File tree Expand file tree Collapse file tree 4 files changed +32
-14
lines changed Expand file tree Collapse file tree 4 files changed +32
-14
lines changed Original file line number Diff line number Diff line change @@ -8,12 +8,18 @@ Requirements
8
8
9
9
Currently you need to generate and deploy certificates before running this (see example)
10
10
11
+ Supported Nebula Version
12
+ ------------------------
13
+
14
+ Currently this role is tested against version ` 1.5.0 `
15
+
11
16
Role Variables
12
17
--------------
13
18
14
19
| Variable Name | Type | Purpose | Default | Required |
15
20
| ---| ---| ---| ---| ---|
16
- | ` nebula_version ` | String | Version to download | ` 1.3.0 ` | Yes |
21
+ | ` nebula_version ` | String | Version to download | ` 1.5.0 ` | Yes |
22
+ | ` nebula_force_install ` | Boolean | Force overwrite of the existing nebula binary | ` false ` | No |
17
23
| ` ca ` | String | Path to CA file | NA | Yes |
18
24
| ` cert ` | String | Path to Certificate | NA | Yes |
19
25
| ` key ` | String | Path to Certificate Key| NA | Yes |
Original file line number Diff line number Diff line change 1
1
---
2
2
# defaults file for .
3
- nebula_version : 1.3.0
3
+ nebula_version : 1.5.0
4
+
5
+ # force overwrite
6
+ nebula_force_install : false
4
7
5
8
# this will cause net.ipv4.ip_forward to be set to 1 to allow unsafe routes
6
9
enable_ip_forward : false
@@ -36,8 +39,8 @@ listen:
36
39
host : 0.0.0.0
37
40
port : 4242
38
41
39
- punchy : true
40
- punch_back : true
42
+ punchy : " true"
43
+ punch_back : " true"
41
44
42
45
outbound :
43
46
- port : any
Original file line number Diff line number Diff line change 3
3
when : enable_ip_forward
4
4
sysctl :
5
5
name : net.ipv4.ip_forward
6
- value : ' 1 '
6
+ value : " 1 "
7
7
state : present
8
8
notify :
9
9
- Restart_nebula
14
14
dest : /bin
15
15
remote_src : yes
16
16
mode : 0755
17
- creates : /bin/nebula
17
+ creates : " {{ ' /bin/nebula' if nebula_force_install == false else '' }} "
18
18
when : ansible_architecture == "x86_64"
19
19
20
20
- name : Download release from Github (arm64)
23
23
dest : /bin
24
24
remote_src : yes
25
25
mode : 0755
26
- creates : /bin/nebula
26
+ creates : " {{ ' /bin/nebula' if nebula_force_install == false else '' }} "
27
27
when : ansible_architecture == "armv64" or ansible_architecture == "aarch64"
28
28
29
29
- name : Download release from Github (arm7)
32
32
dest : /bin
33
33
remote_src : yes
34
34
mode : 0755
35
- creates : /bin/nebula
35
+ creates : " {{ ' /bin/nebula' if nebula_force_install == false else '' }} "
36
36
when : ansible_architecture == "armv7l"
37
37
38
38
- name : Set correct user and group on the nebula binary
39
39
ansible.builtin.file :
40
40
path : /bin/nebula
41
41
owner : root
42
42
group : root
43
- mode : ' 0750'
43
+ mode : " 0750"
44
44
45
45
- name : Create configuration directory
46
46
file :
47
47
path : /etc/nebula
48
48
state : directory
49
- mode : ' 0750'
49
+ mode : " 0750"
50
50
51
51
- name : Deploy configuration template
52
52
ansible.builtin.template :
53
53
src : templates/config.yaml.j2
54
54
dest : /etc/nebula/config.yaml
55
55
owner : root
56
56
group : root
57
- mode : ' 0600'
57
+ mode : " 0600"
58
58
register : nebula_config
59
59
notify :
60
60
- Restart_nebula
Original file line number Diff line number Diff line change @@ -38,15 +38,24 @@ listen:
38
38
{% if listen .read_buffer is defined %} read_buffer: {{ listen.read_buffer | default("10485760") }}{% endif %}
39
39
{% if listen .write_buffer is defined %} write_buffer: {{ listen.write_buffer | default("10485760") }}{% endif %}
40
40
41
- punchy: {{ punchy }}
42
- punch_back: {{ punch_back }}
41
+ punchy:
42
+ # Continues to punch inbound/outbound at a regular interval to avoid expiration of firewall nat mappings
43
+ punch: {{ punchy }}
44
+
45
+ # respond means that a node you are trying to reach will connect back out to you if your hole punching fails
46
+ # this is extremely useful if one node is behind a difficult nat, such as a symmetric NAT
47
+ # Default is false
48
+ respond: {{ punch_back | default("false") }}
49
+
50
+ # delays a punch response for misbehaving NATs, default is 1 second, respond must be true to take effect
51
+ #delay: 1s
43
52
44
53
{% if cipher is defined %}
45
54
cipher: {{ cipher }}
46
55
{% endif %}
47
56
48
57
{% if local_range is defined %}
49
- local_range : "{{ local_range }}"
58
+ preferred_ranges : "{{ local_range }}"
50
59
{% endif %}
51
60
52
61
{% if sshd is defined %}
You can’t perform that action at this time.
0 commit comments