Skip to content

Commit

Permalink
update nhnr.io links
Browse files Browse the repository at this point in the history
  • Loading branch information
leon3s committed Dec 22, 2023
1 parent d1e9616 commit 0c2021a
Show file tree
Hide file tree
Showing 2 changed files with 46 additions and 46 deletions.
2 changes: 1 addition & 1 deletion docs/guides/nanocl/advanced-usage/secret_tls.md
Original file line number Diff line number Diff line change
Expand Up @@ -112,7 +112,7 @@ To do so we crafted a generic `Statefile` for you that can handle the job and cr
The secret will be named as follow: `cert.{domain_name}`.<br/>

```sh
nanocl state apply -s nhnr.io/sys/certbot.yml -f -- --email [email protected] --domain deploy-example.com
nanocl state apply -s nhnr.io/v0.12/sys/certbot.yml -f -- --email [email protected] --domain deploy-example.com
```

After the command finished Ssl will be enabled already but you need to update your `ProxyRule`.<br/>
Expand Down
90 changes: 45 additions & 45 deletions docs/guides/nanocl/advanced-usage/vpn.md
Original file line number Diff line number Diff line change
Expand Up @@ -20,7 +20,7 @@ nanocl state apply -s nhnr.io/sys/vpn.yml
If you want to tweak it more than what is already possible from the `Statefile Args`, you can download it and customize it to fit your needs:

```sh
wget https://nhnr.io/sys/vpn.yml
wget https://nhnr.io/v0.12/sys/vpn.yml
```

Here is the content of the VPN `Statefile`:
Expand All @@ -29,56 +29,56 @@ Here is the content of the VPN `Statefile`:
ApiVersion: v0.12

Args:
- Name: namespace
Kind: String
- Name: public-ip
Kind: String
- Name: dns
Kind: String
Default: "1.1.1.1"
- Name: namespace
Kind: String
- Name: public-ip
Kind: String
- Name: dns
Kind: String
Default: "1.1.1.1"

Namespace: ${{ Args.namespace }}

# See all options:
# https://docs.next-hat.com/references/nanocl/cargo
Cargoes:
- Name: vpn
Container:
Image: hwdsl2/ipsec-vpn-server:latest
Env:
- VPN_PUBLIC_IP=${{ Args.public-ip }}
- VPN_DNS_SRV1=${{ Namespaces[ Args.namespace ].Gateway }}
- VPN_DNS_SRV2=${{ Args.dns }}
- VPN_L2TP_NET=192.168.42.0/16
- VPN_L2TP_LOCAL=192.168.42.1
- VPN_L2TP_POOL=192.168.42.10-192.168.42.254
- VPN_XAUTH_NET=192.168.43.0/16
- VPN_XAUTH_POOL=192.168.43.10-192.168.83.254
HostConfig:
PortBindings:
500/udp:
- HostPort: "500"
4500/udp:
- HostPort: "4500"
Binds:
- /opt/vpn:/etc/ipsec.d
- /lib/modules:/lib/modules
CapAdd:
- NET_ADMIN
Devices:
- PathOnHost: /dev/ppp
PathInContainer: /dev/ppp
CgroupPermissions: rwm
Sysctls:
net.ipv4.ip_forward: "1"
net.ipv4.conf.all.accept_redirects: "0"
net.ipv4.conf.all.send_redirects: "0"
net.ipv4.conf.all.rp_filter: "0"
net.ipv4.conf.default.accept_redirects: "0"
net.ipv4.conf.default.send_redirects: "0"
net.ipv4.conf.default.rp_filter: "0"
net.ipv4.conf.eth0.send_redirects: "0"
net.ipv4.conf.eth0.rp_filter: "0"
- Name: vpn
Container:
Image: hwdsl2/ipsec-vpn-server:latest
Env:
- VPN_PUBLIC_IP=${{ Args.public-ip }}
- VPN_DNS_SRV1=${{ Namespaces[ Args.namespace ].Gateway }}
- VPN_DNS_SRV2=${{ Args.dns }}
- VPN_L2TP_NET=192.168.42.0/16
- VPN_L2TP_LOCAL=192.168.42.1
- VPN_L2TP_POOL=192.168.42.10-192.168.42.254
- VPN_XAUTH_NET=192.168.43.0/16
- VPN_XAUTH_POOL=192.168.43.10-192.168.83.254
HostConfig:
PortBindings:
500/udp:
- HostPort: "500"
4500/udp:
- HostPort: "4500"
Binds:
- /opt/vpn:/etc/ipsec.d
- /lib/modules:/lib/modules
CapAdd:
- NET_ADMIN
Devices:
- PathOnHost: /dev/ppp
PathInContainer: /dev/ppp
CgroupPermissions: rwm
Sysctls:
net.ipv4.ip_forward: "1"
net.ipv4.conf.all.accept_redirects: "0"
net.ipv4.conf.all.send_redirects: "0"
net.ipv4.conf.all.rp_filter: "0"
net.ipv4.conf.default.accept_redirects: "0"
net.ipv4.conf.default.send_redirects: "0"
net.ipv4.conf.default.rp_filter: "0"
net.ipv4.conf.eth0.send_redirects: "0"
net.ipv4.conf.eth0.rp_filter: "0"
```
You can use it in the following way:
Expand Down

0 comments on commit 0c2021a

Please sign in to comment.