puter/hosts/abacus/vaultwarden.nix

41 lines
978 B
Nix
Raw Normal View History

2024-02-04 20:51:11 +00:00
{config, ...}: let
inherit (config.networking) domain;
2024-02-14 22:06:49 +00:00
virtualHostName = "vault.${domain}";
2024-08-18 12:54:44 +00:00
backupDir = "/srv/backup/vaultwarden";
2024-02-04 20:51:11 +00:00
in {
2024-08-18 18:11:43 +00:00
age.secrets.vaultwarden.file = ../../secrets/vaultwarden.age;
2024-02-14 22:14:00 +00:00
2024-02-04 20:51:11 +00:00
services.vaultwarden = {
enable = true;
2024-08-18 12:54:44 +00:00
dbBackend = "sqlite";
inherit backupDir;
2024-02-04 20:51:11 +00:00
config = {
2024-02-14 22:06:49 +00:00
DOMAIN = "https://${virtualHostName}";
2024-02-04 20:51:11 +00:00
SIGNUPS_ALLOWED = false;
2024-04-21 16:06:31 +00:00
INVITATIONS_ALLOWED = false;
2024-02-14 22:06:49 +00:00
2024-02-04 20:51:11 +00:00
ROCKET_ADDRESS = "127.0.0.1";
ROCKET_PORT = 8000;
};
2024-02-14 22:14:00 +00:00
environmentFile = config.age.secrets.vaultwarden.path;
2024-02-04 20:51:11 +00:00
};
2024-08-18 12:54:44 +00:00
systemd.timers.backup-vaultwarden.timerConfig.OnCalendar = "*-*-* 02:00:00";
2024-02-14 22:06:49 +00:00
services.nginx.virtualHosts.${virtualHostName} = {
2024-02-04 20:51:11 +00:00
enableACME = true;
forceSSL = true;
quic = true;
2024-02-14 22:06:49 +00:00
locations."/" = {
proxyPass = "http://${config.services.vaultwarden.config.ROCKET_ADDRESS}:${builtins.toString config.services.vaultwarden.config.ROCKET_PORT}";
proxyWebsockets = true;
};
2024-02-04 20:51:11 +00:00
};
}