這裏收集的是各種實用的 .htaccess 代碼片段,你能想到的用法幾乎全在這裏。
免責聲明: 雖然將這些代碼片段直接拷貝到你的 .htaccess
文件裏,絕大多數情況下都是好用的,但也有極個別情況需要你修改某些地方纔行。風險自負。
重要提示: Apache 2.4 有不兼容的修改,特別是在訪問配置控制方面。詳細信息請參考 這篇更新文檔 以及 這篇文章。
目錄
重新和重定向
強制 www
強制 www通用方法
強制 non-www
強制 non-www通用方法
強制 HTTPS
強制 HTTPS 通過代理
強制添加末尾斜槓
取掉末尾斜槓
重定向到一個頁面
目錄別名
腳本別名
重定向整個網站
乾淨的URL
安全
拒絕所有訪問
拒絕所有訪問(排除部分)
屏蔽爬蟲/惡意訪問
保護隱藏文件和目錄
保護備份文件和源代碼文件
禁止目錄瀏覽
禁止圖片盜鏈
禁止圖片盜鏈(指定域名)
密碼保護目錄
密碼保護文件
通過Referrer過濾訪客
防止被別的網頁嵌套
性能
壓縮文件
設置過期頭信息
關閉eTags標誌
其它
設置PHP變量
Custom Error Pages
強制下載
阻止下載
運行跨域字體引用
Auto UTF-8 Encode
切換PHP版本
禁止IE兼容視圖
支持WebP圖片格式
重新和重定向
注意:首先需要服務器安裝和啓用 mod_rewrite
模塊。
強制 www
RewriteEngine onRewriteCond %{HTTP_HOST} ^example\.com [NC]RewriteRule ^(.*)$ http://www.example.com/$1 [L,R=301,NC]
強制 www通用方法
RewriteCond %{HTTP_HOST} !^$RewriteCond %{HTTP_HOST} !^www\. [NC]RewriteCond %{HTTPS}s ^on(s)|RewriteRule ^ http%1://www.%{HTTP_HOST}%{REQUEST_URI} [R=301,L]
這種方法可以使用在任何網站中。 Source
強制 non-www
究竟是WWW好,還是non-www好,沒有定論,如果你喜歡不帶www的,可以使用下面的腳本:
RewriteEngine onRewriteCond %{HTTP_HOST} ^www\.example\.com [NC]RewriteRule ^(.*)$ http://example.com/$1 [L,R=301]
強制 non-www通用方法
RewriteEngine on RewriteCond %{HTTP_HOST} ^www\. RewriteCond %{HTTPS}s ^on(s)|off RewriteCond http%1://%{HTTP_HOST} ^(https?://)(www\.)?(.+)$ RewriteRule ^ %1%3%{REQUEST_URI} [R=301,L]
強制 HTTPS
RewriteEngine on RewriteCond %{HTTPS} !on RewriteRule (.*) https://%{HTTP_HOST}%{REQUEST_URI}# Note: It's also recommended to enable HTTP Strict Transport Security (HSTS) # on your HTTPS website to help prevent man-in-the-middle attacks.# See https://developer.mozilla.org/en-US/docs/Web/Security/HTTP_strict_transport_security<IfModule mod_headers.c> Header always set Strict-Transport-Security "max-age=31536000; includeSubDomains"</IfModule>
強制 HTTPS 通過代理
如果你使用了代理,這種方法對你很有用。
RewriteCond %{HTTP:X-Forwarded-Proto} !https RewriteRule (.*) https://%{HTTP_HOST}%{REQUEST_URI}
強制添加末尾斜槓
RewriteCond %{REQUEST_URI} /+[^\.]+$RewriteRule ^(.+[^/])$ %{REQUEST_URI}/ [R=301,L]
取掉末尾斜槓
RewriteCond %{REQUEST_FILENAME} !-dRewriteRule ^(.*)/$ /$1 [R=301,L]
重定向到一個頁面
Redirect 301 /oldpage.html http://www.example.com/newpage.htmlRedirect 301 /oldpage2.html http://www.example.com/folder/
目錄別名
RewriteEngine On RewriteRule ^source-directory/(.*) target-directory/$1
腳本別名
FallbackResource /index.fcgi
This example has an index.fcgi
file in some directory, and any requests within that directory that fail to resolve a filename/directory will be sent to the index.fcgi
script. It’s good if you want baz.foo/some/cool/path
to be handled by baz.foo/index.fcgi
(which also supports requests to baz.foo
) while maintainingbaz.foo/css/style.css
and the like. Get access to the original path from the PATH_INFO environment variable, as exposed to your scripting environment.
RewriteEngine On RewriteRule ^$ index.fcgi/ [QSA,L] RewriteCond %{REQUEST_FILENAME} !-f RewriteCond %{REQUEST_FILENAME} !-d RewriteRule ^(.*)$ index.fcgi/$1 [QSA,L]
This is a less efficient version of the FallbackResource directive (because using mod_rewrite
is more complex than just handling the FallbackResource
directive), but it’s also more flexible.
重定向整個網站
Redirect 301 / http://newsite.com/
This way does it with links intact. That is www.oldsite.com/some/crazy/link.html
will becomewww.newsite.com/some/crazy/link.html
. This is extremely helpful when you are just “moving” a site to a new domain. Source
乾淨的URL
This snippet lets you use “clean” URLs — those without a PHP extension, e.g. example.com/users
instead ofexample.com/users.php
.
RewriteEngine OnRewriteCond %{SCRIPT_FILENAME} !-dRewriteRule ^([^.]+)$ $1.php [NC,L]
Security
拒絕所有訪問
## Apache 2.2Deny from all## Apache 2.4# Require all denied
But wait, this will lock you out from your content as well! Thus introducing…
拒絕所有訪問(排除部分)
## Apache 2.2Order deny,allow Deny from all Allow from xxx.xxx.xxx.xxx## Apache 2.4# Require all denied# Require ip xxx.xxx.xxx.xxx
xxx.xxx.xxx.xxx
is your IP. If you replace the last three digits with 0/12 for example, this will specify a range of IPs within the same network, thus saving you the trouble to list all allowed IPs separately. Source
Now of course there’s a reversed version:
屏蔽爬蟲/惡意訪問
## Apache 2.2Order deny,allow Allow from all Deny from xxx.xxx.xxx.xxx Deny from xxx.xxx.xxx.xxy## Apache 2.4# Require all granted# Require not ip xxx.xxx.xxx.xxx# Require not ip xxx.xxx.xxx.xxy
保護隱藏文件和目錄
Hidden files and directories (those whose names start with a dot .
) should most, if not all, of the time be secured. For example: .htaccess
, .htpasswd
, .git
, .hg
…
RewriteCond %{SCRIPT_FILENAME} -d [OR]RewriteCond %{SCRIPT_FILENAME} -fRewriteRule "(^|/)\." - [F]
Alternatively, you can just raise a Not Found
error, giving the attacker dude no clue:
RedirectMatch 404 /\..*$
保護備份文件和源代碼文件
These files may be left by some text/html editors (like Vi/Vim) and pose a great security danger if exposed to public.
<FilesMatch "(\.(bak|config|dist|fla|inc|ini|log|psd|sh|sql|swp)|~)$"> ## Apache 2.2 Order allow,deny Deny from all Satisfy All ## Apache 2.4 # Require all denied</FilesMatch>
禁止目錄瀏覽
Options All -Indexes
禁止圖片盜鏈
RewriteEngine on# Remove the following line if you want to block blank referrer tooRewriteCond %{HTTP_REFERER} !^$RewriteCond %{HTTP_REFERER} !^http(s)?://(.+\.)?example.com [NC]RewriteRule \.(jpg|jpeg|png|gif|bmp)$ - [NC,F,L]# If you want to display a "blocked" banner in place of the hotlinked p_w_picpath, # replace the above rule with:# RewriteRule \.(jpg|jpeg|png|gif|bmp) http://example.com/blocked.png [R,L]
禁止圖片盜鏈(指定域名)
Sometimes you want to 禁止圖片盜鏈 from some bad guys only.
RewriteEngine onRewriteCond %{HTTP_REFERER} ^http(s)?://(.+\.)?badsite\.com [NC,OR]RewriteCond %{HTTP_REFERER} ^http(s)?://(.+\.)?badsite2\.com [NC,OR]RewriteRule \.(jpg|jpeg|png|gif)$ - [NC,F,L]# If you want to display a "blocked" banner in place of the hotlinked p_w_picpath, # replace the above rule with:# RewriteRule \.(jpg|jpeg|png|gif|bmp) http://example.com/blocked.png [R,L]
密碼保護目錄
First you need to create a .htpasswd
file somewhere in the system:
htpasswd -c /home/fellowship/.htpasswd boromir
Then you can use it for authentication:
AuthType Basic AuthName "One does not simply"AuthUserFile /home/fellowship/.htpasswdRequire valid-user
密碼保護文件
AuthName "One still does not simply" AuthType Basic AuthUserFile /home/fellowship/.htpasswd<Files "one-ring.o">Require valid-user</Files><FilesMatch ^((one|two|three)-rings?\.o)$>Require valid-user</FilesMatch>
通過Referrer過濾訪客
This denies access for all users who are coming from (referred by) a specific domain.
RewriteEngine on# Options +FollowSymlinksRewriteCond %{HTTP_REFERER} somedomain\.com [NC,OR]RewriteCond %{HTTP_REFERER} anotherdomain\.comRewriteRule .* - [F]
防止被別的網頁嵌套
This prevents the website to be framed (i.e. put into an iframe
tag), when still allows framing for a specific URI.
SetEnvIf Request_URI "/starry-night" allow_framing=trueHeader set X-Frame-Options SAMEORIGIN env=!allow_framing
Performance
壓縮文件
<IfModule mod_deflate.c> # 強制 compression for mangled headers. # http://developer.yahoo.com/blogs/ydn/posts/2010/12/pushing-beyond-gzipping <IfModule mod_setenvif.c> <IfModule mod_headers.c> SetEnvIfNoCase ^(Accept-EncodXng|X-cept-Encoding|X{15}|~{15}|-{15})$ ^((gzip|deflate)\s*,?\s*)+|[X~-]{4,13}$ HAVE_Accept-Encoding RequestHeader append Accept-Encoding "gzip,deflate" env=HAVE_Accept-Encoding </IfModule> </IfModule> # Compress all output labeled with one of the following MIME-types # (for Apache versions below 2.3.7, you don't need to enable `mod_filter` # and can remove the `<IfModule mod_filter.c>` and `</IfModule>` lines # as `AddOutputFilterByType` is still in the core directives). <IfModule mod_filter.c> AddOutputFilterByType DEFLATE application/atom+xml \ application/javascript \ application/json \ application/rss+xml \ application/vnd.ms-fontobject \ application/x-font-ttf \ application/x-web-app-manifest+json \ application/xhtml+xml \ application/xml \ font/opentype \ p_w_picpath/svg+xml \ p_w_picpath/x-icon \ text/css \ text/html \ text/plain \ text/x-component \ text/xml </IfModule></IfModule>
設置過期頭信息
Expires headers tell the browser whether they should request a specific file from the server or just grab it from the cache. It is advisable to set static content’s expires headers to something far in the future.
If you don’t control versioning with filename-based cache busting, consider lowering the cache time for resources like CSS and JS to something like 1 week. Source
<IfModule mod_expires.c> ExpiresActive on ExpiresDefault "access plus 1 month" # CSS ExpiresByType text/css "access plus 1 year" # Data interchange ExpiresByType application/json "access plus 0 seconds" ExpiresByType application/xml "access plus 0 seconds" ExpiresByType text/xml "access plus 0 seconds" # Favicon (cannot be renamed!) ExpiresByType p_w_picpath/x-icon "access plus 1 week" # HTML components (HTCs) ExpiresByType text/x-component "access plus 1 month" # HTML ExpiresByType text/html "access plus 0 seconds" # JavaScript ExpiresByType application/javascript "access plus 1 year" # Manifest files ExpiresByType application/x-web-app-manifest+json "access plus 0 seconds" ExpiresByType text/cache-manifest "access plus 0 seconds" # Media ExpiresByType audio/ogg "access plus 1 month" ExpiresByType p_w_picpath/gif "access plus 1 month" ExpiresByType p_w_picpath/jpeg "access plus 1 month" ExpiresByType p_w_picpath/png "access plus 1 month" ExpiresByType video/mp4 "access plus 1 month" ExpiresByType video/ogg "access plus 1 month" ExpiresByType video/webm "access plus 1 month" # Web feeds ExpiresByType application/atom+xml "access plus 1 hour" ExpiresByType application/rss+xml "access plus 1 hour" # Web fonts ExpiresByType application/font-woff2 "access plus 1 month" ExpiresByType application/font-woff "access plus 1 month" ExpiresByType application/vnd.ms-fontobject "access plus 1 month" ExpiresByType application/x-font-ttf "access plus 1 month" ExpiresByType font/opentype "access plus 1 month" ExpiresByType p_w_picpath/svg+xml "access plus 1 month"</IfModule>
關閉eTags標誌
By removing the ETag
header, you disable caches and browsers from being able to validate files, so they are forced to rely on your Cache-Control
and Expires
header. Source
<IfModule mod_headers.c> Header unset ETag</IfModule>FileETag None
Miscellaneous
設置PHP變量
php_value <key> <val># For example: php_value upload_max_filesize 50M php_value max_execution_time 240
Custom Error Pages
ErrorDocument 500 "Houston, we have a problem."ErrorDocument 401 http://error.example.com/mordor.htmlErrorDocument 404 /errors/halflife3.html
強制下載
Sometimes you want to 強制 the browser to download some content instead of displaying it.
<Files *.md> ForceType application/octet-stream Header set Content-Disposition p_w_upload</Files>
Now there is a yang to this yin:
阻止下載
Sometimes you want to 強制 the browser to display some content instead of downloading it.
<FilesMatch "\.(tex|log|aux)$"> Header set Content-Type text/plain</FilesMatch>
運行跨域字體引用
CDN-served webfonts might not work in Firefox or IE due to CORS . This snippet solves the problem.
<IfModule mod_headers.c> <FilesMatch "\.(eot|otf|ttc|ttf|woff|woff2)$"> Header set Access-Control-Allow-Origin "*" </FilesMatch></IfModule>
Auto UTF-8 Encode
Your text content should always be UTF-8 encoded, no?
# Use UTF-8 encoding for anything served text/plain or text/html AddDefaultCharset utf-8# 強制 UTF-8 for a number of file formats AddCharset utf-8 .atom .css .js .json .rss .vtt .xml
切換PHP版本
If you’re on a shared host, chances are there are more than one version of PHP installed, and sometimes you want a specific version for your website. For example, Laravel requires PHP >= 5.4. The following snippet should switch the PHP version for you.
AddHandler application/x-httpd-php55 .php # Alternatively, you can use AddType AddType application/x-httpd-php55 .php
禁止IE兼容視圖
Compatibility View in IE may affect how some websites are displayed. The following snippet should 強制 IE to use the Edge Rendering Engine and disable the Compatibility View.
<IfModule mod_headers.c> BrowserMatch MSIE is-msie Header set X-UA-Compatible IE=edge env=is-msie</IfModule>
支持WebP圖片格式
If WebP p_w_picpaths are supported and an p_w_picpath with a .webp extension and the same name is found at the same place as the jpg/png p_w_picpath that is going to be served, then the WebP p_w_picpath is served instead.
RewriteEngine OnRewriteCond %{HTTP_ACCEPT} p_w_picpath/webpRewriteCond %{DOCUMENT_ROOT}/$1.webp -fRewriteRule (.+)\.(jpe?g|png)$ $1.webp [T=p_w_picpath/webp,E=accept:1]
本文來自:Linux教程網