-
Notifications
You must be signed in to change notification settings - Fork 0
/
Copy pathVagrantfile_unify
438 lines (317 loc) · 14.7 KB
/
Vagrantfile_unify
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379
380
381
382
383
384
385
386
387
388
389
390
391
392
393
394
395
396
397
398
399
400
401
402
403
404
405
406
407
408
409
410
411
412
413
414
415
416
417
418
419
420
421
422
423
424
425
426
427
428
429
430
431
432
433
434
435
436
437
438
# -*- mode: ruby -*-
# vi: set ft=ruby :
# Need Vagrant level variable
# 1. String identifying host interface for Vagrant to create bridge to
BRIDGE_INTERFACE = "Intel(R) Dual Band Wireless-AC 8260"
#BRIDGE_INTERFACE = "enp8s0f0"
# 2. Local non routable IPsec protected IP address - should be e.g. 192.0.0.0/8
LOCAL_IRISIP = "192.100.42.20"
# 3. Remote non routable IPsec protected IP address
REMOTE_IRISIP = "192.100.88.10"
# 4. Role expected from the VM brought up by the Vagrantfile
# Currently have: %all, %jumphost, %dnsmasq
#VAGRANT_ROLE = "dnsmasq"
VAGRANT_ROLE = "jumphost"
# 5. Minion ethernet broadcast domain address space
LOCAL_CIDR = "192.7.7.0/24"
# Need to generate:
# 1. /etc/hosts
# 2. strongswan connection file
#
# Need to configure:
# 1. VM external IP addresses
# 2. VM hostname
# 3. strongswan files (x509 certs, config, and connection)
# 4. VXLAN parameters
# 5.
#
#LOCALIP = "192.168.20.2"
LOCALIP = "192.7.7.10"
# All Vagrant configuration is done below. The "2" in Vagrant.configure
# configures the configuration version (we support older styles for
# backwards compatibility). Please don't change it unless you know what
# you're doing.
Vagrant.configure("2") do |config|
# The most common configuration options are documented and commented below.
# For a complete reference, please see the online documentation at
# https://docs.vagrantup.com.
# Every Vagrant development environment requires a box. You can search for
# boxes at https://vagrantcloud.com/search.
config.vm.box = "generic/centos7"
# Disable automatic box update checking. If you disable this, then
# boxes will only be checked for updates when the user runs
# `vagrant box outdated`. This is not recommended.
# config.vm.box_check_update = false
# Create a forwarded port mapping which allows access to a specific port
# within the machine from a port on the host machine. In the example below,
# accessing "localhost:8080" will access port 80 on the guest machine.
# NOTE: This will enable public access to the opened port
# config.vm.network "forwarded_port", guest: 80, host: 8080
# Create a forwarded port mapping which allows access to a specific port
# within the machine from a port on the host machine and only allow access
# via 127.0.0.1 to disable public access
# config.vm.network "forwarded_port", guest: 80, host: 8080, host_ip: "127.0.0.1"
# Create a private network, which allows host-only access to the machine
# using a specific IP.
# config.vm.network "private_network", ip: "192.7.7.100", virtualbox__intnet: "pxe test"
config.vm.network "public_network", bridge: "Intel(R) Ethernet Connection (2) I219-LM"
# config.vm.network "private_network", ip: LOCALIP, virtualbox__intnet: "pxe test 2"
config.vm.network "public_network", bridge: BRIDGE_INTERFACE
config.vm.network "private_network", ip: LOCAL_IRISIP, virtualbox__intnet: "irisnet"
# This is for the jumphost
config.vm.provider "virtualbox" do |vb|
vb.customize ["modifyvm", :id, "--nicpromisc1", "allow-all"]
vb.customize ["modifyvm", :id, "--nicpromisc2", "allow-all"]
vb.customize ["modifyvm", :id, "--nicpromisc3", "allow-all"]
end
# Create a public network, which generally matched to bridged network.
# Bridged networks make the machine appear as another physical device on
# your network.
# config.vm.network "public_network"
# Share an additional folder to the guest VM. The first argument is
# the path on the host to the actual folder. The second argument is
# the path on the guest to mount the folder. And the optional third
# argument is a set of non-required options.
# config.vm.synced_folder "../data", "/vagrant_data"
# Provider-specific configuration so you can fine-tune various
# backing providers for Vagrant. These expose provider-specific options.
# Example for VirtualBox:
#
# config.vm.provider "virtualbox" do |vb|
# # Display the VirtualBox GUI when booting the machine
# vb.gui = true
#
# # Customize the amount of memory on the VM:
# vb.memory = "1024"
# end
#
# View the documentation for the provider you are using for more
# information on available options.
# Enable provisioning with a shell script. Additional provisioners such as
# Puppet, Chef, Ansible, Salt, and Docker are also available. Please see the
# documentation for more information about their specific syntax and use.
# Hacker - this is for creating the jumphost we need to boostrap a private cloud
# Bring files from vagrant into VM
config.vm.synced_folder "./certbundle", "/vagrant_data"
# Run shell configuration commands for each VM
config.vm.provision "shell", inline: <<-SHELL, env:{"VAGRANT_ROLE" => VAGRANT_ROLE, "REMOTE_IRISIP"=>REMOTE_IRISIP, "LOCAL_IRISIP"=>LOCAL_IRISIP }
# config.vm.provision "shell", inline: <<-SHELL
# VAGRANT_ROLE imported from Vagrantfile
export VAGRANT_ROLE=$VAGRANT_ROLE
export LOCAL_IRISIP=$LOCAL_IRISIP
export REMOTE_IRISIP=$REMOTE_IRISIP
echo "ABC"
echo "Role is" $VAGRANT_ROLE
echo "LOCAL IRISIP is" $LOCAL_IRISIP
echo "REMOTE IRISIP is" $REMOTE_IRISIP
# State 0 - bind variables and select role varaible
# %All roles
# Need vars:
# Need variables bound for:
# Internal host interface to which virtualbox can bridge
# 1. External peer reachable hostname and IP address for IPsec
# 2. connection 'host-host' name(s) for IPsec connection file
# 3. VXLAN adpater name (minion port name)
# 4. OpenVSwitch bridge name
# 5. local interface (connected to external network) name for firewall rules
export LOCAL_INTERFACE="eth0"
# 6. x509 certificate file names
# 7.
# Stage 1 - run OS updates and package installations
# %All roles
yum -y update
yum -y install dnsmasq dnsmasq-utils tftp-server tftp syslinux-tftpboot ipxe-bootimgs git xz-devel genisoimage squid lighttpd php mod_fcgid lighttpd-fastcgi mod_fastcgi strongswan
cd /usr/local/src
wget https://rdoproject.org/repos/rdo-release.rpm
rpm -i rdo-release.rpm
yum -y install openvswitch libibverbs
# Stage 2 - set up iPXE on DNSmasq server
# %DNSmasq server role
cd /usr/local/src; git clone git://github.com/ipxe/ipxe.git; cd ipxe; git clone https://github.com/tjhacker/ipxehttpproxy.git
if [ $VAGRANT_ROLE == "dnsmasq" ]
then
# create patched ipxe with HTTP proxy support
cd /usr/local/src/ipxe
patch -p1 < ipxehttpproxy/proxypatch.p
cp ipxehttpproxy/embedded.pxe src/embedded.pxe
cd src
make EMBED=embedded.pxe -j 4
cp /usr/local/src/ipxe/src/bin/undionly.kpxe /var/lib/tftpboot
fi
# Stage 3 - set up network security rules
# %All roles
systemctl stop NetworkManager
firewall-cmd --new-zone=juno --permanent
firewall-cmd --reload
# firewall-cmd --zone=juno --change-interface=eth1
if [ $VAGRANT_ROLE == "jumphost" ]
then
firewall-cmd --add-interface=eth0 --zone=dmz --permanent
firewall-cmd --add-service=ssh --zone=dmz --permanent # to be able to ssh into the system from vagrant
fi
if [ $VAGRANT_ROLE == "dnsmasq" ]
then
firewall-cmd --add-interface=eth1 --zone=dmz --permanent
fi
# firewall-cmd --add-interface=$LOCAL_INTERFACE --zone=dmz --permanent
# firewall-cmd --runtime-to-permanent
firewall-cmd --zone=juno --add-service dhcp --permanent
firewall-cmd --zone=juno --add-service tftp --permanent
firewall-cmd --zone=juno --add-service dns --permanent
firewall-cmd --zone=juno --add-service squid --permanent
firewall-cmd --zone=juno --add-port 3130/udp --permanent
firewall-cmd --add-masquerade --permanent
### firewall-cmd --remove-service=ssh --zone=dmz --permanent
# firewall-cmd --zone=dmz --set-target=DROP --permanent # BLOCK ALL ICMP
firewall-cmd --reload
systemctl start NetworkManager
if [ $VAGRANT_ROLE == "jumphost" ]
then
# DNS=`fgrep -m 1 nameserver /etc/resolv.conf | sed 's/nameserver //'`
# sed -i "s/$DNS/$LOCALIP/" /etc/resolv.conf
# nmcli con mod "System eth0" +ipv4.dns 192.7.7.4
#### nmcli con mod "System eth0" ipv4.dns 192.7.7.4
nmcli con mod "System eth0" ipv4.dns 192.7.7.10
nmcli con mod "System eth0" ipv4.ignore-auto-dns yes
nmcli con up "System eth0"
nmcli general hostname apollo.load
fi
if [ $VAGRANT_ROLE == "jumphost" ]
then # jumphost was masking DNS that refers requests to main server
dnsmasq --interface=ovs-br1 --address=/juno.load/192.7.7.10 --server=192.7.7.4
fi
# % DNSMasq server
if [ $VAGRANT_ROLE == "dnsmasq" ]
then
# nmcli general hostname moon.localhost
DNS=`fgrep -m 1 nameserver /etc/resolv.conf | sed 's/nameserver //'`
sed -i "s/$DNS/192.7.7.4/" /etc/resolv.conf
echo "nameserver 192.7.7.4" >> /etc/resolv.conf
chattr +i /etc/resolv.conf # Lock the file to prevent changes.
dnsmasq --enable-tftp --tftp-root=/var/lib/tftpboot --interface=ovs-br1 --dhcp-range=192.7.7.30,192.7.7.35,255.255.255.0 --dhcp-boot=undionly.kpxe --address=/juno.load/192.7.7.4 --server=8.8.4.4 --dhcp-option=6,192.7.7.10
#### dnsmasq --enable-tftp --tftp-root=/var/lib/tftpboot --interface=ovs-br1 --dhcp-range=192.7.7.30,192.7.7.35,255.255.255.0 --dhcp-boot=undionly.kpxe --address=/zeus.load/192.7.7.4 --server=8.8.4.4 --dhcp-option=6,192.7.7.10
# Network routing rules and DNS
ip addr add 10.210.210.41/24 dev eth1
ip route delete default
ip route add default via 10.210.210.1 dev eth1
### echo "nameserver 8.8.4.4" >> /etc/resolv.conf
fi
# HTTP server setup
sed -i 's/server.use-ipv6 = "enable"/server.use-ipv6 = "disable"/' /etc/lighttpd/lighttpd.conf
# Add fastCGI conf to lighttpd
cat /usr/local/src/ipxe/ipxehttpproxy/fastcgi.conf_addition >> /etc/lighttpd/conf.d/fastcgi.conf
cp /usr/local/src/ipxe/ipxehttpproxy/foo.php /var/www/lighttpd/foo.php
mkdir /var/www/localhost
cp /etc/php.ini /var/www/localhost
sed -i "s:;cgi.fix_pathinfo:cgi.fix_pathinfo:" /var/www/localhost/php.ini
sed -i 's:#include "conf.d/fastcgi.conf:include "conf.d/fastcgi.conf:' /etc/lighttpd/modules.conf
systemctl enable lighttpd; systemctl start lighttpd
# SQUID cache setup
sed -i "s:\#cache_dir ufs /var/spool/squid 100 16 256:cache_dir ufs /var/spool/squid 100000 16 256:" /etc/squid/squid.conf
echo "maximum_object_size 40 GB" >> /etc/squid/squid.conf
echo "acl localnet src 192.7.0.0/16 # RFC1918 possible internal network" >> /etc/squid/squid.conf
echo "icp_port 3130" >> /etc/squid/squid.conf
echo "icp_access allow localnet" >> /etc/squid/squid.conf
if [ $VAGRANT_ROLE == "jumphost" ]
then
echo "cache_peer 192.7.7.4 parent 3128 3130 default" >> /etc/squid/squid.conf
fi
squid -z
sleep 5; systemctl enable squid; systemctl start squid
# Configure Kickstart file for remote booting
cp /usr/local/src/ipxe/ipxehttpproxy/ks.cfg /var/www/lighttpd/ks.cfg
# ipsec (strongswan)
# Certificate management
# %DNSmasq
if [ $VAGRANT_ROLE == "dnsmasq" ]
then
cp /usr/local/src/ipxe/ipxehttpproxy/Olympus/Olympus.ab.conf /etc/strongswan/swanctl/conf.d
cp /vagrant_data/hostMoonKey.key /etc/strongswan/swanctl/private
fi
# %jumphost
if [ $VAGRANT_ROLE == "jumphost" ]
then
cp /usr/local/src/ipxe/ipxehttpproxy/Juno/ab.conf /etc/strongswan/swanctl/conf.d/ab.conf
cp /vagrant_data/hostSunKey.key /etc/strongswan/swanctl/private
fi
# %all
cp /vagrant_data/CA.crt /etc/strongswan/swanctl/x509ca
cp /vagrant_data/host*Cert.crt /etc/strongswan/swanctl/x509
# Hostfile
if [ $VAGRANT_ROLE == "dnsmasq" ]
then
# %DNSmasq
cat /usr/local/src/ipxe/ipxehttpproxy/Olympus/hosts >> /etc/hosts
fi
if [ $VAGRANT_ROLE == "jumphost" ]
then
# %jumphost
cat /usr/local/src/ipxe/ipxehttpproxy/Juno/hosts >> /etc/hosts
fi
systemctl enable strongswan
systemctl start strongswan
# VXLAN setup
# %all
ip link add vxlan0 type vxlan id 21 dev eth2 dstport 8472
bridge fdb add 00:00:00:00:00:00 dst $REMOTE_IRISIP dev vxlan0 # dst is remote ip sec IP addr
ip link set up vxlan0
# openvswitch (IRIS)
# %all
systemctl enable openvswitch; systemctl start openvswitch
echo "export PATH=/usr/local/bin:/usr/share/openvswitch/scripts/:$PATH" >> /etc/bashrc
export PATH=/usr/local/bin:/usr/share/openvswitch/scripts/:$PATH
hash
ovs-ctl start
systemctl enable openvswitch; systemctl start openvswitch
ovs-vsctl add-br ovs-br1
if [ $VAGRANT_ROLE == "jumphost" ]
then
ovs-vsctl add-port ovs-br1 eth1
fi
if [ $VAGRANT_ROLE == "dnsmasq" ]
then
ovs-vsctl add-port ovs-br1 eth2
fi
ovs-vsctl add-port ovs-br1 vxlan0
if [ $VAGRANT_ROLE == "dnsmasq" ]
then
ifconfig ovs-br1 192.7.7.4/24 ## debugging
fi
if [ $VAGRANT_ROLE == "jumphost" ]
then
ifconfig ovs-br1 192.7.7.10/24 ## debugging
fi
# Firewall rules to allow DHCP and IPsec
# %all
firewall-cmd --zone=dmz --permanent --add-rich-rule='rule protocol value="esp" accept'
firewall-cmd --zone=dmz --permanent --add-rich-rule='rule protocol value="ah" accept'
firewall-cmd --zone=dmz --permanent --add-port=500/udp
firewall-cmd --zone=dmz --permanent --add-port=4500/udp
firewall-cmd --permanent --add-service="ipsec"
firewall-cmd --permanent --add-port=8472/udp # vxlan port
firewall-cmd --permanent --add-port=8472/udp --zone=dmz # vxlan port
firewall-cmd --permanent --add-service=dhcp # allow L2 DHCP request thru vxlan
firewall-cmd --permanent --add-service=tftp # allow L2 DHCP request thru vxlan
firewall-cmd --list-all --zone=dmz
firewall-cmd --add-interface=ovs-br1 --zone=juno --permanent
firewall-cmd --add-source=192.7.7.0/24 --zone=juno --permanent
firewall-cmd --reload
# Turn on strongswan connectivity
swanctl --load-all # Will wait from connection from outside.
swanctl -i -c host-host
# Intstall fail2ban for more protection against offensive
# yum -y install virt-manager libvirt-client fail2ban
# cp /etc/fail2ban/jail.conf /etc/fail2ban/jail.local
# systemctl enable fail2ban
#systemctl start fail2ban
# For physical hardware to prepare to run vagrant
# cd /usr/local/src
# yum -y install qt SDL qt-devel libXmu opus-devel libvpx-devel
# yum -y groupinstall "Virtualization Host"
# wget https://download.virtualbox.org/virtualbox/6.0.14/VirtualBox-6.0-6.0.14_133895_el7-1.x86_64.rpm
# rpm -i VirtualBox-6.0-6.0.14_133895_el7-1.x86_64.rpm
# wget https://releases.hashicorp.com/vagrant/2.2.6/vagrant_2.2.6_x86_64.rpm
# rpm -i vagrant_2.2.6_x86_64.rpm
# mkdir moon; cd moon
SHELL
end