this vault setup for injective sensitive variables uses the approach described in https://docs.ansible.com/ansible/10/tips_tricks/ansible_tips_tricks.html#keep-vaulted-variables-safely-visible
34 lines
858 B
Django/Jinja
34 lines
858 B
Django/Jinja
## ProtonVPN OpenVPN
|
|
#VPN_SERVICE_PROVIDER=protonvpn
|
|
#OPENVPN_USER=+pmp
|
|
#OPENVPN_PASSWORD=
|
|
#SERVER_HOSTNAMES=node-us-160.protonvpn.net,node-us-161.protonvpn.net
|
|
#VPN_PORT_FORWARDING=on
|
|
|
|
## ProtonVPN WireGuard
|
|
#VPN_SERVICE_PROVIDER=custom
|
|
#VPN_TYPE=wireguard
|
|
#VPN_ENDPOINT_IP=
|
|
#VPN_ENDPOINT_PORT=
|
|
#WIREGUARD_PUBLIC_KEY=
|
|
#WIREGUARD_PRIVATE_KEY=
|
|
#WIREGUARD_PRESHARED_KEY=
|
|
#WIREGUARD_ADDRESSES=
|
|
#VPN_DNS_ADDRESS=
|
|
#VPN_PORT_FORWARDING=on
|
|
#VPN_PORT_FORWARDING_PROVIDER=protonvpn
|
|
|
|
## AirVPN
|
|
VPN_SERVICE_PROVIDER=airvpn
|
|
VPN_TYPE=wireguard
|
|
SERVER_NAMES={{ vpn_server_names }}
|
|
WIREGUARD_PUBLIC_KEY={{ wg_peer_pubkey }}
|
|
WIREGUARD_PRIVATE_KEY={{ wg_privkey }}
|
|
WIREGUARD_PRESHARED_KEY={{ wg_psk }}
|
|
WIREGUARD_ADDRESSES={{ wg_addresses }}
|
|
FIREWALL_VPN_INPUT_PORTS={{ fw_vpn_input_ports }}
|
|
|
|
UPDATER_PERIOD=24h
|
|
|
|
#FIREWALL_OUTBOUND_SUBNETS=10.0.0.0/8,{{ docker_ipv6_subnet }}
|