forked from canonical/serial-vault
-
Notifications
You must be signed in to change notification settings - Fork 0
/
settings.yaml.example
51 lines (39 loc) · 1.63 KB
/
settings.yaml.example
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
title: "Serial Vault"
logo: "/static/images/logo-ubuntu-white.svg"
# Service mode: signing or admin
mode: signing
# Http ports for api and admin mode: defaults are 8081 for admin mode and 8080 for signing mode
# You need to set both only if you want to run both services using the same settings.yaml file
portAdmin: 8081
portSigning: 8080
# Path to the assets (${docRoot}/static)
docRoot: "."
# Backend database details
driver: "postgres"
datasource: "dbname=serialvault sslmode=disable"
# Signing Key Store
#keystore: "filesystem"
#keystorePath: "./keystore"
# For Database
keystore: "database"
# CHANGEME: This keystoreSecret value is only a sample. Please provide another custom generated one
keystoreSecret: "secret code to encrypt the auth-key hash"
# For TPM 2.0
#keystore: "tpm2.0"
#keystorePath: "./keystore"
#keystoreSecret: "this needs to be 32 bytes long!!"
# 32 bytes long key to protect server from cross site request forgery attacks
# CHANGEME: This csrfAuthKey value is only a sample. Please provide another custom generated one
csrfAuthKey: "2E6ZYnVYUfDLRLV/ne8M6v1jyB/376BL9ORnN3Kgb04uSFalr2ygReVsOt0PaGEIRuID10TePBje5xdjIOEjQQ=="
# Return URL of the service (needed for OpenID)
urlHost: "serial-vault:8081"
urlScheme: http
# Enable user authentication using Ubuntu SSO
enableUserAuth: True
# Key needed for USSO.
# CHANGEME: This jwtSecret is only a sample. Please provide another custom generated value
jwtSecret: "regoo7Koh7Jeij2hig0Kaeg1ait0eeghaew7Ogheey4pheejohyaongoh6thoBeech6ahc9yaWo3ef4Dah3heeguoqu0oa9A"
# Factory sync only
syncUrl: "https://serial-vault-partners.canonical.com/api/"
syncUser: "lpuser"
syncAPIKey: "user-apikey"