make vaultwarden a module and enable ssh-agent feature
This commit is contained in:
parent
a6db9e3b8a
commit
b5e3bf8e54
5 changed files with 37 additions and 22 deletions
|
@ -1,15 +1,6 @@
|
||||||
{ config, ... }:
|
{ ... }:
|
||||||
{
|
{
|
||||||
services.vaultwarden = {
|
my.vaultwarden.enable = true;
|
||||||
enable = true;
|
|
||||||
dbBackend = "postgresql";
|
|
||||||
environmentFile = config.sops.secrets."vaultwarden/env".path;
|
|
||||||
config = {
|
|
||||||
ROCKET_ADDRESS = "127.0.0.1";
|
|
||||||
ROCKET_PORT = "8081";
|
|
||||||
DATABASE_URL = "postgresql://vaultwarden:vaultwarden@127.0.0.1:5432/vaultwarden";
|
|
||||||
};
|
|
||||||
};
|
|
||||||
|
|
||||||
services.caddy.virtualHosts."pass.cy7.sh".extraConfig = ''
|
services.caddy.virtualHosts."pass.cy7.sh".extraConfig = ''
|
||||||
import common
|
import common
|
||||||
|
|
|
@ -54,7 +54,7 @@
|
||||||
# https://github.com/jauderho/nts-servers
|
# https://github.com/jauderho/nts-servers
|
||||||
"ntp3.fau.de"
|
"ntp3.fau.de"
|
||||||
"ntppool1.time.nl"
|
"ntppool1.time.nl"
|
||||||
"time.signorini.ch"
|
"ntpmon.dcs1.biz"
|
||||||
"stratum1.time.cifelli.xyz"
|
"stratum1.time.cifelli.xyz"
|
||||||
"nts.teambelgium.net"
|
"nts.teambelgium.net"
|
||||||
"c.st1.ntp.br"
|
"c.st1.ntp.br"
|
||||||
|
|
|
@ -406,14 +406,5 @@
|
||||||
enableTCPIP = true;
|
enableTCPIP = true;
|
||||||
};
|
};
|
||||||
|
|
||||||
services.vaultwarden = {
|
my.vaultwarden.enable = true;
|
||||||
enable = true;
|
|
||||||
dbBackend = "postgresql";
|
|
||||||
environmentFile = config.sops.secrets."vaultwarden/env".path;
|
|
||||||
config = {
|
|
||||||
ROCKET_ADDRESS = "0.0.0.0";
|
|
||||||
ROCKET_PORT = "8081";
|
|
||||||
DATABASE_URL = "postgresql://vaultwarden:vaultwarden@127.0.0.1:5432/vaultwarden";
|
|
||||||
};
|
|
||||||
};
|
|
||||||
}
|
}
|
||||||
|
|
|
@ -6,5 +6,6 @@
|
||||||
./roundcube.nix
|
./roundcube.nix
|
||||||
./zipline.nix
|
./zipline.nix
|
||||||
./containerization.nix
|
./containerization.nix
|
||||||
|
./vaultwarden.nix
|
||||||
];
|
];
|
||||||
}
|
}
|
||||||
|
|
32
modules/vaultwarden.nix
Normal file
32
modules/vaultwarden.nix
Normal file
|
@ -0,0 +1,32 @@
|
||||||
|
{
|
||||||
|
config,
|
||||||
|
lib,
|
||||||
|
...
|
||||||
|
}:
|
||||||
|
let
|
||||||
|
cfg = config.my.vaultwarden;
|
||||||
|
in
|
||||||
|
{
|
||||||
|
options.my.vaultwarden = {
|
||||||
|
enable = lib.mkEnableOption "vaultwarden";
|
||||||
|
domain = lib.mkOption {
|
||||||
|
type = lib.types.str;
|
||||||
|
default = "https://pass.cy7.sh";
|
||||||
|
};
|
||||||
|
};
|
||||||
|
|
||||||
|
config = lib.mkIf cfg.enable {
|
||||||
|
services.vaultwarden = {
|
||||||
|
enable = true;
|
||||||
|
dbBackend = "postgresql";
|
||||||
|
environmentFile = config.sops.secrets."vaultwarden/env".path;
|
||||||
|
config = {
|
||||||
|
ROCKET_ADDRESS = "0.0.0.0";
|
||||||
|
ROCKET_PORT = "8081";
|
||||||
|
DATABASE_URL = "postgresql://vaultwarden:vaultwarden@127.0.0.1:5432/vaultwarden";
|
||||||
|
EXPERIMENTAL_CLIENT_FEATURE_FLAGS = "fido2-vault-credentials,ssh-agent,ssh-key-vault-item,autofill-v2";
|
||||||
|
DOMAIN = cfg.domain;
|
||||||
|
};
|
||||||
|
};
|
||||||
|
};
|
||||||
|
}
|
Loading…
Add table
Reference in a new issue