forked from coop-cloud/vaultwarden
forking to fix insert_vaultwarden_admin_token in abra.sh
release | ||
.drone.yml | ||
.env.sample | ||
abra.sh | ||
compose.mariadb.yml | ||
compose.smtp.yml | ||
compose.yml | ||
entrypoint.sh.tmpl | ||
README.md |
vaultwarden
Open source password manager
- Category: Apps
- Status: 2, beta
- Image:
vaultwarden/server
, 4, upstream - Healthcheck: 3
- Backups: Yes
- Email: Yes
- Tests: No
- SSO: No
Quick start
- Set up Docker Swarm and
abra
- Deploy
coop-cloud/traefik
abra app new vaultwarden
abra app config YOURAPPDOMAIN
abra app cmd -l YOURAPPDOMAIN insert_vaultwarden_admin_token
will insert a hashedadmin_token
as password as recommended by vaultwarden. Will echo the admin_token to your cli.abra app secret insert YOURAPPDOMAIN smtp_password v1 "super-secret-password"
SMTP config and password needed for user email invitesabra app deploy YOURAPPDOMAIN
Tips & Tricks
Using MariaDB instead of SQLite
Just comment in the DB settings
section in your .env
Wiring up fail2ban
You need the following logging config:
USE_SYSLOG=true
EXTENDED_LOGGING=true
LOG_FILE=/data/vaultwarden.log
LOG_LEVEL=warn
Then follow this guide.
And you must use COMPOSE_FILE="$COMPOSE_FILE:compose.host.yml"
in your traefik config to get real IPs.