9 Commits

Author SHA1 Message Date
10af40a73d fix: release notes 2026-01-24 19:18:50 +00:00
2410d778e3 fix: remove SSO reference while WIP 2026-01-24 17:03:15 +00:00
ecd51386e8 chore: publish 3.0.0+1.35.2 release 2026-01-20 18:02:18 +00:00
4bb0a87b33 increase healthcheck retries
Some checks failed
continuous-integration/drone/push Build is failing
2025-12-23 14:48:53 +01:00
22c3dbb9b8 chore: publish 2.1.1+1.34.3 release
Some checks reported errors
continuous-integration/drone/tag Build is passing
continuous-integration/drone/push Build was killed
2025-11-27 10:39:49 +01:00
3wc
74861fd9de chore: publish 2.1.0+1.34.1 release
All checks were successful
continuous-integration/drone/tag Build is passing
continuous-integration/drone/push Build is passing
2025-06-18 18:15:58 +01:00
6b47b3d040 Merge pull request 'add solution to missing argon2 error message' (#11) from argon2-doc into main
All checks were successful
continuous-integration/drone/push Build is passing
Reviewed-on: #11
2025-05-05 22:24:06 +00:00
3b2f17908f add solution to missing argon2 error message 2025-05-03 21:19:36 +00:00
681d84009e Merge pull request 'fix: don't enable SMTP by default' (#9) from smtp-not-enabled-by-default into main
All checks were successful
continuous-integration/drone/tag Build is passing
continuous-integration/drone/push Build is passing
Reviewed-on: #9
2025-04-24 08:11:44 +00:00
5 changed files with 14 additions and 10 deletions

View File

@ -30,4 +30,4 @@ TX="Europe/Berlin"
#SMTP_USERNAME=noreply@example.com
#SMTP_HOST=mail.example.com
#SMTP_PORT=587
#SMTP_SECURITY=starttls
#SMTP_SECURITY=starttls

View File

@ -3,7 +3,9 @@ APP_DIR="app:/data"
insert_vaultwarden_admin_token() {
if ! command -v argon2 &> /dev/null; then
echo "argon2 could not be found, please install it to proceed."
echo "argon2 is required on your local machine to hash the admin token."
echo "It could not be found in your PATH, please install argon2 to proceed."
echo "For example: On a debian/ubuntu system, run `apt install argon2`"
exit 1
fi
PASS=$(openssl rand 64 | openssl enc -A -base64)

View File

@ -13,7 +13,7 @@ services:
- db_password
db:
image: "mariadb:10.6" # or "mysql"
image: "mariadb:10.11" # or "mysql"
environment:
- MYSQL_DATABASE=vaultwarden
- MYSQL_USER=vaultwarden
@ -34,9 +34,9 @@ services:
backupbot.restore.post-hook: 'mysql -u root -p"$$(cat /run/secrets/db_root_password)" $${MYSQL_DATABASE} < /var/lib/mysql/backup.sql'
healthcheck:
test: ["CMD-SHELL", 'mysqladmin -p"$$(cat /run/secrets/db_root_password)" ping']
interval: 5s
interval: 30s
timeout: 10s
retries: 0
retries: 30
start_period: 1m
secrets:

View File

@ -3,7 +3,7 @@ version: "3.8"
services:
app:
image: vaultwarden/server:1.33.2
image: vaultwarden/server:1.35.2
networks:
- proxy
- internal
@ -30,9 +30,10 @@ services:
- vaultwarden_data:/data
healthcheck:
test: curl -f http://localhost/alive || exit 1
interval: 5s
timeout: 3s
retries: 10
interval: 30s
timeout: 10s
retries: 30
start_period: 1m
deploy:
restart_policy:
condition: on-failure
@ -42,7 +43,7 @@ services:
- "traefik.http.routers.${STACK_NAME}.rule=Host(`${DOMAIN}`)"
- "traefik.http.routers.${STACK_NAME}.entrypoints=web-secure"
- "traefik.http.routers.${STACK_NAME}.tls.certresolver=${LETS_ENCRYPT_ENV}"
- "coop-cloud.${STACK_NAME}.version=2.0.0+1.33.2"
- "coop-cloud.${STACK_NAME}.version=3.0.0+1.35.2"
- "backupbot.backup=true"
- "backupbot.backup.path=/data"

1
release/2.0.1+1.35.2 Normal file
View File

@ -0,0 +1 @@
Allows support for 2026.1+ clients.