-
-
Notifications
You must be signed in to change notification settings - Fork 17
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
Add different providers for wireguard
- Loading branch information
1 parent
9191b76
commit e8b279e
Showing
5 changed files
with
161 additions
and
28 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
|
@@ -17,6 +17,7 @@ | |
# @param routes different routes for the systemd-networkd configuration | ||
# @param private_key Define private key which should be used for this interface, if not provided a private key will be generated | ||
# @param preshared_key Define preshared key which should be used for this interface | ||
# @param provider Set provider for interface config. Allowed values: systemd, wgquick (default: systemd) | ||
# | ||
# @author Tim Meusel <[email protected]> | ||
# @author Sebastian Rakel <[email protected]> | ||
|
@@ -94,6 +95,7 @@ | |
Array[Hash[String[1], Variant[String[1], Boolean]]] $routes = [], | ||
Optional[String[1]] $private_key = undef, | ||
Optional[String[1]] $preshared_key = undef, | ||
Enum['systemd', 'wgquick'] $provider = 'systemd', | ||
) { | ||
require wireguard | ||
|
@@ -171,33 +173,30 @@ | |
$peer = [] | ||
} | ||
systemd::network { "${interface}.netdev": | ||
content => epp("${module_name}/netdev.epp", { | ||
'interface' => $interface, | ||
'dport' => $dport, | ||
'description' => $description, | ||
'preshared_key' => $preshared_key, | ||
'mtu' => $mtu, | ||
'peers' => $peers + $peer, | ||
}), | ||
restart_service => true, | ||
owner => 'root', | ||
group => 'systemd-network', | ||
mode => '0440', | ||
require => File["/etc/wireguard/${interface}"], | ||
} | ||
$network_epp_params = { | ||
'interface' => $interface, | ||
'addresses' => $addresses, | ||
'routes' => $routes, | ||
} | ||
systemd::network { "${interface}.network": | ||
content => epp("${module_name}/network.epp", $network_epp_params), | ||
restart_service => true, | ||
owner => 'root', | ||
group => 'systemd-network', | ||
mode => '0440', | ||
case $provider { | ||
'systemd': { | ||
class { 'wireguard::provider::systemd': | ||
interface => $interface, | ||
peers => $peers + $peer, | ||
dport => $dport, | ||
addresses => $addresses, | ||
description => $description, | ||
mtu => $mtu, | ||
routes => $routes, | ||
preshared_key => $preshared_key, | ||
} | ||
} | ||
'wgquick': { | ||
class { 'wireguard::provider::wgquick': | ||
interface => $interface, | ||
peers => $peers + $peer, | ||
dport => $dport, | ||
addresses => $addresses, | ||
preshared_key => $preshared_key, | ||
} | ||
} | ||
default: { | ||
fail("provider ${provider} not supported") | ||
} | ||
} | ||
} |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,53 @@ | ||
# | ||
# @summary manages a systemd wireguard interface | ||
# | ||
# @param interface the name for the wg interface | ||
# @param peers is an array of struct (Wireguard::Peers) for multiple peers | ||
# @param dport destination for firewall rules / where our wg instance will listen on. defaults to the last digits from the title | ||
# @param addresses different addresses for the systemd-networkd configuration | ||
# @param description an optional string that will be added to the wireguard network interface | ||
# @param mtu configure the MTU (maximum transision unit) for the wireguard tunnel. By default linux will figure this out. You might need to lower it if you're connection through a DSL line. MTU needs to be equal on both tunnel endpoints | ||
# @param routes different routes for the systemd-networkd configuration | ||
# @param preshared_key Define preshared key which should be used for this interface | ||
# | ||
# @see https://www.freedesktop.org/software/systemd/man/systemd.netdev.html#%5BWireGuardPeer%5D%20Section%20Options | ||
class wireguard::provider::systemd ( | ||
String[1] $interface, | ||
Wireguard::Peers $peers = [], | ||
Integer[1024, 65000] $dport = Integer(regsubst($title, '^\D+(\d+)$', '\1')), | ||
Array[Hash[String,Variant[Stdlib::IP::Address::V4::CIDR,Stdlib::IP::Address::V6::CIDR]]] $addresses = [], | ||
Optional[String[1]] $description = undef, | ||
Optional[Integer[1280, 9000]] $mtu = undef, | ||
Array[Hash[String[1], Variant[String[1], Boolean]]] $routes = [], | ||
Optional[String[1]] $preshared_key = undef, | ||
) { | ||
systemd::network { "${interface}.netdev": | ||
content => epp("${module_name}/netdev.epp", { | ||
'interface' => $interface, | ||
'dport' => $dport, | ||
'description' => $description, | ||
'mtu' => $mtu, | ||
'peers' => $peers, | ||
'preshared_key' => $preshared_key, | ||
}), | ||
restart_service => true, | ||
owner => 'root', | ||
group => 'systemd-network', | ||
mode => '0440', | ||
require => File["/etc/wireguard/${interface}"], | ||
} | ||
|
||
$network_epp_params = { | ||
'interface' => $interface, | ||
'addresses' => $addresses, | ||
'routes' => $routes, | ||
} | ||
|
||
systemd::network { "${interface}.network": | ||
content => epp("${module_name}/network.epp", $network_epp_params), | ||
restart_service => true, | ||
owner => 'root', | ||
group => 'systemd-network', | ||
mode => '0440', | ||
} | ||
} |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,30 @@ | ||
# | ||
# @summary manages a wireguard config file for wg-quick | ||
# | ||
# @param interface the name for the wg interface | ||
# @param peers is an array of struct (Wireguard::Peers) for multiple peers | ||
# @param dport destination for firewall rules / where our wg instance will listen on. defaults to the last digits from the title | ||
# @param addresses different addresses for the systemd-networkd configuration | ||
# @param preshared_key Define preshared key which should be used for this interface | ||
# | ||
class wireguard::provider::wgquick ( | ||
String[1] $interface, | ||
Wireguard::Peers $peers = [], | ||
Integer[1024, 65000] $dport = Integer(regsubst($title, '^\D+(\d+)$', '\1')), | ||
Array[Hash[String,Variant[Stdlib::IP::Address::V4::CIDR,Stdlib::IP::Address::V6::CIDR]]] $addresses = [], | ||
Optional[String[1]] $preshared_key = undef, | ||
) { | ||
$params = { | ||
'interface' => $interface, | ||
'dport' => $dport, | ||
'peers' => $peers, | ||
'addresses' => $addresses, | ||
'preshared_key' => $preshared_key, | ||
} | ||
|
||
file { "/etc/wireguard/${interface}.conf": | ||
content => epp("${module_name}/wireguard_conf.epp", $params), | ||
owner => 'root', | ||
mode => '0600', | ||
} | ||
} |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,27 @@ | ||
<%- | | ||
String[1] $interface, | ||
Stdlib::Port $dport, | ||
Wireguard::Peers $peers, | ||
Array[Hash] $addresses, | ||
| -%> | ||
[Interface] | ||
<% $addresses.each |$address| { -%> | ||
Address = <%= $address['Address'] %> | ||
<% } -%> | ||
ListenPort = <%= $dport %> | ||
PostUp = wg set %i private-key /etc/wireguard/<%= $interface %> | ||
<% $peers.each |$peer| { -%> | ||
|
||
[Peer] | ||
PublicKey=<%= $peer['public_key'] %> | ||
<% if $peer['endpoint'] { -%> | ||
Endpoint=<%= $peer['endpoint'] %> | ||
<% } -%> | ||
<% if $preshared_key { -%> | ||
PresharedKey=<%= $preshared_key %> | ||
<% } -%> | ||
PersistentKeepalive=<%= pick($peer['persistent_keepalive'], 0) %> | ||
<% pick($peer['allowed_ips'], ['fe80::/64', 'fd00::/8', '0.0.0.0/0']).each |$allowed_ip| { -%> | ||
AllowedIPs=<%= $allowed_ip %> | ||
<% } -%> | ||
<% } -%> |