Go to file
2023-07-05 11:10:37 -07:00
defaults Rewrote playbook as a role. 2023-05-23 08:30:17 -07:00
handlers Rewrote playbook as a role. 2023-05-23 08:30:17 -07:00
meta Rewrote playbook as a role. 2023-05-23 08:30:17 -07:00
tasks Rewrote playbook as a role. 2023-05-23 08:30:17 -07:00
templates Rewrote playbook as a role. 2023-05-23 08:30:17 -07:00
.gitignore Minor change to gitignore. 2023-07-05 11:10:37 -07:00
LICENSE Rewrote playbook as a role. 2023-05-23 08:30:17 -07:00
README.md Rewrote playbook as a role. 2023-05-23 08:30:17 -07:00

Ansible Role: Wireguard

This Ansible Role manages wireguard configuration.

Requirements

None.

Platforms

Any distro with a repository that has wireguard-tools. It has only been tested on the following:

  • Ubuntu 22.04
  • Debian 11

Legacy systems

For distros that do not have the package in their repositories, see the official installation instructions for your specific distro.

For example, the older Debian 10 buster basically needs you to build the module for the kernel using dkms:

apt-get install linux-headers-$(uname -r)
apt-get reinstall wireguard-dkms

Role Variables

Available variables are listed below, along with default values (see defaults/main.yml):

wireguard_public_key: '..'
wireguard_private_key: '..'
wireguard_subnet: 10.0.0.0/24
wireguard_address: 10.0.0.1/24
wireguard_listen_port: 42069
wireguard_peers:
  - { allowed_ips: '10.0.0.100/32', public_key: '..' }

Secrets

I use pass as a local secret store, which keeps credentials outside of any source code repository. To add credentials for a new host, generate a new key pair for a host example.acme.com:

key=$(wg genkey)
echo $key | pass insert -e example.com/hostname/WIREGUARD_PRIVATE_KEY
echo $key | wg pubkey
unset key

Then add an entry to your .env so you can source the private key before the playbook runs.

export example_WIREGUARD_PRIVATE_KEY=$(pass acme.com/example/WIREGUARD_PRIVATE_KEY)

Example Playbook

- hosts: all
  roles:
    - bleetube.wireguard