Commit graph

37 commits

Author SHA1 Message Date
379f1a2782 Enable both TURN and TURNS protocols for coturn, add Ansible tags
- Enable both TURN (port 3478) and TURNS (port 5349) for maximum client compatibility
- Add recommended coturn settings: stale-nonce, unlimited quotas
- Remove deprecated 'warn' parameter from shell task
- Add comprehensive tags to all roles in site.yml for selective deployment
- Remove redundant update playbooks (replaced by tags functionality)
- Update README with detailed tags documentation and common workflows
- Update coturn documentation with correct Nextcloud configuration
- Add coturn_static_secret and wireguard server keys to vault example
2025-12-12 19:15:10 +03:00
4b3e939891 Fix Coturn TURNS configuration and add blog deployment automation
Coturn improvements:
- Enable TURNS-only mode (port 5349) for encrypted signaling
- Disable unencrypted TURN (port 3478) for better security
- Fix certificate permission issues for turnserver user
- Remove incompatible config options (no-loopback-peers, lt-cred-mech)
- Add automatic private key permission fixing on deploy
- Configure firewall rules for TURNS port 5349

WireGuard improvements:
- Add server key persistence via vault
- Server keys now stored in vault (wireguard_server_private_key/public_key)
- Keys persist across server rebuilds
- Fallback to key generation if vault keys not defined

Blog deployment automation:
- Add blog_deploy role for automated deployment user setup
- Creates blogdeploy user with SSH key pair
- Sets up /var/www/blog directory structure
- Configures authorized_keys for GitHub Actions deployment
- Provides instructions for adding SSH key to GitHub secrets

Configuration updates:
- Comment out TURN port 3478 (using TURNS-only)
- Add TURNS port 5349 to external ports
- Update vault with WireGuard server keys
2025-12-12 18:42:49 +03:00
e38a231159 Add Coturn TURN/STUN server and improve infrastructure
Major changes:
- Add Coturn role for Nextcloud Talk WebRTC support
  - Automatic SSL/TLS via Let's Encrypt
  - DPI-resistant configuration with static auth
  - Firewall rules for TURN (3478) and relay ports (49152-49252)
- Optimize nginx WebSocket support with conditional Connection header
- Change Forgejo domain from git.okhsunrog.dev to fgj.okhsunrog.dev
- Fix certbot role to properly handle new domains on existing infrastructure
- Update all Ansible variables to use ansible_facts syntax (Ansible 2.24 compatibility)
- Add network role support for ports with both TCP and UDP
- Remove unused snake/serpentina service configuration
- Add comprehensive documentation in docs/ directory

Bug fixes:
- Certbot now checks each domain individually instead of skipping all if any exist
- Create ssl-cert group before adding turnserver user to it
2025-12-12 16:17:58 +03:00
689fec46e2 added readme 2025-09-14 17:53:44 +03:00
d3cdfc4a6f Add AmneziaWG support with DPI obfuscation
- Add new AmneziaWG role with Ubuntu 24.04 DKMS support
- Implement clean installation method for both Ubuntu 22.04/24.04
- Add obfuscation parameters for Deep Packet Inspection bypass
- Configure AmneziaWG subnet (10.65.65.0/24) and port (58888/udp)
- Update network role to include AmneziaWG in firewall rules
- Add user management playbook for AmneziaWG
- Update vault.yml.example with AmneziaWG peer configuration
- Document project architecture and commands in CLAUDE.md

🤖 Generated with [Claude Code](https://claude.ai/code)

Co-Authored-By: Claude <noreply@anthropic.com>
2025-09-14 17:31:02 +03:00
5e2dc3602b update creds 2025-08-19 16:32:35 +03:00
9d08782ae9 update vpn configuration 2025-08-06 18:37:57 +03:00
6a2d4b80b8 update 2025-05-27 17:02:12 +03:00
a7cbde4c3b update users 2024-12-23 18:02:43 +03:00
6b81872666 remove requirements.yml 2024-12-17 20:51:39 +03:00
63cb6e5725 add vault example 2024-12-17 20:49:51 +03:00
2edaa0b396 fixes 2024-12-16 14:46:42 +03:00
0518402fbf Merge pull request 'Use Ubuntu instead of docker, as it simpifies installation of speedtest and provides newer version of certbot' (#1) from ubuntu into main
Reviewed-on: https://git.okhsunrog.dev/okhsunrog/cloud-forge/pulls/1
2024-12-16 12:02:06 +03:00
23d9f4ab60 get rid of extra certbot installation 2024-12-16 11:38:18 +03:00
ff22b7f762 a version of the playbook for ubuntu 2024-12-16 00:22:04 +03:00
aa81862871 some more experiments with MTU, fix wg client config 2024-12-15 22:35:31 +03:00
221e22b50c new users added, new playbook for updating users + some last-minute fixes 2024-12-15 21:22:31 +03:00
e70b56d03a improve iptables, obusficate wg configs 2024-12-15 19:47:59 +03:00
8fc1c78cdb optional reboot, applied a fix to pid/socket paths 2024-12-15 14:56:13 +03:00
319453b3ec more fixes, nginx ssl configs + ocserv is working now! 2024-12-15 02:33:56 +03:00
5c44da93ea finally runs without errors 2024-12-15 01:38:19 +03:00
f704143695 fixed getting certs 2024-12-15 00:13:55 +03:00
0d501a3e69 fixed here and there 2024-12-14 23:36:29 +03:00
5029cba214 fixed wireguard! 2024-12-13 01:15:38 +03:00
d90a33c172 fix missing quotes 2024-12-12 21:39:17 +03:00
d103a86445 certbot rewrite 2024-12-11 02:09:27 +03:00
f5c05a05fc some fixes 2024-12-10 00:58:22 +03:00
34af0cb531 ocserv minor fixes 2024-12-09 17:37:51 +03:00
50a866ed47 added fail2ban to playbook 2024-12-09 08:38:02 +03:00
26bed3db9f finished nginx and fail2ban 2024-12-09 08:37:37 +03:00
1b25c608fc added nginx configs 2024-12-08 21:27:47 +03:00
f16c5d97a5 added haproxy and certbot, adding nginx 2024-12-08 19:37:09 +03:00
019a21358b added wireguard 2024-12-07 21:14:07 +03:00
858bf755cd added vault 2024-12-07 02:09:27 +03:00
f89becffce working ocserv for multiple instances, only vault setup is left 2024-12-07 02:01:22 +03:00
2dafffe8ad working ocserv for instance 2024-12-06 23:54:11 +03:00
b5d3cfdbf6 initial commit 2024-12-06 18:28:53 +03:00