update infra and portfolio deployment
All checks were successful
ci/woodpecker/push/demo-workflow Pipeline was successful
All checks were successful
ci/woodpecker/push/demo-workflow Pipeline was successful
This commit is contained in:
18
infra/ansible/inventory/group_vars/wireguard.yaml
Normal file
18
infra/ansible/inventory/group_vars/wireguard.yaml
Normal file
@ -0,0 +1,18 @@
|
||||
apt_packages:
|
||||
- curl
|
||||
- vim
|
||||
- htop
|
||||
- wireguard
|
||||
|
||||
wireguard_path: "/etc/wireguard"
|
||||
wireguard_interface: "wg0"
|
||||
wireguard_private_key_file: "{{ wireguard_path }}/server_private.key"
|
||||
wireguard_public_key_file: "{{ wireguard_path }}/server_public.key"
|
||||
wg_port: 51820
|
||||
wg_address: "10.0.0.1/24"
|
||||
wg_dns: "1.1.1.1"
|
||||
wg_peers:
|
||||
- public_key: "LburMRtqT5LK0K1xzGGh4VkNVgWZQRm96dsxf6twbkw="
|
||||
allowed_ips: "0.0.0.0/0"
|
||||
endpoint: "tahmidcloud.com:51820"
|
||||
persistent_keepalive: 25
|
||||
@ -2,6 +2,7 @@ all:
|
||||
children:
|
||||
hypervisors:
|
||||
vms:
|
||||
wireguard:
|
||||
|
||||
hypervisors:
|
||||
children:
|
||||
@ -56,3 +57,10 @@ vm_group_2:
|
||||
ansible_host: 192.168.1.162
|
||||
ansible_user: "{{ ansible_vm_user }}"
|
||||
ansible_ssh_private_key_file: "{{ ansible_ssh_private_key_file }}"
|
||||
|
||||
wireguard:
|
||||
hosts:
|
||||
vm10:
|
||||
ansible_host: 192.168.1.174
|
||||
ansible_user: "{{ ansible_vm_user }}"
|
||||
ansible_ssh_private_key_file: "{{ ansible_ssh_private_key_file }}"
|
||||
|
||||
6
infra/ansible/playbooks/configure-wireguard.yaml
Normal file
6
infra/ansible/playbooks/configure-wireguard.yaml
Normal file
@ -0,0 +1,6 @@
|
||||
- name: Configure WireGuard
|
||||
hosts: wireguard
|
||||
vars_files:
|
||||
- ../secrets/vault.yaml # Load the encrypted vault file
|
||||
roles:
|
||||
- configure-wireguard
|
||||
92
infra/ansible/roles/configure-wireguard/tasks/main.yaml
Normal file
92
infra/ansible/roles/configure-wireguard/tasks/main.yaml
Normal file
@ -0,0 +1,92 @@
|
||||
---
|
||||
- name: Update apt cache
|
||||
ansible.builtin.apt:
|
||||
update_cache: yes
|
||||
become: true
|
||||
|
||||
- name: Install necessary packages
|
||||
ansible.builtin.apt:
|
||||
name: "{{ apt_packages }}"
|
||||
state: present
|
||||
become: true
|
||||
|
||||
- name: Ensure WireGuard directory exists
|
||||
ansible.builtin.file:
|
||||
path: "{{ wireguard_path }}"
|
||||
state: directory
|
||||
mode: "0700"
|
||||
owner: root
|
||||
group: root
|
||||
become: true
|
||||
|
||||
- name: Generate WireGuard server private key
|
||||
ansible.builtin.command:
|
||||
cmd: wg genkey
|
||||
register: wg_private_key
|
||||
become: true
|
||||
|
||||
- name: Save WireGuard server private key
|
||||
ansible.builtin.copy:
|
||||
content: "{{ wg_private_key.stdout | trim }}"
|
||||
dest: "{{ wireguard_private_key_file }}"
|
||||
mode: "0600"
|
||||
owner: root
|
||||
group: root
|
||||
become: true
|
||||
|
||||
- name: Read WireGuard private key from file
|
||||
ansible.builtin.slurp:
|
||||
src: "{{ wireguard_private_key_file }}"
|
||||
register: wg_private_key_file_content
|
||||
become: true
|
||||
|
||||
- name: Decode WireGuard private key
|
||||
ansible.builtin.set_fact:
|
||||
wg_private_key_content: "{{ wg_private_key_file_content.content | b64decode | trim }}"
|
||||
|
||||
- name: Generate WireGuard server public key (if not exists)
|
||||
ansible.builtin.stat:
|
||||
path: "{{ wireguard_public_key_file }}"
|
||||
register: public_key_stat
|
||||
become: true
|
||||
|
||||
- name: Generate WireGuard server public key
|
||||
ansible.builtin.shell:
|
||||
cmd: "wg pubkey < {{ wireguard_private_key_file }}"
|
||||
register: wg_public_key
|
||||
become: true
|
||||
|
||||
- name: Save WireGuard server public key
|
||||
ansible.builtin.copy:
|
||||
content: "{{ wg_public_key.stdout | trim }}"
|
||||
dest: "{{ wireguard_public_key_file }}"
|
||||
mode: "0644"
|
||||
owner: root
|
||||
group: root
|
||||
become: true
|
||||
|
||||
- name: Read WireGuard public key from file
|
||||
ansible.builtin.slurp:
|
||||
src: "{{ wireguard_public_key_file }}"
|
||||
register: wg_public_key_file_content
|
||||
become: true
|
||||
|
||||
- name: Decode WireGuard public key
|
||||
ansible.builtin.set_fact:
|
||||
wg_public_key_content: "{{ wg_public_key_file_content.content | trim }}"
|
||||
|
||||
- name: Create WireGuard configuration file
|
||||
ansible.builtin.template:
|
||||
src: "wg0.conf.j2"
|
||||
dest: "{{ wireguard_path }}/wg0.conf"
|
||||
owner: root
|
||||
group: root
|
||||
mode: "0600"
|
||||
become: true
|
||||
|
||||
- name: Enable and start WireGuard service
|
||||
ansible.builtin.service:
|
||||
name: "wg-quick@{{ wireguard_interface }}"
|
||||
state: started
|
||||
enabled: yes
|
||||
become: true
|
||||
@ -0,0 +1,25 @@
|
||||
[Interface]
|
||||
Address = {{ wg_address }}
|
||||
ListenPort = {{ wg_port }}
|
||||
PrivateKey = {{ wg_private_key_content }}
|
||||
{% if wg_dns is defined %}
|
||||
DNS = {{ wg_dns }}
|
||||
{% endif %}
|
||||
PostUp = iptables -A FORWARD -i %i -j ACCEPT; iptables -t nat -A POSTROUTING -o eth0 -j MASQUERADE
|
||||
PostDown = iptables -D FORWARD -i %i -j ACCEPT; iptables -t nat -D POSTROUTING -o eth0 -j MASQUERADE
|
||||
SaveConfig = true
|
||||
|
||||
{% for peer in wg_peers %}
|
||||
[Peer]
|
||||
PublicKey = {{ peer.public_key }}
|
||||
{% if peer.preshared_key is defined %}
|
||||
PresharedKey = {{ peer.preshared_key }}
|
||||
{% endif %}
|
||||
AllowedIPs = {{ peer.allowed_ips }}
|
||||
{% if peer.endpoint is defined %}
|
||||
Endpoint = {{ peer.endpoint }}
|
||||
{% endif %}
|
||||
{% if peer.persistent_keepalive is defined %}
|
||||
PersistentKeepalive = {{ peer.persistent_keepalive }}
|
||||
{% endif %}
|
||||
{% endfor %}
|
||||
Reference in New Issue
Block a user