Remove the WG private keys from the vault and store them only on the servers
With the support for network.wireguard.* credentials[1] in systemd v256[2], we can now easily avoid storing the credentials centrally in our ansible vault, which is preferable as it makes the private keys less exposed. It may also make fine-grained access easier in the future[3] as there is no longer a vault file for each server.
All the keys have been rotated and the new private keys are only stored on the servers.
[1] https://github.com/systemd/systemd/pull/30826 [2] https://github.com/systemd/systemd/releases/tag/v256 [3] #64
Merge request reports
Activity
added 34 commits
-
ebf10df1...6d39c3c6 - 33 commits from branch
archlinux:master
- 170cac05 - Remove the WG private keys from the vault and store them only on the servers
-
ebf10df1...6d39c3c6 - 33 commits from branch
reset approvals from @svenstaro and @foutrelis by pushing to the branch
added 1 commit
- 151c8bcf - Remove the WG private keys from the vault and store them only on the servers
added 1 commit
- 27553ab3 - Remove the WG private keys from the vault and store them only on the servers
mentioned in commit 1950fbeb