diff options
| author | Gregor Kleen <gkleen@yggdrasil.li> | 2022-09-14 16:06:00 +0200 |
|---|---|---|
| committer | Gregor Kleen <gkleen@yggdrasil.li> | 2022-09-14 16:06:00 +0200 |
| commit | 410a63cf1baf627a0b99c34a955b3d02efabb48f (patch) | |
| tree | 0b8a0f16f6de3ea7e1495c373b647c3966e3f4fb /hosts/surtr/matrix | |
| parent | b931543508377c0e48a6801e4ea217eb523e2b03 (diff) | |
| download | nixos-410a63cf1baf627a0b99c34a955b3d02efabb48f.tar nixos-410a63cf1baf627a0b99c34a955b3d02efabb48f.tar.gz nixos-410a63cf1baf627a0b99c34a955b3d02efabb48f.tar.bz2 nixos-410a63cf1baf627a0b99c34a955b3d02efabb48f.tar.xz nixos-410a63cf1baf627a0b99c34a955b3d02efabb48f.zip | |
...
Diffstat (limited to 'hosts/surtr/matrix')
| -rw-r--r-- | hosts/surtr/matrix/default.nix | 10 |
1 files changed, 5 insertions, 5 deletions
diff --git a/hosts/surtr/matrix/default.nix b/hosts/surtr/matrix/default.nix index e3a52f9a..46c2f338 100644 --- a/hosts/surtr/matrix/default.nix +++ b/hosts/surtr/matrix/default.nix | |||
| @@ -111,7 +111,7 @@ with lib; | |||
| 111 | ProtectClock = true; | 111 | ProtectClock = true; |
| 112 | ProtectHostname = true; | 112 | ProtectHostname = true; |
| 113 | 113 | ||
| 114 | ProtectHome = "tmpfs"; | 114 | ProtectHome = true; |
| 115 | ProtectKernelLogs = true; | 115 | ProtectKernelLogs = true; |
| 116 | 116 | ||
| 117 | ProtectProc = "invisible"; | 117 | ProtectProc = "invisible"; |
| @@ -123,7 +123,7 @@ with lib; | |||
| 123 | 123 | ||
| 124 | SystemCallArchitectures = "native"; | 124 | SystemCallArchitectures = "native"; |
| 125 | SystemCallFilter = ["@system-service" "~@privileged @resources @obsolete"]; | 125 | SystemCallFilter = ["@system-service" "~@privileged @resources @obsolete"]; |
| 126 | 126 | ||
| 127 | RestrictSUIDSGID = true; | 127 | RestrictSUIDSGID = true; |
| 128 | RemoveIPC = true; | 128 | RemoveIPC = true; |
| 129 | NoNewPrivileges = true; | 129 | NoNewPrivileges = true; |
| @@ -174,7 +174,7 @@ with lib; | |||
| 174 | ${corsHeaders} | 174 | ${corsHeaders} |
| 175 | ''; | 175 | ''; |
| 176 | return = "200 '${builtins.toJSON { | 176 | return = "200 '${builtins.toJSON { |
| 177 | "m.server" = "synapse.li:443"; | 177 | "m.server" = "synapse.li:443"; |
| 178 | }}'"; | 178 | }}'"; |
| 179 | }; | 179 | }; |
| 180 | "= /.well-known/matrix/client" = { | 180 | "= /.well-known/matrix/client" = { |
| @@ -198,7 +198,7 @@ with lib; | |||
| 198 | sslTrustedCertificate = "/run/credentials/nginx.service/element.synapse.li.chain.pem"; | 198 | sslTrustedCertificate = "/run/credentials/nginx.service/element.synapse.li.chain.pem"; |
| 199 | extraConfig = '' | 199 | extraConfig = '' |
| 200 | add_header Strict-Transport-Security "max-age=63072000" always; | 200 | add_header Strict-Transport-Security "max-age=63072000" always; |
| 201 | 201 | ||
| 202 | add_header X-Frame-Options SAMEORIGIN; | 202 | add_header X-Frame-Options SAMEORIGIN; |
| 203 | add_header X-Content-Type-Options nosniff; | 203 | add_header X-Content-Type-Options nosniff; |
| 204 | add_header X-XSS-Protection "1; mode=block"; | 204 | add_header X-XSS-Protection "1; mode=block"; |
| @@ -240,7 +240,7 @@ with lib; | |||
| 240 | "synapse.li".certCfg = { | 240 | "synapse.li".certCfg = { |
| 241 | postRun = '' | 241 | postRun = '' |
| 242 | ${pkgs.systemd}/bin/systemctl try-restart nginx.service | 242 | ${pkgs.systemd}/bin/systemctl try-restart nginx.service |
| 243 | ''; | 243 | ''; |
| 244 | }; | 244 | }; |
| 245 | }; | 245 | }; |
| 246 | 246 | ||
