Mohammed Naser 122c529e20 Add Debian support
Change-Id: I432f225d397773d029b6c80b3293ba3da119b45f
2019-04-10 23:23:09 -04:00
2019-04-04 23:23:10 -04:00
2019-04-10 23:23:09 -04:00
2019-04-10 23:23:09 -04:00
2019-04-04 23:11:35 -04:00
2019-04-10 21:54:24 -04:00
2019-04-10 23:23:09 -04:00
2019-04-10 23:23:09 -04:00
2019-04-04 22:16:39 -04:00
2019-04-04 22:39:17 -04:00

WireGuard

Dependencies

This role does not take care of generating keys for you. You should be able to take care of that yourself.

RHEL/CentOS

This role depends on the fact that you have the EPEL repositories installed on your machine. It does not manage that for you.

Usage

This example below should be pretty self-explanitory.

---
- hosts: vpn1.internal
  roles:
    - wireguard
  vars:
    wireguard_links:
      - name: wg0
        address: 10.0.0.1
        port: 51820
        private_key: eCpvWOe8zI0HCj/KjK3TZP71kd+glDxvDo5JaQhw3mw=
        post_up: iptables ...
        post_down: iptables ...
        peers:
          - public_key: UB9Lhk0JgwAPFD8F3k3Dq9iS7r/jLD+oYMX98T+fmGw=
            endpoint: vpn2.internal:51820
            allowed_ips: 10.0.0.2

- hosts: vpn2.internal
  roles:
      - wireguard
  vars:
    wireguard_links:
      - name: wg0
        address: 10.0.0.2
        port: 51820
        private_key: aIPcdRd6ncwRa+DJLaiq0Jmbvx1FjtLnWE2EApgcr2E=
        post_up: iptables ...
        post_down: iptables ...
        peers:
          - public_key: E/MU5hNb1mQ55ww0H0luxigNTXNNo/x49MRm5AcHLSI=
            endpoint: vpn1.internal:51820
            allowed_ips: 10.0.0.1
Description
Ansible role to manage Wireguard tunnels
Readme 77 KiB
Languages
Jinja 100%