2024-03-31 18:26:05 +02:00
|
|
|
# To generate random secret: openssl rand -base64 <length>
|
|
|
|
|
2024-02-17 19:01:04 +01:00
|
|
|
ansible_become_password:
|
2024-02-22 19:09:43 +01:00
|
|
|
|
|
|
|
borg_passphrase:
|
2024-02-17 19:01:04 +01:00
|
|
|
|
|
|
|
cifs_credentials:
|
|
|
|
username:
|
|
|
|
password:
|
|
|
|
|
2024-03-31 18:26:05 +02:00
|
|
|
|
|
|
|
authelia_secrets:
|
|
|
|
# Encryption key for the database, must be saved
|
|
|
|
encryption_key:
|
2024-05-11 10:53:19 +02:00
|
|
|
|
|
|
|
# Generate random client id : docker run --rm authelia/authelia:4 authelia crypto rand --length 72 --charset rfc3986
|
|
|
|
# Generate random secret + hash : docker run --rm authelia/authelia:4 authelia crypto hash generate pbkdf2 --variant sha512 --random --random.length 72 --random.charset rfc3986
|
|
|
|
hedgedoc_client_id:
|
|
|
|
hedgedoc_client_secret:
|
|
|
|
hedgedoc_client_secret_hash:
|
2024-05-11 10:58:34 +02:00
|
|
|
synapse_client_id:
|
|
|
|
synapse_client_secret:
|
|
|
|
synapse_client_secret_hash:
|
2024-05-11 10:53:19 +02:00
|
|
|
|
2024-05-09 11:22:22 +02:00
|
|
|
hmac_secret:
|
|
|
|
jwks_key: | # openssl genrsa 4096
|
2024-03-31 18:26:05 +02:00
|
|
|
jwt_secret:
|
2024-05-11 10:53:19 +02:00
|
|
|
|
2024-03-31 18:26:05 +02:00
|
|
|
# LDAP bind dn
|
|
|
|
ldap_user:
|
|
|
|
ldap_password:
|
2024-05-11 10:53:19 +02:00
|
|
|
|
2024-03-31 18:26:05 +02:00
|
|
|
postgres_user:
|
|
|
|
postgres_password:
|
2024-05-11 10:53:19 +02:00
|
|
|
|
2024-03-31 18:26:05 +02:00
|
|
|
smtp_user:
|
|
|
|
smtp_password:
|
|
|
|
|
2024-05-09 11:22:22 +02:00
|
|
|
|
2024-02-17 19:01:04 +01:00
|
|
|
coturn_secrets:
|
|
|
|
static_auth_secret:
|
|
|
|
|
|
|
|
hedgedoc_secrets:
|
2024-04-04 20:26:59 +02:00
|
|
|
postgres_user:
|
|
|
|
postgres_password:
|
|
|
|
session_secret:
|
2024-02-17 19:01:04 +01:00
|
|
|
|
2024-03-30 17:28:32 +01:00
|
|
|
lldap_secrets:
|
|
|
|
jwt_secret:
|
|
|
|
key_seed:
|
|
|
|
postgres_user:
|
|
|
|
postgres_password:
|
|
|
|
|
2024-04-06 21:43:34 +02:00
|
|
|
mailserver_secrets:
|
|
|
|
postgres_user:
|
|
|
|
postgres_password:
|
|
|
|
|
2024-02-17 19:01:04 +01:00
|
|
|
searxng_secrets:
|
|
|
|
searxng_secret:
|
|
|
|
|
|
|
|
synapse_secrets:
|
2024-03-16 20:34:38 +01:00
|
|
|
smtp_user:
|
|
|
|
smtp_pass:
|
2024-04-01 11:02:09 +02:00
|
|
|
postgres_user:
|
2024-02-17 19:01:04 +01:00
|
|
|
postgres_password:
|
|
|
|
turn_shared_secret: "{{ coturn_secrets['static_auth_secret'] }}"
|
|
|
|
macaroon_secret_key:
|
|
|
|
form_secret:
|
2024-03-15 10:52:59 +01:00
|
|
|
|
|
|
|
vaultwarden_secrets:
|
|
|
|
# Generate with: docker exec --rm -ti docker.io/vaultwarden/server:alpine /vaultwarden hash
|
|
|
|
admin_token_hash:
|
2024-03-16 13:49:47 +01:00
|
|
|
smtp_username:
|
|
|
|
smtp_password:
|