mynixos-config/hosts/ward/guests/radicale.nix

103 lines
2.4 KiB
Nix

{
config,
globals,
...
}:
let
radicaleDomain = "radicale.${globals.domains.personal}";
in
{
globals.wireguard.proxy-sentinel.hosts.${config.node.name}.firewallRuleForNode.sentinel.allowedTCPPorts =
[ 8000 ];
globals.services.radicale.domain = radicaleDomain;
globals.monitoring.http.radicale = {
url = "https://${radicaleDomain}";
expectedBodyRegex = "Radicale Web Interface";
network = "internet";
};
nodes.sentinel = {
services.nginx = {
upstreams.radicale = {
servers."${globals.wireguard.proxy-sentinel.hosts.${config.node.name}.ipv4}:8000" = { };
extraConfig = ''
zone radicale 64k;
keepalive 2;
'';
monitoring = {
enable = true;
expectedBodyRegex = "Radicale Web Interface";
};
};
virtualHosts.${radicaleDomain} = {
forceSSL = true;
useACMEWildcardHost = true;
extraConfig = ''
client_max_body_size 16M;
'';
locations."/".proxyPass = "http://radicale";
};
};
};
age.secrets.radicale-users = {
rekeyFile = config.node.secretsDir + "/radicale-users.age";
mode = "440";
group = "radicale";
};
environment.persistence."/persist".directories = [
{
directory = "/var/lib/radicale";
user = "radicale";
group = "radicale";
mode = "0700";
}
];
topology.self.services.radicale.info = "https://" + radicaleDomain;
services.radicale = {
enable = true;
settings = {
server = {
hosts = [
"0.0.0.0:8000"
"[::]:8000"
];
};
auth = {
type = "htpasswd";
htpasswd_filename = config.age.secrets.radicale-users.path;
htpasswd_encryption = "bcrypt";
};
storage = {
filesystem_folder = "/var/lib/radicale/collections";
};
};
rights = {
root = {
user = ".+";
collection = "";
permissions = "R";
};
principal = {
user = ".+";
collection = "{user}";
permissions = "RW";
};
calendars = {
user = ".+";
collection = "{user}/[^/]+";
permissions = "rw";
};
};
};
systemd.services.radicale.serviceConfig.RestartSec = "60"; # Retry every minute
backups.storageBoxes.dusk = {
subuser = "radicale";
paths = [ "/var/lib/radicale" ];
};
}