spaceport/apiserver/apiserver/secrets.py.example

53 lines
1.4 KiB
Plaintext
Raw Normal View History

2020-02-01 23:58:10 +00:00
# Spaceport secrets file, don't commit to version control!
2020-02-02 04:42:46 +00:00
# /ipn/ route obfuscation
# Set this to random characters
2020-02-01 23:58:10 +00:00
# For example, use the output of this:
2020-02-02 04:42:46 +00:00
# head /dev/urandom | base32 | head -c 16
2020-02-01 23:58:10 +00:00
IPN_RANDOM = ''
2020-02-02 04:42:46 +00:00
# Django secret key
# Set this to random characters
# For example, use the output of this:
# head /dev/urandom | base64 | head -c 50
DJANGO_SECRET_KEY = ''
# Warning
# Keep this value secret.
# Running Django with a known SECRET_KEY defeats many of Djangos security
# protections, and can lead to privilege escalation and remote code execution
# vulnerabilities.
2020-02-08 02:22:29 +00:00
# LDAP API url
# should contain the IP and port of the script and machine connected over VPN
# with trailing slash
LDAP_API_URL = ''
# LDAP API key
# should be equal to the auth token value set in
# spaceport/ldapserver/secrets.py
LDAP_API_KEY = ''
2020-02-19 23:58:02 +00:00
2020-02-27 22:44:55 +00:00
# Door cards API token
# Set this to random characters
# For example, use the output of this:
# head /dev/urandom | base32 | head -c 40
DOOR_API_TOKEN = ''
2020-02-19 23:58:02 +00:00
# Backup API tokens
# These tokens allow each user to download a backup of member data.
# Don't mess up the data structure!
# Tokens must be random and unique, use the output of:
# head /dev/urandom | base32 | head -c 40
BACKUP_TOKENS = {
'<token>': {
'name': 'firstname_lastname',
'backup_id': '<token>',
'cache_key': '<token>',
},
'<token>': {
'name': 'firstname_lastname',
'backup_id': '<token>',
'cache_key': '<token>',
},
}