Skip to main content

Wireguard Utilities

Project description

This is a helper module for creating configs for WireGuard VPN for both the server side and the client side.

Quick Start

Setup a WireGuard server:

from wireguard import Server

server = Server('myvpnserver.com', '192.168.24.0/24', address='192.168.24.1')

# Write out the server config to the default location: /etc/wireguard/wg0.conf
server.config.write()

Create a client within the previously created server:

peer = server.peer('my-client')

# Output this peer's config for copying to the peer device
print(peer.config.local_config)

# Rewrite the server config file including the newly created peer
server.config.write()

Create a standalone client:

from wireguard import Peer

peer = Peer('my-client', '192.168.24.0/24', address='192.168.24.45')

# Write out the peer config to the default location: /etc/wireguard/wg0.conf
peer.config.write()

Note: Both the server and peer config files are named the same by default. This is because they would typically be on different machines and would not interfere with one another. Be aware of this when generating peer configs on a server node, or on any node that has a pre-existing wireguard config at the default file location.

Other Features

You can also pass both the address and subnet in a combined way to Server:

# Set the subnet to 192.168.24.0/24 and the server's IP to 192.168.24.51
server = Server('myvpnserver.com', '192.168.24.51/24')

A custom JSON encoder is also provided: wireguard.utils.json.JSONEncoder. This can be used as the value for cls in any call to json.dumps(). As a convenience, it is used automatically by both peers and servers when using the .json() method. Any arguments provided are passed through to json.dumps():

server.json(sort_keys=True, indent=4)

which will output:

{
    "address": [
        "192.168.24.51"
    ],
    "allowed_ips": [
        "192.168.24.51/32"
    ],
    "description": "myvpnserver.com",
    "dns": [],
    "endpoint": null,
    "interface": "wg0",
    "keepalive": null,
    "mtu": null,
    "peers": [],
    "post_down": [],
    "post_up": [],
    "pre_down": [],
    "pre_up": [],
    "preshared_key": null,
    "private_key": "+ZNzpdQKgnuFHGtwDn3EzTZB5J8kYis+UMQ4FALSvtI=",
    "public_key": "AvteU+hwrtJW4QvDy/xH+rxXzNHQ33LclcQ646xwmFw=",
    "subnet": [
        "192.168.24.0/24"
    ],
    "table": null
}

Note: If you pass the cls argument to the Peer.json() method, it will override the use of the included custom JSON encoder. Therefore, you will have to handle the appropriate objects within the JSON encoder that is being passed.

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

wireguard-1.0.2.tar.gz (29.9 kB view details)

Uploaded Source

File details

Details for the file wireguard-1.0.2.tar.gz.

File metadata

  • Download URL: wireguard-1.0.2.tar.gz
  • Upload date:
  • Size: 29.9 kB
  • Tags: Source
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/6.1.0 CPython/3.12.6

File hashes

Hashes for wireguard-1.0.2.tar.gz
Algorithm Hash digest
SHA256 264391c59eaea2eb563086fcd1a6f0a1b21a06c38978b9fa820e9b1fbbd52c4c
MD5 f9afa89340c6b459ad05b5496d26ebcf
BLAKE2b-256 55541d3d884c1bee029d81774db1ab56cc850ef021630f26b275ce22ca22f808

See more details on using hashes here.

Supported by

AWS Cloud computing and Security Sponsor Datadog Monitoring Fastly CDN Google Download Analytics Pingdom Monitoring Sentry Error logging StatusPage Status page