Skip to main content

Generator of consistent Wireguard configurations

Project description

wg-confgen

wg-confgen is generator of consistent Wireguard configurations.

wg-confgen stores data about all clients in a JSON file (by default: wg0.json in current directory) and generates consistent Wireguard configs per client. You can edit this JSON by hand or use built-in wg-confgen modify subcommand. It contains sensitive information (clients' private keys) so it should be stored securely, similar to ordinary Wireguard configuration files.

Installation

There are several ways to install wg-confgen:

  • just copy src/wg_confgen/wg_confgen.py anywhere in your $PATH, for example: cp src/wg_confgen/wg_confgen.py /usr/local/bin/wg-confgen
  • pipx install .
  • uv tool install .

Usage

wg-confgen show

Generate Wireguard configuration for a given client.

$ wg-confgen show client

A nifty trick is generating QR codes from the generated configuration, which can be easily transferred to mobile Wireguard clients (just remember to decrease the font size of your terminal, because QR codes for Wireguard configs can be quite big).

$ wg-confgen show client | qrencode -t ANSI

[!NOTE]

Remember that mobile Wireguard clients don't support all parameters which can be set in [Interface] or [Peer] sections so make sure they're not set when generating qrencode, or grep them away:

wr-confgen show client | grep -v PostUp | qrencode -t ANSI

You can also use wr-confgen itself for this task:

wr-confgen < wg0.json -c - modify client PostUp unset |
   wr-confgen -c - show client |
   qrencode -t ANSI

wg-confgen modify

To add clients or modify their settings, use wg-confgen modify <param1> <value1> <param2> <value2> .... This subcommand allows changing and removing many parameters at once, or adding or removing values from parameters which allow more than one value (for example, adding more AllowedIPs or Peers).

Syntax:

wg-confgen modify [options] <client> [changes...]

changes := <parameter> [modification_type] <value...>
modification_type := "set" | "add" | "remove"

Modification types:

  • set: set parameter to a given value (default when missing)
  • add: add a value to the list of parameters (e.g. IP address to AllowedIPs)
  • remove: remove a value from the list of parameters, or unset the parameter

Instead of literal value, special values can be used:

  • unset: unsets the value for the client, including the inherited default (as provided by "defaults" section in input JSON); in JSON this state is represented as explicit null assigned to the parameter
  • default: brings back parameter value to the default (as provided by "defaults" section in input JSON); in JSON this state is represented as a missing key for a parameter
  • generate: automatically generate a key. This is useful as a default for PresharedKey, which will enable automatic generation of PresharedKey for all configured clients. When used on clients, it will force one time regeneration of private or preshared keys.

[!NOTE]

Keys (PrivateKey, PresharedKey) are not inherited from "defaults" section.

modify subcommand can be used to change defaults for all of the clients: wg-confgen modify defaults ....

[!TIP]

A side-effect of running wg-confgen modify is that all missing private keys will be regenerated. This is true even for "no-op" modify without any changes, like wg-confgen modify defaults

Examples:

$ wg-confgen modify client_name \
    PrivateKey set `wg genpk` \
    PersistentKeepalive 30 \
    AllowedIPs add 192.168.1.0/24 10.0.0.{id}/32 \
    DNS remove 8.8.8.8

$ wg-confgen modify defaults PresharedKey generate

$ wg-confgen modify client-with-key-rotation \
    PrivateKey generate
    PresharedKey generate

Overrides (Peer-Specific Settings)

Sometimes we may need to override specific parameters for some clients when they are used as peers of the other clients. This is achieved with --peer option.

For example, we might configure a "server" client with AllowedIPs in range 192.168.1.1/24 for all clients, except a "router" client, to which this is a native subnet and it shouldn't route this traffic via VPN.

$ wg-confgen modify server AllowedIPs 192.168.1.1/24 10.8.0.1/24
$ wg-confgen modify router --peer server AllowedIPs 10.8.0.1/24

Peer overrides apply to the currently set overrides, not actual peer settings. In above example, using '--peer server AllowedIPs remove 192.168.1.1/24' would result with empty overrides, because AllowedIPs override was initially empty.

--peer options may be used many times, but it's best to use them at the end of command invocation, because they share syntax with ordinary changes and as such will consume all remaining parameters.

wg-confgen peers

To quickly add or remove a client as a peer to many other clients, use peers subcommand.

Add server as a peer to all clients (but not vice-versa):

$ wg-confgen peers server addto '*'

Add server as a peer to only selected clients:

$ wg-confgen peers server addto client1 client2 'client_pattern*'

Remove server from all clients peers:

$ wg-confgen peers server removefrom '*'

wg-confgen remove

Remove clients. This will also remove them from Peers of remaining clients and from peer overrides.

$ wg-confgen remove client1 client2

wg-confgen variable

To set variables, which can be then interpolated as {var.<varname>}, use wg confgen variable. This subcommand accepts a list of pairs <variable> <value> and then will set a variable to desired value, or remove it if <value> has a special value unset. For example:

$ wg-confgen variable net 10.8.0 mask 24
$ wg confgen modify defaults Address "{var.net}.{id}/{var.mask}"

Using as a Filter

You can use wr-confgen as a filter by passing - as the path to the configuration. In this mode, wr-confgen will read configuration JSON from the standard input and print its results to the standard output.

wr-confgen < wg0.json -c - modify client PostUp unset |
   wr-confgen -c - show client |
   qrencode -t ANSI

Parameters Handling

There are few special cases about how wg-confgen handles some Wireguard parameters:

  • PrivateKey and PublicKey must be always kept synchronised, so wg-confgen will disregard any manually set public keys and instead will regenerate them as necessary
  • Keys do not have default values, so they will ignore default directives
  • Endpoint will use ListenPort of client, unless a different port is explicitly specified for Endpoint

JSON

You can see example of JSON database in wg0.json in this repository.

JSON files used by wg-confgen are quite simple. They're root object is a dictionary with following fields:

  • clients: an ordered mapping of clients. Order of clients is important, because it decides about the value of {id} interpolation variable. Each field of client maps directly to the names of Wireguard parameters. Parameter names in JSON are case sensitive. PublicKey is omitted because wg-confgen always regenerates it.
    • under clients, there's a special overrides mapping, which contains parameter overrides in [Peer] sections when client is used as the interface.
  • defaults: a dummy "client" object which provides default values for all the other clients in the clients section.
  • variables: mapping which provides a space for arbitrary user-provided variables which can be used in clients' parameters.

Meaning of the Parameters

  • when parameter is missing in the client, the default value from defaults will be used
  • when parameter is set to null, it means that this particular parameter for the client should not be set, even if default is used
  • when a key is set to "__GENERATE__" string, wg-confgen will generate the associated key
  • variable interpolations are enclosed in curly braces
    • {id}: number of client, starting from 1
    • {name}: name of client, obtained from the key in the mapping in clients section
    • {var.<name>}: variable from variables section (strings only)
{
    "clients": {
        "server": {
            "PrivateKey": "2Nf4mHbWfJl9YDwSrf6WvwRQTMpd2uIO5qrwqxbtf0Y=",
            "Peers": ["client1", "client2"]
        },
        "client1": {
            "PrivateKey": "gMRn6H/TAfS2A6Ltk8ZEvjbZeuQXK6iHOVPtAR4qbF0=",
            "PersistentKeepalive": null,
        },
        "client2": {
            "PrivateKey": "wI8muH8Tv7Mm6S+B9ceqMkAxfKPC9eAesiobmMKt0Xk=",
            "AllowedIPs": ["{var.net}.{id}/32", "192.168.1.0/24"],
        }
    },
    "defaults": {
        "Address": "{var.net}.{id}/24",
        "PersistentKeepalive": 25,
        "Peers": ["server"]
    },
    "variables": {
        "net": "10.8.0"
    }
}

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

wg_confgen-0.3.0.tar.gz (18.5 kB view details)

Uploaded Source

Built Distribution

If you're not sure about the file name format, learn more about wheel file names.

wg_confgen-0.3.0-py3-none-any.whl (13.1 kB view details)

Uploaded Python 3

File details

Details for the file wg_confgen-0.3.0.tar.gz.

File metadata

  • Download URL: wg_confgen-0.3.0.tar.gz
  • Upload date:
  • Size: 18.5 kB
  • Tags: Source
  • Uploaded using Trusted Publishing? No
  • Uploaded via: uv/0.6.9

File hashes

Hashes for wg_confgen-0.3.0.tar.gz
Algorithm Hash digest
SHA256 d512602c49268712566df39ed7698cb7b449488b0ee2f02c28c65d6338542d8b
MD5 7a06cff7b3bbf7e820434c4ae03c2605
BLAKE2b-256 7e912880c52014511004a4d063b5887dfc3edaef88a349a93d0e14fee3d29653

See more details on using hashes here.

File details

Details for the file wg_confgen-0.3.0-py3-none-any.whl.

File metadata

  • Download URL: wg_confgen-0.3.0-py3-none-any.whl
  • Upload date:
  • Size: 13.1 kB
  • Tags: Python 3
  • Uploaded using Trusted Publishing? No
  • Uploaded via: uv/0.6.9

File hashes

Hashes for wg_confgen-0.3.0-py3-none-any.whl
Algorithm Hash digest
SHA256 9071846c7052ef67d8757a5580201962306966dba41b836dff4f04f9b21df967
MD5 6ac36b2522f9a5367e54fd4ea5749ba4
BLAKE2b-256 edceedacd9bbbda342b4d396b339e7eae821dfe74a135dd66957927e7e5cb2d0

See more details on using hashes here.

Supported by

AWS Cloud computing and Security Sponsor Datadog Monitoring Depot Continuous Integration Fastly CDN Google Download Analytics Pingdom Monitoring Sentry Error logging StatusPage Status page