vaultwarden/variables.yml

100 lines
2.4 KiB
YAML
Raw Normal View History

2023-11-01 22:51:13 +01:00
---
2023-12-21 23:32:14 +01:00
# Name of this instance (job and service name)
instance: vaultwarden
2023-11-01 22:51:13 +01:00
vaultwarden:
2023-11-18 23:19:27 +01:00
# Server settings
2023-11-01 22:51:13 +01:00
server:
2023-11-18 23:19:27 +01:00
2024-01-31 10:42:07 +01:00
# Version to deploy
2024-03-02 22:13:47 +01:00
version: 1.30.5
2024-01-31 10:42:07 +01:00
# Docker image to use
image: vaultwarden/server:[[ .vaultwarden.server.version ]]-alpine
2023-11-18 23:19:27 +01:00
# Number of instances to run
2023-11-01 22:51:13 +01:00
count: 1
2023-11-18 23:19:27 +01:00
# List of features to enable when building image
# (not used for now)
2023-11-01 22:51:13 +01:00
features:
- postgresql
2023-11-18 23:19:27 +01:00
# List of vault policies to attach to the task
vault:
policies:
- '[[ .instance ]][[ .consul.suffix ]]'
# A list of random secrets to generate if not present in vault kv store
rand_secrets:
fields:
- admin_token
# Postgres settings
postgres:
2024-01-13 14:23:03 +01:00
pooler:
mode: session
2023-11-18 23:19:27 +01:00
# Resources allocation
2023-11-01 22:51:13 +01:00
resources:
2023-11-18 23:19:27 +01:00
cpu: 300
2023-11-01 22:51:13 +01:00
memory: 128
2023-11-18 23:19:27 +01:00
# Consul settings
2023-11-01 22:51:13 +01:00
consul:
connect:
upstreams:
- destination_name: '[[ .mail.smtp_service_name ]]'
2023-11-01 22:51:13 +01:00
local_bind_port: 25
- destination_name: postgres[[ .consul.suffix ]]
local_bind_port: 5432
wait_for:
- service: master.postgres[[ .consul.suffix ]]
2023-11-01 22:51:13 +01:00
2023-11-18 23:19:27 +01:00
# Environment variables to set in the container
2023-11-01 22:51:13 +01:00
env:
ORG_EVENTS_ENABLED: 'true'
EVENTS_DAYS_RETAIN: 720
SIGNUPS_VERIFY: 'true'
SMTP_HOST: localhost
SMTP_PORT: 25
SMTP_FROM: vaultwarden-no-reply@[[ .consul.domain ]]
SMTP_SECURITY: off
TRASH_AUTO_DELETE_DAYS: 7
INCOMPLETE_2FA_TIME_LIMIT: 5
USER_ATTACHMENT_LIMIT: 204800
2023-11-18 23:19:27 +01:00
# Public URL of the service
2023-11-01 22:51:13 +01:00
public_url: https://vaultwarden.example.org/
2023-11-18 23:19:27 +01:00
# Traefik settings
2024-01-27 00:11:39 +01:00
traefik:
# Makes sure
priority: 100
csp:
default-src: "'self'"
img-src: "'self' data: https://www.gravatar.com"
script-src: "'self' 'unsafe-inline' 'unsafe-eval'"
style-src: "'self' 'unsafe-inline'"
font-src: "'self' data:"
connect-src: "'self' https://api.pwnedpasswords.com https://api.2fa.directory"
2023-11-18 23:19:27 +01:00
# Settings for the /admin interface
# Note that this interface is disabled unless ADMIN_TOKEN env var is set
2023-11-01 22:51:13 +01:00
admin:
2024-01-27 00:11:39 +01:00
public_url: '[[ .vaultwarden.server.public_url ]]/admin'
2023-11-18 23:19:27 +01:00
# If enabled, we can set specific Traefik middlewares
2024-01-27 00:11:39 +01:00
traefik:
strip_prefix: false
2024-01-31 10:42:07 +01:00
router: admin
2024-01-27 00:11:39 +01:00
priority: 200
2023-11-18 23:19:27 +01:00
# Volumes for data persistance
2023-11-01 22:51:13 +01:00
volumes:
data:
type: csi
source: vaultwarden-data
access_mode: multi-node-multi-writer