1
0
Fork 0
nix-configuration/modules/services/webdav.nix

96 lines
2.6 KiB
Nix
Raw Normal View History

2024-10-25 20:54:19 +00:00
{
pkgs,
config,
lib,
...
}:
let
cfg = config.aux.system.services.webdav;
port = 6065; # Internal port to run the server on
in
{
options = {
aux.system.services.webdav = {
enable = lib.mkEnableOption "Enables Webdav server.";
home = lib.mkOption {
default = "/var/lib/webdav";
type = lib.types.str;
description = "Where to store Webdav's files";
example = "/home/webdav";
};
url = lib.mkOption {
default = "";
type = lib.types.str;
description = "The complete URL where Webdav is hosted.";
example = "https://dav.example.com";
};
users = lib.mkOption {
default = [ ];
type = lib.types.listOf lib.types.attrs;
description = "List of user accounts to create.";
example = lib.literalExpression "[ { username = \"user\"; password = \"pass\"; } ]";
};
};
};
config = lib.mkIf cfg.enable {
services = {
webdav = {
enable = true;
settings = {
address = "127.0.0.1";
port = port;
scope = cfg.home;
users = cfg.users;
2024-11-02 15:53:13 +00:00
behindProxy = true;
2024-10-25 20:54:19 +00:00
};
};
nginx.virtualHosts."${cfg.url}" = {
useACMEHost = pkgs.util.getDomainFromURL cfg.url;
forceSSL = true;
locations."/".extraConfig = ''
proxy_pass http://127.0.0.1:${builtins.toString port};
proxy_set_header X-Real-IP $remote_addr;
proxy_set_header REMOTE-HOST $remote_addr;
proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for;
proxy_set_header Host $host;
proxy_redirect off;
'';
};
};
2024-11-02 15:53:13 +00:00
environment.etc = lib.mkIf config.services.fail2ban.enable {
"fail2ban/filter.d/webdav.conf".text = ''
[INCLUDES]
before = common.conf
[Definition]
# Failregex to match "invalid password" and extract remote_address only
failregex = ^.*invalid password\s*\{.*"remote_address":\s*"<HOST>"\s*\}
# Failregex to match "invalid username" and extract remote_address only (if applicable)
failregex += ^.*invalid username\s*\{.*"remote_address":\s*"<HOST>"\s*\}
ignoreregex =
'';
"fail2ban/jail.d/webdav.conf".text = ''
[webdav]
enabled = true
port = ${builtins.toString port}
filter = webdav
logpath = /var/log/webdav/fail2ban.log
banaction = iptables-allports
ignoreself = false
'';
};
2024-10-25 20:54:19 +00:00
systemd.services = {
webdav.unitConfig.RequiresMountsFor = cfg.home;
nginx.wants = [ config.systemd.services.webdav.name ];
};
};
}