Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- diff --git a/inventories/inventory b/inventories/inventory
- index 2f3b15c..a5805c9 100644
- --- a/inventories/inventory
- +++ b/inventories/inventory
- @@ -21,4 +21,4 @@ localhost ansible_connection=local ansible_python_interpreter=python3
- # requires a password, use the --ask-become-pass command line option.
- #
- # [streisand-host]
- -# 255.255.255.255 ansible_user=ubuntu
- +10.11.12.11 ansible_user=root streisand_noninteractive=true
- diff --git a/playbooks/roles/azure-security-group/tasks/main.yml b/playbooks/roles/azure-security-group/tasks/main.yml
- index 85c3dee..f94b51d 100644
- --- a/playbooks/roles/azure-security-group/tasks/main.yml
- +++ b/playbooks/roles/azure-security-group/tasks/main.yml
- @@ -8,13 +8,13 @@
- azure_rm_virtualnetwork:
- resource_group: "{{ azure_resource_group_name }}"
- name: "{{ azure_resource_group_name }}"
- - address_prefixes: "10.10.0.0/16"
- + address_prefixes: "10.190.0.0/16"
- - name: Create Azure subnet
- azure_rm_subnet:
- resource_group: "{{ azure_resource_group_name }}"
- name: "{{ azure_resource_group_name }}"
- - address_prefix: "10.10.0.0/24"
- + address_prefix: "10.190.0.0/24"
- virtual_network: "{{ azure_resource_group_name }}"
- - name: Create Azure public ip
- diff --git a/playbooks/roles/gpg/tasks/main.yml b/playbooks/roles/gpg/tasks/main.yml
- index 8f88833..451b22b 100644
- --- a/playbooks/roles/gpg/tasks/main.yml
- +++ b/playbooks/roles/gpg/tasks/main.yml
- @@ -38,6 +38,22 @@
- group: root
- mode: 0750
- +- name: "Create the Streisand GPG dirmngr S.dirmngr"
- + file:
- + dest: "{{ root_gpg_dir }}/S.dirmngr"
- + state: directory
- + owner: root
- + group: root
- + mode: 0750
- +
- +- name: "Create the Streisand GPG dirmngr S.gpg-agent"
- + file:
- + dest: "{{ root_gpg_dir }}/S.gpg-agent"
- + state: directory
- + owner: root
- + group: root
- + mode: 0750
- +
- - name: "Ensure a GPG agent is running"
- command: "gpgconf --launch gpg-agent"
- diff --git a/playbooks/roles/lets-encrypt/tasks/install.yml b/playbooks/roles/lets-encrypt/tasks/install.yml
- index 632f7e2..685ded9 100644
- --- a/playbooks/roles/lets-encrypt/tasks/install.yml
- +++ b/playbooks/roles/lets-encrypt/tasks/install.yml
- @@ -6,6 +6,7 @@
- until: not le_add_apt_repository.failed
- retries: "{{ apt_repository_retries }}"
- delay: "{{ apt_repository_delay }}"
- + when: ansible_os_family != "Debian"
- - name: Add the certbot PPA
- apt_repository:
- @@ -14,6 +15,7 @@
- until: not le_add_certbot_ppa.failed
- retries: "{{ apt_repository_retries }}"
- delay: "{{ apt_repository_delay }}"
- + when: ansible_os_family != "Debian"
- - name: Install certbot
- apt:
- diff --git a/playbooks/roles/openvpn/tasks/firewall.yml b/playbooks/roles/openvpn/tasks/firewall.yml
- index e2d5166..34c6eca 100644
- --- a/playbooks/roles/openvpn/tasks/firewall.yml
- +++ b/playbooks/roles/openvpn/tasks/firewall.yml
- @@ -8,14 +8,14 @@
- to_port: "53"
- proto: "udp"
- rule: "allow"
- - from_ip: "10.8.0.0/24"
- + from_ip: "10.188.0.0/24"
- - name: Ensure UFW allows DNS requests from OpenVPN UDP clients
- ufw:
- to_port: "53"
- proto: "udp"
- rule: "allow"
- - from_ip: "10.9.0.0/24"
- + from_ip: "10.189.0.0/24"
- - name: Ensure UFW allows OpenVPN
- ufw:
- diff --git a/playbooks/roles/openvpn/templates/etc_openvpn_server.conf.j2 b/playbooks/roles/openvpn/templates/etc_openvpn_server.conf.j2
- index 1af2b87..184682f 100644
- --- a/playbooks/roles/openvpn/templates/etc_openvpn_server.conf.j2
- +++ b/playbooks/roles/openvpn/templates/etc_openvpn_server.conf.j2
- @@ -1,4 +1,4 @@
- -server 10.8.0.0 255.255.255.0
- +server 10.188.0.0 255.255.255.0
- push "dhcp-option DNS {{ dnsmasq_openvpn_tcp_ip }}"
- proto tcp
- port {{ openvpn_port }}
- diff --git a/playbooks/roles/openvpn/templates/etc_openvpn_server_udp.conf.j2 b/playbooks/roles/openvpn/templates/etc_openvpn_server_udp.conf.j2
- index 528ff2c..e6a65fa 100644
- --- a/playbooks/roles/openvpn/templates/etc_openvpn_server_udp.conf.j2
- +++ b/playbooks/roles/openvpn/templates/etc_openvpn_server_udp.conf.j2
- @@ -1,4 +1,4 @@
- -server 10.9.0.0 255.255.255.0
- +server 10.189.0.0 255.255.255.0
- push "dhcp-option DNS {{ dnsmasq_openvpn_udp_ip }}"
- proto udp
- port {{ openvpn_port_udp }}
- diff --git a/playbooks/roles/openvpn/vars/main.yml b/playbooks/roles/openvpn/vars/main.yml
- index 5ab4693..3c68ca0 100644
- --- a/playbooks/roles/openvpn/vars/main.yml
- +++ b/playbooks/roles/openvpn/vars/main.yml
- @@ -13,15 +13,15 @@ openvpn_sslh_profile_filename: "{{ openvpn_server }}-sslh.ovpn"
- openvpn_stunnel_profile_filename: "{{ openvpn_server }}-stunnel.ovpn"
- openvpn_combined_profile_filename: "{{ openvpn_server }}-combined.ovpn"
- -dnsmasq_openvpn_tcp_ip: "10.8.0.1"
- -dnsmasq_openvpn_udp_ip: "10.9.0.1"
- +dnsmasq_openvpn_tcp_ip: "10.188.0.1"
- +dnsmasq_openvpn_udp_ip: "10.189.0.1"
- openvpn_firewall_rules:
- - "iptables --wait {{ streisand_iptables_wait }} -A FORWARD -m state --state RELATED,ESTABLISHED -j ACCEPT"
- - - "iptables --wait {{ streisand_iptables_wait }} -A FORWARD -s 10.8.0.0/24 -j ACCEPT"
- - - "iptables --wait {{ streisand_iptables_wait }} -A FORWARD -s 10.9.0.0/24 -j ACCEPT"
- - - "iptables --wait {{ streisand_iptables_wait }} -t nat -A POSTROUTING -s 10.8.0.0/24 -o {{ ansible_default_ipv4.interface }} -j MASQUERADE"
- - - "iptables --wait {{ streisand_iptables_wait }} -t nat -A POSTROUTING -s 10.9.0.0/24 -o {{ ansible_default_ipv4.interface }} -j MASQUERADE"
- + - "iptables --wait {{ streisand_iptables_wait }} -A FORWARD -s 10.188.0.0/24 -j ACCEPT"
- + - "iptables --wait {{ streisand_iptables_wait }} -A FORWARD -s 10.189.0.0/24 -j ACCEPT"
- + - "iptables --wait {{ streisand_iptables_wait }} -t nat -A POSTROUTING -s 10.188.0.0/24 -o {{ ansible_default_ipv4.interface }} -j MASQUERADE"
- + - "iptables --wait {{ streisand_iptables_wait }} -t nat -A POSTROUTING -s 10.189.0.0/24 -o {{ ansible_default_ipv4.interface }} -j MASQUERADE"
- openvpn_gateway_location: "{{ streisand_gateway_location }}/openvpn"
- diff --git a/playbooks/roles/service-net/files/10-service0.network b/playbooks/roles/service-net/files/10-service0.network
- index 77d7bf6..c47a815 100644
- --- a/playbooks/roles/service-net/files/10-service0.network
- +++ b/playbooks/roles/service-net/files/10-service0.network
- @@ -5,4 +5,4 @@ Name=service0
- RequiredForOnline=yes
- [Network]
- -Address=10.10.10.10/24
- +Address=10.190.10.10/24
- diff --git a/playbooks/roles/service-net/files/service-net.conf b/playbooks/roles/service-net/files/service-net.conf
- index 9f24f9a..1e82455 100644
- --- a/playbooks/roles/service-net/files/service-net.conf
- +++ b/playbooks/roles/service-net/files/service-net.conf
- @@ -1,2 +1,2 @@
- # Listen on the service network's IP
- -listen-address=10.10.10.10
- +listen-address=10.190.10.10
- diff --git a/playbooks/roles/shadowsocks/tasks/main.yml b/playbooks/roles/shadowsocks/tasks/main.yml
- index 613b99e..d97fa8f 100644
- --- a/playbooks/roles/shadowsocks/tasks/main.yml
- +++ b/playbooks/roles/shadowsocks/tasks/main.yml
- @@ -13,6 +13,7 @@
- until: not shadowsocks_add_apt_repository.failed
- retries: "{{ apt_repository_retries }}"
- delay: "{{ apt_repository_delay }}"
- + when: ansible_os_family != "Debian"
- - name: Install shadowsocks-libev
- apt:
- diff --git a/playbooks/roles/shadowsocks/tasks/v2ray.yml b/playbooks/roles/shadowsocks/tasks/v2ray.yml
- index edc2c8f..7661098 100644
- --- a/playbooks/roles/shadowsocks/tasks/v2ray.yml
- +++ b/playbooks/roles/shadowsocks/tasks/v2ray.yml
- @@ -6,6 +6,7 @@
- until: not golang_add_apt_repository.failed
- retries: "{{ apt_repository_retries }}"
- delay: "{{ apt_repository_delay }}"
- + when: ansible_os_family != "Debian"
- - name: Install golang-go
- apt:
- diff --git a/playbooks/roles/ssh/files/sshd_config b/playbooks/roles/ssh/files/sshd_config
- index 542e4a1..c75cead 100644
- --- a/playbooks/roles/ssh/files/sshd_config
- +++ b/playbooks/roles/ssh/files/sshd_config
- @@ -12,6 +12,9 @@
- # License, v. 2.0. If a copy of the MPL was not distributed with this file,
- # You can obtain one at http://mozilla.org/MPL/2.0/.
- +Port 22
- +Port 2019
- +
- # Supported HostKey algorithms by order of preference.
- HostKey /etc/ssh/ssh_host_ed25519_key
- HostKey /etc/ssh/ssh_host_rsa_key
- diff --git a/playbooks/roles/ssh/vars/main.yml b/playbooks/roles/ssh/vars/main.yml
- index dbab143..4632c67 100644
- --- a/playbooks/roles/ssh/vars/main.yml
- +++ b/playbooks/roles/ssh/vars/main.yml
- @@ -1,5 +1,5 @@
- ---
- -ssh_rsa_host_key_size: "3072"
- +ssh_rsa_host_key_size: "4096"
- ssh_rsa_host_key_change_verification: "/etc/ssh/ssh_host_rsa_key_was_regenerated"
- ssh_rsa_host_private_key: "/etc/ssh/ssh_host_rsa_key"
- ssh_rsa_host_public_key: "{{ ssh_rsa_host_private_key }}.pub"
- diff --git a/playbooks/roles/tinyproxy/templates/tinyproxy.service.j2 b/playbooks/roles/tinyproxy/templates/tinyproxy.service.j2
- index 63a799a..47401a4 100644
- --- a/playbooks/roles/tinyproxy/templates/tinyproxy.service.j2
- +++ b/playbooks/roles/tinyproxy/templates/tinyproxy.service.j2
- @@ -7,7 +7,7 @@ Documentation=https://www.banu.com/tinyproxy/
- [Service]
- Type=forking
- PIDFile={{ tinyproxy_pid_file }}
- -ExecStart=/usr/sbin/tinyproxy -c {{ tinyproxy_conf_file }}
- +ExecStart=/usr/bin/tinyproxy -c {{ tinyproxy_conf_file }}
- ExecStop=/usr/bin/killall -9 tinyproxy
- ExecReload=/bin/kill -HUP $MAINPID
- PrivateTmp=true
- diff --git a/playbooks/roles/wireguard/tasks/install.yml b/playbooks/roles/wireguard/tasks/install.yml
- index 8e5aa7b..9c842d9 100644
- --- a/playbooks/roles/wireguard/tasks/install.yml
- +++ b/playbooks/roles/wireguard/tasks/install.yml
- @@ -11,11 +11,11 @@
- until: not wireguard_add_apt_repository.failed
- retries: "{{ apt_repository_retries }}"
- delay: "{{ apt_repository_delay }}"
- + when: ansible_os_family == "Ubuntu"
- - name: Install the WireGuard packages
- apt:
- package:
- - linux-headers-{{ kernel_release.stdout }}
- - - linux-headers-generic
- - wireguard-dkms
- - wireguard-tools
Add Comment
Please, Sign In to add comment