2024-09-15 14:16:32 +02:00
|
|
|
{
|
|
|
|
config,
|
|
|
|
lib,
|
|
|
|
...
|
2025-05-11 22:49:04 +02:00
|
|
|
}:
|
|
|
|
let
|
2025-03-23 22:48:46 +01:00
|
|
|
virtualHostName = "vault.wrz.one";
|
2025-05-11 22:49:04 +02:00
|
|
|
in
|
|
|
|
{
|
|
|
|
age.secrets = lib.mkSecrets { vaultwarden = { }; };
|
2024-02-14 23:14:00 +01:00
|
|
|
|
2024-02-04 21:51:11 +01:00
|
|
|
services.vaultwarden = {
|
|
|
|
enable = true;
|
2024-08-18 14:54:44 +02:00
|
|
|
dbBackend = "sqlite";
|
2025-05-18 01:08:10 +02:00
|
|
|
backupDir = "/srv/backup/vaultwarden";
|
2024-08-18 14:54:44 +02:00
|
|
|
|
2024-02-04 21:51:11 +01:00
|
|
|
config = {
|
2024-02-14 23:06:49 +01:00
|
|
|
DOMAIN = "https://${virtualHostName}";
|
2024-02-04 21:51:11 +01:00
|
|
|
SIGNUPS_ALLOWED = false;
|
2024-04-21 18:06:31 +02:00
|
|
|
INVITATIONS_ALLOWED = false;
|
2024-08-20 21:46:27 +02:00
|
|
|
ENABLE_WEBSOCKET = true;
|
2024-09-15 14:25:28 +02:00
|
|
|
ROCKET_ADDRESS = "127.0.0.1";
|
2024-02-04 21:51:11 +01:00
|
|
|
ROCKET_PORT = 8000;
|
|
|
|
};
|
2024-02-14 23:14:00 +01:00
|
|
|
|
|
|
|
environmentFile = config.age.secrets.vaultwarden.path;
|
2024-02-04 21:51:11 +01:00
|
|
|
};
|
|
|
|
|
2024-08-18 14:54:44 +02:00
|
|
|
systemd.timers.backup-vaultwarden.timerConfig.OnCalendar = "*-*-* 02:00:00";
|
|
|
|
|
2024-02-14 23:06:49 +01:00
|
|
|
services.nginx.virtualHosts.${virtualHostName} = {
|
2024-02-04 21:51:11 +01:00
|
|
|
enableACME = true;
|
|
|
|
forceSSL = true;
|
2024-02-14 23:06:49 +01:00
|
|
|
|
|
|
|
locations."/" = {
|
2025-05-11 22:49:04 +02:00
|
|
|
proxyPass =
|
|
|
|
let
|
|
|
|
host = config.services.vaultwarden.config.ROCKET_ADDRESS;
|
|
|
|
port = builtins.toString config.services.vaultwarden.config.ROCKET_PORT;
|
|
|
|
in
|
|
|
|
"http://${host}:${port}";
|
2024-02-14 23:06:49 +01:00
|
|
|
proxyWebsockets = true;
|
|
|
|
};
|
2024-02-04 21:51:11 +01:00
|
|
|
};
|
|
|
|
}
|