algo/vpn.yml

171 lines
6.3 KiB
YAML
Raw Normal View History

2016-07-11 16:09:14 +00:00
---
2016-05-31 00:45:34 +00:00
2016-07-17 17:56:26 +00:00
- name: VPN Configuration
2016-05-31 00:45:34 +00:00
hosts: vpn-host
gather_facts: false
2016-07-30 16:05:04 +00:00
become: true
2016-07-11 21:51:31 +00:00
vars_files:
- config.cfg
2016-05-31 00:45:34 +00:00
2016-05-15 15:06:03 +00:00
tasks:
2016-07-17 17:56:26 +00:00
- name: Install StrongSwan
apt: name=strongswan state=latest update_cache=yes
2016-05-31 00:45:34 +00:00
2016-07-17 17:56:26 +00:00
- name: Enforcing ipsec with apparmor
shell: aa-enforce "{{ item }}"
with_items:
- /usr/lib/ipsec/charon
- /usr/lib/ipsec/lookip
- /usr/lib/ipsec/stroke
notify:
- restart apparmor
2016-05-31 00:45:34 +00:00
2016-07-17 17:56:26 +00:00
- name: Enable services
service: name={{ item }} enabled=yes
with_items:
- apparmor
- strongswan
- netfilter-persistent
2016-05-15 15:06:03 +00:00
2016-07-17 17:56:26 +00:00
- name: Configure iptables so IPSec traffic can traverse the tunnel
iptables: table=nat chain=POSTROUTING source=10.0.0.0/24 jump=MASQUERADE
notify:
- save iptables
2016-07-12 07:00:46 +00:00
- name: Setup the ipsec.conf file from our template
template: src=ipsec.conf.j2 dest=/etc/ipsec.conf owner=root group=root mode=644
notify:
- restart strongswan
2016-05-15 16:12:17 +00:00
2016-07-17 17:56:26 +00:00
- name: Setup the ipsec.secrets file
2016-07-12 07:00:46 +00:00
template: src=ipsec.secrets.j2 dest=/etc/ipsec.secrets owner=root group=root mode=600
notify:
- restart strongswan
2016-07-11 21:51:31 +00:00
- name: Fetch easy-rsa-ipsec from git
2016-07-17 17:56:26 +00:00
git: repo=git://github.com/ValdikSS/easy-rsa-ipsec.git dest="{{ easyrsa_dir }}"
2016-07-11 21:51:31 +00:00
- name: Setup the vars file from our template
template: src=easy-rsa.vars.j2 dest={{ easyrsa_dir }}/easyrsa3/vars
- name: Ensure the pki directory is not exist
file: dest={{ easyrsa_dir }}/easyrsa3/pki state=absent
when: easyrsa_reinit_existent == True
- name: Build the pki enviroments
2016-07-27 21:27:11 +00:00
shell: >
./easyrsa init-pki &&
2016-07-30 17:26:30 +00:00
touch '{{ easyrsa_dir }}/easyrsa3/pki/pki_initialized'
2016-07-11 21:51:31 +00:00
args:
chdir: '{{ easyrsa_dir }}/easyrsa3/'
creates: '{{ easyrsa_dir }}/easyrsa3/pki/pki_initialized'
- name: Build the CA pair
2016-07-27 21:27:11 +00:00
shell: >
./easyrsa build-ca nopass &&
2016-07-11 21:51:31 +00:00
touch {{ easyrsa_dir }}/easyrsa3/pki/ca_initialized
args:
chdir: '{{ easyrsa_dir }}/easyrsa3/'
creates: '{{ easyrsa_dir }}/easyrsa3/pki/ca_initialized'
notify:
- restart strongswan
2016-07-21 19:42:34 +00:00
- name: Build the server pair # TODO: IP and DNS for certificate
2016-07-27 21:27:11 +00:00
shell: >
./easyrsa build-server-full {{ server_name }} nopass &&
2016-07-11 21:51:31 +00:00
touch '{{ easyrsa_dir }}/easyrsa3/pki/server_initialized'
args:
chdir: '{{ easyrsa_dir }}/easyrsa3/'
creates: '{{ easyrsa_dir }}/easyrsa3/pki/server_initialized'
notify:
- restart strongswan
- name: Build the client's pair
2016-07-27 21:27:11 +00:00
shell: >
./easyrsa build-client-full {{ item }} nopass &&
2016-07-11 21:51:31 +00:00
touch '{{ easyrsa_dir }}/easyrsa3/pki/{{ item }}_initialized'
args:
chdir: '{{ easyrsa_dir }}/easyrsa3/'
creates: '{{ easyrsa_dir }}/easyrsa3/pki/{{ item }}_initialized'
with_items: "{{ users }}"
- name: Build the client's p12
2016-07-27 21:27:11 +00:00
shell: >
openssl pkcs12 -in {{ easyrsa_dir }}/easyrsa3//pki/issued/{{ item }}.crt -inkey {{ easyrsa_dir }}/easyrsa3//pki/private/{{ item }}.key -export -name {{ item }} -out /{{ easyrsa_dir }}/easyrsa3//pki/private/{{ item }}.p12 -certfile {{ easyrsa_dir }}/easyrsa3//pki/ca.crt -passout pass:{{ easyrsa_p12_export_password }} &&
2016-07-11 21:51:31 +00:00
touch '{{ easyrsa_dir }}/easyrsa3/pki/{{ item }}_p12_initialized'
args:
chdir: '{{ easyrsa_dir }}/easyrsa3/'
creates: '{{ easyrsa_dir }}/easyrsa3/pki/{{ item }}_p12_initialized'
with_items: "{{ users }}"
2016-07-21 19:38:23 +00:00
2016-07-17 17:56:26 +00:00
- name: Copy the CA cert to the strongswan directory
2016-07-11 21:51:31 +00:00
copy: remote_src=True src='{{ easyrsa_dir }}/easyrsa3/pki/ca.crt' dest=/etc/ipsec.d/cacerts/ca.crt owner=root group=root mode=0600
notify:
- restart strongswan
2016-07-17 17:56:26 +00:00
- name: Copy the server cert to the strongswan directory
2016-07-11 21:51:31 +00:00
copy: remote_src=True src='{{ easyrsa_dir }}/easyrsa3/pki/issued/{{ server_name }}.crt' dest=/etc/ipsec.d/certs/{{ server_name }}.crt owner=root group=root mode=0600
notify:
- restart strongswan
2016-07-17 17:56:26 +00:00
- name: Copy the server key to the strongswan directory
2016-07-11 21:51:31 +00:00
copy: remote_src=True src='{{ easyrsa_dir }}/easyrsa3/pki/private/{{ server_name }}.key' dest=/etc/ipsec.d/private/{{ server_name }}.key owner=root group=root mode=0600
notify:
- restart strongswan
2016-07-21 19:38:23 +00:00
- name: Register p12 PayloadContent
shell: >
cat /{{ easyrsa_dir }}/easyrsa3//pki/private/{{ item }}.p12 | base64
register: PayloadContent
with_items: "{{ users }}"
- name: Register CA PayloadContent
shell: >
cat /{{ easyrsa_dir }}/easyrsa3/pki/ca.crt | base64
register: PayloadContentCA
- name: Build the mobileconfigs
template: src=mobileconfig.j2 dest=/{{ easyrsa_dir }}/easyrsa3//pki/private/{{ item.0 }}.mobileconfig mode=0600
with_together:
- "{{ users }}"
- "{{ PayloadContent.results }}"
2016-07-21 19:51:41 +00:00
no_log: True
2016-07-21 19:38:23 +00:00
- name: Fetch users P12
2016-07-21 19:39:35 +00:00
fetch: src=/{{ easyrsa_dir }}/easyrsa3//pki/private/{{ item }}.p12 dest=configs/{{ server_name }}_{{ item }}.p12 flat=yes
2016-07-21 19:38:23 +00:00
with_items: "{{ users }}"
- name: Fetch users mobileconfig
2016-07-21 19:39:35 +00:00
fetch: src=/{{ easyrsa_dir }}/easyrsa3//pki/private/{{ item }}.mobileconfig dest=configs/{{ server_name }}_{{ item }}.mobileconfig flat=yes
2016-07-21 19:38:23 +00:00
with_items: "{{ users }}"
- name: Fetch server CA certificate
2016-07-21 19:39:35 +00:00
fetch: src=/{{ easyrsa_dir }}/easyrsa3/pki/ca.crt dest=configs/{{ server_name }}_ca.crt flat=yes
2016-07-11 21:51:31 +00:00
2016-07-27 21:27:11 +00:00
- name: Add server to the inventory file
2016-07-30 18:54:52 +00:00
local_action: lineinfile dest=inventory_users line="{{ inventory_hostname }}" insertafter='\[user-management\]\n' state=present
become: false
notify:
- congrats
2016-07-27 21:27:11 +00:00
2016-07-11 21:51:31 +00:00
handlers:
- name: restart strongswan
service: name=strongswan state=restarted
2016-07-17 17:56:26 +00:00
- name: restart apparmor
2016-07-21 19:38:23 +00:00
service: name=apparmor state=restarted
- name: save iptables
command: service netfilter-persistent save
- name: congrats
debug:
msg:
- "#----------------------------------------------------------------------#"
- "# Congratulations! #"
- "# Your IPsec server is running. #"
- "# Config files and X.509 certificates in the directory: ./configs/ #"
- "# After connect go to https://www.dnsleaktest.com/ #"
- "# and ensure that all your traffic passes through the VPN. #"
- "#----------------------------------------------------------------------#"