Allow all IPs for wireguard interface without routing them
ci / test (push) Successful in 1m2s Details
ci / deploy (push) Successful in 2m33s Details

This commit is contained in:
Ciapa 2024-02-04 20:12:00 +01:00
parent cb2ac4c8da
commit 8156a48f31
1 changed files with 4 additions and 2 deletions

View File

@ -32,11 +32,13 @@
ips = [ "10.175.197.82/32" "fd7d:76ee:e68f:a993:f6b2:9dab:ddd3:a02/128" ]; ips = [ "10.175.197.82/32" "fd7d:76ee:e68f:a993:f6b2:9dab:ddd3:a02/128" ];
privateKeyFile = "/run/secrets/services/wireguard/airvpn.private"; privateKeyFile = "/run/secrets/services/wireguard/airvpn.private";
allowedIPsAsRoutes = false;
peers = [ peers = [
{ {
publicKey = "PyLCXAQT8KkM4T+dUsOQfn+Ub3pGxfGlxkIApuig+hk="; publicKey = "PyLCXAQT8KkM4T+dUsOQfn+Ub3pGxfGlxkIApuig+hk=";
presharedKeyFile = "/run/secrets/services/wireguard/airvpn.psk"; presharedKeyFile = "/run/secrets/services/wireguard/airvpn.psk";
allowedIPs = [ "10.128.0.1" ]; allowedIPs = [ "0.0.0.0/0" ];
endpoint = "134.19.179.213:1637"; endpoint = "134.19.179.213:1637";
persistentKeepalive = 25; persistentKeepalive = 25;
} }