Stavros Kois 56b882e259 NAS-122694 / 23.10 / Add some validation in webdav and other apps (#1312) 2 jaren geleden
..
charts 470328c962 bump common library (#1330) 2 jaren geleden
ci 846a6a02c4 NAS-121156 / 23.10 / Add vaultwarden to community train (#1055) 2 jaren geleden
migrations 85d2fab14d NAS-122030 / 23.10 / Adds check to only render hostPath key if it has a value (#1210) 2 jaren geleden
templates 9d4c420c86 NAS-121780 / 23.10 / Add tags to apps (#1193) 2 jaren geleden
Chart.lock 470328c962 bump common library (#1330) 2 jaren geleden
Chart.yaml 56b882e259 NAS-122694 / 23.10 / Add some validation in webdav and other apps (#1312) 2 jaren geleden
README.md 846a6a02c4 NAS-121156 / 23.10 / Add vaultwarden to community train (#1055) 2 jaren geleden
app-readme.md 846a6a02c4 NAS-121156 / 23.10 / Add vaultwarden to community train (#1055) 2 jaren geleden
item.yaml ef054a9ca1 NAS-122778 / 23.10 / fix vaultwarden icon (#1324) 2 jaren geleden
metadata.yaml 31962e8241 NAS-121769 / 23.10 / Add metadata file(s) (#1175) 2 jaren geleden
questions.yaml 56b882e259 NAS-122694 / 23.10 / Add some validation in webdav and other apps (#1312) 2 jaren geleden
upgrade_info.json 846a6a02c4 NAS-121156 / 23.10 / Add vaultwarden to community train (#1055) 2 jaren geleden
upgrade_strategy 193fc134db fix typo in update_strategy (#1083) 2 jaren geleden
values.yaml 8140ad80d5 NAS-122337 / 23.10 / Avoid overlap with default ports across all apps (#1251) 2 jaren geleden

README.md

Vaultwarden

Vaultwarden Alternative implementation of the Bitwarden server API written in Rust and compatible with upstream Bitwarden clients

During the installation process, a container will be launched with root privileges. This is required in order to apply the correct permissions to the Vaultwarden data directory. Afterward, the Vaultwarden container will run as a non-root user (default 568). Same applies to the postgres container. This will run afterwards as a non-root user (999). On each upgrade, a container will be launched with root privileges in order to apply the correct permissions to the postgres backups directory. Container that performs the backup will run as a non-root user (999) afterwards. Keep in mind the permissions on the backup directory will be changed to 999:999 on every update. But will only be changed once for the Vaultwarden and postgres data directories.

While the option to use Rocket for TLS is there, it is not recommended. Instead, use a reverse proxy to handle TLS termination.

Using HTTPS is required for the most of the features to work (correctly).