mirror of
https://github.com/systemd/systemd
synced 2024-10-15 12:34:37 +00:00
network: wireguard: do not add routes to AllowedIPs= by default
As setting such routes may break existing setups. Closes #21964.
This commit is contained in:
parent
8a592c6fc2
commit
cfe1237f38
|
@ -1581,7 +1581,7 @@
|
|||
<citerefentry><refentrytitle>networkd.conf</refentrytitle><manvolnum>5</manvolnum></citerefentry>,
|
||||
or a number in the range 1…4294967295. When <literal>off</literal> the routes to the
|
||||
addresses specified in the <varname>AllowedIPs=</varname> setting will not be configured.
|
||||
Defaults to <literal>main</literal>. This setting will be ignored when the same setting is
|
||||
Defaults to <literal>off</literal>. This setting will be ignored when the same setting is
|
||||
specified in the [WireGuardPeer] section.</para>
|
||||
</listitem>
|
||||
</varlistentry>
|
||||
|
|
|
@ -895,13 +895,8 @@ int config_parse_wireguard_route_table(
|
|||
assert(data);
|
||||
assert(userdata);
|
||||
|
||||
if (isempty(rvalue)) {
|
||||
*table = RT_TABLE_MAIN;
|
||||
return 0;
|
||||
}
|
||||
|
||||
if (streq(rvalue, "off")) {
|
||||
*table = 0;
|
||||
if (isempty(rvalue) || streq(rvalue, "off")) {
|
||||
*table = 0; /* Disabled. */
|
||||
return 0;
|
||||
}
|
||||
|
||||
|
@ -1061,7 +1056,6 @@ static void wireguard_init(NetDev *netdev) {
|
|||
assert(w);
|
||||
|
||||
w->flags = WGDEVICE_F_REPLACE_PEERS;
|
||||
w->route_table = RT_TABLE_MAIN;
|
||||
}
|
||||
|
||||
static void wireguard_done(NetDev *netdev) {
|
||||
|
|
Loading…
Reference in a new issue