dots/modules/services/caddy.nix
Nico 7537a1e5b6
caddy: add block_non_private_ips snippet
blocks ips not in tailnet or in local network from accessing services
using `important block_non_private_ips` in their caddy config
2025-08-04 22:15:05 +10:00

49 lines
1.2 KiB
Nix

{ pkgs, config, lib, ... }:
{
options = {
homelab.publicDomain= lib.mkOption {
type = lib.types.str;
};
homelab.authDomain = lib.mkOption {
type = lib.types.str;
};
homelab.domain = lib.mkOption {
type = lib.types.str;
};
};
config = {
homelab.domain = "${config.networking.hostName}.astolfo.org";
homelab.publicDomain = "astolfo.org";
homelab.authDomain = lib.mkDefault "sso.${config.homelab.publicDomain}";
networking.firewall.allowedTCPPorts = [ 80 443 ];
services.caddy = {
enable = true;
extraConfig = ''
(block_non_private_ips) {
@non_private_ips not remote_ip 100.64.0.0/10 fd7a:115c:a1e0::/48 private_ranges
abort @non_private_ips
}
'';
};
security.acme = {
acceptTerms = true;
defaults.email = "hello@astolfo.org";
certs."${config.homelab.domain}" = {
group = config.services.caddy.group;
domain = "${config.homelab.domain}";
extraDomainNames = [ "*.${config.homelab.domain}" ];
dnsProvider = "cloudflare";
dnsResolver = "1.1.1.1:53";
dnsPropagationCheck = true;
environmentFile = /var/lib/caddy/secret;
};
};
};
}