No introduction found. Create it?
vaultwarden from bjw-s-labs is more popular with 13 repositories.
Install with:
helm repo add bjw-s oci://ghcr.io/bjw-s/helm/
helm install vaultwarden bjw-s/app-template -f values.yaml
See examples from other people.
Name | Repo | Stars | Version | Timestamp |
---|---|---|---|---|
vaultwarden | Diaoul/home-ops | 74 | 3.7.3 | a month ago |
vaultwarden | toboshii/home-ops | 352 | 0.2.2 | a year ago |
See the most popular values for this chart:
Key | Types |
---|---|
controllers.vaultwarden.containers.app.env.DOMAIN (8) https://vaultwarden.${SECRET_DOMAIN} | string |
boolean, string | |
string | |
string | |
boolean, string | |
controllers.vaultwarden.containers.app.env.SMTP_FROM (6) vaultwarden@${SECRET_DOMAIN} | string |
controllers.vaultwarden.containers.app.env.SMTP_HOST (6) smtp-relay.networking.svc.cluster.local. | string |
number, string | |
string | |
string | |
string | |
string | |
string | |
number | |
boolean | |
boolean | |
string | |
boolean | |
boolean | |
string | |
boolean | |
string | |
string | |
string | |
controllers.vaultwarden.containers.app.envFrom[].secretRef.name (8) vaultwarden-secret | string |
controllers.vaultwarden.containers.app.image.repository (8) vaultwarden/server | string |
controllers.vaultwarden.containers.app.image.tag (8) 1.34.1@sha256:48267ea14d8649b2e553a5fe290c40b5dd94d54e9a24b26ae7134a75a659695f | string |
string | |
string | |
string | |
boolean | |
string | |
boolean | |
boolean | |
boolean | |
number | |
string | |
number | |
number | |
number | |
number | |
boolean | |
boolean | |
number | |
string | |
number | |
number | |
number | |
number | |
string | |
string | |
controllers.vaultwarden.initContainers.init-db.image.repository (5) ghcr.io/home-operations/postgres-init | string |
string, number | |
string | |
string | |
string | |
controllers.vaultwarden.initContainers.01-init-db.image.repository (1) ghcr.io/onedr0p/postgres-init | string |
controllers.vaultwarden.initContainers.01-init-db.image.tag (1) 17.4@sha256:43dd04e91e861cf912378bad987afa168fa4f13d05528304907ad0aa351195d6 | string |
number | |
string | |
number | |
number | |
boolean | |
string | |
number | |
string | |
string | |
controllers.main.containers.main.env.DOMAIN (2) https://vault.${SECRET_DOMAIN} | string |
boolean, string | |
controllers.main.containers.main.env.TZ (2) ${TIMEZONE} | string |
string | |
boolean | |
number | |
string | |
controllers.main.containers.main.image.repository (2) docker.io/vaultwarden/server | string |
controllers.main.containers.main.image.tag (2) 1.34.1-alpine@sha256:778be3ed8f3e89e9326f25d80fb97889297db413c9ae9705f48e85a653d51842 | string |
string | |
string | |
string | |
boolean | |
boolean | |
number | |
string | |
number | |
number | |
number | |
number | |
boolean | |
boolean | |
number | |
string | |
number | |
number | |
number | |
number | |
string | |
controllers.main.containers.vaultwarden.env.DOMAIN (1) https://vault.${SECRET_DOMAIN} | string |
boolean | |
boolean | |
string | |
string | |
boolean | |
number | |
controllers.main.containers.vaultwarden.envFrom[].secretRef.name (1) vaultwarden-secret | string |
string | |
controllers.main.containers.vaultwarden.image.repository (1) vaultwarden/server | string |
string | |
controllers.main.initContainers.init-db.envFrom[].secretRef.name (1) vaultwarden-secrets | string |
controllers.main.initContainers.init-db.image.repository (1) ghcr.io/home-operations/postgres-init | string |
string | |
number | |
string | |
number | |
number | |
number | |
ingress.app.className (7) external | string |
ingress.app.hosts[].host (7) vault.${SECRET_DOMAIN} | string |
string | |
string | |
string, number | |
ingress.app.tls[].hosts[] (5) - vault.${SECRET_DOMAIN} | string |
ingress.app.tls[].secretName (3) vault.${SECRET_DOMAIN} | string |
ingress.app.annotations."external-dns.alpha.kubernetes.io/target" (4) external.${SECRET_DOMAIN} | string |
string | |
string | |
string | |
ingress.app.annotations."hajimari.io/group" (1) Authentication | string |
string | |
ingress.app.annotations."nginx.ingress.kubernetes.io/custom-http-errors" (1) 500,501,502,503,504,505,506,510 | string |
boolean | |
ingress.admin.className (4) external | string |
ingress.admin.hosts[].host (4) vaultwarden.${DOMAIN} | string |
string | |
string | |
string | |
ingress.admin.annotations."nginx.ingress.kubernetes.io/custom-http-errors" (3) 500,501,502,503,504,505,506,510 | string |
ingress.admin.annotations."nginx.ingress.kubernetes.io/whitelist-source-range" (2) 10.0.0.0/8, 172.16.0.0/12, 192.168.0.0/16 | string |
string | |
ingress.admin.annotations."external-dns.alpha.kubernetes.io/target" (1) external.${SECRET_DOMAIN} | string |
string | |
ingress.admin.tls[].hosts[] (2) - vaultwarden.${SECRET_DOMAIN} | string |
ingress.admin.tls[].secretName (1) vaultwarden-production-tls | string |
boolean | |
ingress.main.hosts[].host (3) vault.${SECRET_DOMAIN} | string |
ingress.main.hosts[].paths[].path (3) / | string |
ingress.main.hosts[].paths[].pathType (3) Prefix | string |
ingress.main.hosts[].paths[].service.port (3) http | string, number |
string | |
ingress.main.annotations."gethomepage.dev/description" (2) Open Source Password Manager. | string |
string | |
string | |
string | |
string | |
ingress.main.annotations."cert-manager.io/cluster-issuer" (1) letsencrypt-production | string |
string | |
ingress.main.annotations."external-dns.alpha.kubernetes.io/target" (1) external.${SECRET_DOMAIN} | string |
string | |
ingress.main.annotations."hajimari.io/icon" (1) form-textbox-password | string |
ingress.main.className (2) external | string |
boolean | |
ingress.main.tls[].hosts[] (2) - vault.${SECRET_DOMAIN} | string |
ingress.main.tls[].secretName (1) vault-tls | string |
string | |
ingress.vaultwarden.annotations."external-dns.alpha.kubernetes.io/target" (1) external.${SECRET_DOMAIN} | string |
ingress.vaultwarden.annotations."hajimari.io/icon" (1) simple-icons:vaultwarden | string |
string | |
ingress.vaultwarden.hosts[].host (1) vault.${SECRET_DOMAIN} | string |
ingress.vaultwarden.hosts[].paths[].path (1) / | string |
ingress.vaultwarden.hosts[].paths[].pathType (1) Prefix | string |
ingress.vaultwarden.hosts[].paths[].service.identifier (1) vaultwarden | string |
ingress.vaultwarden.hosts[].paths[].service.port (1) http | string |
ingress.vaultwarden.tls[].hosts[] (1) - vault.${SECRET_DOMAIN} | string |
persistence.config.existingClaim (7) vaultwarden | string |
boolean | |
string | |
persistence.data.existingClaim (5) vaultwarden | string |
boolean | |
string | |
persistence.data.globalMounts[].subPath (1) vaultwarden | string |
service.app.controller (7) vaultwarden | string |
number | |
boolean | |
number | |
number | |
boolean | |
number | |
string | |
string | |
number | |
boolean | |
number | |
string | |
number | |
string | |
number | |
number | |
env.ADMIN_TOKEN (1) ${SECRET_VAULTWARDEN_ADMIN_TOKEN} | string |
env.DATA_FOLDER (1) config | string |
env.DATABASE_URL.valueFrom.secretKeyRef.key (1) POSTGRES_URL | string |
env.DATABASE_URL.valueFrom.secretKeyRef.name (1) vaultwarden-postgres | string |
env.DOMAIN (1) https://warden.${SECRET_DOMAIN} | string |
boolean | |
env.SMTP_FROM (1) no-reply@56k.jp | string |
env.SMTP_FROM_NAME (1) Vaultwarden | string |
env.SMTP_HOST (1) smtp.sendgrid.net | string |
env.SMTP_PASSWORD (1) ${SECRET_SENDGRID_API_KEY} | string |
number | |
env.SMTP_SSL (1) true | boolean |
env.SMTP_USERNAME (1) apikey | string |
env.WEBSOCKET_ADDRESS (1) 0.0.0.0 | string |
boolean | |
number | |
global.nameOverride (1) vaultwarden | string |
image.repository (1) docker.io/vaultwarden/server | string |
image.tag (1) 1.27.0 | string |
string |