forked from jan-leila/nix-config
		
	removed next cloud
This commit is contained in:
		
							parent
							
								
									c4c84503f5
								
							
						
					
					
						commit
						769da44f84
					
				
					 4 changed files with 41 additions and 93 deletions
				
			
		|  | @ -114,10 +114,6 @@ | ||||||
|     adguardhome = { |     adguardhome = { | ||||||
|       enable = false; |       enable = false; | ||||||
|     }; |     }; | ||||||
|     nextcloud = { |  | ||||||
|       enable = false; |  | ||||||
|       subdomain = "drive"; |  | ||||||
|     }; |  | ||||||
|     sync = { |     sync = { | ||||||
|       enable = true; |       enable = true; | ||||||
|       folders = { |       folders = { | ||||||
|  |  | ||||||
|  | @ -10,6 +10,5 @@ | ||||||
|     ./searx.nix |     ./searx.nix | ||||||
|     ./home-assistant.nix |     ./home-assistant.nix | ||||||
|     ./adguardhome.nix |     ./adguardhome.nix | ||||||
|     ./nextcloud.nix |  | ||||||
|   ]; |   ]; | ||||||
| } | } | ||||||
|  |  | ||||||
|  | @ -1,5 +1,6 @@ | ||||||
| { | { | ||||||
|   lib, |   lib, | ||||||
|  |   pkgs, | ||||||
|   config, |   config, | ||||||
|   ... |   ... | ||||||
| }: let | }: let | ||||||
|  | @ -12,6 +13,41 @@ in { | ||||||
| 
 | 
 | ||||||
|   config = lib.mkIf config.host.fail2ban.enable (lib.mkMerge [ |   config = lib.mkIf config.host.fail2ban.enable (lib.mkMerge [ | ||||||
|     { |     { | ||||||
|  |       environment.etc = { | ||||||
|  |         "fail2ban/filter.d/nginx.local".text = lib.mkIf config.services.nginx.enable ( | ||||||
|  |           pkgs.lib.mkDefault (pkgs.lib.mkAfter '' | ||||||
|  |             [Definition] | ||||||
|  |             failregex = "limiting requests, excess:.* by zone.*client: <HOST>" | ||||||
|  |           '') | ||||||
|  |         ); | ||||||
|  |         "fail2ban/filter.d/jellyfin.local".text = lib.mkIf config.services.jellyfin.enable ( | ||||||
|  |           pkgs.lib.mkDefault (pkgs.lib.mkAfter '' | ||||||
|  |             [Definition] | ||||||
|  |             failregex = "^.*Authentication request for .* has been denied \\\(IP: \"<ADDR>\"\\\)\\\." | ||||||
|  |           '') | ||||||
|  |         ); | ||||||
|  |         "fail2ban/filter.d/forgejo.local".text = lib.mkIf config.services.forgejo.enable ( | ||||||
|  |           pkgs.lib.mkDefault (pkgs.lib.mkAfter '' | ||||||
|  |             [Definition] | ||||||
|  |             failregex = ".*(Failed authentication attempt|invalid credentials|Attempted access of unknown user).* from <HOST>" | ||||||
|  |           '') | ||||||
|  |         ); | ||||||
|  |         "fail2ban/filter.d/hass.local".text = lib.mkIf config.services.home-assistant.enable ( | ||||||
|  |           pkgs.lib.mkDefault (pkgs.lib.mkAfter '' | ||||||
|  |             [INCLUDES] | ||||||
|  |             before = common.conf | ||||||
|  | 
 | ||||||
|  |             [Definition] | ||||||
|  |             failregex = ^%(__prefix_line)s.*Login attempt or request with invalid authentication from <HOST>.*$ | ||||||
|  | 
 | ||||||
|  |             ignoreregex = | ||||||
|  | 
 | ||||||
|  |             [Init] | ||||||
|  |             datepattern = ^%%Y-%%m-%%d %%H:%%M:%%S | ||||||
|  |           '') | ||||||
|  |         ); | ||||||
|  |       }; | ||||||
|  | 
 | ||||||
|       services.fail2ban = { |       services.fail2ban = { | ||||||
|         enable = true; |         enable = true; | ||||||
|         maxretry = 5; |         maxretry = 5; | ||||||
|  | @ -34,54 +70,40 @@ in { | ||||||
|         }; |         }; | ||||||
|         jails = { |         jails = { | ||||||
|           nginx-iptables.settings = lib.mkIf config.services.nginx.enable { |           nginx-iptables.settings = lib.mkIf config.services.nginx.enable { | ||||||
|  |             enabled = true; | ||||||
|             filter = "nginx"; |             filter = "nginx"; | ||||||
|             action = ''iptables-multiport[name=HTTP, port="http,https"]''; |             action = ''iptables-multiport[name=HTTP, port="http,https"]''; | ||||||
|             backend = "auto"; |             backend = "auto"; | ||||||
|             failregex = "limiting requests, excess:.* by zone.*client: <HOST>"; |  | ||||||
|             findtime = 600; |             findtime = 600; | ||||||
|             bantime = 600; |             bantime = 600; | ||||||
|             maxretry = 5; |             maxretry = 5; | ||||||
|           }; |           }; | ||||||
|           jellyfin-iptables.settings = lib.mkIf config.services.jellyfin.enable { |           jellyfin-iptables.settings = lib.mkIf config.services.jellyfin.enable { | ||||||
|  |             enabled = true; | ||||||
|             filter = "jellyfin"; |             filter = "jellyfin"; | ||||||
|             action = ''iptables-multiport[name=HTTP, port="http,https"]''; |             action = ''iptables-multiport[name=HTTP, port="http,https"]''; | ||||||
|             logpath = "${config.services.jellyfin.dataDir}/log/*.log"; |             logpath = "${config.services.jellyfin.dataDir}/log/*.log"; | ||||||
|             backend = "auto"; |             backend = "auto"; | ||||||
|             failregex = "^.*Authentication request for .* has been denied \\\(IP: \"<ADDR>\"\\\)\\\."; |  | ||||||
|             findtime = 600; |  | ||||||
|             bantime = 600; |  | ||||||
|             maxretry = 5; |  | ||||||
|           }; |  | ||||||
|           nextcloud-iptables.settings = lib.mkIf config.services.nextcloud.enable { |  | ||||||
|             filter = "nextcloud"; |  | ||||||
|             action = ''iptables-multiport[name=HTTP, port="http,https"]''; |  | ||||||
|             logpath = "${config.services.nextcloud.datadir}/*.log"; |  | ||||||
|             backend = "auto"; |  | ||||||
|             failregex = '' |  | ||||||
|               ^{"reqId":".*","remoteAddr":".*","app":"core","message":"Login failed: '.*' \(Remote IP: '<HOST>'\)","level":2,"time":".*"}$ |  | ||||||
|                           ^{"reqId":".*","level":2,"time":".*","remoteAddr":".*","user,:".*","app":"no app in context".*","method":".*","message":"Login failed: '.*' \(Remote IP: '<HOST>'\)".*}$ |  | ||||||
|                           ^{"reqId":".*","level":2,"time":".*","remoteAddr":".*","user":".*","app":".*","method":".*","url":".*","message":"Login failed: .* \(Remote IP: <HOST>\).*}$ |  | ||||||
|             ''; |  | ||||||
|             findtime = 600; |             findtime = 600; | ||||||
|             bantime = 600; |             bantime = 600; | ||||||
|             maxretry = 5; |             maxretry = 5; | ||||||
|           }; |           }; | ||||||
|           forgejo-iptables.settings = lib.mkIf config.services.forgejo.enable { |           forgejo-iptables.settings = lib.mkIf config.services.forgejo.enable { | ||||||
|  |             enabled = true; | ||||||
|             filter = "forgejo"; |             filter = "forgejo"; | ||||||
|             action = ''iptables-multiport[name=HTTP, port="http,https"]''; |             action = ''iptables-multiport[name=HTTP, port="http,https"]''; | ||||||
|             logpath = "${config.services.forgejo.stateDir}/log/*.log"; |             logpath = "${config.services.forgejo.stateDir}/log/*.log"; | ||||||
|             backend = "auto"; |             backend = "auto"; | ||||||
|             failregex = ".*(Failed authentication attempt|invalid credentials|Attempted access of unknown user).* from <HOST>"; |  | ||||||
|             findtime = 600; |             findtime = 600; | ||||||
|             bantime = 600; |             bantime = 600; | ||||||
|             maxretry = 5; |             maxretry = 5; | ||||||
|           }; |           }; | ||||||
|           home-assistant-iptables.settings = lib.mkIf config.services.home-assistant.enable { |           home-assistant-iptables.settings = lib.mkIf config.services.home-assistant.enable { | ||||||
|             filter = "home-assistant"; |             enabled = true; | ||||||
|  |             filter = "hass"; | ||||||
|             action = ''iptables-multiport[name=HTTP, port="http,https"]''; |             action = ''iptables-multiport[name=HTTP, port="http,https"]''; | ||||||
|             logpath = "${config.services.home-assistant.configDir}/*.log"; |             logpath = "${config.services.home-assistant.configDir}/*.log"; | ||||||
|             backend = "auto"; |             backend = "auto"; | ||||||
|             failregex = "^%(__prefix_line)s.*Login attempt or request with invalid authentication from <HOST>.*$"; |  | ||||||
|             findtime = 600; |             findtime = 600; | ||||||
|             bantime = 600; |             bantime = 600; | ||||||
|             maxretry = 5; |             maxretry = 5; | ||||||
|  |  | ||||||
|  | @ -1,69 +0,0 @@ | ||||||
| { |  | ||||||
|   lib, |  | ||||||
|   pkgs, |  | ||||||
|   config, |  | ||||||
|   inputs, |  | ||||||
|   ... |  | ||||||
| }: let |  | ||||||
|   dataDir = "/var/lib/nextcloud"; |  | ||||||
| in { |  | ||||||
|   options.host.nextcloud = { |  | ||||||
|     enable = lib.mkEnableOption "should nextcloud be enabled on this computer"; |  | ||||||
|     subdomain = lib.mkOption { |  | ||||||
|       type = lib.types.str; |  | ||||||
|       description = "subdomain of base domain that nextcloud will be hosted at"; |  | ||||||
|       default = "nextcloud"; |  | ||||||
|     }; |  | ||||||
|   }; |  | ||||||
| 
 |  | ||||||
|   config = lib.mkIf config.host.nextcloud.enable (lib.mkMerge [ |  | ||||||
|     { |  | ||||||
|       sops.secrets = { |  | ||||||
|         "services/nextcloud_adminpass" = { |  | ||||||
|           sopsFile = "${inputs.secrets}/defiant-services.yaml"; |  | ||||||
|           owner = config.users.users.nextcloud.name; |  | ||||||
|         }; |  | ||||||
|       }; |  | ||||||
| 
 |  | ||||||
|       host = { |  | ||||||
|         reverse_proxy.subdomains.${config.host.nextcloud.subdomain} = { |  | ||||||
|           target = "http://localhost:${toString 8009}"; |  | ||||||
|         }; |  | ||||||
|       }; |  | ||||||
| 
 |  | ||||||
|       services = { |  | ||||||
|         nextcloud = { |  | ||||||
|           enable = true; |  | ||||||
|           package = pkgs.nextcloud31; |  | ||||||
|           hostName = "${config.host.nextcloud.subdomain}.${config.host.reverse_proxy.hostname}"; |  | ||||||
|           settings.log_type = "file"; |  | ||||||
|           config = { |  | ||||||
|             adminpassFile = config.sops.secrets."services/nextcloud_adminpass".path; |  | ||||||
|             adminuser = "admin"; |  | ||||||
|             dbtype = "sqlite"; |  | ||||||
|           }; |  | ||||||
|         }; |  | ||||||
|       }; |  | ||||||
|     } |  | ||||||
|     (lib.mkIf config.host.impermanence.enable { |  | ||||||
|       assertions = [ |  | ||||||
|         { |  | ||||||
|           assertion = config.services.nextcloud.datadir == dataDir; |  | ||||||
|           message = "nextcloud data directory does not match persistence"; |  | ||||||
|         } |  | ||||||
|       ]; |  | ||||||
| 
 |  | ||||||
|       environment.persistence."/persist/system/root" = { |  | ||||||
|         enable = true; |  | ||||||
|         hideMounts = true; |  | ||||||
|         directories = [ |  | ||||||
|           { |  | ||||||
|             directory = dataDir; |  | ||||||
|             user = "nextcloud"; |  | ||||||
|             group = "nextcloud"; |  | ||||||
|           } |  | ||||||
|         ]; |  | ||||||
|       }; |  | ||||||
|     }) |  | ||||||
|   ]); |  | ||||||
| } |  | ||||||
		Loading…
	
	Add table
		Add a link
		
	
		Reference in a new issue