Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Ability to use an existing private key #385

Merged
merged 2 commits into from
Mar 9, 2024

Conversation

valentineus
Copy link
Contributor

Hi!

First of all, I want to thank you for this amazing tool. It has saved me a ton of time during the integration of CloudFlare WARP into our infrastructure. This tool allowed us to utilize existing complex routing and firewall settings on the server without having to rely on the cumbersome utility provided by CloudFlare itself.

My case involved a pre-configured and operational WireGuard server, to which clients connect. I needed to reroute all server traffic through CloudFlare WARP. However, in its standard setup, the tool generates and registers a new private key. This would have required me to reconfigure numerous active clients to enable traffic redirection to CloudFlare WARP servers. Attempting to establish two wg interfaces was unsuccessful, although it seemed like a potential solution.

To address this issue, I added the capability to use an existing private key by using the -k (--key) argument in the register command. If a key is provided, that key is used. Otherwise, a new one is generated.

I hope this helps someone else, besides just me.

In my case, it was necessary to use an existing WireGuard private key. I added the ability to specify an existing private key when registering with CloudFlare through the "-k" argument.
cmd/register/register.go Outdated Show resolved Hide resolved
@ViRb3
Copy link
Owner

ViRb3 commented Mar 7, 2024

Apologies, I thought I submitted the review comment but it was stuck in Pending. I submitted it now, pls make the change and I am happy to merge.

@ViRb3 ViRb3 merged commit 71e9ce8 into ViRb3:master Mar 9, 2024
1 check passed
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants