WireGuard is an extremely simple yet fast and modern VPN that utilizes state-of-the-art cryptography.
- misc ›
This charm provides WireGuard. WireGuard describes itself as an
extremely simple yet fast and modern VPN that utilizes state-of-the-art
cryptography. It aims to be faster, simpler, leaner, and more useful than IPSec,
while avoiding the massive headache. It intends to be considerably more
performant than OpenVPN. WireGuard is designed as a general purpose VPN for
running on embedded interfaces and super computers alike, fit for many different
circumstances. Initially released for the Linux kernel, it is now cross-platform
and widely deployable. It is currently under heavy development, but already it
might be regarded as the most secure, easiest to use, and simplest VPN solution
in the industry.
This charm is in initial development and is not feature complete.
juju deploy cs:~pirate-charmers/wireguard
By default the charm sets up as a server, enabling routing of traffic. The
device for the routing traffic defaults to eth0 and can be set with the
configuration option 'forward-dev'.
The private address is set with the configuration option 'address' and must be
unique. If two servers are deployed as peers one must have the address changed.
Peers are configured with the configuration option 'peers' and expects a base64
encoded string of a yaml configuration. To supply this in a bundle use the
include-base64:// parameter to include the yaml file. To supply this via command
line for a peers.yaml in the current directory:
juju config wireguard peers="$(base64 ./peers.yaml)"
Known Limitations and Issues
This charm is under development, several other use cases/features are still under
consideration. Merge requests are appreciated, some examples of current limitations include.
- No wireguard relation for automatic configuration of two peers
- Routing is either on or off, no option to limit or blacklist routes on the
- Functional testing is minimal
Upstream Project Information
- Code: https://github.com/chris-sanders/layer-wireguard
- Bug tracking: https://github.com/chris-sanders/layer-wireguard/issues
- Contact information: email@example.com
- (string) Interface address
- (string) Device to forward packets on
- (boolean) Forward packets for clients
- (int) UDP port to listen for peers on
- (string) base64 yaml file with peer options See include-base64:// Availabel options * allowedips - the allowed ip ranges for this peer * publickey - the public key * endpoint - peer ip and port X.X.X.X:PORT * persistentkeepalive - optional keep alive in seconds
- (string) Specify rather than generating a private key, base64 encoded
- (boolean) If true use fqdn with the reverse proxy, else use ip address