services:vaultwarden
Differences
This shows you the differences between two versions of the page.
| Both sides previous revisionPrevious revisionNext revision | Previous revision | ||
| services:vaultwarden [2026/02/06 23:46] – external edit 127.0.0.1 | services:vaultwarden [2026/02/08 08:42] (current) – created - external edit 127.0.0.1 | ||
|---|---|---|---|
| Line 1: | Line 1: | ||
| ====== Vaultwarden ====== | ====== Vaultwarden ====== | ||
| - | Self-hosted Bitwarden-compatible password manager. | + | Self-hosted Bitwarden-kompatibler Password Manager. |
| - | ===== Access | + | ===== Details |
| - | ^ Item ^ Value ^ | + | ^ Key ^ Value ^ |
| - | | URL | [[https:// | + | |
| - | | Internal | [[https:// | + | |
| - | | Admin | [[https:// | + | |
| | Container | CT 112 | | | Container | CT 112 | | ||
| - | | IP | 10.100.161.112:8080 | | + | | IP | 10.100.161.112 |
| + | | Port | 8080 | | ||
| + | | RAM | 512 MB | | ||
| + | | URL | https:// | ||
| - | ===== Installation | + | ===== Deployment |
| - | Vaultwarden | + | Vaultwarden |
| + | |||
| + | Tool: [[https:// | ||
| <code bash> | <code bash> | ||
| - | # Container erstellen | + | # Binary extrahieren |
| - | pct create 112 local: | + | ./docker-image-extract vaultwarden/ |
| - | | + | cp output/vaultwarden |
| - | --memory 512 --swap 256 \ | + | cp -r output/web-vault/* / |
| - | | + | </code> |
| - | --net0 name=eth0, | + | |
| - | --features nesting=1 \ | + | |
| - | --unprivileged 1 \ | + | |
| - | --start 1 | + | |
| - | # Dependencies | + | ===== Features ===== |
| - | pct exec 112 -- apt update | + | |
| - | pct exec 112 -- apt install -y wget ca-certificates libpq5 | + | |
| - | # Binary aus Alpine Docker Image extrahieren (auf Host mit Docker) | + | * Bitwarden-kompatible API |
| - | docker create | + | * Browser Extensions |
| - | docker cp vw-temp:/ | + | * Mobile Apps |
| - | docker cp vw-temp:/ | + | * Organizations & Collections |
| - | docker rm vw-temp | + | * Admin Panel |
| - | # Auf Container kopieren | + | ===== Struktur ===== |
| - | pct push 112 / | + | |
| - | pct push 112 / | + | |
| - | pct exec 112 -- chmod +x / | + | |
| - | # PostgreSQL-Datenbank anlegen (auf CT 110) | + | <code> |
| - | pct exec 110 -- su - postgres -c " | + | /opt/vaultwarden/ |
| - | CREATE USER vaultwarden | + | ├── |
| - | CREATE DATABASE | + | ├── .env # Environment config |
| - | SQL | + | ├── data/ # SQLite DB + Attachments |
| + | └── web-vault/ | ||
| + | </ | ||
| - | # Systemd Service | + | ===== Datenbank ===== |
| - | pct exec 112 -- tee / | + | |
| - | [Unit] | + | |
| - | Description=Vaultwarden | + | |
| - | After=network.target | + | |
| - | [Service] | + | Zwei Optionen: |
| - | Type=simple | + | * **SQLite** (default): /opt/ |
| - | User=root | + | * **PostgreSQL**: 10.100.161.110 |
| - | Environment=ROCKET_ADDRESS=0.0.0.0 | + | |
| - | Environment=ROCKET_PORT=8080 | + | |
| - | Environment=DATABASE_URL=postgresql:// | + | |
| - | Environment=ADMIN_TOKEN=ADMIN_TOKEN_HASH | + | |
| - | Environment=DOMAIN=https:// | + | |
| - | Environment=WEB_VAULT_FOLDER=/ | + | |
| - | Environment=DATA_FOLDER=/ | + | |
| - | WorkingDirectory=/ | + | |
| - | ExecStart=/ | + | |
| - | Restart=always | + | |
| - | [Install] | + | ===== Service ===== |
| - | WantedBy=multi-user.target | + | |
| - | SERVICE | + | |
| - | + | ||
| - | pct exec 112 -- mkdir -p / | + | |
| - | pct exec 112 -- systemctl daemon-reload | + | |
| - | pct exec 112 -- systemctl enable --now vaultwarden | + | |
| - | </ | + | |
| - | + | ||
| - | ==== Admin Token generieren | + | |
| <code bash> | <code bash> | ||
| - | # Argon2 Hash für Admin Token | + | systemctl status vaultwarden |
| - | echo -n ' | + | journalctl |
| </ | </ | ||
| - | ===== Organizations | + | ===== Admin Panel ===== |
| - | ^ Org ^ Collection ^ Zweck ^ | + | * URL: https:// |
| - | | mxmlabs | Network Automation | Bot-Zugriff auf Credentials | | + | * Token: In Vaultwarden selbst gespeichert |
| - | Bot-Account: | + | ===== Backup |
| - | + | ||
| - | ===== Management | + | |
| <code bash> | <code bash> | ||
| - | # Status | + | # Alles sichern |
| - | pct exec 112 -- systemctl status | + | rsync -av /opt/vaultwarden/data/ backup/ |
| + | </ | ||
| - | # Logs | + | ===== Ansible ===== |
| - | pct exec 112 -- journalctl -u vaultwarden -f | + | |
| - | # Admin Panel öffnen | + | <code bash> |
| - | # https:// | + | ansible-playbook site.yml --limit vaultwarden |
| </ | </ | ||
| - | ===== Backup | + | ===== Secrets Management |
| + | |||
| + | Alle Infrastruktur-Credentials sind hier gespeichert: | ||
| + | * **Organisation: | ||
| + | * **Collection: | ||
| - | * **Datenbank: | + | Das Ansible Bitwarden Lookup Plugin holt Secrets zur Laufzeit. |
| - | * **Attachments: | + | |
| - | ===== Related | + | ===== Links ===== |
| - | * [[services:postgresql|PostgreSQL]] - Database | + | * [[https:// |
| - | * [[infrastructure:containers|Containers]] - CT 112 details | + | * [[https:// |
| + | * [[https:// | ||
services/vaultwarden.1770421602.txt.gz · Last modified: by 127.0.0.1
