update to latest state
All checks were successful
continuous-integration/drone/push Build is passing

This commit is contained in:
Torma Kristóf 2023-02-19 13:42:53 +01:00
parent 21a7c54b96
commit 3c883cdded
6 changed files with 29 additions and 14 deletions

View File

@ -4,5 +4,5 @@ webserver:
- domain: "bitwarden.tormakristof.eu" - domain: "bitwarden.tormakristof.eu"
port: 8080 port: 8080
bigrequests: false bigrequests: false
https: true https: false
... ...

View File

@ -66,4 +66,13 @@
- internalsmtp - internalsmtp
- backupscript - backupscript
- backuphost - backuphost
- name: "Deploy OpenVPN server"
hosts: openvpn
roles:
- netplan
- common
- openvpn
- customfirewall
- internalsmtp
... ...

View File

@ -4,7 +4,7 @@
update_cache: yes update_cache: yes
state: present state: present
name: name:
- openvpn-server - openvpn
- name : "Enable ipv4 forwarding via sysctl" - name : "Enable ipv4 forwarding via sysctl"
ansible.posix.sysctl: ansible.posix.sysctl:
@ -16,7 +16,7 @@
- name: Enable and restart openvpn daemon - name: Enable and restart openvpn daemon
service: service:
name: openvpn name: openvpn-server@stargate
state: restarted state: restarted
enabled: yes enabled: yes
@ -41,6 +41,13 @@
-A POSTROUTING -s 192.168.37.0/24 -o eth0 -j MASQUERADE -A POSTROUTING -s 192.168.37.0/24 -o eth0 -j MASQUERADE
-A POSTROUTING -s 192.168.37.0/24 -o eth2 -j MASQUERADE -A POSTROUTING -s 192.168.37.0/24 -o eth2 -j MASQUERADE
COMMIT COMMIT
-A ufw-before-input -i tun+ -j ACCEPT
-A ufw-before-forward -i tun+ -j ACCEPT
-A ufw-before-forward -i tun+ -o eth0 -m state --state RELATED,ESTABLISHED -j ACCEPT
-A ufw-before-forward -i eth0 -o tun+ -m state --state RELATED,ESTABLISHED -j ACCEPT
-A ufw-before-forward -i tun+ -o eth2 -m state --state RELATED,ESTABLISHED -j ACCEPT
-A ufw-before-forward -i eth2 -o tun+ -m state --state RELATED,ESTABLISHED -j ACCEPT
COMMIT
# END OPENVPN RULES # END OPENVPN RULES
- name: Reload ufw - name: Reload ufw

View File

@ -90,7 +90,7 @@ http {
} }
} }
{% endfor %} {%- endfor %}
{%- for staticsite in static %} {%- for staticsite in static %}
server { server {
@ -105,7 +105,7 @@ http {
} }
} }
{% endfor %} {%- endfor %}
{%- for redirectsite in redirect %} {%- for redirectsite in redirect %}
server { server {
@ -117,7 +117,7 @@ http {
return 301 {{ redirectsite.destination }}; return 301 {{ redirectsite.destination }};
} }
{% endfor %} {%- endfor %}
server { server {
listen 443 ssl http2; listen 443 ssl http2;

View File

@ -13,7 +13,6 @@ proxy:
- {domain: grafana.tormakristof.eu, ip: monitoring.intra.tormakris.dev, bigrequests: false} - {domain: grafana.tormakristof.eu, ip: monitoring.intra.tormakris.dev, bigrequests: false}
- {domain: yt.tormakristof.eu, ip: ytmirror.intra.tormakris.dev, bigrequests: true} - {domain: yt.tormakristof.eu, ip: ytmirror.intra.tormakris.dev, bigrequests: true}
- {domain: mastodon.tormakristof.eu, ip: mastodon.intra.tormakris.dev, bigrequests: true} - {domain: mastodon.tormakristof.eu, ip: mastodon.intra.tormakris.dev, bigrequests: true}
- {domain: jitsi.tormakristof.eu, ip: jitsi.intra.tormakris.dev, bigrequests: false}
- {domain: speedtest.tormakristof.eu, ip: librespeed.intra.tormakris.dev, bigrequests: true} - {domain: speedtest.tormakristof.eu, ip: librespeed.intra.tormakris.dev, bigrequests: true}

View File

@ -69,9 +69,9 @@ http {
server_name {{ server.domain }}; server_name {{ server.domain }};
ssl_certificate /etc/ssl/certs/ssl-cert-snakeoil.pem; ssl_certificate /etc/ssl/certs/ssl-cert-snakeoil.pem;
ssl_certificate_key /etc/ssl/private/ssl-cert-snakeoil.key; ssl_certificate_key /etc/ssl/private/ssl-cert-snakeoil.key;
{%- if server.bigrequests %} {% if server.bigrequests %}
client_max_body_size 8G; client_max_body_size 8G;
{%- endif %} {% endif %}
location /{ location /{
{% if server.https %} {% if server.https %}
proxy_pass https://127.0.0.1:{{ server.port }}; proxy_pass https://127.0.0.1:{{ server.port }};
@ -88,8 +88,8 @@ http {
allow 192.168.69.0/24; allow 192.168.69.0/24;
deny all; deny all;
} }
{%- if server.additionallocations is defined %} {% if server.additionallocations is defined %}
{%- for location in server.additionallocations %} {% for location in server.additionallocations %}
location {{location.location}}{ location {{location.location}}{
{% if location.https %} {% if location.https %}
proxy_pass https://127.0.0.1:{{ location.port }}; proxy_pass https://127.0.0.1:{{ location.port }};
@ -97,11 +97,11 @@ http {
proxy_pass http://127.0.0.1:{{ location.port }}; proxy_pass http://127.0.0.1:{{ location.port }};
{% endif %} {% endif %}
} }
{%- endfor %} {% endfor %}
{%- endif %} {% endif %}
} }
{% endfor %} {%- endfor %}
server { server {
listen 8888; listen 8888;