nixfiles/hosts/koi/containers/vaultwarden.nix

45 lines
1.1 KiB
Nix
Raw Normal View History

2024-11-23 16:37:34 +03:00
{ config, ... }:
2024-06-06 13:10:13 +03:00
let
UID = 1109;
2024-06-06 13:10:13 +03:00
in {
2024-11-23 16:37:34 +03:00
desu.secrets.vaultwarden-env.owner = "vaultwarden";
2024-06-06 13:10:13 +03:00
virtualisation.oci-containers.containers.vaultwarden = {
2024-11-23 15:45:37 +03:00
image = "vaultwarden/server:1.32.5-alpine";
environment = {
SIGNUPS_ALLOWED = "false";
DOMAIN = "https://bw.tei.su";
WEBSOCKET_ENABLED = "true";
ROCKET_ADDRESS = "0.0.0.0";
ROCKET_PORT = "80";
2024-11-23 15:45:37 +03:00
EXPERIMENTAL_CLIENT_FEATURE_FLAGS = "ssh-key-vault-item,ssh-agent,extension-refresh";
};
environmentFiles = [
2024-11-23 16:37:34 +03:00
config.desu.secrets.vaultwarden-env.path
];
user = builtins.toString UID;
2024-12-11 09:11:31 +03:00
extraOptions = [
"--mount=type=bind,source=/srv/vaultwarden,target=/data"
];
};
2024-06-06 13:10:13 +03:00
users.users.vaultwarden = {
isNormalUser = true;
uid = UID;
};
2024-06-06 13:10:13 +03:00
systemd.tmpfiles.rules = [
"d /srv/vaultwarden 0700 ${builtins.toString UID} ${builtins.toString UID} -"
2024-06-06 13:10:13 +03:00
];
services.nginx.virtualHosts."bw.tei.su" = {
forceSSL = true;
useACMEHost = "tei.su";
locations."/" = {
proxyPass = "http://vaultwarden.docker$request_uri";
2024-06-06 13:10:13 +03:00
proxyWebsockets = true;
};
};
}