mirror of
https://github.com/trailofbits/algo.git
synced 2025-06-07 15:43:54 +02:00
Memory limits #63
This commit is contained in:
parent
c51fe5dac0
commit
09c39627d9
5 changed files with 23 additions and 8 deletions
|
@ -7,12 +7,16 @@ easyrsa_cert_expire: 3650
|
||||||
# If True re-init all existing certificates. (True or False)
|
# If True re-init all existing certificates. (True or False)
|
||||||
easyrsa_reinit_existent: False
|
easyrsa_reinit_existent: False
|
||||||
|
|
||||||
|
# Strongswan cgroup limitations
|
||||||
|
ipsec_memory_limit: 67108864
|
||||||
|
|
||||||
vpn_network: 10.19.48.0/24
|
vpn_network: 10.19.48.0/24
|
||||||
vpn_network_ipv6: 'fd9d:bc11:4020::/48'
|
vpn_network_ipv6: 'fd9d:bc11:4020::/48'
|
||||||
# https://www.sixxs.net/tools/whois/?fd9d:bc11:4020::/48
|
# https://www.sixxs.net/tools/whois/?fd9d:bc11:4020::/48
|
||||||
server_name: "{{ ansible_ssh_host }}"
|
server_name: "{{ ansible_ssh_host }}"
|
||||||
IP_subject_alt_name: "{{ ansible_ssh_host }}"
|
IP_subject_alt_name: "{{ ansible_ssh_host }}"
|
||||||
|
|
||||||
|
|
||||||
# Enable this variable if you want to use a local DNS resolver to block ads while surfing. (True or False)
|
# Enable this variable if you want to use a local DNS resolver to block ads while surfing. (True or False)
|
||||||
service_dns: True
|
service_dns: True
|
||||||
|
|
||||||
|
|
|
@ -53,6 +53,7 @@
|
||||||
- sendmail
|
- sendmail
|
||||||
- unattended-upgrades
|
- unattended-upgrades
|
||||||
- iptables-persistent
|
- iptables-persistent
|
||||||
|
- cgroup-tools
|
||||||
|
|
||||||
- name: Configure unattended-upgrades
|
- name: Configure unattended-upgrades
|
||||||
template: src=50unattended-upgrades.j2 dest=/etc/apt/apt.conf.d/50unattended-upgrades owner=root group=root mode=0644
|
template: src=50unattended-upgrades.j2 dest=/etc/apt/apt.conf.d/50unattended-upgrades owner=root group=root mode=0644
|
||||||
|
|
|
@ -1,5 +1,5 @@
|
||||||
- name: restart strongswan
|
- name: restart strongswan
|
||||||
service: name=strongswan state=restarted
|
systemd: name=strongswan state=restarted daemon_reload=yes
|
||||||
|
|
||||||
- name: restart apparmor
|
- name: restart apparmor
|
||||||
service: name=apparmor state=restarted
|
service: name=apparmor state=restarted
|
||||||
|
|
|
@ -26,6 +26,14 @@
|
||||||
- name: Ensure that the strongswan user exist
|
- name: Ensure that the strongswan user exist
|
||||||
user: name=strongswan group=strongswan state=present
|
user: name=strongswan group=strongswan state=present
|
||||||
|
|
||||||
|
- name: Ensure that the strongswan service directory exist
|
||||||
|
file: path=/etc/systemd/system/strongswan.service.d/ state=directory mode=0755 owner=root group=root
|
||||||
|
|
||||||
|
- name: Setup the cgroup limitations for the ipsec daemon
|
||||||
|
template: src=100-CustomLimitations.conf.j2 dest=/etc/systemd/system/strongswan.service.d/100-CustomLimitations.conf
|
||||||
|
notify:
|
||||||
|
- restart strongswan
|
||||||
|
|
||||||
- name: Setup the strongswan.conf file from our template
|
- name: Setup the strongswan.conf file from our template
|
||||||
template: src=strongswan.conf.j2 dest=/etc/strongswan.conf owner=root group=root mode=0644
|
template: src=strongswan.conf.j2 dest=/etc/strongswan.conf owner=root group=root mode=0644
|
||||||
notify:
|
notify:
|
||||||
|
|
2
roles/vpn/templates/100-CustomLimitations.conf.j2
Normal file
2
roles/vpn/templates/100-CustomLimitations.conf.j2
Normal file
|
@ -0,0 +1,2 @@
|
||||||
|
[Service]
|
||||||
|
MemoryLimit={{ ipsec_memory_limit }}
|
Loading…
Add table
Reference in a new issue