LastPass
NOTE: Current LastPass is required to save a backup on of the server and portal configs. For single portal operators, we are in the process of adding support for plain text files that can be saved locally and backed up in whatever way you would like. For teams, we will continue to support LastPass as the default secrets manager for portal configurations and login information.

Folder Structure

Currently, a number of the ansible scripts use LastPass for managing server credentials and common files. If you plan to use the ansible scripts it is currently required to have a LastPass account.
Within LastPass, ansible is going to look for a folder where you are storing portal-related information. You can call this folder whatever you like, or you can use the default Shared-Ansible.
This folder needs to be a Shared folder in LastPass for ansible to be able to properly interact with it. When you create a shared folder in LastPass it will automatically add the Shared prefix.
The top-level folder then will need 3 subfolders that will contain information managed by ansible. Again you can name these whatever you would like, or use the default names portal-common-configs, portal-cluster-configs, and portal-server-configs.
Your LastPass should look like the following:
1
Share-Ansible/
2
portal-common-configs/
3
portal-cluster-configs/
4
portal-server-configs/
Copied!

Secure Notes

This Secure Notes section is currently a manual process that needs to be moved to ansible.

portal-common-configs

Under the portal-common-configs subfolder, create a common.yml secure note and put the following fields in the secure note.
1
aws_access_key:
2
aws_secret_access_key:
3
discord_bot_token:
4
serverlist_entropy:
5
serverlist_tweak:
6
airtable_api_key:
7
airtable_base:
8
airtable_table:
9
airtable_field:
10
s3_backup_path:
Copied!
You can leave these fields blank for now, and we will come back to them later.

portal-cluster-configs

Under the portal-cluster-configs subfolder, create a cluster-prod.yml secure note and put the following fields in the secure note.
1
accounts_email_uri:
2
mongo_db_mgkey: |
3
portal_cluster_domain:
4
stripe_api_key:
5
stripe_publishable_key:
6
stripe_secret_key:
7
stripe_webhook_secret:
Copied!
You can leave these fields blank for now, with the exception of the | for the mongo_db_mgkey field, and we will come back to them later.

portal-server-configs

Under the portal-server-configs subfolder, create a <server>.yml secure note and put the following fields in the secure note: domain_name, hsd_api_key, portal_modules, and portal_name.
The domain_name and portal_name can be set to the domain you plan to host your server at.
For example, if you are running a single server portal, with the domain mydomain.com. You might identify the server as sev1 and name create the secure note like so:
1
sev1.yml
2
3
domain_name: mydomain.com
4
hsd_api_key:
5
portal_modules:
6
portal_name: mydomain.com
Copied!
Another example, is if you are running a multi-server portal and sev1 is just the first of many servers. The secure note would look like this:
1
sev1.yml
2
3
domain_name: sev1.mydomain.com
4
hsd_api_key:
5
portal_modules:
6
portal_name: sev1.mydomain.com
Copied!
The domain_name should match the A records you will be setting up in the DNS Setup section.
Last modified 3d ago