X-Git-Url: https://git.immae.eu/?p=perso%2FImmae%2FConfig%2FNix.git;a=blobdiff_plain;f=modules%2Fprivate%2Fftp.nix;h=8ae4e650bb41facba3047842f05c8a68382ffc32;hp=842d2d6540bbe65d0347c3989d0f243a24884b9f;hb=3c50eea8d946bf8417f49fa8a4a6e109e0439c7b;hpb=8d213e2b1c934f6861f76aad5eb7c11097fa97de diff --git a/modules/private/ftp.nix b/modules/private/ftp.nix index 842d2d6..8ae4e65 100644 --- a/modules/private/ftp.nix +++ b/modules/private/ftp.nix @@ -1,4 +1,7 @@ -{ lib, pkgs, config, myconfig, ... }: +{ lib, pkgs, config, ... }: +let + package = pkgs.pure-ftpd.override { ldapFtpId = "immaeFtp"; }; +in { options = { services.pure-ftpd.enable = lib.mkOption { @@ -11,7 +14,10 @@ }; config = lib.mkIf config.services.pure-ftpd.enable { - security.acme.certs."ftp" = config.services.myCertificates.certConfig // { + services.duplyBackup.profiles.ftp = { + rootDir = "/var/lib/ftp"; + }; + security.acme.certs."ftp" = config.myServices.certificates.certConfig // { domain = "eldiron.immae.eu"; postRun = '' systemctl restart pure-ftpd.service @@ -26,16 +32,13 @@ }; }; - users.users = [ - { - name = "ftp"; - uid = config.ids.uids.ftp; # 8 - group = "ftp"; - description = "Anonymous FTP user"; - home = "/homeless-shelter"; - extraGroups = [ "keys" ]; - } - ]; + users.users.ftp = { + uid = config.ids.uids.ftp; # 8 + group = "ftp"; + description = "Anonymous FTP user"; + home = "/homeless-shelter"; + extraGroups = [ "keys" ]; + }; users.groups.ftp.gid = config.ids.gids.ftp; @@ -49,17 +52,17 @@ user = "ftp"; group = "ftp"; text = '' - LDAPServer ${myconfig.env.ftp.ldap.host} + LDAPServer ${config.myEnv.ftp.ldap.host} LDAPPort 389 LDAPUseTLS True - LDAPBaseDN ${myconfig.env.ftp.ldap.base} - LDAPBindDN ${myconfig.env.ftp.ldap.dn} - LDAPBindPW ${myconfig.env.ftp.ldap.password} + LDAPBaseDN ${config.myEnv.ftp.ldap.base} + LDAPBindDN ${config.myEnv.ftp.ldap.dn} + LDAPBindPW ${config.myEnv.ftp.ldap.password} LDAPDefaultUID 500 LDAPForceDefaultUID False LDAPDefaultGID 100 LDAPForceDefaultGID False - LDAPFilter ${myconfig.env.ftp.ldap.filter} + LDAPFilter ${config.myEnv.ftp.ldap.filter} LDAPAuthMethod BIND @@ -69,6 +72,11 @@ ''; }]; + services.filesWatcher.pure-ftpd = { + restart = true; + paths = [ "/var/secrets/pure-ftpd-ldap" ]; + }; + systemd.services.pure-ftpd = let configFile = pkgs.writeText "pure-ftpd.conf" '' PassivePortRange 40000 50000 @@ -102,14 +110,14 @@ MaxDiskUsage 99 CustomerProof yes TLS 1 - CertFile ${config.security.acme.directory}/ftp/full.pem + CertFile ${config.security.acme.certs.ftp.directory}/full.pem ''; in { description = "Pure-FTPd server"; wantedBy = [ "multi-user.target" ]; after = [ "network.target" ]; - serviceConfig.ExecStart = "${pkgs.pure-ftpd}/bin/pure-ftpd ${configFile}"; + serviceConfig.ExecStart = "${package}/bin/pure-ftpd ${configFile}"; serviceConfig.Type = "forking"; serviceConfig.PIDFile = "/run/pure-ftpd.pid"; };