]> git.ipfire.org Git - thirdparty/wireguard-tools.git/commitdiff
contrib: organize example scripts and add synergy
authorJason A. Donenfeld <Jason@zx2c4.com>
Tue, 5 Jul 2016 14:01:31 +0000 (16:01 +0200)
committerJason A. Donenfeld <Jason@zx2c4.com>
Tue, 5 Jul 2016 14:01:31 +0000 (16:01 +0200)
Signed-off-by: Jason A. Donenfeld <Jason@zx2c4.com>
contrib/ncat-client-server/README [moved from contrib/client-server-example/README with 100% similarity]
contrib/ncat-client-server/client.sh [moved from contrib/client-server-example/client.sh with 100% similarity]
contrib/ncat-client-server/server.sh [moved from contrib/client-server-example/server.sh with 100% similarity]
contrib/synergy/README [new file with mode: 0644]
contrib/synergy/synergy-client.sh [new file with mode: 0755]
contrib/synergy/synergy-server.sh [new file with mode: 0755]
contrib/systemd/README [new file with mode: 0644]
contrib/systemd/wgserver.service [moved from contrib/wgserver.service with 100% similarity]

diff --git a/contrib/synergy/README b/contrib/synergy/README
new file mode 100644 (file)
index 0000000..b75fb77
--- /dev/null
@@ -0,0 +1,3 @@
+These scripts should be modified according to your precise setup.
+They provide a very simple way of tunneling synergy inside of a
+WireGuard tunnel, to protect your data in transit.
diff --git a/contrib/synergy/synergy-client.sh b/contrib/synergy/synergy-client.sh
new file mode 100755 (executable)
index 0000000..56cfdb2
--- /dev/null
@@ -0,0 +1,18 @@
+#!/bin/bash
+set -ex
+if [[ $UID == 0 ]]; then
+       ip link del dev synergy || true
+       ip link add dev synergy type wireguard
+       ip address add 10.193.125.39/32 peer 10.193.125.38/32 dev synergy
+       wg set synergy \
+               listen-port 29184 \
+               private-key <(echo oNcsXA5Ma56q9xHmvvKuzLfwXYy7Uqy+bTmmXg/XtVs=) \
+               peer m321UMZXoJ6qw8Jli2spbAVBc2MdOzV/EHDKfZQy0g0= \
+                       allowed-ips 10.193.125.38/32 \
+                       endpoint 10.10.10.100:29184
+       ip link set up dev synergy
+else
+       sudo "$(readlink -f "$0")"
+       killall synergyc || true
+       synergyc 10.193.125.38:38382
+fi
diff --git a/contrib/synergy/synergy-server.sh b/contrib/synergy/synergy-server.sh
new file mode 100755 (executable)
index 0000000..6bef423
--- /dev/null
@@ -0,0 +1,17 @@
+#!/bin/bash
+set -ex
+if [[ $UID == 0 ]]; then
+       ip link del dev synergy || true
+       ip link add dev synergy type wireguard
+       ip address add 10.193.125.38/32 peer 10.193.125.39/32 dev synergy
+       wg set synergy \
+               listen-port 29184 \
+               private-key <(echo 2InSrlZA5eQfI/MvnvPieqNTBo9cd+udc3SOO9yFpXo=) \
+               peer CBnoidQLjlbRsrqrI56WQbANWwkll41w/rVUIW9zISI= \
+                       allowed-ips 10.193.125.39/32
+       ip link set up dev synergy
+else
+       sudo "$(readlink -f "$0")"
+       killall synergys || true
+       synergys -a 10.193.125.38:38382
+fi
diff --git a/contrib/systemd/README b/contrib/systemd/README
new file mode 100644 (file)
index 0000000..1ef51aa
--- /dev/null
@@ -0,0 +1,5 @@
+Until WireGuard receives full integration to the various network
+management utilities, there are a number of ways of setting up
+a WireGuard tunnel at boot time. This systemd unit file is one
+such way of doing things. Probably it should be tweaked before
+using.