• 8 Posts
  • 178 Comments
Joined 1 year ago
cake
Cake day: June 9th, 2023

help-circle



  • Lem453@lemmy.catoSelfhosted@lemmy.worldVaultwarden has such a steep learning curve
    link
    fedilink
    English
    arrow-up
    23
    arrow-down
    1
    ·
    edit-2
    8 days ago

    Vaultwarden itself is actually one of the easiest docker apps to deploy…if you already have the foundation of your home lab setup correctly.

    The foundation has a steep learning curve.

    Domain name, dynamic DNS update, port forwarding, reverse proxy. Not easy to get all this working perfectly but once it does you can use the same foundation to install any app. If you already had the foundation working, additional apps take only a few minutes.

    Want ebooks? Calibre takes 10 mins. Want link archiving? Linkwarden takes 10 mins

    And on and on

    The foundation of your server makes a huge difference. Well worth getting it right at the start and then building on it.

    I use this setup: https://youtu.be/liV3c9m_OX8

    Local only websites that use https (Vaultwarden) and then external websites that also use https (jellyfin).







  • Sleep mode seems to be working well for me on fedora atomic with kde (aurora).

    Deep sleep works well and can stay sleeping for days.

    Normally sleep rules are working well. The do not sleep toggle in the power menu also works to prevent it from sleeping.

    Only thing that doesn’t work is flatpak apps can’t prevent the system from sleeping, so watching a video, using Handbrake to encode etc will all just allow it to sleep if there is no physical input.

    I have a 2018 dell xps









  • When I was starting out I almost went down the same pathway. In the end, docker secrets are mainly useful when the same key needs to be distributed around multiple nodes.

    Storing the keys locally in an env file that is only accessible to the docker user is close enough to the same thing for home use and greatly simplifies your setup.

    I would suggest using a folder for each stack that contains 1 docker compose file and one env file. The env file contains passwords, the rest of the env variables are defined in the docker compose itself. Exclude the env files from your git repo (if you use this for version control) so you never check in a secret to your git repo (in practice I have one folder for compose files that is on git and my env files are stored in a different folder not in git).

    I do this all via portainer, it will setup the above folder structure for you. Each stack is a compose file that portainer pulls from my self hosted gitea (on another machine). Portainer creates an env file itself when you add the env variables from the gui.

    If someone gets access to your system and is able to access the env file, they already have high level access and your system is compromised regardless of if you have the secrets encrypted via swarm or not.