1
0
Fork 0
mirror of https://github.com/iiab/iiab.git synced 2025-02-13 03:32:12 +00:00
iiab/roles/network/defaults/main.yml
2019-05-25 07:36:25 -04:00

106 lines
3.3 KiB
YAML

# IIAB Networking Doc: https://github.com/iiab/iiab/wiki/IIAB-Networking
# Ansible README: https://github.com/iiab/iiab/tree/master/roles/network
# http://FAQ.IIAB.IO -> click on "Any other networking tips?"
# Firewall (iptables) can be tuned in /etc/iiab/local_vars.yml with this var:
# ports_externally_visible: 3
# https://github.com/iiab/iiab/wiki/IIAB-Networking#firewall-iptables
# Wi-Fi
# host_country_code: US
# host_ssid: "Internet in a Box"
# host_wifi_mode: g
# host_channel: 6
# hostapd_secure: False
# hostapd_password: changeme
# Above 6 vars set in /etc/iiab/local_vars.yml
#
# hostapd_enabled: True
# Above is forcibly set to False (in roles/network/tasks/main.yml) if IIAB is
# being WiFi-installed (run "iiab-hotspot-on" AFTER ./iiab-install completes
# and content is downloaded, to enable the internal WiFi Access Point / AP!)
#
# reboot_to_AP: False
# For those installing IIAB over WiFi: "reboot_to_AP: True" overrides the above
# detection of WiFi-as-gateway, forcing "hostapd_enabled: True" regardless.
#
# Above 2 vars set in /opt/iiab/iiab/vars/default_vars.yml
#
hostapd_wait: 5
host_wireless_n: False
driver_name: nl80211
# DNS / name resolution
# dhcpd_install: False
# dhcpd_enabled: False
# named_install: False
# named_enabled: False
# dnsmasq_enabled: True
# dnsmasq_install: True
# dns_jail_enabled: False
# Above 7 vars set in /etc/iiab/local_vars.yml
#
# dhcp_service: ???? # Set in individual OS's /opt/iiab/iiab/vars/<OS>.yml for use in roles/network/tasks/dhcpd.yml
# dhcp_service2: "dhcpd disabled" # Moved to roles/network/tasks/computed_services.yml as community transitions from named/BIND to dnsmasq (PR #1202)
# Dynamically calculated later
# iiab_network_mode: "Gateway"
# Defaults for network detection
wireless_lan_present: False
strict_networking: False
iiab_demo_mode: False
gui_static_wan: False
wan_cidr:
# Set defaults for discovery process as strings
wifi1: "not found-1"
wifi2: "not found-2"
ap_device: "none"
device_gw: "none"
device_gw2: ""
iiab_wan_iface: "none"
iiab_lan_iface: "none"
discovered_lan_iface: "none"
discovered_wired_iface: "none"
discovered_wireless_iface: "none"
# Red Hat
#iiab_wired_lan_iface: "none"
#iiab_wireless_lan_iface: "none"
has_WAN: False
has_ifcfg_gw: "none"
has_wifi_gw: "none"
# Debian
dhcpcd_result: ""
wan_in_interfaces: False
network_manager_active: False
systemd_networkd_active: False
# The values here are default local variables
gui_wan_iface: "unset"
gui_static_wan_ip: "unset"
gui_desired_network_role: Gateway
wondershaper_dspeed: "4096"
wondershaper_upspeed: "1024"
# Unused
# network_config_dir: /etc/network/interfaces.d
# Originally for @tim-moody's Nodogsplash approach to Captive Portal
# Highly experimental as of June 2018: https://github.com/iiab/iiab/issues/608
#
# Newer: Python-based Captive Portal, that @m-anish & @jvonau experimented with
# in July 2018 (https://github.com/iiab/iiab/pull/870) and that @georgejhunt
# extensively refined in Sept 2018 (https://github.com/iiab/iiab/pull/1179)
# captive_portal_install: False
# captive_portal_enabled: False
# Above 2 vars set in /etc/iiab/local_vars.yml
# captive_portal_port: "9090"
# Above var set in /opt/iiab/iiab/vars/default_vars.yml
py_captive_portal_port: "9090"
py_captive_portal_username: "Admin"
py_captive_portal_password: "changeme"
# In a pinch, disable it by running: systemctl disable captive-portal