forked from shupp/VegaDNS-API
-
Notifications
You must be signed in to change notification settings - Fork 0
/
Copy pathdefault.ini
85 lines (74 loc) · 2.08 KB
/
default.ini
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
[mysql]
user = vegadns
password = secret
database = vegadns
host = localhost
#ssl_ca = /usr/local/share/ca-certificates/mysql-ca.crt
[auth]
cookie_secret = ":3{$FMB|XIKEjX)Usj:r4]!PmMBp1zsC:bx7$xe5qt8%%64f5TG"
[oauth]
token_expire_time = 3600
[ip_auth]
trusted_ips = 127.0.0.1
[monitoring]
# set to a valid hostname to use, such as "vegadns-generation.example.com"
vegadns_generation_txt_record =
[email]
# smtp or sendmail
email_method = sendmail
smtp_host = localhost
smtp_port = 25
smtp_auth = false
smtp_user = user
smtp_password = secret
smtp_keyfile =
smtp_certfile =
smtp_ssl = false
smtp_tls = flase
support_name = "The VegaDNS Team"
support_email = "[email protected]"
[ui_server]
# Used for password reset emails
ui_url = http://localhost:8080/
[global_record_acls]
# list of sublabels (or DOMAIN for no sublabel), eg:
# acl_labels = "DOMAIN,_acme-challenge,www"
acl_labels =
# users that can edit the above sublabels across domains, eg:
# acl_emails = "[email protected],[email protected]"
acl_emails =
[update_notifications]
enable_redis_notifications = false
redis_host = 127.0.0.1
redis_port = 6379
redis_channel = VEGADNS-CHANGES
enable_consul_notifications = false
consul_host = 127.0.0.1
consul_port = 8500
consul_scheme = "http"
consul_verify_ssl = true
consul_token =
consul_key = VEGADNS-CHANGES
[oidc]
# Set to "true" to turn on OIDC authentication
enabled = false
# OIDC Issuer URL
issuer = https://my-oidc-issuer.com/
# Client/Audience identifier
client = oidc-client-name
# API URL where the OIDC provider will direct users to when auth succeeds
redirect_uri = http://localhost/1.0/oidc-callback
# UI URL where users go after auth completes
ui_endpoint = http://localhost/ui/
# Shared secret between the OIDC Client and Provider
secret = mySecret!
# Scope to request from the OIDC Provider
scope = openid,profile,email
# Group that the user must be a member of for the authentication to succeed
required_group = CN=foo,OU=bar,O=baz.com
# Keys to various properties in the OIDC session data
email_key = email
groups_key = memberof
firstname_key = given_name
lastname_key = family_name
phone_key =