vps/secrets.yml.example

72 lines
1.5 KiB
Text
Raw Normal View History

2024-03-31 18:26:05 +02:00
# To generate random secret: openssl rand -base64 <length>
2024-02-17 19:01:04 +01:00
ansible_become_password:
borg_passphrase:
2024-02-17 19:01:04 +01:00
cifs_credentials:
username:
password:
2024-03-31 18:26:05 +02:00
authelia_secrets:
# Encryption key for the database, must be saved
encryption_key:
2024-05-09 11:22:22 +02:00
hmac_secret:
jwks_key: | # openssl genrsa 4096
2024-03-31 18:26:05 +02:00
jwt_secret:
# LDAP bind dn
ldap_user:
ldap_password:
postgres_user:
postgres_password:
smtp_user:
smtp_password:
2024-05-09 11:22:22 +02:00
2024-02-17 19:01:04 +01:00
coturn_secrets:
static_auth_secret:
hedgedoc_secrets:
postgres_user:
postgres_password:
session_secret:
2024-02-17 19:01:04 +01:00
2024-03-30 17:28:32 +01:00
lldap_secrets:
jwt_secret:
key_seed:
postgres_user:
postgres_password:
mailserver_secrets:
admin_user:
# Hash obtained with openssl passwd -6
admin_secret:
ldap_user:
ldap_password:
postgres_user:
postgres_password:
2024-02-17 19:01:04 +01:00
searxng_secrets:
searxng_secret:
synapse_secrets:
2024-05-09 11:22:22 +02:00
# docker run --rm authelia/authelia:4 authelia crypto rand --length 72 --charset rfc3986
oidc_client_id:
# Generate random secret + hash : docker run --rm authelia/authelia:4 authelia crypto hash generate pbkdf2 --variant sha512 --random --random.length 72 --random.charset rfc3986
oidc_client_secret:
oidc_client_secret_hash:
2024-03-16 20:34:38 +01:00
smtp_user:
smtp_pass:
postgres_user:
2024-02-17 19:01:04 +01:00
postgres_password:
turn_shared_secret: "{{ coturn_secrets['static_auth_secret'] }}"
macaroon_secret_key:
form_secret:
vaultwarden_secrets:
# Generate with: docker exec --rm -ti docker.io/vaultwarden/server:alpine /vaultwarden hash
admin_token_hash:
2024-03-16 13:49:47 +01:00
smtp_username:
smtp_password: