vps/secrets.yml.example

79 lines
1.6 KiB
Text

# To generate random secret: openssl rand -base64 <length>
ansible_become_password:
borg_passphrase:
cifs_credentials:
username:
password:
authelia_secrets:
# Encryption key for the database, must be saved
encryption_key:
# Generate random client id : docker run --rm authelia/authelia:4 authelia crypto rand --length 72 --charset rfc3986
# Generate random secret + hash : docker run --rm authelia/authelia:4 authelia crypto hash generate pbkdf2 --variant sha512 --random --random.length 72 --random.charset rfc3986
hedgedoc_client_id:
hedgedoc_client_secret:
hedgedoc_client_secret_hash:
synapse_client_id:
synapse_client_secret:
synapse_client_secret_hash:
hmac_secret:
jwks_key: | # openssl genrsa 4096
jwt_secret:
# LDAP bind dn
ldap_user:
ldap_password:
postgres_user:
postgres_password:
smtp_user:
smtp_password:
coturn_secrets:
static_auth_secret:
hedgedoc_secrets:
postgres_user:
postgres_password:
session_secret:
lldap_secrets:
jwt_secret:
key_seed:
postgres_user:
postgres_password:
mailserver_secrets:
admin_user:
# Hash obtained with openssl passwd -6
admin_secret:
ldap_user:
ldap_password:
postgres_user:
postgres_password:
searxng_secrets:
searxng_secret:
synapse_secrets:
smtp_user:
smtp_pass:
postgres_user:
postgres_password:
turn_shared_secret: "{{ coturn_secrets['static_auth_secret'] }}"
macaroon_secret_key:
form_secret:
vaultwarden_secrets:
# Generate with: docker exec --rm -ti docker.io/vaultwarden/server:alpine /vaultwarden hash
admin_token_hash:
smtp_username:
smtp_password: