--- /dev/null
+- name: Install strongswan
+ community.general.pkgng:
+ name: strongswan
+ state: present
+ become: true
+- name: install ipsec.conf
+ template:
+ src: "{{ ipsec_conf }}"
+ dest: "/usr/local/etc/ipsec.conf"
+ owner: root
+ group: wheel
+ mode: 0644
+ become: true
+- name: install certificates
+ template:
+ src: "{{ item.src }}"
+ dest: "/usr/local/etc/ipsec.d/certs/"
+ owner: root
+ group: wheel
+ mode: 0644
+ with_filetree: '{{ role_path }}/templates/certs'
+ when: item.state == 'file'
+ become: true
+- name: install ca cert
+ template:
+ src: "cacerts/sigsegv.be.pem"
+ dest: "/usr/local/etc/ipsec.d/cacert/"
+ owner: root
+ group: wheel
+ mode: 0644
+ become: true
+- name: install private key
+ template:
+ src: "private/{{ hostname }}.key"
+ dest: "/usr/local/etc/ipsec.d/private/"
+ owner: root
+ group: wheel
+ mode: 0644
+ become: true
+- name: ipsec enable
+ community.general.sysrc:
+ name: strongswan_enable
+ value: "YES"
+- name: Start strongswam
+ ansible.builtin.service:
+ name: strongswan
+ state: started
+ become: true
+
name: local_unbound_enable
value: "YES"
become: true
-- name: ntp enable
- community.general.sysrc:
- name: ntpd_enable
- value: "YES"
- become: true
-- name: ntpdate enable
- community.general.sysrc:
- name: ntpdate_enable
- value: "YES"
-- name: Install strongswan
- community.general.pkgng:
- name: strongswan
- state: present
- become: true
-- name: install ipsec.conf
- template:
- src: "{{ ipsec_conf }}"
- dest: "/usr/local/etc/ipsec.conf"
- owner: root
- group: wheel
- mode: 0644
- become: true
-- name: install certificates
- template:
- src: "{{ item.src }}"
- dest: "/usr/local/etc/ipsec.d/certs/"
- owner: root
- group: wheel
- mode: 0644
- with_filetree: '{{ role_path }}/templates/certs'
- when: item.state == 'file'
- become: true
-- name: install ca cert
- template:
- src: "cacerts/sigsegv.be.pem"
- dest: "/usr/local/etc/ipsec.d/cacert/"
- owner: root
- group: wheel
- mode: 0644
- become: true
-- name: install private key
- template:
- src: "private/{{ hostname }}.key"
- dest: "/usr/local/etc/ipsec.d/private/"
- owner: root
- group: wheel
- mode: 0644
- become: true
-- name: ipsec enable
- community.general.sysrc:
- name: strongswan_enable
- value: "YES"
-- name: Start strongswam
- ansible.builtin.service:
- name: strongswan
- state: started
- become: true
+- name: ntp
+ import_tasks: ntp.yaml
+- name: IPSec
+ import_tasks: ipsec.yaml
- name: dynamic dns
import_tasks: dyndns.yaml
--- /dev/null
+- name: ntp enable
+ community.general.sysrc:
+ name: ntpd_enable
+ value: "YES"
+ become: true
+- name: ntpdate enable
+ community.general.sysrc:
+ name: ntpdate_enable
+ value: "YES"
+- name: sync on start
+ community.general.sysrc:
+ name: ntpd_sync_on_start
+ value: "YES"