|
1 | | -# CHANGEME-DEMO: All values here should be changed/reviewed |
| 1 | +# CHANGEME-DEV: All values here should be changed/reviewed |
| 2 | +# check the ansible playbook ansible/wiab-demo/wire_secrets.yml on how these secrets are being randomly generated and rotated |
| 3 | +# make sure that any secrets related to external services like AWS, giphy, youtube, spotify etc are being updated before running the random secret generation (ansible/wiab-demo/wire_secrets.yml) at demo-secrets.example.yaml and before deploying the helm charts using the playbook (ansible/wiab-demo/helm_install.yml) |
| 4 | + |
| 5 | +# The secrets for services like elasticsearch, postgresql, rabbitmq and AWS (fake) secretID and key are configured in their helm charts. The values passed to these charts can be modified at wire-server-deploy/service-name/demo-[values|secrets].example.yaml |
| 6 | +# postgresql - https://github.com/wireapp/helm-charts/tree/dev/charts/postgresql |
| 7 | +# elasticsearch - https://github.com/wireapp/wire-server/blob/develop/charts/elasticsearch-ephemeral |
| 8 | +# rabbitMQ - https://github.com/wireapp/wire-server/tree/develop/charts/rabbitmq |
| 9 | +# fake-aws - https://github.com/wireapp/wire-server/tree/develop/charts/fake-aws |
| 10 | +# AWS - this needs to be checked with wire support if needs to use real AWS services |
| 11 | + |
2 | 12 | elasticsearch-index: |
3 | 13 | secrets: |
4 | 14 | elasticsearch: |
5 | | - username: elastic |
6 | | - password: changeme |
| 15 | + username: "elastic" |
| 16 | + password: "changeme" |
| 17 | + |
7 | 18 | brig: |
8 | 19 | secrets: |
| 20 | + pgPassword: verysecurepassword |
9 | 21 | smtpPassword: dummyPassword |
10 | 22 | zAuth: |
11 | 23 | # generate zauth public/private keys with the 'zauth' executable from wire-server: |
12 | | - # ./dist/zauth -m gen-keypair -i 1 |
| 24 | + # sudo docker run $ZAUTH_CONTAINER -m gen-keypair |
13 | 25 | publicKeys: "<public key>" |
14 | 26 | privateKeys: "<private key>" |
15 | 27 | turn: |
16 | 28 | # generate a high-entropy random string, e.g. using |
17 | | - # openssl rand -base64 64 | env LC_CTYPE=C tr -dc a-zA-Z0-9 | head -c 42 |
| 29 | + # openssl rand -base64 64 | env LC_CTYPE=C tr -dc a-zA-Z0-9 | head -c 64 |
18 | 30 | secret: CHANGEMEE6KHMJU1uDhhgvsVWoIyzmn3u3GHRoWjTp |
19 | | - # these only need to be changed if using real AWS services |
20 | 31 | awsKeyId: dummykey |
21 | 32 | awsSecretKey: dummysecret |
22 | | - # These are only necessary if you wish to support sign up via SMS/calls |
23 | | - # And require accounts at twilio.com / nexmo.com |
24 | 33 | rabbitmq: |
25 | 34 | username: wire-server |
26 | 35 | password: verysecurepassword |
27 | | - # PostgreSQL password is synced with the wire-postgresql-secret from k8s cluster |
28 | | - # To extract the secret from an existing Kubernetes cluster: |
29 | | - # kubectl get secret wire-postgresql-secret -n postgresql -o jsonpath='{.data.password}' | base64 -d |
30 | | - pgPassword: dummyPassword # gets replaced by the actual secret |
31 | 36 | elasticsearch: |
32 | 37 | username: "elastic" |
33 | 38 | password: "changeme" |
34 | 39 | elasticsearchAdditional: |
35 | 40 | username: "elastic" |
36 | 41 | password: "changeme" |
37 | | -cannon: |
| 42 | + |
| 43 | +cargohold: |
38 | 44 | secrets: |
| 45 | + awsKeyId: dummykey |
| 46 | + awsSecretKey: dummysecret |
39 | 47 | rabbitmq: |
40 | 48 | username: wire-server |
41 | 49 | password: verysecurepassword |
42 | 50 |
|
43 | | -cargohold: |
| 51 | +cannon: |
44 | 52 | secrets: |
45 | | - # these only need to be changed if using real AWS services |
46 | | - awsKeyId: dummykey |
47 | | - awsSecretKey: dummysecret |
48 | 53 | rabbitmq: |
49 | 54 | username: wire-server |
50 | 55 | password: verysecurepassword |
51 | 56 |
|
52 | 57 | galley: |
53 | 58 | secrets: |
54 | | - # these only need to be changed if using real AWS services |
55 | | - awsKeyId: dummykey |
56 | | - awsSecretKey: dummysecret |
57 | | - # PostgreSQL password is synced with the wire-postgresql-secret from k8s cluster |
58 | | - # To extract the secret from an existing Kubernetes cluster: |
59 | | - # kubectl get secret wire-postgresql-secret -n postgresql -o jsonpath='{.data.password}' | base64 -d |
60 | | - pgPassword: dummyPassword # gets replaced by the actual secret |
61 | 59 | rabbitmq: |
62 | 60 | username: wire-server |
63 | 61 | password: verysecurepassword |
| 62 | + pgPassword: verysecurepassword |
| 63 | + # these only need to be changed if using real AWS services |
| 64 | + awsKeyId: dummykey |
| 65 | + awsSecretKey: dummysecret |
| 66 | + mlsPrivateKeys: |
| 67 | + removal: |
| 68 | + ed25519: | |
| 69 | + -----BEGIN PRIVATE KEY----- |
| 70 | + -----END PRIVATE KEY----- |
| 71 | + ecdsa_secp256r1_sha256: | |
| 72 | + -----BEGIN PRIVATE KEY----- |
| 73 | + -----END PRIVATE KEY----- |
| 74 | + ecdsa_secp384r1_sha384: | |
| 75 | + -----BEGIN PRIVATE KEY----- |
| 76 | + -----END PRIVATE KEY----- |
| 77 | + ecdsa_secp521r1_sha512: | |
| 78 | + -----BEGIN PRIVATE KEY----- |
| 79 | + -----END PRIVATE KEY----- |
64 | 80 |
|
65 | 81 | gundeck: |
66 | 82 | secrets: |
@@ -93,9 +109,11 @@ nginz: |
93 | 109 | # only necessary in test environments (env="staging"). See charts/nginz/README.md |
94 | 110 | basicAuth: "<username>:<htpasswd-hashed-password>" |
95 | 111 |
|
| 112 | + |
96 | 113 | # RabbitMQ credentials for background-worker. |
97 | 114 | background-worker: |
98 | 115 | secrets: |
| 116 | + pgPassword: verysecurepassword |
99 | 117 | rabbitmq: |
100 | 118 | username: wire-server |
101 | 119 | password: verysecurepassword |
|
0 commit comments