algo/docs/deploy-from-ansible.md
Jack Ivanov 38d8a6d0e2 Deprecate IKEv2 for Windows (#1521)
* Windows to WireGuard

* Add note about WireGuard

* change wireguard faq

* Clarify Windows instructions

* Correct Wireguard description

* Update README.md
2019-07-31 11:28:33 -04:00

8.8 KiB

Deployment from Ansible

Before you begin, make sure you have installed all the dependencies necessary for your operating system as described in the README.

You can deploy Algo non-interactively by running the Ansible playbooks directly with ansible-playbook.

ansible-playbook accepts variables via the -e or --extra-vars option. You can pass variables as space separated key=value pairs. Algo requires certain variables that are listed below. You can also use the --skip-tags option to skip certain parts of the install, such as iptables (overwrite iptables rules), ipsec (install strongSwan), wireguard (install Wireguard). We don't recommend using the -t option as it will only include the tagged portions of the deployment, and skip certain necessary roles (such as common).

Here is a full example for DigitalOcean:

ansible-playbook main.yml -e "provider=digitalocean
                                server_name=algo
                                ondemand_cellular=false
                                ondemand_wifi=false
                                dns_adblocking=true
                                ssh_tunneling=true
                                store_pki=true
                                region=ams3
                                do_token=token"

See below for more information about variables and roles.

Variables

  • provider - (Required) The provider to use. See possible values below
  • server_name - (Required) Server name. Default: algo
  • ondemand_cellular (Optional) VPN On Demand when connected to cellular networks with IPsec. Default: false
  • ondemand_wifi - (Optional. See ondemand_wifi_exclude) VPN On Demand when connected to WiFi networks with IPsec. Default: false
  • ondemand_wifi_exclude (Required if ondemand_wifi set) - WiFi networks to exclude from using the VPN. Comma-separated values
  • dns_adblocking - (Optional) Enables dnscrypt-proxy adblocking. Default: false
  • ssh_tunneling - (Optional) Enable SSH tunneling for each user. Default: false
  • store_cakey - (Optional) Whether or not keep the CA key (required to add users in the future, but less secure). Default: false

If any of the above variables are unspecified, ansible will ask the user to input them.

Ansible roles

Cloud roles can be activated by specifying an extra variable provider.

Cloud roles:

  • role: cloud-digitalocean, provider: digitalocean
  • role: cloud-ec2, provider: ec2
  • role: cloud-vultr, provider: vultr
  • role: cloud-gce, provider: gce
  • role: cloud-azure, provider: azure
  • role: cloud-scaleway, provider: scaleway
  • role: cloud-openstack, provider: openstack

Server roles:

  • role: strongswan
    • Installs strongSwan
    • Enables AppArmor, limits CPU and memory access, and drops user privileges
    • Builds a Certificate Authority (CA) with easy-rsa-ipsec and creates one client certificate per user
    • Bundles the appropriate certificates into Apple mobileconfig profiles for each user
  • role: dns_adblocking
    • Installs DNS encryption through dnscrypt-proxy with blacklists to be updated daily from adblock_lists in config.cfg - note this will occur even if dns_encryption in config.cfg is set to false
    • Constrains dnscrypt-proxy with AppArmor and cgroups CPU and memory limitations
  • role: ssh_tunneling
    • Adds a restricted algo group with no shell access and limited SSH forwarding options
    • Creates one limited, local account and an SSH public key for each user
  • role: wireguard
    • Installs a Wireguard server, with a startup script, and automatic checks for upgrades
    • Creates wireguard.conf files for Linux clients as well as QR codes for Apple/Android clients

Note: The strongswan role generates Apple profiles with On-Demand Wifi and Cellular if you pass the following variables:

  • ondemand_wifi: true
  • ondemand_wifi_exclude: HomeNet,OfficeWifi
  • ondemand_cellular: true

Local Installation

  • role: local, provider: local

This role is intended to be run for local install onto an Ubuntu server, or onto an unsupported cloud provider's Ubuntu instance. Required variables:

  • server - IP address of your server (or "localhost" if deploying to the local machine)
  • endpoint - public IP address of the server you're installing on
  • ssh_user - name of the SSH user you will use to install on the machine (passwordless login required). If server=localhost, this isn't required.
  • ca_password - Password for the private CA key

Note that by default, the iptables rules on your existing server will be overwritten. If you don't want to overwrite the iptables rules, you can use the --skip-tags iptables flag.

Digital Ocean

Required variables:

  • do_token
  • region

Possible options can be gathered calling to https://api.digitalocean.com/v2/regions

Amazon EC2

Required variables:

  • aws_access_key: AKIA...
  • aws_secret_key
  • region: e.g. us-east-1

Possible options can be gathered via cli aws ec2 describe-regions

Additional variables:

  • encrypted - Encrypted EBS boot volume. Boolean (Default: false)

Minimum required IAM permissions for deployment:

{
    "Version": "2012-10-17",
    "Statement": [
        {
            "Sid": "PreDeployment",
            "Effect": "Allow",
            "Action": [
                "ec2:DescribeImages",
                "ec2:DescribeKeyPairs",
                "ec2:DescribeRegions",
                "ec2:ImportKeyPair",
                "ec2:CopyImage"
            ],
            "Resource": [
                "*"
            ]
        },
        {
            "Sid": "DeployCloudFormationStack",
            "Effect": "Allow",
            "Action": [
                "cloudformation:CreateStack",
                "cloudformation:UpdateStack",
                "cloudformation:DescribeStacks",
                "cloudformation:DescribeStackEvents",
                "cloudformation:ListStackResources"
            ],
            "Resource": [
                "*"
            ]
        },
        {
            "Sid": "CloudFormationEC2Access",
            "Effect": "Allow",
            "Action": [
                "ec2:CreateInternetGateway",
                "ec2:DescribeVpcs",
                "ec2:CreateVpc",
                "ec2:DescribeInternetGateways",
                "ec2:ModifyVpcAttribute",
                "ec2:createTags",
                "ec2:CreateSubnet",
                "ec2:Associate*",
                "ec2:CreateRouteTable",
                "ec2:AttachInternetGateway",
                "ec2:DescribeRouteTables",
                "ec2:DescribeSubnets",
                "ec2:ModifySubnetAttribute",
                "ec2:CreateRoute",
                "ec2:CreateSecurityGroup",
                "ec2:DescribeSecurityGroups",
                "ec2:AuthorizeSecurityGroupIngress",
                "ec2:RunInstances",
                "ec2:DescribeInstances",
                "ec2:AllocateAddress",
                "ec2:DescribeAddresses"
            ],
            "Resource": [
                "*"
            ]
        }
    ]
}

Google Compute Engine

Required variables:

Vultr

Required variables:

Azure

Required variables:

  • azure_secret
  • azure_tenant
  • azure_client_id
  • azure_subscription_id
  • region

Lightsail

Required variables:

  • aws_access_key: AKIA...
  • aws_secret_key
  • region: e.g. us-east-1

Possible options can be gathered via cli aws lightsail get-regions

Minimum required IAM permissions for deployment:

{
    "Version": "2012-10-17",
    "Statement": [
        {
            "Sid": "LightsailDeployment",
            "Effect": "Allow",
            "Action": [
                "lightsail:GetRegions",
                "lightsail:GetInstance",
                "lightsail:CreateInstances",
                "lightsail:OpenInstancePublicPorts"
            ],
            "Resource": [
                "*"
            ]
        }
    ]
}

Scaleway

Required variables:

OpenStack

You need to source the rc file prior to run Algo. Download it from the OpenStack dashboard->Compute->API Access and source it in the shell (eg: source /tmp/dhc-openrc.sh)

Update users

Playbook:

users.yml

Required variables:

  • server - IP or hostname to access the server via SSH
  • ca_password - Password to access the CA key

Tags required:

  • update-users