49 lines
		
	
	
	
		
			1.2 KiB
		
	
	
	
		
			Nix
		
	
	
	
	
	
			
		
		
	
	
			49 lines
		
	
	
	
		
			1.2 KiB
		
	
	
	
		
			Nix
		
	
	
	
	
	
| {
 | |
|   lib,
 | |
|   pkgs,
 | |
|   config,
 | |
|   ...
 | |
| }: {
 | |
|   options.services.home-assistant = {
 | |
|     fail2ban = {
 | |
|       enable = lib.mkOption {
 | |
|         type = lib.types.bool;
 | |
|         default = config.services.fail2ban.enable && config.services.home-assistant.enable;
 | |
|       };
 | |
|     };
 | |
|   };
 | |
| 
 | |
|   config = lib.mkIf config.services.home-assistant.fail2ban.enable {
 | |
|     environment.etc = {
 | |
|       "fail2ban/filter.d/hass.local".text = (
 | |
|         pkgs.lib.mkDefault (pkgs.lib.mkAfter ''
 | |
|           [INCLUDES]
 | |
|           before = common.conf
 | |
| 
 | |
|           [Definition]
 | |
|           failregex = ^%(__prefix_line)s.*Login attempt or request with invalid authentication from <HOST>.*$
 | |
| 
 | |
|           ignoreregex =
 | |
| 
 | |
|           [Init]
 | |
|           datepattern = ^%%Y-%%m-%%d %%H:%%M:%%S
 | |
|         '')
 | |
|       );
 | |
|     };
 | |
| 
 | |
|     services.fail2ban = {
 | |
|       jails = {
 | |
|         home-assistant-iptables.settings = {
 | |
|           enabled = true;
 | |
|           filter = "hass";
 | |
|           action = ''iptables-multiport[name=HTTP, port="http,https"]'';
 | |
|           logpath = "${config.services.home-assistant.configDir}/*.log";
 | |
|           backend = "auto";
 | |
|           findtime = 600;
 | |
|           bantime = 600;
 | |
|           maxretry = 5;
 | |
|         };
 | |
|       };
 | |
|     };
 | |
|   };
 | |
| }
 |