Subhi Al Hasan
Subhi Al Hasan
Hi, please check #6 ;)
Hi, @Newo6174 @1UC1F3R616 Haven't been able to find time lately.. I will try to add information on a README tomorrow.
Hi, please check #6 ;)
Can this change be added to the project? I've never used tailos so I cannot test it :(. I'd really appreciate if you can add it!
`Optionally use the userspace wireguard implementation.` I'm wondering if there is a way to detect that we are running on tailsos and we cannot run the kernal mode wireguard?
I like the multiple phases approach ^^ - I wonder what the right way to do this is? I guess the first step is to add some configuration option to...
> which automatically detects the current pod security standard Any ideas on how we can detect that? is their a kubernetes configmap that can be read to know the allowed...
so, going back to what @uhthomas suggested, we have 2 phases to get this complete: Phase 1: Do not use NET_ADMIN capability if wireguard.spec. useWgUserspaceImplementation is equal to true Phase...
example of using the flag: ``` apiVersion: vpn.wireguard-operator.io/v1alpha1 kind: Wireguard metadata: name: vpn spec: useWgUserspaceImplementation: true ```
Hello, What does `kubectl -n radnimax-vpn get wireguardpeer test --template={{.status.config}} ` return?