Add Vaultwarden service and update Caddyfile in Network page

2026-03-08 12:07:21 +00:00
parent 5da2cd1200
commit 980f0c14c3
3 changed files with 82 additions and 3 deletions

@@ -17,6 +17,7 @@ This repository contains Docker Compose files, configuration templates, and depl
| Home Assistant | Home automation |
| 3X-UI | VPN / proxy |
| Adolf | Persistent AI assistant via Telegram (GPU inference, long-term memory) |
| Vaultwarden | Self-hosted password manager (Bitwarden-compatible) |
| Copyparty | File sharing on Juris remote server (`share.alogins.net:3999`) |
## Stack

@@ -27,15 +27,56 @@ sudo netplan apply
Config: `/etc/caddy/Caddyfile`
```
haos.alogins.net { reverse_proxy http://192.168.1.141:8123 }
haos.alogins.net {
reverse_proxy http://192.168.1.141:8123 {
header_up X-Forwarded-For {remote_host}
header_up X-Forwarded-Proto {scheme}
}
}
vi.alogins.net { reverse_proxy localhost:2283 }
doc.alogins.net { reverse_proxy localhost:11001 }
zb.alogins.net { reverse_proxy localhost:81 }
git.alogins.net { reverse_proxy localhost:3000 }
ai.alogins.net { reverse_proxy localhost:3125 }
ntfy.alogins.net { reverse_proxy localhost:8840 }
```
vw.alogins.net { reverse_proxy localhost:8041 }
(See `/etc/caddy/Caddyfile` for full config including VPN and other services.)
wiki.alogins.net {
reverse_proxy localhost:8083 {
header_up Host {http.request.host}
header_up X-Forwarded-Proto {scheme}
header_up X-Real-IP {remote_host}
}
}
nn.alogins.net { reverse_proxy localhost:5678 }
ds.alogins.net { reverse_proxy localhost:3974 }
openpi.alogins.net {
root * /home/alvis/tmp/files/pi05_droid
file_server browse
}
# VPN proxy (3X-UI)
vui3.alogins.net {
@xhttp { path /VLSpdG9k/xht* }
handle @xhttp {
reverse_proxy http://localhost:8445 {
flush_interval -1
header_up X-Real-IP {remote_host}
transport http {
read_timeout 0
write_timeout 0
dial_timeout 10s
}
}
}
reverse_proxy /gnYCNq4EbYukS5qtOe/* localhost:58959
respond 401
}
vui4.alogins.net { reverse_proxy localhost:58959 }
```
```bash
sudo systemctl enable --now caddy

37
Vaultwarden.md Normal file

@@ -0,0 +1,37 @@
# Vaultwarden
Self-hosted Bitwarden-compatible password manager.
- **URL**: `https://vw.alogins.net`
- **Admin panel**: `https://vw.alogins.net/admin`
- **Data**: `/mnt/ssd/dbs/vw-data/`
- **Port**: `127.0.0.1:8041` (loopback only, proxied via Caddy)
## Setup
```bash
cd ~/agap_git/vaultwarden
docker compose up -d
```
## docker-compose.yml
```yaml
services:
vaultwarden:
image: vaultwarden/server:latest
container_name: vaultwarden
restart: unless-stopped
environment:
DOMAIN: "https://vw.alogins.net"
ADMIN_TOKEN: "<argon2id hash>"
volumes:
- /mnt/ssd/dbs/vw-data/:/data/
ports:
- 127.0.0.1:8041:80
```
## Notes
- `ADMIN_TOKEN` is an argon2id hash — generate with `vaultwarden hash` or use the web tool
- Caddy handles TLS: `vw.alogins.net { reverse_proxy localhost:8041 }`