First release

This commit is contained in:
Adrien Reslinger 2020-08-03 23:24:28 +02:00
parent ee0c4f54b2
commit c71ca190ab
11 changed files with 154 additions and 1 deletions

12
.drone.yml Normal file
View file

@ -0,0 +1,12 @@
---
kind: pipeline
type: kubernetes
name: default
steps:
- name: lint
image: quay.io/adrilinux/ansible:latest
commands:
- ansible-lint ./
# - "find . -maxdepth 1 -name '*.yml' | sort | grep -v '.drone.yml' | xargs ansible-playbook --syntax-check --list-tasks"
# - "find . -maxdepth 1 -name '*.yml' | sort | grep -v '.drone.yml' | xargs ansible-lint"

View file

@ -1,3 +1,5 @@
[![Build Status](https://drone.reslinger.net/api/badges/adrien/ansible-role-wireguard/status.svg)](https://drone.reslinger.net/adrien/ansible-role-wireguard)
# ansible-role-wireguard
Install wireguard
Install WireGuard

4
defaults/main.yml Normal file
View file

@ -0,0 +1,4 @@
---
wireguard_interface: wg0
wireguard_port: 51820
skip_conf: false

3
handlers/main.yml Normal file
View file

@ -0,0 +1,3 @@
---
- name: Restart WireGuard
service: name=wg-quick@{{ wireguard_interface }} state=restarted

16
meta/main.yml Normal file
View file

@ -0,0 +1,16 @@
galaxy_info:
author: Adrien Reslinger
description: Install WireGuard
company: Personnal
min_ansible_version: 2.9
galaxy_tags: []
license: GPL2
platforms:
- name: CentOS
version:
- 7
- 8
- name: RedHat
version:
- 7
- 8

8
tasks/install_RedHat.yml Normal file
View file

@ -0,0 +1,8 @@
---
- name: Install repositories packages for CentOS
package:
name:
- epel-release
- elrepo-release
state: present
update_cache: yes

80
tasks/main.yml Normal file
View file

@ -0,0 +1,80 @@
---
- name: WireGuard setup
block:
- name: Include vars for {{ ansible_os_family }}
include_vars: "{{ ansible_os_family }}_{{ ansible_distribution_major_version }}.yml"
- name: Pre-installation
include_tasks: "install_{{ ansible_os_family }}.yml"
- name: Install packages for WireGuard
package:
name: "{{ wireguard_packages }}"
state: present
update_cache: yes
- name: Configure wireguard
block:
- name: Retreive private key
block:
- name: Retreive private key
shell: >
cat /etc/wireguard/privatekey
register: wireguard_private_key
rescue:
- name: Generate private key
shell: >
set -o pipefail && wg genkey | tee /etc/wireguard/privatekey
register: wireguard_private_key
always:
- name: Fix permission on /etc/wireguard/privatekey
file:
path: "/etc/wireguard/privatekey"
owner: root
group: root
mode: 0600
- name: Retreive public key
block:
- name: Retreive public key
shell: >
cat /etc/wireguard/publickey
register: wireguard_public_key
rescue:
- name: Generate public key
shell: >
set -o pipefail && cat /etc/wireguard/privatekey | wg pubkey | tee /etc/wireguard/publickey
register: wireguard_public_key
always:
- name: Fix permission on /etc/wireguard/publickey
file:
path: "/etc/wireguard/publickey"
owner: root
group: root
mode: 0600
- name: Set keys pair variable
set_facts:
wireguard_public_key: '{{ wireguard_public_key.stdout }}'
wireguard_private_key: '{{ wireguard_private_key.stdout }}'
- name: Install WireGuard configuration files
template:
src: "etc/wireguard/wireguard.conf.j2"
dest: "/etc/wireguard/{{ wireguard_interface }}.conf"
owner: root
group: root
mode: 0644
- name: Enable Wireguard service
service:
name: "wg-quick@{{ wireguard_interface }}"
enabled: yes
state: restarted
when:
- skip_conf|false
tags:
- wireguard-conf
tags:
- wireguard

View file

@ -0,0 +1,6 @@
<?xml version="1.0" encoding="utf-8"?>
<service>
<short>WireGuard</short>
<description>WireGuard is a virtual private network (VPN) solution. It is used to create encrypted point-to-point tunnels between computers. If you plan to provide a VPN service, enable this option.</description>
<port protocol="udp" port="{{ wireguard_port }}"/>
</service>

View file

@ -0,0 +1,14 @@
[Interface]
PrivateKey = {{ wireguard_private_key }}
#Address = 10.0.0.1/24
DNS = {{ vpn_network }}.1
SaveConfig = true
ListenPort = {{ wireguard_port }}
PostUp = firewall-cmd --add-port {{ wireguard_port }}/udp && firewall-cmd --add-masquerade
PostDown = firewall-cmd --remove-port {{ wireguard_port }}/udp && firewall-cmd --remove-masquerade
[Peer]
PublicKey = {{ public_key_files.results[0].stdout }}
AllowedIPs = 0.0.0.0/0,::/0
Endpoint = {{ ansible_default_ipv4.address }}:{{ vpn_port }}
PersistentKeepalive = 20

4
vars/RedHat_7.yml Normal file
View file

@ -0,0 +1,4 @@
---
wireguard_packages:
- kmod-wireguard
- wireguard-tools

4
vars/RedHat_8.yml Normal file
View file

@ -0,0 +1,4 @@
---
wireguard_packages:
- kmod-wireguard
- wireguard-tools