rclone-webdav begins
This commit is contained in:
parent
5e06bcc3c3
commit
964aef3e19
5 changed files with 321 additions and 61 deletions
|
|
@ -12,6 +12,29 @@ in
|
||||||
|
|
||||||
{
|
{
|
||||||
services = {
|
services = {
|
||||||
|
forgejo = {
|
||||||
|
enable = true;
|
||||||
|
repositoryRoot = "/data/forgejo";
|
||||||
|
settings = {
|
||||||
|
session.COOKIE_SECURE = true;
|
||||||
|
server = {
|
||||||
|
PROTOCOL = "http+unix";
|
||||||
|
DOMAIN = "git.baduhai.dev";
|
||||||
|
ROOT_URL = "https://git.baduhai.dev";
|
||||||
|
OFFLINE_MODE = true; # disable use of CDNs
|
||||||
|
SSH_DOMAIN = "baduhai.dev";
|
||||||
|
};
|
||||||
|
log.LEVEL = "Warn";
|
||||||
|
mailer.ENABLED = false;
|
||||||
|
actions.ENABLED = false;
|
||||||
|
};
|
||||||
|
};
|
||||||
|
|
||||||
|
jellyfin = {
|
||||||
|
enable = true;
|
||||||
|
openFirewall = true;
|
||||||
|
};
|
||||||
|
|
||||||
nginx = {
|
nginx = {
|
||||||
enable = true;
|
enable = true;
|
||||||
recommendedGzipSettings = true;
|
recommendedGzipSettings = true;
|
||||||
|
|
@ -37,33 +60,13 @@ in
|
||||||
"jellyfin.baduhai.dev".locations."/".proxyPass = "http://127.0.0.1:${ports.jellyfin}";
|
"jellyfin.baduhai.dev".locations."/".proxyPass = "http://127.0.0.1:${ports.jellyfin}";
|
||||||
"pass.baduhai.dev".locations."/".proxyPass = "http://127.0.0.1:${ports.vaultwarden}";
|
"pass.baduhai.dev".locations."/".proxyPass = "http://127.0.0.1:${ports.vaultwarden}";
|
||||||
"speedtest.baduhai.dev".locations."/".proxyPass = "http://127.0.0.1:${ports.librespeed}";
|
"speedtest.baduhai.dev".locations."/".proxyPass = "http://127.0.0.1:${ports.librespeed}";
|
||||||
"webdav.baduhai.dev".locations."/".proxyPass = "http://127.0.0.1:${ports.webdav}";
|
# "webdav.baduhai.dev".locations."/" = {
|
||||||
|
# proxyPass = "http://127.0.0.1:${ports.webdav}";
|
||||||
|
# proxyNoTimeout = true;
|
||||||
|
# };
|
||||||
};
|
};
|
||||||
};
|
};
|
||||||
|
|
||||||
forgejo = {
|
|
||||||
enable = true;
|
|
||||||
repositoryRoot = "/data/forgejo";
|
|
||||||
settings = {
|
|
||||||
session.COOKIE_SECURE = true;
|
|
||||||
server = {
|
|
||||||
PROTOCOL = "http+unix";
|
|
||||||
DOMAIN = "git.baduhai.dev";
|
|
||||||
ROOT_URL = "https://git.baduhai.dev";
|
|
||||||
OFFLINE_MODE = true; # disable use of CDNs
|
|
||||||
SSH_DOMAIN = "baduhai.dev";
|
|
||||||
};
|
|
||||||
log.LEVEL = "Warn";
|
|
||||||
mailer.ENABLED = false;
|
|
||||||
actions.ENABLED = false;
|
|
||||||
};
|
|
||||||
};
|
|
||||||
|
|
||||||
jellyfin = {
|
|
||||||
enable = true;
|
|
||||||
openFirewall = true;
|
|
||||||
};
|
|
||||||
|
|
||||||
radicale = {
|
radicale = {
|
||||||
enable = true;
|
enable = true;
|
||||||
settings = {
|
settings = {
|
||||||
|
|
@ -81,6 +84,15 @@ in
|
||||||
};
|
};
|
||||||
};
|
};
|
||||||
|
|
||||||
|
rclone-webdav = {
|
||||||
|
enable = true;
|
||||||
|
authFile = config.age.secrets.wevdav.path;
|
||||||
|
dataDirectory = "/data/webdav";
|
||||||
|
maxFileSize = "5G";
|
||||||
|
listenAddresses = [ "0.0.0.0" ];
|
||||||
|
port = lib.toInt ports.webdav;
|
||||||
|
};
|
||||||
|
|
||||||
vaultwarden = {
|
vaultwarden = {
|
||||||
enable = true;
|
enable = true;
|
||||||
config = {
|
config = {
|
||||||
|
|
@ -90,25 +102,6 @@ in
|
||||||
ROCKET_PORT = "${ports.vaultwarden}";
|
ROCKET_PORT = "${ports.vaultwarden}";
|
||||||
};
|
};
|
||||||
};
|
};
|
||||||
|
|
||||||
webdav = {
|
|
||||||
enable = true;
|
|
||||||
settings = {
|
|
||||||
address = "0.0.0.0";
|
|
||||||
port = lib.toInt ports.webdav;
|
|
||||||
behindProxy = true;
|
|
||||||
modify = true;
|
|
||||||
auth = true;
|
|
||||||
users = [
|
|
||||||
{
|
|
||||||
username = "{env}USERNAME_1";
|
|
||||||
password = "{env}PASSWORD_1";
|
|
||||||
directory = "{env}USERNAME_1";
|
|
||||||
}
|
|
||||||
];
|
|
||||||
};
|
|
||||||
environmentFile = config.age.secrets."webdav.env".path;
|
|
||||||
};
|
|
||||||
};
|
};
|
||||||
|
|
||||||
virtualisation.oci-containers.containers."librespeed" = {
|
virtualisation.oci-containers.containers."librespeed" = {
|
||||||
|
|
@ -142,8 +135,8 @@ in
|
||||||
owner = "nginx";
|
owner = "nginx";
|
||||||
group = "nginx";
|
group = "nginx";
|
||||||
};
|
};
|
||||||
"webdav.env" = {
|
webdav = {
|
||||||
file = ../../../secrets/webdav.env.age;
|
file = ../../../secrets/webdav.age;
|
||||||
owner = "webdav";
|
owner = "webdav";
|
||||||
group = "webdav";
|
group = "webdav";
|
||||||
};
|
};
|
||||||
|
|
|
||||||
267
modules/rclone-webdav.nix
Normal file
267
modules/rclone-webdav.nix
Normal file
|
|
@ -0,0 +1,267 @@
|
||||||
|
{
|
||||||
|
config,
|
||||||
|
lib,
|
||||||
|
pkgs,
|
||||||
|
...
|
||||||
|
}:
|
||||||
|
|
||||||
|
with lib;
|
||||||
|
|
||||||
|
let
|
||||||
|
cfg = config.services.rclone-webdav;
|
||||||
|
|
||||||
|
parseUserFile =
|
||||||
|
userFile:
|
||||||
|
let
|
||||||
|
content = builtins.readFile userFile;
|
||||||
|
lines = filter (line: line != "" && !hasPrefix "#" line) (splitString "\n" content);
|
||||||
|
parseUser =
|
||||||
|
line:
|
||||||
|
let
|
||||||
|
parts = splitString ":" line;
|
||||||
|
in
|
||||||
|
{
|
||||||
|
username = elemAt parts 0;
|
||||||
|
password = elemAt parts 1;
|
||||||
|
};
|
||||||
|
in
|
||||||
|
map parseUser lines;
|
||||||
|
|
||||||
|
users = if cfg.authFile != null then parseUserFile cfg.authFile else [ ];
|
||||||
|
usernames = map (u: u.username) users;
|
||||||
|
|
||||||
|
socketDirectory = "/var/lib/webdav";
|
||||||
|
|
||||||
|
# Generate rclone service for each user
|
||||||
|
mkRcloneService =
|
||||||
|
user:
|
||||||
|
nameValuePair "rclone-webdav-${user.username}" {
|
||||||
|
description = "rclone WebDAV service for ${user.username}";
|
||||||
|
wantedBy = [ "multi-user.target" ];
|
||||||
|
after = [ "network.target" ];
|
||||||
|
|
||||||
|
serviceConfig = {
|
||||||
|
Type = "simple";
|
||||||
|
User = cfg.user;
|
||||||
|
Group = cfg.group;
|
||||||
|
Restart = "always";
|
||||||
|
RestartSec = "5s";
|
||||||
|
|
||||||
|
# Ensure directories exist
|
||||||
|
ExecStartPre = [
|
||||||
|
"${pkgs.coreutils}/bin/mkdir -p ${cfg.dataDirectory}/${user.username}"
|
||||||
|
"${pkgs.coreutils}/bin/mkdir -p ${socketDirectory}"
|
||||||
|
"${pkgs.coreutils}/bin/chown ${cfg.user}:${cfg.group} ${cfg.dataDirectory}/${user.username}"
|
||||||
|
"${pkgs.coreutils}/bin/chown ${cfg.user}:${cfg.group} ${socketDirectory}"
|
||||||
|
];
|
||||||
|
|
||||||
|
ExecStart = ''
|
||||||
|
${pkgs.rclone}/bin/rclone serve webdav ${cfg.dataDirectory}/${user.username} \
|
||||||
|
--addr unix:${socketDirectory}/rclone-${user.username}.sock \
|
||||||
|
--user ${user.username} \
|
||||||
|
--pass ${user.password} \
|
||||||
|
--log-level INFO
|
||||||
|
'';
|
||||||
|
|
||||||
|
# Security settings
|
||||||
|
NoNewPrivileges = true;
|
||||||
|
PrivateTmp = true;
|
||||||
|
ProtectSystem = "strict";
|
||||||
|
ProtectHome = true;
|
||||||
|
ReadWritePaths = [
|
||||||
|
cfg.dataDirectory
|
||||||
|
socketDirectory
|
||||||
|
];
|
||||||
|
};
|
||||||
|
};
|
||||||
|
|
||||||
|
# Generate nginx upstream for each user
|
||||||
|
mkNginxUpstream = user: {
|
||||||
|
name = "rclone-${user.username}";
|
||||||
|
value = {
|
||||||
|
servers = {
|
||||||
|
"unix:${socketDirectory}/rclone-${user.username}.sock" = { };
|
||||||
|
};
|
||||||
|
};
|
||||||
|
};
|
||||||
|
|
||||||
|
# Generate nginx location for each user
|
||||||
|
mkNginxLocation = user: {
|
||||||
|
name = "/${user.username}/";
|
||||||
|
value = {
|
||||||
|
proxyPass = "http://rclone-${user.username}";
|
||||||
|
extraConfig = ''
|
||||||
|
proxy_set_header Host $host;
|
||||||
|
proxy_set_header X-Real-IP $remote_addr;
|
||||||
|
proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for;
|
||||||
|
proxy_set_header X-Forwarded-Proto $scheme;
|
||||||
|
|
||||||
|
# Remove the username prefix from the path
|
||||||
|
rewrite ^/${user.username}/(.*) /$1 break;
|
||||||
|
|
||||||
|
# WebDAV specific headers
|
||||||
|
proxy_set_header Destination $http_destination;
|
||||||
|
proxy_set_header Depth $http_depth;
|
||||||
|
proxy_set_header Overwrite $http_overwrite;
|
||||||
|
proxy_set_header Lock-Token $http_lock_token;
|
||||||
|
proxy_set_header If $http_if;
|
||||||
|
|
||||||
|
# Allow WebDAV methods
|
||||||
|
proxy_method $request_method;
|
||||||
|
|
||||||
|
# Increase timeouts for large file uploads
|
||||||
|
proxy_connect_timeout 300s;
|
||||||
|
proxy_send_timeout 300s;
|
||||||
|
proxy_read_timeout 300s;
|
||||||
|
|
||||||
|
# Set maximum file size for this location
|
||||||
|
client_max_body_size ${cfg.maxFileSize};
|
||||||
|
'';
|
||||||
|
};
|
||||||
|
};
|
||||||
|
|
||||||
|
in
|
||||||
|
{
|
||||||
|
options.services.rclone-webdav = {
|
||||||
|
enable = mkEnableOption "rclone WebDAV multi-user service";
|
||||||
|
|
||||||
|
authFile = mkOption {
|
||||||
|
type = types.nullOr types.path;
|
||||||
|
default = null;
|
||||||
|
description = "Path to file containing username:password pairs, one per line";
|
||||||
|
example = "/etc/rclone-webdav-users";
|
||||||
|
};
|
||||||
|
|
||||||
|
dataDirectory = mkOption {
|
||||||
|
type = types.str;
|
||||||
|
default = "/srv/webdav";
|
||||||
|
description = "Base directory where user subdirectories will be created";
|
||||||
|
};
|
||||||
|
|
||||||
|
user = mkOption {
|
||||||
|
type = types.str;
|
||||||
|
default = "webdav";
|
||||||
|
description = "User to run rclone services as";
|
||||||
|
};
|
||||||
|
|
||||||
|
group = mkOption {
|
||||||
|
type = types.str;
|
||||||
|
default = "webdav";
|
||||||
|
description = "Group to run rclone services as";
|
||||||
|
};
|
||||||
|
|
||||||
|
listenAddresses = mkOption {
|
||||||
|
type = types.listOf types.str;
|
||||||
|
default = [ "localhost" ];
|
||||||
|
description = "List of addresses for nginx to listen on";
|
||||||
|
example = [
|
||||||
|
"localhost"
|
||||||
|
"127.0.0.1"
|
||||||
|
"::1"
|
||||||
|
];
|
||||||
|
};
|
||||||
|
|
||||||
|
port = mkOption {
|
||||||
|
type = types.port;
|
||||||
|
default = 8000;
|
||||||
|
description = "Port for nginx to listen on";
|
||||||
|
};
|
||||||
|
|
||||||
|
maxFileSize = mkOption {
|
||||||
|
type = types.str;
|
||||||
|
default = "0";
|
||||||
|
description = "Maximum file size for uploads (nginx client_max_body_size). Use '0' for unlimited.";
|
||||||
|
example = "100M";
|
||||||
|
};
|
||||||
|
};
|
||||||
|
|
||||||
|
config = mkIf cfg.enable {
|
||||||
|
assertions = [
|
||||||
|
{
|
||||||
|
assertion = cfg.authFile != null;
|
||||||
|
message = "services.rclone-webdav.authFile must be specified";
|
||||||
|
}
|
||||||
|
{
|
||||||
|
assertion = users != [ ];
|
||||||
|
message = "Auth file must contain at least one user";
|
||||||
|
}
|
||||||
|
];
|
||||||
|
|
||||||
|
# Create user and group
|
||||||
|
users.users = mkIf (cfg.user == "webdav") {
|
||||||
|
webdav = {
|
||||||
|
isSystemUser = true;
|
||||||
|
group = cfg.group;
|
||||||
|
description = "rclone WebDAV service user";
|
||||||
|
home = cfg.dataDirectory;
|
||||||
|
createHome = true;
|
||||||
|
};
|
||||||
|
};
|
||||||
|
|
||||||
|
users.groups = mkIf (cfg.group == "webdav") {
|
||||||
|
webdav = {
|
||||||
|
gid = null;
|
||||||
|
};
|
||||||
|
};
|
||||||
|
|
||||||
|
# Create systemd services for each user
|
||||||
|
systemd.services = listToAttrs (map mkRcloneService users);
|
||||||
|
|
||||||
|
# Configure nginx
|
||||||
|
services.nginx = {
|
||||||
|
enable = true;
|
||||||
|
|
||||||
|
upstreams = listToAttrs (map mkNginxUpstream users);
|
||||||
|
|
||||||
|
virtualHosts."rclone-webdav" = {
|
||||||
|
listen = map (addr: {
|
||||||
|
addr = addr;
|
||||||
|
port = cfg.port;
|
||||||
|
}) cfg.listenAddresses;
|
||||||
|
|
||||||
|
locations = listToAttrs (map mkNginxLocation users) // {
|
||||||
|
"/" = {
|
||||||
|
return = "200 'rclone WebDAV Multi-user Server'";
|
||||||
|
extraConfig = ''
|
||||||
|
add_header Content-Type text/plain;
|
||||||
|
'';
|
||||||
|
};
|
||||||
|
|
||||||
|
# Catch-all location for non-existent users - return 400
|
||||||
|
"~* ^/([^/]+)/" = {
|
||||||
|
extraConfig = ''
|
||||||
|
# Check if the requested user exists
|
||||||
|
set $user_exists 0;
|
||||||
|
${concatStringsSep "\n" (
|
||||||
|
map (username: "if ($1 = \"${username}\") { set $user_exists 1; }") usernames
|
||||||
|
)}
|
||||||
|
|
||||||
|
# If user doesn't exist, return 400
|
||||||
|
if ($user_exists = 0) {
|
||||||
|
return 400 "User not found";
|
||||||
|
}
|
||||||
|
|
||||||
|
# This should not be reached for valid users
|
||||||
|
return 404;
|
||||||
|
'';
|
||||||
|
};
|
||||||
|
};
|
||||||
|
|
||||||
|
extraConfig = ''
|
||||||
|
# Enable WebDAV methods
|
||||||
|
dav_methods PUT DELETE MKCOL COPY MOVE;
|
||||||
|
dav_ext_methods PROPFIND PROPPATCH LOCK UNLOCK;
|
||||||
|
|
||||||
|
# Set default maximum file size
|
||||||
|
client_max_body_size ${cfg.maxFileSize};
|
||||||
|
'';
|
||||||
|
};
|
||||||
|
};
|
||||||
|
|
||||||
|
# Ensure directories exist
|
||||||
|
systemd.tmpfiles.rules = [
|
||||||
|
"d ${cfg.dataDirectory} 0755 ${cfg.user} ${cfg.group} -"
|
||||||
|
"d ${socketDirectory} 0755 ${cfg.user} ${cfg.group} -"
|
||||||
|
] ++ map (user: "d ${cfg.dataDirectory}/${user.username} 0755 ${cfg.user} ${cfg.group} -") users;
|
||||||
|
};
|
||||||
|
}
|
||||||
|
|
@ -25,5 +25,5 @@ let
|
||||||
in
|
in
|
||||||
{
|
{
|
||||||
"cloudflare.age".publicKeys = all-hosts;
|
"cloudflare.age".publicKeys = all-hosts;
|
||||||
"webdav.env.age".publicKeys = all-hosts;
|
"webdav.age".publicKeys = all-hosts;
|
||||||
}
|
}
|
||||||
|
|
|
||||||
15
secrets/webdav.age
Normal file
15
secrets/webdav.age
Normal file
|
|
@ -0,0 +1,15 @@
|
||||||
|
age-encryption.org/v1
|
||||||
|
-> ssh-ed25519 Kfdnog 9oKx6Oz/J/QJ0mmgoLX5AUx0sFdxnPVnjF42bElPSXA
|
||||||
|
BJ6h4lHGDsf1Npc4bwkvz5htGRT/x/b2bs9WFM2W/pc
|
||||||
|
-> ssh-ed25519 SP9f6A T5t4apynXLYN/4YEvaHRCI28rrKzet4r6LrbAye5VGk
|
||||||
|
BsXkZYBxG9zcfLYCd9H0+LW078oCDyYx9zG+DPfE7bA
|
||||||
|
-> ssh-ed25519 8YSAiw RY0YR30qyJPvhy7eTJLoj2JXpH9qHP43fJaHilJykXM
|
||||||
|
E5/P0Egz/LKwEhYLYd5Cnrat47gnYn93yDSeYgLi934
|
||||||
|
-> ssh-ed25519 7cojTQ qTCTw7CjilThFLmXYph4YhVBhnk1DpnFCGwgioo/XB0
|
||||||
|
N31nZ8nInQuddLD3b0bxI5Es/pTvTQD8nz0f/AZtNFg
|
||||||
|
-> ssh-ed25519 J6tVTA 7OawDsWwtVxu76ZgF0dFclMr19sBNdtu7H+Tr7Pd+SQ
|
||||||
|
hhVKcscIKIH1WChhRo/RYqUWy1rgs/EKnlHr9uY7QrQ
|
||||||
|
-> ssh-ed25519 Kl5yTQ +i2Q3uNHw1jAVH76NHy4QbjCc6sBBYjsbr7w4mLaHW4
|
||||||
|
JOJ02zU0+IxlbXMBsW4UrvzvLUbifdzABBNL+bc0bBs
|
||||||
|
--- W40oEFdBUKbi0teNTc6B1sX0ReHDvkIJcBm1dlROnk8
|
||||||
|
zÒ¼ÆCnçç®±àÈeÓù7{ïÛé{Nðì§ä³6ê•azÁ‹"ÒÉE¯HB/¢BYbD
|
||||||
|
|
@ -1,15 +0,0 @@
|
||||||
age-encryption.org/v1
|
|
||||||
-> ssh-ed25519 Kfdnog iYAk0YU1ekpdPEzhPKPBDeF2oM2XT6ZIqe/6xoJafSA
|
|
||||||
W0aPLLAsCUOIBqWtxzyZw5l4I72n1BFD/E9Oalz7lYg
|
|
||||||
-> ssh-ed25519 SP9f6A VzaqzMWrKJ5Iuj/A2EnBnEJNApQ0wx6ktNzhqMhxkx4
|
|
||||||
0/qTjEcQXanCLODi8pGEYWR6JX2QZU2fHy5REIw0bA8
|
|
||||||
-> ssh-ed25519 8YSAiw I+aTRniv+tTMrQQiTVONh4ziisdqGbE1Ntyy7zYFe3Y
|
|
||||||
tc4yyoNsPQum5lPc2/eKY6CXl+bYst9JqsXHJmt2RPo
|
|
||||||
-> ssh-ed25519 7cojTQ 96asBSxBQWOxMaKdvBUXCro5fqpeZnpWSXapjCmxqF8
|
|
||||||
m0MBushdOMI9zp7R7VYzPibRXRfsSX9m3HTDaiv3oYQ
|
|
||||||
-> ssh-ed25519 J6tVTA uAW/2s8wHouV06Cf8XOl1MVVniZDU0STJDMyziG1x2E
|
|
||||||
BpwvevoU5w8m32KssiBUwuQXkvxl3LRjWN8u5dpDdS0
|
|
||||||
-> ssh-ed25519 Kl5yTQ p6rLLWT7Ey5RhYl4xrFI5blBXtNPMHYj8OezuQEWPU8
|
|
||||||
Ao9FmLXhWaCirDOCHM3pVZEdKy0lQs4aNkSj0gtjRvM
|
|
||||||
--- 6EArX870mq5cAeKEJZfqwVZJ1CLMG2Od7ndZYVOrpfc
|
|
||||||
v˲1×¹s´H]–ŠCk‡+å¨)ñ×ÊØËšZ”ó°öVKnM-,Š RÐ&¾Êáúä>ÔW2<áoS€xÛºýùj¼Yáe`)¹ð¸d<C2B8>_]¼ûâ¿ßêÐî‚`XÿÇ:Õѳ‘ìaÞî
|
|
||||||
Loading…
Add table
Add a link
Reference in a new issue