diff --git a/tasks/main.yml b/tasks/main.yml index f773fd1..540b40c 100644 --- a/tasks/main.yml +++ b/tasks/main.yml @@ -16,68 +16,68 @@ state: present update_cache: yes - - name: Configure wireguard - block: - - name: Retreive private key - block: - - name: Retreive private key - shell: > - cat /etc/wireguard/privatekey - register: wireguard_private_key - rescue: - - name: Generate private key - shell: > - set -o pipefail && wg genkey | tee /etc/wireguard/privatekey - register: wireguard_private_key - always: - - name: Fix permission on /etc/wireguard/privatekey - file: - path: "/etc/wireguard/privatekey" - owner: root - group: root - mode: 0600 - - - name: Retreive public key - block: - - name: Retreive public key - shell: > - cat /etc/wireguard/publickey - register: wireguard_public_key - rescue: - - name: Generate public key - shell: > - set -o pipefail && cat /etc/wireguard/privatekey | wg pubkey | tee /etc/wireguard/publickey - register: wireguard_public_key - always: - - name: Fix permission on /etc/wireguard/publickey - file: - path: "/etc/wireguard/publickey" - owner: root - group: root - mode: 0600 - - - name: Set keys pair variable - set_facts: - wireguard_public_key: '{{ wireguard_public_key.stdout }}' - wireguard_private_key: '{{ wireguard_private_key.stdout }}' - - - name: Install WireGuard configuration files - template: - src: "etc/wireguard/wireguard.conf.j2" - dest: "/etc/wireguard/{{ wireguard_interface }}.conf" - owner: root - group: root - mode: 0644 - - - name: Enable Wireguard service - service: - name: "wg-quick@{{ wireguard_interface }}" - enabled: yes - state: restarted - when: - - skip_conf|false - tags: - - wireguard-conf - +# - name: Configure wireguard +# block: +# - name: Retreive private key +# block: +# - name: Retreive private key +# shell: > +# cat /etc/wireguard/privatekey +# register: wireguard_private_key +# rescue: +# - name: Generate private key +# shell: > +# set -o pipefail && wg genkey | tee /etc/wireguard/privatekey +# register: wireguard_private_key +# always: +# - name: Fix permission on /etc/wireguard/privatekey +# file: +# path: "/etc/wireguard/privatekey" +# owner: root +# group: root +# mode: 0600 +# +# - name: Retreive public key +# block: +# - name: Retreive public key +# shell: > +# cat /etc/wireguard/publickey +# register: wireguard_public_key +# rescue: +# - name: Generate public key +# shell: > +# set -o pipefail && cat /etc/wireguard/privatekey | wg pubkey | tee /etc/wireguard/publickey +# register: wireguard_public_key +# always: +# - name: Fix permission on /etc/wireguard/publickey +# file: +# path: "/etc/wireguard/publickey" +# owner: root +# group: root +# mode: 0600 +# +# - name: Set keys pair variable +# set_facts: +# wireguard_public_key: '{{ wireguard_public_key.stdout }}' +# wireguard_private_key: '{{ wireguard_private_key.stdout }}' +# +# - name: Install WireGuard configuration files +# template: +# src: "etc/wireguard/wireguard.conf.j2" +# dest: "/etc/wireguard/{{ wireguard_interface }}.conf" +# owner: root +# group: root +# mode: 0644 +# +# - name: Enable Wireguard service +# service: +# name: "wg-quick@{{ wireguard_interface }}" +# enabled: yes +# state: restarted +# when: +# - skip_conf|false +# tags: +# - wireguard-conf +# tags: - wireguard