Disable udp2raw for a bit
This commit is contained in:
parent
4feec6c727
commit
7d35484e54
1 changed files with 22 additions and 21 deletions
|
@ -108,9 +108,10 @@ in
|
||||||
PublicKey = data.lasting-integrity.pubkey;
|
PublicKey = data.lasting-integrity.pubkey;
|
||||||
AllowedIPs = subnet;
|
AllowedIPs = subnet;
|
||||||
Endpoint =
|
Endpoint =
|
||||||
if config.chvp.base.network.wireguard.onCorporate
|
#if config.chvp.base.network.wireguard.onCorporate
|
||||||
then "127.0.0.1:51820"
|
#then "127.0.0.1:51820"
|
||||||
else "lasting-integrity.vanpetegem.me:51820";
|
#else "lasting-integrity.vanpetegem.me:51820";
|
||||||
|
"lasting-integrity.vanpetegem.me:51820";
|
||||||
PresharedKeyFile = pskFile;
|
PresharedKeyFile = pskFile;
|
||||||
PersistentKeepalive = 25;
|
PersistentKeepalive = 25;
|
||||||
};
|
};
|
||||||
|
@ -137,24 +138,24 @@ in
|
||||||
};
|
};
|
||||||
};
|
};
|
||||||
services = {
|
services = {
|
||||||
udp2raw-server = lib.mkIf config.chvp.base.network.wireguard.server {
|
#udp2raw-server = lib.mkIf config.chvp.base.network.wireguard.server {
|
||||||
description = "UDP tunnel over TCP for wireguard";
|
# description = "UDP tunnel over TCP for wireguard";
|
||||||
wantedBy = [ "multi-user.target" ];
|
# wantedBy = [ "multi-user.target" ];
|
||||||
after = [ "network.target" ];
|
# after = [ "network.target" ];
|
||||||
script = ''
|
# script = ''
|
||||||
${pkgs.udp2raw}/bin/udp2raw -s -l 0.0.0.0:8080 -r 127.0.0.1:51820 \
|
# ${pkgs.udp2raw}/bin/udp2raw -s -l 0.0.0.0:8080 -r 127.0.0.1:51820 \
|
||||||
-k "$(cat ${config.age.secrets."files/wireguard/udp2raw".path})"
|
# -k "$(cat ${config.age.secrets."files/wireguard/udp2raw".path})"
|
||||||
'';
|
# '';
|
||||||
};
|
#};
|
||||||
udp2raw-client = lib.mkIf config.chvp.base.network.wireguard.onCorporate {
|
#udp2raw-client = lib.mkIf config.chvp.base.network.wireguard.onCorporate {
|
||||||
description = "UDP tunnel over TCP for wireguard";
|
# description = "UDP tunnel over TCP for wireguard";
|
||||||
wantedBy = [ "multi-user.target" ];
|
# wantedBy = [ "multi-user.target" ];
|
||||||
after = [ "network.target" ];
|
# after = [ "network.target" ];
|
||||||
script = ''
|
# script = ''
|
||||||
${pkgs.udp2raw}/bin/udp2raw -c -l 127.0.0.1:51820 -r 54.38.222.69:8080 \
|
# ${pkgs.udp2raw}/bin/udp2raw -c -l 127.0.0.1:51820 -r 54.38.222.69:8080 \
|
||||||
-k "$(cat ${config.age.secrets."files/wireguard/udp2raw".path})"
|
# -k "$(cat ${config.age.secrets."files/wireguard/udp2raw".path})"
|
||||||
'';
|
# '';
|
||||||
};
|
#};
|
||||||
};
|
};
|
||||||
};
|
};
|
||||||
age.secrets."files/wireguard/psk" = {
|
age.secrets."files/wireguard/psk" = {
|
||||||
|
|
Loading…
Add table
Add a link
Reference in a new issue