On other app instances I find a way to remove them. Am I missing or not seeing the one for vaultwarden in the status window for Vailtwarden page?
remove module --no-preserve moduleid1
should remove the app you need from CLI
and no he did not mean removing it altogether, he meant just setting new settings on the App settings page, and saving the details to re-apply them.
The One shown on the app settings page is not the actual, since the actual is encoded by Vaultwarden, we cant know for sure and only vaultwarden Knows the value, unless we save it seprately for your convenience, i think its rather better if its not stored by Us, but you the user stores it somewhere safe.
Don’t you think?
@Shadowfire were able to sort it out
I have realized that on the first time installation that the admin token that will be set you can’t update change it
and it seems not be a Nethserver Issue Alone. @kemboielvis22 Could you retest this case using a new Coolify Deployment of Vaultwarden.
Yes, I saved the settings (applied them again). Did not fix it.
As soon as I get back to the office later today I will check it out further.
Thanks for the feedback on this.
Okay i will check and investigate further
Going by these here: GitHub - geniusdynamics/ns8-vaultwarden
A potential Way of Pre-implementing Ldap in VAultwarden
Ldap Configuration for Vaultwarden
Implement a new Service in VAultwaden with
GitHub - ViViDboarder/vaultwarden_ldap: Automate LDAP invites to Vaultwarden which will send an invitation to any member of the group vaultwarden
.
Replace dc=example,dc=com
with your LLDAP configured domain.
docker-compose.yml
to run vaultwarden_ldap
version: '3'
services:
ldap_sync:
image: vividboarder/vaultwarden_ldap:0.6-alpine
volumes:
- ./config.toml:/config.toml:ro
environment:
CONFIG_PATH: /config.toml
RUST_BACKTRACE: 1
restart: always
Configuration to use LDAP in config.toml
vaultwarden_url = "http://your_bitwarden_url:port"
vaultwarden_admin_token = "insert_admin_token_vaultwarden"
ldap_host = "insert_ldap_host"
ldap_port = 3890
ldap_bind_dn = "uid=admin,ou=people,dc=example,dc=com"
ldap_bind_password = "insert_admin_pw_ldap"
ldap_search_base_dn = "dc=example,dc=com"
ldap_search_filter = "(&(objectClass=person)(memberOf=uid=vaultwarden,ou=groups,dc=example,dc=com))"
ldap_sync_interval_seconds = 300
Will check every 300 seconds your ldap group vaultwarden
and send an invitation by email to any new member of this group.
We could implement a ExecCondition=/bin/sh -c ‘[ -n “$ldap_host” ]’
based on below to start the service only if Ldap was selected… systemd.service
This could Also potentially be another APP, that Does this, which connects to an existing Vaultwarden Instance.
the longest running PR, that impelments OIDC for Vaultwarden has now been merged: SSO using OpenID Connect by Timshel · Pull Request #3899 · dani-garcia/vaultwarden
On the description it states as a document server, but I believe it’s a password manager?
Thanks,
I guess that is a leftover of copy and paste. Small error.
Please also see the wiki.
Hi, there is a new Version of vaultwarden yet to be merged, We need help testing the new VErsion:
geniusdynamics/ns8-vaultwarden at dev
Fresh Install
add-module ghcr.io/geniusdynamics/vaultwarden:dev 1
Test Cases
- Test Backup
- Test Restore
- Verify Admin Keys on UI
** Update to New Version**
Install Previous Version first
add-module ghcr.io/geniusdynamics/vaultwarden:1.0.0 1
Then Update to New Version
api-cli run update-module --data '{"module_url":"ghcr.io/geniusdynamics/vaultwarden:dev","instances":["vaultwarden"],"force":true}'
Test Cases
- Update Works, and retains Data
- Login to Admin page works
On Separate Note: Vaultwarden Support SSH Authentication KEys