# Default values for vaultwarden. database: # Database type, must be one of: 'sqlite', 'mysql' or 'postgresql'. type: postgresql # Enable DB Write-Ahead-Log for SQLite, disabled for other databases. https://github.com/dani-garcia/vaultwarden/wiki/Running-without-WAL-enabled wal: true ## URL for external databases (mysql://user:pass@host:port/database-name or postgresql://user:pass@host:port/database-name). url: "postgresql://vaultwarden:0UnBYmhT7LZ1GePohx13zRxIKM30TZA0m3GZTjgFh0dBiwENwOtZZqcPlyhMXIUD@home-postgres.db.svc.cluster.local:5432/vw" ## Use existing secret for database URL, key 'database-url'. existingSecret: vw-home-vaultwarden ## Use a different key for the existing secret. #existingSecretKey: ## Set the size of the database connection pool. #maxConnections: 10 ## Connection retries during startup, 0 for infinite. 1 second between retries. #retries: 15 # Set vaultwarden application variables vaultwarden: ## Set Bitwarden URL, mandatory for invitations over email. Recommended if using a reverse proxy / ingress. Format is https://name or http://name #domain: # Allow any user to sign-up: https://github.com/dani-garcia/vaultwarden/wiki/Disable-registration-of-new-users allowSignups: true ## Whitelist domains allowed to sign-up. 'allowSignups' is ignored if set. #signupDomains: # - domain.tld # Verify e-mail before login is enabled. SMTP must be enabled. verifySignup: false # When a user logs in an email is required to be sent. If sending the email fails the login attempt will fail. SMTP must be enabled. requireEmail: false ## Maximum attempts before an email token is reset and a new email will need to be sent. #emailAttempts: 3 ## Email token validity in seconds. #emailTokenExpiration: 600 # Allow invited users to sign-up even feature is disabled: https://github.com/dani-garcia/vaultwarden/wiki/Disable-invitations allowInvitation: true ## Number of hours after which an organization invite token, emergency access invite token, ## email verification token and deletion request token will expire #invitationExpiration: 120 ## Allow users to set password hints. Applies to all users. #passwordHintsAllowed: true # Show password hints: https://github.com/dani-garcia/vaultwarden/wiki/Password-hint-display showPasswordHint: false ## Default organization name in invitation e-mails that are not coming from a specific organization. #defaultInviteName: "" # Enable Web Vault (static content). https://github.com/dani-garcia/vaultwarden/wiki/Disabling-or-overriding-the-Vault-interface-hosting enableWebVault: true # Enable Bitwarden Sends globally enableSends: true # Restrict creation of orgs. Options are: 'all', 'none' or a comma-separated list of users. orgCreationUsers: all ## Limit attachment disk usage per organization. #attachmentLimitOrg: ## Limit attachment disk usage per user. #attachmentLimitUser: ## Limit send disk usage per user. #sendLimitUser: ## HaveIBeenPwned API Key. Can be purchased at https://haveibeenpwned.com/API/Key. #hibpApiKey: ## Number of days to auto-delete trashed items. By default iteams are not auto-deleted. #autoDeleteDays: ## Organization event logging #orgEvents: false ## Organization event retation. Leave empty to not delete. #orgEventsRetention: "" ## Allow users to change their email. #emailChangeAllowed: true ## Map of custom environment variables. Use carefully. #extraEnv: # IP_HEADER: CF-Connecting-IP # ALLOWED_IFRAME_ANCESTORS: myintranet.local # COOL_VARIABLE: # secretKeyRef: # name: my-secret # key: my-secret-key # ANOTHER_VARIABLE: # configMapKeyRef: # name: my-config-map # key: my-config-map-key admin: # Enable admin portal. enabled: true # Disabling the admin token will make the admin portal accessible to anyone, use carefully: https://github.com/dani-garcia/vaultwarden/wiki/Disable-admin-token disableAdminToken: false ## Token for admin login, will be generated if not defined. https://github.com/dani-garcia/vaultwarden/wiki/Enabling-admin-page #token: ## Use existing secret for the admin token. Key is 'admin-token'. #existingSecret: vaultwarden emergency: # Allow any user to enable emergency access. enabled: true ## Schedule to send expiration reminders to emergency access grantors. Cron schedule format. #reminder: "0 3 * * * *" ## Schedule to grant emergency access requests that have met the required wait time. Cron schedule format. #timeout: "0 3 * * * *" # Enable SMTP. https://github.com/dani-garcia/vaultwarden/wiki/SMTP-configuration smtp: enabled: false # SMTP hostname, required if SMTP is enabled. host: "" # SMTP sender e-mail address, required if SMTP is enabled. from: "" ## SMTP sender name, defaults to 'Vaultwarden'. #fromName: "" # Enable secure SSL connection. Options are: "starttls", "force_tls" and "off" # Users migrating from 1.24 or lower using ssl/explicitTLS settings: # ssl = false -> "off" # ssl = true and explicitTLS = false -> "starttls" # ssl = true and explicitTLS = true -> "force_tls" security: starttls ## SMTP port. Defaults depends on security: 465 for "force_tls", 587 for "starttls" and 25 for "off" #port: 587 ## SMTP Authentication Mechanisms. Comma-separated options: 'Plain', 'Login' and 'Xoauth2'. Defaults to 'Plain'. #authMechanism: Plain ## Hostname to be sent for SMTP HELO. Defaults to pod name. #heloName: "" ## SMTP timeout. #timeout: 15 ## Accept SSL session if certificate is valid but hostname doesn't match. DANGEROUS, vulnerable to men-in-the-middle attacks! #invalidHostname: false ## Accept invalid certificates. DANGEROUS, vulnerable to men-in-the-middle attacks! #invalidCertificate: false ## SMTP username. #user: "" ## SMTP password. Required is user is specified, ignored if no user provided. #password: "" ## Use existing secret for SMTP authentication. Keys are 'smtp-user' and 'smtp-password'. #existingSecret: ## Embed images as email attachments #embedImages: true ## Enable Yubico OPT authentication. https://github.com/dani-garcia/vaultwarden/wiki/Enabling-Yubikey-OTP-authentication yubico: enabled: false ## Yubico server. Defaults to YubiCloud. #server: ## Yubico ID and Secret Key. #clientId: #secretKey: ## Use existing secret for Yubico. Keys are 'yubico-client-id' and 'yubico-secret-key'. #existingSecret: ## Logging options. https://github.com/dani-garcia/vaultwarden/wiki/Logging log: # Log to file. file: "" # Log level. Options are "trace", "debug", "info", "warn", "error" or "off". level: "" ## Log timestamp format. See https://docs.rs/chrono/0.4.15/chrono/format/strftime/index.html. Defaults to time in milliseconds. #timeFormat: "" icons: ## Icon download service. "internal" to fetch icons directly, otherwise options are: "bitwarden", "duckduckgo" or "google" #service: internal # Disables download of external icons on internal service. Setting to true will still serve icons from cache (/data/icon_cache). TTL will default to zero. disableDownload: false ## Cache time-to-live for icons fetched. 0 means no purging. #cache: 2592000 ## Cache time-to-live for icons that were not available. 0 means no purging. #cacheFailed: 259200 ## HTTP code for redirect to external icon service #redirectCode: 302 # Push notifications. https://github.com/dani-garcia/vaultwarden/wiki/Enabling-Mobile-Client-push-notification push: enabled: false ## Installation ID from Bitwarden. #installationId: ## Installation Key from Bitwarden. #installationKey: ## Relay URI #relayUri: ## Identity URI #identityUri: ## Use existing secret for Push notifications. Keys are 'push-id' and 'push-key'. #existingSecret: service: type: ClusterIP httpPort: 80 externalTrafficPolicy: Cluster # loadBalancerIP: nodePorts: # Choose NodePorts manually http: "" # Kubernetes Ingress ingress: enabled: true className: "nginx" host: "warden.ervine.cloud" annotations: {} # kubernetes.io/ingress.class: nginx # kubernetes.io/tls-acme: "true" tls: - secretName: warden-ervine-cloud-tls hosts: - warden.ervine.cloud # Traefik IngressRoute CRD ingressRoute: enabled: false # Starting on Traefik 2.10, the IngressRoute CRD moved to traefik.io namespace newCRD: false # Mandatory to enable IngressRoute host: "" entrypoints: - websecure ## Enable Traefik middlewares middlewares: {} # - name: my_middleware # namespace: default tls: {} #certResolver: letsencrypt persistence: enabled: true size: 1Gi accessMode: ReadWriteOnce ## Persistent Volume storage class # storageClass: "-" ## Use existing Persistent Volume Claim existingClaim: vw-home-vaultwarden ## Annotations to add to the Persistent Volume Claim annotations: {} # Use custom volume definition. Cannot be used with persistence. customVolume: {} #hostPath: # path: "/examplefolder/vaultwarden" # Additional volumes, to be used by sidecars #additionalVolumes: [] image: pullPolicy: IfNotPresent repository: vaultwarden/server tag: "" imagePullSecrets: [] nameOverride: "" fullnameOverride: "" replicaCount: 1 serviceAccount: # Specifies whether a service account should be created create: false # Annotations to add to the service account annotations: {} # The name of the service account to use. # If not set and create is true, a name is generated using the fullname template name: "" podAnnotations: {} podLabels: {} # Annotations to add to the Deployment deploymentAnnotations: {} # Readiness and Liveness probes probes: {} #liveness: #timeoutSeconds: 1 #periodSeconds: 10 #successThreshold: 1 #failureThreshold: 3 #readiness: #timeoutSeconds: 1 #periodSeconds: 10 #successThreshold: 1 #failureThreshold: 3 # initContainers containers, add container spec (https://kubernetes.io/docs/reference/kubernetes-api/workload-resources/pod-v1/#Container) # No templating possible, values need to be hardcoded initContainers: [] # - name: initcontainer # image: initcontainer:1.2.3 # env: # - name: INITCONTAINER_END # value: "initcontainer" # volumeMounts: # - name: vaultwarden # mountPath: /data # Sidecar containers, add container spec (https://kubernetes.io/docs/reference/kubernetes-api/workload-resources/pod-v1/#Container) # No templating possible, values need to be hardcoded sidecars: [] # - name: sidecar # image: sidecarimage:1.2.3 # env: # - name: SIDECAR_END # value: "sidecar" # volumeMounts: # - name: vaultwarden # mountPath: /data podSecurityContext: fsGroup: 65534 securityContext: runAsUser: 65534 runAsGroup: 65534 strategy: {} resources: {} # We usually recommend not to specify default resources and to leave this as a conscious # choice for the user. This also increases chances charts run on environments with little # resources, such as Minikube. If you do want to specify resources, uncomment the following # lines, adjust them as necessary, and remove the curly braces after 'resources:'. # limits: # cpu: 100m # memory: 128Mi # requests: # cpu: 100m # memory: 128Mi nodeSelector: {} tolerations: [] affinity: {}