Remove old giant messy way of grouping files.

pull/1/head
jowj 4 years ago
parent acb6de74c4
commit 1d009dc0fd

@ -1,19 +0,0 @@
- name: (local) fill out the rest of the wg0.conf file
blockinfile:
path: /etc/wireguard/wg0.conf
block: |
Address = 10.200.219.2/32, fd86:ea04:1115::2/128
DNS = 1.1.1.1
[Peer]
PublicKey = {{ server_publickey.stdout }}
Endpoint = vpn.awful.club:51820
AllowedIPs = 0.0.0.0/0
delegate_to: localhost
become: yes
- name: (local) bring wg up on local
shell: wg-quick up wg0
delegate_to: localhost
become: yes
ignore_errors: True

@ -1,19 +0,0 @@
- name: fill out the rest of the wg0.conf file
blockinfile:
path: /etc/wireguard/wg0.conf
block: |
Address = 10.200.219.1/24
Address = fd86:ea04:1115::1/64
ListenPort = 51820
SaveConfig = true
[Peer]
# name = pvl
PublicKey = {{ client_publickey.stdout }}
AllowedIPs = 10.200.219.19/32, fd86:ea04:1115::19/128
[Peer]
# name = matrix
PublicKey = {{ ios_publickey.stdout }}
AllowedIPs = 10.200.219.10/32, fd86:ea04:1115::10/128
- name: bring wg up on the relay node
shell: wg-quick up /etc/wireguard/wg0.conf

@ -1,11 +0,0 @@
- name: (local) fill out the rest of the wg0.conf file
blockinfile:
path: ~/wireguard/ios.conf
block: |
Address = 10.200.219.10/32, fd86:ea04:1115::10/128
DNS = 1.1.1.1
[Peer]
PublicKey = {{ server_publickey.stdout }}
Endpoint = vpn.awful.club:51820
AllowedIPs = 0.0.0.0/0, ::/0

@ -1,15 +0,0 @@
- name: (local) fill out the rest of the wg0.conf file
blockinfile:
path: ~/wireguard/wg0.conf
block: |
Address = 10.200.219.19/32, fd86:ea04:1115::19/128
DNS = 1.1.1.1
[Peer]
PublicKey = {{ server_publickey.stdout }}
Endpoint = vpn.awful.club:51820
AllowedIPs = 0.0.0.0/0, ::/0
# - name: (local) bring wg up on local
# shell: wg-quick up wg0

@ -1,36 +0,0 @@
---
# tasks file for wg_vpn
# this is useful for running plays /from/ an arch machine that will join the wg net.
# install wg, generate keys, files on local machine
- name: (local) install wg (i use) arch (btw)
pacman:
update_cache: yes
name: wireguard-tools, wireguard-arch, wireguard-dkms
state: present
delegate_to: localhost
become: yes
# ansible has a hard time parsing the pacman files
# ignore errors once you verify shit is installed / patched.
ignore_errors: True
- name: (local) ensure /etc/wireguard/ exists
file:
path: /etc/wireguard/
state: directory
delegate_to: localhost
- name: (local) Generate keys
shell: |
printf "[Interface]\nPrivateKey = " > /etc/wireguard/wg0.conf
wg genkey | tee -a /etc/wireguard/wg0.conf | wg pubkey > /etc/wireguard/publickey
vars:
umask: "077"
delegate_to: localhost
become: yes
- name: (local) register publickey for later use
shell: cat /etc/wireguard/publickey
register: client_publickey
delegate_to: localhost
become: yes

@ -1,47 +0,0 @@
- name: add unstable to repos
shell: |
echo "deb http://deb.debian.org/debian/ unstable main" > /etc/apt/sources.list.d/unstable.list
printf 'Package: *\nPin: release a=unstable\nPin-Priority: 90\n' > /etc/apt/preferences.d/limit-unstable
- name: Update aptitude
apt: update_cache=yes
- name: install wireguard
apt: name=wireguard state=latest
- name: install linux headers (necessary on older cloud kernels (fuck u digitalocean))
# the kernel version is hard coded because this is what DO currently uses
# and that's what i use
apt: name=linux-headers-4.19.0-6-cloud-amd64
- name: install misc other things the internet says i need
apt: name=build-essential
- name: install misc other things the internet says i need
apt: name=dkms
- name: needed for handling dns requests
apt: name=openresolv
- name: enable kernel relay/forwarding
shell: |
echo "net.ipv4.ip_forward = 1" >> /etc/sysctl.conf
echo "net.ipv4.conf.all.proxy_arp = 1" >> /etc/sysctl.conf
sudo sysctl -p /etc/sysctl.conf
iptables -A INPUT -m conntrack --ctstate RELATED,ESTABLISHED -j ACCEPT
iptables -A FORWARD -m conntrack --ctstate RELATED,ESTABLISHED -j ACCEPT
iptables -A FORWARD -i wg0 -o wg0 -m conntrack --ctstate NEW -j ACCEPT
iptables -t nat -A POSTROUTING -s 10.200.219.0/24 -o eth0 -j MASQUERADE
- name: ensure /etc/wireguard/ exists
file:
path: /etc/wireguard/
state: directory
- name: Generate keys
shell: |
printf "[Interface]\nPrivateKey = " > /etc/wireguard/wg0.conf
wg genkey | tee -a /etc/wireguard/wg0.conf | wg pubkey > /etc/wireguard/publickey
vars:
umask: "077"
- name: register publickey for later use
shell: cat /etc/wireguard/publickey
register: server_publickey
# do this to avoid idiot "hey you can't start, u already started!!!" erros.
# fucker.
- name: register publickey for later use
shell: wg-quick down /etc/wireguard/wg0.conf
ignore_errors: True

@ -1,15 +0,0 @@
- name: make wg dir since macs are now weird about /etc/anything
file:
path: ~/wireguard/
state: directory
- name: Generate keys
shell: |
printf "[Interface]\nPrivateKey = " > ~/wireguard/ios.conf
wg genkey | tee -a ~/wireguard/ios.conf | wg pubkey > ~/wireguard/ios_publickey
vars:
umask: "077"
- name: register publickey for later use
shell: cat ~/wireguard/ios_publickey
register: ios_publickey

@ -1,21 +0,0 @@
- name: Update brew
homebrew: update_homebrew=yes
- name: install wireguard
homebrew: name=wireguard-tools state=latest
- name: make wg dir since macs are now weird about /etc/anything
file:
path: ~/wireguard/
state: directory
- name: Generate keys
shell: |
printf "[Interface]\nPrivateKey = " > ~/wireguard/wg0.conf
wg genkey | tee -a ~/wireguard/wg0.conf | wg pubkey > ~/wireguard/publickey
vars:
umask: "077"
- name: register publickey for later use
shell: cat ~/wireguard/publickey
register: client_publickey
Loading…
Cancel
Save