Set up the nat_dhcp jail for mrmanager.
This commit is contained in:
parent
37f8749b3c
commit
e49d008d57
@ -15,3 +15,16 @@ etc_hosts: {}
|
|||||||
wireguard_directory: mrmanager
|
wireguard_directory: mrmanager
|
||||||
enabled_wireguard:
|
enabled_wireguard:
|
||||||
- colo
|
- colo
|
||||||
|
jail_zfs_dataset: zdata/jail
|
||||||
|
jail_zfs_dataset_mountpoint: /jail/main
|
||||||
|
jail_canmount: "on"
|
||||||
|
jail_list:
|
||||||
|
- name: nat_dhcp
|
||||||
|
enabled: true
|
||||||
|
conf:
|
||||||
|
src: nat_dhcp
|
||||||
|
# bhyve_dataset: zroot/freebsd/release/vm
|
||||||
|
# bhyve_list: []
|
||||||
|
# bhyve_canmount: "on"
|
||||||
|
# efi_dev: /dev/gpt/EFI
|
||||||
|
devfs_rules: "mrmanager_devfs.rules"
|
||||||
|
@ -1,2 +1,2 @@
|
|||||||
[server]
|
[server]
|
||||||
mrmanager ansible_user=talexander ansible_host=74.80.180.138
|
mrmanager ansible_user=talexander ansible_host=10.217.2.1
|
||||||
|
@ -1,4 +1,5 @@
|
|||||||
[jail]
|
[jail]
|
||||||
nat_dhcp ansible_connection=jail
|
nat_dhcp ansible_connection=jail
|
||||||
homeserver_nat_dhcp ansible_ssh_host=nat_dhcp@172.16.16.2 ansible_connection=sshjail
|
homeserver_nat_dhcp ansible_ssh_host=nat_dhcp@172.16.16.2 ansible_connection=sshjail
|
||||||
|
mrmanager_nat_dhcp ansible_ssh_host=nat_dhcp@10.217.2.1 ansible_connection=sshjail
|
||||||
nat_dhcp@172.16.16.2 ansible_connection=sshjail
|
nat_dhcp@172.16.16.2 ansible_connection=sshjail
|
||||||
|
@ -49,7 +49,7 @@
|
|||||||
- docker
|
- docker
|
||||||
- vscode
|
- vscode
|
||||||
|
|
||||||
- hosts: nat_dhcp:homeserver_nat_dhcp
|
- hosts: nat_dhcp:homeserver_nat_dhcp:mrmanager_nat_dhcp
|
||||||
vars:
|
vars:
|
||||||
ansible_become: True
|
ansible_become: True
|
||||||
roles:
|
roles:
|
||||||
|
5
ansible/roles/devfs/files/mrmanager_devfs.rules
Normal file
5
ansible/roles/devfs/files/mrmanager_devfs.rules
Normal file
@ -0,0 +1,5 @@
|
|||||||
|
[tajaildhcp=14]
|
||||||
|
add include $devfsrules_hide_all
|
||||||
|
add include $devfsrules_unhide_basic
|
||||||
|
add include $devfsrules_unhide_login
|
||||||
|
add path 'bpf*' unhide
|
@ -1,4 +1,5 @@
|
|||||||
ext_if = "lagg0"
|
ext_if = "lagg0"
|
||||||
|
not_ext_if = "{ !lagg0 }"
|
||||||
jail_nat_v4 = "{ 10.215.1.0/24 }"
|
jail_nat_v4 = "{ 10.215.1.0/24 }"
|
||||||
not_jail_nat_v4 = "{ any, !10.215.1.0/24 }"
|
not_jail_nat_v4 = "{ any, !10.215.1.0/24 }"
|
||||||
|
|
||||||
@ -14,8 +15,9 @@ udp_pass_in = "{ 53 51820 51821 51822 }"
|
|||||||
set skip on lo
|
set skip on lo
|
||||||
|
|
||||||
# redirections
|
# redirections
|
||||||
nat pass on $ext_if inet from $jail_nat_v4 to $not_jail_nat_v4 -> ($ext_if)
|
nat pass on lagg0 inet from $jail_nat_v4 to $not_jail_nat_v4 -> (lagg0)
|
||||||
rdr pass on !$ext_if proto {tcp, udp} from any to 10.215.1.1 port 53 -> 1.1.1.1 port 53
|
nat pass on $not_ext_if inet from $jail_nat_v4 to 10.215.1.1 port 53 -> ($ext_if)
|
||||||
|
rdr pass on $not_ext_if proto {tcp, udp} from any to 10.215.1.1 port 53 -> 1.1.1.1 port 53
|
||||||
|
|
||||||
# filtering
|
# filtering
|
||||||
block log all
|
block log all
|
||||||
|
@ -1 +1,3 @@
|
|||||||
defaultrouter="74.80.180.137"
|
defaultrouter="74.80.180.137"
|
||||||
|
gateway_enable="YES"
|
||||||
|
ipv6_gateway_enable="YES"
|
||||||
|
@ -30,6 +30,8 @@ elif [ "$target" = "vm_poudriereodo" ]; then
|
|||||||
ansible-playbook -v -i environments/vm playbook.yaml --diff --limit poudriereodo "${@}"
|
ansible-playbook -v -i environments/vm playbook.yaml --diff --limit poudriereodo "${@}"
|
||||||
elif [ "$target" = "mrmanager" ]; then
|
elif [ "$target" = "mrmanager" ]; then
|
||||||
ansible-playbook -v -i environments/colo playbook.yaml --diff --limit mrmanager "${@}"
|
ansible-playbook -v -i environments/colo playbook.yaml --diff --limit mrmanager "${@}"
|
||||||
|
elif [ "$target" = "jail_mrmanager_nat_dhcp" ]; then
|
||||||
|
ansible-playbook -v -i environments/jail playbook.yaml --diff --limit mrmanager_nat_dhcp "${@}"
|
||||||
else
|
else
|
||||||
die 1 "Unrecognized target"
|
die 1 "Unrecognized target"
|
||||||
fi
|
fi
|
||||||
|
Loading…
x
Reference in New Issue
Block a user