From 980f0c14c352d4971c89f26e490be7aa9bb8cc47 Mon Sep 17 00:00:00 2001 From: alvis Date: Sun, 8 Mar 2026 12:07:21 +0000 Subject: [PATCH] Add Vaultwarden service and update Caddyfile in Network page --- Hello.md | 1 + Network.md | 47 ++++++++++++++++++++++++++++++++++++++++++++--- Vaultwarden.md | 37 +++++++++++++++++++++++++++++++++++++ 3 files changed, 82 insertions(+), 3 deletions(-) create mode 100644 Vaultwarden.md diff --git a/Hello.md b/Hello.md index 8e57938..4330773 100644 --- a/Hello.md +++ b/Hello.md @@ -17,6 +17,7 @@ This repository contains Docker Compose files, configuration templates, and depl | Home Assistant | Home automation | | 3X-UI | VPN / proxy | | Adolf | Persistent AI assistant via Telegram (GPU inference, long-term memory) | +| Vaultwarden | Self-hosted password manager (Bitwarden-compatible) | | Copyparty | File sharing on Juris remote server (`share.alogins.net:3999`) | ## Stack diff --git a/Network.md b/Network.md index 955c402..cc90f33 100644 --- a/Network.md +++ b/Network.md @@ -27,15 +27,56 @@ sudo netplan apply Config: `/etc/caddy/Caddyfile` ``` -haos.alogins.net { reverse_proxy http://192.168.1.141:8123 } +haos.alogins.net { + reverse_proxy http://192.168.1.141:8123 { + header_up X-Forwarded-For {remote_host} + header_up X-Forwarded-Proto {scheme} + } +} + vi.alogins.net { reverse_proxy localhost:2283 } +doc.alogins.net { reverse_proxy localhost:11001 } zb.alogins.net { reverse_proxy localhost:81 } git.alogins.net { reverse_proxy localhost:3000 } ai.alogins.net { reverse_proxy localhost:3125 } ntfy.alogins.net { reverse_proxy localhost:8840 } -``` +vw.alogins.net { reverse_proxy localhost:8041 } -(See `/etc/caddy/Caddyfile` for full config including VPN and other services.) +wiki.alogins.net { + reverse_proxy localhost:8083 { + header_up Host {http.request.host} + header_up X-Forwarded-Proto {scheme} + header_up X-Real-IP {remote_host} + } +} + +nn.alogins.net { reverse_proxy localhost:5678 } +ds.alogins.net { reverse_proxy localhost:3974 } + +openpi.alogins.net { + root * /home/alvis/tmp/files/pi05_droid + file_server browse +} + +# VPN proxy (3X-UI) +vui3.alogins.net { + @xhttp { path /VLSpdG9k/xht* } + handle @xhttp { + reverse_proxy http://localhost:8445 { + flush_interval -1 + header_up X-Real-IP {remote_host} + transport http { + read_timeout 0 + write_timeout 0 + dial_timeout 10s + } + } + } + reverse_proxy /gnYCNq4EbYukS5qtOe/* localhost:58959 + respond 401 +} +vui4.alogins.net { reverse_proxy localhost:58959 } +``` ```bash sudo systemctl enable --now caddy diff --git a/Vaultwarden.md b/Vaultwarden.md new file mode 100644 index 0000000..da2e12c --- /dev/null +++ b/Vaultwarden.md @@ -0,0 +1,37 @@ +# Vaultwarden + +Self-hosted Bitwarden-compatible password manager. + +- **URL**: `https://vw.alogins.net` +- **Admin panel**: `https://vw.alogins.net/admin` +- **Data**: `/mnt/ssd/dbs/vw-data/` +- **Port**: `127.0.0.1:8041` (loopback only, proxied via Caddy) + +## Setup + +```bash +cd ~/agap_git/vaultwarden +docker compose up -d +``` + +## docker-compose.yml + +```yaml +services: + vaultwarden: + image: vaultwarden/server:latest + container_name: vaultwarden + restart: unless-stopped + environment: + DOMAIN: "https://vw.alogins.net" + ADMIN_TOKEN: "" + volumes: + - /mnt/ssd/dbs/vw-data/:/data/ + ports: + - 127.0.0.1:8041:80 +``` + +## Notes + +- `ADMIN_TOKEN` is an argon2id hash — generate with `vaultwarden hash` or use the web tool +- Caddy handles TLS: `vw.alogins.net { reverse_proxy localhost:8041 }`