diff --git a/.gitlab-ci.yml b/.gitlab-ci.yml index 2cf937592d054c8bfc4bc46e448cdea7d629fe9b..b9f173a37f16958daf4ed403894466b856137c71 100644 --- a/.gitlab-ci.yml +++ b/.gitlab-ci.yml @@ -23,12 +23,19 @@ variables: --roles-path=config/roles --num-hosts=3 --additional-host-group=openvpn=host3 + --additional-config ${TEST_DIR}/group_vars/all/openvpn_config.yml + --additional-config ${TEST_DIR}/group_vars/all/custom_config.yml + --additional-config ${TEST_DIR}/group_vars/all/gateway_locations.yml + --additional-config ${TEST_DIR}/group_vars/all/provider_config.yml -e ansible_cfg.defaults.strategy=mitogen_linear + -e ansible_cfg.defaults.action_plugins=../float/plugins/action:../plugins/action + -e inventory.hosts.host3.location=Seattle -e libvirt.remote_host=${VMINE_SSH#*@} -e libvirt.remote_user=${VMINE_SSH%@*} ${APT_PROXY:+-e config.apt_proxy=${APT_PROXY}} $CREATE_ENV_VARS $BUILD_DIR - - cp -v ${TEST_DIR}/group_vars/all/*.yml ${BUILD_DIR}/group_vars/all/ + - cp -v ${TEST_DIR}/site.yml ${BUILD_DIR} + - echo "$(awk '!/- backend/ || ++ctr != 2' ${BUILD_DIR}/hosts.yml)" > ${BUILD_DIR}/hosts.yml - with-ssh-key ./float/scripts/floatup.py --url $VMINE_URL --ssh $VMINE_SSH --inventory $BUILD_DIR/hosts.yml --ram 3072 --image ${VM_IMAGE:-bullseye} up - (cd ${BUILD_DIR} && with-ssh-key ../float/float run ../playbooks/init-credentials.yml) - with-ssh-key ./float/test-driver init --no-vagrant $BUILD_DIR diff --git a/config/roles/openvpn/templates/50openvpn.firewall.j2 b/config/roles/openvpn/templates/50openvpn.firewall.j2 index 4e66c92efffb37e95367aa69491d494450f07eba..0801db03fb19a369d8a6ac32f36c91b667dfea9a 100644 --- a/config/roles/openvpn/templates/50openvpn.firewall.j2 +++ b/config/roles/openvpn/templates/50openvpn.firewall.j2 @@ -2,7 +2,7 @@ add_rule4 -A user-input -p tcp -m tcp -d {{ ips | ansible.netcommon.ipv4 | first }} --dport 80 -j ACCEPT add_rule4 -A user-input -p udp -m udp -d {{ ips | ansible.netcommon.ipv4 | first }} --dport 80 -j ACCEPT -{% if openvpn_tcp_network6 is defined and openvpn_tcp_network6|length -%} +{% if openvpn_tcp_network6 is defined and openvpn_tcp_network6|d('')|length > 0 -%} # Allow incoming connections to ipv6 port 80 for both udp and tcp add_rule6 -A user-input -p tcp -m tcp -d {{ ips | ansible.netcommon.ipv6 | first }} --dport 80 -j ACCEPT add_rule6 -A user-input -p udp -m udp -d {{ ips | ansible.netcommon.ipv6 | first }} --dport 80 -j ACCEPT @@ -17,7 +17,7 @@ add_rule4 -A FORWARD -s {{ openvpn_udp_network | ipaddr('network/prefix') }} -o # allow re/established udp *inbound* to vpn hosts add_rule4 -A FORWARD -d {{ openvpn_udp_network | ipaddr('network/prefix') }} -m state --state RELATED,ESTABLISHED -j ACCEPT -{% if openvpn_tcp_network6 is defined and openvpn_tcp_network6|length -%} +{% if openvpn_tcp_network6 is defined and openvpn_tcp_network6|d('')|length > 0 -%} # let ipv6 tcp vpn hosts reach the internet add_rule6 -A FORWARD -i tun0 -o {{ ansible_default_ipv4.interface }} -s {{ openvpn_tcp_network6 }} -m state --state NEW -j ACCEPT # let ipv6 udp vpn hosts reach the internet @@ -34,7 +34,7 @@ add_rule6 -A FORWARD -i {{ ansible_default_ipv4.interface }} -o tun1 -d {{ openv add_rule4 -A FORWARD -i tun0 -p tcp -o tun0 -j DROP # deny v4 udp client-to-client communication add_rule4 -A FORWARD -i tun1 -p udp -o tun0 -j DROP -{% if openvpn_tcp_network6 is defined and openvpn_tcp_network6|length -%} +{% if openvpn_tcp_network6 is defined and openvpn_tcp_network6|d('')|length > 0 -%} # deny v6 tcp client-to-client communication add_rule6 -A FORWARD -i tun0 -p tcp -o tun0 -j DROP # deny v6 udp client-to-client communication diff --git a/config/roles/openvpn/templates/50openvpn_nat.firewall.j2 b/config/roles/openvpn/templates/50openvpn_nat.firewall.j2 index add772606eab011b880b16295e69178b24ae01bc..3eb4673690452b9fc985431eac66b4796c0a5afe 100644 --- a/config/roles/openvpn/templates/50openvpn_nat.firewall.j2 +++ b/config/roles/openvpn/templates/50openvpn_nat.firewall.j2 @@ -1,6 +1,6 @@ # Set egress IP -add_rule4 -A POSTROUTING -s {{ openvpn_tcp_network | ipaddr('network/prefix') }} -o {{ ansible_default_ipv4.interface }} -j SNAT --to-source {{ egress_ip }} -add_rule4 -A POSTROUTING -s {{ openvpn_udp_network | ipaddr('network/prefix') }} -o {{ ansible_default_ipv4.interface }} -j SNAT --to-source {{ egress_ip }} +add_rule4 -A POSTROUTING -s {{ openvpn_tcp_network | ipaddr('network/prefix') }} -o {{ ansible_default_ipv4.interface }} -j SNAT --to-source {{ egress_ip | default(ips | ansible.netcommon.ipv4 | first) }} +add_rule4 -A POSTROUTING -s {{ openvpn_udp_network | ipaddr('network/prefix') }} -o {{ ansible_default_ipv4.interface }} -j SNAT --to-source {{ egress_ip | default(ips | ansible.netcommon.ipv4 | first) }} # Accept connections on ipv4 port 1194, redirecting them to openvpn add_rule4 -A PREROUTING -p tcp -d {{ ips | ansible.netcommon.ipv4 | first }} --dport 1194 -j DNAT --to-destination {{ ips | ansible.netcommon.ipv4 | first }}:80 add_rule4 -A PREROUTING -p udp -d {{ ips | ansible.netcommon.ipv4 | first }} --dport 1194 -j DNAT --to-destination {{ ips | ansible.netcommon.ipv4 | first }}:80 diff --git a/config/roles/vpnweb/tasks/main.yml b/config/roles/vpnweb/tasks/main.yml index 1fc9e33a5d1ae349c1d39e0ad71e6adf25c04000..2ff0286069a1e7a958054e3536a2b301f9fc3ff1 100644 --- a/config/roles/vpnweb/tasks/main.yml +++ b/config/roles/vpnweb/tasks/main.yml @@ -47,4 +47,4 @@ - "restart docker-vpnweb-vpnweb" - import_tasks: "sip.yml" - when: vpnweb_auth == "sip2" + when: vpnweb_auth | default('anon') == "sip2" diff --git a/config/services.openvpn.yml b/config/services.openvpn.yml index a727233a5a48b3b15373615147ac47ac9fbca1a5..e8de057a0ecf53940a7e08c83e8404efdca388cd 100644 --- a/config/services.openvpn.yml +++ b/config/services.openvpn.yml @@ -14,7 +14,8 @@ menshen: volumes: - /var/lib/GeoIP: /var/lib/GeoIP/ env: - MENSHEN_API: "api.{{ domain_public[0] }}" + MENSHEN_API: "{{ menshen_api | default('api.{{ domain_public[0] }}') }}" + INSECURE_API: "{{ testing | lower }}" public_endpoints: - name: menshen port: 9001 diff --git a/test/test-full/group_vars/all/custom_config.yml b/test/test-full/group_vars/all/custom_config.yml index b13b31f6e0e1b6b06ac81e04c4891bfbe83d9770..6d938215fa64945a1ad664c7a92daee763d31257 100644 --- a/test/test-full/group_vars/all/custom_config.yml +++ b/test/test-full/group_vars/all/custom_config.yml @@ -2,4 +2,6 @@ float_limit_bind_to_known_interfaces: true geoip_account_id: "{{ lookup('env', 'GEOIP_ACCOUNT_ID') }}" geoip_license_key: "{{ lookup('env', 'GEOIP_LICENSE_KEY') }}" - +# for testing only, because it is using http, it requires INSECURE_API env +# passed to menshen init +menshen_api: 'http://host2.vpnweb.float.hexacab.org:8000' diff --git a/test/test-full/group_vars/all/openvpn_config.yml b/test/test-full/group_vars/all/openvpn_config.yml index fc2b08dfef3b5632222826cb9a81aef1c5105367..f182aaabefd8f5fb3263e23a39b90f52ebf7021d 100644 --- a/test/test-full/group_vars/all/openvpn_config.yml +++ b/test/test-full/group_vars/all/openvpn_config.yml @@ -16,5 +16,4 @@ openvpn_config: openvpn_tcp_network: "10.41.0.0/21" openvpn_udp_network: "10.42.0.0/21" -openvpn_tcp_network6: "2001:db8:123::/64" diff --git a/test/test-full/site.yml b/test/test-full/site.yml index ad01eae5d44cc2a32a31a7638c92a616b9e2f88a..13e6bcbb86aa9720f38f691058f247cc1c074915 100644 --- a/test/test-full/site.yml +++ b/test/test-full/site.yml @@ -1,2 +1,15 @@ --- -- import_playbook: "../../float/playbooks/all.yml" +- import_playbook: "../float/playbooks/all.yml" + +- hosts: openvpn + roles: + - kresd + - openvpn + +- hosts: vpnweb + roles: + - vpnweb + - menshen + +- hosts: frontend + roles: [vpnweb-frontend]