Add Vaultwarden service and update Caddyfile in Network page
1
Hello.md
1
Hello.md
@@ -17,6 +17,7 @@ This repository contains Docker Compose files, configuration templates, and depl
|
||||
| Home Assistant | Home automation |
|
||||
| 3X-UI | VPN / proxy |
|
||||
| Adolf | Persistent AI assistant via Telegram (GPU inference, long-term memory) |
|
||||
| Vaultwarden | Self-hosted password manager (Bitwarden-compatible) |
|
||||
| Copyparty | File sharing on Juris remote server (`share.alogins.net:3999`) |
|
||||
|
||||
## Stack
|
||||
|
||||
47
Network.md
47
Network.md
@@ -27,15 +27,56 @@ sudo netplan apply
|
||||
Config: `/etc/caddy/Caddyfile`
|
||||
|
||||
```
|
||||
haos.alogins.net { reverse_proxy http://192.168.1.141:8123 }
|
||||
haos.alogins.net {
|
||||
reverse_proxy http://192.168.1.141:8123 {
|
||||
header_up X-Forwarded-For {remote_host}
|
||||
header_up X-Forwarded-Proto {scheme}
|
||||
}
|
||||
}
|
||||
|
||||
vi.alogins.net { reverse_proxy localhost:2283 }
|
||||
doc.alogins.net { reverse_proxy localhost:11001 }
|
||||
zb.alogins.net { reverse_proxy localhost:81 }
|
||||
git.alogins.net { reverse_proxy localhost:3000 }
|
||||
ai.alogins.net { reverse_proxy localhost:3125 }
|
||||
ntfy.alogins.net { reverse_proxy localhost:8840 }
|
||||
```
|
||||
vw.alogins.net { reverse_proxy localhost:8041 }
|
||||
|
||||
(See `/etc/caddy/Caddyfile` for full config including VPN and other services.)
|
||||
wiki.alogins.net {
|
||||
reverse_proxy localhost:8083 {
|
||||
header_up Host {http.request.host}
|
||||
header_up X-Forwarded-Proto {scheme}
|
||||
header_up X-Real-IP {remote_host}
|
||||
}
|
||||
}
|
||||
|
||||
nn.alogins.net { reverse_proxy localhost:5678 }
|
||||
ds.alogins.net { reverse_proxy localhost:3974 }
|
||||
|
||||
openpi.alogins.net {
|
||||
root * /home/alvis/tmp/files/pi05_droid
|
||||
file_server browse
|
||||
}
|
||||
|
||||
# VPN proxy (3X-UI)
|
||||
vui3.alogins.net {
|
||||
@xhttp { path /VLSpdG9k/xht* }
|
||||
handle @xhttp {
|
||||
reverse_proxy http://localhost:8445 {
|
||||
flush_interval -1
|
||||
header_up X-Real-IP {remote_host}
|
||||
transport http {
|
||||
read_timeout 0
|
||||
write_timeout 0
|
||||
dial_timeout 10s
|
||||
}
|
||||
}
|
||||
}
|
||||
reverse_proxy /gnYCNq4EbYukS5qtOe/* localhost:58959
|
||||
respond 401
|
||||
}
|
||||
vui4.alogins.net { reverse_proxy localhost:58959 }
|
||||
```
|
||||
|
||||
```bash
|
||||
sudo systemctl enable --now caddy
|
||||
|
||||
37
Vaultwarden.md
Normal file
37
Vaultwarden.md
Normal file
@@ -0,0 +1,37 @@
|
||||
# Vaultwarden
|
||||
|
||||
Self-hosted Bitwarden-compatible password manager.
|
||||
|
||||
- **URL**: `https://vw.alogins.net`
|
||||
- **Admin panel**: `https://vw.alogins.net/admin`
|
||||
- **Data**: `/mnt/ssd/dbs/vw-data/`
|
||||
- **Port**: `127.0.0.1:8041` (loopback only, proxied via Caddy)
|
||||
|
||||
## Setup
|
||||
|
||||
```bash
|
||||
cd ~/agap_git/vaultwarden
|
||||
docker compose up -d
|
||||
```
|
||||
|
||||
## docker-compose.yml
|
||||
|
||||
```yaml
|
||||
services:
|
||||
vaultwarden:
|
||||
image: vaultwarden/server:latest
|
||||
container_name: vaultwarden
|
||||
restart: unless-stopped
|
||||
environment:
|
||||
DOMAIN: "https://vw.alogins.net"
|
||||
ADMIN_TOKEN: "<argon2id hash>"
|
||||
volumes:
|
||||
- /mnt/ssd/dbs/vw-data/:/data/
|
||||
ports:
|
||||
- 127.0.0.1:8041:80
|
||||
```
|
||||
|
||||
## Notes
|
||||
|
||||
- `ADMIN_TOKEN` is an argon2id hash — generate with `vaultwarden hash` or use the web tool
|
||||
- Caddy handles TLS: `vw.alogins.net { reverse_proxy localhost:8041 }`
|
||||
Reference in New Issue
Block a user