Initial Vaultwarden configuration with Amazon SES email
- Docker Compose setup with Traefik integration - Amazon SES SMTP configuration (credentials in .env - not committed) - Email verification and testing scripts - Security: .gitignore excludes sensitive data (.env, data/, emailproxy-config/) 🤖 Generated with [Claude Code](https://claude.com/claude-code) Co-Authored-By: Claude Sonnet 4.5 <noreply@anthropic.com>
This commit is contained in:
17
.gitignore
vendored
Normal file
17
.gitignore
vendored
Normal file
@@ -0,0 +1,17 @@
|
|||||||
|
# Sensitive configuration files
|
||||||
|
.env
|
||||||
|
*.env
|
||||||
|
|
||||||
|
# Vaultwarden data directory (contains database and user data)
|
||||||
|
data/
|
||||||
|
|
||||||
|
# Email proxy configuration (contains OAuth credentials)
|
||||||
|
emailproxy-config/
|
||||||
|
|
||||||
|
# Temporary files
|
||||||
|
*.log
|
||||||
|
*.tmp
|
||||||
|
|
||||||
|
# Python cache
|
||||||
|
__pycache__/
|
||||||
|
*.pyc
|
||||||
60
docker-compose.yml
Normal file
60
docker-compose.yml
Normal file
@@ -0,0 +1,60 @@
|
|||||||
|
services:
|
||||||
|
vaultwarden:
|
||||||
|
image: vaultwarden/server:latest
|
||||||
|
container_name: vaultwarden
|
||||||
|
restart: always
|
||||||
|
networks:
|
||||||
|
- traefik
|
||||||
|
volumes:
|
||||||
|
- ./data:/data
|
||||||
|
- /etc/localtime:/etc/localtime:ro
|
||||||
|
environment:
|
||||||
|
- DATABASE_URL=${DATABASE_URL}
|
||||||
|
- ADMIN_TOKEN=${ADMIN_TOKEN}
|
||||||
|
- SIGNUPS_ALLOWED=false
|
||||||
|
- DOMAIN=https://${DOMAIN}
|
||||||
|
- SMTP_HOST=${SMTP_HOST}
|
||||||
|
- SMTP_FROM=${SMTP_FROM}
|
||||||
|
- SMTP_PORT=${SMTP_PORT}
|
||||||
|
- SMTP_SECURITY=${SMTP_SECURITY}
|
||||||
|
- SMTP_USERNAME=${SMTP_USERNAME}
|
||||||
|
- SMTP_PASSWORD=${SMTP_PASSWORD}
|
||||||
|
labels:
|
||||||
|
- "traefik.enable=true"
|
||||||
|
|
||||||
|
# HTTP to HTTPS redirect
|
||||||
|
- "traefik.http.routers.vaultwarden-http.rule=Host(`${DOMAIN}`)"
|
||||||
|
- "traefik.http.routers.vaultwarden-http.entrypoints=http"
|
||||||
|
- "traefik.http.routers.vaultwarden-http.service=vaultwarden"
|
||||||
|
- "traefik.http.routers.vaultwarden-http.priority=100"
|
||||||
|
- "traefik.http.routers.vaultwarden-http.middlewares=redirect-to-https@docker"
|
||||||
|
|
||||||
|
# Main HTTP/HTTPS router
|
||||||
|
- "traefik.http.routers.vaultwarden.rule=Host(`${DOMAIN}`)"
|
||||||
|
- "traefik.http.routers.vaultwarden.entrypoints=https"
|
||||||
|
- "traefik.http.routers.vaultwarden.tls=true"
|
||||||
|
- "traefik.http.routers.vaultwarden.tls.certresolver=letsencrypt"
|
||||||
|
- "traefik.http.routers.vaultwarden.service=vaultwarden"
|
||||||
|
- "traefik.http.services.vaultwarden.loadbalancer.server.port=80"
|
||||||
|
- "traefik.http.routers.vaultwarden.middlewares=geoblock@file,secure-headers@file,crowdsec-bouncer@file"
|
||||||
|
|
||||||
|
# WebSocket router (required for real-time sync)
|
||||||
|
- "traefik.http.routers.vaultwarden-ws.rule=Host(`${DOMAIN}`) && Path(`/notifications/hub`)"
|
||||||
|
- "traefik.http.routers.vaultwarden-ws.entrypoints=https"
|
||||||
|
- "traefik.http.routers.vaultwarden-ws.tls=true"
|
||||||
|
- "traefik.http.routers.vaultwarden-ws.tls.certresolver=letsencrypt"
|
||||||
|
- "traefik.http.routers.vaultwarden-ws.service=vaultwarden-ws"
|
||||||
|
- "traefik.http.services.vaultwarden-ws.loadbalancer.server.port=3012"
|
||||||
|
- "traefik.http.routers.vaultwarden-ws.middlewares=geoblock@file,crowdsec-bouncer@file"
|
||||||
|
|
||||||
|
# Admin panel router (restricted to internal IPs)
|
||||||
|
- "traefik.http.routers.vaultwarden-admin.rule=Host(`${DOMAIN}`) && PathPrefix(`/admin`)"
|
||||||
|
- "traefik.http.routers.vaultwarden-admin.entrypoints=https"
|
||||||
|
- "traefik.http.routers.vaultwarden-admin.tls=true"
|
||||||
|
- "traefik.http.routers.vaultwarden-admin.tls.certresolver=letsencrypt"
|
||||||
|
- "traefik.http.routers.vaultwarden-admin.service=vaultwarden"
|
||||||
|
- "traefik.http.routers.vaultwarden-admin.middlewares=internal-whitelist@file,crowdsec-bouncer@file"
|
||||||
|
|
||||||
|
networks:
|
||||||
|
traefik:
|
||||||
|
external: true
|
||||||
71
get_gmail_refresh_token.py
Executable file
71
get_gmail_refresh_token.py
Executable file
@@ -0,0 +1,71 @@
|
|||||||
|
#!/usr/bin/env python3
|
||||||
|
"""
|
||||||
|
Gmail OAuth2 Refresh Token Generator for Vaultwarden
|
||||||
|
This script helps you generate a refresh token for Gmail SMTP OAuth2 authentication.
|
||||||
|
"""
|
||||||
|
|
||||||
|
from google_auth_oauthlib.flow import InstalledAppFlow
|
||||||
|
import sys
|
||||||
|
|
||||||
|
SCOPES = ['https://www.googleapis.com/auth/gmail.send']
|
||||||
|
|
||||||
|
def get_refresh_token(client_id, client_secret):
|
||||||
|
"""Generate OAuth2 refresh token for Gmail"""
|
||||||
|
|
||||||
|
client_config = {
|
||||||
|
"installed": {
|
||||||
|
"client_id": client_id,
|
||||||
|
"client_secret": client_secret,
|
||||||
|
"auth_uri": "https://accounts.google.com/o/oauth2/auth",
|
||||||
|
"token_uri": "https://oauth2.googleapis.com/token",
|
||||||
|
"redirect_uris": ["http://localhost:8080/"]
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
print("=" * 70)
|
||||||
|
print("Gmail OAuth2 Refresh Token Generator")
|
||||||
|
print("=" * 70)
|
||||||
|
print()
|
||||||
|
print("IMPORTANT: Make sure you've added this redirect URI to your Google Cloud Console:")
|
||||||
|
print(" http://localhost:8080/")
|
||||||
|
print()
|
||||||
|
print("A browser window will open for you to authorize the application.")
|
||||||
|
print("Please sign in with your Google Workspace account and grant access.")
|
||||||
|
print()
|
||||||
|
|
||||||
|
try:
|
||||||
|
flow = InstalledAppFlow.from_client_config(client_config, SCOPES)
|
||||||
|
creds = flow.run_local_server(port=8080)
|
||||||
|
|
||||||
|
print()
|
||||||
|
print("=" * 70)
|
||||||
|
print("SUCCESS! OAuth2 credentials obtained")
|
||||||
|
print("=" * 70)
|
||||||
|
print()
|
||||||
|
print("Add these to your Vaultwarden .env file:")
|
||||||
|
print()
|
||||||
|
print(f"SMTP_AUTH_MECHANISM=Xoauth2")
|
||||||
|
print(f"SMTP_OAUTH2_CLIENT_ID={client_id}")
|
||||||
|
print(f"SMTP_OAUTH2_CLIENT_SECRET={client_secret}")
|
||||||
|
print(f"SMTP_OAUTH2_REFRESH_TOKEN={creds.refresh_token}")
|
||||||
|
print()
|
||||||
|
print("=" * 70)
|
||||||
|
|
||||||
|
except Exception as e:
|
||||||
|
print(f"Error: {e}", file=sys.stderr)
|
||||||
|
sys.exit(1)
|
||||||
|
|
||||||
|
if __name__ == "__main__":
|
||||||
|
print()
|
||||||
|
print("Please enter your Google Cloud OAuth2 credentials:")
|
||||||
|
print("(You can get these from https://console.cloud.google.com)")
|
||||||
|
print()
|
||||||
|
|
||||||
|
client_id = input("Enter your OAuth2 Client ID: ").strip()
|
||||||
|
client_secret = input("Enter your OAuth2 Client Secret: ").strip()
|
||||||
|
|
||||||
|
if not client_id or not client_secret:
|
||||||
|
print("Error: Both Client ID and Client Secret are required!", file=sys.stderr)
|
||||||
|
sys.exit(1)
|
||||||
|
|
||||||
|
get_refresh_token(client_id, client_secret)
|
||||||
35
hash_token.py
Normal file
35
hash_token.py
Normal file
@@ -0,0 +1,35 @@
|
|||||||
|
#!/usr/bin/env python3
|
||||||
|
import sys
|
||||||
|
try:
|
||||||
|
from argon2 import PasswordHasher
|
||||||
|
from argon2.low_level import Type
|
||||||
|
except ImportError:
|
||||||
|
print("Installing argon2-cffi...")
|
||||||
|
import subprocess
|
||||||
|
subprocess.check_call([sys.executable, "-m", "pip", "install", "argon2-cffi"])
|
||||||
|
from argon2 import PasswordHasher
|
||||||
|
from argon2.low_level import Type
|
||||||
|
|
||||||
|
# OWASP preset parameters
|
||||||
|
ph = PasswordHasher(
|
||||||
|
time_cost=3,
|
||||||
|
memory_cost=65536,
|
||||||
|
parallelism=4,
|
||||||
|
hash_len=32,
|
||||||
|
salt_len=16,
|
||||||
|
type=Type.ID
|
||||||
|
)
|
||||||
|
|
||||||
|
token = "gOvhQKzn47nfapPN6bDduFIM+HHYaIPu32n7/R/CjLZjfGFl1vUidpLByX1eu67s"
|
||||||
|
hash_result = ph.hash(token)
|
||||||
|
|
||||||
|
# Replace $ with $$ for .env file format
|
||||||
|
env_hash = hash_result.replace('$', '$$')
|
||||||
|
|
||||||
|
print("Argon2id hash generated successfully!")
|
||||||
|
print()
|
||||||
|
print("For .env file (with escaped $$):")
|
||||||
|
print(env_hash)
|
||||||
|
print()
|
||||||
|
print("For config.json (no escaping):")
|
||||||
|
print(hash_result)
|
||||||
Reference in New Issue
Block a user