Mac php の複数バージョンを管理する方法

結論:phpbrewを利用する。


これが参考になりそう

pointsandlines.jp

$ curl -L -O https://github.com/phpbrew/phpbrew/releases/latest/download/phpbrew.phar
  % Total    % Received % Xferd  Average Speed   Time    Time     Time  Current
                                 Dload  Upload   Total   Spent    Left  Speed
100   138  100   138    0     0    267      0 --:--:-- --:--:-- --:--:--   267
100   634  100   634    0     0    646      0 --:--:-- --:--:-- --:--:--  619k
100  627k  100  627k    0     0   239k      0  0:00:02  0:00:02 --:--:--  731k
$ ls
Applications			PhpstormProjects		budget_execution
Applications (Parallels)	Pictures			cloud_sql_proxy
Desktop				Postman				java_error_in_pycharm_14726.log
Documents			Public				method.py
Downloads			PycharmProjects			myfunc.py
Dropbox				VirtualBox VMs			phpbrew.phar
Google ドライブ			WebstormProjects		td_budget
Library				account-classifier		toridoll-bugdet
Movies				algorithm.py			vagrant
Music				anaconda3
Parallels			budget-execution
$ chmod +x phpbrew.phar 
$ sudo mv phpbrew.phar /usr/local/bin/phpbrew
Password:  
$ phpbrew init
Using root: /Users/xxxxxxx/.phpbrew
Initialization successfully finished!
<=====================================================>
Phpbrew environment is initialized, required directories are created under

    /Users/xxxxxxx/.phpbrew

Paste the following line(s) to the end of your ~/.bashrc and start a
new shell, phpbrew should be up and fully functional from there:

    source /Users/xxxxxxx/.phpbrew/bashrc

To enable PHP version info in your shell prompt, please set PHPBREW_SET_PROMPT=1
in your `~/.bashrc` before you source `~/.phpbrew/bashrc`

    export PHPBREW_SET_PROMPT=1

To enable .phpbrewrc file searching, please export the following variable:

    export PHPBREW_RC_ENABLE=1


For further instructions, simply run `phpbrew` to see the help message.

Enjoy phpbrew at $HOME!!

<=====================================================>
$ echo 'source ~/.phpbrew/bashrc' >> ~/.bashrc
$ phpbrew lookup-prefix homebrew
Did you mean 'self-update'? [Y/n] Y
Updating phpbrew /usr/local/bin/phpbrew...
downloading via curl command
  % Total    % Received % Xferd  Average Speed   Time    Time     Time  Current
                                 Dload  Upload   Total   Spent    Left  Speed
100   138  100   138    0     0    416      0 --:--:-- --:--:-- --:--:--   416
100   634  100   634    0     0   1816      0 --:--:-- --:--:-- --:--:--  1816
100  627k  100  627k    0     0   215k      0  0:00:02  0:00:02 --:--:--  308k
Version updated.
Using root: /Users/xxxxxxx/.phpbrew
Initialization successfully finished!
<=====================================================>
Phpbrew environment is initialized, required directories are created under

    /Users/xxxxxxx/.phpbrew

Paste the following line(s) to the end of your ~/.bashrc and start a
new shell, phpbrew should be up and fully functional from there:

    source /Users/xxxxxxx/.phpbrew/bashrc

To enable PHP version info in your shell prompt, please set PHPBREW_SET_PROMPT=1
in your `~/.bashrc` before you source `~/.phpbrew/bashrc`

    export PHPBREW_SET_PROMPT=1

To enable .phpbrewrc file searching, please export the following variable:

    export PHPBREW_RC_ENABLE=1


For further instructions, simply run `phpbrew` to see the help message.

Enjoy phpbrew at $HOME!!

<=====================================================>
phpbrew - 1.26.0
cliframework core: 2.5.4
$ 






Catalinaを利用している場合は、5系が入らない。そこでシステム側へ無理やり
入れてあげる事にする。

$ curl -s https://php-osx.liip.ch/install.sh | bash -s 5.5
Detected macOS Catalina 10.15. All ok.
Get packager.tgz
Unpack packager.tgz
Please type in your password, as we want to install this into /usr/local
Password:
Start packager (may take some time) using /usr/bin/python2.7
downloading https://s3-eu-west-1.amazonaws.com/php-osx.liip.ch/install/5.5-10.10-frontenddev-latest.dat
downloading https://s3-eu-west-1.amazonaws.com/php-osx.liip.ch/install/5.5-10.10/frontenddev/5.5-10.10-frontenddev-5.5.38-20160831-100002.tar.bz2

Installing package 5.5-10.10-frontenddev into root /
./pkg/pre-install
pkg/pre-install
Skipping existing directory 
Skipping existing directory usr/
Skipping existing directory usr/local/
Extracting usr/local/php5-5.5.38-20160831-100002/
Extracting usr/local/php5-5.5.38-20160831-100002/bin/
Extracting usr/local/php5-5.5.38-20160831-100002/entropy-php.conf
Extracting usr/local/php5-5.5.38-20160831-100002/etc/
Extracting usr/local/php5-5.5.38-20160831-100002/include/
Extracting usr/local/php5-5.5.38-20160831-100002/info/
Extracting usr/local/php5-5.5.38-20160831-100002/lib/
Extracting usr/local/php5-5.5.38-20160831-100002/libphp5.so
Extracting usr/local/php5-5.5.38-20160831-100002/php.d/
・
・
・
Extracting usr/local/php5-5.5.38-20160831-100002/bin/tsql
Extracting usr/local/php5-5.5.38-20160831-100002/bin/uconv
Extracting usr/local/php5-5.5.38-20160831-100002/bin/vacuumdb
Extracting usr/local/php5-5.5.38-20160831-100002/bin/wrjpgcom
Extracting usr/local/php5-5.5.38-20160831-100002/bin/xgettext
Extracting usr/local/php5-5.5.38-20160831-100002/bin/xslt-config
Extracting usr/local/php5-5.5.38-20160831-100002/bin/xsltproc
Executing post-install script /tmp/5.5-10.10-frontenddev-post-install
Create symlink /usr/local/php5/entropy-php.conf /etc/apache2/other/+php-osx.conf
Restarting Apache
AH00558: httpd: Could not reliably determine the server's fully qualified domain name, using MacBook-Pro.local. Set the 'ServerName' directive globally to suppress this message
Syntax OK
Finished.
$ export PATH=/usr/local/php5/bin:$PATH
$ php -v
PHP 5.5.38 (cli) (built: Aug 31 2016 09:57:16) 
Copyright (c) 1997-2015 The PHP Group
Zend Engine v2.5.0, Copyright (c) 1998-2015 Zend Technologies
    with Zend OPcache v7.0.6-dev, Copyright (c) 1999-2015, by Zend Technologies
    with Xdebug v2.2.5, Copyright (c) 2002-2014, by Derick Rethans
$ which php
/usr/local/php5/bin/php


パスを通す時は、

$ export PATH=/usr/local/php5/bin:$PATH

をしてあげる

おしまい

GCP GCEのプロジェクト間移動

GCP内のVMを別プロジェクトに移動したい。

参考:
qiita.com


スナップショット

gcloud compute disks snapshot [移行元インスタンス名] \
  --zone [移行元インスタンスのゾーン] \
  --snapshot-names [作成するスナップショット名] \
  --project [移行元プロジェクトID]


ディスク

gcloud compute disks create [作成するディスク名] \
  --zone [作成するディスクのゾーン] \
  --source-snapshot [作成したスナップショット名] \
  --project [移行元プロジェクトID]


イメージ

gcloud compute images create [作成するイメージ名] \
  --source-disk [作成したディスク名] \
  --source-disk-zone [作成したディスクのゾーン] \
  --project [移行元プロジェクトID]

展開

gcloud compute instances create [移行先インスタンス名] \
  --zone [移行先インスタンスのゾーン] \
  --image [作成したイメージ名] \
  --image-project [移行元プロジェクトID] \
  --project [移行先プロジェクトID]

WSLのビープ音を消すぞ

Bash on Ubuntu on Windows
を入れたのだが、入力補完をする時にビープ音がうるさい
とにかくうるさい

なので直す事にした。

ここが役にたった。

azukipochette.hatenablog.com


before
# do not bell on tab-completion
# set bell-style none
# set bell-style visible
after
# do not bell on tab-completion
set bell-style none
# set bell-style visible

vimの補完の音もうっさい、という事で以下のコマンド

$ set belloff=all


快適~♪

UbuntuでSambaを立ててWindowsServerからつないでみたの巻

仕事でSambaサーバ立ててWindowsServerから繋ぐ事になった。

Ubuntu 16.04 LTS
Windows Server 2019

apt-get install samba

samba の設定ファイルsmb.confを編集する

#
# Sample configuration file for the Samba suite for Debian GNU/Linux.
#
#
# This is the main Samba configuration file. You should read the
# smb.conf(5) manual page in order to understand the options listed
# here. Samba has a huge number of configurable options most of which 
# are not shown in this example
#
# Some options that are often worth tuning have been included as
# commented-out examples in this file.
#  - When such options are commented with ";", the proposed setting
#    differs from the default Samba behaviour
#  - When commented with "#", the proposed setting is the default
#    behaviour of Samba but the option is considered important
#    enough to be mentioned here
#
# NOTE: Whenever you modify this file you should run the command
# "testparm" to check that you have not made any basic syntactic 
# errors. 

#======================= Global Settings =======================

[global]
   unix charset = UTF-8      <------<<<<<<<<<<<追加>
   dos charset = CP932      <------<<<<<<<<<<<追加>
## Browsing/Identification ###

# Change this to the workgroup/NT-domain name your Samba server will part of
   workgroup = WORKGROUP

# server string is the equivalent of the NT Description field
   server string = %h server (Samba, Ubuntu)

# Windows Internet Name Serving Support Section:
# WINS Support - Tells the NMBD component of Samba to enable its WINS Server
#   wins support = no

# WINS Server - Tells the NMBD components of Samba to be a WINS Client
# Note: Samba can be either a WINS Server, or a WINS Client, but NOT both
;   wins server = w.x.y.z

# This will prevent nmbd to search for NetBIOS names through DNS.
   dns proxy = no

#### Networking ####

# The specific set of interfaces / networks to bind to
# This can be either the interface name or an IP address/netmask;
# interface names are normally preferred
   interfaces = 127.0.0.0/8 10.0.0.0/16      <------<<<<<<<<<<<<編集>

# Only bind to the named interfaces and/or networks; you must use the
# 'interfaces' option above to use this.
# It is recommended that you enable this feature if your Samba machine is
# not protected by a firewall or is a firewall itself.  However, this
# option cannot handle dynamic or non-broadcast interfaces correctly.
   bind interfaces only = yes


#### Debugging/Accounting ####

# This tells Samba to use a separate log file for each machine
# that connects
   log file = /var/log/samba/log.%m

# Cap the size of the individual log files (in KiB).
   max log size = 1000

# If you want Samba to only log through syslog then set the following
# parameter to 'yes'.
#   syslog only = no

# We want Samba to log a minimum amount of information to syslog. Everything
# should go to /var/log/samba/log.{smbd,nmbd} instead. If you want to log
# through syslog you should set the following parameter to something higher.
   syslog = 0

# Do something sensible when Samba crashes: mail the admin a backtrace
   panic action = /usr/share/samba/panic-action %d


####### Authentication #######

# Server role. Defines in which mode Samba will operate. Possible
# values are "standalone server", "member server", "classic primary
# domain controller", "classic backup domain controller", "active
# directory domain controller". 
#
# Most people will want "standalone sever" or "member server".
# Running as "active directory domain controller" will require first
# running "samba-tool domain provision" to wipe databases and create a
# new domain.
   server role = standalone server

# If you are using encrypted passwords, Samba will need to know what
# password database type you are using.  
   passdb backend = tdbsam

   obey pam restrictions = yes

# This boolean parameter controls whether Samba attempts to sync the Unix
# password with the SMB password when the encrypted SMB password in the
# passdb is changed.
   unix password sync = yes

# For Unix password sync to work on a Debian GNU/Linux system, the following
# parameters must be set (thanks to Ian Kahan <<kahan@informatik.tu-muenchen.de> for
# sending the correct chat script for the passwd program in Debian Sarge).
   passwd program = /usr/bin/passwd %u
   passwd chat = *Enter\snew\s*\spassword:* %n\n *Retype\snew\s*\spassword:* %n\n *password\supdated\ssuccessfully* .

# This boolean controls whether PAM will be used for password changes
# when requested by an SMB client instead of the program listed in
# 'passwd program'. The default is 'no'.
   pam password change = yes

# This option controls how unsuccessful authentication attempts are mapped
# to anonymous connections
   map to guest = never      <------<<<<<<<<<<<<編集>

########## Domains ###########

#
# The following settings only takes effect if 'server role = primary
# classic domain controller', 'server role = backup domain controller'
# or 'domain logons' is set 
#

# It specifies the location of the user's
# profile directory from the client point of view) The following
# required a [profiles] share to be setup on the samba server (see
# below)
;   logon path = \\%N\profiles\%U
# Another common choice is storing the profile in the user's home directory
# (this is Samba's default)
#   logon path = \\%N\%U\profile

# The following setting only takes effect if 'domain logons' is set
# It specifies the location of a user's home directory (from the client
# point of view)
;   logon drive = H:
#   logon home = \\%N\%U

# The following setting only takes effect if 'domain logons' is set
# It specifies the script to run during logon. The script must be stored
# in the [netlogon] share
# NOTE: Must be store in 'DOS' file format convention
;   logon script = logon.cmd

# This allows Unix users to be created on the domain controller via the SAMR
# RPC pipe.  The example command creates a user account with a disabled Unix
# password; please adapt to your needs
; add user script = /usr/sbin/adduser --quiet --disabled-password --gecos "" %u

# This allows machine accounts to be created on the domain controller via the 
# SAMR RPC pipe.  
# The following assumes a "machines" group exists on the system
; add machine script  = /usr/sbin/useradd -g machines -c "%u machine account" -d /var/lib/samba -s /bin/false %u

# This allows Unix groups to be created on the domain controller via the SAMR
# RPC pipe.  
; add group script = /usr/sbin/addgroup --force-badname %g

############ Misc ############

# Using the following line enables you to customise your configuration
# on a per machine basis. The %m gets replaced with the netbios name
# of the machine that is connecting
;   include = /home/samba/etc/smb.conf.%m

# Some defaults for winbind (make sure you're not using the ranges
# for something else.)
;   idmap uid = 10000-20000
;   idmap gid = 10000-20000
;   template shell = /bin/bash

# Setup usershare options to enable non-root users to share folders
# with the net usershare command.

# Maximum number of usershare. 0 (default) means that usershare is disabled.
;   usershare max shares = 100

# Allow users who've been granted usershare privileges to create
# public shares, not just authenticated ones
   usershare allow guests = yes

#======================= Share Definitions =======================

# Un-comment the following (and tweak the other settings below to suit)
# to enable the default home directory shares. This will share each
# user's home directory as \\server\username
;[homes]
;   comment = Home Directories
;   browseable = no

# By default, the home directories are exported read-only. Change the
# next parameter to 'no' if you want to be able to write to them.
;   read only = yes

# File creation mask is set to 0700 for security reasons. If you want to
# create files with group=rw permissions, set next parameter to 0775.
;   create mask = 0700

# Directory creation mask is set to 0700 for security reasons. If you want to
# create dirs. with group=rw permissions, set next parameter to 0775.
;   directory mask = 0700

# By default, \\server\username shares can be connected to by anyone
# with access to the samba server.
# Un-comment the following parameter to make sure that only "username"
# can connect to \\server\username
# This might need tweaking when using external authentication schemes
;   valid users = %S

# Un-comment the following and create the netlogon directory for Domain Logons
# (you need to configure Samba to act as a domain controller too.)
;[netlogon]
;   comment = Network Logon Service
;   path = /home/samba/netlogon
;   guest ok = yes
;   read only = yes

# Un-comment the following and create the profiles directory to store
# users profiles (see the "logon path" option above)
# (you need to configure Samba to act as a domain controller too.)
# The path below should be writable by all users so that their
# profile directory may be created the first time they log on
;[profiles]
;   comment = Users profiles
;   path = /home/samba/profiles
;   guest ok = no
;   browseable = no
;   create mask = 0600
;   directory mask = 0700

[printers]
   comment = All Printers
   browseable = no
   path = /var/spool/samba
   printable = yes
   guest ok = no
   read only = yes
   create mask = 0700

# Windows clients look for this share name as a source of downloadable
# printer drivers
[print$]
   comment = Printer Drivers
   path = /var/lib/samba/printers
   browseable = yes
   read only = yes
   guest ok = no
# Uncomment to allow remote administration of Windows print drivers.
# You may need to replace 'lpadmin' with the name of the group your
# admin users are members of.
# Please note that you also need to set appropriate Unix permissions
# to the drivers directory for these users to have write rights in it
;   write list = root, @lpadmin

#[packages]
#   comment = nuget package
#   path = /mnt/gcs
#   writable = yes
#
#   #guest access OK
#   guest ok = yes
#
#   create mask = 0777
#   directory mask = 0777

[share]      <------<<<<<<<<<<<<ここから下追加>
   path = /mnt/share
   writable = yes
   guest ok = yes
   guest only = yes
   create mode = 0777
   directory mode = 0777


pdbedit でユーザー登録して再起動

root@fuseproxy:/etc/samba# pdbedit -a guest
new password:
retype new password:
Unix username:        guest
NT username:          
Account Flags:        [U          ]
User SID:             S-1-5-21-338252857-148145190-3410117317-1000
Primary Group SID:    S-1-5-21-338252857-148145190-3410117317-513
Full Name:            
Home Directory:       \\fuseproxy\guest
HomeDir Drive:        
Logon Script:         
Profile Path:         \\fuseproxy\guest\profile
Domain:               FUSEPROXY
Account desc:         
Workstations:         
Munged dial:          
Logon time:           0
Logoff time:          Wed, 06 Feb 2036 15:06:39 UTC
Kickoff time:         Wed, 06 Feb 2036 15:06:39 UTC
Password last set:    Fri, 21 Aug 2020 21:55:49 UTC
Password can change:  Fri, 21 Aug 2020 21:55:49 UTC
Password must change: never
Last bad password   : 0
Bad password count  : 0
Logon hours         : FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF
root@fuseproxy:/etc/samba# /etc/init.d/samba restart
[ ok ] Restarting nmbd (via systemctl): nmbd.service.
[ ok ] Restarting smbd (via systemctl): smbd.service.
[ ok ] Restarting samba-ad-dc (via systemctl): samba-ad-dc.service.
root@fuseproxy:/etc/samba#


できれば確認の際に
・セキュアOS(SELinux, AppArmor)も無効化
・WindowsSever側のファイアウォールも無効化
しておくことをお奨めしておきます。

あとWindowsSreverの場合、SMBクライアントも入れておいた方がいいかもです。
f:id:onrenkai:20200822150909p:plain


Windows側でnetwork login credentialsを設定して
うまくつながった!!
f:id:onrenkai:20200822070806p:plain
f:id:onrenkai:20200822070857p:plain

Azure - AWS間で S2S VPNを張ってみた。

とある案件でS2Svpnの技術検証をすることになったので
やってみた。

参考にさせて頂きました。ありがとうございます。
dev.classmethod.jp
dev.classmethod.jp

Azure VPN Gateway構築

仮想ネットワーク、サブネット作成

仮想ネットワークのアドレス範囲を 10.5.0.0/16、 サブネットのアドレス範囲を 10.5.0.0/24
f:id:onrenkai:20200820103623p:plain

ゲートウェイサブネット作成

ゲートウェイ用のサブネットを作成します
f:id:onrenkai:20200820112914p:plain

ゲートウェイサブネットのアドレス範囲は 10.5.254.0/24
f:id:onrenkai:20200820113557p:plain

仮想ネットワークゲートウェイ作成

仮想ネットワークゲートウェイが Azure側のVPNルータに当たります

f:id:onrenkai:20200820114032p:plain
f:id:onrenkai:20200820132237p:plain


ここでパブリックIPアドレスをメモしておく。

AWS VPN Gateway構築

VPC、サブネット作成

VPC: 10.10.0.0/16
subnet: 10.10.11.0/24

カスタマーゲートウェイ作成

静的を選択
Azureの仮想ネットワークゲートウェイ作成時に生成したパブリックIPアドレスを記載する
f:id:onrenkai:20200820132725p:plain


仮想プライベートゲートウェイ作成

AWS側のVPNルータを作成し、該当するVPCをアタッチします。

f:id:onrenkai:20200820135006p:plain



サブネットのルーティング設定を下記のように変更

f:id:onrenkai:20200820140008p:plain

VPN接続設定

AWS側作業:VPN接続設定

サイト間のVPN接続からVPN接続の作成を選択

f:id:onrenkai:20200820140639p:plain
f:id:onrenkai:20200820141345p:plain

AWSのサイト間 VPN接続はデフォルトで冗長化されており、 2つのトンネル (2つのVPNルータ) が作成されます。

それぞれの VPNルータの設定を取得し、後述のAzure側作業で使用します。 設定のダウンロード から適当なConfigファイルをダウンロードします。

f:id:onrenkai:20200820141214p:plain



ダウンロードしたファイルの中身はこんな感じです。

Amazon Web Services
Virtual Private Cloud

VPN Connection Configuration
================================================================================
AWS utilizes unique identifiers to manipulate the configuration of 
a VPN Connection. Each VPN Connection is assigned a VPN Connection Identifier 
and is associated with two other identifiers, namely the 
Customer Gateway Identifier and the Virtual Private Gateway Identifier.

Your VPN Connection ID		         : vpn-xxxxxxxxxxxxxxxxxxxxx
Your Virtual Private Gateway ID          : vgw-xxxxxxxxxxxxxxxxxxxxx
Your Customer Gateway ID    		 : cgw-xxxxxxxxxxxxxxxxxxxxx
		
A VPN Connection consists of a pair of IPSec tunnel security associations (SAs). 
It is important that both tunnel security associations be configured. 

				
IPSec Tunnel #1
================================================================================
#1: Internet Key Exchange Configuration
		
Configure the IKE SA as follows:
Please note, these sample configurations are for the minimum requirement of AES128, SHA1, and DH Group 2.
Category "VPN" connections in the GovCloud region have a minimum requirement of AES128, SHA2, and DH Group 14.
You will need to modify these sample configuration files to take advantage of AES256, SHA256, or other DH groups like 2, 14-18, 22, 23, and 24.
NOTE: If you customized tunnel options when creating or modifying your VPN connection, you may need to modify these sample configurations to match the custom settings for your tunnels.

Higher parameters are only available for VPNs of category "VPN," and not for "VPN-Classic".
The address of the external interface for your customer gateway must be a static address.
Your customer gateway may reside behind a device performing network address translation (NAT).
To ensure that NAT traversal (NAT-T) can function, you must adjust your firewall !rules to unblock UDP port 4500. If not behind NAT, we recommend disabling NAT-T.
  - IKE version              : IKEv1 
  - Authentication Method    : Pre-Shared Key 
  - Pre-Shared Key           : xxxxxxxxxxxxxxxxxxxxx
  - Authentication Algorithm : sha1
  - Encryption Algorithm     : aes-128-cbc
  - Lifetime                 : 28800 seconds
  - Phase 1 Negotiation Mode : main
  - Diffie-Hellman           : Group 2

#2: IPSec Configuration

Configure the IPSec SA as follows:
Category "VPN" connections in the GovCloud region have a minimum requirement of AES128, SHA2, and DH Group 14.
Please note, you may use these additionally supported IPSec parameters for encryption like AES256 and other DH groups like 2, 5, 14-18, 22, 23, and 24.
NOTE: If you customized tunnel options when creating or modifying your VPN connection, you may need to modify these sample configurations to match the custom settings for your tunnels.

Higher parameters are only available for VPNs of category "VPN," and not for "VPN-Classic".
  - Protocol                 : esp
  - Authentication Algorithm : hmac-sha1-96
  - Encryption Algorithm     : aes-128-cbc
  - Lifetime                 : 3600 seconds
  - Mode                     : tunnel
  - Perfect Forward Secrecy  : Diffie-Hellman Group 2
	
IPSec Dead Peer Detection (DPD) will be enabled on the AWS Endpoint. We
recommend configuring DPD on your endpoint as follows:
  - DPD Interval             : 10
  - DPD Retries              : 3

IPSec ESP (Encapsulating Security Payload) inserts additional
headers to transmit packets. These headers require additional space, 
which reduces the amount of space available to transmit application data.
To limit the impact of this behavior, we recommend the following 
configuration on your Customer Gateway:
  - TCP MSS Adjustment       : 1379 bytes
  - Clear Don't Fragment Bit : enabled
  - Fragmentation            : Before encryption

#3: Tunnel Interface Configuration

Your Customer Gateway must be configured with a tunnel interface that is
associated with the IPSec tunnel. All traffic transmitted to the tunnel
interface is encrypted and transmitted to the Virtual Private Gateway.



The Customer Gateway and Virtual Private Gateway each have two addresses that relate
to this IPSec tunnel. Each contains an outside address, upon which encrypted
traffic is exchanged. Each also contain an inside address associated with
the tunnel interface.
 
The Customer Gateway outside IP address was provided when the Customer Gateway
was created. Changing the IP address requires the creation of a new
Customer Gateway.

The Customer Gateway inside IP address should be configured on your tunnel
interface. 

Outside IP Addresses:
  - Customer Gateway 		        : xxx.xxx.xxx.xxx
  - Virtual Private Gateway	        : xxx.xxx.xxx.xxx
		
Inside IP Addresses
  - Customer Gateway         		: xxx.xxx.xxx.xxx/xx
  - Virtual Private Gateway             : xxx.xxx.xxx.xxx/xx

Configure your tunnel to fragment at the optimal size:
  - Tunnel interface MTU     : 1436 bytes
    

#4: Static Routing Configuration:

To route traffic between your internal network and your VPC, 
you will need a static route added to your router.

Static Route Configuration Options:

  - Next hop       : xxx.xxx.xxx.xxx
  
You should add static routes towards your internal network on the VGW.
The VGW will then send traffic towards your internal network over 
the tunnels.  
  
		
				
IPSec Tunnel #2
================================================================================
#1: Internet Key Exchange Configuration
		
Configure the IKE SA as follows:
Please note, these sample configurations are for the minimum requirement of AES128, SHA1, and DH Group 2.
Category "VPN" connections in the GovCloud region have a minimum requirement of AES128, SHA2, and DH Group 14.
You will need to modify these sample configuration files to take advantage of AES256, SHA256, or other DH groups like 2, 14-18, 22, 23, and 24.
NOTE: If you customized tunnel options when creating or modifying your VPN connection, you may need to modify these sample configurations to match the custom settings for your tunnels.

Higher parameters are only available for VPNs of category "VPN," and not for "VPN-Classic".
The address of the external interface for your customer gateway must be a static address.
Your customer gateway may reside behind a device performing network address translation (NAT).
To ensure that NAT traversal (NAT-T) can function, you must adjust your firewall !rules to unblock UDP port 4500. If not behind NAT, we recommend disabling NAT-T.
  - IKE version              : IKEv1 
  - Authentication Method    : Pre-Shared Key 
  - Pre-Shared Key           : xxxxxxxxxxxxxxxxxxxxxxxxxxxxxx
  - Authentication Algorithm : sha1
  - Encryption Algorithm     : aes-128-cbc
  - Lifetime                 : 28800 seconds
  - Phase 1 Negotiation Mode : main
  - Diffie-Hellman           : Group 2

#2: IPSec Configuration

Configure the IPSec SA as follows:
Category "VPN" connections in the GovCloud region have a minimum requirement of AES128, SHA2, and DH Group 14.
Please note, you may use these additionally supported IPSec parameters for encryption like AES256 and other DH groups like 2, 5, 14-18, 22, 23, and 24.
NOTE: If you customized tunnel options when creating or modifying your VPN connection, you may need to modify these sample configurations to match the custom settings for your tunnels.

Higher parameters are only available for VPNs of category "VPN," and not for "VPN-Classic".
  - Protocol                 : esp
  - Authentication Algorithm : hmac-sha1-96
  - Encryption Algorithm     : aes-128-cbc
  - Lifetime                 : 3600 seconds
  - Mode                     : tunnel
  - Perfect Forward Secrecy  : Diffie-Hellman Group 2
	
IPSec Dead Peer Detection (DPD) will be enabled on the AWS Endpoint. We
recommend configuring DPD on your endpoint as follows:
  - DPD Interval             : 10
  - DPD Retries              : 3

IPSec ESP (Encapsulating Security Payload) inserts additional
headers to transmit packets. These headers require additional space, 
which reduces the amount of space available to transmit application data.
To limit the impact of this behavior, we recommend the following 
configuration on your Customer Gateway:
  - TCP MSS Adjustment       : 1379 bytes
  - Clear Don't Fragment Bit : enabled
  - Fragmentation            : Before encryption

#3: Tunnel Interface Configuration

Your Customer Gateway must be configured with a tunnel interface that is
associated with the IPSec tunnel. All traffic transmitted to the tunnel
interface is encrypted and transmitted to the Virtual Private Gateway.



The Customer Gateway and Virtual Private Gateway each have two addresses that relate
to this IPSec tunnel. Each contains an outside address, upon which encrypted
traffic is exchanged. Each also contain an inside address associated with
the tunnel interface.
 
The Customer Gateway outside IP address was provided when the Customer Gateway
was created. Changing the IP address requires the creation of a new
Customer Gateway.

The Customer Gateway inside IP address should be configured on your tunnel
interface. 

Outside IP Addresses:
  - Customer Gateway 		        : xxx.xxx.xxx.xxx 
  - Virtual Private Gateway	        : xxx.xxx.xxx.xxx
		
Inside IP Addresses
  - Customer Gateway         		: xxx.xxx.xxx.xxx/xx
  - Virtual Private Gateway             : xxx.xxx.xxx.xxx/xx

Configure your tunnel to fragment at the optimal size:
  - Tunnel interface MTU     : 1436 bytes
    

#4: Static Routing Configuration:

To route traffic between your internal network and your VPC, 
you will need a static route added to your router.

Static Route Configuration Options:

  - Next hop       : xxx.xxx.xxx.xxx
  
You should add static routes towards your internal network on the VGW.
The VGW will then send traffic towards your internal network over 
the tunnels.  
  
		 
 

Additional Notes and Questions
================================================================================

  - Amazon Virtual Private Cloud Getting Started Guide: 
      http://docs.amazonwebservices.com/AmazonVPC/latest/GettingStartedGuide
  - Amazon Virtual Private Cloud Network Administrator Guide: 
      http://docs.amazonwebservices.com/AmazonVPC/latest/NetworkAdminGuide
  - XSL Version: 2009-07-15-1119716


Configファイルの下記項目をメモしておきます。

IPsec Tunnel #1 のPreShared Key
IPsec Tunnel #1 のAWSグローバルIP
IPsec Tunnel #2 のPreShared Key
IPsec Tunnel #2 のAWSグローバルIP



Azure側作業:VPN接続設定

まず AWS側で作成した IPsec Tunnel #1 の接続を確立させるための設定をしてきます。

  • アドレス範囲: 対向 (AWS)側ローカル (10.10.11.0/24) を記入

f:id:onrenkai:20200820142415p:plain



次に 手順1で作成した仮想ネットワークゲートウェイから 接続 、+追加 を選択

  • 接続の種類: サイト対サイト (IPsec) を選択
  • 共有キー(PSK): IPsec Tunnel #1 のPreShared Key を記入

f:id:onrenkai:20200820142900p:plain

f:id:onrenkai:20200820142704p:plain


以上で IPsec Tunnel#1 の設定は完了です。

同じ手順で IPsec Tunnel#2 版 ローカルネットワークゲートウェイ・接続も作成します。


確認

接続済みとなっていればOKです。
f:id:onrenkai:20200820143245p:plain

AWS側のサイト間のVPN接続のトンネル詳細を見てみます。
ステータスが アップ となっていれば OKです。
f:id:onrenkai:20200820144638p:plain



AWS内のEC2WindowsServer2019 にRDPして
対向のAzureに対してPingを打ってみます。

通りました!!!
f:id:onrenkai:20200820145019p:plain


反対にAzure内のWindowsServer2019にRDPして
対向のAWSのEC2に対してRDPで繋いでみます。
f:id:onrenkai:20200820145742p:plain


繋がりました!!!

おしまい。

UnicodeDecodeError:'cp932'が発生

Windows10環境でPythonで開発していた時の事、

UnicodeDecodeError: 'cp932' codec can't decode byte 0x82 in position 101: illegal multibyte sequence

が発生してしまってうまくcraft serveが起動しなかった。
ググると、

open(files, encoding="utf8")

をつけろとの事でしたが、

OS側で設定方法があったので記載します。

「ワールドワイド言語サポートでunicode utf-8を使用」にチェックを入れて再起動。
f:id:onrenkai:20200819161520p:plain


これで解決!

バルミューダ 寺尾玄さん

この人の生き方は傍から見たら常軌を逸しているように見えるけど、
自分はカッコいいと思うし、憧れます。

ものを作りは結局そういうところから始まるんだよね。
こういう生き方はできなくても、少なくともこういう気概を持って生きていきたい。

wired.jp