Node.js application security – with Nginx, Let’s Encrypt & Docker Compose

In today’s digital world, ensuring the security of your application is crucial. This blog post shows you how to secure a containerized Node.js application with Nginx, Let’s Encrypt, and Docker Compose.

Application security is an essential aspect of development. By using a reverse proxy like Nginx, which allows load balancing, caching of static content, and TLS implementation, you can improve the security and performance of your application. This post guides you through the steps to secure a containerized Node.js application with Nginx and Let’s Encrypt using Docker Compose.

Prerequisites – Node.js

  • An Ubuntu 18.04 server with a non-root user with sudo privileges and an active firewall.
  • Docker and Docker Compose installed on your server.
  • A registered domain that you can use for your application.
  • The DNS records for your domain configured.

Step 1 — Cloning and Testing the Node Application

First, clone the repository with the Node application code. Then, test the application to ensure everything works. This step involves building and running the application without a reverse proxy or SSL.

git clone https://github.com/do-community/nodejs-image-demo.git node_project
cd node_project
docker build -t node-demo .
docker run –name node-demo -p 80:8080 -d node-demo

Step 2 — Defining Web Server Configuration

After testing the Node application, create a configuration file for the Nginx web server. This configuration will enable forwarding requests to your Node application and handling certificate requests from Certbot.

Step 3 — Creating the Docker Compose File

The `docker-compose.yml` file defines the services for your application, the web server, and the Certbot container. It includes details like named volumes, networks, and port information.

version: ‘3’

services:
nodejs:
# Configuration for the Node service

webserver:
# Configuration for the Nginx web server

certbot:
# Configuration for the Certbot container

Step 4: Starting the Containers

First, we need to start the containers with the `docker-compose up` command. This will create and run the containers and services in the order we specified. Once the domain requests are successful, certificates will be provided in the `/etc/letsencrypt/live` folder of the web server.

Step 5: Checking the Services

We can check the status of our services with the `docker-compose ps` command. The `nodejs` and `webserver` services should show as “Up,” while the `certbot` container should have exited with “Exit 0” status. Otherwise, we can check the service logs with the `docker-compose logs` command.

Step 6: Adjusting Certificate Requests

We can edit the `certbot` service definition to remove the `–staging` flag and replace it with the `–force-renewal` flag. This instructs Certbot to request a new certificate with the same domains as an existing certificate.

certbot:
image: certbot/certbot
container_name: certbot
volumes:
– certbot-etc:/etc/letsencrypt
– certbot-var:/var/lib/letsencrypt
– web-root:/var/www/html
depends_on:
– webserver
command: certonly –webroot –webroot-path=/var/www/html –email sammy@your_domain –agree-tos –no-eff-email –force-renewal -d your_domain -d www.your_domain

Step 7: Updating Nginx Configuration

To enable SSL in our Nginx configuration, we need to add an HTTP redirect to HTTPS and specify the SSL certificate and key locations. We must also specify the Diffie-Hellman group used for Perfect Forward Secrecy.

server {
listen 80;
listen [::]:80;
server_name your_domain www.your_domain;

location ~ /.well-known/acme-challenge {
allow all;
root /var/www/html;
}

location / {
rewrite ^ https://$host$request_uri? permanent;
}
}

server {
listen 443 ssl http2;
listen [::]:443 ssl http2;
server_name your_domain www.your_domain;

server_tokens off;

ssl_certificate /etc/letsencrypt/live/your_domain/fullchain.pem;
ssl_certificate_key /etc/letsencrypt/live/your_domain/privkey.pem;

ssl_buffer_size 8k;

ssl_dhparam /etc/ssl/certs/dhparam-2048.pem;

ssl_protocols TLSv1.2;
ssl_prefer_server_ciphers on;

ssl_ciphers ECDH+AESGCM:ECDH+AES256:ECDH+AES128:DH+3DES:!ADH:!AECDH:!MD5;

ssl_ecdh_curve secp384r1;
ssl_session_tickets off;

ssl_stapling on;
ssl_stapling_verify on;
resolver 8.8.8.8;

location / {
try_files $uri @nodejs;
}

location @nodejs {
proxy_pass http://nodejs:8080;
add_header X-Frame-Options “SAMEORIGIN” always;
add_header X-XSS-Protection “1; mode=block” always;
add_header X-Content-Type-Options “nosniff” always;
add_header Referrer-Policy “no-referrer-when-downgrade” always;
add_header Content-Security-Policy “default-src * data: ‘unsafe-eval’ ‘unsafe-inline’” always;
#add_header Strict-Transport-Security “max-age=31536000; includeSubDomains; preload” always;
# enable strict transport security only if you understand the implications
}

root /var/www/html;
index index.html index.htm index.nginx-debian.html;
}

Step 8: Renewing Certificates

Since Let’s Encrypt certificates are only valid for 90 days, we need to set up an automated renewal process. This can be done with a cron job that runs a script to renew the certificates and reload the Nginx configuration.

#!/bin/bash

COMPOSE=”/usr/local/bin/docker-compose –ansi never”
DOCKER=”/usr/bin/docker”

cd /home/sammy/node_project/
$COMPOSE run certbot renew –dry-run && $COMPOSE kill -s SIGHUP webserver
$DOCKER system prune -af

Node.js Conclusion

With Docker Compose, we have set up SSL certificates for our application and implemented an automated renewal process. By utilizing containers, we have created a flexible and scalable solution to ensure the security of our web application. Secure Node.js Application – with Nginx, Let’s Encrypt & Docker Compose

Create a Free Account

Register now and get access to our Cloud Services.

Posts you might be interested in:

centron Managed Cloud Hosting in Deutschland

Extended Security Updates for Windows Server

Security
Extended Security Updates for Windows Server Extended Security Updates (ESU) for Windows Server include security updates and bulletins rated critical and important. Content1 How you get ESUs depends on where…
centron Managed Cloud Hosting in Deutschland

Windows Server Comparison

Security
Windows Server Comparison This table provides a complete comparison of available roles and features in Windows Server 2025 across Standard, Datacenter, and Datacenter: Azure Edition. Windows Server 2025Windows Server 2022Windows…
centron Managed Cloud Hosting in Deutschland

Windows Server 2025 New Features

Security
Windows Server 2025 New Features This article describes some of the newest developments in Windows Server 2025, which boasts advanced features that improve security, performance, and flexibility. With faster storage…