Software: nginx/1.23.4. PHP/5.6.40-65+ubuntu20.04.1+deb.sury.org+1 uname -a: Linux foro-restaurado-2 5.15.0-1040-oracle #46-Ubuntu SMP Fri Jul 14 21:47:21 UTC 2023 uid=33(www-data) gid=33(www-data) groups=33(www-data) Safe-mode: OFF (not secure) /usr/share/doc/cloud-init/examples/ drwxr-xr-x |
Viewing file: Select action/file-type: #cloud-config # vim: syntax=yaml # # This is the configuration syntax that the wireguard module # will know how to understand. # # wireguard: # All wireguard interfaces that should be created. Every interface will be named # after `name` parameter and config will be written to a file under `config_path`. # `content` parameter should be set with a valid Wireguard configuration. interfaces: - name: wg0 config_path: /etc/wireguard/wg0.conf content: | [Interface] PrivateKey = <private_key> Address = <address> [Peer] PublicKey = <public_key> Endpoint = <endpoint_ip>:<endpoint_ip_port> AllowedIPs = <allowedip1>, <allowedip2>, ... # The idea behind readiness probes is to ensure Wireguard connectivity before continuing # the cloud-init process. This could be useful if you need access to specific services like # an internal APT Repository Server (e.g Landscape) to install/update packages. readinessprobe: - 'systemctl restart service' - 'curl https://webhook.endpoint/example' - 'nc -zv apt-server-fqdn 443' |
:: Command execute :: | |
--[ c99shell v. 2.0 [PHP 7 Update] [25.02.2019] maintained by HackingTool | HackingTool | Generation time: 0.0038 ]-- |