mirror of
https://github.com/nmasur/dotfiles
synced 2024-12-26 18:44:52 +00:00
124 lines
3.6 KiB
Nix
124 lines
3.6 KiB
Nix
{ config, pkgs, lib, ... }:
|
|
|
|
let vaultwardenPath = "/var/lib/bitwarden_rs"; # Default service directory
|
|
|
|
in {
|
|
|
|
options = {
|
|
|
|
vaultwardenServer = lib.mkOption {
|
|
description = "Hostname for Vaultwarden.";
|
|
type = lib.types.nullOr lib.types.str;
|
|
default = null;
|
|
};
|
|
|
|
};
|
|
|
|
config = lib.mkIf (config.vaultwardenServer != null) {
|
|
services.vaultwarden = {
|
|
enable = true;
|
|
config = {
|
|
DOMAIN = "https://${config.vaultwardenServer}";
|
|
SIGNUPS_ALLOWED = false;
|
|
SIGNUPS_VERIFY = true;
|
|
INVITATIONS_ALLOWED = true;
|
|
WEB_VAULT_ENABLED = true;
|
|
ROCKET_ADDRESS = "127.0.0.1";
|
|
ROCKET_PORT = 8222;
|
|
WEBSOCKET_ENABLED = true;
|
|
WEBSOCKET_ADDRESS = "0.0.0.0";
|
|
WEBSOCKET_PORT = 3012;
|
|
LOGIN_RATELIMIT_SECONDS = 60;
|
|
LOGIN_RATELIMIT_MAX_BURST = 10;
|
|
ADMIN_RATELIMIT_SECONDS = 300;
|
|
ADMIN_RATELIMIT_MAX_BURST = 3;
|
|
};
|
|
environmentFile = config.secrets.vaultwarden.dest;
|
|
dbBackend = "sqlite";
|
|
};
|
|
|
|
secrets.vaultwarden = {
|
|
source = ../../private/vaultwarden.age;
|
|
dest = "${config.secretsDirectory}/vaultwarden";
|
|
owner = "vaultwarden";
|
|
group = "vaultwarden";
|
|
};
|
|
|
|
networking.firewall.allowedTCPPorts = [ 3012 ];
|
|
|
|
caddy.routes = [{
|
|
match = [{ host = [ config.vaultwardenServer ]; }];
|
|
handle = [{
|
|
handler = "reverse_proxy";
|
|
upstreams = [{ dial = "localhost:8222"; }];
|
|
headers.request.add."X-Real-IP" = [ "{http.request.remote.host}" ];
|
|
}];
|
|
}];
|
|
|
|
## Backup config
|
|
|
|
# Open to groups, allowing for backups
|
|
systemd.services.vaultwarden.serviceConfig.StateDirectoryMode =
|
|
lib.mkForce "0770";
|
|
systemd.tmpfiles.rules = [
|
|
"f ${vaultwardenPath}/db.sqlite3 0660 vaultwarden vaultwarden"
|
|
"f ${vaultwardenPath}/db.sqlite3-shm 0660 vaultwarden vaultwarden"
|
|
"f ${vaultwardenPath}/db.sqlite3-wal 0660 vaultwarden vaultwarden"
|
|
];
|
|
|
|
# Allow litestream and vaultwarden to share a sqlite database
|
|
users.users.litestream.extraGroups = [ "vaultwarden" ];
|
|
users.users.vaultwarden.extraGroups = [ "litestream" ];
|
|
|
|
# Backup sqlite database with litestream
|
|
services.litestream = {
|
|
settings = {
|
|
dbs = [{
|
|
path = "${vaultwardenPath}/db.sqlite3";
|
|
replicas = [{
|
|
url =
|
|
"s3://${config.backup.s3.bucket}.${config.backup.s3.endpoint}/vaultwarden";
|
|
}];
|
|
}];
|
|
};
|
|
};
|
|
|
|
# Don't start litestream unless vaultwarden is up
|
|
systemd.services.litestream = {
|
|
after = [ "vaultwarden.service" ];
|
|
requires = [ "vaultwarden.service" ];
|
|
};
|
|
|
|
# Run a separate file backup on a schedule
|
|
systemd.timers.vaultwarden-backup = {
|
|
timerConfig = {
|
|
OnCalendar = "*-*-* 06:00:00"; # Once per day
|
|
Unit = "vaultwarden-backup.service";
|
|
};
|
|
wantedBy = [ "timers.target" ];
|
|
};
|
|
|
|
# Backup other Vaultwarden data to object storage
|
|
systemd.services.vaultwarden-backup = {
|
|
description = "Backup Vaultwarden files";
|
|
environment.AWS_ACCESS_KEY_ID = config.backup.s3.accessKeyId;
|
|
serviceConfig = {
|
|
Type = "oneshot";
|
|
User = "vaultwarden";
|
|
Group = "backup";
|
|
EnvironmentFile = config.secrets.backup.dest;
|
|
};
|
|
script = ''
|
|
${pkgs.awscli2}/bin/aws s3 sync \
|
|
${vaultwardenPath}/ \
|
|
s3://${config.backup.s3.bucket}/vaultwarden/ \
|
|
--endpoint-url=https://${config.backup.s3.endpoint} \
|
|
--exclude "*db.sqlite3*" \
|
|
--exclude ".db.sqlite3*"
|
|
'';
|
|
};
|
|
|
|
};
|
|
|
|
}
|