mirror of
https://github.com/telekom-security/tpotce.git
synced 2025-04-19 21:52:27 +00:00

add ENVs checker to keep tpotinit from starting if ENVs are not present or incorrectly set
73 lines
3.1 KiB
Text
73 lines
3.1 KiB
Text
# T-Pot config file. Do not remove.
|
|
|
|
# Set Web username and password here, it will be used to create the Nginx password file nginxpasswd.
|
|
# Use 'htpasswd -n <username>' to create the WEB_USER if you want to manually deploy T-Pot
|
|
# Example: 'htpasswd -n tsec' will print tsec:$apr1$TdJGdsss$6yLsxPmOcXb2kaEZ7lKva0
|
|
# Copy the string and replace WEB_USER='tsec:$apr1$TdJGdsss$6yLsxPmOcXb2kaEZ7lKva0'
|
|
WEB_USER='change:me'
|
|
|
|
# T-Pot Blackhole
|
|
# ENABLED: T-Pot will download a db of known mass scanners and nullroute them
|
|
# Be aware, this will put T-Pot off the map for stealth reasons and
|
|
# you will get less traffic. Routes will active until reboot and will
|
|
# be re-added with every T-Pot start until disabled.
|
|
# DISABLED: This is the default and no stealth efforts are in place.
|
|
TPOT_BLACKHOLE=DISABLED
|
|
|
|
# T-Pot Persistence
|
|
# on: This is the default. T-Pot will keep the honeypot logfiles and rotate
|
|
# with logrotate for 30 days.
|
|
# off: This is recommended for Raspberry Pi or setups with weaker CPUs or
|
|
# if you just do not need any of the logfiles.
|
|
TPOT_PERSISTENCE=on
|
|
|
|
# T-Pot AttackMap Text Output
|
|
# ENABLED: This is the default and the docker container map_data will print events to the console.
|
|
# DISABLED: Printing events to the console is disabled.
|
|
TPOT_ATTACKMAP_TEXT=ENABLED
|
|
|
|
# T-Pot AttackMap Text Output Timezone
|
|
# UTC: (T-Pot default) This is usually the best option.
|
|
# Continent/City: In Linux you can check our timezone with `readlink` /etc/localtime or
|
|
# see the full list here: https://en.wikipedia.org/wiki/List_of_tz_database_time_zones
|
|
# Examples: America/New_York, Asia/Taipei, Australia/Melbourne, Europe/Athens, Europe/Berlin
|
|
TPOT_ATTACKMAP_TEXT_TIMEZONE=UTC
|
|
|
|
###################################################################################
|
|
# NEVER MAKE CHANGES TO THIS SECTION UNLESS YOU REALLY KNOW WHAT YOU ARE DOING!!! #
|
|
###################################################################################
|
|
|
|
# T-Pot Landing page provides Cockpit Link
|
|
COCKPIT=false
|
|
|
|
# docker.sock Path
|
|
TPOT_DOCKER_SOCK=/var/run/docker.sock
|
|
|
|
# docker compose .env
|
|
TPOT_DOCKER_ENV=./.env
|
|
|
|
# Docker-Compose file
|
|
TPOT_DOCKER_COMPOSE=./docker-compose.yml
|
|
|
|
# T-Pot Repo
|
|
# Depending on where you are located you may choose between DockerHub and GHCR
|
|
# dtagdevsec: This will use the DockerHub image registry
|
|
# ghcr.io/telekom-security: This will use the GitHub container registry
|
|
TPOT_REPO=dtagdevsec
|
|
|
|
# T-Pot Version Tag
|
|
TPOT_VERSION=dev
|
|
|
|
# T-Pot Pull Policy
|
|
# always: (T-Pot default) Compose implementations SHOULD always pull the image from the registry.
|
|
# never: Compose implementations SHOULD NOT pull the image from a registry and SHOULD rely on the platform cached image.
|
|
# missing: Compose implementations SHOULD pull the image only if it's not available in the platform cache.
|
|
# build: Compose implementations SHOULD build the image. Compose implementations SHOULD rebuild the image if already present.
|
|
TPOT_PULL_POLICY=always
|
|
|
|
# T-Pot Data Path
|
|
TPOT_DATA_PATH=./data
|
|
|
|
# OSType (linux, mac, win)
|
|
# Most docker features are available on linux
|
|
TPOT_OSTYPE=linux
|