You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
* update .gitignore
* replace ansible.builtin.yum with ansible.builtin.dnf
* meta/main.yml: for opensuse only versions value of 'all' is allowed
* defaults/main.yml: add noqa jinja[spacing] to ignore ansible-lint warning
* removed support for CentOS 7 (reached end of life)
* update README
* change years
* update years
* removed support for Ubuntu 20.04 (reached end of life)
* removed support for Fedora 39/40 (reached end of life) / added Fedora 42
* Molecule: remove openSUSE Leap 15.5
* Molecule: add Debian 13
* remove unneeded task for Ubuntu 19.10
* update year
* Add support for Debian 13
* update CHANGELOG/README
# Reboot host if necessary if the standard kernel is in use
255
-
wireguard_centos7_standard_reboot: true
256
-
257
-
# The default seconds to wait for machine to reboot and respond
258
-
# if "standard" kernel is in use. Is only relevant if
259
-
# "wireguard_centos7_standard_reboot" is set to "true".
260
-
wireguard_centos7_standard_reboot_timeout: "600"
261
-
262
220
#########################################
263
221
# Settings only relevant for RockyLinux 8
264
222
#########################################
@@ -364,7 +322,7 @@ One of `wireguard_address` (deprecated) or `wireguard_addresses` (recommended) i
364
322
365
323
## Example
366
324
367
-
Here is a litte example for what I use the playbook: I use WireGuard to setup a fully meshed VPN (every host can directly connect to every other host) and run my Kubernetes (K8s) cluster at Hetzner Cloud (but you should be able to use any hoster you want). So the important components like the K8s controller and worker nodes (which includes the pods) only communicate via encrypted WireGuard VPN. Also (as already mentioned) I've two clients. Both have `kubectl` installed and are able to talk to the internal Kubernetes API server by using WireGuard VPN. One of the two clients also exposes a WireGuard endpoint because the Postfix mailserver in the cloud and my internal Postfix needs to be able to talk to each other. I guess that's maybe a not so common use case for WireGuard :D But it shows what's possible. So let me explain the setup which might help you to use this Ansible role.
325
+
Here is a little example for what I use the playbook: I use WireGuard to setup a fully meshed VPN (every host can directly connect to every other host) and run my Kubernetes (K8s) cluster at Hetzner Cloud (but you should be able to use any hoster you want). So the important components like the K8s controller and worker nodes (which includes the pods) only communicate via encrypted WireGuard VPN. Also (as already mentioned) I've two clients. Both have `kubectl` installed and are able to talk to the internal Kubernetes API server by using WireGuard VPN. One of the two clients also exposes a WireGuard endpoint because the Postfix mailserver in the cloud and my internal Postfix needs to be able to talk to each other. I guess that's maybe a not so common use case for WireGuard :D But it shows what's possible. So let me explain the setup which might help you to use this Ansible role.
368
326
369
327
First, here is a part of my Ansible `hosts` file:
370
328
@@ -594,7 +552,7 @@ Sample playbooks for example above:
594
552
595
553
## Testing
596
554
597
-
This role has a small test setup that is created using [Molecule](https://github.com/ansible-community/molecule), libvirt (vagrant-libvirt) and QEMU/KVM. Please see my blog post [Testing Ansible roles with Molecule, libvirt (vagrant-libvirt) and QEMU/KVM](https://www.tauceti.blog/posts/testing-ansible-roles-with-molecule-libvirt-vagrant-qemu-kvm/) how to setup. The test configuration is [here](https://github.com/githubixx/ansible-role-wireguard/tree/master/molecule/default).
555
+
This role has a small test setup that is created using [Molecule](https://github.com/ansible-community/molecule), libvirt (vagrant-libvirt) and QEMU/KVM. Please see my blog post [Testing Ansible roles with Molecule, libvirt (vagrant-libvirt) and QEMU/KVM](https://www.tauceti.blog/posts/testing-ansible-roles-with-molecule-libvirt-vagrant-qemu-kvm/) how to setup. The test configuration is here: [ansible-role-wireguard/molecule/default](https://github.com/githubixx/ansible-role-wireguard/tree/master/molecule/default).
0 commit comments