1
0
Fork 0
selfhostblocks/modules/services/vaultwarden.nix

209 lines
6.5 KiB
Nix
Raw Normal View History

2023-11-07 04:47:31 +01:00
{ config, pkgs, lib, ... }:
let
cfg = config.shb.vaultwarden;
2024-01-12 08:22:46 +01:00
contracts = pkgs.callPackage ../contracts {};
2024-02-10 05:56:26 +01:00
shblib = pkgs.callPackage ../../lib {};
2024-01-12 08:22:46 +01:00
2023-11-07 04:47:31 +01:00
fqdn = "${cfg.subdomain}.${cfg.domain}";
in
{
options.shb.vaultwarden = {
enable = lib.mkEnableOption "selfhostblocks.vaultwarden";
subdomain = lib.mkOption {
type = lib.types.str;
description = "Subdomain under which Authelia will be served.";
example = "ha";
};
domain = lib.mkOption {
type = lib.types.str;
description = "domain under which Authelia will be served.";
example = "mydomain.com";
};
2024-01-12 08:22:46 +01:00
ssl = lib.mkOption {
description = "Path to SSL files";
type = lib.types.nullOr contracts.ssl.certs;
default = null;
};
2023-11-07 04:47:31 +01:00
port = lib.mkOption {
type = lib.types.port;
description = "Port on which vaultwarden service listens.";
default = 8222;
};
authEndpoint = lib.mkOption {
2024-05-25 00:02:38 +02:00
type = lib.types.nullOr lib.types.str;
2023-11-07 04:47:31 +01:00
description = "OIDC endpoint for SSO";
2024-05-25 00:02:38 +02:00
default = null;
2023-11-07 04:47:31 +01:00
example = "https://authelia.example.com";
};
databasePasswordFile = lib.mkOption {
2024-05-25 00:02:38 +02:00
type = lib.types.path;
2023-11-07 04:47:31 +01:00
description = "File containing the password to connect to the postgresql database.";
};
smtp = lib.mkOption {
description = "SMTP options.";
2024-05-25 00:02:38 +02:00
default = null;
type = lib.types.nullOr (lib.types.submodule {
2023-11-07 04:47:31 +01:00
options = {
from_address = lib.mkOption {
type = lib.types.str;
description = "SMTP address from which the emails originate.";
example = "vaultwarden@mydomain.com";
};
from_name = lib.mkOption {
type = lib.types.str;
description = "SMTP name from which the emails originate.";
default = "Vaultwarden";
};
host = lib.mkOption {
type = lib.types.str;
description = "SMTP host to send the emails to.";
};
security = lib.mkOption {
type = lib.types.enum [ "starttls" "force_tls" "off" ];
description = "Security expected by SMTP host.";
default = "starttls";
};
port = lib.mkOption {
type = lib.types.port;
description = "SMTP port to send the emails to.";
default = 25;
};
username = lib.mkOption {
type = lib.types.str;
description = "Username to connect to the SMTP host.";
};
auth_mechanism = lib.mkOption {
type = lib.types.enum [ "Login" ];
description = "Auth mechanism.";
default = "Login";
};
passwordFile = lib.mkOption {
type = lib.types.str;
description = "File containing the password to connect to the SMTP host.";
};
};
2024-05-25 00:02:38 +02:00
});
2023-11-07 04:47:31 +01:00
};
backupConfig = lib.mkOption {
type = lib.types.nullOr lib.types.anything;
description = "Backup configuration of Vaultwarden.";
2023-11-07 04:47:31 +01:00
default = null;
};
debug = lib.mkOption {
type = lib.types.bool;
description = "Set to true to enable debug logging.";
default = false;
example = true;
};
};
config = lib.mkIf cfg.enable {
services.vaultwarden = {
enable = true;
dbBackend = "postgresql";
config = {
DATA_FOLDER = "/var/lib/bitwarden_rs";
IP_HEADER = "X-Real-IP";
SIGNUPS_ALLOWED = false;
# Disabled because the /admin path is protected by SSO
DISABLE_ADMIN_TOKEN = true;
INVITATIONS_ALLOWED = true;
DOMAIN = "https://${fqdn}";
USE_SYSLOG = true;
EXTENDED_LOGGING = cfg.debug;
LOG_LEVEL = if cfg.debug then "trace" else "info";
ROCKET_LOG = if cfg.debug then "trace" else "info";
ROCKET_ADDRESS = "127.0.0.1";
ROCKET_PORT = cfg.port;
2024-05-25 00:02:38 +02:00
} // lib.optionalAttrs (cfg.smtp != null) {
2023-11-07 04:47:31 +01:00
SMTP_FROM = cfg.smtp.from_address;
SMTP_FROM_NAME = cfg.smtp.from_name;
SMTP_HOST = cfg.smtp.host;
SMTP_SECURITY = cfg.smtp.security;
SMTP_USERNAME = cfg.smtp.username;
SMTP_PORT = cfg.smtp.port;
SMTP_AUTH_MECHANISM = cfg.smtp.auth_mechanism;
};
environmentFile = "/var/lib/bitwarden_rs/vaultwarden.env";
};
# We create a blank environment file for the service to start. Then, ExecPreStart kicks in and
# fills out the environment file for ExecStart to pick it up.
systemd.tmpfiles.rules = [
"d /var/lib/bitwarden_rs 0750 vaultwarden vaultwarden"
"f /var/lib/bitwarden_rs/vaultwarden.env 0640 vaultwarden vaultwarden"
];
systemd.services.vaultwarden.preStart =
2024-03-01 00:34:53 +01:00
shblib.replaceSecrets {
userConfig = {
DATABASE_URL.source = cfg.databasePasswordFile;
DATABASE_URL.transform = v: "postgresql://vaultwarden:${v}@127.0.0.1:5432/vaultwarden";
2024-05-25 00:02:38 +02:00
} // lib.optionalAttrs (cfg.smtp != null) {
2024-03-01 00:34:53 +01:00
SMTP_PASSWORD.source = cfg.smtp.passwordFile;
2023-11-07 04:47:31 +01:00
};
2024-03-01 00:34:53 +01:00
resultPath = "/var/lib/bitwarden_rs/vaultwarden.env";
2024-05-25 00:02:38 +02:00
generator = name: v: pkgs.writeText "template" (lib.generators.toINIWithGlobalSection {} { globalSection = v; });
2024-03-01 00:34:53 +01:00
};
2023-11-07 04:47:31 +01:00
2024-05-25 00:01:45 +02:00
shb.nginx.vhosts = [
2023-11-07 04:47:31 +01:00
{
2024-01-12 08:22:46 +01:00
inherit (cfg) subdomain domain authEndpoint ssl;
2023-11-07 04:47:31 +01:00
upstream = "http://127.0.0.1:${toString config.services.vaultwarden.config.ROCKET_PORT}";
2024-05-25 00:01:45 +02:00
autheliaRules = lib.mkIf (cfg.authEndpoint != null) [
2023-11-07 04:47:31 +01:00
{
domain = "${fqdn}";
2023-11-07 04:47:31 +01:00
policy = "two_factor";
subject = ["group:vaultwarden_admin"];
resources = [
"^/admin"
];
}
# There's no way to protect the webapp using Authelia this way, see
# https://github.com/dani-garcia/vaultwarden/discussions/3188
{
domain = fqdn;
policy = "bypass";
2023-11-07 04:47:31 +01:00
}
];
}
];
shb.postgresql.enableTCPIP = true;
shb.postgresql.ensures = [
2023-11-07 04:47:31 +01:00
{
username = "vaultwarden";
database = "vaultwarden";
2024-05-25 00:02:38 +02:00
passwordFile = builtins.toString cfg.databasePasswordFile;
2023-11-07 04:47:31 +01:00
}
];
systemd.services.vaultwarden.serviceConfig.UMask = lib.mkForce "0027";
# systemd.services.vaultwarden.serviceConfig.Group = lib.mkForce "media";
2024-04-03 06:04:10 +02:00
users.users.vaultwarden = {
2023-11-07 04:47:31 +01:00
extraGroups = [ "media" ];
};
users.groups.vaultwarden = {
members = [ "backup" ];
};
shb.backup.instances.vaultwarden =
cfg.backupConfig //
{
sourceDirectories = [
2023-11-08 22:05:20 +01:00
config.services.vaultwarden.config.DATA_FOLDER
2023-11-07 04:47:31 +01:00
];
};
};
}