The main Bubble source repository. Contains the Bubble API server, the web UI, documentation and utilities. https://getbubblenow.com
Ви не можете вибрати більше 25 тем Теми мають розпочинатися з літери або цифри, можуть містити дефіси (-) і не повинні перевищувати 35 символів.
 
 
 
 

188 рядки
6.4 KiB

  1. ---
  2. # This is the list of users to generate.
  3. # Every device must have a unique username.
  4. # You can generate up to 250 users at one time.
  5. # Usernames with leading 0's or containing only numbers should be escaped in double quotes, e.g. "000dan" or "123".
  6. users:
  7. <<#each bubbleUsers>> - "<<this>>"
  8. <</each>>
  9. ### Advanced users only below this line ###
  10. # Store the PKI in a ram disk. Enabled only if store_pki (retain the PKI) is set to false
  11. # Supports on MacOS and Linux only (including Windows Subsystem for Linux)
  12. pki_in_tmpfs: true
  13. # If True re-init all existing certificates. Boolean
  14. keys_clean_all: False
  15. # Deploy StrongSwan to enable IPsec support
  16. ipsec_enabled: true
  17. # StrongSwan log level
  18. # https://wiki.strongswan.org/projects/strongswan/wiki/LoggerConfiguration
  19. strongswan_log_level: 2
  20. # rightsourceip for ipsec
  21. # ipv4
  22. strongswan_network: 10.19.48.0/24
  23. # ipv6
  24. strongswan_network_ipv6: 'fd9d:bc11:4020::/48'
  25. # Deploy WireGuard
  26. # WireGuard will listen on 51820/UDP. You might need to change to another port
  27. # if your network blocks this one. Be aware that 53/UDP (DNS) is blocked on some
  28. # mobile data networks.
  29. wireguard_enabled: true
  30. wireguard_port: 51820
  31. # If you're behind NAT or a firewall and you want to receive incoming connections long after network traffic has gone silent.
  32. # This option will keep the "connection" open in the eyes of NAT.
  33. # See: https://www.wireguard.com/quickstart/#nat-and-firewall-traversal-persistence
  34. wireguard_PersistentKeepalive: 0
  35. # WireGuard network configuration
  36. wireguard_network_ipv4: 10.19.49.0/24
  37. wireguard_network_ipv6: fd9d:bc11:4021::/48
  38. # Reduce the MTU of the VPN tunnel
  39. # Some cloud and internet providers use a smaller MTU (Maximum Transmission
  40. # Unit) than the normal value of 1500 and if you don't reduce the MTU of your
  41. # VPN tunnel some network connections will hang. Algo will attempt to set this
  42. # automatically based on your server, but if connections hang you might need to
  43. # adjust this yourself.
  44. # See: https://github.com/trailofbits/algo/blob/master/docs/troubleshooting.md#various-websites-appear-to-be-offline-through-the-vpn
  45. reduce_mtu: 0
  46. # Algo will use the following lists to block ads. You can add new block lists
  47. # after deployment by modifying the line starting "BLOCKLIST_URLS=" at:
  48. # /usr/local/sbin/adblock.sh
  49. # If you load very large blocklists, you may also have to modify resource limits:
  50. # /etc/systemd/system/dnsmasq.service.d/100-CustomLimitations.conf
  51. adblock_lists:
  52. - "https://raw.githubusercontent.com/StevenBlack/hosts/master/hosts"
  53. - "https://hosts-file.net/ad_servers.txt"
  54. # Enable DNS encryption.
  55. # If 'false', 'dns_servers' should be specified below.
  56. # DNS encryption can not be disabled if DNS adblocking is enabled
  57. dns_encryption: true
  58. # DNS servers which will be used if 'dns_encryption' is 'true'. Multiple
  59. # providers may be specified, but avoid mixing providers that filter results
  60. # (like Cisco) with those that don't (like Cloudflare) or you could get
  61. # inconsistent results. The list of available public providers can be found
  62. # here:
  63. # https://github.com/DNSCrypt/dnscrypt-resolvers/blob/master/v2/public-resolvers.md
  64. dnscrypt_servers:
  65. ipv4:
  66. - cloudflare
  67. - google
  68. ipv6:
  69. - cloudflare-ipv6
  70. # DNS servers which will be used if 'dns_encryption' is 'false'.
  71. # The default is to use Cloudflare.
  72. dns_servers:
  73. ipv4:
  74. - 1.1.1.1
  75. - 1.0.0.1
  76. ipv6:
  77. - 2606:4700:4700::1111
  78. - 2606:4700:4700::1001
  79. # Randomly generated IP address for the local dns resolver
  80. local_service_ip: "{{ '172.16.0.1' | ipmath(1048573 | random(seed=algo_server_name + ansible_fqdn)) }}"
  81. local_service_ipv6: "{{ 'fd00::1' | ipmath(1048573 | random(seed=algo_server_name + ansible_fqdn)) }}"
  82. # Your Algo server will automatically install security updates. Some updates
  83. # require a reboot to take effect but your Algo server will not reboot itself
  84. # automatically unless you change 'enabled' below from 'false' to 'true', in
  85. # which case a reboot will take place if necessary at the time specified (as
  86. # HH:MM) in the time zone of your Algo server. The default time zone is UTC.
  87. unattended_reboot:
  88. enabled: false
  89. time: 06:00
  90. # Block traffic between connected clients
  91. BetweenClients_DROP: true
  92. # Block SMB/CIFS traffic
  93. block_smb: true
  94. # Block NETBIOS traffic
  95. block_netbios: true
  96. congrats:
  97. common: |
  98. "# Congratulations! #"
  99. "# Your Algo server is running. #"
  100. "# Config files and certificates are in the ./configs/ directory. #"
  101. "# Go to https://whoer.net/ after connecting #"
  102. "# and ensure that all your traffic passes through the VPN. #"
  103. "# Local DNS resolver {{ local_service_ip }}{{ ', ' + local_service_ipv6 if ipv6_support else '' }} #"
  104. p12_pass: |
  105. "# The p12 and SSH keys password for new users is {{ p12_export_password }} #"
  106. ca_key_pass: |
  107. "# The CA key password is {{ CA_password|default(omit) }} #"
  108. ssh_access: |
  109. "# Shell access: ssh -i {{ ansible_ssh_private_key_file|default(omit) }} {{ ansible_ssh_user|default(omit) }}@{{ ansible_ssh_host|default(omit) }} #"
  110. SSH_keys:
  111. comment: algo@ssh
  112. private: configs/algo.pem
  113. private_tmp: /tmp/algo-ssh.pem
  114. public: configs/algo.pem.pub
  115. cloud_providers:
  116. azure:
  117. size: Standard_B1S
  118. image: 19.04
  119. digitalocean:
  120. size: s-1vcpu-1gb
  121. image: "ubuntu-19-04-x64"
  122. ec2:
  123. # Change the encrypted flag to "true" to enable AWS volume encryption, for encryption of data at rest.
  124. encrypted: true
  125. # Set use_existing_eip to "true" if you want to use a pre-allocated Elastic IP
  126. # Additional prompt will be raised to determine which IP to use
  127. use_existing_eip: false
  128. size: t2.micro
  129. image:
  130. name: "ubuntu-disco-19.04"
  131. owner: "099720109477"
  132. gce:
  133. size: f1-micro
  134. image: ubuntu-1904
  135. external_static_ip: false
  136. lightsail:
  137. size: nano_1_0
  138. image: ubuntu_18_04
  139. scaleway:
  140. size: DEV1-S
  141. image: Ubuntu Bionic Beaver
  142. arch: x86_64
  143. hetzner:
  144. server_type: cx11
  145. image: ubuntu-18.04
  146. openstack:
  147. flavor_ram: ">=512"
  148. image: Ubuntu-18.04
  149. cloudstack:
  150. size: Micro
  151. image: Linux Ubuntu 19.04 64-bit
  152. disk: 10
  153. vultr:
  154. os: Ubuntu 19.04 x64
  155. size: 1024 MB RAM,25 GB SSD,1.00 TB BW
  156. local:
  157. fail_hint:
  158. - Sorry, but something went wrong!
  159. - Please check the troubleshooting guide.
  160. - https://trailofbits.github.io/algo/troubleshooting.html
  161. booleans_map:
  162. Y: true
  163. y: true