app_versions.json 63 KB

12345678910111213141516171819202122232425262728293031323334353637383940414243444546474849505152535455565758596061626364656667686970717273747576777879808182838485868788899091929394959697989910010110210310410510610710810911011111211311411511611711811912012112212312412512612712812913013113213313413513613713813914014114214314414514614714814915015115215315415515615715815916016116216316416516616716816917017117217317417517617717817918018118218318418518618718818919019119219319419519619719819920020120220320420520620720820921021121221321421521621721821922022122222322422522622722822923023123223323423523623723823924024124224324424524624724824925025125225325425525625725825926026126226326426526626726826927027127227327427527627727827928028128228328428528628728828929029129229329429529629729829930030130230330430530630730830931031131231331431531631731831932032132232332432532632732832933033133233333433533633733833934034134234334434534634734834935035135235335435535635735835936036136236336436536636736836937037137237337437537637737837938038138238338438538638738838939039139239339439539639739839940040140240340440540640740840941041141241341441541641741841942042142242342442542642742842943043143243343443543643743843944044144244344444544644744844945045145245345445545645745845946046146246346446546646746846947047147247347447547647747847948048148248348448548648748848949049149249349449549649749849950050150250350450550650750850951051151251351451551651751851952052152252352452552652752852953053153253353453553653753853954054154254354454554654754854955055155255355455555655755855956056156256356456556656756856957057157257357457557657757857958058158258358458558658758858959059159259359459559659759859960060160260360460560660760860961061161261361461561661761861962062162262362462562662762862963063163263363463563663763863964064164264364464564664764864965065165265365465565665765865966066166266366466566666766866967067167267367467567667767867968068168268368468568668768868969069169269369469569669769869970070170270370470570670770870971071171271371471571671771871972072172272372472572672772872973073173273373473573673773873974074174274374474574674774874975075175275375475575675775875976076176276376476576676776876977077177277377477577677777877978078178278378478578678778878979079179279379479579679779879980080180280380480580680780880981081181281381481581681781881982082182282382482582682782882983083183283383483583683783883984084184284384484584684784884985085185285385485585685785885986086186286386486586686786886987087187287387487587687787887988088188288388488588688788888989089189289389489589689789889990090190290390490590690790890991091191291391491591691791891992092192292392492592692792892993093193293393493593693793893994094194294394494594694794894995095195295395495595695795895996096196296396496596696796896997097197297397497597697797897998098198298398498598698798898999099199299399499599699799899910001001100210031004100510061007100810091010101110121013101410151016101710181019102010211022102310241025102610271028102910301031103210331034103510361037103810391040104110421043104410451046104710481049105010511052
  1. {
  2. "1.3.11": {
  3. "healthy": true,
  4. "supported": true,
  5. "healthy_error": null,
  6. "location": "/__w/apps/apps/trains/community/vaultwarden/1.3.11",
  7. "last_update": "2025-09-02 11:33:24",
  8. "required_features": [],
  9. "human_version": "1.34.3_1.3.11",
  10. "version": "1.3.11",
  11. "app_metadata": {
  12. "annotations": {
  13. "min_scale_version": "24.10.2.2"
  14. },
  15. "app_version": "1.34.3",
  16. "capabilities": [],
  17. "categories": [
  18. "security"
  19. ],
  20. "changelog_url": "https://github.com/dani-garcia/vaultwarden/releases",
  21. "date_added": "2024-09-19",
  22. "description": "Alternative implementation of the Bitwarden server API written in Rust and compatible with upstream Bitwarden clients.",
  23. "home": "https://github.com/dani-garcia/vaultwarden",
  24. "host_mounts": [],
  25. "icon": "https://media.sys.truenas.net/apps/vaultwarden/icons/icon.png",
  26. "keywords": [
  27. "password",
  28. "manager"
  29. ],
  30. "lib_version": "2.1.49",
  31. "lib_version_hash": "e71e6b0122c9446fa5ea6fb07e7eb01b11fb42d549a19845426bbd7e21a42634",
  32. "maintainers": [
  33. {
  34. "email": "dev@ixsystems.com",
  35. "name": "truenas",
  36. "url": "https://www.truenas.com/"
  37. }
  38. ],
  39. "name": "vaultwarden",
  40. "run_as_context": [
  41. {
  42. "description": "Vaultwarden runs as any non-root user.",
  43. "gid": 568,
  44. "group_name": "vaultwarden",
  45. "uid": 568,
  46. "user_name": "vaultwarden"
  47. },
  48. {
  49. "description": "Postgres runs as non-root user.",
  50. "gid": 999,
  51. "group_name": "postgres",
  52. "uid": 999,
  53. "user_name": "postgres"
  54. }
  55. ],
  56. "screenshots": [
  57. "https://media.sys.truenas.net/apps/vaultwarden/screenshots/screenshot1.png"
  58. ],
  59. "sources": [
  60. "https://github.com/dani-garcia/vaultwarden"
  61. ],
  62. "title": "Vaultwarden",
  63. "train": "community",
  64. "version": "1.3.11"
  65. },
  66. "schema": {
  67. "groups": [
  68. {
  69. "name": "Vaultwarden Configuration",
  70. "description": "Configure Vaultwarden"
  71. },
  72. {
  73. "name": "User and Group Configuration",
  74. "description": "Configure User and Group for Vaultwarden"
  75. },
  76. {
  77. "name": "Network Configuration",
  78. "description": "Configure Network for Vaultwarden"
  79. },
  80. {
  81. "name": "Storage Configuration",
  82. "description": "Configure Storage for Vaultwarden"
  83. },
  84. {
  85. "name": "Labels Configuration",
  86. "description": "Configure Labels for Vaultwarden"
  87. },
  88. {
  89. "name": "Resources Configuration",
  90. "description": "Configure Resources for Vaultwarden"
  91. }
  92. ],
  93. "questions": [
  94. {
  95. "variable": "TZ",
  96. "group": "Vaultwarden Configuration",
  97. "label": "Timezone",
  98. "schema": {
  99. "type": "string",
  100. "default": "Etc/UTC",
  101. "required": true,
  102. "$ref": [
  103. "definitions/timezone"
  104. ]
  105. }
  106. },
  107. {
  108. "variable": "vaultwarden",
  109. "label": "",
  110. "group": "Vaultwarden Configuration",
  111. "schema": {
  112. "type": "dict",
  113. "attrs": [
  114. {
  115. "variable": "postgres_image_selector",
  116. "label": "Postgres Image (CAUTION)",
  117. "description": "If you are changing this after the postgres directory has been initialized,</br>\nSTOP! and make sure you have a backup of your data.</br>\nChanging this will trigger an one way database upgrade.</br>\nYou can only select newer versions of postgres.</br>\nSelecting an older version will refuse to start.</br>\nIf something goes wrong, you will have to restore from backup.\n",
  118. "schema": {
  119. "type": "string",
  120. "default": "postgres_17_image",
  121. "required": true,
  122. "enum": [
  123. {
  124. "value": "postgres_15_image",
  125. "description": "Postgres 15"
  126. },
  127. {
  128. "value": "postgres_17_image",
  129. "description": "Postgres 17"
  130. }
  131. ]
  132. }
  133. },
  134. {
  135. "variable": "db_password",
  136. "label": "Database Password",
  137. "description": "The password for Vaultwarden.",
  138. "schema": {
  139. "type": "string",
  140. "default": "",
  141. "required": true,
  142. "private": true
  143. }
  144. },
  145. {
  146. "variable": "admin_token",
  147. "label": "Admin Token",
  148. "description": "Setting this, will enable the admin portal",
  149. "schema": {
  150. "type": "string",
  151. "default": "",
  152. "private": true
  153. }
  154. },
  155. {
  156. "variable": "enable_websocket",
  157. "label": "Enable Websocket",
  158. "description": "Enable Websocket for Vaultwarden.",
  159. "schema": {
  160. "type": "boolean",
  161. "default": true
  162. }
  163. },
  164. {
  165. "variable": "additional_envs",
  166. "label": "Additional Environment Variables",
  167. "schema": {
  168. "type": "list",
  169. "default": [],
  170. "items": [
  171. {
  172. "variable": "env",
  173. "label": "Environment Variable",
  174. "schema": {
  175. "type": "dict",
  176. "attrs": [
  177. {
  178. "variable": "name",
  179. "label": "Name",
  180. "schema": {
  181. "type": "string",
  182. "required": true
  183. }
  184. },
  185. {
  186. "variable": "value",
  187. "label": "Value",
  188. "schema": {
  189. "type": "string"
  190. }
  191. }
  192. ]
  193. }
  194. }
  195. ]
  196. }
  197. }
  198. ]
  199. }
  200. },
  201. {
  202. "variable": "run_as",
  203. "label": "",
  204. "group": "User and Group Configuration",
  205. "schema": {
  206. "type": "dict",
  207. "attrs": [
  208. {
  209. "variable": "user",
  210. "label": "User ID",
  211. "description": "The user id that Vaultwarden files will be owned by.",
  212. "schema": {
  213. "type": "int",
  214. "min": 568,
  215. "default": 568,
  216. "required": true
  217. }
  218. },
  219. {
  220. "variable": "group",
  221. "label": "Group ID",
  222. "description": "The group id that Vaultwarden files will be owned by.",
  223. "schema": {
  224. "type": "int",
  225. "min": 568,
  226. "default": 568,
  227. "required": true
  228. }
  229. }
  230. ]
  231. }
  232. },
  233. {
  234. "variable": "network",
  235. "label": "",
  236. "group": "Network Configuration",
  237. "schema": {
  238. "type": "dict",
  239. "attrs": [
  240. {
  241. "variable": "web_port",
  242. "label": "WebUI Port",
  243. "schema": {
  244. "type": "dict",
  245. "attrs": [
  246. {
  247. "variable": "bind_mode",
  248. "label": "Port Bind Mode",
  249. "description": "The port bind mode.</br>\n- Publish: The port will be published on the host for external access.</br>\n- Expose: The port will be exposed for inter-container communication.</br>\n- None: The port will not be exposed or published.</br>\nNote: If the Dockerfile defines an EXPOSE directive,\nthe port will still be exposed for inter-container communication regardless of this setting.\n",
  250. "schema": {
  251. "type": "string",
  252. "default": "published",
  253. "enum": [
  254. {
  255. "value": "published",
  256. "description": "Publish port on the host for external access"
  257. },
  258. {
  259. "value": "exposed",
  260. "description": "Expose port for inter-container communication"
  261. },
  262. {
  263. "value": "",
  264. "description": "None"
  265. }
  266. ]
  267. }
  268. },
  269. {
  270. "variable": "port_number",
  271. "label": "Port Number",
  272. "schema": {
  273. "type": "int",
  274. "default": 30032,
  275. "min": 1,
  276. "max": 65535,
  277. "required": true
  278. }
  279. },
  280. {
  281. "variable": "host_ips",
  282. "label": "Host IPs",
  283. "description": "IPs on the host to bind this port",
  284. "schema": {
  285. "type": "list",
  286. "show_if": [
  287. [
  288. "bind_mode",
  289. "=",
  290. "published"
  291. ]
  292. ],
  293. "default": [],
  294. "items": [
  295. {
  296. "variable": "host_ip",
  297. "label": "Host IP",
  298. "schema": {
  299. "type": "string",
  300. "required": true,
  301. "$ref": [
  302. "definitions/node_bind_ip"
  303. ]
  304. }
  305. }
  306. ]
  307. }
  308. }
  309. ]
  310. }
  311. },
  312. {
  313. "variable": "certificate_id",
  314. "label": "Certificate ID",
  315. "description": "The certificate to use for Vaultwarden </br>\nUsing the Rocket method for TLS setup is NOT recommended </br>\nPrefer a reverse proxy with a valid certificate\n",
  316. "schema": {
  317. "type": "int",
  318. "null": true,
  319. "$ref": [
  320. "definitions/certificate"
  321. ]
  322. }
  323. },
  324. {
  325. "variable": "domain",
  326. "label": "Domain",
  327. "description": "The domain to use for Vaultwarden </br>\nFormat is: https://sub.domain.tld:port\n",
  328. "schema": {
  329. "type": "uri",
  330. "default": ""
  331. }
  332. }
  333. ]
  334. }
  335. },
  336. {
  337. "variable": "storage",
  338. "label": "",
  339. "group": "Storage Configuration",
  340. "schema": {
  341. "type": "dict",
  342. "attrs": [
  343. {
  344. "variable": "data",
  345. "label": "Vaultwarden Data Storage",
  346. "description": "The path to store Vaultwarden Data.",
  347. "schema": {
  348. "type": "dict",
  349. "attrs": [
  350. {
  351. "variable": "type",
  352. "label": "Type",
  353. "description": "ixVolume: Is dataset created automatically by the system.</br>\nHost Path: Is a path that already exists on the system.\n",
  354. "schema": {
  355. "type": "string",
  356. "required": true,
  357. "default": "ix_volume",
  358. "enum": [
  359. {
  360. "value": "host_path",
  361. "description": "Host Path (Path that already exists on the system)"
  362. },
  363. {
  364. "value": "ix_volume",
  365. "description": "ixVolume (Dataset created automatically by the system)"
  366. }
  367. ]
  368. }
  369. },
  370. {
  371. "variable": "ix_volume_config",
  372. "label": "ixVolume Configuration",
  373. "description": "The configuration for the ixVolume dataset.",
  374. "schema": {
  375. "type": "dict",
  376. "show_if": [
  377. [
  378. "type",
  379. "=",
  380. "ix_volume"
  381. ]
  382. ],
  383. "$ref": [
  384. "normalize/ix_volume"
  385. ],
  386. "attrs": [
  387. {
  388. "variable": "acl_enable",
  389. "label": "Enable ACL",
  390. "description": "Enable ACL for the storage.",
  391. "schema": {
  392. "type": "boolean",
  393. "default": false
  394. }
  395. },
  396. {
  397. "variable": "dataset_name",
  398. "label": "Dataset Name",
  399. "description": "The name of the dataset to use for storage.",
  400. "schema": {
  401. "type": "string",
  402. "required": true,
  403. "hidden": true,
  404. "default": "data"
  405. }
  406. },
  407. {
  408. "variable": "acl_entries",
  409. "label": "ACL Configuration",
  410. "schema": {
  411. "type": "dict",
  412. "show_if": [
  413. [
  414. "acl_enable",
  415. "=",
  416. true
  417. ]
  418. ],
  419. "attrs": []
  420. }
  421. }
  422. ]
  423. }
  424. },
  425. {
  426. "variable": "host_path_config",
  427. "label": "Host Path Configuration",
  428. "schema": {
  429. "type": "dict",
  430. "show_if": [
  431. [
  432. "type",
  433. "=",
  434. "host_path"
  435. ]
  436. ],
  437. "attrs": [
  438. {
  439. "variable": "acl_enable",
  440. "label": "Enable ACL",
  441. "description": "Enable ACL for the storage.",
  442. "schema": {
  443. "type": "boolean",
  444. "default": false
  445. }
  446. },
  447. {
  448. "variable": "acl",
  449. "label": "ACL Configuration",
  450. "schema": {
  451. "type": "dict",
  452. "show_if": [
  453. [
  454. "acl_enable",
  455. "=",
  456. true
  457. ]
  458. ],
  459. "attrs": [],
  460. "$ref": [
  461. "normalize/acl"
  462. ]
  463. }
  464. },
  465. {
  466. "variable": "path",
  467. "label": "Host Path",
  468. "description": "The host path to use for storage.",
  469. "schema": {
  470. "type": "hostpath",
  471. "show_if": [
  472. [
  473. "acl_enable",
  474. "=",
  475. false
  476. ]
  477. ],
  478. "required": true
  479. }
  480. }
  481. ]
  482. }
  483. }
  484. ]
  485. }
  486. },
  487. {
  488. "variable": "postgres_data",
  489. "label": "Vaultwarden Postgres Data Storage",
  490. "description": "The path to store Vaultwarden Postgres Data.",
  491. "schema": {
  492. "type": "dict",
  493. "attrs": [
  494. {
  495. "variable": "type",
  496. "label": "Type",
  497. "description": "ixVolume: Is dataset created automatically by the system.</br>\nHost Path: Is a path that already exists on the system.\n",
  498. "schema": {
  499. "type": "string",
  500. "required": true,
  501. "default": "ix_volume",
  502. "enum": [
  503. {
  504. "value": "host_path",
  505. "description": "Host Path (Path that already exists on the system)"
  506. },
  507. {
  508. "value": "ix_volume",
  509. "description": "ixVolume (Dataset created automatically by the system)"
  510. }
  511. ]
  512. }
  513. },
  514. {
  515. "variable": "ix_volume_config",
  516. "label": "ixVolume Configuration",
  517. "description": "The configuration for the ixVolume dataset.",
  518. "schema": {
  519. "type": "dict",
  520. "show_if": [
  521. [
  522. "type",
  523. "=",
  524. "ix_volume"
  525. ]
  526. ],
  527. "$ref": [
  528. "normalize/ix_volume"
  529. ],
  530. "attrs": [
  531. {
  532. "variable": "acl_enable",
  533. "label": "Enable ACL",
  534. "description": "Enable ACL for the storage.",
  535. "schema": {
  536. "type": "boolean",
  537. "default": false
  538. }
  539. },
  540. {
  541. "variable": "dataset_name",
  542. "label": "Dataset Name",
  543. "description": "The name of the dataset to use for storage.",
  544. "schema": {
  545. "type": "string",
  546. "required": true,
  547. "hidden": true,
  548. "default": "postgres_data"
  549. }
  550. },
  551. {
  552. "variable": "acl_entries",
  553. "label": "ACL Configuration",
  554. "schema": {
  555. "type": "dict",
  556. "show_if": [
  557. [
  558. "acl_enable",
  559. "=",
  560. true
  561. ]
  562. ],
  563. "attrs": []
  564. }
  565. }
  566. ]
  567. }
  568. },
  569. {
  570. "variable": "host_path_config",
  571. "label": "Host Path Configuration",
  572. "schema": {
  573. "type": "dict",
  574. "show_if": [
  575. [
  576. "type",
  577. "=",
  578. "host_path"
  579. ]
  580. ],
  581. "attrs": [
  582. {
  583. "variable": "acl_enable",
  584. "label": "Enable ACL",
  585. "description": "Enable ACL for the storage.",
  586. "schema": {
  587. "type": "boolean",
  588. "default": false
  589. }
  590. },
  591. {
  592. "variable": "acl",
  593. "label": "ACL Configuration",
  594. "schema": {
  595. "type": "dict",
  596. "show_if": [
  597. [
  598. "acl_enable",
  599. "=",
  600. true
  601. ]
  602. ],
  603. "attrs": [],
  604. "$ref": [
  605. "normalize/acl"
  606. ]
  607. }
  608. },
  609. {
  610. "variable": "path",
  611. "label": "Host Path",
  612. "description": "The host path to use for storage.",
  613. "schema": {
  614. "type": "hostpath",
  615. "show_if": [
  616. [
  617. "acl_enable",
  618. "=",
  619. false
  620. ]
  621. ],
  622. "required": true
  623. }
  624. },
  625. {
  626. "variable": "auto_permissions",
  627. "label": "Automatic Permissions",
  628. "description": "Automatically set permissions for the host path.\nEnabling this, will check the top level directory,</br>\nIf it finds incorrect permissions, it will `chown` the\nhost path to the user and group required for the\npostgres container.\n",
  629. "schema": {
  630. "type": "boolean",
  631. "default": false,
  632. "show_if": [
  633. [
  634. "acl_enable",
  635. "=",
  636. false
  637. ]
  638. ]
  639. }
  640. }
  641. ]
  642. }
  643. }
  644. ]
  645. }
  646. },
  647. {
  648. "variable": "additional_storage",
  649. "label": "Additional Storage",
  650. "schema": {
  651. "type": "list",
  652. "default": [],
  653. "items": [
  654. {
  655. "variable": "storageEntry",
  656. "label": "Storage Entry",
  657. "schema": {
  658. "type": "dict",
  659. "attrs": [
  660. {
  661. "variable": "type",
  662. "label": "Type",
  663. "description": "ixVolume: Is dataset created automatically by the system.</br>\nHost Path: Is a path that already exists on the system.</br>\nSMB Share: Is a SMB share that is mounted to as a volume.\n",
  664. "schema": {
  665. "type": "string",
  666. "required": true,
  667. "default": "ix_volume",
  668. "enum": [
  669. {
  670. "value": "host_path",
  671. "description": "Host Path (Path that already exists on the system)"
  672. },
  673. {
  674. "value": "ix_volume",
  675. "description": "ixVolume (Dataset created automatically by the system)"
  676. },
  677. {
  678. "value": "cifs",
  679. "description": "SMB/CIFS Share (Mounts a volume to a SMB share)"
  680. }
  681. ]
  682. }
  683. },
  684. {
  685. "variable": "read_only",
  686. "label": "Read Only",
  687. "description": "Mount the volume as read only.",
  688. "schema": {
  689. "type": "boolean",
  690. "default": false
  691. }
  692. },
  693. {
  694. "variable": "mount_path",
  695. "label": "Mount Path",
  696. "description": "The path inside the container to mount the storage.",
  697. "schema": {
  698. "type": "path",
  699. "required": true
  700. }
  701. },
  702. {
  703. "variable": "host_path_config",
  704. "label": "Host Path Configuration",
  705. "schema": {
  706. "type": "dict",
  707. "show_if": [
  708. [
  709. "type",
  710. "=",
  711. "host_path"
  712. ]
  713. ],
  714. "attrs": [
  715. {
  716. "variable": "acl_enable",
  717. "label": "Enable ACL",
  718. "description": "Enable ACL for the storage.",
  719. "schema": {
  720. "type": "boolean",
  721. "default": false
  722. }
  723. },
  724. {
  725. "variable": "acl",
  726. "label": "ACL Configuration",
  727. "schema": {
  728. "type": "dict",
  729. "show_if": [
  730. [
  731. "acl_enable",
  732. "=",
  733. true
  734. ]
  735. ],
  736. "attrs": [],
  737. "$ref": [
  738. "normalize/acl"
  739. ]
  740. }
  741. },
  742. {
  743. "variable": "path",
  744. "label": "Host Path",
  745. "description": "The host path to use for storage.",
  746. "schema": {
  747. "type": "hostpath",
  748. "show_if": [
  749. [
  750. "acl_enable",
  751. "=",
  752. false
  753. ]
  754. ],
  755. "required": true
  756. }
  757. }
  758. ]
  759. }
  760. },
  761. {
  762. "variable": "ix_volume_config",
  763. "label": "ixVolume Configuration",
  764. "description": "The configuration for the ixVolume dataset.",
  765. "schema": {
  766. "type": "dict",
  767. "show_if": [
  768. [
  769. "type",
  770. "=",
  771. "ix_volume"
  772. ]
  773. ],
  774. "$ref": [
  775. "normalize/ix_volume"
  776. ],
  777. "attrs": [
  778. {
  779. "variable": "acl_enable",
  780. "label": "Enable ACL",
  781. "description": "Enable ACL for the storage.",
  782. "schema": {
  783. "type": "boolean",
  784. "default": false
  785. }
  786. },
  787. {
  788. "variable": "dataset_name",
  789. "label": "Dataset Name",
  790. "description": "The name of the dataset to use for storage.",
  791. "schema": {
  792. "type": "string",
  793. "required": true,
  794. "default": "storage_entry"
  795. }
  796. },
  797. {
  798. "variable": "acl_entries",
  799. "label": "ACL Configuration",
  800. "schema": {
  801. "type": "dict",
  802. "show_if": [
  803. [
  804. "acl_enable",
  805. "=",
  806. true
  807. ]
  808. ],
  809. "attrs": [],
  810. "$ref": [
  811. "normalize/acl"
  812. ]
  813. }
  814. }
  815. ]
  816. }
  817. },
  818. {
  819. "variable": "cifs_config",
  820. "label": "SMB Configuration",
  821. "description": "The configuration for the SMB dataset.",
  822. "schema": {
  823. "type": "dict",
  824. "show_if": [
  825. [
  826. "type",
  827. "=",
  828. "cifs"
  829. ]
  830. ],
  831. "attrs": [
  832. {
  833. "variable": "server",
  834. "label": "Server",
  835. "description": "The server to mount the SMB share.",
  836. "schema": {
  837. "type": "string",
  838. "required": true
  839. }
  840. },
  841. {
  842. "variable": "path",
  843. "label": "Path",
  844. "description": "The path to mount the SMB share.",
  845. "schema": {
  846. "type": "string",
  847. "required": true
  848. }
  849. },
  850. {
  851. "variable": "username",
  852. "label": "Username",
  853. "description": "The username to use for the SMB share.",
  854. "schema": {
  855. "type": "string",
  856. "required": true
  857. }
  858. },
  859. {
  860. "variable": "password",
  861. "label": "Password",
  862. "description": "The password to use for the SMB share.",
  863. "schema": {
  864. "type": "string",
  865. "required": true,
  866. "private": true
  867. }
  868. },
  869. {
  870. "variable": "domain",
  871. "label": "Domain",
  872. "description": "The domain to use for the SMB share.",
  873. "schema": {
  874. "type": "string"
  875. }
  876. }
  877. ]
  878. }
  879. }
  880. ]
  881. }
  882. }
  883. ]
  884. }
  885. }
  886. ]
  887. }
  888. },
  889. {
  890. "variable": "labels",
  891. "label": "",
  892. "group": "Labels Configuration",
  893. "schema": {
  894. "type": "list",
  895. "default": [],
  896. "items": [
  897. {
  898. "variable": "label",
  899. "label": "Label",
  900. "schema": {
  901. "type": "dict",
  902. "attrs": [
  903. {
  904. "variable": "key",
  905. "label": "Key",
  906. "schema": {
  907. "type": "string",
  908. "required": true
  909. }
  910. },
  911. {
  912. "variable": "value",
  913. "label": "Value",
  914. "schema": {
  915. "type": "string",
  916. "required": true
  917. }
  918. },
  919. {
  920. "variable": "containers",
  921. "label": "Containers",
  922. "description": "Containers where the label should be applied",
  923. "schema": {
  924. "type": "list",
  925. "items": [
  926. {
  927. "variable": "container",
  928. "label": "Container",
  929. "schema": {
  930. "type": "string",
  931. "required": true,
  932. "enum": [
  933. {
  934. "value": "vaultwarden",
  935. "description": "vaultwarden"
  936. },
  937. {
  938. "value": "postgres",
  939. "description": "postgres"
  940. }
  941. ]
  942. }
  943. }
  944. ]
  945. }
  946. }
  947. ]
  948. }
  949. }
  950. ]
  951. }
  952. },
  953. {
  954. "variable": "resources",
  955. "label": "",
  956. "group": "Resources Configuration",
  957. "schema": {
  958. "type": "dict",
  959. "attrs": [
  960. {
  961. "variable": "limits",
  962. "label": "Limits",
  963. "schema": {
  964. "type": "dict",
  965. "attrs": [
  966. {
  967. "variable": "cpus",
  968. "label": "CPUs",
  969. "description": "CPUs limit for Vaultwarden.",
  970. "schema": {
  971. "type": "int",
  972. "default": 2,
  973. "required": true
  974. }
  975. },
  976. {
  977. "variable": "memory",
  978. "label": "Memory (in MB)",
  979. "description": "Memory limit for Vaultwarden.",
  980. "schema": {
  981. "type": "int",
  982. "default": 4096,
  983. "required": true
  984. }
  985. }
  986. ]
  987. }
  988. }
  989. ]
  990. }
  991. }
  992. ]
  993. },
  994. "readme": "<h1>Vaultwarden</h1> <p><a href=\"https://github.com/dani-garcia/vaultwarden\">Vaultwarden</a> Alternative implementation of the <code>Bitwarden</code> server API written in Rust and compatible with upstream Bitwarden clients</p> <p>While the option to use <code>Rocket</code> for TLS is there, it is not <a href=\"https://github.com/dani-garcia/vaultwarden/wiki/Enabling-HTTPS#via-rocket\">recommended</a>. Instead, use a reverse proxy to handle TLS termination.</p> <p>Using <code>HTTPS</code> is <strong>required</strong> for the most of the features to work (correctly).</p>",
  995. "changelog": null,
  996. "chart_metadata": {
  997. "annotations": {
  998. "min_scale_version": "24.10.2.2"
  999. },
  1000. "app_version": "1.34.3",
  1001. "capabilities": [],
  1002. "categories": [
  1003. "security"
  1004. ],
  1005. "changelog_url": "https://github.com/dani-garcia/vaultwarden/releases",
  1006. "date_added": "2024-09-19",
  1007. "description": "Alternative implementation of the Bitwarden server API written in Rust and compatible with upstream Bitwarden clients.",
  1008. "home": "https://github.com/dani-garcia/vaultwarden",
  1009. "host_mounts": [],
  1010. "icon": "https://media.sys.truenas.net/apps/vaultwarden/icons/icon.png",
  1011. "keywords": [
  1012. "password",
  1013. "manager"
  1014. ],
  1015. "lib_version": "2.1.49",
  1016. "lib_version_hash": "e71e6b0122c9446fa5ea6fb07e7eb01b11fb42d549a19845426bbd7e21a42634",
  1017. "maintainers": [
  1018. {
  1019. "email": "dev@ixsystems.com",
  1020. "name": "truenas",
  1021. "url": "https://www.truenas.com/"
  1022. }
  1023. ],
  1024. "name": "vaultwarden",
  1025. "run_as_context": [
  1026. {
  1027. "description": "Vaultwarden runs as any non-root user.",
  1028. "gid": 568,
  1029. "group_name": "vaultwarden",
  1030. "uid": 568,
  1031. "user_name": "vaultwarden"
  1032. },
  1033. {
  1034. "description": "Postgres runs as non-root user.",
  1035. "gid": 999,
  1036. "group_name": "postgres",
  1037. "uid": 999,
  1038. "user_name": "postgres"
  1039. }
  1040. ],
  1041. "screenshots": [
  1042. "https://media.sys.truenas.net/apps/vaultwarden/screenshots/screenshot1.png"
  1043. ],
  1044. "sources": [
  1045. "https://github.com/dani-garcia/vaultwarden"
  1046. ],
  1047. "title": "Vaultwarden",
  1048. "train": "community",
  1049. "version": "1.3.11"
  1050. }
  1051. }
  1052. }