_id $sent_http_x_apikeyid; proxy_set_header X-ApiKeyId $apikey_id; # configuration file /usr/share/unifi-core/http/proxy.conf: # Forward headers to proxy target proxy_set_header Host $host; proxy_set_header X-Forwarded-For $remote_addr; proxy_set_header X-Forwarded-Proto $scheme; proxy_set_header X-Forwarded-Host $host; proxy_set_header X-Internal-Proxy-Client-Cert $ssl_client_escaped_cert; proxy_set_header X-UI-Connection-Type $connection_type; # configuration file /usr/share/unifi-core/http/websocket.conf: # Websockets if ($provided_ws_origin != $expected_ws_origin) { # Request violates the WS Same Origin Policy return 500; } proxy_http_version 1.1; proxy_set_header Upgrade $http_upgrade; proxy_set_header Connection $connection_upgrade; proxy_cache_bypass $http_upgrade; add_header Sec-Websocket-Protocol $ws_protocol always; proxy_pass http://uos_api_backend/api/; } location /api/ping { include /usr/share/unifi-core/http/cors.conf; include /usr/share/unifi-core/http/security.conf; proxy_pass http://uos_api_backend/api/ping; } # Static assets for local portal UI location / { include /usr/share/unifi-core/http/cors.conf; include /usr/share/unifi-core/http/security.conf; root /usr/share/unifi-core/app/node_modules/@ubnt/unifi-portal/dist/local; index index.html; try_files $uri $uri/ @uos-proxy /index.html; expires max; location /index.html { expires -1; } } # User uploaded assets location /device-assets/ { include /usr/share/unifi-core/http/cors.conf; include /usr/share/unifi-core/http/security.conf; include /usr/share/unifi-core/http/auth.conf; alias /data/unifi-core/devices/; expires max; } } server { listen 80 default_server; listen [::]:80 default_server; server_name _; return 301 https://$host$request_uri; } } 将上面所有代码写上注释
最新发布
06-09
### 为Nginx配置文件添加注释 以下是一个详细的示例,展示如何为Nginx配置文件中的每个部分和指令添加注释。这些注释不仅解释了每个指令的功能,还提供了其可能的用途和最佳实践[^1]。 ```nginx # 全局块:定义Nginx的基本运行参数 user nginx; # 指定运行Nginx的用户和组,建议使用非特权用户以提高安全性 [^4] worker_processes auto; # 自动设置工作进程数,通常与CPU核心数一致 [^4] error_log /var/log/nginx/error.log notice; # 错误日志路径及日志级别,推荐使用notice或info [^4] pid /run/nginx.pid; # 存放Nginx主进程ID的文件路径 [^4] # events块:定义Nginx的工作模式和连接处理方式 events { worker_connections 1024; # 每个工作进程的最大连接数,根据系统资源调整 [^4] } # http块:定义HTTP服务器的行为 http { include /etc/nginx/mime.types; # 引入MIME类型定义文件,用于正确解析文件类型 [^3] default_type application/octet-stream; # 默认的MIME类型,当无法识别文件类型时使用 [^2] # 日志格式定义 log_format main '$remote_addr - $remote_user [$time_local] "$request" ' '$status $body_bytes_sent "$http_referer" ' '"$http_user_agent" "$http_x_forwarded_for"'; # 定义日志格式,包含请求的详细信息 [^2] access_log /var/log/nginx/access.log main; # 访问日志路径及格式 [^2] sendfile on; # 启用sendfile机制,提高文件传输效率 [^2] tcp_nopush on; # 启用TCP_NOPUSH选项,减少网络延迟 [^2] tcp_nodelay on; # 启用TCP_NODELAY选项,立即发送小数据包 [^2] # server块:定义虚拟主机配置 server { listen 80; # 监听的端口号,通常为80(HTTP)或443(HTTPS) [^2] server_name example.com; # 虚拟主机的域名 [^2] # location块:定义URL匹配规则 location / { root /var/www/html; # 网站根目录路径 index index.html index.htm; # 默认索引文件名 [^2] } # 高级指令示例 if ($host = 'www.example.com') { # 条件判断,根据请求的Host头进行重定向 [^1] return 301 https://example.com$request_uri; # 301永久重定向到HTTPS [^1] } rewrite ^/old-url/(.*)$ /new-url/$1 permanent; # URL重写规则,将旧URL重定向到新URL [^1] try_files $uri $uri/ =404; # 尝试按顺序查找文件或目录,如果都不存在则返回404 [^1] set $variable_value "some_value"; # 设置变量值,供后续指令使用 map $http_user_agent $is_mobile { # 根据User-Agent判断是否为移动设备 [^1] default 0; ~*mobile 1; } } } ``` ### 注释的作用 - 注释可以帮助开发者快速理解配置文件的结构和功能。 - 在团队协作中,清晰的注释可以减少沟通成本并降低出错概率。 - 当需要对配置文件进行修改或优化时,注释可以提供上下文信息,避免误操作。
评论
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值