nixfiles/hosts/koi/containers/vaultwarden.nix

51 lines
1.1 KiB
Nix
Raw Normal View History

{ abs, pkgs, config, ... }@inputs:
2024-06-06 13:10:13 +03:00
let
secrets = import (abs "lib/secrets.nix");
UID = 1109;
2024-06-06 13:10:13 +03:00
in {
imports = [
(secrets.declare [{
name = "vaultwarden-env";
owner = "vaultwarden";
}])
];
2024-06-06 13:10:13 +03:00
virtualisation.oci-containers.containers.vaultwarden = {
image = "vaultwarden/server:1.32.0";
volumes = [
"/srv/vaultwarden:/data"
];
environment = {
SIGNUPS_ALLOWED = "false";
DOMAIN = "https://bw.tei.su";
WEBSOCKET_ENABLED = "true";
ROCKET_ADDRESS = "0.0.0.0";
ROCKET_PORT = "80";
};
environmentFiles = [
(secrets.file config "vaultwarden-env")
];
user = builtins.toString UID;
};
2024-06-06 13:10:13 +03:00
users.users.vaultwarden = {
isNormalUser = true;
uid = UID;
};
2024-06-06 13:10:13 +03:00
systemd.tmpfiles.rules = [
"d /srv/vaultwarden 0700 ${builtins.toString UID} ${builtins.toString UID} -"
2024-06-06 13:10:13 +03:00
];
services.nginx.virtualHosts."bw.tei.su" = {
forceSSL = true;
useACMEHost = "tei.su";
locations."/" = {
proxyPass = "http://vaultwarden.docker$request_uri";
2024-06-06 13:10:13 +03:00
proxyWebsockets = true;
};
};
}