algo/users.yml

147 lines
5.3 KiB
YAML
Raw Normal View History

2016-07-27 21:27:11 +00:00
---
2016-08-11 20:54:29 +00:00
- hosts: localhost
gather_facts: False
vars_files:
2016-08-16 03:32:44 +00:00
- config.cfg
2016-08-11 20:54:29 +00:00
vars_prompt:
2016-08-16 03:32:44 +00:00
2016-08-11 20:54:29 +00:00
- name: "server_ip"
2016-08-18 18:49:20 +00:00
prompt: "Enter IP address of your server: (use localhost for local installation)\n"
default: localhost
2016-08-11 20:54:29 +00:00
private: no
2016-08-16 03:32:44 +00:00
2016-08-11 20:54:29 +00:00
- name: "server_user"
2016-08-18 18:49:20 +00:00
prompt: "What user should we use to login on the server? (ignore if you're deploying to localhost):\n"
2016-08-11 20:54:29 +00:00
default: "root"
2016-08-25 20:59:16 +00:00
private: no
2016-08-25 20:30:27 +00:00
- name: "ssh_tunneling_enabled"
prompt: "Do you want each user to have their own account for SSH tunneling? (y/n):\n"
default: "n"
2016-08-25 20:59:16 +00:00
private: no
2016-08-18 08:16:22 +00:00
- name: "easyrsa_p12_export_password"
2016-08-25 20:30:27 +00:00
prompt: "Enter a password for p12 certificates and SSH private keys: (minimum five characters)\n"
default: "vpnpw"
2016-08-25 20:59:16 +00:00
private: yes
2016-08-18 18:49:20 +00:00
- name: "IP_subject"
prompt: "Enter public IP address of your server: (IMPORTANT! This IP is used to verify the certificate)\n"
private: no
2016-08-16 03:32:44 +00:00
2016-08-11 20:54:29 +00:00
tasks:
- name: Add the server to the vpn-host group
2016-08-16 03:32:44 +00:00
add_host:
2016-08-11 20:54:29 +00:00
hostname: "{{ server_ip }}"
groupname: vpn-host
ansible_ssh_user: "{{ server_user }}"
ansible_python_interpreter: "/usr/bin/python2.7"
2016-08-18 08:16:22 +00:00
easyrsa_p12_export_password: "{{ easyrsa_p12_export_password }}"
2016-08-25 20:30:27 +00:00
ssh_tunneling_enabled: "{{ ssh_tunneling_enabled }}"
2016-08-18 18:49:20 +00:00
IP_subject: "{{ IP_subject }}"
2016-08-11 20:54:29 +00:00
- name: Wait for SSH to become available
local_action: "wait_for port=22 host={{ server_ip }} timeout=320"
2016-08-16 03:32:44 +00:00
become: false
2016-08-11 20:54:29 +00:00
2016-07-30 17:26:30 +00:00
- name: User management
2016-08-11 20:54:29 +00:00
hosts: vpn-host
2016-07-27 21:27:11 +00:00
gather_facts: false
2016-07-30 16:05:04 +00:00
become: true
2016-07-27 21:27:11 +00:00
vars_files:
2016-08-16 03:32:44 +00:00
- config.cfg
2016-08-25 20:59:16 +00:00
2016-08-18 18:49:20 +00:00
pre_tasks:
- set_fact:
IP_subject_alt_name: "{{ IP_subject }}"
2016-08-16 03:32:44 +00:00
roles:
- { role: ssh_tunneling, tags: [ 'ssh_tunneling' ], when: ssh_tunneling_enabled is defined and ssh_tunneling_enabled == "y" }
2016-07-27 21:27:11 +00:00
tasks:
- name: Build the client's pair
shell: >
./easyrsa build-client-full {{ item }} nopass &&
touch '{{ easyrsa_dir }}/easyrsa3/pki/{{ item }}_initialized'
args:
chdir: '{{ easyrsa_dir }}/easyrsa3/'
creates: '{{ easyrsa_dir }}/easyrsa3/pki/{{ item }}_initialized'
with_items: "{{ users }}"
- name: Build the client's p12
shell: >
openssl pkcs12 -in {{ easyrsa_dir }}/easyrsa3//pki/issued/{{ item }}.crt -inkey {{ easyrsa_dir }}/easyrsa3//pki/private/{{ item }}.key -export -name {{ item }} -out /{{ easyrsa_dir }}/easyrsa3//pki/private/{{ item }}.p12 -certfile {{ easyrsa_dir }}/easyrsa3//pki/ca.crt -passout pass:{{ easyrsa_p12_export_password }} &&
touch '{{ easyrsa_dir }}/easyrsa3/pki/{{ item }}_p12_initialized'
args:
chdir: '{{ easyrsa_dir }}/easyrsa3/'
creates: '{{ easyrsa_dir }}/easyrsa3/pki/{{ item }}_p12_initialized'
with_items: "{{ users }}"
- name: Get active users
shell: >
grep ^V pki/index.txt | grep -v "{{ IP_subject_alt_name }}" | awk '{print $5}' | sed 's/\/CN=//g'
args:
chdir: '{{ easyrsa_dir }}/easyrsa3/'
register: valid_certs
- name: Revoke non-existing users
shell: >
ipsec pki --signcrl --cacert {{ easyrsa_dir }}/easyrsa3//pki/ca.crt --cakey {{ easyrsa_dir }}/easyrsa3/pki/private/ca.key --reason superseded --cert {{ easyrsa_dir }}/easyrsa3//pki/issued/{{ item }}.crt > /etc/ipsec.d/crls/{{ item }}.der &&
./easyrsa revoke {{ item }} &&
ipsec rereadcrls
args:
chdir: '{{ easyrsa_dir }}/easyrsa3/'
when: item not in users
with_items: "{{ valid_certs.stdout_lines }}"
- name: Register p12 PayloadContent
shell: >
cat /{{ easyrsa_dir }}/easyrsa3//pki/private/{{ item }}.p12 | base64
register: PayloadContent
with_items: "{{ users }}"
- name: Register CA PayloadContent
shell: >
cat /{{ easyrsa_dir }}/easyrsa3/pki/ca.crt | base64
register: PayloadContentCA
- name: Build the mobileconfigs
template: src=roles/vpn/templates/mobileconfig.j2 dest=/{{ easyrsa_dir }}/easyrsa3//pki/private/{{ item.0 }}.mobileconfig mode=0600
with_together:
- "{{ users }}"
- "{{ PayloadContent.results }}"
no_log: True
- name: Fetch users P12
fetch: src=/{{ easyrsa_dir }}/easyrsa3//pki/private/{{ item }}.p12 dest=configs/{{ IP_subject_alt_name }}_{{ item }}.p12 flat=yes
with_items: "{{ users }}"
- name: Fetch users mobileconfig
fetch: src=/{{ easyrsa_dir }}/easyrsa3//pki/private/{{ item }}.mobileconfig dest=configs/{{ IP_subject_alt_name }}_{{ item }}.mobileconfig flat=yes
with_items: "{{ users }}"
- name: Fetch server CA certificate
fetch: src=/{{ easyrsa_dir }}/easyrsa3/pki/ca.crt dest=configs/{{ IP_subject_alt_name }}_ca.crt flat=yes
# SSH
- name: SSH | Get active system users
shell: >
getent group algo | cut -f4 -d: | sed "s/,/\n/g"
register: valid_users
when: ssh_tunneling_enabled is defined and ssh_tunneling_enabled == "y"
- name: SSH | Delete non-existing users
user:
name: "{{ item }}"
state: absent
remove: yes
force: yes
when: item not in users and ssh_tunneling_enabled is defined and ssh_tunneling_enabled == "y"
with_items: "{{ valid_users.stdout_lines }}"
- name: SSH | Fetch users SSH private keys
fetch: src='/var/jail/{{ item }}/.ssh/id_rsa' dest=configs/{{ IP_subject_alt_name }}_{{ item }}.ssh.pem flat=yes
with_items: "{{ users }}"