No introduction found. Create it?
vaultwarden from bjw-s is more popular with 18 repositories.
Install with:
helm repo add k8s-at-home-charts https://k8s-at-home.com/charts/
helm install vaultwarden k8s-at-home-charts/vaultwarden -f values.yaml
See examples from other people.
Name | Repo | Stars | Version | Timestamp |
---|---|---|---|---|
vaultwarden | dfroberg/cluster | 47 | 5.3.2 | 6 months ago |
See the most popular values for this chart:
Key | Types |
---|---|
env.DOMAIN (6) https://vaultwarden.${SECRET_DOMAIN} | string |
env.DATA_FOLDER (5) config | string |
string | |
env.TZ (5) ${TIMEZONE} | string |
env.SMTP_FROM_NAME (4) Vaultwarden | string |
env.SMTP_HOST (4) mail.privateemail.com | string |
number | |
env.SMTP_SSL (4) true | string |
env.WEBSOCKET_ADDRESS (4) 0.0.0.0 | string |
boolean | |
number | |
string | |
env.SMTP_FROM (2) no-reply@${DOMAIN} | string |
env.SMTP_PASSWORD (2) ${ADMIN_EMAIL_PASSWORD} | string |
env.SMTP_USERNAME (2) ${ADMIN_EMAIL} | string |
env.ADMIN_TOKEN (1) ${VAULTWARDEN_ADMIN_TOKEN} | string |
env.DATABASE_URL (1) mysql://root:${MARIADB_ROOT_PASSWORD}@mariadb.storage.svc.cluster.local:3306/vaultwarden | string |
env.YUBICO_CLIENT_ID (1) ${YUBICO_CLIENT_ID} | string |
env.YUBICO_SECRET_KEY (1) ${YUBICO_SECRET_KEY} | string |
boolean | |
ingress.main.hosts[].host (6) vaultwarden.${SECRET_DOMAIN} | string |
ingress.main.hosts[].paths[].path (6) / | string |
ingress.main.hosts[].paths[].pathType (6) Prefix | string |
number | |
number | |
string | |
ingress.main.tls[].hosts[] (6) - vaultwarden.${SECRET_DOMAIN} | string |
ingress.main.tls[].secretName (5) vault-tls | string |
ingress.main.annotations."cert-manager.io/cluster-issuer" (3) letsencrypt-production | string |
string | |
string | |
string | |
string | |
string | |
string | |
string | |
string | |
string | |
string | |
string | |
ingress.main.annotations."nginx.ingress.kubernetes.io/server-snippet" (1) proxy_hide_header "content-security-policy";
add_header Content-Security-Policy "default-src 'self'; script-src 'self'; style-src 'self' 'unsafe-inline' develop.theme-park.dev theme-park.dev ${DOMAIN}; img-src 'self' data: https://haveibeenpwned.com/ https://www.gravatar.com ; child-src 'self' https://*.duosecurity.com https://*.duofederal.com; frame-src 'self' https://*.duosecurity.com https://*.duofederal.com; connect-src 'self' https://api.pwnedpasswords.com/range/ https://2fa.directory/api/ https://app.simplelogin.io/api/ https://app.anonaddy.com/api/ https://relay.firefox.com/api/; object-src 'self' blob:; frame-ancestors 'self' chrome-extension://nngceckbapebfimnlniiiahkandclblb chrome-extension://jbkfoedolllekgbhcbcoahefnbanhhlh moz-extension://*" ;
proxy_set_header Accept-Encoding "";
sub_filter
'</head>'
'<link rel="stylesheet" type="text/css" href="https://theme-park.dev/css/base/bitwarden/${TP_THEME}.css">
</head>';
sub_filter_once on;
| string |
boolean | |
ingress.admin.hosts[].host (4) vaultwarden.${SECRET_DOMAIN} | string |
string | |
string | |
string | |
ingress.admin.tls[].hosts[] (4) - vaultwarden.${SECRET_DOMAIN} | string |
ingress.admin.tls[].secretName (3) vault-tls | string |
ingress.admin.annotations."nginx.ingress.kubernetes.io/auth-signin" (1) https://login.${SECRET_DOMAIN} | string |
ingress.admin.annotations."nginx.ingress.kubernetes.io/auth-url" (1) http://authelia.security.svc.cluster.local/api/verify | string |
string | |
ingress.admin.annotations."traefik.ingress.kubernetes.io/router.middlewares" (1) networking-rfc1918@kubernetescrd | string |
boolean | |
persistence.config.existingClaim (4) pvc-vaultwarden | string |
string | |
image.repository (5) ghcr.io/k8s-at-home/vaultwarden | string |
image.tag (5) v1.25.2 | string |
image.pullPolicy (1) IfNotPresent | string |
envFrom[].secretRef.name (4) vaultwarden | string |
string | |
string | |
string | |
string | |
string | |
additionalContainers.fsfreeze.image (1) ghcr.io/k8s-at-home/fsfreeze:v2.37-r0 | string |
string | |
boolean | |
string | |
string | |
number | |
number | |
boolean | |
number | |
strategy.type (1) Recreate | string |