--- - name: Set OS specific facts set_fact: strongswan_additional_plugins: [] - name: Ubuntu | Install strongSwan apt: name: strongswan state: present update_cache: yes install_recommends: yes - block: # https://bugs.launchpad.net/ubuntu/+source/strongswan/+bug/1826238 - name: Ubuntu | Charon profile for apparmor configured copy: dest: /etc/apparmor.d/local/usr.lib.ipsec.charon content: ' capability setpcap,' owner: root group: root mode: 0644 notify: restart strongswan - name: Ubuntu | Enforcing ipsec with apparmor command: aa-enforce "{{ item }}" changed_when: false with_items: - /usr/lib/ipsec/charon - /usr/lib/ipsec/lookip - /usr/lib/ipsec/stroke tags: apparmor when: apparmor_enabled|default(false)|bool - name: Ubuntu | Enable services service: name={{ item }} enabled=yes with_items: - apparmor - "{{ strongswan_service }}" - netfilter-persistent - name: Ubuntu | Ensure that the strongswan service directory exists file: path: /etc/systemd/system/{{ strongswan_service }}.service.d/ state: directory mode: 0755 owner: root group: root - name: Ubuntu | Setup the cgroup limitations for the ipsec daemon template: src: 100-CustomLimitations.conf.j2 dest: /etc/systemd/system/{{ strongswan_service }}.service.d/100-CustomLimitations.conf notify: - daemon-reload - restart strongswan