task_machine_configuration.yml 1.6 KB

1234567891011121314151617181920212223242526272829303132333435363738394041424344454647484950515253545556575859606162636465
  1. ---
  2. - name: "00: UFW configuration"
  3. ansible.builtin.command: ufw allow "{{ vpn_server_port }}/udp"
  4. - name: "00: more UFW configuration"
  5. ansible.builtin.command: ufw allow "OpenSSH"
  6. - name: "10: last UFW configurion i promise"
  7. ansible.builtin.command: ufw disable
  8. - name: "10: last UFW configurion i promise"
  9. ansible.builtin.command: ufw --force enable
  10. - name: "00: Create Wireguard directory"
  11. ansible.builtin.file:
  12. path: "/etc/wireguard"
  13. state: "directory"
  14. - name: "10: Create Public and Private server keys"
  15. ansible.builtin.shell:
  16. cmd: "wg genkey | tee /etc/wireguard/privatekey | wg pubkey | tee /etc/wireguard/publickey"
  17. - name: "20: Modify Private key permissions"
  18. ansible.builtin.file:
  19. path: "/etc/wireguard/privatekey"
  20. mode: '0600'
  21. - name: "30: Set VPN configuration variables"
  22. ansible.builtin.command: cat /etc/wireguard/privatekey
  23. register: private_key_cmd
  24. - name: "35: Register the stdout of previous"
  25. ansible.builtin.set_fact:
  26. vpn_private_key_content: "{{ private_key_cmd.stdout }}"
  27. - name: "40: Create server configuration file"
  28. ansible.builtin.template:
  29. src: "templates/wg0.conf.j2"
  30. dest: "/etc/wireguard/wg0.conf"
  31. - name: "50: Modify Server config file permissions"
  32. ansible.builtin.file:
  33. path: "/etc/wireguard/wg0.conf"
  34. mode: "0600"
  35. ansible.builtin.file:
  36. path: "/etc/wireguard/privatekey"
  37. mode: "0600"
  38. - name: "60: Start the wireguard server"
  39. ansible.builtin.shell:
  40. cmd: "wg-quick up wg0"
  41. - name: "70: Enable IP forwarding"
  42. ansible.builtin.sysctl:
  43. name: "net.ipv4.ip_forward"
  44. value: "1"
  45. sysctl_set: "yes"
  46. state: "present"
  47. reload: "yes"