Files
n8n-workflows/.env.example
zie619 7585cbd852 fix: Remove hardcoded secrets to pass Trivy security scan
CRITICAL SECURITY FIXES:
- Replaced hardcoded SECRET_KEY with environment variable (JWT_SECRET_KEY)
- Replaced hardcoded admin password with environment variable (ADMIN_PASSWORD)
- Auto-generate secure random values when environment variables not set
- Added .env.example file with configuration template
- Updated .gitignore to exclude all .env files

These changes address the critical security vulnerabilities flagged by Trivy
2025-11-03 12:18:45 +02:00

23 lines
657 B
Plaintext

# Environment Variables for n8n-workflows
# Copy this file to .env and configure with your own values
# Security Configuration
JWT_SECRET_KEY=your-secret-jwt-key-change-this-in-production
ADMIN_PASSWORD=your-secure-admin-password-change-this
# API Configuration
ADMIN_TOKEN=your-admin-api-token-for-protected-endpoints
# Database Configuration (optional)
WORKFLOW_DB_PATH=database/workflows.db
# Server Configuration (optional)
HOST=127.0.0.1
PORT=8000
# CORS Origins (optional, comma-separated)
ALLOWED_ORIGINS=http://localhost:3000,http://localhost:8080,https://zie619.github.io
# Rate Limiting (optional)
RATE_LIMIT_REQUESTS=60
RATE_LIMIT_WINDOW=60