Allow all IPs for wireguard interface without routing them
ci / test (push) Successful in 1m0s Details
ci / deploy (push) Successful in 2m14s Details

This commit is contained in:
Ciapa 2024-02-04 20:12:00 +01:00
parent cb2ac4c8da
commit 250d0beaeb
1 changed files with 6 additions and 4 deletions

View File

@ -27,16 +27,18 @@
enableIPv6 = true; enableIPv6 = true;
}; };
networking.wireguard.interfaces = { networking.wg-quick.interfaces = {
wg0 = { wg0 = {
ips = [ "10.175.197.82/32" "fd7d:76ee:e68f:a993:f6b2:9dab:ddd3:a02/128" ]; address = [ "10.175.197.82/32" "fd7d:76ee:e68f:a993:f6b2:9dab:ddd3:a02/128" ];
privateKeyFile = "/run/secrets/services/wireguard/airvpn.private"; privateKeyFile = "/run/secrets/services/wireguard/airvpn.private";
table = "off";
mtu = 1320;
peers = [ peers = [
{ {
publicKey = "PyLCXAQT8KkM4T+dUsOQfn+Ub3pGxfGlxkIApuig+hk="; publicKey = "PyLCXAQT8KkM4T+dUsOQfn+Ub3pGxfGlxkIApuig+hk=";
presharedKeyFile = "/run/secrets/services/wireguard/airvpn.psk"; presharedKeyFile = "/run/secrets/services/wireguard/airvpn.psk";
allowedIPs = [ "10.128.0.1" ]; allowedIPs = [ "0.0.0.0/0" ];
endpoint = "134.19.179.213:1637"; endpoint = "134.19.179.213:1637";
persistentKeepalive = 25; persistentKeepalive = 25;
} }