rclone-webdav begins

This commit is contained in:
William 2025-07-06 19:37:18 -03:00
parent 5e06bcc3c3
commit 964aef3e19
5 changed files with 321 additions and 61 deletions

View file

@ -12,6 +12,29 @@ in
{ {
services = { services = {
forgejo = {
enable = true;
repositoryRoot = "/data/forgejo";
settings = {
session.COOKIE_SECURE = true;
server = {
PROTOCOL = "http+unix";
DOMAIN = "git.baduhai.dev";
ROOT_URL = "https://git.baduhai.dev";
OFFLINE_MODE = true; # disable use of CDNs
SSH_DOMAIN = "baduhai.dev";
};
log.LEVEL = "Warn";
mailer.ENABLED = false;
actions.ENABLED = false;
};
};
jellyfin = {
enable = true;
openFirewall = true;
};
nginx = { nginx = {
enable = true; enable = true;
recommendedGzipSettings = true; recommendedGzipSettings = true;
@ -37,33 +60,13 @@ in
"jellyfin.baduhai.dev".locations."/".proxyPass = "http://127.0.0.1:${ports.jellyfin}"; "jellyfin.baduhai.dev".locations."/".proxyPass = "http://127.0.0.1:${ports.jellyfin}";
"pass.baduhai.dev".locations."/".proxyPass = "http://127.0.0.1:${ports.vaultwarden}"; "pass.baduhai.dev".locations."/".proxyPass = "http://127.0.0.1:${ports.vaultwarden}";
"speedtest.baduhai.dev".locations."/".proxyPass = "http://127.0.0.1:${ports.librespeed}"; "speedtest.baduhai.dev".locations."/".proxyPass = "http://127.0.0.1:${ports.librespeed}";
"webdav.baduhai.dev".locations."/".proxyPass = "http://127.0.0.1:${ports.webdav}"; # "webdav.baduhai.dev".locations."/" = {
# proxyPass = "http://127.0.0.1:${ports.webdav}";
# proxyNoTimeout = true;
# };
}; };
}; };
forgejo = {
enable = true;
repositoryRoot = "/data/forgejo";
settings = {
session.COOKIE_SECURE = true;
server = {
PROTOCOL = "http+unix";
DOMAIN = "git.baduhai.dev";
ROOT_URL = "https://git.baduhai.dev";
OFFLINE_MODE = true; # disable use of CDNs
SSH_DOMAIN = "baduhai.dev";
};
log.LEVEL = "Warn";
mailer.ENABLED = false;
actions.ENABLED = false;
};
};
jellyfin = {
enable = true;
openFirewall = true;
};
radicale = { radicale = {
enable = true; enable = true;
settings = { settings = {
@ -81,6 +84,15 @@ in
}; };
}; };
rclone-webdav = {
enable = true;
authFile = config.age.secrets.wevdav.path;
dataDirectory = "/data/webdav";
maxFileSize = "5G";
listenAddresses = [ "0.0.0.0" ];
port = lib.toInt ports.webdav;
};
vaultwarden = { vaultwarden = {
enable = true; enable = true;
config = { config = {
@ -90,25 +102,6 @@ in
ROCKET_PORT = "${ports.vaultwarden}"; ROCKET_PORT = "${ports.vaultwarden}";
}; };
}; };
webdav = {
enable = true;
settings = {
address = "0.0.0.0";
port = lib.toInt ports.webdav;
behindProxy = true;
modify = true;
auth = true;
users = [
{
username = "{env}USERNAME_1";
password = "{env}PASSWORD_1";
directory = "{env}USERNAME_1";
}
];
};
environmentFile = config.age.secrets."webdav.env".path;
};
}; };
virtualisation.oci-containers.containers."librespeed" = { virtualisation.oci-containers.containers."librespeed" = {
@ -142,8 +135,8 @@ in
owner = "nginx"; owner = "nginx";
group = "nginx"; group = "nginx";
}; };
"webdav.env" = { webdav = {
file = ../../../secrets/webdav.env.age; file = ../../../secrets/webdav.age;
owner = "webdav"; owner = "webdav";
group = "webdav"; group = "webdav";
}; };

267
modules/rclone-webdav.nix Normal file
View file

@ -0,0 +1,267 @@
{
config,
lib,
pkgs,
...
}:
with lib;
let
cfg = config.services.rclone-webdav;
parseUserFile =
userFile:
let
content = builtins.readFile userFile;
lines = filter (line: line != "" && !hasPrefix "#" line) (splitString "\n" content);
parseUser =
line:
let
parts = splitString ":" line;
in
{
username = elemAt parts 0;
password = elemAt parts 1;
};
in
map parseUser lines;
users = if cfg.authFile != null then parseUserFile cfg.authFile else [ ];
usernames = map (u: u.username) users;
socketDirectory = "/var/lib/webdav";
# Generate rclone service for each user
mkRcloneService =
user:
nameValuePair "rclone-webdav-${user.username}" {
description = "rclone WebDAV service for ${user.username}";
wantedBy = [ "multi-user.target" ];
after = [ "network.target" ];
serviceConfig = {
Type = "simple";
User = cfg.user;
Group = cfg.group;
Restart = "always";
RestartSec = "5s";
# Ensure directories exist
ExecStartPre = [
"${pkgs.coreutils}/bin/mkdir -p ${cfg.dataDirectory}/${user.username}"
"${pkgs.coreutils}/bin/mkdir -p ${socketDirectory}"
"${pkgs.coreutils}/bin/chown ${cfg.user}:${cfg.group} ${cfg.dataDirectory}/${user.username}"
"${pkgs.coreutils}/bin/chown ${cfg.user}:${cfg.group} ${socketDirectory}"
];
ExecStart = ''
${pkgs.rclone}/bin/rclone serve webdav ${cfg.dataDirectory}/${user.username} \
--addr unix:${socketDirectory}/rclone-${user.username}.sock \
--user ${user.username} \
--pass ${user.password} \
--log-level INFO
'';
# Security settings
NoNewPrivileges = true;
PrivateTmp = true;
ProtectSystem = "strict";
ProtectHome = true;
ReadWritePaths = [
cfg.dataDirectory
socketDirectory
];
};
};
# Generate nginx upstream for each user
mkNginxUpstream = user: {
name = "rclone-${user.username}";
value = {
servers = {
"unix:${socketDirectory}/rclone-${user.username}.sock" = { };
};
};
};
# Generate nginx location for each user
mkNginxLocation = user: {
name = "/${user.username}/";
value = {
proxyPass = "http://rclone-${user.username}";
extraConfig = ''
proxy_set_header Host $host;
proxy_set_header X-Real-IP $remote_addr;
proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for;
proxy_set_header X-Forwarded-Proto $scheme;
# Remove the username prefix from the path
rewrite ^/${user.username}/(.*) /$1 break;
# WebDAV specific headers
proxy_set_header Destination $http_destination;
proxy_set_header Depth $http_depth;
proxy_set_header Overwrite $http_overwrite;
proxy_set_header Lock-Token $http_lock_token;
proxy_set_header If $http_if;
# Allow WebDAV methods
proxy_method $request_method;
# Increase timeouts for large file uploads
proxy_connect_timeout 300s;
proxy_send_timeout 300s;
proxy_read_timeout 300s;
# Set maximum file size for this location
client_max_body_size ${cfg.maxFileSize};
'';
};
};
in
{
options.services.rclone-webdav = {
enable = mkEnableOption "rclone WebDAV multi-user service";
authFile = mkOption {
type = types.nullOr types.path;
default = null;
description = "Path to file containing username:password pairs, one per line";
example = "/etc/rclone-webdav-users";
};
dataDirectory = mkOption {
type = types.str;
default = "/srv/webdav";
description = "Base directory where user subdirectories will be created";
};
user = mkOption {
type = types.str;
default = "webdav";
description = "User to run rclone services as";
};
group = mkOption {
type = types.str;
default = "webdav";
description = "Group to run rclone services as";
};
listenAddresses = mkOption {
type = types.listOf types.str;
default = [ "localhost" ];
description = "List of addresses for nginx to listen on";
example = [
"localhost"
"127.0.0.1"
"::1"
];
};
port = mkOption {
type = types.port;
default = 8000;
description = "Port for nginx to listen on";
};
maxFileSize = mkOption {
type = types.str;
default = "0";
description = "Maximum file size for uploads (nginx client_max_body_size). Use '0' for unlimited.";
example = "100M";
};
};
config = mkIf cfg.enable {
assertions = [
{
assertion = cfg.authFile != null;
message = "services.rclone-webdav.authFile must be specified";
}
{
assertion = users != [ ];
message = "Auth file must contain at least one user";
}
];
# Create user and group
users.users = mkIf (cfg.user == "webdav") {
webdav = {
isSystemUser = true;
group = cfg.group;
description = "rclone WebDAV service user";
home = cfg.dataDirectory;
createHome = true;
};
};
users.groups = mkIf (cfg.group == "webdav") {
webdav = {
gid = null;
};
};
# Create systemd services for each user
systemd.services = listToAttrs (map mkRcloneService users);
# Configure nginx
services.nginx = {
enable = true;
upstreams = listToAttrs (map mkNginxUpstream users);
virtualHosts."rclone-webdav" = {
listen = map (addr: {
addr = addr;
port = cfg.port;
}) cfg.listenAddresses;
locations = listToAttrs (map mkNginxLocation users) // {
"/" = {
return = "200 'rclone WebDAV Multi-user Server'";
extraConfig = ''
add_header Content-Type text/plain;
'';
};
# Catch-all location for non-existent users - return 400
"~* ^/([^/]+)/" = {
extraConfig = ''
# Check if the requested user exists
set $user_exists 0;
${concatStringsSep "\n" (
map (username: "if ($1 = \"${username}\") { set $user_exists 1; }") usernames
)}
# If user doesn't exist, return 400
if ($user_exists = 0) {
return 400 "User not found";
}
# This should not be reached for valid users
return 404;
'';
};
};
extraConfig = ''
# Enable WebDAV methods
dav_methods PUT DELETE MKCOL COPY MOVE;
dav_ext_methods PROPFIND PROPPATCH LOCK UNLOCK;
# Set default maximum file size
client_max_body_size ${cfg.maxFileSize};
'';
};
};
# Ensure directories exist
systemd.tmpfiles.rules = [
"d ${cfg.dataDirectory} 0755 ${cfg.user} ${cfg.group} -"
"d ${socketDirectory} 0755 ${cfg.user} ${cfg.group} -"
] ++ map (user: "d ${cfg.dataDirectory}/${user.username} 0755 ${cfg.user} ${cfg.group} -") users;
};
}

View file

@ -25,5 +25,5 @@ let
in in
{ {
"cloudflare.age".publicKeys = all-hosts; "cloudflare.age".publicKeys = all-hosts;
"webdav.env.age".publicKeys = all-hosts; "webdav.age".publicKeys = all-hosts;
} }

15
secrets/webdav.age Normal file
View file

@ -0,0 +1,15 @@
age-encryption.org/v1
-> ssh-ed25519 Kfdnog 9oKx6Oz/J/QJ0mmgoLX5AUx0sFdxnPVnjF42bElPSXA
BJ6h4lHGDsf1Npc4bwkvz5htGRT/x/b2bs9WFM2W/pc
-> ssh-ed25519 SP9f6A T5t4apynXLYN/4YEvaHRCI28rrKzet4r6LrbAye5VGk
BsXkZYBxG9zcfLYCd9H0+LW078oCDyYx9zG+DPfE7bA
-> ssh-ed25519 8YSAiw RY0YR30qyJPvhy7eTJLoj2JXpH9qHP43fJaHilJykXM
E5/P0Egz/LKwEhYLYd5Cnrat47gnYn93yDSeYgLi934
-> ssh-ed25519 7cojTQ qTCTw7CjilThFLmXYph4YhVBhnk1DpnFCGwgioo/XB0
N31nZ8nInQuddLD3b0bxI5Es/pTvTQD8nz0f/AZtNFg
-> ssh-ed25519 J6tVTA 7OawDsWwtVxu76ZgF0dFclMr19sBNdtu7H+Tr7Pd+SQ
hhVKcscIKIH1WChhRo/RYqUWy1rgs/EKnlHr9uY7QrQ
-> ssh-ed25519 Kl5yTQ +i2Q3uNHw1jAVH76NHy4QbjCc6sBBYjsbr7w4mLaHW4
JOJ02zU0+IxlbXMBsW4UrvzvLUbifdzABBNL+bc0bBs
--- W40oEFdBUKbi0teNTc6B1sX0ReHDvkIJcBm1dlROnk8
zÒ¼ÆCnçç®±àÈeÓ­ù7{ïÛé{Nðì§ä³6ê•azÁ"ÒÉE¯HB/¢BYbD

View file

@ -1,15 +0,0 @@
age-encryption.org/v1
-> ssh-ed25519 Kfdnog iYAk0YU1ekpdPEzhPKPBDeF2oM2XT6ZIqe/6xoJafSA
W0aPLLAsCUOIBqWtxzyZw5l4I72n1BFD/E9Oalz7lYg
-> ssh-ed25519 SP9f6A VzaqzMWrKJ5Iuj/A2EnBnEJNApQ0wx6ktNzhqMhxkx4
0/qTjEcQXanCLODi8pGEYWR6JX2QZU2fHy5REIw0bA8
-> ssh-ed25519 8YSAiw I+aTRniv+tTMrQQiTVONh4ziisdqGbE1Ntyy7zYFe3Y
tc4yyoNsPQum5lPc2/eKY6CXl+bYst9JqsXHJmt2RPo
-> ssh-ed25519 7cojTQ 96asBSxBQWOxMaKdvBUXCro5fqpeZnpWSXapjCmxqF8
m0MBushdOMI9zp7R7VYzPibRXRfsSX9m3HTDaiv3oYQ
-> ssh-ed25519 J6tVTA uAW/2s8wHouV06Cf8XOl1MVVniZDU0STJDMyziG1x2E
BpwvevoU5w8m32KssiBUwuQXkvxl3LRjWN8u5dpDdS0
-> ssh-ed25519 Kl5yTQ p6rLLWT7Ey5RhYl4xrFI5blBXtNPMHYj8OezuQEWPU8
Ao9FmLXhWaCirDOCHM3pVZEdKy0lQs4aNkSj0gtjRvM
--- 6EArX870mq5cAeKEJZfqwVZJ1CLMG2Od7ndZYVOrpfc
v˲1×¹s´H]ŠCk‡+å¨ ×ÊØËšZ”ó°VKnM-,Š RÐ&¾Êáúä>ÔW2<áoS€xÛºýùj¼Yáe`)¹ð¸d<C2B8>_]¼ûâ¿ßêÐî‚`XÿÇ:ÕѳìaÞ î