-
-
Notifications
You must be signed in to change notification settings - Fork 2.3k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Alternative Ingress IP #1605
Alternative Ingress IP #1605
Conversation
250e229
to
ae5c7bc
Compare
I suggest a name other than |
I also suggest that the |
1d5f2cd
to
d224860
Compare
Alright, it's ready for more tests |
This breaks IPv6 for me (tested via http://ipv6-test.com/ and https://browserleaks.com/ip). I don't see the alternate IPv6 address on Deployed from Ubuntu 19.10 using the alternate Python 3.8 and tested using WireGuard on iOS. |
OK, seems we have to use netplan. @davidemyers I think it's fixed now, works on my end |
That works for me, thanks. Should the secondary IPv6 address be /64 like the primary? I tried it that way and it seems to work. |
The docs should mention that when using this feature with DigitalOcean, after manually deleting a Droplet you need to also delete the Floating IP or you'll get charged for it. |
79d8247
to
ffee8e4
Compare
Hm, this doesn't appear to do anything for the IPv4 traffic? |
@benturner It's disabled by default at the moment. You need to turn it on in config.cfg |
Yep, I did. It properly changed my |
@benturner It doesn't modify rules.v4, it just sets the destination IP for the vpn connection as the Floating IP. But I think it might be not a good way in case we want to add more providers.. I'll check that |
cd24256
to
5b5b3f9
Compare
5b5b3f9
to
408f643
Compare
I've refactored the code, so we use the simplest schema with SNAT now |
@davidemyers could you check out this one please? |
Works for me, tested from WireGuard on iOS. |
Description
This PR adds functionality to provision and configure a separate ingress IP to split up incoming and outgoing traffic. The PR is for DigitalOcean only for now.
Because of a bug in Ansible, we're again forced to modify the module locally.
Motivation and Context
Fixes #1047
How Has This Been Tested?
Types of changes
Checklist:
TODO:
./algo destroy
which rises cloud specific prompts and displays the resources available for deletion.Any suggestions welcome!