diff --git a/buildCert.yml b/buildCert.yml new file mode 100644 index 0000000000000000000000000000000000000000..6ac5a3df76833d1f00febd5e100e30ff5a75360c --- /dev/null +++ b/buildCert.yml @@ -0,0 +1,88 @@ +--- +- name: "Check client ca certificate" + register: ca_cert + stat: "path={{ x509_cacert_file }}" + +- name: "Check certificate and key" + shell: (openssl x509 -noout -modulus -in {{ x509_cert_file }} | openssl md5 ; openssl rsa -noout -modulus -in {{ x509_key_file }} | openssl md5) | uniq | wc -l + register: certcheck + +- name: "Check certificate" + register: cert + stat: "path={{ x509_cert_file }}" + +- name: "Check key" + register: key + stat: "path={{ x509_key_file }}" + sudo: true + +- name: "Default: we don't need a new certificate" + set_fact: needcert=False + +- name: "Set need cert if key is missing" + set_fact: needcert=True + when: key.stat.exists == false + +- name: "set needcert if cert is missing" + set_fact: needcert=True + when: cert.stat.exists == false + +- name: "set needcert if cert doesn't match key" + set_fact: needcert=True + when: certcheck.stdout == '2' + + +- name: "Creating Keypair" + shell: "echo noop when using easy-rsa" + when: needcert + +- name: "Creating CSR" + shell: " cd /etc/easy-rsa/2.0; source ./vars; export EASY_RSA=\"${EASY_RSA:-.}\"; \"$EASY_RSA\"/pkitool --csr {{ x509_csr_args }} {{ common_name }}" + when: needcert + sudo: true + +- name: "Copy CSR to ansible host" + fetch: "src=/etc/easy-rsa/2.0/keys/{{ common_name }}.csr dest=/tmp/{{ common_name }}/ fail_on_missing=yes validate_md5=yes flat=yes" + sudo: true + when: needcert + +- name: "Copy CSR to CA" + delegate_to: "{{ x509_ca_server }}" + copy: "src=/tmp/{{ ansible_fqdn }}/{{ common_name }}.csr dest=/etc/easy-rsa/2.0/keys/{{ common_name }}.csr force=yes" + when: needcert + sudo: true + +- name: "Sign Certificate" + delegate_to: "{{ x509_ca_server }}" + shell: "source ./vars; export EASY_RSA=\"${EASY_RSA:-.}\" ;\"$EASY_RSA\"/pkitool --sign {{ common_name }}" + args: + chdir: "/etc/easy-rsa/2.0" + sudo: true + when: needcert + +- name: "Copy the Certificate to ansible host" + delegate_to: "{{ x509_ca_server }}" + fetch: "src=/etc/easy-rsa/2.0/keys/{{ common_name }}.crt dest=/tmp/{{ common_name }}/ fail_on_missing=yes validate_md5=yes flat=yes" + sudo: true + when: needcert + +- name: "Copy the CA Certificate to the ansible host" + delegate_to: "{{ x509_ca_server }}" + fetch: "src=/etc/easy-rsa/2.0/keys/ca.crt dest=/tmp/ca.crt fail_on_missing=yes validate_md5=yes flat=yes" + sudo: true + when: "ca_cert.stat.exists == false" + +- name: "Copy the certificate to the node" + copy: "src=/tmp/{{ common_name }}/{{ common_name }}.crt dest={{ x509_cert_file }} force=yes" + sudo: true + when: needcert + +- name: "Copy the CA certificate to the node" + copy: "src=/tmp/ca.crt dest={{ x509_cacert_file }}" + sudo: true + when: "ca_cert.stat.exists == false" + +- name: "Copy the key to the correct location" + shell: "mkdir -p `dirname {{ x509_key_file }}` ; chmod 700 `dirname {{ x509_key_file }}` ; cp /etc/easy-rsa/2.0/keys/{{ common_name }}.key {{ x509_key_file }}" + sudo: true + when: needcert diff --git a/roles/OpenVPN-Client/defaults/main.yml b/roles/OpenVPN-Client/defaults/main.yml deleted file mode 100644 index 6d22a916d5873c96abec94d19b7a180d7ac7d280..0000000000000000000000000000000000000000 --- a/roles/OpenVPN-Client/defaults/main.yml +++ /dev/null @@ -1,8 +0,0 @@ ---- -countryName: "AU" -reginalName: "Victoria" -cityName: "Melbourne" -organizationName: "Monash University" -emailAddress: "default@default.org" -organizationUnit: "defaultUnit" - diff --git a/roles/OpenVPN-Client/handlers/main.yml b/roles/OpenVPN-Client/handlers/main.yml index f4d46a524e4bead9d9c68d927029967e6b915737..576203a36d646abaeed00f1688f1758cb750eb3b 100644 --- a/roles/OpenVPN-Client/handlers/main.yml +++ b/roles/OpenVPN-Client/handlers/main.yml @@ -1,3 +1,4 @@ --- - name: restart openvpn - service: name=openvpn state=restarted \ No newline at end of file + service: name=openvpn state=restarted + sudo: true diff --git a/roles/OpenVPN-Client/meta/main.yml b/roles/OpenVPN-Client/meta/main.yml new file mode 100644 index 0000000000000000000000000000000000000000..ffdd74765462d9ff83e248c56a56f17064dda0ed --- /dev/null +++ b/roles/OpenVPN-Client/meta/main.yml @@ -0,0 +1,3 @@ +--- +dependencies: + - { role: easy-rsa-certificate, x509_csr_args="" } diff --git a/roles/OpenVPN-Client/tasks/installOpenVPN.yml b/roles/OpenVPN-Client/tasks/installOpenVPN.yml index 3b5999e0b6f834c44356c84a0b911c12098e0f6d..7c1777813feab0e88526addd358c7c5c29d4b9d2 100644 --- a/roles/OpenVPN-Client/tasks/installOpenVPN.yml +++ b/roles/OpenVPN-Client/tasks/installOpenVPN.yml @@ -1,4 +1,11 @@ --- -- - name: "Install OpenVPN" +- name: "Install OpenVPN" yum: "name=openvpn state=present" + sudo: true + notify: restart openvpn + +- name: "Copying client.conf to the OpenVPN client" + template: "src=client.conf.j2 dest=/etc/openvpn/client.conf" + sudo: true + notify: restart openvpn + diff --git a/roles/OpenVPN-Client/tasks/main.yml b/roles/OpenVPN-Client/tasks/main.yml index 7939b7cdbe2222af4bc5436553bc99a103d867fb..640caecb77a0a6dd6b63c0347e2ebef484ff182f 100644 --- a/roles/OpenVPN-Client/tasks/main.yml +++ b/roles/OpenVPN-Client/tasks/main.yml @@ -1,5 +1,8 @@ --- - include: installOpenVPN.yml -- - include: copyCerts.yml + +- name: "Start OpenVPN" + service: name=openvpn state=started + sudo: true + diff --git a/roles/OpenVPN-Client/templates/client.conf.j2 b/roles/OpenVPN-Client/templates/client.conf.j2 index ab437a6687ba19603c723c0340630fb5d6da692a..279e50543b60b984531a1052faa4684a0c23b4c7 100644 --- a/roles/OpenVPN-Client/templates/client.conf.j2 +++ b/roles/OpenVPN-Client/templates/client.conf.j2 @@ -33,13 +33,15 @@ dev tun # Are we connecting to a TCP or # UDP server? Use the same setting as # on the server. -proto tcp -;proto udp +;proto tcp +proto udp # The hostname/IP and port of the server. # You can have multiple remote entries # to load balance between the servers. -remote {{ server }} 1194 +{% for item in openvpn_servers %} +remote {{ item }} 1194 +{% endfor %} # Choose a random host from the remote # list for load-balancing. Otherwise @@ -84,9 +86,9 @@ persist-tun # a separate .crt/.key file pair # for each client. A single ca # file can be used for all clients. -ca ca.crt -cert {{ inventory_hostname }}.crt -key {{ inventory_hostname }}.key +ca {{ x509_cacert_file }} +cert {{ x509_cert_file }} +key {{ x509_key_file }} # Verify server certificate by checking # that the certicate has the nsCertType diff --git a/roles/OpenVPN-Client/vars/main.yml b/roles/OpenVPN-Client/vars/main.yml new file mode 100644 index 0000000000000000000000000000000000000000..878dc2458eb9c62766729944803045e8aec7a68b --- /dev/null +++ b/roles/OpenVPN-Client/vars/main.yml @@ -0,0 +1,6 @@ +--- +x509_csr_args: "" +x509_cacert_file: "/etc/ssl/certs/cacert.crt" +x509_key_file: "/etc/ssl/private/client.key" +x509_cert_file: "/etc/ssl/certs/client.crt" +x509_common_name: "{{ ansible_fqdn }}_OpenVPN_Client" diff --git a/roles/OpenVPN-Server/defaults/main.yml b/roles/OpenVPN-Server/defaults/main.yml deleted file mode 100644 index 85154e01ac9067415beb78d84ecf4dbf7c7e60ff..0000000000000000000000000000000000000000 --- a/roles/OpenVPN-Server/defaults/main.yml +++ /dev/null @@ -1,7 +0,0 @@ ---- -countryName: "AU" -reginalName: "Victoria" -cityName: "Melbourne" -organizationName: "Monash University" -emailAddress: "default@default.org" -organizationUnit: "defaultUnit" diff --git a/roles/OpenVPN-Server/files/server.conf b/roles/OpenVPN-Server/files/server.conf deleted file mode 100644 index 3db92f285081e470e1cf89154ebfe26e79644dc2..0000000000000000000000000000000000000000 --- a/roles/OpenVPN-Server/files/server.conf +++ /dev/null @@ -1,299 +0,0 @@ -################################################# -# Sample OpenVPN 2.0 config file for # -# multi-client server. # -# # -# This file is for the server side # -# of a many-clients <-> one-server # -# OpenVPN configuration. # -# # -# OpenVPN also supports # -# single-machine <-> single-machine # -# configurations (See the Examples page # -# on the web site for more info). # -# # -# This config should work on Windows # -# or Linux/BSD systems. Remember on # -# Windows to quote pathnames and use # -# double backslashes, e.g.: # -# "C:\\Program Files\\OpenVPN\\config\\foo.key" # -# # -# Comments are preceded with '#' or ';' # -################################################# - -# Which local IP address should OpenVPN -# listen on? (optional) -local vm-server - -# Which TCP/UDP port should OpenVPN listen on? -# If you want to run multiple OpenVPN instances -# on the same machine, use a different port -# number for each one. You will need to -# open up this port on your firewall. -port 1194 - -# TCP or UDP server? -proto tcp -;proto udp - -# "dev tun" will create a routed IP tunnel, -# "dev tap" will create an ethernet tunnel. -# Use "dev tap0" if you are ethernet bridging -# and have precreated a tap0 virtual interface -# and bridged it with your ethernet interface. -# If you want to control access policies -# over the VPN, you must create firewall -# rules for the the TUN/TAP interface. -# On non-Windows systems, you can give -# an explicit unit number, such as tun0. -# On Windows, use "dev-node" for this. -# On most systems, the VPN will not function -# unless you partially or fully disable -# the firewall for the TUN/TAP interface. -;dev tap -dev tun - -# Windows needs the TAP-Win32 adapter name -# from the Network Connections panel if you -# have more than one. On XP SP2 or higher, -# you may need to selectively disable the -# Windows firewall for the TAP adapter. -# Non-Windows systems usually don't need this. -;dev-node MyTap - -# SSL/TLS root certificate (ca), certificate -# (cert), and private key (key). Each client -# and the server must have their own cert and -# key file. The server and all clients will -# use the same ca file. -# -# See the "easy-rsa" directory for a series -# of scripts for generating RSA certificates -# and private keys. Remember to use -# a unique Common Name for the server -# and each of the client certificates. -# -# Any X509 key management system can be used. -# OpenVPN can also use a PKCS #12 formatted key file -# (see "pkcs12" directive in man page). -ca ca.crt -cert vm-server.crt -key vm-server.key # This file should be kept secret - -# Diffie hellman parameters. -# Generate your own with: -# openssl dhparam -out dh1024.pem 1024 -# Substitute 2048 for 1024 if you are using -# 2048 bit keys. -dh dh512.pem - -# Configure server mode and supply a VPN subnet -# for OpenVPN to draw client addresses from. -# The server will take 10.8.0.1 for itself, -# the rest will be made available to clients. -# Each client will be able to reach the server -# on 10.8.0.1. Comment this line out if you are -# ethernet bridging. See the man page for more info. -server 10.8.0.0 255.255.255.0 - -# Maintain a record of client <-> virtual IP address -# associations in this file. If OpenVPN goes down or -# is restarted, reconnecting clients can be assigned -# the same virtual IP address from the pool that was -# previously assigned. -ifconfig-pool-persist ipp.txt - -# Configure server mode for ethernet bridging. -# You must first use your OS's bridging capability -# to bridge the TAP interface with the ethernet -# NIC interface. Then you must manually set the -# IP/netmask on the bridge interface, here we -# assume 10.8.0.4/255.255.255.0. Finally we -# must set aside an IP range in this subnet -# (start=10.8.0.50 end=10.8.0.100) to allocate -# to connecting clients. Leave this line commented -# out unless you are ethernet bridging. -;server-bridge 10.8.0.4 255.255.255.0 10.8.0.50 10.8.0.100 - -# Configure server mode for ethernet bridging -# using a DHCP-proxy, where clients talk -# to the OpenVPN server-side DHCP server -# to receive their IP address allocation -# and DNS server addresses. You must first use -# your OS's bridging capability to bridge the TAP -# interface with the ethernet NIC interface. -# Note: this mode only works on clients (such as -# Windows), where the client-side TAP adapter is -# bound to a DHCP client. -;server-bridge - -# Push routes to the client to allow it -# to reach other private subnets behind -# the server. Remember that these -# private subnets will also need -# to know to route the OpenVPN client -# address pool (10.8.0.0/255.255.255.0) -# back to the OpenVPN server. -;push "route 192.168.10.0 255.255.255.0" -;push "route 192.168.20.0 255.255.255.0" - -# To assign specific IP addresses to specific -# clients or if a connecting client has a private -# subnet behind it that should also have VPN access, -# use the subdirectory "ccd" for client-specific -# configuration files (see man page for more info). - -# EXAMPLE: Suppose the client -# having the certificate common name "Thelonious" -# also has a small subnet behind his connecting -# machine, such as 192.168.40.128/255.255.255.248. -# First, uncomment out these lines: -;client-config-dir ccd -;route 192.168.40.128 255.255.255.248 -# Then create a file ccd/Thelonious with this line: -# iroute 192.168.40.128 255.255.255.248 -# This will allow Thelonious' private subnet to -# access the VPN. This example will only work -# if you are routing, not bridging, i.e. you are -# using "dev tun" and "server" directives. - -# EXAMPLE: Suppose you want to give -# Thelonious a fixed VPN IP address of 10.9.0.1. -# First uncomment out these lines: -;client-config-dir ccd -;route 10.9.0.0 255.255.255.252 -# Then add this line to ccd/Thelonious: -# ifconfig-push 10.9.0.1 10.9.0.2 - -# Suppose that you want to enable different -# firewall access policies for different groups -# of clients. There are two methods: -# (1) Run multiple OpenVPN daemons, one for each -# group, and firewall the TUN/TAP interface -# for each group/daemon appropriately. -# (2) (Advanced) Create a script to dynamically -# modify the firewall in response to access -# from different clients. See man -# page for more info on learn-address script. -;learn-address ./script - -# If enabled, this directive will configure -# all clients to redirect their default -# network gateway through the VPN, causing -# all IP traffic such as web browsing and -# and DNS lookups to go through the VPN -# (The OpenVPN server machine may need to NAT -# or bridge the TUN/TAP interface to the internet -# in order for this to work properly). -;push "redirect-gateway def1 bypass-dhcp" - -# Certain Windows-specific network settings -# can be pushed to clients, such as DNS -# or WINS server addresses. CAVEAT: -# http://openvpn.net/faq.html#dhcpcaveats -# The addresses below refer to the public -# DNS servers provided by opendns.com. -;push "dhcp-option DNS 208.67.222.222" -;push "dhcp-option DNS 208.67.220.220" - -# Uncomment this directive to allow different -# clients to be able to "see" each other. -# By default, clients will only see the server. -# To force clients to only see the server, you -# will also need to appropriately firewall the -# server's TUN/TAP interface. -;client-to-client - -# Uncomment this directive if multiple clients -# might connect with the same certificate/key -# files or common names. This is recommended -# only for testing purposes. For production use, -# each client should have its own certificate/key -# pair. -# -# IF YOU HAVE NOT GENERATED INDIVIDUAL -# CERTIFICATE/KEY PAIRS FOR EACH CLIENT, -# EACH HAVING ITS OWN UNIQUE "COMMON NAME", -# UNCOMMENT THIS LINE OUT. -;duplicate-cn - -# The keepalive directive causes ping-like -# messages to be sent back and forth over -# the link so that each side knows when -# the other side has gone down. -# Ping every 10 seconds, assume that remote -# peer is down if no ping received during -# a 120 second time period. -keepalive 10 120 - -# For extra security beyond that provided -# by SSL/TLS, create an "HMAC firewall" -# to help block DoS attacks and UDP port flooding. -# -# Generate with: -# openvpn --genkey --secret ta.key -# -# The server and each client must have -# a copy of this key. -# The second parameter should be '0' -# on the server and '1' on the clients. -;tls-auth ta.key 0 # This file is secret - -# Select a cryptographic cipher. -# This config item must be copied to -# the client config file as well. -cipher BF-CBC # Blowfish (default) -;cipher AES-128-CBC # AES -;cipher DES-EDE3-CBC # Triple-DES - -# Enable compression on the VPN link. -# If you enable it here, you must also -# enable it in the client config file. -comp-lzo - -# The maximum number of concurrently connected -# clients we want to allow. -max-clients 100 - -# It's a good idea to reduce the OpenVPN -# daemon's privileges after initialization. -# -# You can uncomment this out on -# non-Windows systems. -;user nobody -;group nobody - -# The persist options will try to avoid -# accessing certain resources on restart -# that may no longer be accessible because -# of the privilege downgrade. -persist-key -persist-tun - -# Output a short status file showing -# current connections, truncated -# and rewritten every minute. -status openvpn-status.log - -# By default, log messages will go to the syslog (or -# on Windows, if running as a service, they will go to -# the "\Program Files\OpenVPN\log" directory). -# Use log or log-append to override this default. -# "log" will truncate the log file on OpenVPN startup, -# while "log-append" will append to it. Use one -# or the other (but not both). -log openvpn.log -;log-append openvpn.log - -# Set the appropriate level of log -# file verbosity. -# -# 0 is silent, except for fatal errors -# 4 is reasonable for general usage -# 5 and 6 can help to debug connection problems -# 9 is extremely verbose -verb 3 - -# Silence repeating messages. At most 20 -# sequential messages of the same message -# category will be output to the log. -;mute 20 diff --git a/roles/OpenVPN-Server/handlers/main.yml b/roles/OpenVPN-Server/handlers/main.yml index f4d46a524e4bead9d9c68d927029967e6b915737..576203a36d646abaeed00f1688f1758cb750eb3b 100644 --- a/roles/OpenVPN-Server/handlers/main.yml +++ b/roles/OpenVPN-Server/handlers/main.yml @@ -1,3 +1,4 @@ --- - name: restart openvpn - service: name=openvpn state=restarted \ No newline at end of file + service: name=openvpn state=restarted + sudo: true diff --git a/roles/OpenVPN-Server/meta/main.yml b/roles/OpenVPN-Server/meta/main.yml new file mode 100644 index 0000000000000000000000000000000000000000..fea95205a62ffc78fd8ebcf73b61a89b46916eb5 --- /dev/null +++ b/roles/OpenVPN-Server/meta/main.yml @@ -0,0 +1,3 @@ +--- +dependencies: + - { role: easy-rsa-certificate, x509_csr_args="--server" } diff --git a/roles/OpenVPN-Server/tasks/copyCerts.yml b/roles/OpenVPN-Server/tasks/copyCerts.yml index 243fae4b19a47abde51879f623bb73d80fe1b466..c0a99622227b16d3465b8694e625f874246524ef 100644 --- a/roles/OpenVPN-Server/tasks/copyCerts.yml +++ b/roles/OpenVPN-Server/tasks/copyCerts.yml @@ -17,3 +17,6 @@ - ../files/ notify: restart openvpn +- name: "Start OpenVPN" + service: name=openvpn state=started + sudo: true diff --git a/roles/OpenVPN-Server/tasks/installOpenVPN.yml b/roles/OpenVPN-Server/tasks/installOpenVPN.yml index 3b5999e0b6f834c44356c84a0b911c12098e0f6d..fe7c052f8a153fbb4baff29ed47bdfe953e88edc 100644 --- a/roles/OpenVPN-Server/tasks/installOpenVPN.yml +++ b/roles/OpenVPN-Server/tasks/installOpenVPN.yml @@ -1,4 +1,16 @@ --- -- - name: "Install OpenVPN" +- name: "Install OpenVPN" yum: "name=openvpn state=present" + notify: "restart openvpn" + sudo: true + +- name: "Generate DH parameters" + shell: openssl dhparam -out {{ dhparms_file }} 512 + args: + creates: "{{ dhparms_file }}" + sudo: true + +- name: "Configure OpenVPN Server" + template: "src=server.conf.j2 dest=/etc/openvpn/server.conf" + notify: "restart openvpn" + sudo: true diff --git a/roles/OpenVPN-Server/tasks/main.yml b/roles/OpenVPN-Server/tasks/main.yml index 7939b7cdbe2222af4bc5436553bc99a103d867fb..387f2bca8837485a71491c9becc9e4fc0362e416 100644 --- a/roles/OpenVPN-Server/tasks/main.yml +++ b/roles/OpenVPN-Server/tasks/main.yml @@ -1,5 +1,7 @@ --- - include: installOpenVPN.yml -- - include: copyCerts.yml + +- name: "Start OpenVPN" + service: name=openvpn state=started + sudo: true diff --git a/roles/OpenVPN-Server/templates/server.conf.j2 b/roles/OpenVPN-Server/templates/server.conf.j2 index f191cb4571d09f01912c74943598a4c3cf3779a1..9d9d5fef88145687378d9e307d5adad91166b364 100644 --- a/roles/OpenVPN-Server/templates/server.conf.j2 +++ b/roles/OpenVPN-Server/templates/server.conf.j2 @@ -32,8 +32,8 @@ local {{ inventory_hostname }} port 1194 # TCP or UDP server? -proto tcp -;proto udp +;proto tcp +proto udp # "dev tun" will create a routed IP tunnel, # "dev tap" will create an ethernet tunnel. @@ -75,16 +75,16 @@ dev tun # Any X509 key management system can be used. # OpenVPN can also use a PKCS #12 formatted key file # (see "pkcs12" directive in man page). -ca ca.crt -cert {{ inventory_hostname }}.crt -key {{ inventory_hostname }}.key +ca {{ x509_cacert_file }} +cert {{ x509_cert_file }} +key {{ x509_key_file }} # Diffie hellman parameters. # Generate your own with: # openssl dhparam -out dh1024.pem 1024 # Substitute 2048 for 1024 if you are using # 2048 bit keys. -dh dh512.pem +dh {{ dhparms_file }} # Configure server mode and supply a VPN subnet # for OpenVPN to draw client addresses from. @@ -201,7 +201,7 @@ ifconfig-pool-persist ipp.txt # To force clients to only see the server, you # will also need to appropriately firewall the # server's TUN/TAP interface. -;client-to-client +client-to-client # Uncomment this directive if multiple clients # might connect with the same certificate/key diff --git a/roles/OpenVPN-Server/vars/main.yml b/roles/OpenVPN-Server/vars/main.yml new file mode 100644 index 0000000000000000000000000000000000000000..84cc2861a18390a45dafc791ee80de8bf1e3a132 --- /dev/null +++ b/roles/OpenVPN-Server/vars/main.yml @@ -0,0 +1,7 @@ +--- +x509_csr_args: "--server" +x509_cacert_file: "/etc/ssl/certs/cacert.pem" +x509_key_file: "/etc/ssl/private/server.key" +x509_cert_file: "/etc/ssl/certs/server.pem" +x509_common_name: "{{ ansible_fqdn }}_OpenVPN_Server" +dhparms_file: "/etc/ssl/private/dh.pem" diff --git a/roles/easy-rsa-CA-client/meta/main.yml b/roles/easy-rsa-CA-client/meta/main.yml deleted file mode 100644 index 47d82924b50117d9d5b167e74845abc912ac292e..0000000000000000000000000000000000000000 --- a/roles/easy-rsa-CA-client/meta/main.yml +++ /dev/null @@ -1,4 +0,0 @@ ---- -depdenencies: - - {role: easy-rsa-common } - diff --git a/roles/easy-rsa-CA-client/tasks/buildClientCert.yml b/roles/easy-rsa-CA-client/tasks/buildClientCert.yml deleted file mode 100644 index 8aa0107f94a014111438d61476be16d9aa3f635e..0000000000000000000000000000000000000000 --- a/roles/easy-rsa-CA-client/tasks/buildClientCert.yml +++ /dev/null @@ -1,31 +0,0 @@ ---- -- name: "Check client ca certificate" - register: client_ca_cert - stat: "path=/etc/openvpn/ca.crt" - -- name: "Check client signed key certificate" - register: client_sign_cert - stat: "path=/etc/openvpn/{{ inventory_hostname }}.crt" - -- name: "Check client key" - register: client_key - stat: "path=/etc/openvpn/{{ inventory_hostname }}.key" - -- name: "Creating Client certificate" - delegate_to: "{{ server }}" - shell: " cd /etc/easy-rsa/2.0; source ./vars; export EASY_RSA=\"${EASY_RSA:-.}\"; \"$EASY_RSA\"/pkitool --csr {{ inventory_hostname }} ;\"$EASY_RSA\"/pkitool --sign {{ inventory_hostname }} creates=/etc/easy-rsa/2.0/keys/{{ inventory_hostname }}.crt" - -- name: "Copy the Client signed certificate to the master node" - delegate_to: "{{ server }}" - fetch: "src=/etc/easy-rsa/2.0/keys/{{ inventory_hostname }}.crt dest=/tmp/{{ inventory_hostname }}/ fail_on_missing=yes validate_md5=yes flat=yes" - when: "client_sign_cert.stat.exists == false" - -- name: "Copy the Client Key to the master node" - delegate_to: "{{ server }}" - fetch: "src=/etc/easy-rsa/2.0/keys/{{ inventory_hostname }}.key dest=/tmp/{{ inventory_hostname }}/ fail_on_missing=yes validate_md5=yes flat=yes" - when: "client_key.stat.exists == false" - -- name: "Copy the CA Certificate to the master node" - delegate_to: "{{ server }}" - fetch: "src=/etc/easy-rsa/2.0/keys/ca.crt dest=/tmp/{{ inventory_hostname }}/ fail_on_missing=yes validate_md5=yes flat=yes" - when: "client_ca_cert.stat.exists == false" diff --git a/roles/easy-rsa-CA-client/tasks/main.yml b/roles/easy-rsa-CA-client/tasks/main.yml deleted file mode 100644 index 73fc5d8700f83f489084aa0b075e86c0e3750c17..0000000000000000000000000000000000000000 --- a/roles/easy-rsa-CA-client/tasks/main.yml +++ /dev/null @@ -1,3 +0,0 @@ ---- -- - include: buildClientCert.yml diff --git a/roles/easy-rsa-CA-server/tasks/buildServerCert.yml b/roles/easy-rsa-CA-server/tasks/buildServerCert.yml deleted file mode 100644 index 1a35032965f45ca8ae1c12b88e433138af60939b..0000000000000000000000000000000000000000 --- a/roles/easy-rsa-CA-server/tasks/buildServerCert.yml +++ /dev/null @@ -1,9 +0,0 @@ ---- -- name: "Creating Server certificate" - shell: "cd /etc/easy-rsa/2.0; source ./vars; export EASY_RSA=\"${EASY_RSA:-.}\"; \"$EASY_RSA/pkitool\" --server {{ server }} creates=/etc/easy-rsa/2.0/keys/{{ server }}.crt" - -- name: "Generating Diffie-Hellman Parameters" - shell: "cd /etc/easy-rsa/2.0; source ./vars; ./build-dh" - args: - chdir: /etc/easy-rsa/2.0/keys/ - creates: dh512.pem diff --git a/roles/easy-rsa-CA-server/tasks/main.yml b/roles/easy-rsa-CA-server/tasks/main.yml deleted file mode 100644 index 69333644c40726ecf03556abf311c22838f1116a..0000000000000000000000000000000000000000 --- a/roles/easy-rsa-CA-server/tasks/main.yml +++ /dev/null @@ -1,3 +0,0 @@ ---- -- - include: buildServerCert.yml diff --git a/roles/easy-rsa-CA/meta/main.yml b/roles/easy-rsa-CA/meta/main.yml index 47d82924b50117d9d5b167e74845abc912ac292e..dc914d62df792bede60e60e0efe363085750c9f8 100644 --- a/roles/easy-rsa-CA/meta/main.yml +++ b/roles/easy-rsa-CA/meta/main.yml @@ -1,4 +1,5 @@ --- -depdenencies: - - {role: easy-rsa-common } +allow_duplicates: yes +dependencies: + - { role: easy-rsa-common } diff --git a/roles/easy-rsa-CA/tasks/buildCA.yml b/roles/easy-rsa-CA/tasks/buildCA.yml index f6624664d58df6670e926d5dad261f0e7f28e72b..671ef4e8eb3801d4442834f2a7eea94fa322b13d 100644 --- a/roles/easy-rsa-CA/tasks/buildCA.yml +++ b/roles/easy-rsa-CA/tasks/buildCA.yml @@ -3,4 +3,5 @@ name: "Building the CA Certificate" shell: ' cd /etc/easy-rsa/2.0; source ./vars; ./clean-all; export EASY_RSA="${EASY_RSA:-.}"; "$EASY_RSA/pkitool" --initca $*' args: - creates: /etc/easy-rsa/2.0/keys + creates: /etc/easy-rsa/2.0/keys/ca.crt + sudo: True diff --git a/roles/easy-rsa-CA-server/meta/main.yml b/roles/easy-rsa-certificate/meta/main.yml similarity index 70% rename from roles/easy-rsa-CA-server/meta/main.yml rename to roles/easy-rsa-certificate/meta/main.yml index 47d82924b50117d9d5b167e74845abc912ac292e..837a763b2876b919420ce91f0d9fdcd0cfe6afd2 100644 --- a/roles/easy-rsa-CA-server/meta/main.yml +++ b/roles/easy-rsa-certificate/meta/main.yml @@ -1,4 +1,4 @@ --- -depdenencies: +dependencies: - {role: easy-rsa-common } diff --git a/roles/easy-rsa-certificate/tasks/buildCert.yml b/roles/easy-rsa-certificate/tasks/buildCert.yml new file mode 100644 index 0000000000000000000000000000000000000000..e2f1517f767e040f51a19670e853344008ec99bf --- /dev/null +++ b/roles/easy-rsa-certificate/tasks/buildCert.yml @@ -0,0 +1,96 @@ +--- +- name: "Check client ca certificate" + register: ca_cert + stat: "path={{ x509_cacert_file }}" + +- name: "Check certificate and key" + shell: (openssl x509 -noout -modulus -in {{ x509_cert_file }} | openssl md5 ; openssl rsa -noout -modulus -in {{ x509_key_file }} | openssl md5) | uniq | wc -l + register: certcheck + sudo: true + +- name: "Check certificate" + register: cert + stat: "path={{ x509_cert_file }}" + sudo: true + +- name: "Check key" + register: key + stat: "path={{ x509_key_file }}" + sudo: true + +- name: "Default: we don't need a new certificate" + set_fact: needcert=False + +- name: "Set need cert if key is missing" + set_fact: needcert=True + when: key.stat.exists == false + +- name: "set needcert if cert is missing" + set_fact: needcert=True + when: cert.stat.exists == false + +- name: "set needcert if cert doesn't match key" + set_fact: needcert=True + when: certcheck.stdout == '2' + + +- name: "Creating Keypair" + shell: "echo noop when using easy-rsa" + when: needcert + +- name: "Creating CSR" + shell: " cd /etc/easy-rsa/2.0; source ./vars; export EASY_RSA=\"${EASY_RSA:-.}\"; \"$EASY_RSA\"/pkitool --csr {{ x509_csr_args }} {{ x509_common_name }}" + args: + creates: "/etc/easy-rsa/2.0/keys/{{ x509_common_name }}.key" + when: needcert + sudo: true + +- name: "Copy CSR to ansible host" + fetch: "src=/etc/easy-rsa/2.0/keys/{{ x509_common_name }}.csr dest=/tmp/ fail_on_missing=yes validate_md5=yes flat=yes" + sudo: true + when: needcert + +- name: "Copy CSR to CA" + delegate_to: "{{ x509_ca_server }}" + copy: "src=/tmp/{{ x509_common_name }}.csr dest=/etc/easy-rsa/2.0/keys/{{ x509_common_name }}.csr force=yes" + when: needcert + sudo: true + +- name: "Sign Certificate" + delegate_to: "{{ x509_ca_server }}" + shell: "source ./vars; export EASY_RSA=\"${EASY_RSA:-.}\" ;\"$EASY_RSA\"/pkitool --sign {{ x509_sign_args }} {{ x509_common_name }}" + args: + chdir: "/etc/easy-rsa/2.0" + creates: "/etc/easy-rsa/2.0/keys/{{ x509_common_name }}.crt" + sudo: true + +- name: "Copy the Certificate to ansible host" + delegate_to: "{{ x509_ca_server }}" + fetch: "src=/etc/easy-rsa/2.0/keys/{{ x509_common_name }}.crt dest=/tmp/ fail_on_missing=yes validate_md5=yes flat=yes" + sudo: true + when: needcert + +- name: "Copy the CA Certificate to the ansible host" + delegate_to: "{{ x509_ca_server }}" + fetch: "src=/etc/easy-rsa/2.0/keys/ca.crt dest=/tmp/ca.crt fail_on_missing=yes validate_md5=yes flat=yes" + sudo: true + when: "ca_cert.stat.exists == false" + +- name: "Make sure the path to the certificate exists" + shell: "mkdir -p `dirname {{ x509_cert_file }}` ; chmod 755 `dirname {{ x509_cert_file }}`" + sudo: true + +- name: "Copy the certificate to the node" + copy: "src=/tmp/{{ x509_common_name }}.crt dest={{ x509_cert_file }} force=yes" + sudo: true + when: needcert + +- name: "Copy the CA certificate to the node" + copy: "src=/tmp/ca.crt dest={{ x509_cacert_file }}" + sudo: true + when: "ca_cert.stat.exists == false" + +- name: "Copy the key to the correct location" + shell: "mkdir -p `dirname {{ x509_key_file }}` ; chmod 700 `dirname {{ x509_key_file }}` ; cp /etc/easy-rsa/2.0/keys/{{ x509_common_name }}.key {{ x509_key_file }}" + sudo: true + when: needcert diff --git a/roles/easy-rsa-certificate/tasks/main.yml b/roles/easy-rsa-certificate/tasks/main.yml new file mode 100644 index 0000000000000000000000000000000000000000..475415cc2e1cf8b2d9b7303f530544caf699011e --- /dev/null +++ b/roles/easy-rsa-certificate/tasks/main.yml @@ -0,0 +1,3 @@ +--- +- + include: buildCert.yml diff --git a/roles/easy-rsa-certificate/vars/main.yml b/roles/easy-rsa-certificate/vars/main.yml new file mode 100644 index 0000000000000000000000000000000000000000..b59020414c56eab836ff7d61f866758d9593d551 --- /dev/null +++ b/roles/easy-rsa-certificate/vars/main.yml @@ -0,0 +1,7 @@ +--- +x509_key_file: "/etc/ssl/private/server.key" +x509_cert_file: "/etc/ssl/certs/server.crt" +x509_cacert_file: "/etc/ssl/certs/ca.crt" +x509_csr_args: "" +x509_sign_args: "{{ x509_csr_args }}" +x509_common_name: "{{ ansible_fqdn }}" diff --git a/roles/easy-rsa-common/tasks/copyConfigurationFile.yml b/roles/easy-rsa-common/tasks/copyConfigurationFile.yml index 0bd44099d8380443f30698d35f164c5dcf5b85f1..c7e3635b36f2e4e862fe47b6e70285f26bf26dd5 100644 --- a/roles/easy-rsa-common/tasks/copyConfigurationFile.yml +++ b/roles/easy-rsa-common/tasks/copyConfigurationFile.yml @@ -10,3 +10,11 @@ - ../../../templates/easy-rsa/ - ../files/ + sudo: True + +- name: "Initialise easy-rsa" + shell: " source ./vars ; ./clean-all" + args: + chdir: "/etc/easy-rsa/2.0" + creates: "/etc/easy-rsa/2.0/keys" + sudo: true diff --git a/roles/easy-rsa-common/tasks/installEasyRsa.yml b/roles/easy-rsa-common/tasks/installEasyRsa.yml index 80d80a19dd03c8959774dd0a7d94d4a1ac4d7004..9062831491020d4597030217af28bde6b8eb9392 100644 --- a/roles/easy-rsa-common/tasks/installEasyRsa.yml +++ b/roles/easy-rsa-common/tasks/installEasyRsa.yml @@ -2,8 +2,10 @@ - name: "Installing easy-rsa" yum: "name=easy-rsa state=latest" + sudo: True - name: "Moving easy-rsa to /etc" shell: "cp -rf /usr/share/easy-rsa /etc/" args: creates: /etc/easy-rsa + sudo: True