-
-
Notifications
You must be signed in to change notification settings - Fork 33
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Bring your own public key #303
Bring your own public key #303
Conversation
Thanks for creating a pull request! A maintainer will review your changes shortly. Please don't be discouraged if it takes a while. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Nice feature!
The generated config file (or QR code) still include a browser-generated private key. I think we should at least replace it with a placeholder to make it more obvious that it needs changing - but if it's not valid base64 the WireGuard mobile app might reject to import the config.
And maybe also point out that users need to replace the privkey in the config, which we could do in the pubkey input help text like my suggestion below.
Good point! I tested a few configurations, but the wireguard app rejects the qr code, if
Maybe, it is a good idea to put |
Maybe we should remove the QR code entirely when a user brings their own key pair. The QR code is for easy, simple and quick setup, which is already out of the window when someone went through the hoops to generate their own key pair. |
@fbuetler can you rebase your changes again? After that we can merge your PR |
Co-authored-by: Florian Bütler <fbuetler@users.noreply.github.com>
66d84e6
to
4762fbd
Compare
Hi,
This is a PR in a serie of 6 PRs, as it was asked to split #294 up into multiple PRs.
Serie:
Feature:
This feature extends the wg-access-server, enabling the user to bring its own public key, instead of it being generated by the frontend. Reason for this is that the private key (generated in the browser), should in some circumstance not touch the web in any way.
This adds a new form input to "Add Device":