Gemini deploy
This commit is contained in:
BIN
roles/wireguard_server/templates/.wireguardclient.conf.swp
Normal file
BIN
roles/wireguard_server/templates/.wireguardclient.conf.swp
Normal file
Binary file not shown.
@@ -8,7 +8,7 @@ ListenPort = 40041
|
||||
PrivateKey = {{ priv }}
|
||||
|
||||
[Peer]
|
||||
PublicKey = {{ wireguard_server_pub }}
|
||||
PublicKey = {{ wireguard-server-vault.pub }}
|
||||
AllowedIPs = 10.0.0.0/24, 192.168.5.0/24, 192.168.6.0/24, 192.168.100.0/24
|
||||
Endpoint = 185.61.86.153:51822
|
||||
PersistentKeepalive = 20
|
||||
|
||||
@@ -1,26 +1,13 @@
|
||||
[Interface]
|
||||
PrivateKey = {{ wireguard_server_key }}
|
||||
PrivateKey = {{ wireguard-server.key }}
|
||||
Address=10.0.0.1/24
|
||||
PostUp=iptables -A FORWARD -i wireguardserver -o ens18 -j ACCEPT; iptables -A FORWARD -i ens18 -o wireguardserver -j ACCEPT; iptables -t nat -A POSTROUTING -o ens18 -j MASQUERADE;
|
||||
PostDown=iptables -D FORWARD -i wireguardserver -o ens18 -j ACCEPT; iptables -D FORWARD -i ens18 -o wireguardserver -j ACCEPT; iptables -t nat -D POSTROUTING -o ens18 -j MASQUERADE;
|
||||
ListenPort=51822
|
||||
|
||||
{% for user in wireguard %}
|
||||
[Peer]
|
||||
PublicKey = {{ wireguard_ntb_pub }}
|
||||
AllowedIPs = {{ wireguard_ntb_ip }}/32
|
||||
PublicKey = {{ wireguard.user.pub }}
|
||||
AllowedIPs = {{ wireguard.user.ip }}/32
|
||||
|
||||
[Peer]
|
||||
PublicKey = {{ wireguard_kate_pub }}
|
||||
AllowedIPs = {{ wireguard_kate_ip }}/32
|
||||
|
||||
[Peer]
|
||||
PublicKey = {{ wireguard_tata_pub }}
|
||||
AllowedIPs = {{ wireguard_tata_ip }}/32
|
||||
|
||||
[Peer]
|
||||
PublicKey = {{ wireguard_pi_pub }}
|
||||
AllowedIPs = {{ wireguard_pi_ip }}/32
|
||||
|
||||
[Peer]
|
||||
PublicKey = {{ wireguard_desktop_pub }}
|
||||
AllowedIPs = {{ wireguard_desktop_ip }}/32
|
||||
{% endfor %}
|
||||
|
||||
Reference in New Issue
Block a user