Re-configure vaultwarden
This commit is contained in:
parent
c9b82b99fe
commit
be77d86fa2
3 changed files with 32 additions and 25 deletions
|
@ -1,7 +1,7 @@
|
||||||
{
|
{
|
||||||
config,
|
config,
|
||||||
|
inputs,
|
||||||
lib,
|
lib,
|
||||||
options,
|
|
||||||
...
|
...
|
||||||
}:
|
}:
|
||||||
|
|
||||||
|
@ -20,26 +20,6 @@ in
|
||||||
default = "${service}.${homelab.domain}";
|
default = "${service}.${homelab.domain}";
|
||||||
type = types.str;
|
type = types.str;
|
||||||
};
|
};
|
||||||
|
|
||||||
homepage.name = mkOption {
|
|
||||||
default = "Vaultwarden";
|
|
||||||
type = types.str;
|
|
||||||
};
|
|
||||||
|
|
||||||
homepage.description = mkOption {
|
|
||||||
default = "Unofficial Bitwarden compatible server written in Rust";
|
|
||||||
type = types.str;
|
|
||||||
};
|
|
||||||
|
|
||||||
homepage.icon = mkOption {
|
|
||||||
default = "bitwarden";
|
|
||||||
type = types.str;
|
|
||||||
};
|
|
||||||
|
|
||||||
homepage.category = mkOption {
|
|
||||||
default = "Services";
|
|
||||||
type = types.str;
|
|
||||||
};
|
|
||||||
};
|
};
|
||||||
|
|
||||||
config = mkIf cfg.enable {
|
config = mkIf cfg.enable {
|
||||||
|
@ -47,6 +27,8 @@ in
|
||||||
${service} = {
|
${service} = {
|
||||||
enable = true;
|
enable = true;
|
||||||
|
|
||||||
|
environmentFile = config.age.secrets.vaultwarden-env.path;
|
||||||
|
|
||||||
config = {
|
config = {
|
||||||
DOMAIN = "https://${cfg.url}";
|
DOMAIN = "https://${cfg.url}";
|
||||||
ROCKET_ADDRESS = "127.0.0.1";
|
ROCKET_ADDRESS = "127.0.0.1";
|
||||||
|
@ -55,11 +37,17 @@ in
|
||||||
};
|
};
|
||||||
};
|
};
|
||||||
|
|
||||||
cloudflared.tunnels.${homelab.cloudflared.tunnelId}.ingress = {
|
nginx.virtualHosts.${cfg.url} = {
|
||||||
"${cfg.url}" = "http://${config.services.${service}.config.ROCKET_ADDRESS}:${
|
forceSSL = true;
|
||||||
toString config.services.${service}.config.ROCKET_PORT
|
useACMEHost = homelab.domain;
|
||||||
}";
|
|
||||||
|
locations."/" = {
|
||||||
|
proxyPass = "http://localhost:${toString config.services.${service}.config.ROCKET_PORT}";
|
||||||
|
recommendedProxySettings = true;
|
||||||
|
};
|
||||||
};
|
};
|
||||||
};
|
};
|
||||||
|
|
||||||
|
age.secrets.vaultwarden-env.file = "${inputs.self}/secrets/vaultwarden-env.age";
|
||||||
};
|
};
|
||||||
}
|
}
|
||||||
|
|
|
@ -35,4 +35,6 @@ in
|
||||||
hosts.t480
|
hosts.t480
|
||||||
]
|
]
|
||||||
++ [ users.opdavies ];
|
++ [ users.opdavies ];
|
||||||
|
|
||||||
|
"secrets/vaultwarden-env.age".publicKeys = [ hosts.nixedo ] ++ [ users.opdavies ];
|
||||||
}
|
}
|
||||||
|
|
17
secrets/vaultwarden-env.age
Normal file
17
secrets/vaultwarden-env.age
Normal file
|
@ -0,0 +1,17 @@
|
||||||
|
age-encryption.org/v1
|
||||||
|
-> ssh-ed25519 IsVD3g MXyxq6twZvHuGa34cyTGrKJ/2PlQVHwdRvtS/biAAwc
|
||||||
|
ds/yAQTJmZ+XUwWWKE6Zpjocp+wOlTUo8ZJEchnyeyA
|
||||||
|
-> ssh-rsa +vTWQw
|
||||||
|
wr4+JL6SYefXpOjRpWVNeCtwW43P5t1ICTIc2ZeANZoUKZQ+gjJqOnaTIf6O/NCf
|
||||||
|
7hLAqGiuqBEiGbo+4VxACVs9y4vwB2JQxklmlGfWxmTN8YFLmg9OBwwb5sPPlpWY
|
||||||
|
bC2x1+V2KO0h8z0vrkFjRJcq0a+N6L8G5iM2+KPSia2yFELCTcl6DUTRY3EufsKH
|
||||||
|
c7X7KZhyslFjLV9CHOgaHjtrMNxyHnYkxT0cwezRsTb7UFScuU33ox84yZwn5Ebg
|
||||||
|
r4Ll9v9M2jw43PI+L6o703yCRNHV+7O2ms6Q4eyZ+LcK0GhBfVGgNlPeRjLCXUcL
|
||||||
|
kbKziay/D9k5l9EaLB1vNOyouNLaJVxjDiBo7DUT9O5/1Lo+RiWDMyzaXP3094CR
|
||||||
|
/XEjCn+DuWurf0QiZuhtD9zjXrp9pqqa63A6R3oVHTa/EoD6gf+M4aT+RL0P0Sfv
|
||||||
|
d2VGSOaUn3H/tInd4psLQRbRr+fiajOgleqo+XhYJd69P5onkBKYfloOOGMtumn2
|
||||||
|
quLohQrkmwiNfPYn6WAdzehhgqqLp49nmIaBmBxs2mJ1e78zHPM+Qea3E1dv1eo0
|
||||||
|
p4n8niu7rhz+OXWTGz7/QKIw/Fd7cvjTjReu7Zynyb2L32BcxP3xxZuSd+C1a4YH
|
||||||
|
JSWEtnOP3dmP483jQI8zh2RWoTZ2ViQ282jG/1whMB8
|
||||||
|
--- ZKapT60ToUfDvnxOo1NnGawLAthNptfdDbRt3TgdZDw
|
||||||
|
¹×°Õ6eÆ”ßãuAE)êùÞa«[ý“¨à¼‹¯Jü0[ê&½1½%…<>Î<EFBFBD>-¨v²<76>Î03S¶d•ÖÙãØ¬^Ÿe¾†f]ngµKý‚/<2F>xèg–®c!j?+~„ì÷Íb^'Å@Xc¿™¸
|
Loading…
Add table
Add a link
Reference in a new issue