Benutzer-Werkzeuge

Webseiten-Werkzeuge


bitwarden

Unterschiede

Hier werden die Unterschiede zwischen zwei Versionen angezeigt.

Link zu dieser Vergleichsansicht

Beide Seiten der vorigen RevisionVorhergehende Überarbeitung
Nächste Überarbeitung
Vorhergehende Überarbeitung
bitwarden [2024-04-03 18:17:55] – [FreeBSD] manfredbitwarden [2024-05-27 17:53:04] (aktuell) – [Konfiguration von vaultwarden] manfred
Zeile 8: Zeile 8:
  
  
-===== Installation =====+===== FreeBSD =====
  
  
-==== FreeBSD ====+==== Server (Back-End) ====
  
-Installation: + 
-  > pkg install security/vaultwarden+=== Installation von vaultwarden ===
  
 ⚠️IMPORTANT⚠️: When using this server, please report any bugs or suggestions to us directly ([[https://github.com/dani-garcia/vaultwarden?tab=readme-ov-file#get-in-touch|Get in touch]]), regardless of whatever clients you are using (mobile, desktop, browser...). DO NOT use the official support channels. ⚠️IMPORTANT⚠️: When using this server, please report any bugs or suggestions to us directly ([[https://github.com/dani-garcia/vaultwarden?tab=readme-ov-file#get-in-touch|Get in touch]]), regardless of whatever clients you are using (mobile, desktop, browser...). DO NOT use the official support channels.
  
 +  > pkg install security/vaultwarden
  
-=== FreeBSD Installation bitwarden_rs ===+''oder''
  
 <code> <code>
-warning: be sure to add `/usr/ports/security/bitwarden_rs/work/stage/usr/local/bin` to your PATH to be able to run the installed binaries +# cd /usr/ports/security/vaultwarden/ 
-/bin/mkdir -p /usr/ports/security/bitwarden_rs/work/stage//usr/local/etc/bitwarden_rs/rc.conf.+# make clean 
-cp -f /usr/ports/security/bitwarden_rs/files/bitwarden_rs_conf.in /usr/ports/security/bitwarden_rs/work/stage//usr/local/etc/rc.conf.d/bitwarden_rs.sample +# make config 
-/bin/mkdir -p /usr/ports/security/bitwarden_rs/work/stage//usr/local/www/bitwarden_rs + 
-/bin/mkdir -p /usr/ports/security/bitwarden_rs/work/stage//usr/local/www/bitwarden_rs/data +# make 
-(cd /usr/ports/security/bitwarden_rs/work && /bin/sh -c '(/usr/bin/find -Ed $1 $3 | /usr/bin/cpio -dumpl $2 >/dev/null 2>&1) &&  /usr/bin/find -Ed $1 $3 \(   -type d -exec /bin/sh -c '\''cd '\''$2'\'' && chmod 755 "$@"'\'' {} +  -o -type f -exec /bin/sh -c '\''cd '\''$2'\'' && chmod 0644 "$@"'\'' . {} + \)' COPYTREE_SHARE web-vault /usr/ports/security/bitwarden_rs/work/stage//usr/local/www/bitwarden_rs) +... 
-echo  '@postexec chown -R www:www %D/www/bitwarden_rs/data >> /usr/ports/security/bitwarden_rs/work/.PLIST.mktmp+ 
 +warning: `vaultwarden` (bin "vaultwarden") generated 11 warnings 
 +    Finished release [optimized] target(s) in 0.16s 
 +  Installing /var/ports/usr/ports/security/vaultwarden/work/stage/usr/local/bin/vaultwarden 
 +   Installed package `vaultwarden v1.0.0 (/var/ports/usr/ports/security/vaultwarden/work/vaultwarden-1.30.0)` (executable `vaultwarden`) 
 +warning: be sure to add `/var/ports/usr/ports/security/vaultwarden/work/stage/usr/local/bin` to your PATH to be able to run the installed binaries 
 +/bin/mkdir -p /var/ports/usr/ports/security/vaultwarden/work/stage//usr/local/www/vaultwarden/data 
 +install -m0600 /usr/ports/security/vaultwarden/files/vaultwarden_conf.in /var/ports/usr/ports/security/vaultwarden/work/stage//usr/local/www/vaultwarden/data/config.json.sample
 ====> Compressing man pages (compress-man) ====> Compressing man pages (compress-man)
 ===> Staging rc.d startup script(s) ===> Staging rc.d startup script(s)
-===>  Installing for bitwarden_rs-1.19.0_1 
-===>  Checking if bitwarden_rs is already installed 
-===>   Registering installation for bitwarden_rs-1.19.0_1 
-pkg-static: duplicate file listing: /usr/local/etc/rc.d/bitwarden_rs, ignoring 
-Installing bitwarden_rs-1.19.0_1... 
  
-Setup bitwarden_rs environment:+# make install 
 +===>  Installing for vaultwarden-1.30.0_1 
 +===>  Checking if vaultwarden is already installed 
 +===>   Registering installation for vaultwarden-1.30.0_1 
 +Installing vaultwarden-1.30.0_1... 
 +===> Creating groups. 
 +Using existing group 'www'
 +===> Creating users 
 +Using existing user 'www'
 +===> SECURITY REPORT 
 +      This port has installed the following files which may act as network 
 +      servers and may therefore pose a remote security risk to the system. 
 +/usr/local/bin/vaultwarden
  
-Copy /usr/local/etc/rc.conf.d/bitwarden_rs.sample to  /usr/local/etc/rc.conf.d/bitwarden_rs+      If there are vulnerabilities in these programs there may be a security 
 +      risk to the systemFreeBSD makes no guarantee about the security of 
 +      ports included in the Ports CollectionPlease type 'make deinstall' 
 +      to deinstall the port if this is a concern.
  
-Adapt /usr/local/etc/rc.conf.d/bitwarden_rs to your needs.+      For more information, and contact details about the security 
 +      status of this software, see the following webpage:  
 +https://github.com/dani-garcia/vaultwarden 
 + 
 +# make clean
 </code> </code>
 +
 +
 +=== Konfiguration von vaultwarden ===
 +
 +  > touch /var/log/vaultwarden.log
 +  > chown www:www /var/log/vaultwarden.log
 +
 +<file bash /usr/local/etc/rc.conf.d/vaultwarden>
 +#------------------------------------------------------------------------------#
 +vaultwarden_enable="YES"
 +
 +#Warning : Some of these settings may be overridden when changing settings on the admin page or in the config.json file
 +#located by default at: /usr/local/www/vaulwarden/data/config.json
 +
 +LOG_FILE='/var/log/vaultwarden.log'
 +export LOG_FILE
 +
 +ROCKET_ADDRESS=::1
 +export ROCKET_ADDRESS
 +
 +ROCKET_PORT=4567 # your port here
 +export ROCKET_PORT
 +
 +# ROCKET_TLS='{certs = "/ssl/fullchain.pem", key = "/ssl/key.pem"}'
 +# LOG_FILE='/data/bitwarden.log'
 +
 +SIGNUPS_ALLOWED=false
 +export SIGNUPS_ALLOWED
 +
 +SIGNUPS_VERIFY=true
 +export SIGNUPS_VERIFY
 +
 +INVITATIONS_ALLOWED=false
 +export INVITATIONS_ALLOWED
 +
 +DOMAIN='https://vaultwarden.domain.de'
 +export DOMAIN
 +
 +# ADMIN_TOKEN= # generate one with ~$ openssl rand -base64 48
 +# export ADMIN_TOKEN
 +
 +SMTP_HOST='mailout.domain.de'
 +export SMTP_HOST
 +
 +SMTP_FROM='vaultwarden@domain.de'
 +export SMTP_FROM
 +
 +SMTP_PORT=465
 +export SMTP_PORT
 +
 +SMTP_SECURITY=force_tls
 +export SMTP_SECURITY
 +
 +SMTP_USERNAME='mailbenutzer'
 +export SMTP_USERNAME
 +
 +SMTP_PASSWORD='Motivate7-Sulphate7-Operate6-Contact3-Habitat9'
 +export SMTP_PASSWORD
 +
 +# Beta feature
 +# ORG_GROUPS_ENABLED=false
 +# export ORG_GROUPS_ENABLED
 +</file>
 +
 +<file c /home/etc/nginx/conf.d/vaultwarden.domain.de.conf>
 +# https://github.com/dani-garcia/vaultwarden/wiki
 +
 +### vaultwarden
 +upstream vaultwarden {
 + zone vaultwarden 64k;
 + server [::1]:4567;
 + keepalive 2;
 +}
 +
 +# Needed to support websocket connections
 +# See: https://nginx.org/en/docs/http/websocket.html
 +# Instead of "close" as stated in the above link we send an empty value.
 +# Else all keepalive connections will not work.
 +map $http_upgrade $connection_upgrade {
 +    default upgrade;
 +    ''      "";
 +}
 +
 +server {
 +    listen [::]:443 ssl http2;
 +    server_name vaultwarden.domain.de;
 +
 + include /home/etc/nginx/snippets/header.conf;
 +
 + client_max_body_size 525M;
 +
 +    location / {
 + include /home/etc/nginx/snippets/proxy.conf;
 +        proxy_pass http://vaultwarden;
 +    }
 +}
 +</file>
  
  
/home/http/wiki/data/attic/bitwarden.1712168275.txt · Zuletzt geändert: von manfred