mirror of
https://github.com/kevinveenbirkenbach/computer-playbook.git
synced 2024-11-26 06:31:04 +01:00
Optimized wireguard roles
This commit is contained in:
parent
a2e3fbb19e
commit
9e61abbbf3
25
playbook.yml
25
playbook.yml
@ -14,16 +14,25 @@
|
|||||||
- server_native-disc-space-check
|
- server_native-disc-space-check
|
||||||
- server_native-free-disc-space
|
- server_native-free-disc-space
|
||||||
- server_native-btrfs-health-check
|
- server_native-btrfs-health-check
|
||||||
- name: setup standard wireguard hosts
|
|
||||||
hosts: wireguard
|
# Wireguard Rollen
|
||||||
|
- name: setup standard wireguard
|
||||||
|
hosts: wireguard_server
|
||||||
become: true
|
become: true
|
||||||
roles:
|
roles:
|
||||||
- server_native-wireguard
|
- independent-application-wireguard
|
||||||
- name: setup wireguard hosts behind firewall\nat
|
|
||||||
|
- name: setup wireguard client behind firewall\nat
|
||||||
hosts: wireguard_behind_firewall
|
hosts: wireguard_behind_firewall
|
||||||
become: true
|
become: true
|
||||||
roles:
|
roles:
|
||||||
- server_native-wireguard-behind-firewall
|
- client_application-wireguard-behind-firewall
|
||||||
|
|
||||||
|
- name: setup wireguard client
|
||||||
|
hosts: wireguard_client
|
||||||
|
become: true
|
||||||
|
roles:
|
||||||
|
- client_application-wireguard
|
||||||
|
|
||||||
# Native Webserver Roles
|
# Native Webserver Roles
|
||||||
- name: setup homepages
|
- name: setup homepages
|
||||||
@ -185,12 +194,6 @@
|
|||||||
- pc_collection-administrator-base
|
- pc_collection-administrator-base
|
||||||
- pc_driver-non-free
|
- pc_driver-non-free
|
||||||
|
|
||||||
- name: pc_application-wireguard
|
|
||||||
hosts: application_wireguard
|
|
||||||
become: true
|
|
||||||
roles:
|
|
||||||
- pc_application-wireguard
|
|
||||||
|
|
||||||
- name: pc_collection-office
|
- name: pc_collection-office
|
||||||
hosts: collection_officetools
|
hosts: collection_officetools
|
||||||
become: true
|
become: true
|
||||||
|
@ -1,4 +1,4 @@
|
|||||||
# server_native-wireguard-behind-nat
|
# client-wireguard-behind-nat
|
||||||
|
|
||||||
# see
|
# see
|
||||||
- https://gist.github.com/insdavm/b1034635ab23b8839bf957aa406b5e39
|
- https://gist.github.com/insdavm/b1034635ab23b8839bf957aa406b5e39
|
@ -0,0 +1,2 @@
|
|||||||
|
dependencies:
|
||||||
|
- client_application-wireguard
|
6
roles/client_application-wireguard/handlers/main.yml
Normal file
6
roles/client_application-wireguard/handlers/main.yml
Normal file
@ -0,0 +1,6 @@
|
|||||||
|
- name: "restart set-mtu.service"
|
||||||
|
systemd:
|
||||||
|
name: set-mtu.service
|
||||||
|
state: restarted
|
||||||
|
enabled: yes
|
||||||
|
daemon_reload: yes
|
2
roles/client_application-wireguard/meta/main.yml
Normal file
2
roles/client_application-wireguard/meta/main.yml
Normal file
@ -0,0 +1,2 @@
|
|||||||
|
dependencies:
|
||||||
|
- independent-application-wireguard
|
11
roles/client_application-wireguard/tasks/main.yml
Normal file
11
roles/client_application-wireguard/tasks/main.yml
Normal file
@ -0,0 +1,11 @@
|
|||||||
|
- name: create set-mtu.service
|
||||||
|
copy:
|
||||||
|
src: set-mtu.service
|
||||||
|
dest: /etc/systemd/system/set-mtu.service
|
||||||
|
notify: restart set-mtu.service
|
||||||
|
|
||||||
|
- name: create set-mtu.sh
|
||||||
|
template:
|
||||||
|
src: set-mtu.sh.j2
|
||||||
|
dest: /usr/local/bin/set-mtu.sh
|
||||||
|
notify: restart set-mtu.service
|
@ -4,3 +4,6 @@
|
|||||||
state: restarted
|
state: restarted
|
||||||
enabled: yes
|
enabled: yes
|
||||||
daemon_reload: yes
|
daemon_reload: yes
|
||||||
|
|
||||||
|
- name: "reload sysctl configuration"
|
||||||
|
shell: "sysctl --load='/etc/sysctl.d/wireguard-ip.conf'"
|
@ -1,11 +1,23 @@
|
|||||||
- name: install wireguard for Arch
|
- name: install wireguard for Arch
|
||||||
pacman: name=wireguard-tools state=present
|
pacman:
|
||||||
|
name: wireguard-tools
|
||||||
|
state: present
|
||||||
when: ansible_os_family == "Archlinux"
|
when: ansible_os_family == "Archlinux"
|
||||||
|
|
||||||
- name: install wireguard for Ubuntu
|
- name: install wireguard for Ubuntu
|
||||||
apt: name=wireguard state=present
|
apt:
|
||||||
|
name: wireguard
|
||||||
|
state: present
|
||||||
when: ansible_os_family == "Debian"
|
when: ansible_os_family == "Debian"
|
||||||
|
|
||||||
|
- name: create wireguard-ip.conf
|
||||||
|
copy:
|
||||||
|
src: "wireguard-ip.conf"
|
||||||
|
dest: /etc/sysctl.d/wireguard-ip.conf
|
||||||
|
owner: root
|
||||||
|
group: root
|
||||||
|
notify: reload sysctl configuration
|
||||||
|
|
||||||
- name: create /etc/wireguard/wg0.conf
|
- name: create /etc/wireguard/wg0.conf
|
||||||
copy:
|
copy:
|
||||||
src: "{{ inventory_dir }}/files/{{ inventory_hostname }}/etc/wireguard/wg0.conf"
|
src: "{{ inventory_dir }}/files/{{ inventory_hostname }}/etc/wireguard/wg0.conf"
|
||||||
@ -13,9 +25,3 @@
|
|||||||
owner: root
|
owner: root
|
||||||
group: root
|
group: root
|
||||||
notify: restart wireguard
|
notify: restart wireguard
|
||||||
|
|
||||||
- name: enable ipv4-forwarding
|
|
||||||
shell: sysctl net.ipv4.ip_forward=1
|
|
||||||
|
|
||||||
- name: enable ipv6-forwarding
|
|
||||||
shell: sysctl net.ipv6.conf.all.forwarding=1
|
|
@ -1,16 +0,0 @@
|
|||||||
- name: "restart set-mtu.service"
|
|
||||||
systemd:
|
|
||||||
name: set-mtu.service
|
|
||||||
state: restarted
|
|
||||||
enabled: yes
|
|
||||||
daemon_reload: yes
|
|
||||||
|
|
||||||
- name: "restart wireguard"
|
|
||||||
systemd:
|
|
||||||
name: wg-quick@wg0.service
|
|
||||||
state: restarted
|
|
||||||
enabled: yes
|
|
||||||
daemon_reload: yes
|
|
||||||
|
|
||||||
- name: "reload sysctl configuration"
|
|
||||||
shell: "sysctl -p"
|
|
@ -1,32 +0,0 @@
|
|||||||
- name: install wireguard
|
|
||||||
pacman:
|
|
||||||
name: wireguard-tools
|
|
||||||
state: present
|
|
||||||
|
|
||||||
- name: create set-mtu.service
|
|
||||||
copy:
|
|
||||||
src: set-mtu.service
|
|
||||||
dest: /etc/systemd/system/set-mtu.service
|
|
||||||
notify: restart set-mtu.service
|
|
||||||
|
|
||||||
- name: create set-mtu.sh
|
|
||||||
template:
|
|
||||||
src: set-mtu.sh.j2
|
|
||||||
dest: /usr/local/bin/set-mtu.sh
|
|
||||||
notify: restart set-mtu.service
|
|
||||||
|
|
||||||
- name: create wireguard-ip.conf
|
|
||||||
copy:
|
|
||||||
src: "wireguard-ip.conf"
|
|
||||||
dest: /etc/sysctl.d/wireguard-ip.conf
|
|
||||||
owner: root
|
|
||||||
group: root
|
|
||||||
notify: reload sysctl configuration
|
|
||||||
|
|
||||||
- name: create /etc/wireguard/wg0.conf
|
|
||||||
copy:
|
|
||||||
src: "{{ inventory_dir }}/files/{{ inventory_hostname }}/etc/wireguard/wg0.conf"
|
|
||||||
dest: /etc/wireguard/wg0.conf
|
|
||||||
owner: root
|
|
||||||
group: root
|
|
||||||
notify: restart wireguard
|
|
@ -1,2 +0,0 @@
|
|||||||
dependencies:
|
|
||||||
- server_native-wireguard
|
|
Loading…
Reference in New Issue
Block a user