Compare commits
No commits in common. "7e02d120b58eee2b82e77e1ec617a46f9b8c60e1" and "b9be376f13981c899c6d0b973ea1190e9fa21f4d" have entirely different histories.
7e02d120b5
...
b9be376f13
14 changed files with 281 additions and 165 deletions
|
|
@ -1,6 +1,5 @@
|
||||||
[defaults]
|
[defaults]
|
||||||
roles_path = ./roles
|
roles_path = ./roles
|
||||||
ask_vault_pass = True
|
|
||||||
|
|
||||||
[privilege_escalation]
|
[privilege_escalation]
|
||||||
become_ask_pass = True
|
become_ask_pass = True
|
||||||
|
|
|
||||||
60
playbook.yml
60
playbook.yml
|
|
@ -1,56 +1,24 @@
|
||||||
- name: Provision debian server
|
- hosts: localhost
|
||||||
hosts: localhost
|
|
||||||
pre_tasks:
|
pre_tasks:
|
||||||
- name: Install shared packages
|
- name: install shared packages
|
||||||
become: true
|
become: true
|
||||||
ansible.builtin.apt:
|
apt:
|
||||||
name: '{{ packages }}'
|
name: '{{ packages }}'
|
||||||
roles:
|
roles:
|
||||||
- common
|
- common
|
||||||
tasks:
|
tasks:
|
||||||
- name: Generic provisioning
|
- import_tasks: 'tasks/setup.yml'
|
||||||
ansible.builtin.import_tasks: 'tasks/setup.yml'
|
- import_tasks: 'tasks/network.yml'
|
||||||
tags: setup
|
- import_tasks: 'tasks/wireguard.yml'
|
||||||
|
- import_tasks: 'tasks/wireguard_media.yml'
|
||||||
- name: Network provisioning
|
- import_tasks: 'tasks/docker.yml'
|
||||||
ansible.builtin.import_tasks: 'tasks/network.yml'
|
- import_tasks: 'tasks/radicale.yml'
|
||||||
tags: network
|
- import_tasks: 'tasks/syncthing.yml'
|
||||||
|
- import_tasks: 'tasks/transmission.yml'
|
||||||
- name: Wireguard provisioning
|
- import_tasks: 'tasks/mpd.yml'
|
||||||
ansible.builtin.import_tasks: 'tasks/wireguard.yml'
|
- import_tasks: 'tasks/nginx.yml'
|
||||||
tags: wireguard
|
|
||||||
|
|
||||||
- name: Wireguard media provisioning
|
|
||||||
ansible.builtin.import_tasks: 'tasks/wireguard_media.yml'
|
|
||||||
tags: wireguard-media
|
|
||||||
|
|
||||||
- name: Docker provisioning
|
|
||||||
ansible.builtin.import_tasks: 'tasks/docker.yml'
|
|
||||||
tags: docker
|
|
||||||
|
|
||||||
- name: Radicale provisioning
|
|
||||||
ansible.builtin.import_tasks: 'tasks/radicale.yml'
|
|
||||||
tags: radicale
|
|
||||||
|
|
||||||
- name: Syncthing provisioning
|
|
||||||
ansible.builtin.import_tasks: 'tasks/syncthing.yml'
|
|
||||||
tags: syncthing
|
|
||||||
|
|
||||||
- name: Transmission provisioning
|
|
||||||
ansible.builtin.import_tasks: 'tasks/transmission.yml'
|
|
||||||
tags: transmission
|
|
||||||
|
|
||||||
- name: MPD provisioning
|
|
||||||
ansible.builtin.import_tasks: 'tasks/mpd.yml'
|
|
||||||
tags: mpd
|
|
||||||
|
|
||||||
- name: NGINX provisioning
|
|
||||||
ansible.builtin.import_tasks: 'tasks/nginx.yml'
|
|
||||||
tags: nginx
|
|
||||||
|
|
||||||
handlers:
|
handlers:
|
||||||
- name: Import handlers
|
- import_tasks: 'handlers.yml'
|
||||||
ansible.builtin.import_tasks: 'handlers.yml'
|
|
||||||
vars_files:
|
vars_files:
|
||||||
- 'vars/main.yml'
|
- 'vars/main.yml'
|
||||||
- 'vars/nginx.yml'
|
- 'vars/nginx.yml'
|
||||||
|
|
|
||||||
130
session
Normal file
130
session
Normal file
|
|
@ -0,0 +1,130 @@
|
||||||
|
let SessionLoad = 1
|
||||||
|
let s:so_save = &g:so | let s:siso_save = &g:siso | setg so=0 siso=0 | setl so=-1 siso=-1
|
||||||
|
let v:this_session=expand("<sfile>:p")
|
||||||
|
silent only
|
||||||
|
silent tabonly
|
||||||
|
cd ~/development/ansible/debian-setup
|
||||||
|
if expand('%') == '' && !&modified && line('$') <= 1 && getline(1) == ''
|
||||||
|
let s:wipebuf = bufnr('%')
|
||||||
|
endif
|
||||||
|
let s:shortmess_save = &shortmess
|
||||||
|
if &shortmess =~ 'A'
|
||||||
|
set shortmess=aoOA
|
||||||
|
else
|
||||||
|
set shortmess=aoO
|
||||||
|
endif
|
||||||
|
badd +15 playbook.yml
|
||||||
|
badd +35 ~/development/ansible/debian-setup/tasks/setup.yml
|
||||||
|
badd +0 templates/apt.j2
|
||||||
|
badd +13 vars/main.yml
|
||||||
|
argglobal
|
||||||
|
%argdel
|
||||||
|
$argadd playbook.yml
|
||||||
|
edit ~/development/ansible/debian-setup/tasks/setup.yml
|
||||||
|
let s:save_splitbelow = &splitbelow
|
||||||
|
let s:save_splitright = &splitright
|
||||||
|
set splitbelow splitright
|
||||||
|
wincmd _ | wincmd |
|
||||||
|
vsplit
|
||||||
|
1wincmd h
|
||||||
|
wincmd w
|
||||||
|
wincmd _ | wincmd |
|
||||||
|
split
|
||||||
|
1wincmd k
|
||||||
|
wincmd w
|
||||||
|
let &splitbelow = s:save_splitbelow
|
||||||
|
let &splitright = s:save_splitright
|
||||||
|
wincmd t
|
||||||
|
let s:save_winminheight = &winminheight
|
||||||
|
let s:save_winminwidth = &winminwidth
|
||||||
|
set winminheight=0
|
||||||
|
set winheight=1
|
||||||
|
set winminwidth=0
|
||||||
|
set winwidth=1
|
||||||
|
exe 'vert 1resize ' . ((&columns * 30 + 82) / 164)
|
||||||
|
exe '2resize ' . ((&lines * 42 + 43) / 87)
|
||||||
|
exe 'vert 2resize ' . ((&columns * 133 + 82) / 164)
|
||||||
|
exe '3resize ' . ((&lines * 42 + 43) / 87)
|
||||||
|
exe 'vert 3resize ' . ((&columns * 133 + 82) / 164)
|
||||||
|
argglobal
|
||||||
|
enew
|
||||||
|
file NvimTree_1
|
||||||
|
balt playbook.yml
|
||||||
|
setlocal fdm=manual
|
||||||
|
setlocal fde=v:lua.vim.treesitter.foldexpr()
|
||||||
|
setlocal fmr={{{,}}}
|
||||||
|
setlocal fdi=#
|
||||||
|
setlocal fdl=99
|
||||||
|
setlocal fml=1
|
||||||
|
setlocal fdn=20
|
||||||
|
setlocal nofen
|
||||||
|
wincmd w
|
||||||
|
argglobal
|
||||||
|
balt vars/main.yml
|
||||||
|
setlocal fdm=expr
|
||||||
|
setlocal fde=v:lua.vim.treesitter.foldexpr()
|
||||||
|
setlocal fmr={{{,}}}
|
||||||
|
setlocal fdi=#
|
||||||
|
setlocal fdl=99
|
||||||
|
setlocal fml=1
|
||||||
|
setlocal fdn=20
|
||||||
|
setlocal fen
|
||||||
|
1
|
||||||
|
normal! zo
|
||||||
|
11
|
||||||
|
normal! zo
|
||||||
|
21
|
||||||
|
normal! zo
|
||||||
|
let s:l = 32 - ((31 * winheight(0) + 21) / 42)
|
||||||
|
if s:l < 1 | let s:l = 1 | endif
|
||||||
|
keepjumps exe s:l
|
||||||
|
normal! zt
|
||||||
|
keepjumps 32
|
||||||
|
normal! 0
|
||||||
|
wincmd w
|
||||||
|
argglobal
|
||||||
|
if bufexists(fnamemodify("templates/apt.j2", ":p")) | buffer templates/apt.j2 | else | edit templates/apt.j2 | endif
|
||||||
|
if &buftype ==# 'terminal'
|
||||||
|
silent file templates/apt.j2
|
||||||
|
endif
|
||||||
|
balt playbook.yml
|
||||||
|
setlocal fdm=expr
|
||||||
|
setlocal fde=v:lua.vim.treesitter.foldexpr()
|
||||||
|
setlocal fmr={{{,}}}
|
||||||
|
setlocal fdi=#
|
||||||
|
setlocal fdl=99
|
||||||
|
setlocal fml=1
|
||||||
|
setlocal fdn=20
|
||||||
|
setlocal fen
|
||||||
|
let s:l = 50 - ((41 * winheight(0) + 21) / 42)
|
||||||
|
if s:l < 1 | let s:l = 1 | endif
|
||||||
|
keepjumps exe s:l
|
||||||
|
normal! zt
|
||||||
|
keepjumps 50
|
||||||
|
normal! 0
|
||||||
|
wincmd w
|
||||||
|
2wincmd w
|
||||||
|
exe 'vert 1resize ' . ((&columns * 30 + 82) / 164)
|
||||||
|
exe '2resize ' . ((&lines * 42 + 43) / 87)
|
||||||
|
exe 'vert 2resize ' . ((&columns * 133 + 82) / 164)
|
||||||
|
exe '3resize ' . ((&lines * 42 + 43) / 87)
|
||||||
|
exe 'vert 3resize ' . ((&columns * 133 + 82) / 164)
|
||||||
|
tabnext 1
|
||||||
|
if exists('s:wipebuf') && len(win_findbuf(s:wipebuf)) == 0 && getbufvar(s:wipebuf, '&buftype') isnot# 'terminal'
|
||||||
|
silent exe 'bwipe ' . s:wipebuf
|
||||||
|
endif
|
||||||
|
unlet! s:wipebuf
|
||||||
|
set winheight=1 winwidth=20
|
||||||
|
let &shortmess = s:shortmess_save
|
||||||
|
let &winminheight = s:save_winminheight
|
||||||
|
let &winminwidth = s:save_winminwidth
|
||||||
|
let s:sx = expand("<sfile>:p:r")."x.vim"
|
||||||
|
if filereadable(s:sx)
|
||||||
|
exe "source " . fnameescape(s:sx)
|
||||||
|
endif
|
||||||
|
let &g:so = s:so_save | let &g:siso = s:siso_save
|
||||||
|
set hlsearch
|
||||||
|
nohlsearch
|
||||||
|
doautoall SessionLoadPost
|
||||||
|
unlet SessionLoad
|
||||||
|
" vim: set ft=vim :
|
||||||
|
|
@ -1,76 +1,90 @@
|
||||||
- name: Copy Wireguard configuration files
|
- name: load private key into var
|
||||||
|
set_fact:
|
||||||
|
vpn_server_key: '{{ lookup("file", "files/wireguard/default/server.key" ) }}'
|
||||||
|
|
||||||
|
- name: load public key into var
|
||||||
|
set_fact:
|
||||||
|
vpn_server_public_key: '{{ lookup("file", "files/wireguard/default/server.pub" ) }}'
|
||||||
|
|
||||||
|
# this should eventually be replaced with using the
|
||||||
|
# PrivateKeyFile/PresharedKeyFile options
|
||||||
|
- name: load preshared keys into variables
|
||||||
|
set_fact:
|
||||||
|
vpn_peers: '{{ vpn_peers | combine({item.key: item.value|combine({"preshared_key": lookup("file", item.value.preshared_key_source_path )})})}}'
|
||||||
|
with_dict: '{{ vpn_peers }}'
|
||||||
|
|
||||||
|
- name: load mobile private_key
|
||||||
|
set_fact:
|
||||||
|
vpn_peers: '{{ vpn_peers | combine({item.key: item.value|combine({"private_key": lookup("file", item.value.private_key_source_path )})})}}'
|
||||||
|
with_dict: '{{ vpn_peers }}'
|
||||||
|
when: item.key == "mobile"
|
||||||
|
|
||||||
|
- name: copy wireguard configuration files
|
||||||
become: true
|
become: true
|
||||||
ansible.builtin.template:
|
template:
|
||||||
src: '{{ item.src }}'
|
src: '{{ item.src }}'
|
||||||
dest: '{{ item.dest }}'
|
dest: '{{ item.dest }}'
|
||||||
owner: root
|
owner: root
|
||||||
group: systemd-network
|
group: systemd-network
|
||||||
mode: '0640'
|
mode: '0640'
|
||||||
loop:
|
loop:
|
||||||
- src: 'templates/network/wireguard/default/wg0.netdev.j2'
|
- { src: 'templates/network/wireguard/default/wg0.netdev.j2', dest: '/etc/systemd/network/wg0.netdev' }
|
||||||
dest: '/etc/systemd/network/wg0.netdev'
|
- {
|
||||||
- src: 'templates/network/wireguard/default/wg0.network.j2'
|
src: 'templates/network/wireguard/default/wg0.network.j2',
|
||||||
dest: '/etc/systemd/network/wg0.network'
|
dest: '/etc/systemd/network/wg0.network',
|
||||||
|
}
|
||||||
notify: restart systemd-networkd
|
notify: restart systemd-networkd
|
||||||
|
|
||||||
- name: Create Wireguard directories
|
- name: copy mobile configuration
|
||||||
|
template:
|
||||||
|
src: 'templates/network/wireguard/default/mobile.wireguard.j2'
|
||||||
|
dest: '/tmp/mobile.conf'
|
||||||
|
mode: '0600'
|
||||||
|
when: copy_vpn_configurations
|
||||||
|
|
||||||
|
- name: create wireguard directories
|
||||||
become: true
|
become: true
|
||||||
ansible.builtin.file:
|
file:
|
||||||
path: '{{ item | dirname }}'
|
path: '{{ item | dirname }}'
|
||||||
owner: root
|
owner: root
|
||||||
group: systemd-network
|
group: systemd-network
|
||||||
mode: '0640'
|
mode: '0640'
|
||||||
state: directory
|
state: directory
|
||||||
recurse: true
|
|
||||||
loop:
|
loop:
|
||||||
- '{{ vpn_key_directory }}'
|
- '{{ vpn_server_key_path }}'
|
||||||
|
- '{{ vpn_server_public_key_path }}'
|
||||||
|
|
||||||
- name: Copy Wireguard server credentials
|
- name: copy wireguard credentials
|
||||||
become: true
|
become: true
|
||||||
ansible.builtin.copy:
|
copy:
|
||||||
src: '{{ item.src }}'
|
src: '{{ item.src }}'
|
||||||
dest: '{{ item.dest }}'
|
dest: '{{ item.dest }}'
|
||||||
owner: root
|
owner: root
|
||||||
group: systemd-network
|
group: systemd-network
|
||||||
mode: '0640'
|
mode: '0640'
|
||||||
loop:
|
loop:
|
||||||
- src: 'files/wireguard/default/server.pub'
|
- { src: 'files/wireguard/default/server.pub', dest: '{{ vpn_server_public_key_path }}' }
|
||||||
dest: '{{ vpn_server_public_key_path }}'
|
- { src: 'files/wireguard/default/server.key', dest: '{{ vpn_server_key_path }}' }
|
||||||
- src: 'files/wireguard/default/server.key'
|
|
||||||
dest: '{{ vpn_server_key_path }}'
|
|
||||||
notify: restart systemd-networkd
|
|
||||||
|
|
||||||
- name: Copy Wireguard mobile credentials
|
- name: copy mobile wireguard credentials
|
||||||
become: true
|
become: true
|
||||||
ansible.builtin.copy:
|
copy:
|
||||||
src: '{{ item.src }}'
|
src: '{{ item.src }}'
|
||||||
dest: '{{ item.dest }}'
|
dest: '{{ item.dest }}'
|
||||||
owner: root
|
owner: root
|
||||||
group: systemd-network
|
group: systemd-network
|
||||||
mode: '0640'
|
mode: '0640'
|
||||||
loop:
|
loop:
|
||||||
- src: 'files/wireguard/default/mobile.pub'
|
- { src: 'files/wireguard/default/mobile.pub', dest: '{{ vpn_server_public_key_path|dirname }}/mobile.pub' }
|
||||||
dest: '{{ vpn_key_directory }}/public/mobile.pub'
|
- { src: 'files/wireguard/default/mobile.key', dest: '{{ vpn_server_key_path|dirname }}/mobile.key' }
|
||||||
- src: 'files/wireguard/default/mobile.key'
|
|
||||||
dest: '{{ vpn_key_directory }}/private/mobile.key'
|
|
||||||
notify: restart systemd-networkd
|
|
||||||
|
|
||||||
- name: Copy Wireguard preshared keys
|
- name: copy wireguard preshared keys
|
||||||
become: true
|
become: true
|
||||||
ansible.builtin.copy:
|
copy:
|
||||||
src: '{{ item.value.preshared_key_source_path }}'
|
src: '{{ item.value.preshared_key_source_path }}'
|
||||||
dest: '{{ item.value.preshared_key_path }}'
|
dest: '{{ item.value.preshared_key_path }}'
|
||||||
owner: root
|
owner: root
|
||||||
group: systemd-network
|
group: systemd-network
|
||||||
mode: '0640'
|
mode: '0640'
|
||||||
with_dict: '{{ vpn_peers }}'
|
with_dict: '{{ vpn_peers }}'
|
||||||
notify: restart systemd-networkd
|
|
||||||
|
|
||||||
- name: Copy Wireguard mobile configuration
|
|
||||||
become: true
|
|
||||||
ansible.builtin.template:
|
|
||||||
src: 'templates/network/wireguard/default/mobile.wireguard.j2'
|
|
||||||
dest: '/tmp/mobile.conf'
|
|
||||||
mode: '0600'
|
|
||||||
owner: '{{ ansible_user_id }}'
|
|
||||||
when: copy_vpn_configurations
|
|
||||||
|
|
|
||||||
|
|
@ -1,88 +1,97 @@
|
||||||
- name: Copy Wireguard media configuration files
|
- name: load media private key into var
|
||||||
|
set_fact:
|
||||||
|
vpn_media_server_key: '{{ lookup("file", "files/wireguard/media/server.key" ) }}'
|
||||||
|
|
||||||
|
- name: load media public key into var
|
||||||
|
set_fact:
|
||||||
|
vpn_media_server_public_key: '{{ lookup("file", "files/wireguard/media/server.pub" ) }}'
|
||||||
|
|
||||||
|
# this should eventually be replaced with using the
|
||||||
|
# PrivateKeyFile/PresharedKeyFile options
|
||||||
|
- name: load preshared media keys into variables
|
||||||
|
set_fact:
|
||||||
|
vpn_media_peers: '{{ vpn_media_peers | combine({item.key: item.value|combine({"preshared_key": lookup("file", item.value.preshared_key_source_path )})})}}'
|
||||||
|
with_dict: '{{ vpn_media_peers }}'
|
||||||
|
|
||||||
|
- name: load external media private_keys
|
||||||
|
set_fact:
|
||||||
|
vpn_media_peers: '{{ vpn_media_peers | combine({item.key: item.value|combine({"private_key": lookup("file", item.value.private_key_source_path )})})}}'
|
||||||
|
with_dict: '{{ vpn_media_peers }}'
|
||||||
|
when: item.key in ['mobile_peer_1', 'mobile_peer_2', 'tv']
|
||||||
|
|
||||||
|
- name: copy wireguard media configuration files
|
||||||
become: true
|
become: true
|
||||||
ansible.builtin.template:
|
template:
|
||||||
src: '{{ item.src }}'
|
src: '{{ item.src }}'
|
||||||
dest: '{{ item.dest }}'
|
dest: '{{ item.dest }}'
|
||||||
owner: root
|
owner: root
|
||||||
group: systemd-network
|
group: systemd-network
|
||||||
mode: '0640'
|
mode: '0640'
|
||||||
loop:
|
loop:
|
||||||
- src: 'templates/network/wireguard/media/wg1.netdev.j2'
|
- { src: 'templates/network/wireguard/media/wg1.netdev.j2', dest: '/etc/systemd/network/wg1.netdev' }
|
||||||
dest: '/etc/systemd/network/wg1.netdev'
|
- {
|
||||||
- src: 'templates/network/wireguard/media/wg1.network.j2'
|
src: 'templates/network/wireguard/media/wg1.network.j2',
|
||||||
dest: '/etc/systemd/network/wg1.network'
|
dest: '/etc/systemd/network/wg1.network',
|
||||||
|
}
|
||||||
notify: restart systemd-networkd
|
notify: restart systemd-networkd
|
||||||
|
|
||||||
- name: Create Wireguard media directories
|
- name: copy external media configurations
|
||||||
|
template:
|
||||||
|
src: '{{ item.src }}'
|
||||||
|
dest: '{{ item.dest }}'
|
||||||
|
mode: '0600'
|
||||||
|
loop:
|
||||||
|
- { src: 'templates/network/wireguard/media/mobile_1.wireguard.j2', dest: '/tmp/mobile_1.conf' }
|
||||||
|
- { src: 'templates/network/wireguard/media/mobile_2.wireguard.j2', dest: '/tmp/mobile_2.conf' }
|
||||||
|
- { src: 'templates/network/wireguard/media/tv.wireguard.j2', dest: '/tmp/tv.conf' }
|
||||||
|
when: copy_vpn_media_configurations
|
||||||
|
|
||||||
|
- name: create wireguard media directories
|
||||||
become: true
|
become: true
|
||||||
ansible.builtin.file:
|
file:
|
||||||
path: '{{ item }}'
|
path: '{{ item | dirname }}'
|
||||||
owner: root
|
owner: root
|
||||||
group: systemd-network
|
group: systemd-network
|
||||||
mode: '0640'
|
mode: '0640'
|
||||||
state: directory
|
state: directory
|
||||||
recurse: true
|
|
||||||
loop:
|
loop:
|
||||||
- '{{ vpn_media_key_directory }}'
|
- '{{ vpn_media_server_key_path }}'
|
||||||
|
- '{{ vpn_media_server_public_key_path }}'
|
||||||
|
|
||||||
- name: Copy Wireguard server media credentials
|
- name: copy wireguard media credentials
|
||||||
become: true
|
become: true
|
||||||
ansible.builtin.copy:
|
copy:
|
||||||
src: '{{ item.src }}'
|
src: '{{ item.src }}'
|
||||||
dest: '{{ item.dest }}'
|
dest: '{{ item.dest }}'
|
||||||
owner: root
|
owner: root
|
||||||
group: systemd-network
|
group: systemd-network
|
||||||
mode: '0640'
|
mode: '0640'
|
||||||
loop:
|
loop:
|
||||||
- src: 'files/wireguard/media/server.pub'
|
- { src: 'files/wireguard/media/server.pub', dest: '{{ vpn_media_server_public_key_path }}' }
|
||||||
dest: '{{ vpn_media_server_public_key_path }}'
|
- { src: 'files/wireguard/media/server.key', dest: '{{ vpn_media_server_key_path }}' }
|
||||||
- src: 'files/wireguard/media/server.key'
|
|
||||||
dest: '{{ vpn_media_server_key_path }}'
|
|
||||||
|
|
||||||
- name: Copy Wireguard mobile media credentials
|
- name: copy mobile media wireguard credentials
|
||||||
become: true
|
become: true
|
||||||
ansible.builtin.copy:
|
copy:
|
||||||
src: '{{ item.src }}'
|
src: '{{ item.src }}'
|
||||||
dest: '{{ item.dest }}'
|
dest: '{{ item.dest }}'
|
||||||
owner: root
|
owner: root
|
||||||
group: systemd-network
|
group: systemd-network
|
||||||
mode: '0640'
|
mode: '0640'
|
||||||
loop:
|
loop:
|
||||||
- src: 'files/wireguard/media/mobile-1.pub'
|
- { src: 'files/wireguard/media/mobile-1.pub', dest: '{{ vpn_media_server_public_key_path|dirname }}/mobile_1.pub' }
|
||||||
dest: '{{ vpn_media_key_directory }}/public/mobile_1.pub'
|
- { src: 'files/wireguard/media/mobile-1.key', dest: '{{ vpn_media_server_key_path|dirname }}/mobile_1.key' }
|
||||||
- src: 'files/wireguard/media/mobile-1.key'
|
- { src: 'files/wireguard/media/mobile-2.pub', dest: '{{ vpn_media_server_public_key_path|dirname }}/mobile_2.pub' }
|
||||||
dest: '{{ vpn_media_key_directory }}/private/mobile_1.key'
|
- { src: 'files/wireguard/media/mobile-2.key', dest: '{{ vpn_media_server_key_path|dirname }}/mobile_2.key' }
|
||||||
- src: 'files/wireguard/media/mobile-2.pub'
|
- { src: 'files/wireguard/media/tv.pub', dest: '{{ vpn_media_server_public_key_path|dirname }}/tv.pub' }
|
||||||
dest: '{{ vpn_media_key_directory }}/public/mobile_2.pub'
|
- { src: 'files/wireguard/media/tv.key', dest: '{{ vpn_media_server_key_path|dirname }}/tv.key' }
|
||||||
- src: 'files/wireguard/media/mobile-2.key'
|
|
||||||
dest: '{{ vpn_media_key_directory }}/private/mobile_2.key'
|
|
||||||
- src: 'files/wireguard/media/tv.pub'
|
|
||||||
dest: '{{ vpn_media_key_directory }}/public/tv.pub'
|
|
||||||
- src: 'files/wireguard/media/tv.key'
|
|
||||||
dest: '{{ vpn_media_key_directory }}/private/tv.key'
|
|
||||||
|
|
||||||
- name: Copy wireguard media preshared keys
|
- name: copy wireguard media preshared keys
|
||||||
become: true
|
become: true
|
||||||
ansible.builtin.copy:
|
copy:
|
||||||
src: '{{ item.value.preshared_key_source_path }}'
|
src: '{{ item.value.preshared_key_source_path }}'
|
||||||
dest: '{{ item.value.preshared_key_path }}'
|
dest: '{{ item.value.preshared_key_path }}'
|
||||||
owner: root
|
owner: root
|
||||||
group: systemd-network
|
group: systemd-network
|
||||||
mode: '0640'
|
mode: '0640'
|
||||||
with_dict: '{{ vpn_media_peers }}'
|
with_dict: '{{ vpn_media_peers }}'
|
||||||
|
|
||||||
- name: Copy Wireguard external media configurations
|
|
||||||
become: true
|
|
||||||
ansible.builtin.template:
|
|
||||||
src: '{{ item.src }}'
|
|
||||||
dest: '{{ item.dest }}'
|
|
||||||
mode: '0600'
|
|
||||||
owner: '{{ ansible_user_id }}'
|
|
||||||
loop:
|
|
||||||
- src: 'templates/network/wireguard/media/mobile_1.wireguard.j2'
|
|
||||||
dest: '/tmp/mobile_1.conf'
|
|
||||||
- src: 'templates/network/wireguard/media/mobile_2.wireguard.j2'
|
|
||||||
dest: '/tmp/mobile_2.conf'
|
|
||||||
- src: 'templates/network/wireguard/media/tv.wireguard.j2'
|
|
||||||
dest: '/tmp/tv.conf'
|
|
||||||
when: copy_vpn_media_configurations
|
|
||||||
|
|
|
||||||
|
|
@ -4,7 +4,7 @@
|
||||||
Name={{ network_interface }}
|
Name={{ network_interface }}
|
||||||
|
|
||||||
[Network]
|
[Network]
|
||||||
|
DHCP=ipv4
|
||||||
Address={{ lan_ip }}/24
|
Address={{ lan_ip }}/24
|
||||||
Gateway={{ lan_gateway }}
|
Gateway={{ lan_gateway }}
|
||||||
DNS={{ lan_dns }}
|
DNS={{ lan_dns }}
|
||||||
IgnoreCarrierLoss=true
|
|
||||||
|
|
|
||||||
|
|
@ -2,10 +2,10 @@
|
||||||
|
|
||||||
[Interface]
|
[Interface]
|
||||||
Address={{ vpn_peers.mobile.ip }}/24
|
Address={{ vpn_peers.mobile.ip }}/24
|
||||||
PrivateKey={{ lookup("file", vpn_peers.mobile.private_key_source_path) }}
|
PrivateKey={{ vpn_peers.mobile.private_key }}
|
||||||
|
|
||||||
[Peer]
|
[Peer]
|
||||||
PublicKey={{ lookup("file", vpn_server_public_key_source_path) }}
|
PublicKey={{ vpn_server_public_key }}
|
||||||
PresharedKey={{ lookup("file", vpn_peers.mobile.preshared_key_source_path) }}
|
PresharedKey={{ vpn_peers.mobile.preshared_key }}
|
||||||
AllowedIPs={{ vpn_listen_address }}/32
|
AllowedIPs={{ vpn_listen_address }}/32
|
||||||
Endpoint={{ domain_name }}:{{ vpn_port }}
|
Endpoint={{ domain_name }}:{{ vpn_port }}
|
||||||
|
|
|
||||||
|
|
@ -7,12 +7,12 @@ Description=WireGuard tunnel wg0
|
||||||
|
|
||||||
[WireGuard]
|
[WireGuard]
|
||||||
ListenPort={{ vpn_port }}
|
ListenPort={{ vpn_port }}
|
||||||
PrivateKeyFile={{ vpn_server_key_path }}
|
PrivateKey={{ vpn_server_key }}
|
||||||
|
|
||||||
{% for peer, properties in vpn_peers.items() %}
|
{% for peer, properties in vpn_peers.items() %}
|
||||||
[WireGuardPeer]
|
[WireGuardPeer]
|
||||||
PublicKey={{ properties.public_key }}
|
PublicKey={{ properties.public_key }}
|
||||||
PresharedKeyFile={{ properties.preshared_key_path }}
|
PresharedKey={{ properties.preshared_key }}
|
||||||
AllowedIPs={{ properties.ip }}/32
|
AllowedIPs={{ properties.ip }}/32
|
||||||
{% if not loop.last %}
|
{% if not loop.last %}
|
||||||
|
|
||||||
|
|
|
||||||
|
|
@ -2,10 +2,10 @@
|
||||||
|
|
||||||
[Interface]
|
[Interface]
|
||||||
Address={{ vpn_media_peers.mobile_peer_1.ip }}/24
|
Address={{ vpn_media_peers.mobile_peer_1.ip }}/24
|
||||||
PrivateKey={{ lookup('file', vpn_media_peers.mobile_peer_1.private_key_source_path) }}
|
PrivateKey={{ vpn_media_peers.mobile_peer_1.private_key }}
|
||||||
|
|
||||||
[Peer]
|
[Peer]
|
||||||
PublicKey={{ lookup('file', vpn_media_server_public_key_source_path) }}
|
PublicKey={{ vpn_media_server_public_key }}
|
||||||
PresharedKey={{ lookup('file', vpn_media_peers.mobile_peer_1.preshared_key_source_path) }}
|
PresharedKey={{ vpn_media_peers.mobile_peer_1.preshared_key }}
|
||||||
AllowedIPs={{ vpn_media_listen_address }}/32
|
AllowedIPs={{ vpn_media_listen_address }}/32
|
||||||
Endpoint={{ domain_name }}:{{ vpn_media_port }}
|
Endpoint={{ domain_name }}:{{ vpn_media_port }}
|
||||||
|
|
|
||||||
|
|
@ -2,10 +2,10 @@
|
||||||
|
|
||||||
[Interface]
|
[Interface]
|
||||||
Address={{ vpn_media_peers.mobile_peer_2.ip }}/24
|
Address={{ vpn_media_peers.mobile_peer_2.ip }}/24
|
||||||
PrivateKey={{ lookup('file', vpn_media_peers.mobile_peer_2.private_key_source_path) }}
|
PrivateKey={{ vpn_media_peers.mobile_peer_2.private_key }}
|
||||||
|
|
||||||
[Peer]
|
[Peer]
|
||||||
PublicKey={{ lookup('file', vpn_media_server_public_key_source_path) }}
|
PublicKey={{ vpn_media_server_public_key }}
|
||||||
PresharedKey={{ lookup('file', vpn_media_peers.mobile_peer_2.preshared_key_source_path) }}
|
PresharedKey={{ vpn_media_peers.mobile_peer_2.preshared_key }}
|
||||||
AllowedIPs={{ vpn_media_listen_address }}/32
|
AllowedIPs={{ vpn_media_listen_address }}/32
|
||||||
Endpoint={{ domain_name }}:{{ vpn_media_port }}
|
Endpoint={{ domain_name }}:{{ vpn_media_port }}
|
||||||
|
|
|
||||||
|
|
@ -2,10 +2,10 @@
|
||||||
|
|
||||||
[Interface]
|
[Interface]
|
||||||
Address={{ vpn_media_peers.tv.ip }}/24
|
Address={{ vpn_media_peers.tv.ip }}/24
|
||||||
PrivateKey={{ lookup('file', vpn_media_peers.tv.private_key_source_path) }}
|
PrivateKey={{ vpn_media_peers.tv.private_key }}
|
||||||
|
|
||||||
[Peer]
|
[Peer]
|
||||||
PublicKey={{ lookup('file', vpn_media_server_public_key_source_path) }}
|
PublicKey={{ vpn_media_server_public_key }}
|
||||||
PresharedKey={{ lookup("file", vpn_media_peers.tv.preshared_key_source_path) }}
|
PresharedKey={{ vpn_media_peers.tv.preshared_key }}
|
||||||
AllowedIPs={{ vpn_media_listen_address }}/32
|
AllowedIPs={{ vpn_media_listen_address }}/32
|
||||||
Endpoint={{ domain_name }}:{{ vpn_media_port }}
|
Endpoint={{ domain_name }}:{{ vpn_media_port }}
|
||||||
|
|
|
||||||
|
|
@ -7,12 +7,12 @@ Description=WireGuard tunnel wg1
|
||||||
|
|
||||||
[WireGuard]
|
[WireGuard]
|
||||||
ListenPort={{ vpn_media_port }}
|
ListenPort={{ vpn_media_port }}
|
||||||
PrivateKeyFile={{ vpn_media_server_key_path }}
|
PrivateKey={{ vpn_media_server_key }}
|
||||||
|
|
||||||
{% for peer, properties in vpn_media_peers.items() %}
|
{% for peer, properties in vpn_media_peers.items() %}
|
||||||
[WireGuardPeer]
|
[WireGuardPeer]
|
||||||
PublicKey={{ properties.public_key }}
|
PublicKey={{ properties.public_key }}
|
||||||
PresharedKeyFile={{ properties.preshared_key_path }}
|
PresharedKey={{ properties.preshared_key }}
|
||||||
AllowedIPs={{ properties.ip }}/32
|
AllowedIPs={{ properties.ip }}/32
|
||||||
{% if not loop.last %}
|
{% if not loop.last %}
|
||||||
|
|
||||||
|
|
|
||||||
12
vars/vpn.yml
12
vars/vpn.yml
|
|
@ -6,10 +6,8 @@ vpn_interface: 'wg0'
|
||||||
vpn_source_range: '10.0.0.0/24'
|
vpn_source_range: '10.0.0.0/24'
|
||||||
vpn_destination_range: '10.0.0.1/32'
|
vpn_destination_range: '10.0.0.1/32'
|
||||||
|
|
||||||
vpn_key_directory: '/etc/wireguard/keys'
|
vpn_server_public_key_path: '/etc/wireguard/keys/public/server.pub'
|
||||||
vpn_server_public_key_path: '{{ vpn_key_directory }}/public/server.pub'
|
vpn_server_key_path: '/etc/wireguard/keys/private/server.key'
|
||||||
vpn_server_public_key_source_path: 'files/wireguard/default/server.pub'
|
|
||||||
vpn_server_key_path: '{{ vpn_key_directory }}/private/server.key'
|
|
||||||
|
|
||||||
copy_vpn_configurations: false
|
copy_vpn_configurations: false
|
||||||
|
|
||||||
|
|
@ -17,16 +15,16 @@ vpn_peers:
|
||||||
laptop:
|
laptop:
|
||||||
ip: '10.0.0.2'
|
ip: '10.0.0.2'
|
||||||
public_key: 'EbWLf2+7x/RymeeiVuX72nZOBqPvdhu2V9pYhszpQEw='
|
public_key: 'EbWLf2+7x/RymeeiVuX72nZOBqPvdhu2V9pYhszpQEw='
|
||||||
preshared_key_path: '{{ vpn_key_directory }}/private/preshared-laptop.psk'
|
preshared_key_path: '/etc/wireguard/keys/private/preshared-laptop.psk'
|
||||||
preshared_key_source_path: 'files/wireguard/default/preshared-laptop.psk'
|
preshared_key_source_path: 'files/wireguard/default/preshared-laptop.psk'
|
||||||
desktop:
|
desktop:
|
||||||
ip: '10.0.0.3'
|
ip: '10.0.0.3'
|
||||||
public_key: 'izHzmRwh2yzICps6pFI2Bg3TnmTD66/8uH4loJpkuD4='
|
public_key: 'izHzmRwh2yzICps6pFI2Bg3TnmTD66/8uH4loJpkuD4='
|
||||||
preshared_key_path: '{{ vpn_key_directory }}/private/preshared-desktop.psk'
|
preshared_key_path: '/etc/wireguard/keys/private/preshared-desktop.psk'
|
||||||
preshared_key_source_path: 'files/wireguard/default/preshared-desktop.psk'
|
preshared_key_source_path: 'files/wireguard/default/preshared-desktop.psk'
|
||||||
mobile:
|
mobile:
|
||||||
ip: '10.0.0.4'
|
ip: '10.0.0.4'
|
||||||
public_key: '4aBHRiglCOE7qEDLqeFgQ5PMMsKczpPoL4bx4jyAEDY='
|
public_key: '4aBHRiglCOE7qEDLqeFgQ5PMMsKczpPoL4bx4jyAEDY='
|
||||||
preshared_key_path: '{{ vpn_key_directory }}/private/preshared-mobile.psk'
|
preshared_key_path: '/etc/wireguard/keys/private/preshared-mobile.psk'
|
||||||
preshared_key_source_path: 'files/wireguard/default/preshared-mobile.psk'
|
preshared_key_source_path: 'files/wireguard/default/preshared-mobile.psk'
|
||||||
private_key_source_path: 'files/wireguard/default/mobile.key'
|
private_key_source_path: 'files/wireguard/default/mobile.key'
|
||||||
|
|
|
||||||
|
|
@ -6,42 +6,40 @@ vpn_media_interface: 'wg1'
|
||||||
vpn_media_source_range: '10.0.1.0/24'
|
vpn_media_source_range: '10.0.1.0/24'
|
||||||
vpn_media_destination_range: '10.0.1.1/32'
|
vpn_media_destination_range: '10.0.1.1/32'
|
||||||
|
|
||||||
vpn_media_key_directory: '/etc/wireguard/keys'
|
vpn_media_server_public_key_path: '/etc/wireguard/keys/public/media_server.pub'
|
||||||
|
vpn_media_server_key_path: '/etc/wireguard/keys/private/media_server.key'
|
||||||
vpn_media_server_public_key_path: '{{ vpn_media_key_directory }}/public/media_server.pub'
|
|
||||||
vpn_media_server_public_key_source_path: 'files/wireguard/media/server.pub'
|
|
||||||
vpn_media_server_key_path: '{{ vpn_media_key_directory }}/private/media_server.key'
|
|
||||||
|
|
||||||
copy_vpn_media_configurations: false
|
copy_vpn_media_configurations: false
|
||||||
|
|
||||||
|
# TODO: move keys in /etc/wireguard/keys to seperate folders
|
||||||
# TODO: use simliar task layout as in arch-setup repo
|
# TODO: use simliar task layout as in arch-setup repo
|
||||||
|
|
||||||
vpn_media_peers:
|
vpn_media_peers:
|
||||||
laptop:
|
laptop:
|
||||||
ip: '10.0.1.2'
|
ip: '10.0.1.2'
|
||||||
public_key: 'hI4rqlv2afs4RJkt5xR+dYxQODSd6lR0OqWJRlnQdjM='
|
public_key: 'hI4rqlv2afs4RJkt5xR+dYxQODSd6lR0OqWJRlnQdjM='
|
||||||
preshared_key_path: '{{ vpn_media_key_directory }}/private/preshared-media-laptop.psk'
|
preshared_key_path: '/etc/wireguard/keys/private/preshared-media-laptop.psk'
|
||||||
preshared_key_source_path: 'files/wireguard/media/preshared-laptop.psk'
|
preshared_key_source_path: 'files/wireguard/media/preshared-laptop.psk'
|
||||||
desktop:
|
desktop:
|
||||||
ip: '10.0.1.3'
|
ip: '10.0.1.3'
|
||||||
public_key: 'YDH5lZcxUHM4AU2ZxQrFqjDIV2Z7PSUQKMcYXLExV0E='
|
public_key: 'YDH5lZcxUHM4AU2ZxQrFqjDIV2Z7PSUQKMcYXLExV0E='
|
||||||
preshared_key_path: '{{ vpn_media_key_directory }}/private/preshared-media-desktop.psk'
|
preshared_key_path: '/etc/wireguard/keys/private/preshared-media-desktop.psk'
|
||||||
preshared_key_source_path: 'files/wireguard/media/preshared-desktop.psk'
|
preshared_key_source_path: 'files/wireguard/media/preshared-desktop.psk'
|
||||||
mobile_peer_1:
|
mobile_peer_1:
|
||||||
ip: '10.0.1.4'
|
ip: '10.0.1.4'
|
||||||
public_key: '6fj8FXvzT0IUlZLJjQ/+FhwwRDsJeQsUFHqKQcyXdwQ='
|
public_key: '6fj8FXvzT0IUlZLJjQ/+FhwwRDsJeQsUFHqKQcyXdwQ='
|
||||||
preshared_key_path: '{{ vpn_media_key_directory }}/private/preshared-media-mobile-1.psk'
|
preshared_key_path: '/etc/wireguard/keys/private/preshared-media-mobile-1.psk'
|
||||||
preshared_key_source_path: 'files/wireguard/media/preshared-mobile-1.psk'
|
preshared_key_source_path: 'files/wireguard/media/preshared-mobile-1.psk'
|
||||||
private_key_source_path: 'files/wireguard/media/mobile-1.key'
|
private_key_source_path: 'files/wireguard/media/mobile-1.key'
|
||||||
mobile_peer_2:
|
mobile_peer_2:
|
||||||
ip: '10.0.1.5'
|
ip: '10.0.1.5'
|
||||||
public_key: 'w/pswNrAYFdEUoaLk3zSqOu4gg2s41BBCN02E//ai1c='
|
public_key: 'w/pswNrAYFdEUoaLk3zSqOu4gg2s41BBCN02E//ai1c='
|
||||||
preshared_key_path: '{{ vpn_media_key_directory }}/private/preshared-media-mobile-2.psk'
|
preshared_key_path: '/etc/wireguard/keys/private/preshared-media-mobile-2.psk'
|
||||||
preshared_key_source_path: 'files/wireguard/media/preshared-mobile-2.psk'
|
preshared_key_source_path: 'files/wireguard/media/preshared-mobile-2.psk'
|
||||||
private_key_source_path: 'files/wireguard/media/mobile-2.key'
|
private_key_source_path: 'files/wireguard/media/mobile-2.key'
|
||||||
tv:
|
tv:
|
||||||
ip: '10.0.1.6'
|
ip: '10.0.1.6'
|
||||||
public_key: '5+yz9C9PhaLhsvAZ1e3mDsTQpMZVrPZnSQa6ERJIKU0='
|
public_key: '5+yz9C9PhaLhsvAZ1e3mDsTQpMZVrPZnSQa6ERJIKU0='
|
||||||
preshared_key_path: '{{ vpn_media_key_directory }}/private/preshared-media-tv.psk'
|
preshared_key_path: '/etc/wireguard/keys/private/preshared-media-tv.psk'
|
||||||
preshared_key_source_path: 'files/wireguard/media/preshared-tv.psk'
|
preshared_key_source_path: 'files/wireguard/media/preshared-tv.psk'
|
||||||
private_key_source_path: 'files/wireguard/media/tv.key'
|
private_key_source_path: 'files/wireguard/media/tv.key'
|
||||||
|
|
|
||||||
Loading…
Add table
Add a link
Reference in a new issue