Bitwarden is an open source option that does an outstanding job of keeping your passwords locked away and does so with a user interface that is easy enough for any user, regardless of experience.
Latest versionReleased:
Simple bitwarden CLI written in Python to list and decrypt secrets
This is an unofficial port of the Bitwarden NodeJS CLI to Pythonfocused on decryption of secrets with increased performance
This tool do not replace the official NodeJs CLI of Bitwarden. You still need it to perform auth, unlock and sync operations.
First, ensure that your bitwarden vault in unlocked and that you register the BW_SESSION in your environment.
The script currently handles the decryption of the following entities and fields:
It supports decryption of personal and organization ciphers.
We use Ansible to manage infrastructures and use a lookup plugin to grab hundred of secrets. Each secret is retrievenwith the native NodeJS CLI in about 0.85s on my computer. When you have hundreds of secrets, that makes long minutes to wait.
According to https://github.com/bitwarden/cli/issues/67, node looks like to suffer from slow bootstrap.
This port to Python is aimed to increase secrets lookup performance. First benchmarks spotted that secrets could beretrieven in around 0.15s with this port.
Development requirements are listed in requirements/dev.txt
Testing is done through pytest
. A sample database unlocked with BW_SESSION
are provided.
GPLv3
1.3.1
1.2.8
1.2.7
1.2.6
1.2.5
1.2.4
1.2.3
1.2.1
1.2
1.1.1
1.0
Download the file for your platform. If you're not sure which to choose, learn more about installing packages.
Filename, size | File type | Python version | Upload date | Hashes |
---|---|---|---|---|
Filename, size bitwarden simple cli-1.3.1.linux-x86_64.tar.gz (40.9 kB) | File type Source | Python version None | Upload date | Hashes |
Filename, size bitwarden_simple_cli-1.3.1-py3-none-any.whl (42.7 kB) | File type Wheel | Python version py3 | Upload date | Hashes |
Algorithm | Hash digest |
---|---|
SHA256 | 64218534b876a50846cd369bf038c5e940bf70b7b2d9cc95e7c4a4de5d5d9767 |
MD5 | eaba2478bc5a5d90870fd85df3c02941 |
BLAKE2-256 | d13b82e16053fb4ecc3e047ff34bb51c23537c77b94ec2bc6194c3f0bfb45422 |
Algorithm | Hash digest |
---|---|
SHA256 | 26f4ca753b765551a3e6882e69c0dce072a7aa4d0e2a7c8145b66e705276577a |
MD5 | 3d5063ef4e9f3a6b86f4a81e86689f81 |
BLAKE2-256 | 6e9290dc8991647c98e56311c520888b81f3fff77337dbae33203339535a33e1 |
To install any of the DietPi optimised software listed below run from the command line:
Choose Software Optimised and select one or more items. Finally click on Install
. DietPi will do all the necessary steps to install and start these software items.
To see all the DietPi configurations options, review DietPi Tools section.
The ownCloud package turns your DietPi system into your very own personal cloud based backup/data storage system (e.g.: Dropbox).
Also Installs:
http://<your.IP>/owncloud
admin
<your global password>
If you may want to configure your ownCloud from command line via occ
command see the ownCloud admin manual.
To simplify this configuration, DietPi has added a shortcut to the otherwise necessary sudo -u www-data php /var/www/owncloud/occ
.
Just use inside your terminal:
Option: Use the updater script from console (recommended):
Follow the official documentation for a manual upgrade process: https://doc.owncloud.com/server/admin_manual/maintenance/manual_upgrade.html
Where is my data stored?
/mnt/dietpi_userdata/owncloud_data
(or dietpi.txt
choice)
Why am I limited to 2 GiB file size uploads?
DietPi will automatically apply the max supported upload size to the PHP and ownCloud configs.
echo -e '$(( $(php -r 'print(PHP_INT_MAX);') / 1024 / 1024))MB'
Will my data be saved after deinstallation?
Your userdata directory will stay after deinstallation.
As well a database backup will be saved to your userdata directory. Thus you can easily restore your instance by reinstalling ownCloud and restore the database dump.
Website: https://owncloud.com
Official documentation: https://doc.owncloud.org/server/admin_manual
YouTube video tutorial: How to Install DietPi OwnCloud on Raspberry Pi.
Nextcloud gives you access to all your files wherever you are. Store your documents, calendar, contacts and photos on a server at home, at one of our providers or in a data center you trust.
Access the web interface using the next URL when running on SBC (http://localhost/nextcloud/
) or the IP address / hostname of your DietPi device (e.g.: http://192.168.0.100/nextcloud/
).
admin
<your global password>
Nextcloud is installed together with the webserver. To fast access the files, a dedicated USB hard drive is highly recommended.
For an advanced setup you could further configure your Nextcloud setup from the command line - see the Nextcloud Admin guide.
To simplify this configuration, DietPi has added a shortcut to the otherwise necessary sudo -u www-data php /var/www/nextcloud/occ
.
Just use inside your terminal:
Nextcloud offers built-in brute force protection and additionally a plugin Brute-force settings.
This will delay your login rate in case of several failed login attempts.
This protection can be extended with Fail2Ban (see following tab).
See also:
Using Fail2Ban your can block users after failed login attempts. This hardens your system, e.g. against brute force attacks.
Set options in the Nextcloud configuration file (typical /var/www/nextcloud/config/config.php
):
Add trusted domains if not already set via the 'trusted_domains'
entry.
The entry of the trusted domains is important, because one of the Fail2Ban regular expressions in the Fail2Ban filter file (“Trusted domain error”, see below) deals with trusted domain login errors. By default, if you login via a non trusted domain, Nextcloud will show an error login dialog.
Attention
Take care, if you use this “Trusted domain error” failregex
option and you then reload the page several times (more often than maxretry
value in the Fail2Ban jail file) you lockout yourself also for logging in via a trusted domain from the IP address you are using.
log file options: These are set to appropriate values by default (e.g. log_level
, log_type
) resp. DietPi defaults (logfile
via SOFTWARE_NEXTCLOUD_DATADIR
within /boot/dietpi.txt
), so that they do not need to be set as sometimes otherwise described.
Create new Fail2Ban filter (e.g. /etc/fail2ban/filter.d/nextcloud.conf
):
Create new Fail2Ban jail file/etc/fail2ban/jail.d/nextcloud.local
:
Check whether the logpath
is identical to the value in the Nextcloud configuration file (config.php
see above).
As not specified here, Fail2Ban uses properties like maxretry
, bantime
, etc. from /etc/fail2ban/jail.conf
or /etc/fail2ban/jail.local
(if present). Note the setting backend = auto
. By default, backend
is set to systemd
in /etc/fail2ban/jail.conf
. As a result, Fail2Ban ignores the logpath
entry here in the jail nextcloud.conf
, with the consequence, that Fail2Ban does not recognize an attack on Nextcloud (port 80, 443) even though attacks are listed in /mnt/dietpi_userdata/nextcloud_data/nextcloud.log
.
Restart Fail2Ban: systemctl restart fail2ban
.
maxretry
attempts your IP must be banned for bantime
seconds (DietPi does not respond anymore) as the default action by Fail2Ban is route
, specified in /etc/fail2ban/action.d/route.conf
.fail2ban-client status nextcloud
.Option: Use the updater script from console (recommended):
Follow the official documentation for a manual upgrade process: https://docs.nextcloud.com/server/latest/admin_manual/maintenance/manual_upgrade.html
Where is my data stored?
/mnt/dietpi_userdata/nextcloud_data
(or dietpi.txt
choice)
Why am I limited to 2GB file size uploads?
DietPi will automatically apply the max supported upload size to the PHP and Nextcloud configs.
Will my data be saved after deinstallation?
Your user data directory will stay after deinstallation. As well a database backup will be saved to your user data directory. Thus you can easily restore your instance by reinstalling Nextcloud and restore the database dump.
Website: https://nextcloud.com/athome
Official documentation: https://docs.nextcloud.com/server/latest/admin_manual/contents.html
YouTube video tutorial #1: DietPi Nextcloud Setup on Raspberry Pi 3 B Plus.
YouTube video tutorial #2: DietPi Docker Nextcloud External Storage Setup with SAMBA SERVER on RPI3B
Host video calls on your own Nextcloud instance. The TURN server Coturn will be installed and configured as well to allow reliable video calls through outside the local network, NAT and firewall setups.
Also installs:
During installation you will be asked to enter the external server domain and a port, that you want to use for the Coturn TURN server. Note that you need to forward the chosen port and/or open it in your firewall.
If HTTPS was or is enabled via dietpi-letsencrypt
, Coturn will be configured to use the LetsEncrypt certificates for TLS connections on the chosen TURN server port automatically.
Coturn by default will listen to non-TLS requests as well on the port configured in /etc/turnserver.conf
. You can force TLS/control this by switching port forwarding in your router and/or opening/dropping ports in your firewall.
Coturn logging by default is disabled via /etc/default/coturn
command arguments, since it is very verbose and produces much disk I/O. You can enable and configure logging via /etc/turnserver.conf
, if required.
Website: https://nextcloud.com/talk
Pydio is a feature-rich backup and sync server with web interface. Similar to ownCloud with vast configuration options to meet your “cloud” needs.
Also Installs:
CLICK HERE TO CONTINUE TO PYDIO
.start wizard >
button to begin.>>
button.MySQL
localhost
pydio
pydio
dietpi
>>
button.Install Pydio
button.Once the server has been configured (as per above):
http://<your.IP>/pydio
(replace IP with your system IP)Website: https://pydio.com
UrBackup Server is an Open Source client/server backup system, that through a combination of image and file backups accomplishes both data safety and a fast restoration time.
Basically, it allows you to create a complete system backup, using a simple web interface, for systems on your network.
The web interface is accessible via port 55414:
URL = http://<your.IP>:55414
Remark: Change the IP address for your system.
The location of the backups can be changed in the web interface:
Settings
./mnt/dietpi_userdata/urbackup
is recommended.Save
.systemctl restart urbackupsrv
.Install the appropriate client on the systems you wish to backup from https://www.urbackup.org/download.html#client_windows.
Website: https://www.urbackup.org/index.html
Your very own GitHub style server, with web interface.
The web interface is accessible via port 3000:
http://<your.IP>:3000
Has to be done once, when connected to the web interface:
MySQL
gogs
<your global password>
/mnt/dietpi_userdata/gogs-repo
gogs
/var/log/gogs
anyone@anyemail.com
http://<your.IP>:3000
)If you wish to allow external access to your Gogs server, you will need to setup port forwarding on your router, pointing to the IP address of your DietPi device.
Website: https://gogs.io
Your very own GitHub style server, with web interface.
The web interface is accessible via port 3000:
http://<your.IP>:3000
Has to be done once, when connected to the web interface:
gitea
dietpi
/mnt/dietpi_userdata/gitea/gitea-repositories
/var/log/gitea
http://<your.IP>:3000
)If you wish to allow external access to your Gitea server, you will need to setup port forwarding on your router, pointing to the IP address of your DietPi device.
If an external access is used, the activation of the package Let’s Encrypt - Enable HTTPS / SSL is strongly recommended to increase your system security.
Using Fail2Ban your can block users after failed login attempts. This hardens your system, e.g. against brute-force attacks.
Create new filter /etc/fail2ban/filter.d/gitea.conf
:
Create new jail /etc/fail2ban/jail.d/gitea.conf
:
As not specified here, Fail2Ban uses properties like maxretry
, bantime
, etc. from /etc/fail2ban/jail.conf
or /etc/fail2ban/jail.local
(if present). Note the setting backend = auto
. By default, backend
is set to systemd
in /etc/fail2ban/jail.conf
. As a result, Fail2Ban ignores the logpath
entry here in the jail gitea.conf
, with the consequence, that Fail2Ban does not recognize an attack on Gitea (port 3000) even though attacks are listed in /var/log/gitea/gitea.log
.
Restart Fail2Ban: systemctl restart fail2ban
.
maxretry
attempts your IP must be banned for bantime
seconds (DietPi does not respond anymore) as the default action by Fail2Ban is route
, specified in /etc/fail2ban/action.d/route.conf
.fail2ban-client status gitea
.You can easily update Gitea by reinstalling it. Your settings and data are preserved by this:
Website: https://gitea.io
Backup and sync server with web interface. Extremely lightweight and efficient as no webserver is required.
The web interface is accessible via port 8384:
URL = http://<your.IP>:8384
Has to be done once, when connected to the web interface.
Danger! Please set a GUI Authentication User and Password in the Settings dialog.
box appears, click the settings
button inside the box.GUI Authentication User
and GUI Authentication Password
: Enter new login details you would like to use for access to the web interface. Then click save
.DietPi will automatically setup your default folder share to /mnt/dietpi_userdata
.
In this example we will use a Windows system. The goal is to “sync” the user data from your DietPi device with another system.
syncthing.exe
: https://syncthing.net/downloads/.http://127.0.0.1:8384/
.Actions
at the top right, then select Show ID
. Copy the UUID code.Add remote device
(bottom right).Device ID
, paste in the UUID we copied earlier.Device name
, enter any name. e.g.: My Windows PC.Share Folders With Device
tick/select DietPi user data, then click save
.http://127.0.0.1:8384/
. You should receive a message asking you to confirm the new device, click Add Device
.Share Folders With Device
tick/select DietPi user data, then click save
.You devices should now duplicate the user data from your DietPi device to your Windows PC.
Website: https://syncthing.net
It is an open source Kubernetes Native, High Performance Object Storage (S3 Compatible). It helps building cloud-native data infrastructure for machine learning, analytics and application data workloads.
The web interface is accessible via port 9000:
http://<your.IP>:9000
Website: https://min.io/product/overview
Official documentation: https://docs.min.io
This is Mozilla’s Firefox Sync Server which manages syncing Firefox instance bookmarks, history, tabs and passwords across devices. Out of the box it runs on a Python server for small loads and can be configured to run behind Nginx or Apache.
about:config
to access advanced settings.identity.sync.tokenserver.uri
.http://<your.IP>:5000/token/1.0/sync/1.5
.public_url
setting inside the config file /mnt/dietpi_userdata/firefox-sync/syncserver.ini
to contain your public IP or domain and desired port./opt/firefox-sync
/mnt/dietpi_userdata/firefox-sync
/mnt/dietpi_userdata/firefox-sync/syncserver.ini
View the logs by executing:
You can easily update the Firefox Sync Server by reinstalling it. Your settings and data are preserved by this:
Source code: mozilla-services/syncserver
Credits: This software title has been added to DietPi-Software by CedArctic, many thanks! :D
Bitwarden_RS is an unofficial Bitwarden password manager server with web interface, written in Rust.
dietpi-letsencrypt
and setup either a reverse proxy, or configure Bitwarden_RS to use the retrieved key and certificate directly via ROCKET_TLS setting in the config file (see “Directories” tab).The web interface is accessible via port 8001:
https://<your.IP>:8001
Any official Bitwarden client will work: https://bitwarden.com/download
https://<your.IP>:8001
into the custom server field./opt/bitwarden_rs
/mnt/dietpi_userdata/bitwarden_rs
/mnt/dietpi_userdata/bitwarden_rs/bitwarden_rs.env
Official documentation: https://github.com/dani-garcia/bitwarden_rs/wiki
Forum: https://bitwardenrs.discourse.group
Source code: dani-garcia/bitwarden_rs
Open-source license: GPLv3
Credits: This software title has been added to DietPi-Software by CactiChameleon9. Thank you!
FuguHub transforms your DietPi device into a secure online storage system, letting you access and share files from any connected computer or device.
Open the browser http://<your.IP>
.
On the first access, an admin account needs to be created to log in with (to fully control the FuguHub app).
FuguHub runs by default on port 80 and optional 443, making it incompatible with a regular webserver using the default setup.
VPS
or N for home/office
serverIt is recommended to use the a dedicated BitTorrent server, if required: https://dietpi.com/docs/software/bittorrent/
Setup details:
/home/bd
/home/bd/bdd.conf
/mnt/dietpi_userdata/fuguhub-data
journalctl -u bdd
/home/bd/trace/
Website: https://fuguhub.com