Create interface wg1 for the second config. You can start/stop each interface independently and you can set each to start automatically on boot or just bring it up manually.
Not sure if it's possible, as this would make 2 peers that can reach the whole Internet...
Both peers use 0.0.0.0/0 as allowed IPs, this would first need to be fixed. That gets messy as using 2 routes (i.e. 0.0.0.0/1 and 128.0.0.0/1) makes a more specific route to the Internet. The problem is, the sum of both routes nontheless == 0.0.0.0/0. I'm not certain if that setting would be valid on the same Wireguard Interface.
You can you policy-based routing to "flip" VPNs - leaving all up, but not routing to them by default (aside for your policy if you want a VPN up by default).
I would think the easiest way without extra work - would be to make 2 WG Interfaces, and enable/disable "Route Allowed IPs" as you select the preferred VPN.
Choose any folder for device architecture and look for gl-wg-xxxxxxx.ipk for the client and gl-wg-server-xxxxxx.ipk for the server.
If your home router has the same architecture as the folders in that github (check the OpenWrt table of hardware in the wiki) AND it is running OpenWrt 18.06 you can try installing the packages of the right architecture manually from there.
You can also open the packages and extract the logic you want, and then you can try copying that manually on your router.
The function you want is done by a shell script in /etc/init.d folder plus some config files so it's just a text file with human-readable Linux shell code, nothing fancy.
Afaik gl.inet are not changing wireguard binary so it should still work the same with OpenWrt's wireguard packages.
Download the package to your PC and open them with an archiving application that can understand common Linux compressed files like tar.gzip. Try with Peazip if you don't have any such application https://www.peazip.org/
you will find data.tar.gz files inside. Extract them and you will get the folders and scripts these packages add.