app_versions.json 32 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583
  1. {
  2. "1.0.29": {
  3. "healthy": true,
  4. "supported": true,
  5. "healthy_error": null,
  6. "location": "/__w/charts/charts/community/vaultwarden/1.0.29",
  7. "last_update": "2023-11-14 10:11:57",
  8. "required_features": [
  9. "definitions/certificate",
  10. "definitions/timezone",
  11. "normalize/ixVolume"
  12. ],
  13. "human_version": "1.30.0_1.0.29",
  14. "version": "1.0.29",
  15. "chart_metadata": {
  16. "name": "vaultwarden",
  17. "description": "Alternative implementation of the Bitwarden server API written in Rust and compatible with upstream Bitwarden clients.",
  18. "annotations": {
  19. "title": "Vaultwarden"
  20. },
  21. "type": "application",
  22. "version": "1.0.29",
  23. "apiVersion": "v2",
  24. "appVersion": "1.30.0",
  25. "kubeVersion": ">=1.16.0-0",
  26. "maintainers": [
  27. {
  28. "name": "truenas",
  29. "url": "https://www.truenas.com/",
  30. "email": "dev@ixsystems.com"
  31. }
  32. ],
  33. "dependencies": [
  34. {
  35. "name": "common",
  36. "repository": "file://../../../common",
  37. "version": "1.2.2"
  38. }
  39. ],
  40. "home": "https://github.com/dani-garcia/vaultwarden",
  41. "icon": "https://media.sys.truenas.net/apps/vaultwarden/icons/icon.png",
  42. "sources": [
  43. "https://github.com/dani-garcia/vaultwarden",
  44. "https://github.com/truenas/charts/tree/master/community/vaultwarden"
  45. ],
  46. "keywords": [
  47. "password",
  48. "manager"
  49. ]
  50. },
  51. "app_metadata": {
  52. "runAsContext": [
  53. {
  54. "userName": "vaultwarden",
  55. "groupName": "vaultwarden",
  56. "gid": 568,
  57. "uid": 568,
  58. "description": "Vaultwarden can run as any non-root user."
  59. },
  60. {
  61. "userName": "postgres",
  62. "groupName": "postgres",
  63. "gid": 999,
  64. "uid": 999,
  65. "description": "Postgres runs as a non-root user."
  66. }
  67. ],
  68. "capabilities": [],
  69. "hostMounts": []
  70. },
  71. "schema": {
  72. "groups": [
  73. {
  74. "name": "Vaultwarden Configuration",
  75. "description": "Configure Vaultwarden"
  76. },
  77. {
  78. "name": "User and Group Configuration",
  79. "description": "Configure User and Group for Vaultwarden"
  80. },
  81. {
  82. "name": "Network Configuration",
  83. "description": "Configure Network for Vaultwarden"
  84. },
  85. {
  86. "name": "Storage Configuration",
  87. "description": "Configure Storage for Vaultwarden"
  88. },
  89. {
  90. "name": "Resources Configuration",
  91. "description": "Configure Resources for Vaultwarden"
  92. }
  93. ],
  94. "portals": {
  95. "web_portal": {
  96. "protocols": [
  97. "$kubernetes-resource_configmap_portal_protocol"
  98. ],
  99. "host": [
  100. "$kubernetes-resource_configmap_portal_host"
  101. ],
  102. "ports": [
  103. "$kubernetes-resource_configmap_portal_port"
  104. ],
  105. "path": "$kubernetes-resource_configmap_portal_path"
  106. },
  107. "admin_portal": {
  108. "protocols": [
  109. "$kubernetes-resource_configmap_portal_protocol"
  110. ],
  111. "host": [
  112. "$kubernetes-resource_configmap_portal_host"
  113. ],
  114. "ports": [
  115. "$kubernetes-resource_configmap_portal_port"
  116. ],
  117. "path": "$kubernetes-resource_configmap_portal_admin_path"
  118. }
  119. },
  120. "questions": [
  121. {
  122. "variable": "TZ",
  123. "group": "Vaultwarden Configuration",
  124. "label": "Timezone",
  125. "schema": {
  126. "type": "string",
  127. "default": "America/Los_Angeles",
  128. "required": true,
  129. "$ref": [
  130. "definitions/timezone"
  131. ],
  132. "enum": [
  133. {
  134. "value": "Asia/Damascus",
  135. "description": "'Asia/Damascus' timezone"
  136. },
  137. {
  138. "value": "Asia/Saigon",
  139. "description": "'Asia/Saigon' timezone"
  140. }
  141. ]
  142. }
  143. },
  144. {
  145. "variable": "vaultwardenConfig",
  146. "label": "",
  147. "group": "Vaultwarden Configuration",
  148. "schema": {
  149. "type": "dict",
  150. "attrs": [
  151. {
  152. "variable": "adminToken",
  153. "label": "Admin Token",
  154. "description": "Setting this, will enable the admin portal",
  155. "schema": {
  156. "type": "string",
  157. "private": true,
  158. "default": ""
  159. }
  160. },
  161. {
  162. "variable": "additionalEnvs",
  163. "label": "Additional Environment Variables",
  164. "description": "Configure additional environment variables for Vaultwarden.",
  165. "schema": {
  166. "type": "list",
  167. "default": [],
  168. "items": [
  169. {
  170. "variable": "env",
  171. "label": "Environment Variable",
  172. "schema": {
  173. "type": "dict",
  174. "attrs": [
  175. {
  176. "variable": "name",
  177. "label": "Name",
  178. "schema": {
  179. "type": "string",
  180. "required": true
  181. }
  182. },
  183. {
  184. "variable": "value",
  185. "label": "Value",
  186. "schema": {
  187. "type": "string",
  188. "required": true
  189. }
  190. }
  191. ]
  192. }
  193. }
  194. ]
  195. }
  196. }
  197. ]
  198. }
  199. },
  200. {
  201. "variable": "vaultwardenRunAs",
  202. "label": "",
  203. "group": "User and Group Configuration",
  204. "schema": {
  205. "type": "dict",
  206. "attrs": [
  207. {
  208. "variable": "user",
  209. "label": "User ID",
  210. "description": "The user id that Vaultwarden will run as.",
  211. "schema": {
  212. "type": "int",
  213. "min": 568,
  214. "default": 568,
  215. "required": true
  216. }
  217. },
  218. {
  219. "variable": "group",
  220. "label": "Group ID",
  221. "description": "The group id that Vaultwarden will run as.",
  222. "schema": {
  223. "type": "int",
  224. "min": 568,
  225. "default": 568,
  226. "required": true
  227. }
  228. }
  229. ]
  230. }
  231. },
  232. {
  233. "variable": "vaultwardenNetwork",
  234. "label": "",
  235. "group": "Network Configuration",
  236. "schema": {
  237. "type": "dict",
  238. "attrs": [
  239. {
  240. "variable": "webPort",
  241. "label": "Web Port",
  242. "description": "The port for the Vaultwarden Web UI.",
  243. "schema": {
  244. "type": "int",
  245. "default": 30032,
  246. "min": 9000,
  247. "max": 65535,
  248. "required": true
  249. }
  250. },
  251. {
  252. "variable": "wsEnabled",
  253. "label": "Enable Websocket",
  254. "schema": {
  255. "type": "boolean",
  256. "default": true
  257. }
  258. },
  259. {
  260. "variable": "wsPort",
  261. "label": "Websocket Port",
  262. "description": "The port for the Vaultwarden Websocket.",
  263. "schema": {
  264. "type": "int",
  265. "show_if": [
  266. [
  267. "wsEnabled",
  268. "=",
  269. true
  270. ]
  271. ],
  272. "default": 30033,
  273. "min": 9000,
  274. "max": 65535,
  275. "required": true
  276. }
  277. },
  278. {
  279. "variable": "hostNetwork",
  280. "label": "Host Network",
  281. "description": "Bind to the host network. It's recommended to keep this disabled.</br>\n",
  282. "schema": {
  283. "type": "boolean",
  284. "default": false
  285. }
  286. },
  287. {
  288. "variable": "domain",
  289. "label": "Domain",
  290. "description": "The domain to use for Vaultwarden </br>\nFormat is: https://sub.domain.tld:port\n",
  291. "schema": {
  292. "type": "string",
  293. "default": ""
  294. }
  295. },
  296. {
  297. "variable": "certificateID",
  298. "label": "Certificate",
  299. "description": "The certificate to use for Vaultwarden </br>\nUsing the Rocket method for TLS setup is NOT recommended </br>\nPrefer a reverse proxy with a valid certificate </br>\n",
  300. "schema": {
  301. "type": "int",
  302. "null": true,
  303. "$ref": [
  304. "definitions/certificate"
  305. ],
  306. "enum": [
  307. {
  308. "value": null,
  309. "description": "No Certificate"
  310. }
  311. ],
  312. "default": null
  313. }
  314. }
  315. ]
  316. }
  317. },
  318. {
  319. "variable": "vaultwardenStorage",
  320. "label": "",
  321. "group": "Storage Configuration",
  322. "schema": {
  323. "type": "dict",
  324. "attrs": [
  325. {
  326. "variable": "data",
  327. "label": "Vaultwarden Data Storage",
  328. "description": "The path to store Vaultwarden attachments, icons, etc.",
  329. "schema": {
  330. "type": "dict",
  331. "attrs": [
  332. {
  333. "variable": "type",
  334. "label": "Type",
  335. "description": "ixVolume: Is dataset created automatically by the system.</br>\nHost Path: Is a path that already exists on the system.\n",
  336. "schema": {
  337. "type": "string",
  338. "required": true,
  339. "immutable": true,
  340. "default": "ixVolume",
  341. "enum": [
  342. {
  343. "value": "hostPath",
  344. "description": "Host Path (Path that already exists on the system)"
  345. },
  346. {
  347. "value": "ixVolume",
  348. "description": "ixVolume (Dataset created automatically by the system)"
  349. }
  350. ]
  351. }
  352. },
  353. {
  354. "variable": "datasetName",
  355. "label": "Dataset Name",
  356. "schema": {
  357. "type": "string",
  358. "show_if": [
  359. [
  360. "type",
  361. "=",
  362. "ixVolume"
  363. ]
  364. ],
  365. "required": true,
  366. "hidden": true,
  367. "immutable": true,
  368. "default": "data",
  369. "$ref": [
  370. "normalize/ixVolume"
  371. ]
  372. }
  373. },
  374. {
  375. "variable": "hostPath",
  376. "label": "Host Path",
  377. "schema": {
  378. "type": "hostpath",
  379. "show_if": [
  380. [
  381. "type",
  382. "=",
  383. "hostPath"
  384. ]
  385. ],
  386. "immutable": true,
  387. "required": true
  388. }
  389. }
  390. ]
  391. }
  392. },
  393. {
  394. "variable": "pgData",
  395. "label": "Vaultwarden Postgres Data Storage",
  396. "description": "The path to store Vaultwarden Postgres Data.",
  397. "schema": {
  398. "type": "dict",
  399. "attrs": [
  400. {
  401. "variable": "type",
  402. "label": "Type",
  403. "description": "ixVolume: Is dataset created automatically by the system.</br>\nHost Path: Is a path that already exists on the system.\n",
  404. "schema": {
  405. "type": "string",
  406. "required": true,
  407. "immutable": true,
  408. "default": "ixVolume",
  409. "enum": [
  410. {
  411. "value": "hostPath",
  412. "description": "Host Path (Path that already exists on the system)"
  413. },
  414. {
  415. "value": "ixVolume",
  416. "description": "ixVolume (Dataset created automatically by the system)"
  417. }
  418. ]
  419. }
  420. },
  421. {
  422. "variable": "datasetName",
  423. "label": "Dataset Name",
  424. "schema": {
  425. "type": "string",
  426. "show_if": [
  427. [
  428. "type",
  429. "=",
  430. "ixVolume"
  431. ]
  432. ],
  433. "required": true,
  434. "hidden": true,
  435. "immutable": true,
  436. "default": "pgData",
  437. "$ref": [
  438. "normalize/ixVolume"
  439. ]
  440. }
  441. },
  442. {
  443. "variable": "hostPath",
  444. "label": "Host Path",
  445. "schema": {
  446. "type": "hostpath",
  447. "show_if": [
  448. [
  449. "type",
  450. "=",
  451. "hostPath"
  452. ]
  453. ],
  454. "immutable": true,
  455. "required": true
  456. }
  457. }
  458. ]
  459. }
  460. },
  461. {
  462. "variable": "pgBackup",
  463. "label": "Vaultwarden Postgres Backup Storage",
  464. "description": "The path to store Vaultwarden Postgres Backup.",
  465. "schema": {
  466. "type": "dict",
  467. "attrs": [
  468. {
  469. "variable": "type",
  470. "label": "Type",
  471. "description": "ixVolume: Is dataset created automatically by the system.</br>\nHost Path: Is a path that already exists on the system.\n",
  472. "schema": {
  473. "type": "string",
  474. "required": true,
  475. "immutable": true,
  476. "default": "ixVolume",
  477. "enum": [
  478. {
  479. "value": "hostPath",
  480. "description": "Host Path (Path that already exists on the system)"
  481. },
  482. {
  483. "value": "ixVolume",
  484. "description": "ixVolume (Dataset created automatically by the system)"
  485. }
  486. ]
  487. }
  488. },
  489. {
  490. "variable": "datasetName",
  491. "label": "Dataset Name",
  492. "schema": {
  493. "type": "string",
  494. "show_if": [
  495. [
  496. "type",
  497. "=",
  498. "ixVolume"
  499. ]
  500. ],
  501. "required": true,
  502. "hidden": true,
  503. "immutable": true,
  504. "default": "pgBackup",
  505. "$ref": [
  506. "normalize/ixVolume"
  507. ]
  508. }
  509. },
  510. {
  511. "variable": "hostPath",
  512. "label": "Host Path",
  513. "schema": {
  514. "type": "hostpath",
  515. "show_if": [
  516. [
  517. "type",
  518. "=",
  519. "hostPath"
  520. ]
  521. ],
  522. "immutable": true,
  523. "required": true
  524. }
  525. }
  526. ]
  527. }
  528. }
  529. ]
  530. }
  531. },
  532. {
  533. "variable": "resources",
  534. "label": "",
  535. "group": "Resources Configuration",
  536. "schema": {
  537. "type": "dict",
  538. "attrs": [
  539. {
  540. "variable": "limits",
  541. "label": "Limits",
  542. "schema": {
  543. "type": "dict",
  544. "attrs": [
  545. {
  546. "variable": "cpu",
  547. "label": "CPU",
  548. "description": "CPU limit for Vaultwarden.",
  549. "schema": {
  550. "type": "string",
  551. "max_length": 6,
  552. "valid_chars": "^(0\\.[1-9]|[1-9][0-9]*)(\\.[0-9]|m?)$",
  553. "valid_chars_error": "Valid CPU limit formats are</br>\n- Plain Integer - eg. 1</br>\n- Float - eg. 0.5</br>\n- Milicpu - eg. 500m\n",
  554. "default": "4000m",
  555. "required": true
  556. }
  557. },
  558. {
  559. "variable": "memory",
  560. "label": "Memory",
  561. "description": "Memory limit for Vaultwarden.",
  562. "schema": {
  563. "type": "string",
  564. "max_length": 12,
  565. "valid_chars": "^[1-9][0-9]*([EPTGMK]i?|e[0-9]+)?$",
  566. "valid_chars_error": "Valid Memory limit formats are</br>\n- Suffixed with E/P/T/G/M/K - eg. 1G</br>\n- Suffixed with Ei/Pi/Ti/Gi/Mi/Ki - eg. 1Gi</br>\n- Plain Integer in bytes - eg. 1024</br>\n- Exponent - eg. 134e6\n",
  567. "default": "8Gi",
  568. "required": true
  569. }
  570. }
  571. ]
  572. }
  573. }
  574. ]
  575. }
  576. }
  577. ]
  578. },
  579. "app_readme": "<h1>Vaultwarden</h1>\n<p><a href=\"https://github.com/dani-garcia/vaultwarden\">Vaultwarden</a> Alternative implementation of the <code>Bitwarden</code> server API written in Rust and compatible with upstream Bitwarden clients</p>\n<blockquote>\n<p>During the installation process, a container will be launched with <strong>root</strong> privileges. This is required\nin order to apply the correct permissions to the <code>Vaultwarden</code> data directory. Afterward, the <code>Vaultwarden</code> container\nwill run as a <strong>non</strong>-root user (default <code>568</code>).\nSame applies to the <code>postgres</code> container. This will run afterwards as a <strong>non</strong>-root user (<code>999</code>).\nOn each upgrade, a container will be launched with <strong>root</strong> privileges in order to apply the correct\npermissions to the <code>postgres</code> <strong>backups</strong> directory. Container that performs the backup will run as a <strong>non</strong>-root user (<code>999</code>) afterwards.\nKeep in mind the permissions on the backup directory will be changed to <code>999:999</code> on <strong>every</strong> update.\nBut will only be changed once for the <code>Vaultwarden</code> and <code>postgres</code> data directories.</p>\n</blockquote>\n<p>While the option to use <code>Rocket</code> for TLS is there, it is not\n<a href=\"https://github.com/dani-garcia/vaultwarden/wiki/Enabling-HTTPS#via-rocket\">recommended</a>.\nInstead, use a reverse proxy to handle TLS termination.</p>\n<p>Using <code>HTTPS</code> is <strong>required</strong> for the most of the features to work (correctly).</p>",
  580. "detailed_readme": "<h1>Vaultwarden</h1>\n<p><a href=\"https://github.com/dani-garcia/vaultwarden\">Vaultwarden</a> Alternative implementation of the <code>Bitwarden</code> server API written in Rust and compatible with upstream Bitwarden clients</p>\n<blockquote>\n<p>During the installation process, a container will be launched with <strong>root</strong> privileges. This is required\nin order to apply the correct permissions to the <code>Vaultwarden</code> data directory. Afterward, the <code>Vaultwarden</code> container\nwill run as a <strong>non</strong>-root user (default <code>568</code>).\nSame applies to the <code>postgres</code> container. This will run afterwards as a <strong>non</strong>-root user (<code>999</code>).\nOn each upgrade, a container will be launched with <strong>root</strong> privileges in order to apply the correct\npermissions to the <code>postgres</code> <strong>backups</strong> directory. Container that performs the backup will run as a <strong>non</strong>-root user (<code>999</code>) afterwards.\nKeep in mind the permissions on the backup directory will be changed to <code>999:999</code> on <strong>every</strong> update.\nBut will only be changed once for the <code>Vaultwarden</code> and <code>postgres</code> data directories.</p>\n</blockquote>\n<p>While the option to use <code>Rocket</code> for TLS is there, it is not\n<a href=\"https://github.com/dani-garcia/vaultwarden/wiki/Enabling-HTTPS#via-rocket\">recommended</a>.\nInstead, use a reverse proxy to handle TLS termination.</p>\n<p>Using <code>HTTPS</code> is <strong>required</strong> for the most of the features to work (correctly).</p>",
  581. "changelog": null
  582. }
  583. }