summaryrefslogtreecommitdiff
path: root/manifests/wg_exit_node.pp
blob: fd2214d01f1426a87a85d0c38519af0aaf62b204 (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
class profiles::wg_exit_node (
  String $iface_name = 'wg0',
  Array[Hash] $peers = [],
) {
  $base = "/etc/systemd/network/20-${iface_name}"

  # TODO
  # iptables -t nat -A POSTROUTING -o br0 -j MASQUERADE
  # ip6tables -t nat -A POSTROUTING -o br0 -j MASQUERADE
  #
  # echo 1 > /proc/sys/net/ipv4/ip_forward
  # echo 1 > /proc/sys/net/ipv6/conf/br0/forwarding
  # echo 1 > /proc/sys/net/ipv6/conf/wg0/forwarding

  file { "${base}.netdev":
    content => @("EOF")
    # File managed by Puppet
    [NetDev]
    Name=${iface_name}
    Kind=wireguard
    Description=Wireguard tunnel ${iface_name}

    [WireGuard]
    PrivateKeyFile=/etc/wireguard/gandalf.adrift.space.key
    ListenPort=51820
    | EOF
  }

  file { "${base}.network":
    content => @("EOF")
    # File managed by Puppet
    [Match]
    Name=${iface_name}
    | EOF
  }

  file { [
    "${base}.netdev.d",
    "${base}.network.d",
  ]:
    ensure => directory,
  }

  $peers.each |$peer| {
    $peer_addresses = $peer['peer_address'] ? {
      Array  => $peer['peer_address'],
      String => [$peer['peer_address']],
    }


    file { "${base}.network.d/${peer['name']}.conf":
      content => $peer_addresses.map |$addr| {
        @("EOF")
        [Route]
        Destination=${addr}
        | EOF
      }.join("\n")
    }

    file { "${base}.netdev.d/${peer['name']}.conf":
      content => @("EOF")
      [WireGuardPeer]
      PublicKey=${peer['public_key']}
      AllowedIPs=${peer_addresses.join(', ')}
      | EOF
    }
  }
}