services:vaultwarden
Differences
This shows you the differences between two versions of the page.
| Both sides previous revisionPrevious revision | |||
| services:vaultwarden [2026/02/07 10:40] – Consolidated into infrastructure:automation-stack admin | services:vaultwarden [2026/02/08 08:42] (current) – created - external edit 127.0.0.1 | ||
|---|---|---|---|
| Line 1: | Line 1: | ||
| + | ====== Vaultwarden ====== | ||
| + | |||
| + | Self-hosted Bitwarden-kompatibler Password Manager. | ||
| + | |||
| + | ===== Details ===== | ||
| + | |||
| + | ^ Key ^ Value ^ | ||
| + | | Container | CT 112 | | ||
| + | | IP | 10.100.161.112 | | ||
| + | | Port | 8080 | | ||
| + | | RAM | 512 MB | | ||
| + | | URL | https:// | ||
| + | |||
| + | ===== Deployment ===== | ||
| + | |||
| + | Vaultwarden Binary wird aus dem Docker-Image extrahiert (keine prebuilt Binaries verfügbar). | ||
| + | |||
| + | Tool: [[https:// | ||
| + | |||
| + | <code bash> | ||
| + | # Binary extrahieren | ||
| + | ./ | ||
| + | cp output/ | ||
| + | cp -r output/ | ||
| + | </ | ||
| + | |||
| + | ===== Features ===== | ||
| + | |||
| + | * Bitwarden-kompatible API | ||
| + | * Browser Extensions | ||
| + | * Mobile Apps | ||
| + | * Organizations & Collections | ||
| + | * Admin Panel | ||
| + | |||
| + | ===== Struktur ===== | ||
| + | |||
| + | < | ||
| + | / | ||
| + | ├── vaultwarden | ||
| + | ├── .env # Environment config | ||
| + | ├── data/ # SQLite DB + Attachments | ||
| + | └── web-vault/ | ||
| + | </ | ||
| + | |||
| + | ===== Datenbank ===== | ||
| + | |||
| + | Zwei Optionen: | ||
| + | * **SQLite** (default): / | ||
| + | * **PostgreSQL**: | ||
| + | |||
| + | ===== Service ===== | ||
| + | |||
| + | <code bash> | ||
| + | systemctl status vaultwarden | ||
| + | journalctl -u vaultwarden -f | ||
| + | </ | ||
| + | |||
| + | ===== Admin Panel ===== | ||
| + | |||
| + | * URL: https:// | ||
| + | * Token: In Vaultwarden selbst gespeichert | ||
| + | |||
| + | ===== Backup ===== | ||
| + | |||
| + | <code bash> | ||
| + | # Alles sichern | ||
| + | rsync -av / | ||
| + | </ | ||
| + | |||
| + | ===== Ansible ===== | ||
| + | |||
| + | <code bash> | ||
| + | ansible-playbook site.yml --limit vaultwarden | ||
| + | </ | ||
| + | |||
| + | ===== Secrets Management ===== | ||
| + | |||
| + | Alle Infrastruktur-Credentials sind hier gespeichert: | ||
| + | * **Organisation: | ||
| + | * **Collection: | ||
| + | |||
| + | Das Ansible Bitwarden Lookup Plugin holt Secrets zur Laufzeit. | ||
| + | |||
| + | ===== Links ===== | ||
| + | |||
| + | * [[https:// | ||
| + | * [[https:// | ||
| + | * [[https:// | ||
services/vaultwarden.1770460812.txt.gz · Last modified: by admin
