ADMIN_PRIVILEGE_AVAILABLE=true BCRYPT_ROUNDS=1 WEB_PORT=23000 REDIS_HOST=redis QUEUES_REDIS_HOST=redis ANALYTICS_QUEUES_REDIS_HOST=redis MONGO_URL=mongodb://mongo/test-sharelatex SHARELATEX_ALLOW_PUBLIC_ACCESS=true LINKED_URL_PROXY=http://localhost:6543 ENABLED_LINKED_FILE_TYPES=url,project_file,project_output_file,mendeley,zotero NODE_ENV=test NODE_OPTIONS=--unhandled-rejections=strict LOCK_MANAGER_MAX_LOCK_WAIT_TIME=30000 COOKIE_DOMAIN=.overleaf.test ADMIN_URL=http://admin.overleaf.test PUBLIC_URL=http://www.overleaf.test:23000 HTTP_TEST_HOST=www.overleaf.test OT_JWT_AUTH_KEY="very secret key" EXTERNAL_AUTH=none RECAPTCHA_ENDPOINT=http://localhost:2222/recaptcha/api/siteverify # Server-Pro LDAP SHARELATEX_LDAP_URL=ldap://ldap:389 SHARELATEX_LDAP_SEARCH_BASE=ou=people,dc=planetexpress,dc=com SHARELATEX_LDAP_SEARCH_FILTER="(uid={{username}})" SHARELATEX_LDAP_BIND_DN=cn=admin,dc=planetexpress,dc=com SHARELATEX_LDAP_BIND_CREDENTIALS=GoodNewsEveryone SHARELATEX_LDAP_EMAIL_ATT=mail SHARELATEX_LDAP_NAME_ATT=cn SHARELATEX_LDAP_LAST_NAME_ATT=sn SHARELATEX_LDAP_UPDATE_USER_DETAILS_ON_LOGIN=true # Server-Pro SAML SHARELATEX_SAML_ENTRYPOINT=http://saml/simplesaml/saml2/idp/SSOService.php SHARELATEX_SAML_CALLBACK_URL=http://saml/saml/callback SHARELATEX_SAML_ISSUER=sharelatex-test-saml SHARELATEX_SAML_IDENTITY_SERVICE_NAME="SAML Test Server" SHARELATEX_SAML_EMAIL_FIELD=email SHARELATEX_SAML_FIRST_NAME_FIELD=givenName SHARELATEX_SAML_LAST_NAME_FIELD=sn SHARELATEX_SAML_UPDATE_USER_DETAILS_ON_LOGIN=true # simplesaml cert from https://github.com/overleaf/google-ops/tree/master/docker-images/saml-test/var-simplesamlphp/cert SHARELATEX_SAML_CERT=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 # DEVICE_HISTORY_SECRET has been generated using: # NOTE: crypto.generateKeySync was added in v15, v16 is the next LTS release. # $ docker run --rm node:16 --print 'require("crypto").generateKeySync("aes", { length: 256 }).export().toString("hex")' DEVICE_HISTORY_SECRET=1b46e6cdf72db02845da06c9517c9cfbbfa0d87357479f4e1df3ce160bd54807