Secrets

This page describe how secrets are securely managed in our playbook. It also serves as a comprehensive list of credentials in case you want to populated them manually.

Links to the official documentation relevant for this subject:

Secrets defined as variables

activemq_password

The password used to access the activemq instance.

repo_db_password

The password used to access the postgres database of Repository

sync_db_password

The password used to access the postgres database of Sync

reposearch_shared_secret

The secret used between Solr and Repository for communicating.

elasticsearch_password

The password to use to authentication to the Elasticsearch server.

ca_signing_key_passphrase

The playbook will always try to generate a certificate & key pair for each host of the inventory. This secret holds the passphrase to use for the CA signing key, whether it is generated by the playbook or it is provided by user as an input.

certs_p12_passphrase

Generated certificates and keys are contained in a PKCS12 container which needs a passphrase to be read. This secret holds this passphrase.

identity_admin_password

The password to use to login in the Keycloak console (master realm) with the default admin user.

Secrets not yet handled

The acs_environment ansible variable holds environment variables for the JVM that must be handled as secrets:

acs_environment:
  JAVA_TOOL_OPTIONS:
    - -Dmetadata-keystore.password=<your-keystore-password>
    - -Dmetadata-keystore.metadata.password=<your-keystore-password>

metadata-keystore.password is the same variable handled in keystore_password.

metadata-keystore.metadata.password is the password of the keystore dedicated to repository metadata.