Files
AI Assistant 85bdb59da4 3.14 Password Vault encryption AES-256-GCM server-side
- Created src/core/crypto/ with AES-256-GCM encrypt/decrypt (PBKDF2 key derivation)
- Created /api/vault route: CRUD with server-side password encryption
- PATCH /api/vault migration endpoint to re-encrypt legacy plaintext passwords
- Rewrote use-vault hook to use dedicated /api/vault instead of generic storage
- Updated UI: amber 'not encrypted' warning  green 'encrypted' badge
- Added ENCRYPTION_SECRET env var to docker-compose.yml and stack.env
- Module version bumped to 0.2.0
2026-02-28 04:12:44 +02:00

29 lines
1.1 KiB
Bash

# ArchiTools - Portainer Stack Environment Variables
# This file is read by Portainer when deploying from Git repository
# Database
DATABASE_URL="postgresql://architools_user:stictMyFon34!_gonY@10.10.10.166:5432/architools_db?schema=public"
# MinIO
MINIO_ENDPOINT="10.10.10.166"
MINIO_PORT="9002"
MINIO_USE_SSL="false"
MINIO_ACCESS_KEY="admin"
MINIO_SECRET_KEY="MinioStrongPass123"
MINIO_BUCKET_NAME="tools"
# Storage adapter (inlined at build time)
NEXT_PUBLIC_STORAGE_ADAPTER="database"
NEXT_PUBLIC_APP_NAME="ArchiTools"
NEXT_PUBLIC_APP_URL="https://tools.beletage.ro"
# Authentication (Authentik OIDC)
NEXTAUTH_URL="https://tools.beletage.ro"
NEXTAUTH_SECRET="8IL9Kpipj0EZwZPNvekbNRPhV6a2/UY4cGVzE3n0pUY="
AUTHENTIK_CLIENT_ID="V59GMiYle87yd9VZOgUmdSmzYQALqNsKVAUR6QMi"
AUTHENTIK_CLIENT_SECRET="TMeewkusUro0hQ2DMwS0Z5lNpNMdmziO9WXywNAGlK3Y6Y8HYULZBEtMtm53lioIkszWbpPRQcv1cxHMtwftMvsaSnbliDsL1f707wmUJhMFKjeZ0ypIFKFG4dJkp7Jr"
AUTHENTIK_ISSUER="https://auth.beletage.ro/application/o/architools/"
# Vault encryption (AES-256-GCM)
ENCRYPTION_SECRET="ArchiTools-Vault-2025!SecureKey@AES256"