This document explains which secret-bearing files the runtime currently expects and how to create them without leaking them into git.
Public-safe examples may live in the repository. Real secrets do not.
Recommended real location:
/srv/abyss-stack/Secrets/Configs/stack.env
Expected runtime path used by compose:
/srv/abyss-stack/Configs/stack.env
Recommended pattern:
- keep the real file under
Secrets/Configs/ - symlink it into
Configs/stack.env
Example:
cp env/stack.env.example /srv/abyss-stack/Secrets/Configs/stack.env
ln -sfn /srv/abyss-stack/Secrets/Configs/stack.env /srv/abyss-stack/Configs/stack.env
chmod 600 /srv/abyss-stack/Secrets/Configs/stack.envReal location:
/srv/abyss-stack/Secrets/Configs/langchain-api.env
Bootstrap from example:
cp env/langchain-api.env.example /srv/abyss-stack/Secrets/Configs/langchain-api.env
chmod 600 /srv/abyss-stack/Secrets/Configs/langchain-api.envReal location:
/srv/abyss-stack/Secrets/Configs/ovms-api.env
Bootstrap from example:
cp env/ovms-api.env.example /srv/abyss-stack/Secrets/Configs/ovms-api.env
chmod 600 /srv/abyss-stack/Secrets/Configs/ovms-api.envReal location:
/srv/abyss-stack/Secrets/Configs/ovms_api_key.txt
Create it manually and keep permissions tight:
printf '%s\n' 'CHANGE_ME_REAL_VALUE' > /srv/abyss-stack/Secrets/Configs/ovms_api_key.txt
chmod 600 /srv/abyss-stack/Secrets/Configs/ovms_api_key.txtReal location:
/srv/abyss-stack/Secrets/Configs/tos-graph.env
Bootstrap from example:
cp env/tos-graph.env.example /srv/abyss-stack/Secrets/Configs/tos-graph.env
chmod 600 /srv/abyss-stack/Secrets/Configs/tos-graph.envRelated stack-level defaults that usually belong in /srv/abyss-stack/Configs/stack.env:
AOA_TOS_ROOT=/srv/Tree-of-SophiaAOA_TOS_GRAPH_HOST_PORT=5410TOS_GRAPH_WRITE_ENABLED=falseNEO4J_AUTH=neo4j/<runtime-secret>
If TOS_GRAPH_NEO4J_PASSWORD is omitted from tos-graph.env, the helper
derives Neo4j credentials from the mounted stack-level NEO4J_AUTH value at
runtime instead of duplicating the secret into a second committed example.
Before trying to run the full Intel-aware or agentic surface, ensure that these paths exist in real form.
Use:
aoa-check-layoutFor stricter enforcement:
aoa-check-layout --strictDo not commit:
- live
.envfiles - raw API key files
- screenshots or logs that expose the values