Compare commits

...

2 Commits

Author SHA1 Message Date
437de6be67 Minor updates / tweaks 2026-01-19 18:55:02 -06:00
bf652175f9 Fix nginx headers for vaultwarden 2026-01-19 18:54:31 -06:00
4 changed files with 27 additions and 14 deletions

1
.gitignore vendored
View File

@@ -1,4 +1,5 @@
.env .env
*.env
authelia/secrets/ authelia/secrets/
authelia/notification.txt authelia/notification.txt
authelia/db.sqlite3 authelia/db.sqlite3

View File

@@ -222,6 +222,7 @@ services:
SMTP_FROM: bitwarden@loadingm.xyz SMTP_FROM: bitwarden@loadingm.xyz
SMTP_SECURITY: off SMTP_SECURITY: off
SIGNUPS_ALLOWED: false SIGNUPS_ALLOWED: false
# ADMIN_TOKEN: "google straining barracuda prescribe augmented bucket"
networks: networks:
- bitwarden - bitwarden
- mail - mail

View File

@@ -151,8 +151,8 @@ services:
restart: unless-stopped restart: unless-stopped
group_add: group_add:
- '993' - '993'
# devices: devices:
# - /dev/dri/renderD128:/dev/dri/renderD128 - /dev/dri/renderD128:/dev/dri/renderD128
# runtime: nvidia # runtime: nvidia
# deploy: # deploy:
# resources: # resources:

View File

@@ -40,21 +40,33 @@ server {
# See: https://developer.mozilla.org/en-US/docs/Web/HTTP/CSP # See: https://developer.mozilla.org/en-US/docs/Web/HTTP/CSP
# Enforces https content and restricts JS/CSS to origin # Enforces https content and restricts JS/CSS to origin
# External Javascript (such as cast_sender.js for Chromecast) must be whitelisted. # External Javascript (such as cast_sender.js for Chromecast) must be whitelisted.
set $CSP "default-src https: data: blob:"; # set $CSP "default-src https: data: blob:";
set $CSP "$CSP; img-src 'self' https://* data:"; # set $CSP "$CSP; img-src 'self' https://* data:";
set $CSP "$CSP; style-src 'self' 'unsafe-inline' data:"; # set $CSP "$CSP; style-src 'self' 'unsafe-inline' data:";
set $CSP "$CSP; style-src-elem 'self' 'unsafe-inline' data:"; # set $CSP "$CSP; style-src-elem 'self' 'unsafe-inline' data:";
set $CSP "$CSP; script-src 'self' 'unsafe-inline' https://www.gstatic.com https://www.youtubse.com blob: data:"; # set $CSP "$CSP; script-src 'self' 'unsafe-inline' https://www.gstatic.com https://www.youtubse.com blob: data:";
set $CSP "$CSP; worker-src 'self' blob: data:"; # set $CSP "$CSP; worker-src 'self' blob: data:";
set $CSP "$CSP; connect-src 'self' data:"; # set $CSP "$CSP; connect-src 'self' data:";
set $CSP "$CSP; object-src 'none' data:"; # set $CSP "$CSP; object-src 'none' data:";
set $CSP "$CSP; frame-ancestors 'self' data:"; # set $CSP "$CSP; frame-ancestors 'self' data:";
set $CSP "$CSP; font-src 'self' data:"; # set $CSP "$CSP; font-src 'self' data:";
add_header Content-Security-Policy $CSP; # add_header Content-Security-Policy $CSP;
location /.well-known/acme-challenge/ { location /.well-known/acme-challenge/ {
root /var/www/certbot; root /var/www/certbot;
} }
location /notifications/hub {
proxy_pass http://bitwarden:80;
proxy_http_version 1.1;
proxy_set_header Upgrade $http_upgrade;
proxy_set_header Connection "upgrade";
proxy_set_header Host $host;
proxy_set_header X-Real-IP $remote_addr;
proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for;
proxy_set_header X-Forwarded-Proto $scheme;
proxy_set_header X-Forwarded-Protocol $scheme;
proxy_set_header X-Forwarded-Host $http_host;
}
location / { location / {
# Proxy main bitwarden traffic # Proxy main bitwarden traffic
@@ -65,7 +77,6 @@ server {
proxy_set_header X-Forwarded-Proto $scheme; proxy_set_header X-Forwarded-Proto $scheme;
proxy_set_header X-Forwarded-Protocol $scheme; proxy_set_header X-Forwarded-Protocol $scheme;
proxy_set_header X-Forwarded-Host $http_host; proxy_set_header X-Forwarded-Host $http_host;
proxy_hide_header Content-Security-Policy;
# Disable buffering when the nginx proxy gets very resource heavy upon streaming # Disable buffering when the nginx proxy gets very resource heavy upon streaming
proxy_buffering off; proxy_buffering off;