Enable IPv6 on Host #1
@ -2,6 +2,11 @@
 | 
			
		||||
### Ansible
 | 
			
		||||
###
 | 
			
		||||
ansible_host: 5.9.220.114
 | 
			
		||||
ansible_host_net: /29
 | 
			
		||||
ansible_host_ipv6: 2a01:4f8:262:5112::101
 | 
			
		||||
ansible_host_ipv6_net: /64
 | 
			
		||||
ipv4_gateway: 5.9.220.112
 | 
			
		||||
ipv6_gateway: 2a01:4f8:262:5112::3
 | 
			
		||||
ansible_port: 22
 | 
			
		||||
ansible_ssh_user: root
 | 
			
		||||
ansible_python_interpreter: /usr/bin/python3
 | 
			
		||||
 | 
			
		||||
@ -1,4 +1,9 @@
 | 
			
		||||
ansible_host: 5.9.220.115
 | 
			
		||||
ansible_host_net: /29
 | 
			
		||||
ansible_host_ipv6: 2a01:4f8:262:5112::102
 | 
			
		||||
ansible_host_ipv6_net: /64
 | 
			
		||||
ipv4_gateway: 5.9.220.112
 | 
			
		||||
ipv6_gateway: 2a01:4f8:262:5112::3
 | 
			
		||||
ansible_port: 22
 | 
			
		||||
ansible_ssh_user: root
 | 
			
		||||
ansible_python_interpreter: /usr/bin/python3
 | 
			
		||||
 | 
			
		||||
@ -48,10 +48,24 @@
 | 
			
		||||
    state: latest
 | 
			
		||||
    update_cache: yes
 | 
			
		||||
 | 
			
		||||
- name: Find all Netplan Files without of the freifunk file 
 | 
			
		||||
  find:
 | 
			
		||||
    paths: /etc/netplan/
 | 
			
		||||
    file_type: file
 | 
			
		||||
    excludes: 
 | 
			
		||||
      - "01-freifunk.yaml"
 | 
			
		||||
  register: found_files
 | 
			
		||||
 | 
			
		||||
- name: Delete files
 | 
			
		||||
  file:
 | 
			
		||||
    path: "{{ item.path }}"
 | 
			
		||||
    state: absent
 | 
			
		||||
  with_items: "{{ found_files['files'] }}"
 | 
			
		||||
 | 
			
		||||
- name: Copy Netplan Template for Internal Network
 | 
			
		||||
  ansible.builtin.template:
 | 
			
		||||
    src: netplan.j2
 | 
			
		||||
    dest: /etc/netplan/01-freifunk-internal.yaml
 | 
			
		||||
    dest: /etc/netplan/01-freifunk.yaml
 | 
			
		||||
    owner: root
 | 
			
		||||
    group: root
 | 
			
		||||
    mode: 755
 | 
			
		||||
 | 
			
		||||
@ -1,5 +1,24 @@
 | 
			
		||||
network:
 | 
			
		||||
  ethernets:
 | 
			
		||||
    ens18:
 | 
			
		||||
      addresses:
 | 
			
		||||
      - {{ ansible_host }}{{ ansible_host_net }}
 | 
			
		||||
      - {{ ansible_host_ipv6 }}{{ ansible_host_ipv6_net }}
 | 
			
		||||
      nameservers:
 | 
			
		||||
        addresses:
 | 
			
		||||
        - 1.1.1.1
 | 
			
		||||
      routes:
 | 
			
		||||
      - to: default
 | 
			
		||||
        via: {{ ipv4_gateway }}
 | 
			
		||||
        table: 42
 | 
			
		||||
      - to: default
 | 
			
		||||
        via: {{ ipv6_gateway }}
 | 
			
		||||
        table: 42
 | 
			
		||||
      routing-policy:
 | 
			
		||||
      - from: {{ ansible_host }}
 | 
			
		||||
        table: 42
 | 
			
		||||
      - from: {{ ansible_host_ipv6 }}
 | 
			
		||||
        table: 42
 | 
			
		||||
    ens19:
 | 
			
		||||
      dhcp4: false
 | 
			
		||||
      addresses:
 | 
			
		||||
@ -10,5 +29,4 @@ network:
 | 
			
		||||
      routes:
 | 
			
		||||
      - to: default
 | 
			
		||||
        via: {{ core_router }}
 | 
			
		||||
        table: 42
 | 
			
		||||
  version: 2
 | 
			
		||||
@ -1,9 +0,0 @@
 | 
			
		||||
#!/bin/sh
 | 
			
		||||
 | 
			
		||||
ip rule add fwmark 0x4 table 42
 | 
			
		||||
iptables -t mangle -A PREROUTING -s 10.255.0.0/16 ! -d 10.0.0.0/8 -j MARK --set-mark 4
 | 
			
		||||
routeExists=$(ip route show table 42 | grep '172.16.7.1')
 | 
			
		||||
 | 
			
		||||
if [ -z "$routeExists" ]; then
 | 
			
		||||
    ip route add default via 172.16.7.1 table 42
 | 
			
		||||
fi
 | 
			
		||||
@ -84,16 +84,6 @@
 | 
			
		||||
  notify:
 | 
			
		||||
    - reconfigure wireguard
 | 
			
		||||
 | 
			
		||||
- name: Copy PostUp Script
 | 
			
		||||
  ansible.builtin.copy:
 | 
			
		||||
    src: postup.sh
 | 
			
		||||
    dest: /etc/wireguard/postup.sh
 | 
			
		||||
    mode: 755
 | 
			
		||||
  tags:
 | 
			
		||||
    - wg-config
 | 
			
		||||
  notify:
 | 
			
		||||
    - reconfigure wireguard
 | 
			
		||||
 | 
			
		||||
- name: Start and enable WireGuard service
 | 
			
		||||
  ansible.builtin.service:
 | 
			
		||||
    name: "wg-quick@vpn01"
 | 
			
		||||
 | 
			
		||||
@ -9,9 +9,6 @@ PrivateKey = {{ wireguard_private_key }}
 | 
			
		||||
ListenPort = {{ wireguard_port }}
 | 
			
		||||
MTU = 1380
 | 
			
		||||
 | 
			
		||||
PostUp = /etc/wireguard/postup.sh
 | 
			
		||||
PostDown = ip route del default via 172.16.7.1 table 42
 | 
			
		||||
 | 
			
		||||
 | 
			
		||||
{% if wireguard_unmanaged_peers is defined %}
 | 
			
		||||
# Peers not managed by Ansible from "wireguard_unmanaged_peers" variable
 | 
			
		||||
 | 
			
		||||
		Loading…
	
		Reference in New Issue
	
	Block a user