Files
docker-compose/restic/compose.yaml
Sebastian Krüger 9b433e66ad feat: add Vaultwarden password manager stack
Added self-hosted password manager to The Falcon infrastructure:

**Vault Stack** (vault.pivoine.art):
- Vaultwarden (Bitwarden-compatible server)
- SQLite database for password storage
- WebSocket support for real-time sync
- TOTP and WebAuthn/U2F 2FA support
- Browser extensions and mobile apps compatible

**Configuration:**
- Domain: https://vault.pivoine.art
- Signups: Disabled (invite-only for security)
- Invitations: Enabled
- Password hints: Disabled (security best practice)
- First user becomes admin

**Backup Integration:**
- Added vaultwarden-backup plan to Restic
- Schedule: 8 AM daily (same as letsencrypt)
- Retention: 7 daily, 4 weekly, 12 monthly, 3 yearly
- Backup volume: vault_data mounted read-only

**Infrastructure Updates:**
- Created vault/compose.yaml following stack pattern
- Added VAULT_* environment variables to arty.yml
- Updated compose.yaml to include vault stack
- Added backup_vaultwarden_data volume to restic
- Updated restic/config.json with 12th backup plan

**Documentation:**
- Added Vault to CORE SYSTEMS in README
- Added to ship architecture diagram
- Documented in CLAUDE.md with configuration details
- Updated volume management sections
- Backup count increased from 11 to 12 plans

Critical data backed up with long retention (3 years yearly).
Compatible with official Bitwarden clients on all platforms.

🤖 Generated with [Claude Code](https://claude.com/claude-code)

Co-Authored-By: Claude <noreply@anthropic.com>
2025-11-06 11:15:12 +01:00

116 lines
4.1 KiB
YAML

services:
backrest:
image: ${RESTIC_IMAGE:-garethgeorge/backrest:latest}
container_name: ${RESTIC_COMPOSE_PROJECT_NAME}_app
restart: unless-stopped
hostname: ${RESTIC_HOSTNAME:-falcon}
volumes:
# Backrest application data
- backrest_data:/data
- backrest_config:/config
- backrest_cache:/cache
- backrest_tmp:/tmp
# Backup destination
- ${RESTIC_BACKUP_PATH:-/mnt/hidrive/users/valknar/Backup}:/repos
# Docker volumes to backup (read-only)
- backup_core_postgres_data:/volumes/core_postgres_data:ro
- backup_core_redis_data:/volumes/core_redis_data:ro
- backup_directus_uploads:/volumes/directus_uploads:ro
- backup_directus_bundle:/volumes/directus_bundle:ro
- backup_awesome_data:/volumes/awesome_data:ro
- backup_gotify_data:/volumes/gotify_data:ro
- backup_scrapyd_data:/volumes/scrapyd_data:ro
- backup_scrapy_code:/volumes/scrapy_code:ro
- backup_n8n_data:/volumes/n8n_data:ro
- backup_filestash_data:/volumes/filestash_data:ro
- backup_linkwarden_data:/volumes/linkwarden_data:ro
- backup_linkwarden_meili_data:/volumes/linkwarden_meili_data:ro
- backup_letsencrypt_data:/volumes/letsencrypt_data:ro
- backup_vaultwarden_data:/volumes/vaultwarden_data:ro
environment:
TZ: ${TIMEZONE:-Europe/Berlin}
BACKREST_DATA: /data
BACKREST_CONFIG: /config/config.json
XDG_CACHE_HOME: /cache
TMPDIR: /tmp
networks:
- compose_network
labels:
- 'traefik.enable=${RESTIC_TRAEFIK_ENABLED}'
- 'traefik.http.middlewares.${RESTIC_COMPOSE_PROJECT_NAME}-redirect-web-secure.redirectscheme.scheme=https'
- 'traefik.http.routers.${RESTIC_COMPOSE_PROJECT_NAME}-web.middlewares=${RESTIC_COMPOSE_PROJECT_NAME}-redirect-web-secure'
- 'traefik.http.routers.${RESTIC_COMPOSE_PROJECT_NAME}-web.rule=Host(`${RESTIC_TRAEFIK_HOST}`)'
- 'traefik.http.routers.${RESTIC_COMPOSE_PROJECT_NAME}-web.entrypoints=web'
- 'traefik.http.routers.${RESTIC_COMPOSE_PROJECT_NAME}-web-secure.rule=Host(`${RESTIC_TRAEFIK_HOST}`)'
- 'traefik.http.routers.${RESTIC_COMPOSE_PROJECT_NAME}-web-secure.tls.certresolver=resolver'
- 'traefik.http.routers.${RESTIC_COMPOSE_PROJECT_NAME}-web-secure.entrypoints=web-secure'
- 'traefik.http.middlewares.${RESTIC_COMPOSE_PROJECT_NAME}-web-secure-compress.compress=true'
- 'traefik.http.routers.${RESTIC_COMPOSE_PROJECT_NAME}-web-secure.middlewares=${RESTIC_COMPOSE_PROJECT_NAME}-web-secure-compress'
- 'traefik.http.services.${RESTIC_COMPOSE_PROJECT_NAME}-web-secure.loadbalancer.server.port=9898'
- 'traefik.docker.network=${NETWORK_NAME}'
- 'com.centurylinklabs.watchtower.enable=${WATCHTOWER_LABEL_ENABLE}'
volumes:
backrest_data:
name: ${RESTIC_COMPOSE_PROJECT_NAME}_data
backrest_config:
name: ${RESTIC_COMPOSE_PROJECT_NAME}_config
backrest_cache:
name: ${RESTIC_COMPOSE_PROJECT_NAME}_cache
backrest_tmp:
name: ${RESTIC_COMPOSE_PROJECT_NAME}_tmp
# External volumes from other stacks (read-only mounts)
backup_core_postgres_data:
name: core_postgres_data
external: true
backup_core_redis_data:
name: core_redis_data
external: true
backup_directus_uploads:
name: core_directus_uploads
external: true
backup_directus_bundle:
name: core_directus_bundle
external: true
backup_awesome_data:
name: awesome_data
external: true
backup_gotify_data:
name: messaging_gotify_data
external: true
backup_scrapyd_data:
name: scrapy_scrapyd_data
external: true
backup_scrapy_code:
name: scrapy_scrapy_code
external: true
backup_n8n_data:
name: n8n_n8n_data
external: true
backup_filestash_data:
name: stash_filestash_data
external: true
backup_linkwarden_data:
name: links_data
external: true
backup_linkwarden_meili_data:
name: links_meili_data
external: true
backup_letsencrypt_data:
name: proxy_letsencrypt_data
external: true
backup_vaultwarden_data:
name: vault_data
external: true
networks:
compose_network:
name: ${NETWORK_NAME}
external: true