algo/vpn.yml

147 lines
5.2 KiB
YAML
Raw Normal View History

2016-07-11 16:09:14 +00:00
---
2016-05-31 00:45:34 +00:00
2016-07-17 17:56:26 +00:00
- name: VPN Configuration
2016-05-31 00:45:34 +00:00
hosts: vpn-host
gather_facts: false
remote_user: root
2016-07-11 21:51:31 +00:00
vars_files:
- config.cfg
2016-05-31 00:45:34 +00:00
2016-05-15 15:06:03 +00:00
tasks:
2016-07-17 17:56:26 +00:00
- name: Install StrongSwan
apt: name=strongswan state=latest update_cache=yes
2016-05-31 00:45:34 +00:00
2016-07-17 17:56:26 +00:00
- name: Enforcing ipsec with apparmor
shell: aa-enforce "{{ item }}"
with_items:
- /usr/lib/ipsec/charon
- /usr/lib/ipsec/lookip
- /usr/lib/ipsec/stroke
notify:
- restart apparmor
2016-05-31 00:45:34 +00:00
2016-07-17 17:56:26 +00:00
- name: Enable services
service: name={{ item }} enabled=yes
with_items:
- apparmor
- strongswan
2016-05-15 15:06:03 +00:00
2016-07-17 17:56:26 +00:00
- name: Configure iptables so IPSec traffic can traverse the tunnel
iptables: table=nat chain=POSTROUTING source=10.0.0.0/24 jump=MASQUERADE
2016-05-15 16:12:17 +00:00
2016-07-12 07:00:46 +00:00
- name: Setup the ipsec.conf file from our template
template: src=ipsec.conf.j2 dest=/etc/ipsec.conf owner=root group=root mode=644
notify:
- restart strongswan
2016-05-15 16:12:17 +00:00
2016-07-17 17:56:26 +00:00
- name: Setup the ipsec.secrets file
2016-07-12 07:00:46 +00:00
template: src=ipsec.secrets.j2 dest=/etc/ipsec.secrets owner=root group=root mode=600
notify:
- restart strongswan
2016-07-11 21:51:31 +00:00
2016-07-17 17:56:26 +00:00
- name: Fetch easy-rsa-ipsec repo
git: repo=git://github.com/ValdikSS/easy-rsa-ipsec.git dest="{{ easyrsa_dir }}"
2016-07-11 21:51:31 +00:00
- name: Setup the vars file from our template
template: src=easy-rsa.vars.j2 dest={{ easyrsa_dir }}/easyrsa3/vars
- name: Ensure the pki directory is not exist
file: dest={{ easyrsa_dir }}/easyrsa3/pki state=absent
when: easyrsa_reinit_existent == True
- name: Build the pki enviroments
shell: |
./easyrsa init-pki
touch '{{ easyrsa_dir }}/easyrsa3/pki/pki_initialized'
args:
chdir: '{{ easyrsa_dir }}/easyrsa3/'
creates: '{{ easyrsa_dir }}/easyrsa3/pki/pki_initialized'
- name: Build the CA pair
shell: |
./easyrsa build-ca nopass
touch {{ easyrsa_dir }}/easyrsa3/pki/ca_initialized
args:
chdir: '{{ easyrsa_dir }}/easyrsa3/'
creates: '{{ easyrsa_dir }}/easyrsa3/pki/ca_initialized'
notify:
- restart strongswan
2016-07-21 19:38:23 +00:00
- name: Build the server pair # TODO: IP and DNS for sertificate
2016-07-11 21:51:31 +00:00
shell: |
2016-07-17 17:56:26 +00:00
./easyrsa build-server-full {{ server_name }} nopass
2016-07-11 21:51:31 +00:00
touch '{{ easyrsa_dir }}/easyrsa3/pki/server_initialized'
args:
chdir: '{{ easyrsa_dir }}/easyrsa3/'
creates: '{{ easyrsa_dir }}/easyrsa3/pki/server_initialized'
notify:
- restart strongswan
- name: Build the client's pair
shell: |
2016-07-17 17:56:26 +00:00
./easyrsa build-client-full {{ item }} nopass
2016-07-11 21:51:31 +00:00
touch '{{ easyrsa_dir }}/easyrsa3/pki/{{ item }}_initialized'
args:
chdir: '{{ easyrsa_dir }}/easyrsa3/'
creates: '{{ easyrsa_dir }}/easyrsa3/pki/{{ item }}_initialized'
with_items: "{{ users }}"
- name: Build the client's p12
shell: |
2016-07-21 19:38:23 +00:00
openssl pkcs12 -in {{ easyrsa_dir }}/easyrsa3//pki/issued/{{ item }}.crt -inkey {{ easyrsa_dir }}/easyrsa3//pki/private/{{ item }}.key -export -name {{ item }} -out /{{ easyrsa_dir }}/easyrsa3//pki/private/{{ item }}.p12 -certfile {{ easyrsa_dir }}/easyrsa3//pki/ca.crt -passout pass:{{ easyrsa_p12_export_password }}
2016-07-11 21:51:31 +00:00
touch '{{ easyrsa_dir }}/easyrsa3/pki/{{ item }}_p12_initialized'
args:
chdir: '{{ easyrsa_dir }}/easyrsa3/'
creates: '{{ easyrsa_dir }}/easyrsa3/pki/{{ item }}_p12_initialized'
with_items: "{{ users }}"
2016-07-21 19:38:23 +00:00
2016-07-17 17:56:26 +00:00
- name: Copy the CA cert to the strongswan directory
2016-07-11 21:51:31 +00:00
copy: remote_src=True src='{{ easyrsa_dir }}/easyrsa3/pki/ca.crt' dest=/etc/ipsec.d/cacerts/ca.crt owner=root group=root mode=0600
notify:
- restart strongswan
2016-07-17 17:56:26 +00:00
- name: Copy the server cert to the strongswan directory
2016-07-11 21:51:31 +00:00
copy: remote_src=True src='{{ easyrsa_dir }}/easyrsa3/pki/issued/{{ server_name }}.crt' dest=/etc/ipsec.d/certs/{{ server_name }}.crt owner=root group=root mode=0600
notify:
- restart strongswan
2016-07-17 17:56:26 +00:00
- name: Copy the server key to the strongswan directory
2016-07-11 21:51:31 +00:00
copy: remote_src=True src='{{ easyrsa_dir }}/easyrsa3/pki/private/{{ server_name }}.key' dest=/etc/ipsec.d/private/{{ server_name }}.key owner=root group=root mode=0600
notify:
- restart strongswan
2016-07-21 19:38:23 +00:00
- name: Register p12 PayloadContent
shell: >
cat /{{ easyrsa_dir }}/easyrsa3//pki/private/{{ item }}.p12 | base64
register: PayloadContent
with_items: "{{ users }}"
- name: Register CA PayloadContent
shell: >
cat /{{ easyrsa_dir }}/easyrsa3/pki/ca.crt | base64
register: PayloadContentCA
- name: Build the mobileconfigs
template: src=mobileconfig.j2 dest=/{{ easyrsa_dir }}/easyrsa3//pki/private/{{ item.0 }}.mobileconfig mode=0600
with_together:
- "{{ users }}"
- "{{ PayloadContent.results }}"
- name: Fetch users P12
fetch: src=/{{ easyrsa_dir }}/easyrsa3//pki/private/{{ item }}.p12 dest=users/{{ server_name }}_{{ item }}.p12 flat=yes
with_items: "{{ users }}"
- name: Fetch users mobileconfig
fetch: src=/{{ easyrsa_dir }}/easyrsa3//pki/private/{{ item }}.mobileconfig dest=users/{{ server_name }}_{{ item }}.mobileconfig flat=yes
with_items: "{{ users }}"
- name: Fetch server CA certificate
fetch: src=/{{ easyrsa_dir }}/easyrsa3/pki/ca.crt dest=users/{{ server_name }}_ca.crt flat=yes
2016-07-11 21:51:31 +00:00
handlers:
- name: restart strongswan
service: name=strongswan state=restarted
2016-07-17 17:56:26 +00:00
- name: restart apparmor
2016-07-21 19:38:23 +00:00
service: name=apparmor state=restarted