nixos/modules/nginx-acme/default.nix

44 lines
1.4 KiB
Nix
Raw Normal View History

2022-05-19 21:41:45 +02:00
{ domain, inputs, port ? "8080", ... }:
2022-05-17 22:05:50 +02:00
{
imports = [
"${inputs.self}/modules/nginx-acme-base"
2022-05-17 22:11:02 +02:00
];
2022-05-17 22:05:50 +02:00
services.nginx = {
2022-05-18 21:22:13 +02:00
commonHttpConfig = ''
# Add HSTS header with preloading to HTTPS requests.
# Adding this header to HTTP requests is discouraged
map $scheme $hsts_header {
2022-05-18 21:29:36 +02:00
https "max-age=63072000; includeSubdomains; preload";
2022-05-18 21:22:13 +02:00
}
add_header Strict-Transport-Security $hsts_header;
# Enable CSP for your services.
#add_header Content-Security-Policy "script-src 'self'; object-src 'none'; base-uri 'none';" always;
# Minimize information leaked to other domains
add_header 'Referrer-Policy' 'origin-when-cross-origin';
# Disable embedding as a frame
add_header X-Frame-Options DENY;
# Prevent injection of code in other mime types (XSS Attacks)
add_header X-Content-Type-Options nosniff;
# Enable XSS protection of the browser.
# May be unnecessary when CSP is configured properly (see above)
add_header X-XSS-Protection "1; mode=block";
# This might create errors
proxy_cookie_path / "/; secure; HttpOnly; SameSite=strict";
'';
2022-05-17 22:05:50 +02:00
virtualHosts."${domain}" = {
enableACME = true;
forceSSL = true;
locations."/" = {
2022-05-19 21:41:45 +02:00
proxyPass = "http://127.0.0.1:${port}";
2022-05-17 22:05:50 +02:00
proxyWebsockets = true; # needed if you need to use WebSocket
};
};
2022-05-17 22:15:35 +02:00
};
}