mirror of
https://github.com/kevinveenbirkenbach/computer-playbook.git
synced 2025-08-27 14:05:17 +02:00
- Swap role includes: sys-systemctl → sys-service in all roles - Rename variables everywhere: systemctl_* → system_service_* (incl. systemctl_id → system_service_id) - Templates: ExecStart now uses {{ system_service_script_exec }}; add optional RuntimeMaxSec via SYS_SERVICE_DEFAULT_RUNTIME - Move SYS_SERVICE defaults into roles/sys-service/defaults (remove SYS_SERVICE_ALL_ENABLED & SYS_SERVICE_DEFAULT_STATE from group_vars/07_services.yml) - Tidy group_vars/all/08_timer.yml formatting - Introduce roles/sys-daemon: - default manager timeouts (timeouts.conf) - optional purge of /etc/systemd/system.conf.d - validation via systemd-analyze verify - handlers for daemon-reload & daemon-reexec - Refactor sys-timer to system_service_* variables (docs and templates updated) - Move filter_plugins/filetype.py under sys-service - Update meta/README to point to official systemd docs - Touch many roles (backup/cleanup/health/repair/certs/nginx/csp/wireguard/ssd-hdd/keyboard/update-docker/alarm compose/email/telegram/etc.) to new naming BREAKING CHANGE: - Role path/name change: use `sys-service` instead of `sys-systemctl` - All `systemctl_*` vars are now `system_service_*` (e.g., on_calendar, state, timer_enabled, script_exec, id) - If you have custom templates, adopt RuntimeMaxSec and new variable names Chat context: https://chatgpt.com/share/68a47568-312c-800f-af3f-e98575446327
Wireguard Client
Description
This role manages WireGuard on a client system. It sets up essential services and scripts to configure and optimize WireGuard connectivity.
Overview
Optimized for client configurations, this role:
- Deploys a systemd service and its associated script to set the MTU on specified network interfaces.
- Uses a Jinja2 template to generate the
set-mtu.sh
script. - Ensures that the MTU is configured correctly before starting WireGuard with wg-quick.
Purpose
The primary purpose of this role is to configure WireGuard on a client by setting appropriate MTU values on network interfaces. This ensures a stable and optimized VPN connection.
Features
- MTU Configuration: Deploys a template-based script to set the MTU on all defined internet interfaces.
- Systemd Service Integration: Creates and manages a systemd service to execute the MTU configuration script.
- Administration Support: For client key creation and further setup, please refer to the Administration file.
- Modular Design: Easily integrates with other WireGuard roles or network configuration roles.
Other Resources
- WireGuard Documentation
- ArchWiki: WireGuard
- WireGuard on Raspbian
- Subnetting Basics
- WireGuard Permissions Issue Discussion
- SSH Issues with WireGuard
- UFW and SSH via WireGuard
- OpenWrt Forum Discussion on WireGuard
- WireGuard Connection Dies on Ubuntu
- SSH Fails with WireGuard IP
- WireGuard NAT and Firewall Issues