nixos-config/profiles/servers/vaultwarden.nix

47 lines
1.5 KiB
Nix
Raw Normal View History

2024-01-22 16:44:51 +03:00
{ config, lib, inputs, ... }: {
sops.secrets.vaultwarden.sopsFile = inputs.self.secretsDir + /home-hypervisor/vaultwarden.yaml;
sops.secrets.vaultwarden.owner = config.users.users.vaultwarden.name;
sops.secrets.vaultwarden.restartUnits = [ "vaultwarden.service" ];
2022-02-21 02:25:13 +03:00
services.vaultwarden = {
enable = true;
2023-01-13 04:03:15 +03:00
backupDir = "/srv/vaultwarden";
2022-02-21 02:25:13 +03:00
config = {
domain = "https://vw.ataraxiadev.com";
extendedLogging = true;
invitationsAllowed = false;
2023-04-25 17:20:58 +03:00
useSyslog = true;
2022-02-21 02:25:13 +03:00
logLevel = "warn";
2023-01-13 04:03:15 +03:00
rocketAddress = "127.0.0.1";
2022-02-21 02:25:13 +03:00
rocketPort = 8812;
showPasswordHint = false;
signupsAllowed = false;
signupsDomainsWhitelist = "ataraxiadev.com";
signupsVerify = true;
smtpAuthMechanism = "Login";
smtpFrom = "vaultwarden@ataraxiadev.com";
smtpFromName = "Vaultwarden";
smtpHost = "mail.ataraxiadev.com";
smtpPort = 587;
2023-01-13 04:03:15 +03:00
smtpSecurity = "starttls";
websocketAddress = "127.0.0.1";
2022-02-21 02:25:13 +03:00
websocketEnabled = true;
websocketPort = 3012;
webVaultEnabled = true;
2023-04-25 17:20:58 +03:00
dataDir = "/var/lib/bitwarden_rs";
2022-02-21 02:25:13 +03:00
};
2024-01-22 16:44:51 +03:00
environmentFile = config.sops.secrets.vaultwarden.path;
2022-02-21 02:25:13 +03:00
};
2022-12-14 23:46:25 +03:00
2023-01-13 04:03:15 +03:00
# We need to do this to successufully create backup folder
systemd.services.backup-vaultwarden.serviceConfig = {
User = "root";
Group = "root";
};
2023-01-26 02:11:48 +03:00
persist.state.directories = [
2023-04-25 17:20:58 +03:00
config.services.vaultwarden.dataDir
2023-01-26 02:11:48 +03:00
] ++ lib.optionals (config.deviceSpecific.devInfo.fileSystem != "zfs") [
2023-01-13 04:03:15 +03:00
config.services.vaultwarden.backupDir
2023-01-26 02:11:48 +03:00
];
2022-02-21 02:25:13 +03:00
}