services:vaultwarden
Differences
This shows you the differences between two versions of the page.
| Next revision | Previous revision | ||
| services:vaultwarden [2026/02/06 20:21] – Refactor: Create vaultwarden service page admin | services:vaultwarden [2026/02/08 08:42] (current) – created - external edit 127.0.0.1 | ||
|---|---|---|---|
| Line 1: | Line 1: | ||
| ====== Vaultwarden ====== | ====== Vaultwarden ====== | ||
| - | Bitwarden-compatible password manager. | + | Self-hosted |
| - | ===== Access | + | ===== Details |
| - | ^ Item ^ Value ^ | + | ^ Key ^ Value ^ |
| - | | URL | https:// | + | |
| - | | Admin | https:// | + | |
| | Container | CT 112 | | | Container | CT 112 | | ||
| - | | IP | 10.100.161.112:8080 | | + | | IP | 10.100.161.112 |
| + | | Port | 8080 | | ||
| + | | RAM | 512 MB | | ||
| + | | URL | https:// | ||
| - | ===== Credentials | + | ===== Deployment |
| - | Admin token stored in Vaultwarden | + | Vaultwarden |
| - | ===== Organizations ===== | + | Tool: [[https:// |
| - | ^ Org ^ Purpose ^ | + | <code bash> |
| - | | mxmlabs | Shared credentials | | + | # Binary extrahieren |
| + | ./ | ||
| + | cp output/ | ||
| + | cp -r output/ | ||
| + | </ | ||
| - | Collections: | + | ===== Features ===== |
| - | ===== Service | + | * Bitwarden-kompatible API |
| + | * Browser Extensions | ||
| + | * Mobile Apps | ||
| + | * Organizations & Collections | ||
| + | * Admin Panel | ||
| + | |||
| + | ===== Struktur ===== | ||
| + | |||
| + | < | ||
| + | / | ||
| + | ├── vaultwarden | ||
| + | ├── .env # Environment config | ||
| + | ├── data/ # SQLite DB + Attachments | ||
| + | └── web-vault/ | ||
| + | </ | ||
| + | |||
| + | ===== Datenbank ===== | ||
| + | |||
| + | Zwei Optionen: | ||
| + | * **SQLite** (default): / | ||
| + | * **PostgreSQL**: | ||
| + | |||
| + | ===== Service ===== | ||
| <code bash> | <code bash> | ||
| - | pct exec 112 -- systemctl status vaultwarden | + | systemctl status vaultwarden |
| - | pct exec 112 -- journalctl -u vaultwarden -f | + | journalctl -u vaultwarden -f |
| </ | </ | ||
| - | ===== Related | + | ===== Admin Panel ===== |
| + | |||
| + | * URL: https:// | ||
| + | * Token: In Vaultwarden selbst gespeichert | ||
| + | |||
| + | ===== Backup ===== | ||
| + | |||
| + | <code bash> | ||
| + | # Alles sichern | ||
| + | rsync -av / | ||
| + | </ | ||
| + | |||
| + | ===== Ansible ===== | ||
| + | |||
| + | <code bash> | ||
| + | ansible-playbook site.yml --limit vaultwarden | ||
| + | </ | ||
| + | |||
| + | ===== Secrets Management ===== | ||
| + | |||
| + | Alle Infrastruktur-Credentials sind hier gespeichert: | ||
| + | * **Organisation: | ||
| + | * **Collection: | ||
| + | |||
| + | Das Ansible Bitwarden Lookup Plugin holt Secrets zur Laufzeit. | ||
| + | |||
| + | ===== Links ===== | ||
| + | |||
| + | * [[https:// | ||
| + | * [[https:// | ||
| + | * [[https:// | ||
| - | * [[services: | ||
| - | * [[infrastructure: | ||
services/vaultwarden.1770409303.txt.gz · Last modified: by admin
