Skip to content

Instantly share code, notes, and snippets.

@LizenzFass78851
Last active December 19, 2024 13:44
Show Gist options
  • Save LizenzFass78851/c15c6f8d6fb8232fefb6c1a44b607eaf to your computer and use it in GitHub Desktop.
Save LizenzFass78851/c15c6f8d6fb8232fefb6c1a44b607eaf to your computer and use it in GitHub Desktop.
vaultwarden docker compose file with matching https to http forwarder for use in the internet network without https port forwarding to the outside.
version: "3.2"
services:
bitwarden:
image: vaultwarden/server:latest
restart: always
ports:
- "80:80"
environment:
- ADMIN_TOKEN=YOURPASSWORD
- WEBSOCKET_ENABLED=true
- SIGNUPS_ALLOWED=false
- INVITATIONS_ALLOWED=false
- LOG_FILE=/data/vaultwarden.log
- LOG_LEVEL=warn
- EXTENDED_LOGGING=true
# - SMTP_HOST="<smtp.domain.tld>"
# - SMTP_FROM="<[email protected]>"
# - SMTP_PORT="587"
# - SMTP_SECURITY="starttls"
# - SMTP_USERNAME="<username>"
# - SMTP_PASSWORD="<password>"
- /etc/localtime:/etc/localtime:ro
- /etc/timezone:/etc/timezone:ro
volumes:
- ./data:/data
networks:
- proxy_net
- backend
nginx:
image: nginx:latest
restart: always
ports:
- "443:443"
volumes:
# nginx conf
- ./nginx.conf:/etc/nginx/nginx.conf:ro
# nginx certs: key = "nginx.key"; cert = "nginx.crt"
- ./certs:/etc/nginx/ssl:ro
networks:
- proxy_net
depends_on:
- bitwarden
networks:
proxy_net:
backend:
events { }
http {
server {
listen 443 ssl;
server_name vaultwarden.test.com;
ssl_certificate /etc/nginx/ssl/nginx.crt;
ssl_certificate_key /etc/nginx/ssl/nginx.key;
location / {
proxy_pass http://bitwarden:80;
proxy_set_header Host $host;
proxy_set_header X-Real-IP $remote_addr;
proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for;
proxy_set_header X-Forwarded-Proto $scheme;
}
}
}

Vaultwarden Docker Compose

instructions for creating and renewing self-created certificates

  • create
mkdir certs && cd certs && \ 
  openssl req -x509 -newkey rsa:4096 -keyout nginx.key -out nginx.crt -days 365 -nodes -subj "/CN=vaultwarden.test.com"
  • nenew
cd certs && \ 
  openssl req -new -key nginx.key -out nginx.csr -subj "/CN=vaultwarden.test.com" && \ 
  openssl x509 -req -in nginx.csr -signkey nginx.key -out nginx.crt -days 365
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment