This terraform is different in that it doesn't deploy any cloud resources. It's using remote-exec to deploy the wireguard setup on a remote machine and then returns the local wireguard config.
Name | Version |
---|---|
wireguard | ~> 0.1.3 |
Name | Version |
---|---|
external | 2.2.0 |
null | 3.1.0 |
random | 3.1.0 |
wireguard | 0.1.3 |
No modules.
Name | Type |
---|---|
null_resource.wireguard | resource |
random_id.default | resource |
wireguard_asymmetric_key.client | resource |
wireguard_asymmetric_key.server | resource |
external_external.qr | data source |
wireguard_config_document.client | data source |
wireguard_config_document.server | data source |
Name | Description | Type | Default | Required |
---|---|---|---|---|
clients | Map of client names to ip addresses. Must be in the 10.10.10/24 subnet, and 10.10.10.1 is reserved for the server. | map(string) |
{ |
no |
private_key_path | The path to your private key for remote-exec. | string |
"~/.ssh/id_rsa" |
no |
public_ip | The public ip of instance. | string |
n/a | yes |
ssh_user | The ssh user for instance. | string |
"root" |
no |
Name | Description |
---|---|
client_config | Client configuration. |
client_config_qr_codes | Client configuration qr codes. |