forking to fix insert_vaultwarden_admin_token in abra.sh
Go to file
2025-02-24 14:49:03 +01:00
release add release notes for older version with upgrade warning 2025-01-20 14:25:52 +01:00
.drone.yml Update .drone.yml 2025-01-08 10:09:13 -08:00
.env.sample add timezone env TX 2025-02-24 14:44:41 +01:00
abra.sh increase entrypoint version which was missing from last modification. (last 4 releases are not upgradeable) 2025-01-20 13:06:22 +01:00
compose.mariadb.yml patch vaultwarden backup label 2024-12-16 15:47:02 +01:00
compose.smtp.yml feat: add smtp support 2024-07-09 15:37:09 +02:00
compose.yml chore: publish 1.1.0+1.33.2 release 2025-02-24 14:49:03 +01:00
entrypoint.sh.tmpl add optional mariaDB and provide function for hashing the admin_token 2024-12-10 18:25:19 +01:00
README.md add optional mariaDB and provide function for hashing the admin_token 2024-12-10 18:25:19 +01:00

vaultwarden

Open source password manager

  • Category: Apps
  • Status: 2, beta
  • Image: vaultwarden/server, 4, upstream
  • Healthcheck: 3
  • Backups: Yes
  • Email: Yes
  • Tests: No
  • SSO: No

Quick start

  1. Set up Docker Swarm and abra
  2. Deploy coop-cloud/traefik
  3. abra app new vaultwarden
  4. abra app config YOURAPPDOMAIN
  5. abra app cmd -l YOURAPPDOMAIN insert_vaultwarden_admin_token will insert a hashed admin_token as password as recommended by vaultwarden. Will echo the admin_token to your cli.
  6. abra app secret insert YOURAPPDOMAIN smtp_password v1 "super-secret-password" SMTP config and password needed for user email invites
  7. abra app deploy YOURAPPDOMAIN

Tips & Tricks

Using MariaDB instead of SQLite

Just comment in the DB settings section in your .env

Wiring up fail2ban

You need the following logging config:

USE_SYSLOG=true
EXTENDED_LOGGING=true
LOG_FILE=/data/vaultwarden.log
LOG_LEVEL=warn

Then follow this guide.

And you must use COMPOSE_FILE="$COMPOSE_FILE:compose.host.yml" in your traefik config to get real IPs.