mail.idimitrov.dev/mailserver/web.nix
2023-09-19 15:22:42 +03:00

66 lines
1.9 KiB
Nix

{ config, pkgs, ... }: {
services = {
nginx = {
recommendedGzipSettings = true;
recommendedOptimisation = true;
recommendedProxySettings = true;
recommendedTlsSettings = true;
sslCiphers = "AES256+EECDH:AES256+EDH:!aNULL";
appendHttpConfig = ''
# Add HSTS header with preloading to HTTPS requests.
# Adding this header to HTTP requests is discouraged
map $scheme $hsts_header {
https "max-age=31536000; includeSubdomains; preload";
}
add_header Strict-Transport-Security $hsts_header;
# Enable CSP for your services.
#add_header Content-Security-Policy "script-src 'self'; object-src 'none'; base-uri 'none';" always;
# Minimize information leaked to other domains
add_header 'Referrer-Policy' 'origin-when-cross-origin';
# Disable embedding as a frame
add_header X-Frame-Options DENY;
# Prevent injection of code in other mime types (XSS Attacks)
add_header X-Content-Type-Options nosniff;
# This might create errors
proxy_cookie_path / "/; secure; HttpOnly; SameSite=strict";
'';
virtualHosts =
let
base = locations: {
inherit locations;
forceSSL = true;
enableACME = true;
};
proxy = port: base {
"/".proxyPass = "http://127.0.0.1:" + toString (port) + "/";
};
in
{
"idimitrov.dev" = proxy 3000 // { default = true; };
};
};
};
networking.firewall = {
enable = true;
allowedTCPPorts = [ 80 443 ];
};
systemd.services = {
"idimitrov.dev" = {
description = "My personal website";
wantedBy = [ "multi-user.target" ];
serviceConfig = {
ExecStart = "${idimitrov-dev}/bin/idimitrov.dev";
Restart = "always";
};
};
};
}