I’m running the server locally, and I have no idea how to produce a valid cert. (But that’s also why not-using TLS is a non-issue otherwise.) Self-signing is a PITA from what I understand.
And I assumed rebuilding with whatever envvar set would only take 5 min compared to the alternative.
I have multiple services on this machine. So to successfully migrate I would need to
Set up some TLS mechanism
Get that cert trusted by my system and browsers
Throw up a reverse proxy to route to the correct service accordingly
I looked into acme before and it looked rough, and some providers on there have additional restrictions that prevent using acme.
I also don’t really see a huge return on setting up TLS for a locally running server - I’m really just looking for if someone has experience with this app specifically, not to reconfigure all dozen+ services just to get this one app running.
The longterm fix looks more like below. Since I use tailscale, I had an option to enable HTTPS, which I did, then generated the cert/key pair for the machine in question below and encrypted via sops:
Obviously I had some options ports.<name>.* and tailnet.fqdn defined in advance, and I’m using sops-nix, I think those should be self-explanatory or at least explainable elsewhere.
EDIT: I removed the DOMAIN setting as I realised I had misconfigured the proxyPass setting - ensure to keep a trailing slash there so that URLs are correctly rewritten, and also enable proxyWebsockets. ref Proxy examples · dani-garcia/vaultwarden Wiki · GitHub