task_machine_configuration.yml 1.6 KB

12345678910111213141516171819202122232425262728293031323334353637383940414243444546474849505152535455565758596061
  1. ---
  2. - name: "00: UFW configuration"
  3. ansible.builtin.command: ufw allow "{{ vpn_server_port }}/udp"
  4. - name: "00: more UFW configuration"
  5. ansible.builtin.command: ufw allow "OpenSSH"
  6. - name: "10: last UFW configurion i promise"
  7. ansible.builtin.command: ufw disable && ufw enable
  8. - name: "00: Create Wireguard directory"
  9. ansible.builtin.file:
  10. path: "/etc/wireguard"
  11. state: "directory"
  12. - name: "10: Create Public and Private server keys"
  13. ansible.builtin.shell:
  14. cmd: "wg genkey | tee /etc/wireguard/privatekey | wg pubkey | tee /etc/wireguard/publickey"
  15. - name: "20: Modify Private key permissions"
  16. ansible.builtin.file:
  17. path: "/etc/wireguard/privatekey"
  18. mode: '0600'
  19. - name: "30: Set VPN configuration variables"
  20. ansible.builtin.command: cat /etc/wireguard/privatekey
  21. register: private_key_cmd
  22. - name: "35: Register the stdout of previous"
  23. ansible.builtin.set_fact:
  24. vpn_private_key_content: "{{ private_key_cmd.stdout }}"
  25. - name: "40: Create server configuration file"
  26. ansible.builtin.template:
  27. src: "templates/wg0.conf.j2"
  28. dest: "/etc/wireguard/wg0.conf"
  29. - name: "50: Modify Server config file permissions"
  30. ansible.builtin.file:
  31. path: "/etc/wireguard/wg0.conf"
  32. mode: "0600"
  33. ansible.builtin.file:
  34. path: "/etc/wireguard/privatekey"
  35. mode: "0600"
  36. - name: "60: Start the wireguard server"
  37. ansible.builtin.shell:
  38. cmd: "wg-quick up wg0"
  39. - name: "70: Enable IP forwarding"
  40. ansible.builtin.sysctl:
  41. name: "net.ipv4.ip_forward"
  42. value: "1"
  43. sysctl_set: "yes"
  44. state: "present"
  45. reload: "yes"