Compare commits
4 Commits
66cdd276c2
...
bc1801a5d7
Author | SHA1 | Date | |
---|---|---|---|
|
bc1801a5d7 | ||
|
6956b9b6fc | ||
|
9ff8149e24 | ||
|
3232483945 |
@ -1,98 +0,0 @@
|
||||
_____ _
|
||||
| ___| __ ___ | |__ ___
|
||||
| |_ | '__/ _ \| '_ \ / _ \
|
||||
| _|| | | (_) | | | | __/
|
||||
|_| |_| \___/|_| |_|\___|
|
||||
|
||||
__ __ _ _ _ _ _
|
||||
\ \ / /__(_) |__ _ __ __ _ ___| |__ | |_ ___ _ __ | |
|
||||
\ \ /\ / / _ \ | '_ \| '_ \ / _` |/ __| '_ \| __/ _ \ '_ \| |
|
||||
\ V V / __/ | | | | | | | (_| | (__| | | | || __/ | | |_|
|
||||
\_/\_/ \___|_|_| |_|_| |_|\__,_|\___|_| |_|\__\___|_| |_(_)
|
||||
|
||||
|
||||
|
||||
Lieber Iljas,
|
||||
|
||||
Dein Weihnachtsgeschenk dieses Jahr ist mit Arbeit verbunden - Arbeit
|
||||
Deinerseits wohlgemerkt ;-)
|
||||
|
||||
Um es zu genießen mußt Du zuerst:
|
||||
- dem mächtigen amazon Konzern noch weiter in die Hände spielen und Dir
|
||||
einen aws Account einrichten
|
||||
- auf Deinem nagelneuen AWS Account unter Sicherheit/IAM einen Benutzer
|
||||
hinzufügen mit Zugriffstyp "Programmgesteuerter Zugriff"
|
||||
- die dabei generierten Tokens Dir merken und z.B. in Deine .bashrc
|
||||
eintragen als Umgebungsvariablen `AWS_ACCESS_KEY_ID` und `AWS_SECRET_ACCESS_KEY`
|
||||
- Dir ansible installieren - und da Du wahrscheinlich verstehen willst was
|
||||
passiert, ist das ansible lernen die eigentliche Arbeit ;-)
|
||||
- das ansible-Playbook anschauen und ausführen, dass Stefan erstellt hat und
|
||||
das unter wg-aws geclont ist
|
||||
- Dir auf Deinen Geräten wireguard als VPN Software installieren
|
||||
- die Konfigurationen, die das ansible Playbook erstellt hat auf Deinen
|
||||
Geräten importieren (als Datei oder qrcode)
|
||||
- Dich über Deinen neuen mini-Cloud-VPN-Server freuen auf dem Du auch sonst
|
||||
alles machen kannst was Du magst
|
||||
- mit der Inbetriebnahme den unten stehenden Gutschein bei uns einlösen
|
||||
;-) - leider bietet aws nämlich kein Prepaid an ...
|
||||
|
||||
_ _ _ ___
|
||||
__ _____ _ __ | | (_)_ __ __| | __ _ ( _ )
|
||||
\ \ / / _ \| '_ \ | | | | '_ \ / _` |/ _` | / _ \/\
|
||||
\ V / (_) | | | | | |___| | | | | (_| | (_| | | (_> <
|
||||
\_/ \___/|_| |_| |_____|_|_| |_|\__,_|\__,_| \___/\/
|
||||
|
||||
____ _ __
|
||||
/ ___|| |_ ___ / _| __ _ _ __
|
||||
\___ \| __/ _ \ |_ / _` | '_ \
|
||||
___) | || __/ _| (_| | | | |
|
||||
|____/ \__\___|_| \__,_|_| |_|
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
========================= X8 ================================ X8 ==========
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
____ _ _ _ _ _ _
|
||||
/ ___|_ _| |_ ___ ___| |__ ___(_)_ __ _ / | | | __ _| |__ _ __
|
||||
| | _| | | | __/ __|/ __| '_ \ / _ \ | '_ \(_) | | _ | |/ _` | '_ \| '__|
|
||||
| |_| | |_| | |_\__ \ (__| | | | __/ | | | |_ | | | |_| | (_| | | | | |
|
||||
\____|\__,_|\__|___/\___|_| |_|\___|_|_| |_(_) |_| \___/ \__,_|_| |_|_|
|
||||
|
||||
____ _ _
|
||||
/ ___|_ __ __ ___ _(_) |_ ___ _ __
|
||||
| | _| '__/ _` \ \ / / | __/ _ \| '_ \
|
||||
| |_| | | | (_| |\ V /| | || (_) | | | |
|
||||
\____|_| \__,_| \_/ |_|\__\___/|_| |_|
|
||||
|
||||
_ _ _ ____ _
|
||||
| |_| || | __ _ _ __ __ _ _ __ ___ / ___| _ __ ___ | |_
|
||||
| __| || |_ / _` | | '_ \ / _` | '_ \ / _ \ \___ \| '_ \ / _ \| __|
|
||||
| |_|__ _| (_| |_| | | | (_| | | | | (_) | ___) | |_) | (_) | |_
|
||||
\__| |_| \__, (_)_| |_|\__,_|_| |_|\___/ |____/| .__/ \___/ \__|
|
||||
|___/ |_|
|
||||
_ _ _ _
|
||||
(_)_ __ ___| |_ __ _ _ __ ___ ___ | |__ ___(_)
|
||||
| | '_ \/ __| __/ _` | '_ \ / __/ _ \ | '_ \ / _ \ |
|
||||
| | | | \__ \ || (_| | | | | (_| __/ | |_) | __/ |
|
||||
|_|_| |_|___/\__\__,_|_| |_|\___\___| |_.__/ \___|_|
|
||||
|
||||
_
|
||||
__ _ _ __ ___ __ _ _______ _ __ __ _____| |__
|
||||
/ _` | '_ ` _ \ / _` |_ / _ \| '_ \ \ \ /\ / / _ \ '_ \
|
||||
| (_| | | | | | | (_| |/ / (_) | | | | \ V V / __/ |_) |
|
||||
\__,_|_| |_| |_|\__,_/___\___/|_| |_| \_/\_/ \___|_.__/
|
||||
|
||||
_
|
||||
___ ___ _ ____ _(_) ___ ___
|
||||
/ __|/ _ \ '__\ \ / / |/ __/ _ \
|
||||
\__ \ __/ | \ V /| | (_| __/
|
||||
|___/\___|_| \_/ |_|\___\___|
|
||||
|
@ -12,26 +12,20 @@
|
||||
prompt: AWS Region to use for instance
|
||||
default: "eu-central-1"
|
||||
private: no
|
||||
- name: aws_ami
|
||||
prompt: Disk image to use for instance (default is debian buster arm64)
|
||||
default: "ami-0e70ab85b58b23a77"
|
||||
private: no
|
||||
- name: aws_type
|
||||
prompt: Instance type to request
|
||||
default: "t4g.nano"
|
||||
private: no
|
||||
- name: dns_name
|
||||
prompt: Which hostname shall be registered for the host (Empty = no dns, Zone needs to be route53 managed)?
|
||||
default: ""
|
||||
private: no
|
||||
vars:
|
||||
dns_zone_name: "{{ dns_name | regex_replace('^[\\w-]+\\.', '') }}"
|
||||
ansible_python_interpreter: /usr/bin/python3
|
||||
roles:
|
||||
- aws_graviton_nano_spot
|
||||
- aws_graviton_nano
|
||||
|
||||
- name: include playbook for pihole
|
||||
import_playbook: pihole.yml
|
||||
- name: include playbook for pihole#
|
||||
import_playbook: headscale-server.yml
|
||||
|
||||
- name: include playbook for wireguard server
|
||||
import_playbook: wireguard_pihole_only.yml
|
||||
#- name: include playbook for pihole#
|
||||
# import_playbook: pihole.yml
|
||||
|
||||
#- name: include playbook for wireguard server
|
||||
# import_playbook: wireguard_pihole_only.yml
|
||||
|
15
headscale-server.yml
Normal file
15
headscale-server.yml
Normal file
@ -0,0 +1,15 @@
|
||||
---
|
||||
# Install headscale
|
||||
- name: Install headscale
|
||||
hosts: launched
|
||||
remote_user: admin
|
||||
become: true
|
||||
vars_prompt:
|
||||
- name: install_headscale
|
||||
prompt: Shall the headscale server software be installed (Defaults to false)?
|
||||
default: false
|
||||
private: no
|
||||
roles:
|
||||
- role: headscale-server
|
||||
when: install_headscale
|
||||
|
@ -20,21 +20,40 @@
|
||||
cidr_ip: 0.0.0.0/0
|
||||
register: security_group
|
||||
|
||||
- name: create graviton spot instance
|
||||
amazon.aws.ec2:
|
||||
- name: find arm64 ami for debian
|
||||
amazon.aws.ec2_ami_info:
|
||||
region: "{{ aws_region }}"
|
||||
owners: amazon
|
||||
filters:
|
||||
name: "debian-11-arm64-20*"
|
||||
architecture: "arm64"
|
||||
register: amis
|
||||
|
||||
- name: Extract the most recently created AMI from the list
|
||||
ansible.builtin.set_fact:
|
||||
aws_ami: "{{ amis.images[-1].image_id }}"
|
||||
|
||||
- name: debug
|
||||
debug:
|
||||
var: aws_ami
|
||||
|
||||
- name: create graviton instance
|
||||
amazon.aws.ec2_instance:
|
||||
region: "{{ aws_region }}"
|
||||
spot_type: persistent
|
||||
spot_wait_timeout: 120
|
||||
key_name: vpn_key
|
||||
group_id: "{{ security_group.group_id }}"
|
||||
instance_type: "{{ aws_type }}"
|
||||
image: "{{ aws_ami }}"
|
||||
wait: yes
|
||||
name: "{{ dns_name }}"
|
||||
security_group: "{{ security_group.group_id }}"
|
||||
instance_type: "t4g.nano"
|
||||
image_id: "{{ aws_ami }}"
|
||||
instance_initiated_shutdown_behavior: terminate
|
||||
network:
|
||||
assign_public_ip: true
|
||||
wait: true
|
||||
state: running
|
||||
register: graviton
|
||||
|
||||
- name: generate route53 dns entry for the instance
|
||||
route53:
|
||||
amazon.aws.route53:
|
||||
command: create
|
||||
overwrite: yes
|
||||
zone: "{{ dns_zone_name }}"
|
||||
@ -54,11 +73,11 @@
|
||||
|
||||
- name: Add new instance to host group
|
||||
add_host:
|
||||
hostname: "{{ item.public_ip }}"
|
||||
hostname: "{{ item.public_ip_address }}"
|
||||
groupname: launched
|
||||
loop: "{{ graviton.instances }}"
|
||||
|
||||
- name: Print public IP of this server
|
||||
debug:
|
||||
msg: Your instance has th public IP address {{ item.public_ip }}
|
||||
msg: Your instance has th public IP address {{ item.public_ip_address }}
|
||||
loop: "{{ graviton.instances }}"
|
14
roles/common-server/tasks/main.yml
Normal file
14
roles/common-server/tasks/main.yml
Normal file
@ -0,0 +1,14 @@
|
||||
---
|
||||
- name: Update APT package cache
|
||||
apt:
|
||||
update_cache: true
|
||||
upgrade: dist
|
||||
|
||||
- name: Install debian packages
|
||||
apt:
|
||||
name: "{{ item }}"
|
||||
state: present
|
||||
with_items:
|
||||
- "unattended-upgrades"
|
||||
- "joe"
|
||||
- "fail2ban"
|
58
roles/headscale-server/tasks/main.yml
Normal file
58
roles/headscale-server/tasks/main.yml
Normal file
@ -0,0 +1,58 @@
|
||||
---
|
||||
- name: Update APT package cache
|
||||
apt:
|
||||
update_cache: true
|
||||
upgrade: dist
|
||||
|
||||
- name: Install debian packages
|
||||
apt:
|
||||
name: "{{ item }}"
|
||||
state: present
|
||||
with_items:
|
||||
- "unattended-upgrades"
|
||||
- "joe"
|
||||
- "fail2ban"
|
||||
|
||||
#- name: Download headscale .deb
|
||||
# get_url:
|
||||
# url="https://github.com/juanfont/headscale/releases/download/v0.22.3/headscale_0.22.3_linux_arm64.deb"
|
||||
# dest="/tmp/headscale.deb"
|
||||
|
||||
#- name: Install my_package
|
||||
# apt: deb="/tmp/headscale.deb"
|
||||
|
||||
- name: determine name of host
|
||||
ansible.builtin.set_fact:
|
||||
headscale_hostname: "{{ inventory_hostname }}"
|
||||
|
||||
- name: determine name of network
|
||||
ansible.builtin.set_fact:
|
||||
headscale_base_domain: "{{ headscale_hostname | regex_replace('^[\\w-]+\\.', '') }}"
|
||||
|
||||
- name: generate config
|
||||
template:
|
||||
src: "config.yaml"
|
||||
dest: "/etc/headscale/config.yaml"
|
||||
|
||||
- name: ensure directories are present
|
||||
ansible.builtin.file:
|
||||
path: "{{ item }}"
|
||||
state: directory
|
||||
mode: '0755'
|
||||
with_items:
|
||||
- /var/lib/headscale
|
||||
- /var/lib/headscale/cache
|
||||
|
||||
- name: Enable systemd service
|
||||
ansible.builtin.systemd:
|
||||
name: headscale.service
|
||||
state: started
|
||||
enabled: true
|
||||
|
||||
# Exit node:
|
||||
# curl -fsSL https://pkgs.tailscale.com/stable/debian/bullseye.noarmor.gpg | sudo tee /usr/share/keyrings/tailscale-archive-keyring.gpg >/dev/null
|
||||
# curl -fsSL https://pkgs.tailscale.com/stable/debian/bullseye.tailscale-keyring.list | sudo tee /etc/apt/sources.list.d/tailscale.list
|
||||
# apt-get update
|
||||
# apt-get install tailscale
|
||||
# tailscale up --advertise-exit-node --login-server https://headscale.wolkige.abgruen.de
|
||||
#
|
45
roles/headscale-server/templates/config.yaml
Normal file
45
roles/headscale-server/templates/config.yaml
Normal file
@ -0,0 +1,45 @@
|
||||
---
|
||||
# Headscale configuration
|
||||
# addresses. ports and paths
|
||||
server_url: "https://{{ headscale_hostname }}"
|
||||
listen_addr: 0.0.0.0:443
|
||||
metrics_listen_addr: 127.0.0.1:9090
|
||||
grpc_listen_addr: 127.0.0.1:50443
|
||||
grpc_allow_insecure: false
|
||||
private_key_path: /var/lib/headscale/private.key
|
||||
noise:
|
||||
private_key_path: /var/lib/headscale/noise_private.key
|
||||
# IP ranges & dns
|
||||
ip_prefixes:
|
||||
- fd7a:115c:a1e0::/48
|
||||
- 10.13.100.0/24
|
||||
dns_config:
|
||||
override_local_dns: true
|
||||
nameservers:
|
||||
- 1.1.1.1
|
||||
magic_dns: true
|
||||
base_domain: {{ headscale_base_domain }}
|
||||
|
||||
# DERP
|
||||
derp:
|
||||
server:
|
||||
enabled: true
|
||||
region_id: 999
|
||||
region_code: "aws-headscale-maecki"
|
||||
region_name: "aws-headscale-maecki"
|
||||
stun_listen_addr: "0.0.0.0:3478"
|
||||
paths: []
|
||||
auto_update_enabled: false
|
||||
update_frequency: 24h
|
||||
|
||||
# DB
|
||||
db_type: sqlite3
|
||||
db_path: /var/lib/headscale/db.sqlite
|
||||
|
||||
# TLS
|
||||
acme_url: https://acme-v02.api.letsencrypt.org/directory
|
||||
acme_email: ""
|
||||
tls_letsencrypt_hostname: "{{ headscale_hostname }}"
|
||||
tls_letsencrypt_cache_dir: /var/lib/headscale/cache
|
||||
tls_letsencrypt_challenge_type: HTTP-01
|
||||
tls_letsencrypt_listen: ":http"
|
Loading…
x
Reference in New Issue
Block a user