{ config, pkgs, ... }: let secrets = (import ../../secrets.nix); in { services.nginx = { enable = true; recommendedGzipSettings = true; recommendedOptimisation = true; recommendedProxySettings = true; recommendedTlsSettings = true; commonHttpConfig = '' map $scheme $hsts_header { https "max-age=31536000; includeSubdomains; preload"; } add_header Strict-Transport-Security $hsts_header; #add_header Content-Security-Policy "script-src 'self'; object-src 'none'; base-uri 'none';" always; add_header 'Referrer-Policy' 'origin-when-cross-origin'; #add_header X-Frame-Options DENY; #add_header X-Content-Type-Options nosniff; #add_header X-XSS-Protection "1; mode=block"; #proxy_cookie_path / "/; secure; HttpOnly; SameSite=strict"; ''; clientMaxBodySize = "512m"; }; security.acme = { email = secrets.unscoped.acme.email; acceptTerms = true; }; }