You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: .github/workflows/external_trigger.yml
+10-1Lines changed: 10 additions & 1 deletion
Original file line number
Diff line number
Diff line change
@@ -20,7 +20,8 @@ jobs:
20
20
echo "**** External trigger running off of master branch. To disable this trigger, set a Github secret named \"PAUSE_EXTERNAL_TRIGGER_WIREGUARD_MASTER\". ****"
21
21
echo "External trigger running off of master branch. To disable this trigger, set a Github secret named \`PAUSE_EXTERNAL_TRIGGER_WIREGUARD_MASTER\`" >> $GITHUB_STEP_SUMMARY
Copy file name to clipboardExpand all lines: README.md
+3-2Lines changed: 3 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -160,7 +160,7 @@ services:
160
160
- PERSISTENTKEEPALIVE_PEERS= #optional
161
161
- LOG_CONFS=true #optional
162
162
volumes:
163
-
- /path/to/appdata/config:/config
163
+
- /path/to/wireguard/config:/config
164
164
- /lib/modules:/lib/modules #optional
165
165
ports:
166
166
- 51820:51820/udp
@@ -188,7 +188,7 @@ docker run -d \
188
188
-e PERSISTENTKEEPALIVE_PEERS= `#optional` \
189
189
-e LOG_CONFS=true `#optional` \
190
190
-p 51820:51820/udp \
191
-
-v /path/to/appdata/config:/config \
191
+
-v /path/to/wireguard/config:/config \
192
192
-v /lib/modules:/lib/modules `#optional` \
193
193
--sysctl="net.ipv4.conf.all.src_valid_mark=1" \
194
194
--restart unless-stopped \
@@ -382,6 +382,7 @@ Once registered you can define the dockerfile to use with `-f Dockerfile.aarch64
382
382
383
383
## Versions
384
384
385
+
***24.05.24:** - Rebase to Alpine 3.20, install wireguard-tools from Alpine repo.
385
386
***10.03.24:** - Use iptables-legacy on Alpine 3.19.
386
387
***05.03.24:** - Rebase master to Alpine 3.19.
387
388
***03.10.23:** - **Potentially Breaking Change:** Support formultiple interfaces added. Wireguard confs moved to `/config/wg_confs/`. Any file with a `.conf` extensionin that folder will be treated as a live tunnel config and will be attempted to start. If any of the tunnels fail, all tunnels will be stopped. Tunnels are started in alphabetical order. Managed server conf will continue to be hardcoded to `wg0.conf`.
- { vol_path: "/lib/modules", vol_host_path: "/lib/modules", desc: "Host kernel modules for situations where they're not already loaded." }
@@ -118,16 +118,17 @@ app_setup_block: |
118
118
Site-to-site VPN in server mode requires customizing the `AllowedIPs` statement for a specific peer in `wg0.conf`. Since `wg0.conf` is autogenerated when server vars are changed, it is not recommended to edit it manually.
119
119
120
120
In order to customize the `AllowedIPs` statement for a specific peer in `wg0.conf`, you can set an env var `SERVER_ALLOWEDIPS_PEER_<peer name or number>` to the additional subnets you'd like to add, comma separated and excluding the peer IP (ie. `"192.168.1.0/24,192.168.2.0/24"`). Replace `<peer name or number>` with either the name or number of a peer (whichever is used in the `PEERS` var).
121
-
121
+
122
122
For instance `SERVER_ALLOWEDIPS_PEER_laptop="192.168.1.0/24,192.168.2.0/24"` will result in the wg0.conf entry `AllowedIPs = 10.13.13.2,192.168.1.0/24,192.168.2.0/24` for the peer named `laptop`.
123
-
123
+
124
124
Keep in mind that this var will only be considered when the confs are regenerated. Adding this var for an existing peer won't force a regeneration. You can delete wg0.conf and restart the container to force regeneration if necessary.
125
125
126
126
Don't forget to set the necessary POSTUP and POSTDOWN rules in your client's peer conf for lan access.
127
127
128
128
129
129
# changelog
130
130
changelogs:
131
+
- { date: "24.05.24:", desc: "Rebase to Alpine 3.20, install wireguard-tools from Alpine repo." }
- { date: "03.10.23:", desc: "**Potentially Breaking Change:** Support for multiple interfaces added. Wireguard confs moved to `/config/wg_confs/`. Any file with a `.conf` extension in that folder will be treated as a live tunnel config and will be attempted to start. If any of the tunnels fail, all tunnels will be stopped. Tunnels are started in alphabetical order. Managed server conf will continue to be hardcoded to `wg0.conf`." }
0 commit comments