-
Notifications
You must be signed in to change notification settings - Fork 19
Expand file tree
/
Copy path.env.example
More file actions
55 lines (49 loc) · 2.01 KB
/
.env.example
File metadata and controls
55 lines (49 loc) · 2.01 KB
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
# MCP Office Docs - Example Environment Configuration
# Copy this file to ".env" and adjust values for your environment.
# --- Logging ---
# Set DEBUG to a truthy value (1, true, yes, on) to enable DEBUG-level logs.
# Any other value or an empty setting will use INFO level.
# Example: DEBUG=1
DEBUG=
# --- Authentication ---
# Optional API key. When set, every request must include the key in one of:
# - Authorization: Bearer <key>
# - Authorization: <key>
# - x-api-key: <key>
# Leave empty to disable authentication.
API_KEY=
# --- Storage / Upload strategy ---
# One of: LOCAL, S3, GCS, AZURE
UPLOAD_STRATEGY=LOCAL
# How long generated download links remain valid (in seconds) for S3/GCS/AZURE
SIGNED_URL_EXPIRES_IN=3600
# --- AWS S3 (when UPLOAD_STRATEGY=S3) ---
# S3_BUCKET is always required.
# AWS credentials and region can be provided explicitly (Option A) or
# resolved automatically via the AWS default credential chain (Option B).
#
# Option A: Explicit credentials (set all three)
# AWS_ACCESS_KEY=<your-access-key>
# AWS_SECRET_ACCESS_KEY=<your-secret-key>
# AWS_REGION=<e.g. us-east-1>
#
# Option B: Default credential chain (leave AWS_ACCESS_KEY and
# AWS_SECRET_ACCESS_KEY unset). Credentials are discovered automatically:
# - AWS SSO sessions (run "aws sso login" locally)
# - IRSA on EKS (IAM Roles for Service Accounts)
# - EC2 instance profiles, ECS task roles, environment variables, etc.
# AWS_REGION is optional — boto3 resolves it from env/config/metadata.
AWS_ACCESS_KEY=
AWS_SECRET_ACCESS_KEY=
AWS_REGION=
S3_BUCKET=
# --- Google Cloud Storage (required when UPLOAD_STRATEGY=GCS) ---
GCS_BUCKET=
# Path inside container to service account file. Mount it using volumes in docker-compose.yml
GCS_CREDENTIALS_PATH=/app/config/gcs-credentials.json
# --- Azure Blob Storage (required when UPLOAD_STRATEGY=AZURE) ---
AZURE_STORAGE_ACCOUNT_NAME=
AZURE_STORAGE_ACCOUNT_KEY=
AZURE_CONTAINER=
# Optional custom endpoint (sovereign clouds); defaults to https://<account>.blob.core.windows.net
AZURE_BLOB_ENDPOINT=