update to latest state
All checks were successful
continuous-integration/drone/push Build is passing
All checks were successful
continuous-integration/drone/push Build is passing
This commit is contained in:
parent
21a7c54b96
commit
3c883cdded
@ -4,5 +4,5 @@ webserver:
|
|||||||
- domain: "bitwarden.tormakristof.eu"
|
- domain: "bitwarden.tormakristof.eu"
|
||||||
port: 8080
|
port: 8080
|
||||||
bigrequests: false
|
bigrequests: false
|
||||||
https: true
|
https: false
|
||||||
...
|
...
|
||||||
|
@ -66,4 +66,13 @@
|
|||||||
- internalsmtp
|
- internalsmtp
|
||||||
- backupscript
|
- backupscript
|
||||||
- backuphost
|
- backuphost
|
||||||
|
|
||||||
|
- name: "Deploy OpenVPN server"
|
||||||
|
hosts: openvpn
|
||||||
|
roles:
|
||||||
|
- netplan
|
||||||
|
- common
|
||||||
|
- openvpn
|
||||||
|
- customfirewall
|
||||||
|
- internalsmtp
|
||||||
...
|
...
|
@ -4,7 +4,7 @@
|
|||||||
update_cache: yes
|
update_cache: yes
|
||||||
state: present
|
state: present
|
||||||
name:
|
name:
|
||||||
- openvpn-server
|
- openvpn
|
||||||
|
|
||||||
- name : "Enable ipv4 forwarding via sysctl"
|
- name : "Enable ipv4 forwarding via sysctl"
|
||||||
ansible.posix.sysctl:
|
ansible.posix.sysctl:
|
||||||
@ -16,7 +16,7 @@
|
|||||||
|
|
||||||
- name: Enable and restart openvpn daemon
|
- name: Enable and restart openvpn daemon
|
||||||
service:
|
service:
|
||||||
name: openvpn
|
name: openvpn-server@stargate
|
||||||
state: restarted
|
state: restarted
|
||||||
enabled: yes
|
enabled: yes
|
||||||
|
|
||||||
@ -41,6 +41,13 @@
|
|||||||
-A POSTROUTING -s 192.168.37.0/24 -o eth0 -j MASQUERADE
|
-A POSTROUTING -s 192.168.37.0/24 -o eth0 -j MASQUERADE
|
||||||
-A POSTROUTING -s 192.168.37.0/24 -o eth2 -j MASQUERADE
|
-A POSTROUTING -s 192.168.37.0/24 -o eth2 -j MASQUERADE
|
||||||
COMMIT
|
COMMIT
|
||||||
|
-A ufw-before-input -i tun+ -j ACCEPT
|
||||||
|
-A ufw-before-forward -i tun+ -j ACCEPT
|
||||||
|
-A ufw-before-forward -i tun+ -o eth0 -m state --state RELATED,ESTABLISHED -j ACCEPT
|
||||||
|
-A ufw-before-forward -i eth0 -o tun+ -m state --state RELATED,ESTABLISHED -j ACCEPT
|
||||||
|
-A ufw-before-forward -i tun+ -o eth2 -m state --state RELATED,ESTABLISHED -j ACCEPT
|
||||||
|
-A ufw-before-forward -i eth2 -o tun+ -m state --state RELATED,ESTABLISHED -j ACCEPT
|
||||||
|
COMMIT
|
||||||
# END OPENVPN RULES
|
# END OPENVPN RULES
|
||||||
|
|
||||||
- name: Reload ufw
|
- name: Reload ufw
|
||||||
|
@ -90,7 +90,7 @@ http {
|
|||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
{% endfor %}
|
{%- endfor %}
|
||||||
|
|
||||||
{%- for staticsite in static %}
|
{%- for staticsite in static %}
|
||||||
server {
|
server {
|
||||||
@ -105,7 +105,7 @@ http {
|
|||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
{% endfor %}
|
{%- endfor %}
|
||||||
|
|
||||||
{%- for redirectsite in redirect %}
|
{%- for redirectsite in redirect %}
|
||||||
server {
|
server {
|
||||||
@ -117,7 +117,7 @@ http {
|
|||||||
return 301 {{ redirectsite.destination }};
|
return 301 {{ redirectsite.destination }};
|
||||||
}
|
}
|
||||||
|
|
||||||
{% endfor %}
|
{%- endfor %}
|
||||||
|
|
||||||
server {
|
server {
|
||||||
listen 443 ssl http2;
|
listen 443 ssl http2;
|
||||||
|
@ -13,7 +13,6 @@ proxy:
|
|||||||
- {domain: grafana.tormakristof.eu, ip: monitoring.intra.tormakris.dev, bigrequests: false}
|
- {domain: grafana.tormakristof.eu, ip: monitoring.intra.tormakris.dev, bigrequests: false}
|
||||||
- {domain: yt.tormakristof.eu, ip: ytmirror.intra.tormakris.dev, bigrequests: true}
|
- {domain: yt.tormakristof.eu, ip: ytmirror.intra.tormakris.dev, bigrequests: true}
|
||||||
- {domain: mastodon.tormakristof.eu, ip: mastodon.intra.tormakris.dev, bigrequests: true}
|
- {domain: mastodon.tormakristof.eu, ip: mastodon.intra.tormakris.dev, bigrequests: true}
|
||||||
- {domain: jitsi.tormakristof.eu, ip: jitsi.intra.tormakris.dev, bigrequests: false}
|
|
||||||
- {domain: speedtest.tormakristof.eu, ip: librespeed.intra.tormakris.dev, bigrequests: true}
|
- {domain: speedtest.tormakristof.eu, ip: librespeed.intra.tormakris.dev, bigrequests: true}
|
||||||
|
|
||||||
|
|
||||||
|
@ -69,9 +69,9 @@ http {
|
|||||||
server_name {{ server.domain }};
|
server_name {{ server.domain }};
|
||||||
ssl_certificate /etc/ssl/certs/ssl-cert-snakeoil.pem;
|
ssl_certificate /etc/ssl/certs/ssl-cert-snakeoil.pem;
|
||||||
ssl_certificate_key /etc/ssl/private/ssl-cert-snakeoil.key;
|
ssl_certificate_key /etc/ssl/private/ssl-cert-snakeoil.key;
|
||||||
{%- if server.bigrequests %}
|
{% if server.bigrequests %}
|
||||||
client_max_body_size 8G;
|
client_max_body_size 8G;
|
||||||
{%- endif %}
|
{% endif %}
|
||||||
location /{
|
location /{
|
||||||
{% if server.https %}
|
{% if server.https %}
|
||||||
proxy_pass https://127.0.0.1:{{ server.port }};
|
proxy_pass https://127.0.0.1:{{ server.port }};
|
||||||
@ -88,8 +88,8 @@ http {
|
|||||||
allow 192.168.69.0/24;
|
allow 192.168.69.0/24;
|
||||||
deny all;
|
deny all;
|
||||||
}
|
}
|
||||||
{%- if server.additionallocations is defined %}
|
{% if server.additionallocations is defined %}
|
||||||
{%- for location in server.additionallocations %}
|
{% for location in server.additionallocations %}
|
||||||
location {{location.location}}{
|
location {{location.location}}{
|
||||||
{% if location.https %}
|
{% if location.https %}
|
||||||
proxy_pass https://127.0.0.1:{{ location.port }};
|
proxy_pass https://127.0.0.1:{{ location.port }};
|
||||||
@ -97,11 +97,11 @@ http {
|
|||||||
proxy_pass http://127.0.0.1:{{ location.port }};
|
proxy_pass http://127.0.0.1:{{ location.port }};
|
||||||
{% endif %}
|
{% endif %}
|
||||||
}
|
}
|
||||||
{%- endfor %}
|
{% endfor %}
|
||||||
{%- endif %}
|
{% endif %}
|
||||||
}
|
}
|
||||||
|
|
||||||
{% endfor %}
|
{%- endfor %}
|
||||||
|
|
||||||
server {
|
server {
|
||||||
listen 8888;
|
listen 8888;
|
||||||
|
Loading…
Reference in New Issue
Block a user