39 lines
1.4 KiB
Nix
39 lines
1.4 KiB
Nix
{ lib, config, pkgs, proxyReverse, ... }: {
|
|
options.my.servers.vaultwarden.enable = lib.mkEnableOption "enable";
|
|
config = lib.mkIf (config.my.servers.vaultwarden.enable
|
|
&& config.my.servers.postgres.enable) {
|
|
sops.secrets.vaultwarden.sopsFile = ../../secrets/env.yaml;
|
|
services = {
|
|
vaultwarden = {
|
|
enable = true;
|
|
dbBackend = "postgresql";
|
|
package = pkgs.vaultwarden;
|
|
environmentFile = config.sops.secrets.vaultwarden.path;
|
|
config = {
|
|
ROCKET_ADDRESS = "${config.my.localhost}";
|
|
ROCKET_PORT = 8222;
|
|
WEBSOCKET_PORT = 8333;
|
|
DATABASE_URL =
|
|
"postgresql:///vaultwarden?host=${config.my.postgresSocket}";
|
|
ENABLE_DB_WAL = false;
|
|
WEBSOCKET_ENABLED = true;
|
|
SHOW_PASSWORD_HINT = false;
|
|
SIGNUPS_ALLOWED = false;
|
|
EXTENDED_LOGGING = true;
|
|
LOG_LEVEL = "warn";
|
|
SMTP_HOST = config.my.localhost;
|
|
SMTP_PORT = 25;
|
|
SMTP_FROM = config.my.smtpemail;
|
|
SMTP_FROM_NAME = "Danilo Reyes";
|
|
SMTP_USERNAME = config.my.smtpemail;
|
|
};
|
|
};
|
|
nginx = {
|
|
enable = true;
|
|
virtualHosts."vault.${config.my.domain}" =
|
|
proxyReverse config.services.vaultwarden.config.ROCKET_PORT // { };
|
|
};
|
|
};
|
|
};
|
|
}
|