update to latest state
	
		
			
	
		
	
	
		
	
		
			All checks were successful
		
		
	
	
		
			
				
	
				continuous-integration/drone/push Build is passing
				
			
		
		
	
	
				
					
				
			
		
			All checks were successful
		
		
	
	continuous-integration/drone/push Build is passing
				
			This commit is contained in:
		| @@ -4,5 +4,5 @@ webserver: | |||||||
|   - domain: "bitwarden.tormakristof.eu" |   - domain: "bitwarden.tormakristof.eu" | ||||||
|     port: 8080 |     port: 8080 | ||||||
|     bigrequests: false |     bigrequests: false | ||||||
|     https: true |     https: false | ||||||
| ... | ... | ||||||
|   | |||||||
| @@ -66,4 +66,13 @@ | |||||||
|     - internalsmtp |     - internalsmtp | ||||||
|     - backupscript |     - backupscript | ||||||
|     - backuphost |     - backuphost | ||||||
|  |  | ||||||
|  | - name: "Deploy OpenVPN server" | ||||||
|  |   hosts: openvpn | ||||||
|  |   roles: | ||||||
|  |     - netplan | ||||||
|  |     - common | ||||||
|  |     - openvpn | ||||||
|  |     - customfirewall | ||||||
|  |     - internalsmtp | ||||||
| ... | ... | ||||||
| @@ -4,7 +4,7 @@ | |||||||
|     update_cache: yes |     update_cache: yes | ||||||
|     state: present |     state: present | ||||||
|     name: |     name: | ||||||
|      - openvpn-server |      - openvpn | ||||||
|  |  | ||||||
| - name : "Enable ipv4 forwarding via sysctl" | - name : "Enable ipv4 forwarding via sysctl" | ||||||
|   ansible.posix.sysctl: |   ansible.posix.sysctl: | ||||||
| @@ -16,7 +16,7 @@ | |||||||
|  |  | ||||||
| - name: Enable and restart openvpn daemon | - name: Enable and restart openvpn daemon | ||||||
|   service: |   service: | ||||||
|     name: openvpn |     name: openvpn-server@stargate | ||||||
|     state: restarted |     state: restarted | ||||||
|     enabled: yes |     enabled: yes | ||||||
|  |  | ||||||
| @@ -41,6 +41,13 @@ | |||||||
|       -A POSTROUTING -s 192.168.37.0/24 -o eth0 -j MASQUERADE |       -A POSTROUTING -s 192.168.37.0/24 -o eth0 -j MASQUERADE | ||||||
|       -A POSTROUTING -s 192.168.37.0/24 -o eth2 -j MASQUERADE |       -A POSTROUTING -s 192.168.37.0/24 -o eth2 -j MASQUERADE | ||||||
|       COMMIT |       COMMIT | ||||||
|  |       -A ufw-before-input -i tun+ -j ACCEPT | ||||||
|  |       -A ufw-before-forward -i tun+ -j ACCEPT | ||||||
|  |       -A ufw-before-forward -i tun+ -o eth0 -m state --state RELATED,ESTABLISHED -j ACCEPT | ||||||
|  |       -A ufw-before-forward -i eth0 -o tun+ -m state --state RELATED,ESTABLISHED -j ACCEPT | ||||||
|  |       -A ufw-before-forward -i tun+ -o eth2 -m state --state RELATED,ESTABLISHED -j ACCEPT | ||||||
|  |       -A ufw-before-forward -i eth2 -o tun+ -m state --state RELATED,ESTABLISHED -j ACCEPT | ||||||
|  |       COMMIT | ||||||
|       # END OPENVPN RULES |       # END OPENVPN RULES | ||||||
|  |  | ||||||
| - name: Reload ufw | - name: Reload ufw | ||||||
|   | |||||||
| @@ -90,7 +90,7 @@ http { | |||||||
|             } |             } | ||||||
|         } |         } | ||||||
|  |  | ||||||
|         {% endfor %} |         {%- endfor %} | ||||||
|  |  | ||||||
|         {%- for staticsite in static %} |         {%- for staticsite in static %} | ||||||
|         server { |         server { | ||||||
| @@ -105,7 +105,7 @@ http { | |||||||
|             } |             } | ||||||
|         } |         } | ||||||
|  |  | ||||||
|         {% endfor %} |         {%- endfor %} | ||||||
|  |  | ||||||
|         {%- for redirectsite in redirect %} |         {%- for redirectsite in redirect %} | ||||||
|         server { |         server { | ||||||
| @@ -117,7 +117,7 @@ http { | |||||||
|             return 301 {{ redirectsite.destination }}; |             return 301 {{ redirectsite.destination }}; | ||||||
|         } |         } | ||||||
|  |  | ||||||
|         {% endfor %} |         {%- endfor %} | ||||||
|  |  | ||||||
|         server { |         server { | ||||||
|             listen 443 ssl http2; |             listen 443 ssl http2; | ||||||
|   | |||||||
| @@ -13,7 +13,6 @@ proxy: | |||||||
|   - {domain: grafana.tormakristof.eu, ip: monitoring.intra.tormakris.dev, bigrequests: false} |   - {domain: grafana.tormakristof.eu, ip: monitoring.intra.tormakris.dev, bigrequests: false} | ||||||
|   - {domain: yt.tormakristof.eu, ip: ytmirror.intra.tormakris.dev, bigrequests: true} |   - {domain: yt.tormakristof.eu, ip: ytmirror.intra.tormakris.dev, bigrequests: true} | ||||||
|   - {domain: mastodon.tormakristof.eu, ip: mastodon.intra.tormakris.dev, bigrequests: true} |   - {domain: mastodon.tormakristof.eu, ip: mastodon.intra.tormakris.dev, bigrequests: true} | ||||||
|   - {domain: jitsi.tormakristof.eu, ip: jitsi.intra.tormakris.dev, bigrequests: false} |  | ||||||
|   - {domain: speedtest.tormakristof.eu, ip: librespeed.intra.tormakris.dev, bigrequests: true} |   - {domain: speedtest.tormakristof.eu, ip: librespeed.intra.tormakris.dev, bigrequests: true} | ||||||
|  |  | ||||||
|  |  | ||||||
|   | |||||||
| @@ -69,9 +69,9 @@ http { | |||||||
|             server_name {{ server.domain }}; |             server_name {{ server.domain }}; | ||||||
|             ssl_certificate /etc/ssl/certs/ssl-cert-snakeoil.pem; |             ssl_certificate /etc/ssl/certs/ssl-cert-snakeoil.pem; | ||||||
|             ssl_certificate_key /etc/ssl/private/ssl-cert-snakeoil.key; |             ssl_certificate_key /etc/ssl/private/ssl-cert-snakeoil.key; | ||||||
|             {%- if server.bigrequests %} |             {% if server.bigrequests %} | ||||||
|             client_max_body_size    8G; |             client_max_body_size    8G; | ||||||
|             {%- endif %} |             {% endif %} | ||||||
|             location /{ |             location /{ | ||||||
|                 {% if server.https %} |                 {% if server.https %} | ||||||
|                 proxy_pass  https://127.0.0.1:{{ server.port }}; |                 proxy_pass  https://127.0.0.1:{{ server.port }}; | ||||||
| @@ -88,8 +88,8 @@ http { | |||||||
|  	            allow 192.168.69.0/24; |  	            allow 192.168.69.0/24; | ||||||
|  	            deny all; |  	            deny all; | ||||||
|             } |             } | ||||||
|             {%- if server.additionallocations is defined %} |             {% if server.additionallocations is defined %} | ||||||
|             {%- for location in server.additionallocations %} |             {% for location in server.additionallocations %} | ||||||
|             location {{location.location}}{ |             location {{location.location}}{ | ||||||
|                 {% if location.https %} |                 {% if location.https %} | ||||||
|                 proxy_pass  https://127.0.0.1:{{ location.port }}; |                 proxy_pass  https://127.0.0.1:{{ location.port }}; | ||||||
| @@ -97,11 +97,11 @@ http { | |||||||
|                 proxy_pass  http://127.0.0.1:{{ location.port }}; |                 proxy_pass  http://127.0.0.1:{{ location.port }}; | ||||||
|                 {% endif %} |                 {% endif %} | ||||||
|             } |             } | ||||||
|             {%- endfor %} |             {% endfor %} | ||||||
|             {%- endif %} |             {% endif %} | ||||||
|         } |         } | ||||||
|  |  | ||||||
|         {% endfor %} |         {%- endfor %} | ||||||
|  |  | ||||||
|         server { |         server { | ||||||
|             listen 8888; |             listen 8888; | ||||||
|   | |||||||
		Reference in New Issue
	
	Block a user