Go to file
Ingrid010109!? 59dd405333 Add proxmox hetzner/proxmox systems/services/pve dashboard 2025-09-17 13:20:12 +02:00
categories Add category Synced 2025-01-20 21:46:08 +01:00
stores Add proxmox hetzner/proxmox systems/services/pve dashboard 2025-09-17 13:20:12 +02:00
.gitattributes Create .gitattributes 2025-01-20 21:46:05 +01:00
README.md Update README.md 2025-09-17 13:19:56 +02:00
leak_detection Create leak_detection 2025-01-20 21:46:08 +01:00
preferences.json Update preferences.json 2025-09-17 00:57:36 +02:00
users.json Update users.json 2025-01-20 21:46:08 +01:00
vaultkey Update vaultkey 2024-12-25 15:17:28 +01:00
vaultversion Update vaultversion 2025-09-17 09:58:10 +02:00

README.md

XPipe Vault (Keep this repository private!)

This repository contains all connection information that is designated to be shared.

You can sync with this repository in all XPipe application instances the same way, every change you make in one instance will be reflected in the repository.

Category list

Connection list

All connections / Proxmox Kladow

empty

All connections / Proxmox Kladow / VM

All connections / Proxmox Kladow / Hosts

All connections / Proxmox Kladow / Container

All connections / Proxmox Hetzner

empty

All connections / Proxmox Hetzner / VM

All connections / Proxmox Hetzner / Hosts

All connections / Proxmox Hetzner / Container

All connections / local

empty

All connections / Default

All connections / Boot

empty

All scripts / Custom

All identities / Synced

Secret encryption

You have the option to fetch any sensitive information like passwords from outside sources like password managers or enter them at connection time through a prompt window. In that case, XPipe doesn't have to store any secrets itself.

In case you choose to store passwords and other secrets within XPipe, all sensitive information is encrypted when it is saved using AES with either:

  • A dynamically generated key file vaultkey (The data can then only be decrypted with that file present)
  • A custom passphrase that can be set for your user in the vault settings menu (This option can only as secure as the password you choose)

By default, general connection data is not encrypted, only secrets are. So things like hostnames and usernames are stored without encryption, which is in line with many other tools. There is an available setting in the vault settings menu to encrypt all connection data if you want to do that.

Cloning the repository on other systems

Nowadays, most providers require a personal access token (PAT) to authenticate from the command-line instead of traditional passwords. You can find common (PAT) pages here:

Even if your git client prompts you for a password, you should enter your token unless your provider still uses passwords.

If you don't want to enter your credentials every time, you can use any git credentials manager for that. For more information, see for example:

Some modern git clients also take care of storing credentials automatically.

Troubleshooting

Adding connections to the repository

By default, no connection categories are set to sync so that you have explicit control on what connections to commit.

To have your connections of a category put inside your git repository, you first need to change its sync configuration. In your Connections tab under the category overview on the left side, you can open the category configuration menu either by right-clicking the category or click on the ⚙️ icon when hovering over the category, and then clicking on the 🔧 configure button.

Then, set the Sync with git repository value to Yes to sync the category and connections to your git repository. This will add all syncable connections in that category to the git repository. The sync settings for a category are inherited by default from its parent if not explicitly set.

Local connections are not synced

Any connection located under the local machine can not be shared as it refers to connections and data that are only available on the local system.