Compare commits

...

9 Commits

11 changed files with 98 additions and 55 deletions

View File

@ -15,6 +15,7 @@
# - firewall-vpn-r
- wireguard-r
# - x509-r
- fw-ferm
- ssh-cli
- syslog-cli
- post

View File

@ -18,6 +18,7 @@
# - firewall-vpn-l
- wireguard-l
# - x509-l
- fw-ferm
- ssh-cli
- syslog-cli
- post

View File

@ -1,12 +0,0 @@
# CMD
sudo nmap -pU:51820 192.168.0.51
#Resultat
Starting Nmap 7.80 ( https://nmap.org ) at 2023-01-27 09:02 CET
Nmap scan report for 192.168.0.51
Host is up (0.00030s latency).
PORT STATE SERVICE
51820/tcp filtered unknown
MAC Address: 08:00:27:F0:E2:46 (Oracle VirtualBox virtual NIC)
Nmap done: 1 IP address (1 host up) scanned in 0.36 seconds

View File

@ -1,9 +0,0 @@
Starting Nmap 7.80 ( https://nmap.org ) at 2023-01-27 09:33 CET
Nmap scan report for 192.168.0.52
Host is up (0.00021s latency).
PORT STATE SERVICE
51820/tcp filtered unknown
MAC Address: 08:00:27:31:FA:71 (Oracle VirtualBox virtual NIC)
Nmap done: 1 IP address (1 host up) scanned in 0.36 seconds

19
roles/fw-ferm/README.md Normal file
View File

@ -0,0 +1,19 @@
[Ferm]:http://ferm.foo-projects.org/
Modifier l'execution d'iptables [plus d'info ici]:https://wiki.debian.org/iptables
```bash
update-alternatives --set iptables /usr/sbin/iptables-legacy
```
Pour tester utiliser [Nmap]:https://nmap.org/man/fr/man-briefoptions.html
```bash
sudo nmap -p51820 192.168.0.51
```(r-vp1)
```bash
sudo nmap -p51820 192.168.0.52
```(r-vp2)
Sortie :
`PORT STATE SERVICE
51820/tcp filtered unknown`
Faire des ping!

View File

@ -0,0 +1,15 @@
---
- name: installation de ferm
apt:
name: ferm
state: present
- name: copie du ferm.conf
copy:
src: ferm.conf.{{ ansible_hostname }}
dest: /etc/ferm/ferm.conf
- name: redemarage service ferm
ansible.builtin.service:
name: ferm.service
state: restarted

View File

@ -4,16 +4,16 @@
name: wireguard
state: present
- name: installation de ferm
apt:
name: ferm
state: present
- name: installation de wireguard-tools
apt:
name: wireguard-tools
state: present
#- name: installation de sshpass
# apt:
# name: sshpass
# state: present
#- name: copie du fichier de configuration depuis r-vp1
# command: "sshpass -p 'root' scp -r root@192.168.99.112:/root/confwg/wg0-b.conf /etc/wireguard/"

View File

@ -4,6 +4,11 @@
name: wireguard
state: present
- name: installation de ferm
apt:
name: ferm
state: present
- name: installation de wireguard-tools
apt:
name: wireguard-tools
@ -27,12 +32,10 @@
- name: copie du fichier de configuration
copy:
src: /root/confwg/wg0-a.conf
dest: /etc/wireguard
dest: /etc/wireguard/wg0.conf
- name: renommage fichier de configuration
command: "mv /etc/wireguard/wg0-a.conf /etc/wireguard/wg0.conf"
- name: demarrage du service wireguard
tags: aaaa
command: "systemctl enable wg-quick@wg0"
command: "systemctl restart wg-quick@wg0"
- name: Restart service httpd, in all cases
ansible.builtin.service:
name: wg-quick@wg0
enabled: yes
state: restarted

View File

@ -1,24 +1,49 @@
---
- hosts: localhost
connection: local
vars:
maria_dbhost: "192.168.102.254"
maria_dbname: "wordpress"
maria_dbuser: "wp"
maria_dbpasswd: "wp"
- hosts: all
become: true
tasks:
- name: modules python pour
apt:
name: python3-pymysql
state: present
roles:
- base
- goss
- post
#- s-lb-bd-ab
- mariadb-ab
# - role: db-user
# cli_ip: "192.168.102.1"
# - role: db-user
# cli_ip: "192.168.102.2"
# - role: db-user
# cli_ip: "192.168.102.3"
- snmp-agent
# - post
- name: install mariadb-server
apt:
name: mariadb-server
state: present
- name: Cree Bd wordpress
mysql_db:
db: wordpressdb
login_unix_socket: /var/run/mysqld/mysqld.sock
state: present
- name: Ouvre port 3306 mariadb-server
replace:
path: /etc/mysql/mariadb.conf.d/50-server.cnf
regexp: '^bind-address.*'
replace: '#bind-adress = 127.0.0.1'
backup: yes
notify: restart mariadb
- name: Create MySQL user for wordpress
mysql_user:
name: wordpressuser
password: wordpresspasswd
priv: "wordpressdb.*:ALL"
host: '%'
state: present
login_unix_socket: /var/run/mysqld/mysqld.sock
handlers:
- name: restart mariadb
ansible.builtin.service:
name: mariadb
state: restarted
roles:
- base
- goss
- post
- snmp-agent