forked from coop-cloud/vaultwarden
45 lines
992 B
Markdown
45 lines
992 B
Markdown
# vaultwarden
|
|
|
|
> Open source password manager
|
|
|
|
<!-- metadata -->
|
|
|
|
* **Category**: Apps
|
|
* **Status**: 2, beta
|
|
* **Image**: [`vaultwarden/server`](https://hub.docker.com/vaultwarden/server), 4, upstream
|
|
* **Healthcheck**: 3
|
|
* **Backups**: No
|
|
* **Email**: No
|
|
* **Tests**: No
|
|
* **SSO**: No
|
|
|
|
<!-- endmetadata -->
|
|
|
|
## Quick start
|
|
|
|
1. Set up Docker Swarm and [`abra`]
|
|
2. Deploy [`coop-cloud/traefik`]
|
|
3. `abra app new vaultwarden`
|
|
4. `abra app config YOURAPPDOMAIN`
|
|
5. `abra app deploy YOURAPPDOMAIN`
|
|
|
|
[`abra`]: https://git.coopcloud.tech/coop-cloud/abra
|
|
[`coop-cloud/traefik`]: https://git.coopcloud.tech/coop-cloud/traefik
|
|
|
|
## Tips & Tricks
|
|
|
|
### Wiring up `fail2ban`
|
|
|
|
You need the following logging config:
|
|
|
|
```
|
|
USE_SYSLOG=true
|
|
EXTENDED_LOGGING=true
|
|
LOG_FILE=/data/vaultwarden.log
|
|
LOG_LEVEL=warn
|
|
```
|
|
|
|
Then follow [this guide](https://github.com/dani-garcia/vaultwarden/wiki/Fail2Ban-Setup).
|
|
|
|
And you must use `COMPOSE_FILE="$COMPOSE_FILE:compose.host.yml"` in your traefik config to get real IPs.
|