1
Fork 0
satellite/hosts/nixos/lapetus/services/vaultwarden.nix

46 lines
1.1 KiB
Nix
Raw Normal View History

2024-02-10 04:15:17 +01:00
{ config, ... }:
let
port = 8404;
host = "warden.moonythm.dev";
in
{
2024-02-10 04:23:53 +01:00
services.nginx.virtualHosts.${host} =
config.satellite.proxy port { proxyWebsockets = true; };
2024-02-10 04:15:17 +01:00
2024-02-10 05:11:50 +01:00
# {{{ Secrets
sops.secrets.vaultwarden_env = {
sopsFile = ../secrets.yaml;
owner = config.users.users.vaultwarden.name;
group = config.users.users.vaultwarden.group;
};
# }}}
# {{{ General config
2024-02-10 04:15:17 +01:00
services.vaultwarden = {
enable = true;
environmentFile = config.sops.secrets.vaultwarden_env.path;
config = {
DOMAIN = "https://${host}";
ROCKET_ADDRESS = "127.0.0.1";
ROCKET_PORT = port;
SIGNUPS_ALLOWED = true;
SHOW_PASSWORD_HINT = false;
SMTP_SECURITY = "force_tls";
SMTP_PORT = 465;
SMTP_HOST = "smtp.migadu.com";
SMTP_FROM = "vaultwarden@orbit.moonythm.dev";
2024-02-10 05:20:41 +01:00
SMTP_USERNAME = "vaultwarden@orbit.moonythm.dev";
2024-02-10 04:15:17 +01:00
};
};
2024-02-10 04:48:43 +01:00
# }}}
# {{{ Storage
environment.persistence."/persist/state".directories = [{
directory = "/var/lib/bitwarden_rs";
mode = "u=rwx,g=,o=";
2024-02-10 05:11:50 +01:00
user = config.users.users.vaultwarden.name;
group = config.users.users.vaultwarden.group;
2024-02-10 04:48:43 +01:00
}];
# }}}
2024-02-10 04:15:17 +01:00
}