Replies: 1 comment 1 reply
-
|
Howdy.
For now, just use the admin interface, it covers about 90% of use cases, unless you're changing your wireguard private key, or address you should be fine.
|
Beta Was this translation helpful? Give feedback.
1 reply
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Uh oh!
There was an error while loading. Please reload this page.
Uh oh!
There was an error while loading. Please reload this page.
-
Hi there.
I'm a huge fan of Wireguard and I've been using it since its very beginning. Therefore having it with 2FA was logical step up.
This project is awesome and I've got Wag running on bare-metal just fine, but have some minor issues that I'd like to know if are fixable or planned for the future.
using config file for initial bootstrap and then relying on etcd is new for me, as I'm not much into devops. So in order to apply any changes made to config file do I have to somehow flush the etcd and then restart the wag server? This doesn't seem to be mentioned in the docs.
is there any way to generate automatically links for downloading the config file? Right now I have to manually add the token to my external address link.
why accessing the management webUI seems to work only via ssh-forward? I'm not able to expose my internal network address of the machine so I can reach it once authenticated. Seems like Management.ListenAddress works only for 127.0.0.1. This makes reaching the webUI more complicated that it needs to be. Also, in order to achieve that I have to add port 22 to the ExposePorts in the config.
Let me know if these are up to my mistakes.
Cheers!
Beta Was this translation helpful? Give feedback.
All reactions