initial commit
This commit is contained in:
commit
af0dd90352
1
.envrc
Normal file
1
.envrc
Normal file
@ -0,0 +1 @@
|
||||
source_env ${XDG_RUNTIME_DIR}/secrets/infra-vars
|
41
.gitignore
vendored
Normal file
41
.gitignore
vendored
Normal file
@ -0,0 +1,41 @@
|
||||
# Created by https://www.toptal.com/developers/gitignore/api/terraform
|
||||
# Edit at https://www.toptal.com/developers/gitignore?templates=terraform
|
||||
|
||||
### Terraform ###
|
||||
# Local .terraform directories
|
||||
**/.terraform/*
|
||||
|
||||
# .tfstate files
|
||||
*.tfstate
|
||||
*.tfstate.*
|
||||
|
||||
# Crash log files
|
||||
crash.log
|
||||
crash.*.log
|
||||
|
||||
# Exclude all .tfvars files, which are likely to contain sensitive data, such as
|
||||
# password, private keys, and other secrets. These should not be part of version
|
||||
# control as they are data points which are potentially sensitive and subject
|
||||
# to change depending on the environment.
|
||||
*.tfvars
|
||||
*.tfvars.json
|
||||
|
||||
# Ignore override files as they are usually used to override resources locally and so
|
||||
# are not checked in
|
||||
override.tf
|
||||
override.tf.json
|
||||
*_override.tf
|
||||
*_override.tf.json
|
||||
|
||||
# Include override files you do wish to add to version control using negated pattern
|
||||
# !example_override.tf
|
||||
|
||||
# Include tfplan files to ignore the plan output of command: terraform plan -out=tfplan
|
||||
# example: *tfplan*
|
||||
|
||||
# Ignore CLI configuration files
|
||||
.terraformrc
|
||||
terraform.rc
|
||||
|
||||
# End of https://www.toptal.com/developers/gitignore/api/terraform
|
||||
|
23
.terraform.lock.hcl
Normal file
23
.terraform.lock.hcl
Normal file
@ -0,0 +1,23 @@
|
||||
# This file is maintained automatically by "terraform init".
|
||||
# Manual edits may be lost in future updates.
|
||||
|
||||
provider "registry.terraform.io/linode/linode" {
|
||||
version = "2.5.0"
|
||||
hashes = [
|
||||
"h1:EzUubjT9XxUhTt8bCKISIF1KC9HpmyqTrkmQqAsZIRE=",
|
||||
"zh:00c3391c1d10ff0421ea6629f842fc4b36dd3c38fa01ea8a76b57687b2087e89",
|
||||
"zh:660051ad5e081b6789c995cbf1ee8ac8940e74cef0f0301c4e4493e40fc6cec2",
|
||||
"zh:6772f8dbbbc6fef4af13b59cedb9ce8d50fd6380ddcb8a78d9e6d63998a59b43",
|
||||
"zh:689c3c37a3eee3750fc032111c4589861c976231e2f776c093de52663c6286bc",
|
||||
"zh:724a4b25c00f00d3f6495bd8984385e4d6adf42fdd4d9410ae3721dddafbba1e",
|
||||
"zh:849240355fcab00c206b424c7a26b5f596caf0bf0723326cd9e1d88402db3650",
|
||||
"zh:97b0633a1d5c3229222807a97767c75d3b729d31a72d5e5854acd3c77526a900",
|
||||
"zh:9b85fcb432fe6bad7e542c1adef44ffa4f2a3fb0ac50361d7840c0ec6b001bee",
|
||||
"zh:c5fd629bfadadb41e593115082b5c8f7bb1a67b8799a1c8d591e501b86ef5eaf",
|
||||
"zh:d394c005dd3185bd3e8ef38698b175f0dc3961385bf6b584eeb1c2951edfe471",
|
||||
"zh:e74c24a4d58e104a7e25c9b2fac293f12effaaa7bbf68bad603a320830b1f9d8",
|
||||
"zh:f1a11f3dc4a9d9da9a2245ce4a9ce75be583a9dbe10b729a54c295cc0239cc0a",
|
||||
"zh:f2127af74eadfa592f426499af7957451033c752e8e526047d337d3aaaaf3bee",
|
||||
"zh:f3f5d1c072702c52df6c0d8952058d335c580298bff3bae131ad20104ed1d1ee",
|
||||
]
|
||||
}
|
18
README.md
Normal file
18
README.md
Normal file
@ -0,0 +1,18 @@
|
||||
# [`infra`][infra]
|
||||
|
||||
this repo holds the code describing my very own infra (machines I use/manage)
|
||||
and is very much a WIP.
|
||||
|
||||
should contain zero secrets, except encrypted either with [`age`][age] or
|
||||
[`ansible-vault`][ansible-vault].
|
||||
|
||||
[`terraform`][tf] secrets are supplied as ENV vars at runtime by sourcing the
|
||||
decrypted `infra-vars` file using [`direnv`][direnv], which is in turn
|
||||
stationed in its place using [`home-manager`][hm].
|
||||
|
||||
[infra]: https://git.dotya.ml/wanderer/infra
|
||||
[age]: https://github.com/FiloSottile/age
|
||||
[ansible-vault]: https://docs.ansible.com/ansible/latest/cli/ansible-vault.html
|
||||
[tf]: https://www.terraform.io/
|
||||
[direnv]: https://direnv.net/
|
||||
[hm]: https://github.com/nix-community/home-manager
|
14
ansible/ansible.cfg
Normal file
14
ansible/ansible.cfg
Normal file
@ -0,0 +1,14 @@
|
||||
[defaults]
|
||||
inventory = hosts
|
||||
remote_tmp = $HOME/.ansible/tmp
|
||||
remote_user = root
|
||||
nocows = 1
|
||||
roles_path = roles
|
||||
vault_identity_list = default@misc/vault-keyring-client.sh
|
||||
vault_id_match = True
|
||||
retry_files_enabled = False
|
||||
|
||||
[ssh_connection]
|
||||
pipelining = True
|
||||
scp_if_ssh = True
|
||||
retries = 5
|
15
ansible/group_vars/all/root_access.yml
Normal file
15
ansible/group_vars/all/root_access.yml
Normal file
@ -0,0 +1,15 @@
|
||||
---
|
||||
keys: &default_agekeys
|
||||
- age1rw65fywnja3kdgw9tsnhaa7xzf3c5zd7y2fggn0emhcxsfltxdlsh3pe95 # the
|
||||
- 'ssh-ed25519\ AAAAC3NzaC1lZDI1NTE5AAAAIGzJL8/M+tTejrAPoomHKtlYk8lINBLHaH+p4SLt3sBG' # theEd
|
||||
- age15959gprm59azjflvpj97yt0lj6dj4d2yv0nd6u9jp32lzwp3de7qzhf85y # BACKUPKEY
|
||||
|
||||
|
||||
# run 'playbooks/tasks/reencrypt-default-key.yml' when this changes
|
||||
vault_default_agekeys:
|
||||
- *default_agekeys
|
||||
- 'ssh-ed25519\ AAAAC3NzaC1lZDI1NTE5AAAAIBtG6NCgdLHX4ztpfvYNRaslKWZcl6KdTc1DehVH4kAL'
|
||||
|
||||
# run 'playbooks/tasks/reencrypt-super-key.yml' when this changes
|
||||
vault_super_agekeys:
|
||||
- 'ssh-ed25519\ AAAAC3NzaC1lZDI1NTE5AAAAIBtG6NCgdLHX4ztpfvYNRaslKWZcl6KdTc1DehVH4kAL'
|
48
ansible/group_vars/common.yml
Normal file
48
ansible/group_vars/common.yml
Normal file
@ -0,0 +1,48 @@
|
||||
$ANSIBLE_VAULT;1.1;AES256
|
||||
38643739306165633963663564333036336438323532393165663064386563386666383135646539
|
||||
3639656262393039666332623164626337333633353737370a383664323431383530356237663330
|
||||
63353331623130363365623062363162363037383763633532363162376665353462376465326238
|
||||
3530613630646431620a343033363639643632326634336165393036643130323430313631383236
|
||||
64613165646239313832343334616633363866376332356165616637366236306363636630663530
|
||||
35393830613830303530323866663232633561376435636337363266656537353066336663313633
|
||||
65663833376464653030343337323563343833383031353234356136313663393338366364306334
|
||||
66623936363539343038663731366366343265363131653537303666303533663865336265643132
|
||||
39346630393634323538303466613731663964646530663234623362303836396435326133663966
|
||||
33333633363937656466326533383839633437666363326332623263666164353461643433346234
|
||||
63333035646563396135306336303630613337373132383230326433353066336464393239346234
|
||||
63636232313166333661666439326339376134303731333039663563363631306533386234383466
|
||||
63366635623836613233383961353266303535313634633430643262323366343165353030616231
|
||||
32383936613239336237363234663438366639313433306236636237636661626466626466313934
|
||||
34363135383030386631626134653936356535363161613837643662353130646335393930666135
|
||||
33333138613666633462623665356162653032303231303433656265336135363538653937623739
|
||||
35323961393266343763666436616530616465663766356430633031346166313566333662373937
|
||||
34613663383230343034373535363638386339313966386264663566656139616233393532333466
|
||||
66336634336361656330333765363066613737313962313466316431323664356534653063623530
|
||||
65353131613939653061323464633337343836653532323433386264336266363466666661616164
|
||||
65343735373863633432326438316564386230383236633261336463373032636131353362623263
|
||||
31393634336432313032363264633438376263333962613635613864383034363762616137303561
|
||||
64616563356264353164643131393436383137343966623965303436343831366263393035313733
|
||||
61643335363933653936316565396634383763323966326330616136326533343333373231306135
|
||||
30323633646363316365643932616336313939383132663738393566633763366462303335633034
|
||||
37356463393937616238313730326234656262663836643139343837333430316434396661646664
|
||||
32663031376265623264393439383636396630663461646337346662363138366537623664336337
|
||||
62666662636130313030376137663834633461363637643465386337616665383130333961633936
|
||||
63663834373230396263653833353465363830343539376565343961313131613535613466346537
|
||||
64346434633833623264393434323765343238356539356537356539353432636637363063643433
|
||||
63373964323734396165346262626639313666313637663536336566363434376532656332636164
|
||||
35386236396333643163646639353762363234353231316230323965353365653431393465376461
|
||||
61636230363761336334373663396233363630653239363365333634346633353934386461643332
|
||||
32316561306235663031336239353163623063323931663565323561613666343436393361663730
|
||||
64383237643436666231323961646239396239353164613765313762353531633763356137316634
|
||||
35646131343862666435353063633230313561376566316432343365633030623931386139343461
|
||||
32396665643531623937643163646633393730393435646566316434653864316534616635666133
|
||||
63633833643965366366653038393663366461316162356661393662346136396534303731343135
|
||||
36663230303137396137306630646231616663623632316438306430363632303863373865326264
|
||||
38643236393064383136303865383839303261333665303764343239616364646535316432633730
|
||||
38383261343830323234393634383266636336633932633965366134383336366236656537633561
|
||||
36616363376332343261656430383430363566386534353239373335666532336130346534373835
|
||||
63623562346631666265333661303539636339343835663563643434643634383064356130356466
|
||||
34313965376536303065373731636535646230323663346337333365613336303733313536653261
|
||||
31383839653263316531646464323537313238386661326164303038383230383432336164373332
|
||||
36393138633366343666613636363162373263333139363130623131363832353530343239363633
|
||||
373761373265643139353733653433333931
|
11
ansible/group_vars/surtur/vault_surtur.yml
Normal file
11
ansible/group_vars/surtur/vault_surtur.yml
Normal file
@ -0,0 +1,11 @@
|
||||
$ANSIBLE_VAULT;1.1;AES256
|
||||
63643462623661313666616639623037636264356162383339643639656537363732626131353534
|
||||
3236363862313161653030663338663138326636643765360a303166623033626439386264653564
|
||||
38653264643361613239633836373361313133316665353331306362613563613162333534353133
|
||||
6364323061363165390a306464613938323831366634663134353562636131393338346161656663
|
||||
39616338386232356337326162393637653937373661366138346437336230316633383536333766
|
||||
61323264626234336233383433633136643333333039396163656336353937633338373737636265
|
||||
36656138633230336663343066346664313537353165393861303732623639633263626631303263
|
||||
39663466363961386531616639376330663365643536373162353030653338396533313839326461
|
||||
37393938376664336266323736316530343464393233376430316335656132656332643233393663
|
||||
3732393361333939636537633732363434613037353234663531
|
12
ansible/host_vars/nbgw.yml
Normal file
12
ansible/host_vars/nbgw.yml
Normal file
@ -0,0 +1,12 @@
|
||||
$ANSIBLE_VAULT;1.1;AES256
|
||||
62306632323964353465643930303138363139656130623532356362653834396264376663376161
|
||||
3833363761613730393065613732373231363131613564350a373739313364653738333839653363
|
||||
37313430663466646534386436663930653932653862663530383636303139626563633530653561
|
||||
6266316361666433310a396635663935656565356135356230616535616264646433656465343633
|
||||
65663430633862656134383530616437353033383164303461613363356465323139303831663036
|
||||
35353633373636643565636165636137306636393939323836323633313035316365663263323838
|
||||
36316166376132653937353831343332383866383337383862373061646534646664386231316234
|
||||
34383863333231386339633739633335313236373638393031316533643666643835373734633239
|
||||
66383333646365636263656638373765333361343466313338353832363232656261613563646534
|
||||
61646332616437306532336331623034316630643762393535663364343837393436333835653138
|
||||
336363636661646366343339306331353033
|
6
ansible/hosts
Normal file
6
ansible/hosts
Normal file
@ -0,0 +1,6 @@
|
||||
[surtur]
|
||||
surtur.local
|
||||
|
||||
[nbgw]
|
||||
nbgw
|
||||
# 172.105.66.99
|
24
ansible/misc/vault-default-password.age
Normal file
24
ansible/misc/vault-default-password.age
Normal file
@ -0,0 +1,24 @@
|
||||
-----BEGIN AGE ENCRYPTED FILE-----
|
||||
YWdlLWVuY3J5cHRpb24ub3JnL3YxCi0+IFgyNTUxOSAvTHpIZVFnY1hSaVNmVkcx
|
||||
VGttQXRpVGRHdHJXdHJxcmlyRWhrSzd6L0JBCnJzUDM5ZDIzZE9kUitnaFJrVUxV
|
||||
anZySy9vWklJUFF4V0NueDlQdzBrY0UKLT4gc3NoLWVkMjU1MTkgNlR6L1RRIGtm
|
||||
K21vSzNOTGtzK3F1R296ZFlneHI3ZUwrYko1cCtwbEgzeFZKeDRWV3MKeEREQ2d4
|
||||
dlh2VW81eElTd0Q4a0JvUGJRbXNWWHJHK3h6M1FzcHppUkNZWQotPiBYMjU1MTkg
|
||||
ejdBeC9NTHdsaFhiUkNtaGp6ZzJPMERtNnMxNWRkRDNjRjVIYmU4aUp6TQowT2Rt
|
||||
T3FSL1ZZNHRSNkVyUXpmNC8wbHdsWmUybGlIaVFuQmlWb25nYjNjCi0+IHNzaC1l
|
||||
ZDI1NTE5IE1kQ1p5QSBsd1Z4UC93OWdIc3RrWi9VOGFINnNvRnBHY2oxcmZQMm41
|
||||
KzE0YzhUZmlrClRWRjQ5R2s3L2ZpUU1KaG9kMlZzRHhJWUx2a0tiZHZzUGpRamVl
|
||||
YmUyQVkKLS0tIGw4anVuWUdFVHVaZktvdG9JSDYvRS9YWVJaOFUyN1gyV0QzdnM2
|
||||
ZUhuZDgKs9QSQRCkCN2p1fQKQYliJ5tfZ1PWfCqImWZibGbnCYPawFxcyKdbPsC4
|
||||
3ns2JEjcv65eo5gflJQT7JdDV/kn/wppA3BFtTKvyVwfhUflPfcj5M1oRBNC+Eip
|
||||
41ia0c4Re+JWOBqMZhItbugiwvoS95/9U8pFp38LQ2NTld24yKYmBms5nP4ppJhJ
|
||||
fEnd7auiC2PMvSlvR1fxajEEu7yug1UcDRd6s1nYFoBztvPzbci7wV9/e92v6byP
|
||||
tL4jqtBUv76quDWMxfcJa0LkF3Lz8643jxhcIGFL/6B3XjCrr5fU4uYDTCIs+WmL
|
||||
/wv58hLB0NgeTWq2BmQctY0nMDptd11meLYRZA974kwEaj2kmzMV1AY66CihRcZA
|
||||
GA6G4Vbl2stLu7t0A4rVfM5WKBFptGEbocLtDlObkRhJ+Ft41uGmEHp+g3BTOOjR
|
||||
FeIU3UmJPBaV87Lc3Kch/ZDUZx73Opn8NgI9GvXLYIxUNFQcAKRJiA5XuvVUjF/M
|
||||
tZZqx5P04C6W2IbVoG/WJpnEtP03XQ20Cg9VqW+ZgTXSastOKO/hqmAZk7n7biWj
|
||||
gKBVfEB9rNwVpi9kAnZ2OX5iqW5mC9BwvtdkdrIcmKBK2oov8zqzA0cxiWEKAKjM
|
||||
o9jiSlPF47lT8Nc9OMboDFujnqjUaSLLu0VgLf4IhkSE920LB70DkHmwKW14P+lO
|
||||
LRmVq+KCHtNeZbWgjBm0w7gRkyGCYOk=
|
||||
-----END AGE ENCRYPTED FILE-----
|
6
ansible/misc/vault-keyring-client.sh
Executable file
6
ansible/misc/vault-keyring-client.sh
Executable file
@ -0,0 +1,6 @@
|
||||
#!/bin/sh
|
||||
|
||||
readonly vault_password_file_encrypted="$(dirname $0)/vault-$2-password.age"
|
||||
|
||||
flock "$vault_password_file_encrypted" \
|
||||
age -i ~/.age/ansible-vault-pw --decrypt "$vault_password_file_encrypted"
|
BIN
ansible/misc/vault-super-password.age
Normal file
BIN
ansible/misc/vault-super-password.age
Normal file
Binary file not shown.
9
ansible/playbooks/nbgw.yml
Normal file
9
ansible/playbooks/nbgw.yml
Normal file
@ -0,0 +1,9 @@
|
||||
---
|
||||
- hosts: nbgw
|
||||
vars_files:
|
||||
- ../group_vars/common.yml
|
||||
- ../host_vars/nbgw.yml
|
||||
roles:
|
||||
- common
|
||||
- netbird
|
||||
...
|
11
ansible/playbooks/nothingatall
Normal file
11
ansible/playbooks/nothingatall
Normal file
@ -0,0 +1,11 @@
|
||||
$ANSIBLE_VAULT;1.1;AES256
|
||||
32353865333038386130343731373633383636633935326264636563636330336261623762343332
|
||||
3136383331376664633135313938633936633236393166360a326337653034383039643663653136
|
||||
30616139383339663661393834323638643362613761636366643466353539336263383035306338
|
||||
3037623262656162340a626633386132316563613333343761663431323065393530376335643433
|
||||
62353161316636353066343830646133386630643738336165613731633239313534346262643536
|
||||
63356333613265323039356161653432656461313035303039396465643361376261663036313665
|
||||
33383837356366393932636438666362383234656536356530643862363831383061636263623265
|
||||
66623465643531336236336133353363343533373035643062663739366430386434333038356131
|
||||
62303063666637363863663363386635356536356534343930343730306534623565643262393235
|
||||
6530396564353963393938383435656236613533643331393931
|
15
ansible/playbooks/reencrypt.yml
Normal file
15
ansible/playbooks/reencrypt.yml
Normal file
@ -0,0 +1,15 @@
|
||||
---
|
||||
- hosts: surtur
|
||||
connection: local
|
||||
vars_files:
|
||||
- nothingatall
|
||||
# - ../group_vars/surtur/vault_surtur.yml
|
||||
roles:
|
||||
# include_role:
|
||||
- tasks
|
||||
# - rand
|
||||
# - configs
|
||||
# tasks:
|
||||
# include_role:
|
||||
# name: tasks
|
||||
# tasks_from: reencrypt-vault-default-key
|
9
ansible/playbooks/surtur.yml
Normal file
9
ansible/playbooks/surtur.yml
Normal file
@ -0,0 +1,9 @@
|
||||
---
|
||||
- hosts: surtur
|
||||
# connection: local
|
||||
vars_files:
|
||||
- nothingatall
|
||||
- ../group_vars/surtur/vault_surtur.yml
|
||||
roles:
|
||||
# - rand
|
||||
- configs
|
22
ansible/playbooks/tasks/include/reencrypt-vault-key.yml
Normal file
22
ansible/playbooks/tasks/include/reencrypt-vault-key.yml
Normal file
@ -0,0 +1,22 @@
|
||||
---
|
||||
- name: Check if moreutils is installed
|
||||
become: true
|
||||
dnf5: name=moreutils state=present
|
||||
when: ansible_distribution == "Fedora"
|
||||
|
||||
- name: Check if moreutils is installed
|
||||
become: false
|
||||
pacman: name=moreutils state=present
|
||||
when: ansible_distribution == "Archlinux"
|
||||
|
||||
- name: Reencrypt vault {{ vault_id }} key
|
||||
shell: |
|
||||
set -eo pipefail
|
||||
age \
|
||||
-i ~/.age/ansible-vault-pw \
|
||||
--decrypt "{{ playbook_dir }}/../../misc/vault-{{ vault_id }}-password.age" \
|
||||
| age --armor --encrypt \
|
||||
{% for userid in vault_agekeys | flatten %}--recipient {{ userid }} {% endfor %} \
|
||||
- \
|
||||
| sponge "{{ playbook_dir }}/../../misc/vault-{{ vault_id }}-password.age"
|
||||
changed_when: false
|
11
ansible/playbooks/tasks/reencrypt-vault-default-key.yml
Normal file
11
ansible/playbooks/tasks/reencrypt-vault-default-key.yml
Normal file
@ -0,0 +1,11 @@
|
||||
---
|
||||
- name: Reencrypt vault default key
|
||||
hosts: localhost
|
||||
# vars_files:
|
||||
# - nothingatall
|
||||
tasks:
|
||||
- name: Reencrypt vault default key
|
||||
include_tasks: include/reencrypt-vault-key.yml
|
||||
vars:
|
||||
vault_id: default
|
||||
vault_agekeys: "{{ vault_default_agekeys }}"
|
10
ansible/playbooks/tasks/reencrypt-vault-super-key.yml
Normal file
10
ansible/playbooks/tasks/reencrypt-vault-super-key.yml
Normal file
@ -0,0 +1,10 @@
|
||||
---
|
||||
- name: Reencrypt vault super key
|
||||
hosts: localhost
|
||||
tasks:
|
||||
- name: Reencrypt vault super key
|
||||
include_tasks: include/reencrypt-vault-key.yml
|
||||
vars:
|
||||
vault_id: super
|
||||
vault_agekeys: "{{ vault_super_agekeys }}"
|
||||
|
8
ansible/roles/common/tasks/dnscrypt.yml
Normal file
8
ansible/roles/common/tasks/dnscrypt.yml
Normal file
@ -0,0 +1,8 @@
|
||||
---
|
||||
- name: dnscrypt-proxy-test.toml
|
||||
ansible.builtin.template:
|
||||
src: ../templates/dnscrypt-proxy.toml
|
||||
dest: /etc/dnscrypt-proxy/dnscrypt-proxy-test.toml
|
||||
# owner: dnscrypt-proxy
|
||||
# group: dnscrypt-proxy
|
||||
mode: '0644'
|
18
ansible/roles/common/tasks/main.yml
Normal file
18
ansible/roles/common/tasks/main.yml
Normal file
@ -0,0 +1,18 @@
|
||||
---
|
||||
- name: Stop and disable systemd-resolved
|
||||
become: true
|
||||
ansible.builtin.systemd:
|
||||
name: systemd-resolved
|
||||
state: stopped
|
||||
enabled: false
|
||||
when: ansible_hostname == "surtur"
|
||||
|
||||
- name: Enable systemd-timesyncd
|
||||
become: true
|
||||
systemd:
|
||||
name: systemd-timesyncd
|
||||
state: started
|
||||
enabled: true
|
||||
|
||||
- include_tasks: pkg.yml
|
||||
- include_tasks: dnscrypt.yml
|
21
ansible/roles/common/tasks/pkg.yml
Normal file
21
ansible/roles/common/tasks/pkg.yml
Normal file
@ -0,0 +1,21 @@
|
||||
---
|
||||
- name: Common pkgs
|
||||
become: true
|
||||
ansible.builtin.package:
|
||||
state: present
|
||||
name: "{{ item }}"
|
||||
loop: "{{ pkgs_common }}"
|
||||
|
||||
- name: Arch pkgs
|
||||
community.general.pacman:
|
||||
state: present
|
||||
name: "{{ item }}"
|
||||
loop: "{{ pkgs_arch }}"
|
||||
when: ansible_distribution == "Archlinux"
|
||||
|
||||
- name: F38 pkgs
|
||||
ansible.builtin.dnf:
|
||||
state: present
|
||||
name: "{{ item }}"
|
||||
loop: "{{ pkgs_fedora38 }}"
|
||||
when: ansible_distribution == "Fedora"
|
905
ansible/roles/common/templates/dnscrypt-proxy.toml
Normal file
905
ansible/roles/common/templates/dnscrypt-proxy.toml
Normal file
@ -0,0 +1,905 @@
|
||||
|
||||
##############################################
|
||||
# #
|
||||
# dnscrypt-proxy configuration #
|
||||
# #
|
||||
##############################################
|
||||
|
||||
## This is an example configuration file.
|
||||
## You should adjust it to your needs, and save it as "dnscrypt-proxy.toml"
|
||||
##
|
||||
## Online documentation is available here: https://dnscrypt.info/doc
|
||||
|
||||
|
||||
|
||||
##################################
|
||||
# Global settings #
|
||||
##################################
|
||||
|
||||
## List of servers to use
|
||||
##
|
||||
## Servers from the "public-resolvers" source (see down below) can
|
||||
## be viewed here: https://dnscrypt.info/public-servers
|
||||
##
|
||||
## The proxy will automatically pick working servers from this list.
|
||||
## Note that the require_* filters do NOT apply when using this setting.
|
||||
##
|
||||
## By default, this list is empty and all registered servers matching the
|
||||
## require_* filters will be used instead.
|
||||
##
|
||||
## Remove the leading # first to enable this; lines starting with # are ignored.
|
||||
|
||||
# server_names = ['scaleway-fr', 'google', 'yandex', 'cloudflare']
|
||||
#server_names = ['dotya.ml']
|
||||
|
||||
|
||||
## List of local addresses and ports to listen to. Can be IPv4 and/or IPv6.
|
||||
## Example with both IPv4 and IPv6:
|
||||
## listen_addresses = ['127.0.0.1:53', '[::1]:53']
|
||||
##
|
||||
## To listen to all IPv4 addresses, use `listen_addresses = ['0.0.0.0:53']`
|
||||
## To listen to all IPv4+IPv6 addresses, use `listen_addresses = ['[::]:53']`
|
||||
|
||||
listen_addresses = [ {{ dnscrypt_listen_addresses }} ]
|
||||
|
||||
|
||||
## Maximum number of simultaneous client connections to accept
|
||||
|
||||
#max_clients = 250
|
||||
max_clients = 4096
|
||||
|
||||
|
||||
## Switch to a different system user after listening sockets have been created.
|
||||
## Note (1): this feature is currently unsupported on Windows.
|
||||
## Note (2): this feature is not compatible with systemd socket activation.
|
||||
## Note (3): when using -pidfile, the PID file directory must be writable by the new user
|
||||
|
||||
# user_name = 'nobody'
|
||||
|
||||
|
||||
## Require servers (from remote sources) to satisfy specific properties
|
||||
|
||||
# Use servers reachable over IPv4
|
||||
ipv4_servers = true
|
||||
|
||||
# Use servers reachable over IPv6 -- Do not enable if you don't have IPv6 connectivity
|
||||
ipv6_servers = {{ dnscrypt_ipv6 }}
|
||||
|
||||
# Use servers implementing the DNSCrypt protocol
|
||||
dnscrypt_servers = true
|
||||
|
||||
# Use servers implementing the DNS-over-HTTPS protocol
|
||||
doh_servers = true
|
||||
|
||||
# Use servers implementing the Oblivious DoH protocol
|
||||
odoh_servers = {{ dnscrypt_odoh }}
|
||||
|
||||
|
||||
## Require servers defined by remote sources to satisfy specific properties
|
||||
|
||||
# Server must support DNS security extensions (DNSSEC)
|
||||
require_dnssec = true
|
||||
|
||||
# Server must not log user queries (declarative)
|
||||
require_nolog = true
|
||||
|
||||
# Server must not enforce its own blocklist (for parental control, ads blocking...)
|
||||
require_nofilter = true
|
||||
|
||||
# Server names to avoid even if they match all criteria
|
||||
#disabled_server_names = ['yandex', 'google', 'cloudflare', 'apple', 'cisco']
|
||||
disabled_server_names = [
|
||||
{{ dnscrypt_disabled_names }}
|
||||
]
|
||||
# disabled_server_names = ['google-ipv6',
|
||||
# 'cloudflare',
|
||||
# 'cloudflare-ipv6',
|
||||
# 'cisco',
|
||||
# 'cisco-ipv6',
|
||||
# 'cisco-familyshield',
|
||||
# 'cisco-familyshield-ipv6',
|
||||
# 'yandex',
|
||||
# 'apple',
|
||||
# 'doh.dns.apple.com',
|
||||
# 'ffmuc.net',
|
||||
# 'dnswarden-uncensor-dc',
|
||||
# 'dnswarden-uncensor-dc-swiss',
|
||||
# 'techsaviours.org-dnscrypt',
|
||||
# 'dns.watch',
|
||||
# 'dct-at1',
|
||||
# 'pryv8boi',
|
||||
# 'dct-ru1',
|
||||
# 'controld-uncensored',
|
||||
# 'controld-unfiltered',
|
||||
# 'doh.appliedprivacy.net',
|
||||
# 'nextdns',
|
||||
# 'mullvad-doh',
|
||||
# 'nextdns-ultralow',
|
||||
# 'dns.digitalsize.net'
|
||||
# ]
|
||||
|
||||
|
||||
## Always use TCP to connect to upstream servers.
|
||||
## This can be useful if you need to route everything through Tor.
|
||||
## Otherwise, leave this to `false`, as it doesn't improve security
|
||||
## (dnscrypt-proxy will always encrypt everything even using UDP), and can
|
||||
## only increase latency.
|
||||
|
||||
force_tcp = false
|
||||
|
||||
|
||||
## Enable support for HTTP/3 (DoH3, HTTP over QUIC)
|
||||
## Note that, like DNSCrypt but unlike other HTTP versions, this uses
|
||||
## UDP and (usually) port 443 instead of TCP.
|
||||
|
||||
http3 = {{ dnscrypt_http3 }}
|
||||
|
||||
|
||||
## SOCKS proxy
|
||||
## Uncomment the following line to route all TCP connections to a local Tor node
|
||||
## Tor doesn't support UDP, so set `force_tcp` to `true` as well.
|
||||
|
||||
# proxy = 'socks5://127.0.0.1:9050'
|
||||
|
||||
|
||||
## HTTP/HTTPS proxy
|
||||
## Only for DoH servers
|
||||
|
||||
# http_proxy = 'http://127.0.0.1:8888'
|
||||
|
||||
|
||||
## How long a DNS query will wait for a response, in milliseconds.
|
||||
## If you have a network with *a lot* of latency, you may need to
|
||||
## increase this. Startup may be slower if you do so.
|
||||
## Don't increase it too much. 10000 is the highest reasonable value.
|
||||
|
||||
timeout = 5000
|
||||
#timeout = 500
|
||||
|
||||
|
||||
## Keepalive for HTTP (HTTPS, HTTP/2) queries, in seconds
|
||||
|
||||
keepalive = 30
|
||||
|
||||
|
||||
## Add EDNS-client-subnet information to outgoing queries
|
||||
##
|
||||
## Multiple networks can be listed; they will be randomly chosen.
|
||||
## These networks don't have to match your actual networks.
|
||||
|
||||
# edns_client_subnet = ['0.0.0.0/0', '2001:db8::/32']
|
||||
|
||||
|
||||
## Response for blocked queries. Options are `refused`, `hinfo` (default) or
|
||||
## an IP response. To give an IP response, use the format `a:<IPv4>,aaaa:<IPv6>`.
|
||||
## Using the `hinfo` option means that some responses will be lies.
|
||||
## Unfortunately, the `hinfo` option appears to be required for Android 8+
|
||||
|
||||
# blocked_query_response = 'refused'
|
||||
|
||||
|
||||
## Load-balancing strategy: 'p2' (default), 'ph', 'p<n>', 'first' or 'random'
|
||||
## Randomly choose 1 of the fastest 2, half, n, 1 or all live servers by latency.
|
||||
## The response quality still depends on the server itself.
|
||||
|
||||
# lb_strategy = 'p2'
|
||||
lb_strategy = 'p7'
|
||||
|
||||
## Set to `true` to constantly try to estimate the latency of all the resolvers
|
||||
## and adjust the load-balancing parameters accordingly, or to `false` to disable.
|
||||
## Default is `true` that makes 'p2' `lb_strategy` work well.
|
||||
|
||||
lb_estimator = true
|
||||
|
||||
|
||||
## Log level (0-6, default: 2 - 0 is very verbose, 6 only contains fatal errors)
|
||||
|
||||
log_level = 2
|
||||
|
||||
|
||||
## Log file for the application, as an alternative to sending logs to
|
||||
## the standard system logging service (syslog/Windows event log).
|
||||
##
|
||||
## This file is different from other log files, and will not be
|
||||
## automatically rotated by the application.
|
||||
|
||||
log_file = '/var/log/dnscrypt-proxy/dnscrypt-proxy.log'
|
||||
|
||||
|
||||
## When using a log file, only keep logs from the most recent launch.
|
||||
|
||||
# log_file_latest = true
|
||||
|
||||
|
||||
## Use the system logger (syslog on Unix, Event Log on Windows)
|
||||
|
||||
use_syslog = true
|
||||
|
||||
|
||||
## Delay, in minutes, after which certificates are reloaded
|
||||
|
||||
cert_refresh_delay = 240
|
||||
|
||||
|
||||
## DNSCrypt: Create a new, unique key for every single DNS query
|
||||
## This may improve privacy but can also have a significant impact on CPU usage
|
||||
## Only enable if you don't have a lot of network load
|
||||
|
||||
# dnscrypt_ephemeral_keys = false
|
||||
|
||||
|
||||
## DoH: Disable TLS session tickets - increases privacy but also latency
|
||||
|
||||
# tls_disable_session_tickets = false
|
||||
|
||||
|
||||
## DoH: Use a specific cipher suite instead of the server preference
|
||||
## 49199 = TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
|
||||
## 49195 = TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256
|
||||
## 52392 = TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305
|
||||
## 52393 = TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305
|
||||
## 4865 = TLS_AES_128_GCM_SHA256
|
||||
## 4867 = TLS_CHACHA20_POLY1305_SHA256
|
||||
##
|
||||
## On non-Intel CPUs such as MIPS routers and ARM systems (Android, Raspberry Pi...),
|
||||
## the following suite improves performance.
|
||||
## This may also help on Intel CPUs running 32-bit operating systems.
|
||||
##
|
||||
## Keep tls_cipher_suite empty if you have issues fetching sources or
|
||||
## connecting to some DoH servers. Google and Cloudflare are fine with it.
|
||||
|
||||
# tls_cipher_suite = [52392, 49199]
|
||||
tls_cipher_suite = [4867, 49195, 52392, 49199]
|
||||
|
||||
|
||||
## Bootstrap resolvers
|
||||
##
|
||||
## These are normal, non-encrypted DNS resolvers, that will be only used
|
||||
## for one-shot queries when retrieving the initial resolvers list and if
|
||||
## the system DNS configuration doesn't work.
|
||||
##
|
||||
## No user queries will ever be leaked through these resolvers, and they will
|
||||
## not be used after IP addresses of DoH resolvers have been found (if you are
|
||||
## using DoH).
|
||||
##
|
||||
## They will never be used if lists have already been cached, and if the stamps
|
||||
## of the configured servers already include IP addresses (which is the case for
|
||||
## most of DoH servers, and for all DNSCrypt servers and relays).
|
||||
##
|
||||
## They will not be used if the configured system DNS works, or after the
|
||||
## proxy already has at least one usable secure resolver.
|
||||
##
|
||||
## Resolvers supporting DNSSEC are recommended, and, if you are using
|
||||
## DoH, bootstrap resolvers should ideally be operated by a different entity
|
||||
## than the DoH servers you will be using, especially if you have IPv6 enabled.
|
||||
##
|
||||
## People in China may want to use 114.114.114.114:53 here.
|
||||
## Other popular options include 8.8.8.8, 9.9.9.9 and 1.1.1.1.
|
||||
##
|
||||
## If more than one resolver is specified, they will be tried in sequence.
|
||||
##
|
||||
## TL;DR: put valid standard resolver addresses here. Your actual queries will
|
||||
## not be sent there. If you're using DNSCrypt or Anonymized DNS and your
|
||||
## lists are up to date, these resolvers will not even be used.
|
||||
|
||||
#bootstrap_resolvers = ['9.9.9.11:53', '8.8.8.8:53']
|
||||
bootstrap_resolvers = ['144.91.70.62:53', '[2a02:c207:2030:396::1]:53','9.9.9.11:53','84.200.69.80:53', '84.200.70.40:53', '8.8.8.8:53']
|
||||
|
||||
|
||||
## Always use the bootstrap resolver before the system DNS settings.
|
||||
|
||||
ignore_system_dns = true
|
||||
|
||||
|
||||
## Maximum time (in seconds) to wait for network connectivity before
|
||||
## initializing the proxy.
|
||||
## Useful if the proxy is automatically started at boot, and network
|
||||
## connectivity is not guaranteed to be immediately available.
|
||||
## Use 0 to not test for connectivity at all (not recommended),
|
||||
## and -1 to wait as much as possible.
|
||||
|
||||
netprobe_timeout = 60
|
||||
|
||||
## Address and port to try initializing a connection to, just to check
|
||||
## if the network is up. It can be any address and any port, even if
|
||||
## there is nothing answering these on the other side. Just don't use
|
||||
## a local address, as the goal is to check for Internet connectivity.
|
||||
## On Windows, a datagram with a single, nul byte will be sent, only
|
||||
## when the system starts.
|
||||
## On other operating systems, the connection will be initialized
|
||||
## but nothing will be sent at all.
|
||||
|
||||
netprobe_address = '9.9.9.9:53'
|
||||
|
||||
|
||||
## Offline mode - Do not use any remote encrypted servers.
|
||||
## The proxy will remain fully functional to respond to queries that
|
||||
## plugins can handle directly (forwarding, cloaking, ...)
|
||||
|
||||
# offline_mode = false
|
||||
|
||||
|
||||
## Additional data to attach to outgoing queries.
|
||||
## These strings will be added as TXT records to queries.
|
||||
## Do not use, except on servers explicitly asking for extra data
|
||||
## to be present.
|
||||
## encrypted-dns-server can be configured to use this for access control
|
||||
## in the [access_control] section
|
||||
|
||||
# query_meta = ['key1:value1', 'key2:value2', 'token:MySecretToken']
|
||||
|
||||
|
||||
## Automatic log files rotation
|
||||
|
||||
# Maximum log files size in MB - Set to 0 for unlimited.
|
||||
log_files_max_size = 10
|
||||
|
||||
# How long to keep backup files, in days
|
||||
log_files_max_age = 7
|
||||
|
||||
# Maximum log files backups to keep (or 0 to keep all backups)
|
||||
log_files_max_backups = 1
|
||||
|
||||
|
||||
|
||||
#########################
|
||||
# Filters #
|
||||
#########################
|
||||
|
||||
## Note: if you are using dnsmasq, disable the `dnssec` option in dnsmasq if you
|
||||
## configure dnscrypt-proxy to do any kind of filtering (including the filters
|
||||
## below and blocklists).
|
||||
## You can still choose resolvers that do DNSSEC validation.
|
||||
|
||||
|
||||
## Immediately respond to IPv6-related queries with an empty response
|
||||
## This makes things faster when there is no IPv6 connectivity, but can
|
||||
## also cause reliability issues with some stub resolvers.
|
||||
|
||||
block_ipv6 = false
|
||||
|
||||
|
||||
## Immediately respond to A and AAAA queries for host names without a domain name
|
||||
|
||||
block_unqualified = true
|
||||
|
||||
|
||||
## Immediately respond to queries for local zones instead of leaking them to
|
||||
## upstream resolvers (always causing errors or timeouts).
|
||||
|
||||
block_undelegated = true
|
||||
|
||||
|
||||
## TTL for synthetic responses sent when a request has been blocked (due to
|
||||
## IPv6 or blocklists).
|
||||
|
||||
reject_ttl = 10
|
||||
|
||||
|
||||
|
||||
##################################################################################
|
||||
# Route queries for specific domains to a dedicated set of servers #
|
||||
##################################################################################
|
||||
|
||||
## See the `example-forwarding-rules.txt` file for an example
|
||||
|
||||
# forwarding_rules = '/etc/dnscrypt-proxy/forwarding-rules.txt'
|
||||
|
||||
|
||||
|
||||
###############################
|
||||
# Cloaking rules #
|
||||
###############################
|
||||
|
||||
## Cloaking returns a predefined address for a specific name.
|
||||
## In addition to acting as a HOSTS file, it can also return the IP address
|
||||
## of a different name. It will also do CNAME flattening.
|
||||
## If 'cloak_ptr' is set, then PTR (reverse lookups) are enabled
|
||||
## for cloaking rules that do not contain wild cards.
|
||||
##
|
||||
## See the `example-cloaking-rules.txt` file for an example
|
||||
|
||||
# cloaking_rules = '/etc/dnscrypt-proxy/cloaking-rules.txt'
|
||||
|
||||
## TTL used when serving entries in cloaking-rules.txt
|
||||
|
||||
# cloak_ttl = 600
|
||||
# cloak_ptr = false
|
||||
|
||||
|
||||
|
||||
###########################
|
||||
# DNS cache #
|
||||
###########################
|
||||
|
||||
## Enable a DNS cache to reduce latency and outgoing traffic
|
||||
|
||||
cache = true
|
||||
|
||||
|
||||
## Cache size
|
||||
|
||||
cache_size = 10000
|
||||
|
||||
|
||||
## Minimum TTL for cached entries
|
||||
|
||||
cache_min_ttl = 2400
|
||||
|
||||
|
||||
## Maximum TTL for cached entries
|
||||
|
||||
cache_max_ttl = 86400
|
||||
|
||||
|
||||
## Minimum TTL for negatively cached entries
|
||||
|
||||
# cache_neg_min_ttl = 60
|
||||
cache_neg_min_ttl = 30
|
||||
|
||||
|
||||
## Maximum TTL for negatively cached entries
|
||||
|
||||
#cache_neg_max_ttl = 600
|
||||
cache_neg_max_ttl = 300
|
||||
|
||||
|
||||
|
||||
########################################
|
||||
# Captive portal handling #
|
||||
########################################
|
||||
|
||||
[captive_portals]
|
||||
|
||||
## A file that contains a set of names used by operating systems to
|
||||
## check for connectivity and captive portals, along with hard-coded
|
||||
## IP addresses to return.
|
||||
|
||||
# map_file = '/etc/dnscrypt-proxy/captive-portals.txt'
|
||||
|
||||
|
||||
|
||||
##################################
|
||||
# Local DoH server #
|
||||
##################################
|
||||
|
||||
[local_doh]
|
||||
|
||||
## dnscrypt-proxy can act as a local DoH server. By doing so, web browsers
|
||||
## requiring a direct connection to a DoH server in order to enable some
|
||||
## features will enable these, without bypassing your DNS proxy.
|
||||
|
||||
## Addresses that the local DoH server should listen to
|
||||
|
||||
# listen_addresses = ['127.0.0.1:3000']
|
||||
|
||||
|
||||
## Path of the DoH URL. This is not a file, but the part after the hostname
|
||||
## in the URL. By convention, `/dns-query` is frequently chosen.
|
||||
## For each `listen_address` the complete URL to access the server will be:
|
||||
## `https://<listen_address><path>` (ex: `https://127.0.0.1/dns-query`)
|
||||
|
||||
# path = '/dns-query'
|
||||
|
||||
|
||||
## Certificate file and key - Note that the certificate has to be trusted.
|
||||
## See the documentation (wiki) for more information.
|
||||
|
||||
# cert_file = "/var/lib/dnscrypt-proxy/localhost.pem"
|
||||
# cert_key_file = "/var/lib/dnscrypt-proxy/localhost.pem"
|
||||
|
||||
|
||||
|
||||
###############################
|
||||
# Query logging #
|
||||
###############################
|
||||
|
||||
## Log client queries to a file
|
||||
|
||||
[query_log]
|
||||
|
||||
## Path to the query log file (absolute, or relative to the same directory as the config file)
|
||||
## Can be set to /dev/stdout in order to log to the standard output.
|
||||
|
||||
# file = '/var/log/dnscrypt-proxy/query.log'
|
||||
|
||||
|
||||
## Query log format (currently supported: tsv and ltsv)
|
||||
|
||||
format = 'tsv'
|
||||
|
||||
|
||||
## Do not log these query types, to reduce verbosity. Keep empty to log everything.
|
||||
|
||||
# ignored_qtypes = ['DNSKEY', 'NS']
|
||||
|
||||
|
||||
|
||||
############################################
|
||||
# Suspicious queries logging #
|
||||
############################################
|
||||
|
||||
## Log queries for nonexistent zones
|
||||
## These queries can reveal the presence of malware, broken/obsolete applications,
|
||||
## and devices signaling their presence to 3rd parties.
|
||||
|
||||
[nx_log]
|
||||
|
||||
## Path to the query log file (absolute, or relative to the same directory as the config file)
|
||||
|
||||
# file = '/var/log/dnscrypt-proxy/nx.log'
|
||||
|
||||
|
||||
## Query log format (currently supported: tsv and ltsv)
|
||||
|
||||
format = 'tsv'
|
||||
|
||||
|
||||
|
||||
######################################################
|
||||
# Pattern-based blocking (blocklists) #
|
||||
######################################################
|
||||
|
||||
## Blocklists are made of one pattern per line. Example of valid patterns:
|
||||
##
|
||||
## example.com
|
||||
## =example.com
|
||||
## *sex*
|
||||
## ads.*
|
||||
## ads*.example.*
|
||||
## ads*.example[0-9]*.com
|
||||
##
|
||||
## Example blocklist files can be found at https://download.dnscrypt.info/blocklists/
|
||||
## A script to build blocklists from public feeds can be found in the
|
||||
## `utils/generate-domains-blocklists` directory of the dnscrypt-proxy source code.
|
||||
|
||||
[blocked_names]
|
||||
|
||||
## Path to the file of blocking rules (absolute, or relative to the same directory as the config file)
|
||||
|
||||
# blocked_names_file = '/etc/dnscrypt-proxy/blocked-names.txt'
|
||||
|
||||
|
||||
## Optional path to a file logging blocked queries
|
||||
|
||||
# log_file = '/var/log/dnscrypt-proxy/blocked-names.log'
|
||||
|
||||
|
||||
## Optional log format: tsv or ltsv (default: tsv)
|
||||
|
||||
# log_format = 'tsv'
|
||||
|
||||
|
||||
|
||||
###########################################################
|
||||
# Pattern-based IP blocking (IP blocklists) #
|
||||
###########################################################
|
||||
|
||||
## IP blocklists are made of one pattern per line. Example of valid patterns:
|
||||
##
|
||||
## 127.*
|
||||
## fe80:abcd:*
|
||||
## 192.168.1.4
|
||||
|
||||
[blocked_ips]
|
||||
|
||||
## Path to the file of blocking rules (absolute, or relative to the same directory as the config file)
|
||||
|
||||
# blocked_ips_file = '/etc/dnscrypt-proxy/blocked-ips.txt'
|
||||
|
||||
|
||||
## Optional path to a file logging blocked queries
|
||||
|
||||
# log_file = '/var/log/dnscrypt-proxy/blocked-ips.log'
|
||||
|
||||
|
||||
## Optional log format: tsv or ltsv (default: tsv)
|
||||
|
||||
# log_format = 'tsv'
|
||||
|
||||
|
||||
|
||||
######################################################
|
||||
# Pattern-based allow lists (blocklists bypass) #
|
||||
######################################################
|
||||
|
||||
## Allowlists support the same patterns as blocklists
|
||||
## If a name matches an allowlist entry, the corresponding session
|
||||
## will bypass names and IP filters.
|
||||
##
|
||||
## Time-based rules are also supported to make some websites only accessible at specific times of the day.
|
||||
|
||||
[allowed_names]
|
||||
|
||||
## Path to the file of allow list rules (absolute, or relative to the same directory as the config file)
|
||||
|
||||
# allowed_names_file = '/etc/dnscrypt-proxy/allowed-names.txt'
|
||||
|
||||
|
||||
## Optional path to a file logging allowed queries
|
||||
|
||||
# log_file = '/var/log/dnscrypt-proxy/allowed-names.log'
|
||||
|
||||
|
||||
## Optional log format: tsv or ltsv (default: tsv)
|
||||
|
||||
# log_format = 'tsv'
|
||||
|
||||
|
||||
|
||||
#########################################################
|
||||
# Pattern-based allowed IPs lists (blocklists bypass) #
|
||||
#########################################################
|
||||
|
||||
## Allowed IP lists support the same patterns as IP blocklists
|
||||
## If an IP response matches an allowed entry, the corresponding session
|
||||
## will bypass IP filters.
|
||||
##
|
||||
## Time-based rules are also supported to make some websites only accessible at specific times of the day.
|
||||
|
||||
[allowed_ips]
|
||||
|
||||
## Path to the file of allowed ip rules (absolute, or relative to the same directory as the config file)
|
||||
|
||||
# allowed_ips_file = '/etc/dnscrypt-proxy/allowed-ips.txt'
|
||||
|
||||
|
||||
## Optional path to a file logging allowed queries
|
||||
|
||||
# log_file = '/var/log/dnscrypt-proxy/allowed-ips.log'
|
||||
|
||||
## Optional log format: tsv or ltsv (default: tsv)
|
||||
|
||||
# log_format = 'tsv'
|
||||
|
||||
|
||||
|
||||
##########################################
|
||||
# Time access restrictions #
|
||||
##########################################
|
||||
|
||||
## One or more weekly schedules can be defined here.
|
||||
## Patterns in the name-based blocked_names file can optionally be followed with @schedule_name
|
||||
## to apply the pattern 'schedule_name' only when it matches a time range of that schedule.
|
||||
##
|
||||
## For example, the following rule in a blocklist file:
|
||||
## *.youtube.* @time-to-sleep
|
||||
## would block access to YouTube during the times defined by the 'time-to-sleep' schedule.
|
||||
##
|
||||
## {after='21:00', before= '7:00'} matches 0:00-7:00 and 21:00-0:00
|
||||
## {after= '9:00', before='18:00'} matches 9:00-18:00
|
||||
|
||||
[schedules]
|
||||
|
||||
# [schedules.time-to-sleep]
|
||||
# mon = [{after='21:00', before='7:00'}]
|
||||
# tue = [{after='21:00', before='7:00'}]
|
||||
# wed = [{after='21:00', before='7:00'}]
|
||||
# thu = [{after='21:00', before='7:00'}]
|
||||
# fri = [{after='23:00', before='7:00'}]
|
||||
# sat = [{after='23:00', before='7:00'}]
|
||||
# sun = [{after='21:00', before='7:00'}]
|
||||
|
||||
# [schedules.work]
|
||||
# mon = [{after='9:00', before='18:00'}]
|
||||
# tue = [{after='9:00', before='18:00'}]
|
||||
# wed = [{after='9:00', before='18:00'}]
|
||||
# thu = [{after='9:00', before='18:00'}]
|
||||
# fri = [{after='9:00', before='17:00'}]
|
||||
|
||||
|
||||
|
||||
#########################
|
||||
# Servers #
|
||||
#########################
|
||||
|
||||
## Remote lists of available servers
|
||||
## Multiple sources can be used simultaneously, but every source
|
||||
## requires a dedicated cache file.
|
||||
##
|
||||
## Refer to the documentation for URLs of public sources.
|
||||
##
|
||||
## A prefix can be prepended to server names in order to
|
||||
## avoid collisions if different sources share the same for
|
||||
## different servers. In that case, names listed in `server_names`
|
||||
## must include the prefixes.
|
||||
##
|
||||
## If the `urls` property is missing, cache files and valid signatures
|
||||
## must already be present. This doesn't prevent these cache files from
|
||||
## expiring after `refresh_delay` hours.
|
||||
## Cache freshness is checked every 24 hours, so values for 'refresh_delay'
|
||||
## of less than 24 hours will have no effect.
|
||||
## A maximum delay of 168 hours (1 week) is imposed to ensure cache freshness.
|
||||
|
||||
[sources]
|
||||
|
||||
### An example of a remote source from https://github.com/DNSCrypt/dnscrypt-resolvers
|
||||
|
||||
[sources.public-resolvers]
|
||||
urls = ['https://raw.githubusercontent.com/DNSCrypt/dnscrypt-resolvers/master/v3/public-resolvers.md', 'https://download.dnscrypt.info/resolvers-list/v3/public-resolvers.md', 'https://ipv6.download.dnscrypt.info/resolvers-list/v3/public-resolvers.md']
|
||||
cache_file = '/var/cache/dnscrypt-proxy/public-resolvers.md'
|
||||
minisign_key = 'RWQf6LRCGA9i53mlYecO4IzT51TGPpvWucNSCh1CBM0QTaLn73Y7GFO3'
|
||||
refresh_delay = 72
|
||||
prefix = ''
|
||||
|
||||
### Anonymized DNS relays
|
||||
|
||||
[sources.relays]
|
||||
urls = ['https://raw.githubusercontent.com/DNSCrypt/dnscrypt-resolvers/master/v3/relays.md', 'https://download.dnscrypt.info/resolvers-list/v3/relays.md', 'https://ipv6.download.dnscrypt.info/resolvers-list/v3/relays.md']
|
||||
cache_file = '/var/cache/dnscrypt-proxy/relays.md'
|
||||
minisign_key = 'RWQf6LRCGA9i53mlYecO4IzT51TGPpvWucNSCh1CBM0QTaLn73Y7GFO3'
|
||||
refresh_delay = 72
|
||||
prefix = ''
|
||||
|
||||
### ODoH (Oblivious DoH) servers and relays
|
||||
|
||||
# [sources.odoh-servers]
|
||||
# urls = ['https://raw.githubusercontent.com/DNSCrypt/dnscrypt-resolvers/master/v3/odoh-servers.md', 'https://download.dnscrypt.info/resolvers-list/v3/odoh-servers.md', 'https://ipv6.download.dnscrypt.info/resolvers-list/v3/odoh-servers.md']
|
||||
# cache_file = 'odoh-servers.md'
|
||||
# minisign_key = 'RWQf6LRCGA9i53mlYecO4IzT51TGPpvWucNSCh1CBM0QTaLn73Y7GFO3'
|
||||
# refresh_delay = 24
|
||||
# prefix = ''
|
||||
# [sources.odoh-relays]
|
||||
# urls = ['https://raw.githubusercontent.com/DNSCrypt/dnscrypt-resolvers/master/v3/odoh-relays.md', 'https://download.dnscrypt.info/resolvers-list/v3/odoh-relays.md', 'https://ipv6.download.dnscrypt.info/resolvers-list/v3/odoh-relays.md']
|
||||
# cache_file = 'odoh-relays.md'
|
||||
# minisign_key = 'RWQf6LRCGA9i53mlYecO4IzT51TGPpvWucNSCh1CBM0QTaLn73Y7GFO3'
|
||||
# refresh_delay = 24
|
||||
# prefix = ''
|
||||
|
||||
### Quad9
|
||||
|
||||
# [sources.quad9-resolvers]
|
||||
# urls = ['https://www.quad9.net/quad9-resolvers.md']
|
||||
# minisign_key = 'RWQBphd2+f6eiAqBsvDZEBXBGHQBJfeG6G+wJPPKxCZMoEQYpmoysKUN'
|
||||
# cache_file = '/var/cache/dnscrypt-proxy/quad9-resolvers.md'
|
||||
# prefix = 'quad9-'
|
||||
|
||||
### Another example source, with resolvers censoring some websites not appropriate for children
|
||||
### This is a subset of the `public-resolvers` list, so enabling both is useless.
|
||||
|
||||
# [sources.parental-control]
|
||||
# urls = ['https://raw.githubusercontent.com/DNSCrypt/dnscrypt-resolvers/master/v3/parental-control.md', 'https://download.dnscrypt.info/resolvers-list/v3/parental-control.md', 'https://ipv6.download.dnscrypt.info/resolvers-list/v3/parental-control.md']
|
||||
# cache_file = '/var/cache/dnscrypt-proxy/parental-control.md'
|
||||
# minisign_key = 'RWQf6LRCGA9i53mlYecO4IzT51TGPpvWucNSCh1CBM0QTaLn73Y7GFO3'
|
||||
|
||||
|
||||
|
||||
#########################################
|
||||
# Servers with known bugs #
|
||||
#########################################
|
||||
|
||||
[broken_implementations]
|
||||
|
||||
## Cisco servers currently cannot handle queries larger than 1472 bytes, and don't
|
||||
## truncate responses larger than questions as expected by the DNSCrypt protocol.
|
||||
## This prevents large responses from being received over UDP and over relays.
|
||||
##
|
||||
## Older versions of the `dnsdist` server software had a bug with queries larger
|
||||
## than 1500 bytes. This is fixed since `dnsdist` version 1.5.0, but
|
||||
## some server may still run an outdated version.
|
||||
##
|
||||
## The list below enables workarounds to make non-relayed usage more reliable
|
||||
## until the servers are fixed.
|
||||
|
||||
fragments_blocked = ['cisco', 'cisco-ipv6', 'cisco-familyshield', 'cisco-familyshield-ipv6', 'cleanbrowsing-adult', 'cleanbrowsing-adult-ipv6', 'cleanbrowsing-family', 'cleanbrowsing-family-ipv6', 'cleanbrowsing-security', 'cleanbrowsing-security-ipv6']
|
||||
|
||||
|
||||
|
||||
#################################################################
|
||||
# Certificate-based client authentication for DoH #
|
||||
#################################################################
|
||||
|
||||
## Use a X509 certificate to authenticate yourself when connecting to DoH servers.
|
||||
## This is only useful if you are operating your own, private DoH server(s).
|
||||
## 'creds' maps servers to certificates, and supports multiple entries.
|
||||
## If you are not using the standard root CA, an optional "root_ca"
|
||||
## property set to the path to a root CRT file can be added to a server entry.
|
||||
|
||||
[doh_client_x509_auth]
|
||||
|
||||
# creds = [
|
||||
# { server_name='*', client_cert='client.crt', client_key='client.key' }
|
||||
# ]
|
||||
|
||||
|
||||
|
||||
################################
|
||||
# Anonymized DNS #
|
||||
################################
|
||||
|
||||
[anonymized_dns]
|
||||
|
||||
## Routes are indirect ways to reach DNSCrypt servers.
|
||||
##
|
||||
## A route maps a server name ("server_name") to one or more relays that will be
|
||||
## used to connect to that server.
|
||||
##
|
||||
## A relay can be specified as a DNS Stamp (either a relay stamp, or a
|
||||
## DNSCrypt stamp) or a server name.
|
||||
##
|
||||
## The following example routes "example-server-1" via `anon-example-1` or `anon-example-2`,
|
||||
## and "example-server-2" via the relay whose relay DNS stamp is
|
||||
## "sdns://gRIxMzcuNzQuMjIzLjIzNDo0NDM".
|
||||
##
|
||||
## !!! THESE ARE JUST EXAMPLES !!!
|
||||
##
|
||||
## Review the list of available relays from the "relays.md" file, and, for each
|
||||
## server you want to use, define the relays you want connections to go through.
|
||||
##
|
||||
## Carefully choose relays and servers so that they are run by different entities.
|
||||
##
|
||||
## "server_name" can also be set to "*" to define a default route, for all servers:
|
||||
## { server_name='*', via=['anon-example-1', 'anon-example-2'] }
|
||||
##
|
||||
## If a route is ["*"], the proxy automatically picks a relay on a distinct network.
|
||||
## { server_name='*', via=['*'] } is also an option, but is likely to be suboptimal.
|
||||
##
|
||||
## Manual selection is always recommended over automatic selection, so that you can
|
||||
## select (relay,server) pairs that work well and fit your own criteria (close by or
|
||||
## in different countries, operated by different entities, on distinct ISPs...)
|
||||
|
||||
# routes = [
|
||||
# { server_name='example-server-1', via=['anon-example-1', 'anon-example-2'] },
|
||||
# { server_name='example-server-2', via=['sdns://gRIxMzcuNzQuMjIzLjIzNDo0NDM'] }
|
||||
# ]
|
||||
|
||||
|
||||
## Skip resolvers incompatible with anonymization instead of using them directly
|
||||
|
||||
skip_incompatible = false
|
||||
|
||||
|
||||
## If public server certificates for a non-conformant server cannot be
|
||||
## retrieved via a relay, try getting them directly. Actual queries
|
||||
## will then always go through relays.
|
||||
|
||||
direct_cert_fallback = false
|
||||
|
||||
|
||||
|
||||
###############################
|
||||
# DNS64 #
|
||||
###############################
|
||||
|
||||
## DNS64 is a mechanism for synthesizing AAAA records from A records.
|
||||
## It is used with an IPv6/IPv4 translator to enable client-server
|
||||
## communication between an IPv6-only client and an IPv4-only server,
|
||||
## without requiring any changes to either the IPv6 or the IPv4 node,
|
||||
## for the class of applications that work through NATs.
|
||||
##
|
||||
## There are two options to synthesize such records:
|
||||
## Option 1: Using a set of static IPv6 prefixes;
|
||||
## Option 2: By discovering the IPv6 prefix from DNS64-enabled resolver.
|
||||
##
|
||||
## If both options are configured - only static prefixes are used.
|
||||
## (Ref. RFC6147, RFC6052, RFC7050)
|
||||
##
|
||||
## Do not enable unless you know what DNS64 is and why you need it, or else
|
||||
## you won't be able to connect to anything at all.
|
||||
|
||||
[dns64]
|
||||
|
||||
## Static prefix(es) as Pref64::/n CIDRs
|
||||
|
||||
# prefix = ['64:ff9b::/96']
|
||||
|
||||
## DNS64-enabled resolver(s) to discover Pref64::/n CIDRs
|
||||
## These resolvers are used to query for Well-Known IPv4-only Name (WKN) "ipv4only.arpa." to discover only.
|
||||
## Set with your ISP's resolvers in case of custom prefixes (other than Well-Known Prefix 64:ff9b::/96).
|
||||
## IMPORTANT: Default resolvers listed below support Well-Known Prefix 64:ff9b::/96 only.
|
||||
|
||||
# resolver = ['[2606:4700:4700::64]:53', '[2001:4860:4860::64]:53']
|
||||
|
||||
|
||||
|
||||
########################################
|
||||
# Static entries #
|
||||
########################################
|
||||
|
||||
## Optional, local, static list of additional servers
|
||||
## Mostly useful for testing your own servers.
|
||||
|
||||
[static]
|
||||
# IPv4 (144.91.70.62, port 5443)
|
||||
[static. 'dnscrypt.dotya.ml-ipv4']
|
||||
stamp = 'sdns://AQcAAAAAAAAAETE0NC45MS43MC42Mjo1NDQzIHF-JiN46cNwFXJleEVWGWgrhe2QeysUtZoo9HwzYCMzITIuZG5zY3J5cHQtY2VydC5kbnNjcnlwdC5kb3R5YS5tbA'
|
14
ansible/roles/configs/files/dnf.conf
Normal file
14
ansible/roles/configs/files/dnf.conf
Normal file
@ -0,0 +1,14 @@
|
||||
[main]
|
||||
gpgcheck=1
|
||||
# if installing multiple kernels this applies to each flavour
|
||||
# installonly_limit=3
|
||||
installonly_limit=2
|
||||
clean_requirements_on_remove=True
|
||||
fastestmirror=False
|
||||
best=False
|
||||
skip_if_unavailable=True
|
||||
keepcache=1
|
||||
max_parallel_downloads=10
|
||||
deltarpm=True
|
||||
#exclude=alacritty
|
||||
# debuglevel=7
|
12
ansible/roles/configs/files/resolv.conf
Normal file
12
ansible/roles/configs/files/resolv.conf
Normal file
@ -0,0 +1,12 @@
|
||||
nameserver 127.0.0.1
|
||||
nameserver ::1
|
||||
|
||||
# nameserver 84.200.69.80
|
||||
# nameserver 130.225.244.166
|
||||
# https://blog.uncensoreddns.org/dns-servers/
|
||||
##nameserver 130.225.244.166
|
||||
#nameserver 2001:878:0:e000:82:e1:f4:a6
|
||||
|
||||
# options edns0 single-request-reopen rotate attempts:9 timeout:1
|
||||
options edns0 rotate attempts:10 timeout:1
|
||||
# options edns0 single-request-reopen attempts:7 timeout:5
|
9
ansible/roles/configs/tasks/dnf.yml
Normal file
9
ansible/roles/configs/tasks/dnf.yml
Normal file
@ -0,0 +1,9 @@
|
||||
---
|
||||
- name: Install dnf config
|
||||
become: true
|
||||
ansible.builtin.copy:
|
||||
src: dnf.conf
|
||||
dest: /etc/dnf/dnf.conf
|
||||
owner: root
|
||||
group: root
|
||||
mode: '0644'
|
3
ansible/roles/configs/tasks/main.yml
Normal file
3
ansible/roles/configs/tasks/main.yml
Normal file
@ -0,0 +1,3 @@
|
||||
---
|
||||
- include_tasks: dnf.yml
|
||||
- include_tasks: resolvconf.yml
|
18
ansible/roles/configs/tasks/resolvconf.yml
Normal file
18
ansible/roles/configs/tasks/resolvconf.yml
Normal file
@ -0,0 +1,18 @@
|
||||
---
|
||||
- name: stop+disable systemd-resolved
|
||||
become: true
|
||||
systemd:
|
||||
name: systemd-resolved
|
||||
state: stopped
|
||||
enabled: false
|
||||
|
||||
#- name: unlink resolv.conf
|
||||
# file:
|
||||
# path: /etc/resolv.conf
|
||||
# state: absent
|
||||
|
||||
- name: write resolv.conf
|
||||
become: true
|
||||
copy:
|
||||
src: resolv.conf
|
||||
dest: /etc/resolvconftest
|
1
ansible/roles/netbird/tasks/main.yml
Normal file
1
ansible/roles/netbird/tasks/main.yml
Normal file
@ -0,0 +1 @@
|
||||
---
|
4
ansible/roles/rand/tasks/main.yml
Normal file
4
ansible/roles/rand/tasks/main.yml
Normal file
@ -0,0 +1,4 @@
|
||||
---
|
||||
# - include_tasks: ../../../playbooks/tasks/reencrypt-vault-default-key.yml
|
||||
# - include_tasks: reencrypt.yml
|
||||
- include_tasks: pkgs.yml
|
25
ansible/roles/rand/tasks/pkgs.yml
Normal file
25
ansible/roles/rand/tasks/pkgs.yml
Normal file
@ -0,0 +1,25 @@
|
||||
---
|
||||
#- name: Upgrade all packages
|
||||
# become: true
|
||||
# ansible.builtin.dnf:
|
||||
# name: "*"
|
||||
# state: latest
|
||||
#
|
||||
- name: Install core packages
|
||||
become: true
|
||||
dnf:
|
||||
name: "{{ packages }}"
|
||||
state: present
|
||||
vars:
|
||||
packages:
|
||||
- zsh
|
||||
- zsh-syntax-highlighting
|
||||
- zsh-autosuggestions
|
||||
- gcc
|
||||
- binutils
|
||||
- go
|
||||
- sway
|
||||
- curl
|
||||
- wget
|
||||
retries: 5
|
||||
delay: 3
|
6
ansible/roles/rand/tasks/reencrypt.yml
Normal file
6
ansible/roles/rand/tasks/reencrypt.yml
Normal file
@ -0,0 +1,6 @@
|
||||
---
|
||||
- name: reencrypt default vault
|
||||
include:
|
||||
- ../../../playbooks/tasks/reencrypt-vault-default-key.yml
|
||||
# name: adsa
|
||||
tags: reencrypt
|
55
main.tf
Normal file
55
main.tf
Normal file
@ -0,0 +1,55 @@
|
||||
# https://www.tweag.io/blog/2019-04-03-terraform-provider-secret/
|
||||
# resource "secret_resource" "" {}
|
||||
|
||||
# https://www.linode.com/docs/guides/secrets-management-with-terraform/
|
||||
provider "linode" {
|
||||
token = var.linode_token
|
||||
}
|
||||
|
||||
resource "linode_sshkey" "surtur" {
|
||||
label = "nbgw"
|
||||
ssh_key = chomp(file("~/.ssh/surtur.pub"))
|
||||
}
|
||||
|
||||
resource "linode_sshkey" "leo" {
|
||||
label = "nbgw"
|
||||
ssh_key = chomp(file("~/.ssh/leo.pub"))
|
||||
}
|
||||
|
||||
resource "linode_instance" "nbgw" {
|
||||
booted = true
|
||||
region = var.linode_region
|
||||
image = "linode/fedora38"
|
||||
type = "g6-standard-1"
|
||||
label = "nbgw"
|
||||
group = "Terraform"
|
||||
root_pass = var.linode_rootpasswd
|
||||
authorized_keys = [
|
||||
linode_sshkey.surtur.ssh_key,
|
||||
linode_sshkey.leo.ssh_key
|
||||
]
|
||||
|
||||
connection {
|
||||
type = "ssh"
|
||||
user = "root"
|
||||
password = var.linode_rootpasswd
|
||||
host = self.ip_address
|
||||
}
|
||||
|
||||
# remote-exec waits for the instance setup, so local-exec below will not fail immediatelly
|
||||
provisioner "remote-exec" {
|
||||
inline = ["/bin/true"]
|
||||
}
|
||||
|
||||
provisioner "local-exec" {
|
||||
command = "ANSIBLE_HOST_KEY_CHECKING=False ansible-playbook -e 'wheel_login=${var.linode_wheel_login} hostname=${self.label}' -u root -i '${self.ip_address},' ./ansible/playbooks/common.yml"
|
||||
}
|
||||
}
|
||||
|
||||
output "nbgw-ipv4" {
|
||||
value = linode_instance.nbgw.ipv4
|
||||
}
|
||||
|
||||
output "nbgw-ipv6" {
|
||||
value = linode_instance.nbgw.ipv6
|
||||
}
|
22
terraform.tf
Normal file
22
terraform.tf
Normal file
@ -0,0 +1,22 @@
|
||||
# https://thegeeklab.de/posts/2022/09/store-terraform-state-on-backblaze-s3/
|
||||
terraform {
|
||||
required_providers {
|
||||
linode = {
|
||||
source = "linode/linode"
|
||||
}
|
||||
}
|
||||
|
||||
backend "s3" {
|
||||
bucket = "tfinfra"
|
||||
key = "tf-infra.tfstate"
|
||||
skip_credentials_validation = true
|
||||
skip_region_validation = true
|
||||
# endpoint = var.b2_endpoint
|
||||
# region = var.b2_region
|
||||
# access_key = var.b2_access_key
|
||||
# secret_key = var.b2_secret_key
|
||||
# encrypt = true
|
||||
# openssl rand -base64 32
|
||||
# sse_customer_key = "fsRb1SXBjiUqBM0rw/YqvDixScWnDCZsK7BhnPTc93Y="
|
||||
}
|
||||
}
|
22
variables.tf
Normal file
22
variables.tf
Normal file
@ -0,0 +1,22 @@
|
||||
variable "linode_token" {
|
||||
description = "Linode API token"
|
||||
}
|
||||
|
||||
variable "linode_rootpasswd" {
|
||||
description = "Linode root passwd"
|
||||
type = string
|
||||
}
|
||||
|
||||
variable "linode_region" {
|
||||
description = "Linode region"
|
||||
}
|
||||
|
||||
variable "linode_nbgw_hostname" {
|
||||
description = "nbgw hostname"
|
||||
type = string
|
||||
}
|
||||
|
||||
variable "linode_wheel_login" {
|
||||
type = string
|
||||
description = "username of the admin user"
|
||||
}
|
Loading…
Reference in New Issue
Block a user