Jack O'Sullivan
71d1c3f9c2
All checks were successful
CI / Check, build and cache Nix flake (push) Successful in 32m28s
136 lines
3.9 KiB
Nix
136 lines
3.9 KiB
Nix
{ lib, ... }:
|
|
let
|
|
inherit (lib.my) net;
|
|
inherit (lib.my.c.colony) domain prefixes;
|
|
in
|
|
{
|
|
nixos.systems.vaultwarden = { config, ... }: {
|
|
system = "x86_64-linux";
|
|
nixpkgs = "mine";
|
|
rendered = config.configuration.config.my.asContainer;
|
|
|
|
assignments = {
|
|
internal = {
|
|
name = "vaultwarden-ctr";
|
|
inherit domain;
|
|
ipv4.address = net.cidr.host 3 prefixes.ctrs.v4;
|
|
ipv6 = {
|
|
iid = "::3";
|
|
address = net.cidr.host 3 prefixes.ctrs.v6;
|
|
};
|
|
};
|
|
};
|
|
|
|
configuration = { lib, config, assignments, ... }:
|
|
let
|
|
inherit (lib) mkMerge mkIf mkForce;
|
|
inherit (lib.my) networkdAssignment;
|
|
|
|
vwData = "/var/lib/vaultwarden";
|
|
in
|
|
{
|
|
config = mkMerge [
|
|
{
|
|
my = {
|
|
deploy.enable = false;
|
|
server.enable = true;
|
|
|
|
secrets = {
|
|
key = "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIFP2mF50ENpnJnr+VTnG9P+JFPjgwvoIxCLyJPzXRpVy";
|
|
files = {
|
|
"vaultwarden/config.env" = {};
|
|
"vaultwarden/backup-pass.txt" = {};
|
|
"vaultwarden/backup-ssh.key" = {};
|
|
};
|
|
};
|
|
|
|
firewall = {
|
|
tcp.allowed = with config.services.vaultwarden.config; [ ROCKET_PORT WEBSOCKET_PORT ];
|
|
};
|
|
|
|
tmproot.persistence.config.directories = [
|
|
{
|
|
directory = vwData;
|
|
user = config.users.users.vaultwarden.name;
|
|
group = config.users.groups.vaultwarden.name;
|
|
}
|
|
];
|
|
};
|
|
|
|
systemd = {
|
|
services.vaultwarden.serviceConfig.StateDirectory = mkForce "vaultwarden";
|
|
network.networks."80-container-host0" = networkdAssignment "host0" assignments.internal;
|
|
};
|
|
|
|
programs.ssh.knownHostsFiles = [
|
|
lib.my.c.sshKeyFiles.rsyncNet
|
|
];
|
|
|
|
services = {
|
|
vaultwarden = {
|
|
enable = true;
|
|
config = {
|
|
DATA_FOLDER = vwData;
|
|
|
|
WEB_VAULT_ENABLED = true;
|
|
|
|
WEBSOCKET_ENABLED = true;
|
|
WEBSOCKET_ADDRESS = "::";
|
|
WEBSOCKET_PORT = 3012;
|
|
|
|
SIGNUPS_ALLOWED = false;
|
|
|
|
DOMAIN = "https://pass.${lib.my.c.pubDomain}";
|
|
|
|
ROCKET_ADDRESS = "::";
|
|
ROCKET_PORT = 8080;
|
|
|
|
SMTP_HOST = "mail.nul.ie";
|
|
SMTP_FROM = "pass@nul.ie";
|
|
SMTP_FROM_NAME = "Vaultwarden";
|
|
SMTP_SECURITY = "starttls";
|
|
SMTP_PORT = 587;
|
|
SMTP_USERNAME = "pass@nul.ie";
|
|
SMTP_TIMEOUT = 15;
|
|
|
|
PUSH_ENABLED = true;
|
|
};
|
|
environmentFile = config.age.secrets."vaultwarden/config.env".path;
|
|
};
|
|
|
|
borgbackup.jobs.vaultwarden = {
|
|
readWritePaths = [ "/var/lib/borgbackup" "/var/cache/borgbackup" ];
|
|
|
|
paths = [ vwData ];
|
|
repo = "zh2855@zh2855.rsync.net:borg/vaultwarden2";
|
|
doInit = true;
|
|
environment = {
|
|
BORG_REMOTE_PATH = "borg1";
|
|
BORG_RSH = ''ssh -i ${config.age.secrets."vaultwarden/backup-ssh.key".path}'';
|
|
};
|
|
compression = "zstd,10";
|
|
encryption = {
|
|
mode = "repokey";
|
|
passCommand = ''cat ${config.age.secrets."vaultwarden/backup-pass.txt".path}'';
|
|
};
|
|
prune.keep = {
|
|
within = "1d";
|
|
daily = 7;
|
|
weekly = 4;
|
|
monthly = -1;
|
|
};
|
|
};
|
|
};
|
|
}
|
|
(mkIf config.my.build.isDevVM {
|
|
virtualisation = {
|
|
forwardPorts = [
|
|
{ from = "host"; host.port = 8080; guest.port = 80; }
|
|
];
|
|
};
|
|
})
|
|
];
|
|
};
|
|
};
|
|
}
|