Compare commits

..

26 Commits

Author SHA1 Message Date
be38bd0251 ajout activation wg0 2023-02-01 17:16:04 +01:00
aca56a9eb5 mkvm.ps1 toute les vms OK 2023-02-01 16:52:36 +01:00
167060157c Mise à jour du playbook Nextcloud 2023-02-01 15:33:22 +01:00
30fd771045 modif script copy distant 2023-02-01 15:24:16 +01:00
ca2f1ca8a1 ajout r-vp2 2023-02-01 15:08:19 +01:00
f185789e08 chgt version 2023-02-01 14:58:01 +01:00
2a8ecb7f18 enleve apt upgrade 2023-02-01 14:36:59 +01:00
206291e753 typo 2023-02-01 14:28:40 +01:00
87c1d8eee6 syntax mkvm 2023-02-01 14:21:31 +01:00
5224ae00cd role ssh-cli 2023-02-01 13:54:13 +01:00
fa000f3116 modif mkvm pour s-adm et rol ssh-cli 2023-02-01 13:53:04 +01:00
ad2dadb0b6 commentaire mkvm.ps1 pour executer le script sous windows 2023-01-31 11:00:05 +01:00
abad0fcdbc mkvm.ps1 avec des function propre s-adm et s-infra OK 2023-01-31 10:56:10 +01:00
a7a9752aa0 normalement ça marche 2023-01-31 10:08:48 +01:00
4490b84c15 ajout script python3 2023-01-31 09:35:35 +01:00
46ad76af18 changement fichier fog 2023-01-31 09:25:26 +01:00
019096fb7e modif 2023-01-31 09:04:14 +01:00
993c34b934 Merge branch 'main' of https://gitea.lyc-lecastel.fr/gadmin/gsb2023 2023-01-31 08:54:45 +01:00
fe914d9894 help me 2023-01-31 08:53:25 +01:00
83bfd34e91 Merge branch 'main' of https://gitea.lyc-lecastel.fr/gadmin/gsb2023 2023-01-31 08:43:43 +01:00
00289e1bcb modification 2023-01-31 08:43:14 +01:00
8f3f364152 please work fine 2023-01-31 08:35:13 +01:00
e36f8af7e6 Merge branch 'main' of https://gitea.lyc-lecastel.fr/gadmin/gsb2023 2023-01-31 08:30:44 +01:00
495546fae7 il faut marcher maintenant 2023-01-31 08:29:37 +01:00
c29549a281 Merge branch 'main' of https://gitea.lyc-lecastel.fr/gadmin/gsb2023 2023-01-31 08:24:56 +01:00
761d3a00bc ajout copie distante 2023-01-31 08:23:21 +01:00
27 changed files with 300 additions and 262 deletions

View File

@ -1,12 +1,13 @@
#!/bin/bash
## aa : 2023-04-18 15:25
## aa : 2023-01-18 15:25
## ps : 2023-02-01 15:25
set -o errexit
set -o pipefail
GITUSR=gitgsb
GITPRJ=gsb2023
apt update && apt upgrade
apt install -y apache2 git
apt-get update
apt-get install -y apache2 git
STOREREP="/var/www/html/gsbstore"
GLPIREL=10.0.6

View File

@ -13,9 +13,9 @@
- goss
# - snmp-agent
# - firewall-vpn-r
- post
- wireguard-r
# - x509-r
- fw-ferm
- ssh-cli
- syslog-cli
- post

View File

@ -27,6 +27,8 @@
192.168.99.102 s-lb-web2.gsb.adm
192.168.99.103 s-lb-web3.gsb.adm
192.168.99.112 r-vp1.gsb.adm
192.168.99.102 r-vp2.gsb.adm
192.168.99.8 syslog.gsb.adm

View File

@ -26,6 +26,7 @@
192.168.99.102 s-lb-web2.gsb.adm
192.168.99.103 s-lb-web3.gsb.adm
192.168.99.112 r-vp1.gsb.adm
192.168.99.102 r-vp2.gsb.adm
192.168.99.8 syslog.gsb.adm

View File

@ -109,12 +109,12 @@ log-facility local7;
#DHCP pour le réseau wifi
#subnet 172.16.65.0 netmask 255.255.255.0 {
# range 172.16.65.1 172.16.65.100;
# option domain-name-servers ns1.internal.example.org;
# option domain-name "internal.example.org";
# option routers 10.5.5.1;
# option broadcast-address 10.5.5.31;
# default-lease-time 600;
# max-lease-time 7200;
# option domain-name-servers ns1.internal.example.org;
# option domain-name "internal.example.org";
# option routers 10.5.5.1;
# option broadcast-address 10.5.5.31;
# default-lease-time 600;
# max-lease-time 7200;
#}
#DHCP pour le réseau USER

View File

@ -10,5 +10,3 @@
copy: src=dhcpd.conf dest=/etc/dhcp/
notify:
- restart isc-dhcp-server

View File

@ -1,17 +1,15 @@
---
- name: creation d'un repertoire fog
file:
path: /root/tools/fog
state: directory
- name: recuperation de l'archive d'installation fog sur git
git:
repo: https://gitea.lyc-lecastel.fr/gadmin/fog.git
dest: /root/tools/fog/
clone: yes
update: yes
force: yes
#- name: Instructions
# tags: msg
# debug: msg='{{instructions}}'
- name: Modification fichier bash (desac UDPCast)
ansible.builtin.lineinfile:
path: /root/tools/fog/lib/common/functions.sh
regexp: '^configureUDPCast\(\).*'
line: "configureUDPCast() {\nreturn"
backup: yes

View File

@ -10,4 +10,4 @@
dest: /etc/fstab
regexp: ''
insertafter: EOF
line: '192.168.102.253:/home/wordpress /var/www/html/wordpress nfs soft,timeo=5,intr,rsize=8192,wsize=8192,wsize=8192 0 0'
line: '192.168.102.253:/home/ /var/www/html/wordpress nfs soft,timeo=5,intr,rsize=8192,wsize=8192,wsize=8192 0 0'

View File

@ -60,7 +60,7 @@
replace:
path: /home/wordpress/wp-config.php
regexp: "localhost"
replace: "192.168.102.253"
replace: "192.168.102.254"
backup: yes
- name: 55 - relance nfs

View File

@ -1,12 +1,13 @@
---
- name: installation des paquets web
apt:
- apache2
- php
- php-mbstring
- php-mysql
- mariadb-client
state: present
name:
- apache2
- php
- php-mbstring
- php-mysql
- mariadb-client
state: present
- name: install nfs-common
apt:
@ -17,11 +18,11 @@
blockinfile:
path: /etc/fstab
block: |
192.168.102.253:/exports/wordpress /var/www/html nfs soft,timeo=5,intr,rsize=8192,wsize=8192,wsize=8192 0 0
192.168.102.253:/home/wordpress /var/www/html nfs soft,timeo=5,intr,rsize=8192,wsize=8192,wsize=8192 0 0
- name: monte export wordpress
ansible.posix.mount:
path: /var/www/html
state: mounted
fstype: nfs
src: 192.168.102.253:/exports/wordpress
#- name: monte export wordpress
# ansible.posix.mount:
# path: /var/www/html
# state: mounted
# fstype: nfs
# src: 192.168.102.253:/exports/wordpress

View File

@ -0,0 +1,80 @@
version: '3'
volumes:
nextcloud:
db:
networks:
proxy:
external: true
nxc:
external: false
services:
reverse-proxy:
# The official v2 Traefik docker image
image: traefik:latest
container_name: traefik
# Enables the web UI and tells Traefik to listen to docker
command: --api.insecure=true --providers.docker
ports:
# The HTTP port
- "80:80"
- "443:443"
# The Web UI (enabled by --api.insecure=true)
- "8080:8080"
volumes:
# So that Traefik can listen to the Docker events
- /var/run/docker.sock:/var/run/docker.sock:ro
# Map the static configuration into the container
- ./config/static.yml:/etc/traefik/traefik.yml:ro
# Map the dynamic configuration into the container
- ./config/dynamic.yml:/etc/traefik/dynamic.yml:ro
# Map the certificats into the container
- ./certs:/etc/certs:ro
networks:
- proxy
db:
image: mariadb:10.5
container_name: db
restart: always
command: --transaction-isolation=READ-COMMITTED --binlog-format=ROW
volumes:
- db:/var/lib/mysql
networks:
- nxc
environment:
- MYSQL_ROOT_PASSWORD=Azerty1+
- MYSQL_PASSWORD=Azerty1+
- MYSQL_DATABASE=nextcloud
- MYSQL_USER=nextcloud
app:
image: nextcloud
container_name: app
restart: always
ports:
- 8081:80
#links:
depends_on:
- db
volumes:
- ./nextcloud:/var/www/html
networks:
- proxy
- nxc
labels:
# - "traefik.enable=true"
- "traefik.http.routers.app.rule=Host(`s-nxc.gsb.lan`)"
- "traefik.http.routers.app.tls=true"
- "traefik.enable=true"
- "traefik.docker.network=proxy"
# - "traefik.http.routers.app.entrypoints=websecure"
# - "traefik.http.routers.app.rule=Host(`mon.nxc`)"
- "traefik.http.routers.app.service=app-service"
- "traefik.http.services.app-service.loadbalancer.server.port=80"
environment:
- MYSQL_PASSWORD=Azerty1+
- MYSQL_DATABASE=nextcloud
- MYSQL_USER=nextcloud
- MYSQL_HOST=db

View File

@ -1,58 +0,0 @@
version: '2'
volumes:
# nextcloud:
db:
services:
db:
image: mariadb
container_name: db
restart: always
#command: --transaction-isolation=READ-COMMITTED --binlog-format=ROW
command: --innodb-read-only-compressed=OFF
volumes:
- db:/var/lib/mysql
networks:
- nxc-db
environment:
- MYSQL_ROOT_PASSWORD=blabla
- MYSQL_PASSWORD=blabla
- MYSQL_DATABASE=nextcloud
- MYSQL_USER=nextcloud
nxc:
image: nextcloud
restart: always
container_name: nxc
# ports:
# - 8080:80
# links:
depends_on:
- db
volumes:
- ./nextcloud:/var/www/html
environment:
- MYSQL_PASSWORD=blabla
- MYSQL_DATABASE=nextcloud
- MYSQL_USER=nextcloud
- MYSQL_HOST=db
labels:
# Enable this container to be mapped by traefik
# For more information, see: https://docs.traefik.io/providers/docker/#exposedbydefault
- "traefik.enable=true"
# URL to reach this container
- "traefik.http.routers.nxc.rule=Host(`s-nxc.gsb.lan`)"
# Activation of TLS
- "traefik.http.routers.nxc.tls=true"
# If port is different than 80, use the following service:
#- "traefik.http.services.<service_name>.loadbalancer.server.port=<port>"
# - "traefik.http.services.app.loadbalancer.server.port=8080"
networks:
- proxy
- nxc-db
networks:
proxy:
external: true
nxc-db:
external: false

View File

@ -1,6 +1,4 @@
#!/bin/bash
docker-compose -f nextcloud.yml down
docker-compose -f traefik.yml down
docker compose down -v
sleep 1
docker-compose -f traefik.yml up -d --remove-orphans
docker-compose -f nextcloud.yml up -d
docker compose up -d

View File

@ -1,4 +1,6 @@
#!/bin/bash
docker volume prune -f
docker container prune -f
docker image prune -f
docker compose down -v
#docker volume prune -f
#docker container prune -f
#docker image prune -f

View File

@ -1,3 +1,2 @@
#!/bin/bash
docker-compose -f traefik.yml up -d
docker-compose -f nextcloud.yml up -d
docker compose up -d

View File

@ -1,3 +1,2 @@
#!/bin/bash
docker-compose -f nextcloud.yml down
docker-compose -f traefik.yml down
docker compose down

View File

@ -1,28 +0,0 @@
version: '3'
services:
reverse-proxy:
#image: traefik:v2.5
image: traefik
container_name: traefik
restart: always
security_opt:
- no-new-privileges:true
ports:
# Web
- 80:80
- 443:443
volumes:
- /var/run/docker.sock:/var/run/docker.sock:ro
# Map the static configuration into the container
- ./config/static.yml:/etc/traefik/traefik.yml:ro
# Map the dynamic configuration into the container
- ./config/dynamic.yml:/etc/traefik/dynamic.yml:ro
# Map the certificats into the container
- ./certs:/etc/certs:ro
networks:
- proxy
networks:
proxy:
external: true

View File

@ -24,14 +24,9 @@
src: dynamic.yml
dest: /root/nxc/config
- name: Copie de nextcloud.yml
- name: Copie de docker-compose.yml
copy:
src: nextcloud.yml
dest: /root/nxc
- name: Copie de traefik.yml
copy:
src: traefik.yml
src: docker-compose.yml
dest: /root/nxc
- name: Copie de nxc-stop.sh
@ -76,3 +71,8 @@
- name: Creation reseau docker proxy
command: docker network create proxy
- name: Démarrage du docker-compose...
command: /bin/bash docker-compose up -d
args:
chdir: /root/nxc

View File

@ -1,10 +1,14 @@
---
- name: Creation de .ssh
file: path=/root/.ssh mode=0700 state=directory
file:
path: /root/.ssh
mode: 0700
state: directory
- name: Copie cle public s-adm
shell: curl 192.168.99.99/id_rsa.pub > ~/.ssh/authorized_keys
- name: Copie cle publiique depuis s-adm
ansible.posix.authorized_key:
user: root
state: present
key: http://s-adm.gsb.adm/id_rsa.pub
#- name: Copie cle public s-spec
# shell: curl 192.168.99.10/id_rsa.pub >> ~/.ssh/authorized_keys

View File

@ -14,8 +14,7 @@
name: wireguard-tools
state: present
#- name: copie du fichier de configuration depuis r-vp1
# command: "sshpass -p 'root' scp -r root@192.168.99.112:/root/confwg/wg0-b.conf /etc/wireguard/"
#- name: renommage du fichier de configuration
# command: "mv /etc/wireguard/wg0-b.conf /etc/wireguard/wg0.conf"

View File

@ -39,3 +39,4 @@
name: wg-quick@wg0
enabled: yes
state: restarted

View File

@ -4,6 +4,6 @@
roles:
- base
- post
- lb-web
- snmp-agent
- post

View File

@ -4,6 +4,6 @@
roles:
- base
- post
- lb-web
- snmp-agent
- post

View File

@ -1,6 +1,6 @@
#!/bin/bash
mkvmrelease="v1.2"
mkvmrelease="v1.2.1"
ovarelease="2023a"
ovafogrelease="2023a"
@ -11,7 +11,7 @@ deletemode=0
usage () {
echo "$0 - version ${mkvmrelease} - Ova version ${ovarelease}"
echo "$0 : creation VM et parametrage interfaces"
echo "usage : $0 [-r] <s-infra|r-int|r-ext|s-proxy|s-mon|s-appli|s-backup|s-itil|s-ncx|s-fog>"
echo "usage : $0 [-r] <s-adm|s-infra|r-int|r-ext|s-proxy|s-mon|s-appli|s-backup|s-itil|s-ncx|s-fog>"
echo " option -r : efface vm existante avant creation nouvelle"
exit 1
}
@ -33,7 +33,6 @@ create_vm () {
}
setif () {
VBoxManage modifyvm "$1" --nic"${2}" intnet
VBoxManage modifyvm "$1" --intnet"${2}" "$3"
VBoxManage modifyvm "$1" --nictype"${2}" 82540EM
@ -66,7 +65,9 @@ fi
vm="$1"
create_vm "${vm}"
if [[ "${vm}" == "s-infra" ]] ; then
if [[ "${vm}" == "s-adm" ]] ; then
bash addint.s-adm
elif [[ "${vm}" == "s-infra" ]] ; then
create_if "${vm}" "n-adm" "n-infra"
elif [[ "${vm}" == "s-proxy" ]] ; then
create_if "${vm}" "n-adm" "n-infra"

View File

@ -1,3 +1,6 @@
# POUR POUVOIR EXECUTER DES SCRIPTS POWERSHELL SOUS WINDOWS LANCER COMMANDE SUIVANTE EN ADMIN SOUS POWERSHELL
# set-executionpolicy unrestricted
#mkvm pour toutes les vms
$mkvmrelease="v1.2"
@ -5,124 +8,149 @@ $ovarelease="2023a"
$ovafogrelease="2023a"
$ovafile="$HOME\Downloads\debian-bullseye-gsb-${ovarelease}.ova"
$ovafilefog="$HOME\Downloads\debian-buster-gsb-${ovafogrelease}.ova"
$vboxmanage="C:\Program Files\Oracle\VirtualBox\VBoxManage.exe"
$deletemode=0
#FONCTIONS
function create_vm{ param([string]$nomvm)
#Importation depuis l'ova
& "$vboxmanage" import "$ovafile" --vsys 0 --vmname "$nomvm"
Write-Host "Machine $nomvm importée"
}
function create_if{ param([string]$nomvm, [string]$nic, [int]$rang, [string]$reseau)
#Création d'une interface
if ($nomvm -and $nic -and $rang -and $reseau) {
if ($nic -eq "bridge") {
#Création d'une interface en pont
& "$vboxmanage" modifyvm "$nomvm" --nic"$rang" bridged
& "$vboxmanage" modifyvm "$nomvm" --nictype"$rang" virtio
& "$vboxmanage" modifyvm "$nomvm" --cableconnected"$rang" on
& "$vboxmanage" modifyvm "$nomvm" --nicpromisc"$rang" allow-all
Write-Host "$nomvm : IF$rang $nic"
}
elseif ($nic -eq "int") {
#Création d'une interface en reseau interne
& "$vboxmanage" modifyvm "$nomvm" --nic"$rang" intnet
& "$vboxmanage" modifyvm "$nomvm" --intnet"$rang" "$reseau"
& "$vboxmanage" modifyvm "$nomvm" --nictype"$rang" virtio
& "$vboxmanage" modifyvm "$nomvm" --cableconnected"$rang" on
& "$vboxmanage" modifyvm "$nomvm" --nicpromisc"$rang" allow-all
Write-Host "$nomvm : IF$rang $nic $reseau"
}
}
}
function usage{
Write-Host "usage : mkvm ${myInvocation.ScriptName} <s-adm|s-infra|r-int|r-ext|s-proxy|s-mon|s-agence|s-appli|s-backup|s-itil|s-ncx|s-fog|s-dns-ext|s-web-ext|s-lb|s-lb-bd|s-lb-web1|s-lb-web2|s-lb-web3>"
}
if ($args[0] -eq "s-adm") {
#Importation depuis l'ova
& "C:\Program Files\Oracle\VirtualBox\VBoxManage.exe" import "$ovafile" --vsys 0 --vmname "s-adm"
#création de la première interface
& "C:\Program Files\Oracle\VirtualBox\VBoxManage.exe" modifyvm "s-adm" --nic1 bridged
& "C:\Program Files\Oracle\VirtualBox\VBoxManage.exe" modifyvm "s-adm" --nictype1 82540EM
& "C:\Program Files\Oracle\VirtualBox\VBoxManage.exe" modifyvm "s-adm" --cableconnected1 on
& "C:\Program Files\Oracle\VirtualBox\VBoxManage.exe" modifyvm "s-adm" --nicpromisc1 allow-all
#création de la deuxième interface
& "C:\Program Files\Oracle\VirtualBox\VBoxManage.exe" modifyvm "s-adm" --nic2 intnet
& "C:\Program Files\Oracle\VirtualBox\VBoxManage.exe" modifyvm "s-adm" --intnet2 "n-adm"
& "C:\Program Files\Oracle\VirtualBox\VBoxManage.exe" modifyvm "s-adm" --nictype2 82540EM
& "C:\Program Files\Oracle\VirtualBox\VBoxManage.exe" modifyvm "s-adm" --cableconnected2 on
& "C:\Program Files\Oracle\VirtualBox\VBoxManage.exe" modifyvm "s-adm" --nicpromisc2 allow-all
}
elseif ($args[0] -eq "s-infra") {
#Importation depuis l'ova
& "C:\Program Files\Oracle\VirtualBox\VBoxManage.exe" import "$ovafile" --vsys 0 --vmname "s-infra"
#création de la première interface
& "C:\Program Files\Oracle\VirtualBox\VBoxManage.exe" modifyvm "s-infra" --nic1 intnet
& "C:\Program Files\Oracle\VirtualBox\VBoxManage.exe" modifyvm "s-infra" --intnet1 "n-adm"
& "C:\Program Files\Oracle\VirtualBox\VBoxManage.exe" modifyvm "s-infra" --nictype1 82540EM
& "C:\Program Files\Oracle\VirtualBox\VBoxManage.exe" modifyvm "s-infra" --cableconnected1 on
& "C:\Program Files\Oracle\VirtualBox\VBoxManage.exe" modifyvm "s-infra" --nicpromisc1 allow-all
#création de la deuxième interface
& "C:\Program Files\Oracle\VirtualBox\VBoxManage.exe" modifyvm "s-infra" --nic2 intnet
& "C:\Program Files\Oracle\VirtualBox\VBoxManage.exe" modifyvm "s-infra" --intnet2 "n-infra"
& "C:\Program Files\Oracle\VirtualBox\VBoxManage.exe" modifyvm "s-infra" --nictype2 82540EM
& "C:\Program Files\Oracle\VirtualBox\VBoxManage.exe" modifyvm "s-infra" --cableconnected2 on
& "C:\Program Files\Oracle\VirtualBox\VBoxManage.exe" modifyvm "s-infra" --nicpromisc2 allow-all
create_vm $args[0]
create_if $args[0] "bridge" 1 "null"
create_if $args[0] "int" 2 "n-adm"
}
elseif ($args[0] -eq "r-int") {
#Importation depuis l'ova
& "C:\Program Files\Oracle\VirtualBox\VBoxManage.exe" import "$ovafile" --vsys 0 --vmname "r-int"
#interface 1
& "C:\Program Files\Oracle\VirtualBox\VBoxManage.exe" modifyvm "r-int" --nic1 intnet
& "C:\Program Files\Oracle\VirtualBox\VBoxManage.exe" modifyvm "r-int" --intnet1 "n-adm"
& "C:\Program Files\Oracle\VirtualBox\VBoxManage.exe" modifyvm "r-int" --nictype1 82540EM
& "C:\Program Files\Oracle\VirtualBox\VBoxManage.exe" modifyvm "r-int" --cableconnected1 on
& "C:\Program Files\Oracle\VirtualBox\VBoxManage.exe" modifyvm "r-int" --nicpromisc1 allow-all
#interface 2
& "C:\Program Files\Oracle\VirtualBox\VBoxManage.exe" modifyvm "r-int" --nic2 intnet
& "C:\Program Files\Oracle\VirtualBox\VBoxManage.exe" modifyvm "r-int" --intnet2 "n-link"
& "C:\Program Files\Oracle\VirtualBox\VBoxManage.exe" modifyvm "r-int" --nictype2 82540EM
& "C:\Program Files\Oracle\VirtualBox\VBoxManage.exe" modifyvm "r-int" --cableconnected2 on
& "C:\Program Files\Oracle\VirtualBox\VBoxManage.exe" modifyvm "r-int" --nicpromisc2 allow-all
#interface 3
& "C:\Program Files\Oracle\VirtualBox\VBoxManage.exe" modifyvm "r-int" --nic3 intnet
& "C:\Program Files\Oracle\VirtualBox\VBoxManage.exe" modifyvm "r-int" --intnet3 "n-wifi"
& "C:\Program Files\Oracle\VirtualBox\VBoxManage.exe" modifyvm "r-int" --nictype3 82540EM
& "C:\Program Files\Oracle\VirtualBox\VBoxManage.exe" modifyvm "r-int" --cableconnected3 on
& "C:\Program Files\Oracle\VirtualBox\VBoxManage.exe" modifyvm "r-int" --nicpromisc3 allow-all
#interface 4
& "C:\Program Files\Oracle\VirtualBox\VBoxManage.exe" modifyvm "r-int" --nic4 intnet
& "C:\Program Files\Oracle\VirtualBox\VBoxManage.exe" modifyvm "r-int" --intnet4 "n-user"
& "C:\Program Files\Oracle\VirtualBox\VBoxManage.exe" modifyvm "r-int" --nictype4 82540EM
& "C:\Program Files\Oracle\VirtualBox\VBoxManage.exe" modifyvm "r-int" --cableconnected4 on
& "C:\Program Files\Oracle\VirtualBox\VBoxManage.exe" modifyvm "r-int" --nicpromisc4 allow-all
#interface 5
& "C:\Program Files\Oracle\VirtualBox\VBoxManage.exe" modifyvm "r-int" --nic5 intnet
& "C:\Program Files\Oracle\VirtualBox\VBoxManage.exe" modifyvm "r-int" --intnet5 "n-infra"
& "C:\Program Files\Oracle\VirtualBox\VBoxManage.exe" modifyvm "r-int" --nictype5 82540EM
& "C:\Program Files\Oracle\VirtualBox\VBoxManage.exe" modifyvm "r-int" --cableconnected5 on
& "C:\Program Files\Oracle\VirtualBox\VBoxManage.exe" modifyvm "r-int" --nicpromisc5 allow-all
create_vm $args[0]
create_if $args[0] "int" 1 "n-adm"
create_if $args[0] "int" 2 "n-link"
create_if $args[0] "int" 3 "n-wifi"
create_if $args[0] "int" 4 "n-user"
create_if $args[0] "int" 5 "n-infra"
}
elseif ($args[0] -eq "r-ext") {
#Importation depuis l'ova
& "C:\Program Files\Oracle\VirtualBox\VBoxManage.exe" import "$ovafile" --vsys 0 --vmname "r-ext"
#interface 1
& "C:\Program Files\Oracle\VirtualBox\VBoxManage.exe" modifyvm "r-ext" --nic1 intnet
& "C:\Program Files\Oracle\VirtualBox\VBoxManage.exe" modifyvm "r-ext" --intnet1 "n-adm"
& "C:\Program Files\Oracle\VirtualBox\VBoxManage.exe" modifyvm "r-ext" --nictype1 82540EM
& "C:\Program Files\Oracle\VirtualBox\VBoxManage.exe" modifyvm "r-ext" --cableconnected1 on
& "C:\Program Files\Oracle\VirtualBox\VBoxManage.exe" modifyvm "r-ext" --nicpromisc1 allow-all
#interface 2
& "C:\Program Files\Oracle\VirtualBox\VBoxManage.exe" modifyvm "r-ext" --nic2 intnet
& "C:\Program Files\Oracle\VirtualBox\VBoxManage.exe" modifyvm "r-ext" --intnet2 "n-dmz"
& "C:\Program Files\Oracle\VirtualBox\VBoxManage.exe" modifyvm "r-ext" --nictype2 82540EM
& "C:\Program Files\Oracle\VirtualBox\VBoxManage.exe" modifyvm "r-ext" --cableconnected2 on
& "C:\Program Files\Oracle\VirtualBox\VBoxManage.exe" modifyvm "r-ext" --nicpromisc2 allow-all
#interface 3
& "C:\Program Files\Oracle\VirtualBox\VBoxManage.exe" modifyvm "r-ext" --nic3 bridged
& "C:\Program Files\Oracle\VirtualBox\VBoxManage.exe" modifyvm "r-ext" --nictype3 82540EM
& "C:\Program Files\Oracle\VirtualBox\VBoxManage.exe" modifyvm "r-ext" --cableconnected3 on
& "C:\Program Files\Oracle\VirtualBox\VBoxManage.exe" modifyvm "r-ext" --nicpromisc3 allow-all
#interface 4
& "C:\Program Files\Oracle\VirtualBox\VBoxManage.exe" modifyvm "r-ext" --nic4 intnet
& "C:\Program Files\Oracle\VirtualBox\VBoxManage.exe" modifyvm "r-ext" --intnet4 "n-linkv"
& "C:\Program Files\Oracle\VirtualBox\VBoxManage.exe" modifyvm "r-ext" --nictype4 82540EM
& "C:\Program Files\Oracle\VirtualBox\VBoxManage.exe" modifyvm "r-ext" --cableconnected4 on
& "C:\Program Files\Oracle\VirtualBox\VBoxManage.exe" modifyvm "r-ext" --nicpromisc4 allow-all
#interface 5
& "C:\Program Files\Oracle\VirtualBox\VBoxManage.exe" modifyvm "r-ext" --nic5 intnet
& "C:\Program Files\Oracle\VirtualBox\VBoxManage.exe" modifyvm "r-ext" --intnet5 "n-link"
& "C:\Program Files\Oracle\VirtualBox\VBoxManage.exe" modifyvm "r-ext" --nictype5 82540EM
& "C:\Program Files\Oracle\VirtualBox\VBoxManage.exe" modifyvm "r-ext" --cableconnected5 on
& "C:\Program Files\Oracle\VirtualBox\VBoxManage.exe" modifyvm "r-ext" --nicpromisc5 allow-all
create_vm $args[0]
create_if $args[0] "int" 1 "n-adm"
create_if $args[0] "int" 2 "n-dmz"
create_if $args[0] "bridge" 3 "null"
create_if $args[0] "int" 4 "n-linkv"
create_if $args[0] "int" 5 "n-link"
}
elseif (((((((($args[0] -eq "s-elk") `
-or ($args[0] -eq "s-mon") `
-or ($args[0] -eq "s-backup") `
-or ($args[0] -eq "s-appli") `
-or ($args[0] -eq "s-infra") `
-or ($args[0] -eq "s-proxy") `
-or ($args[0] -eq "s-itil") `
-or ($args[0] -eq "s-nxc") `
))))))) {
create_vm $args[0]
create_if $args[0] "int" 1 "n-adm"
create_if $args[0] "int" 2 "n-infra"
}
elseif ($args[0] -eq "s-fog") {
create_vm $args[0]
create_if $args[0] "int" 1 "n-adm"
create_if $args[0] "int" 2 "n-infra"
create_if $args[0] "int" 3 "n-user"
}
elseif ($args[0] -eq "s-agence") {
create_vm $args[0]
create_if $args[0] "int" 1 "n-adm"
create_if $args[0] "int" 2 "n-agence"
}
elseif ($args[0] -eq "s-lb") {
create_vm $args[0]
create_if $args[0] "int" 1 "n-adm"
create_if $args[0] "int" 2 "n-dmz"
create_if $args[0] "int" 3 "n-dmz-lb"
}
elseif (($args[0] -eq "s-lb-db") -or ($args[0] -eq "s-nas")) {
create_vm $args[0]
create_if $args[0] "int" 1 "n-adm"
create_if $args[0] "int" 2 "n-dmz-db"
}
elseif ((($args[0] -eq "s-lb-web1") -or ($args[0] -eq "s-lb-web2") -or ($args[0] -eq "s-lb-web3"))) {
create_vm $args[0]
create_if $args[0] "int" 1 "n-adm"
create_if $args[0] "int" 2 "n-dmz-lb"
create_if $args[0] "int" 3 "n-dmz-db"
}
elseif (($args[0] -eq "s-dns-ext") -or ($args[0] -eq "s-web-ext")) {
create_vm $args[0]
create_if $args[0] "int" 1 "n-adm"
create_if $args[0] "int" 2 "n-infra"
create_if $args[0] "int" 3 "n-user"
}
elseif ($args[0] -eq "r-vp1") {
create_vm $args[0]
create_if $args[0] "int" 1 "n-adm"
create_if $args[0] "int" 2 "n-linkv"
create_if $args[0] "bridge" 3 "null"
}
elseif ($args[0] -eq "r-vp2") {
create_vm $args[0]
create_if $args[0] "int" 1 "n-adm"
create_if $args[0] "int" 2 "n-agence"
create_if $args[0] "bridge" 3 "null"
}
else {
usage
}

5
scripts/r-vp1-post.sh Normal file
View File

@ -0,0 +1,5 @@
#!/bin/bash
#stoper le fw
systemctl stop ferm
#ouverture du service web pour copie distante
cd /root/confwg/ && python3 -m http.server 8000 &

7
scripts/r-vp2-post.sh Normal file
View File

@ -0,0 +1,7 @@
#!/bin/bash
#recuperation du fichier de config
wget http://r-vp1.gsb.adm:8000/wg0-b.qconf
#renomage fichier et mv
mv ./wg0-b.conf /etc/wireguard/wg0.conf
#activation interface wg0
systemctl enable wg-quick@wg0 && systemctl start wg-quick@wg0