First release
This commit is contained in:
parent
ee0c4f54b2
commit
c71ca190ab
11 changed files with 154 additions and 1 deletions
12
.drone.yml
Normal file
12
.drone.yml
Normal file
|
|
@ -0,0 +1,12 @@
|
|||
---
|
||||
kind: pipeline
|
||||
type: kubernetes
|
||||
name: default
|
||||
|
||||
steps:
|
||||
- name: lint
|
||||
image: quay.io/adrilinux/ansible:latest
|
||||
commands:
|
||||
- ansible-lint ./
|
||||
# - "find . -maxdepth 1 -name '*.yml' | sort | grep -v '.drone.yml' | xargs ansible-playbook --syntax-check --list-tasks"
|
||||
# - "find . -maxdepth 1 -name '*.yml' | sort | grep -v '.drone.yml' | xargs ansible-lint"
|
||||
|
|
@ -1,3 +1,5 @@
|
|||
[](https://drone.reslinger.net/adrien/ansible-role-wireguard)
|
||||
|
||||
# ansible-role-wireguard
|
||||
|
||||
Install wireguard
|
||||
Install WireGuard
|
||||
4
defaults/main.yml
Normal file
4
defaults/main.yml
Normal file
|
|
@ -0,0 +1,4 @@
|
|||
---
|
||||
wireguard_interface: wg0
|
||||
wireguard_port: 51820
|
||||
skip_conf: false
|
||||
3
handlers/main.yml
Normal file
3
handlers/main.yml
Normal file
|
|
@ -0,0 +1,3 @@
|
|||
---
|
||||
- name: Restart WireGuard
|
||||
service: name=wg-quick@{{ wireguard_interface }} state=restarted
|
||||
16
meta/main.yml
Normal file
16
meta/main.yml
Normal file
|
|
@ -0,0 +1,16 @@
|
|||
galaxy_info:
|
||||
author: Adrien Reslinger
|
||||
description: Install WireGuard
|
||||
company: Personnal
|
||||
min_ansible_version: 2.9
|
||||
galaxy_tags: []
|
||||
license: GPL2
|
||||
platforms:
|
||||
- name: CentOS
|
||||
version:
|
||||
- 7
|
||||
- 8
|
||||
- name: RedHat
|
||||
version:
|
||||
- 7
|
||||
- 8
|
||||
8
tasks/install_RedHat.yml
Normal file
8
tasks/install_RedHat.yml
Normal file
|
|
@ -0,0 +1,8 @@
|
|||
---
|
||||
- name: Install repositories packages for CentOS
|
||||
package:
|
||||
name:
|
||||
- epel-release
|
||||
- elrepo-release
|
||||
state: present
|
||||
update_cache: yes
|
||||
80
tasks/main.yml
Normal file
80
tasks/main.yml
Normal file
|
|
@ -0,0 +1,80 @@
|
|||
---
|
||||
- name: WireGuard setup
|
||||
block:
|
||||
- name: Include vars for {{ ansible_os_family }}
|
||||
include_vars: "{{ ansible_os_family }}_{{ ansible_distribution_major_version }}.yml"
|
||||
|
||||
- name: Pre-installation
|
||||
include_tasks: "install_{{ ansible_os_family }}.yml"
|
||||
|
||||
- name: Install packages for WireGuard
|
||||
package:
|
||||
name: "{{ wireguard_packages }}"
|
||||
state: present
|
||||
update_cache: yes
|
||||
|
||||
- name: Configure wireguard
|
||||
block:
|
||||
- name: Retreive private key
|
||||
block:
|
||||
- name: Retreive private key
|
||||
shell: >
|
||||
cat /etc/wireguard/privatekey
|
||||
register: wireguard_private_key
|
||||
rescue:
|
||||
- name: Generate private key
|
||||
shell: >
|
||||
set -o pipefail && wg genkey | tee /etc/wireguard/privatekey
|
||||
register: wireguard_private_key
|
||||
always:
|
||||
- name: Fix permission on /etc/wireguard/privatekey
|
||||
file:
|
||||
path: "/etc/wireguard/privatekey"
|
||||
owner: root
|
||||
group: root
|
||||
mode: 0600
|
||||
|
||||
- name: Retreive public key
|
||||
block:
|
||||
- name: Retreive public key
|
||||
shell: >
|
||||
cat /etc/wireguard/publickey
|
||||
register: wireguard_public_key
|
||||
rescue:
|
||||
- name: Generate public key
|
||||
shell: >
|
||||
set -o pipefail && cat /etc/wireguard/privatekey | wg pubkey | tee /etc/wireguard/publickey
|
||||
register: wireguard_public_key
|
||||
always:
|
||||
- name: Fix permission on /etc/wireguard/publickey
|
||||
file:
|
||||
path: "/etc/wireguard/publickey"
|
||||
owner: root
|
||||
group: root
|
||||
mode: 0600
|
||||
|
||||
- name: Set keys pair variable
|
||||
set_facts:
|
||||
wireguard_public_key: '{{ wireguard_public_key.stdout }}'
|
||||
wireguard_private_key: '{{ wireguard_private_key.stdout }}'
|
||||
|
||||
- name: Install WireGuard configuration files
|
||||
template:
|
||||
src: "etc/wireguard/wireguard.conf.j2"
|
||||
dest: "/etc/wireguard/{{ wireguard_interface }}.conf"
|
||||
owner: root
|
||||
group: root
|
||||
mode: 0644
|
||||
|
||||
- name: Enable Wireguard service
|
||||
service:
|
||||
name: "wg-quick@{{ wireguard_interface }}"
|
||||
enabled: yes
|
||||
state: restarted
|
||||
when:
|
||||
- skip_conf|false
|
||||
tags:
|
||||
- wireguard-conf
|
||||
|
||||
tags:
|
||||
- wireguard
|
||||
6
templates/etc/firewalld/services/wireguard.xml
Normal file
6
templates/etc/firewalld/services/wireguard.xml
Normal file
|
|
@ -0,0 +1,6 @@
|
|||
<?xml version="1.0" encoding="utf-8"?>
|
||||
<service>
|
||||
<short>WireGuard</short>
|
||||
<description>WireGuard is a virtual private network (VPN) solution. It is used to create encrypted point-to-point tunnels between computers. If you plan to provide a VPN service, enable this option.</description>
|
||||
<port protocol="udp" port="{{ wireguard_port }}"/>
|
||||
</service>
|
||||
14
templates/etc/wireguard.conf.j2
Normal file
14
templates/etc/wireguard.conf.j2
Normal file
|
|
@ -0,0 +1,14 @@
|
|||
[Interface]
|
||||
PrivateKey = {{ wireguard_private_key }}
|
||||
#Address = 10.0.0.1/24
|
||||
DNS = {{ vpn_network }}.1
|
||||
SaveConfig = true
|
||||
ListenPort = {{ wireguard_port }}
|
||||
PostUp = firewall-cmd --add-port {{ wireguard_port }}/udp && firewall-cmd --add-masquerade
|
||||
PostDown = firewall-cmd --remove-port {{ wireguard_port }}/udp && firewall-cmd --remove-masquerade
|
||||
|
||||
[Peer]
|
||||
PublicKey = {{ public_key_files.results[0].stdout }}
|
||||
AllowedIPs = 0.0.0.0/0,::/0
|
||||
Endpoint = {{ ansible_default_ipv4.address }}:{{ vpn_port }}
|
||||
PersistentKeepalive = 20
|
||||
4
vars/RedHat_7.yml
Normal file
4
vars/RedHat_7.yml
Normal file
|
|
@ -0,0 +1,4 @@
|
|||
---
|
||||
wireguard_packages:
|
||||
- kmod-wireguard
|
||||
- wireguard-tools
|
||||
4
vars/RedHat_8.yml
Normal file
4
vars/RedHat_8.yml
Normal file
|
|
@ -0,0 +1,4 @@
|
|||
---
|
||||
wireguard_packages:
|
||||
- kmod-wireguard
|
||||
- wireguard-tools
|
||||
Loading…
Add table
Add a link
Reference in a new issue