blob: 4530d477774e8ed198e2919e534645d77df26519 (
plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
|
dev_ca: &dev_ca
client_ca_key: "./certs/test/files/ca.key"
client_ca_cert: "./certs/test/files/ca.crt"
ca_key_password: nil
cert_options: &cert_options
client_cert_lifespan: 2
client_cert_bit_size: 2024
client_cert_hash: "SHA256"
allow_limited_certs: false
allow_unlimited_certs: true
allow_anonymous_certs: false
limited_cert_prefix: "LIMITED"
unlimited_cert_prefix: "UNLIMITED"
downloads: &downloads
client_download_domain: https://downloads.leap.se
available_clients:
- linux32
- linux64
- osx
- windows
- android
download_paths:
android: /client/android/Bitmask-Android-latest.apk
linux: /client/linux
linux32: /client/linux/Bitmask-linux32-latest.tar.bz2
linux64: /client/linux/Bitmask-linux64-latest.tar.bz2
osx: /client/osx/Bitmask-OSX-latest.dmg
windows: /client/windows/Bitmask-win32-latest.zip
other: /client
common: &common
force_ssl: false
pagination_size: 30
auth:
token_expires_after: 60
# handles that will be blocked from being used as logins or email aliases
# in addition to the ones in /etc/passwd and http://tools.ietf.org/html/rfc2142
handle_blacklist: [certmaster, ssladmin, arin-admin, administrator, www-data, maildrop]
# handles that will be allowed despite being in /etc/passwd or rfc2142
handle_whitelist: []
service_levels: &service_levels
service_levels:
0:
name: anonymous
cert_prefix: "LIMITED"
description: "anonymous account, with rate limited VPN"
1:
name: free
cert_prefix: "LIMITED"
description: "free account, with rate limited VPN"
cost: 0
quota: 100
2:
name: premium
cert_prefix: "UNLIMITED"
description: "premium account, with unlimited vpn"
cost:
USD: 10
EUR: 10
default_service_level: 1
development:
<<: *downloads
<<: *dev_ca
<<: *cert_options
<<: *common
<<: *service_levels
admins: [blue, admin, admin2]
domain: example.org
secret_token: 'xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx'
payment: []
test:
<<: *downloads
<<: *dev_ca
<<: *cert_options
<<: *common
<<: *service_levels
admins: [admin, admin2]
domain: test.me
secret_token: 'xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx'
payment: [billing]
production:
<<: *downloads
<<: *cert_options
<<: *common
admins: []
domain: example.net
payment: []
# logfile: /path/to/your/logs
|