85 lines
2 KiB
Nix
85 lines
2 KiB
Nix
{
|
|
lib,
|
|
config,
|
|
pkgs,
|
|
...
|
|
}:
|
|
let
|
|
cfg = config.my.services.vaultwarden;
|
|
rocketPort = 8222;
|
|
in
|
|
{
|
|
|
|
options.my.services.vaultwarden = {
|
|
enable = lib.mkEnableOption "Enable Vaultwarden module";
|
|
|
|
proxy = {
|
|
enable = lib.mkEnableOption "Set the proxy entry for this service";
|
|
|
|
domain = lib.mkOption {
|
|
default = "example.com";
|
|
type = lib.types.str;
|
|
description = ''
|
|
The domain where Caddy is reachable
|
|
'';
|
|
};
|
|
|
|
host = lib.mkOption {
|
|
default = "localhost";
|
|
type = lib.types.str;
|
|
description = ''
|
|
host name where the service is running
|
|
'';
|
|
};
|
|
|
|
};
|
|
};
|
|
|
|
config = lib.mkMerge [
|
|
(lib.mkIf cfg.enable {
|
|
|
|
age.secrets.vaultwarden-admin-pwd.file = ../../secrets/vaultwarden-admin-pwd.age;
|
|
|
|
my.services.postgresql = {
|
|
enable = true;
|
|
ensures = [
|
|
{
|
|
username = "vaultwarden";
|
|
database = "vaultwarden";
|
|
}
|
|
];
|
|
};
|
|
|
|
services.vaultwarden = {
|
|
enable = true;
|
|
dbBackend = "postgresql";
|
|
environmentFile = config.age.secrets.vaultwarden-admin-pwd.path;
|
|
config = {
|
|
DOMAIN = "https://vault.${cfg.proxy.domain}";
|
|
SENDS_ALLOWED = true;
|
|
SIGNUPS_ALLOWED = false;
|
|
WEBSOCKET_ENABLED = true;
|
|
ROCKET_ADDRESS = "0.0.0.0";
|
|
ROCKET_PORT = rocketPort;
|
|
DATABASE_URL = "postgresql:///vaultwarden?host=/run/postgresql";
|
|
SMTP_HOST = "smtp.eu.mailgun.org";
|
|
SMTP_FROM = "vault@pazpi.top";
|
|
SMTP_SECURITY = "starttls";
|
|
SMTP_USERNAME = "vault@pazpi.top";
|
|
};
|
|
};
|
|
|
|
networking.firewall.allowedTCPPorts = [ rocketPort ];
|
|
|
|
})
|
|
|
|
(lib.mkIf cfg.proxy.enable {
|
|
services.caddy = with cfg.proxy; {
|
|
virtualHosts."vault.${domain}".extraConfig = ''
|
|
reverse_proxy http://${host}:${toString rocketPort}
|
|
import cloudflare
|
|
'';
|
|
};
|
|
})
|
|
];
|
|
}
|