Add Arcane stack with auto-deployment and secret generation
- Added ARCANE_ENCRYPTION_KEY and ARCANE_JWT_SECRET to .env.example - Created deploy_arcane() function in ez-homelab.sh - Auto-generate Arcane secrets after Authelia secrets - Deploy Arcane in both Option 2 (Core Server) and Option 3 (Additional Server) - Added Arcane docker-compose.yml configuration
This commit is contained in:
@@ -74,6 +74,11 @@ AUTHELIA_JWT_SECRET=generate-with-openssl-rand-hex-64
|
||||
AUTHELIA_SESSION_SECRET=generate-with-openssl-rand-hex-64
|
||||
AUTHELIA_STORAGE_ENCRYPTION_KEY=generate-with-openssl-rand-hex-64
|
||||
|
||||
# ARCANE Secrets - Let ez-homelab.sh generate these unless you know what your doing
|
||||
ARCANE_ENCRYPTION_KEY=generate-with-openssl-rand-hex-64
|
||||
ARCANE_JWT_SECRET=generate-with-openssl-rand-hex-64
|
||||
|
||||
|
||||
# Surfshark WireGuard (OPTIONAL - Advanced users only)
|
||||
# Get WireGuard details from Surfshark dashboard
|
||||
# SURFSHARK_PRIVATE_KEY=your-wireguard-private-key
|
||||
|
||||
Reference in New Issue
Block a user