60 lines
1 KiB
Text
60 lines
1 KiB
Text
# To generate random secret: openssl rand -base64 <length>
|
|
|
|
ansible_become_password:
|
|
|
|
borg_passphrase:
|
|
|
|
cifs_credentials:
|
|
username:
|
|
password:
|
|
|
|
|
|
authelia_secrets:
|
|
# Encryption key for the database, must be saved
|
|
encryption_key:
|
|
jwt_secret:
|
|
# LDAP bind dn
|
|
ldap_user:
|
|
ldap_password:
|
|
postgres_user:
|
|
postgres_password:
|
|
smtp_user:
|
|
smtp_password:
|
|
|
|
coturn_secrets:
|
|
static_auth_secret:
|
|
|
|
hedgedoc_secrets:
|
|
postgres_user:
|
|
postgres_password:
|
|
session_secret:
|
|
|
|
lldap_secrets:
|
|
jwt_secret:
|
|
key_seed:
|
|
postgres_user:
|
|
postgres_password:
|
|
|
|
mailserver_secrets:
|
|
ldap_user:
|
|
ldap_password:
|
|
postgres_user:
|
|
postgres_password:
|
|
|
|
searxng_secrets:
|
|
searxng_secret:
|
|
|
|
synapse_secrets:
|
|
smtp_user:
|
|
smtp_pass:
|
|
postgres_user:
|
|
postgres_password:
|
|
turn_shared_secret: "{{ coturn_secrets['static_auth_secret'] }}"
|
|
macaroon_secret_key:
|
|
form_secret:
|
|
|
|
vaultwarden_secrets:
|
|
# Generate with: docker exec --rm -ti docker.io/vaultwarden/server:alpine /vaultwarden hash
|
|
admin_token_hash:
|
|
smtp_username:
|
|
smtp_password:
|