2024-10-23 23:15:41 +02:00
FROM alpine:latest
2024-06-04 17:05:17 +02:00
LABEL maintainer = "dselen@nerthus.nl"
2024-06-04 22:49:17 +02:00
# Declaring environment variables, change Peernet to an address you like, standard is a 24 bit subnet.
2024-08-22 20:38:29 +02:00
ARG wg_net = "10.0.0.1"
ARG wg_port = "51820"
2024-06-05 20:27:24 +02:00
2024-06-06 16:11:49 +02:00
# Following ENV variables are changable on container runtime because /entrypoint.sh handles that. See compose.yaml for more info.
2024-08-23 14:46:41 +02:00
ENV TZ = "Europe/Amsterdam"
2024-06-05 20:27:24 +02:00
ENV global_dns = "1.1.1.1"
2024-08-20 19:58:30 +02:00
ENV enable = "none"
2024-10-24 10:13:33 +02:00
ENV isolate = "none"
2024-06-06 00:12:11 +02:00
ENV public_ip = "0.0.0.0"
2024-06-04 17:05:17 +02:00
2024-08-23 14:46:41 +02:00
# Doing package management operations, such as upgrading
RUN apk update \
2024-08-26 22:28:27 +02:00
&& apk add --no-cache bash git tzdata \
2024-10-03 14:45:24 +02:00
iptables ip6tables openrc curl wireguard-tools \
2024-10-24 10:24:22 +02:00
sudo py3-psutil py3-bcrypt \
&& apk upgrade
2024-06-04 17:05:17 +02:00
2024-06-07 13:25:46 +02:00
# Using WGDASH -- like wg_net functionally as a ARG command. But it is needed in entrypoint.sh so it needs to be exported as environment variable.
2024-06-08 13:30:24 +02:00
ENV WGDASH = /opt/wireguarddashboard
2024-08-20 16:58:25 +02:00
# Removing the Linux Image package to preserve space on the image, for this reason also deleting apt lists, to be able to install packages: run apt update.
2024-06-04 17:05:17 +02:00
2024-06-08 13:30:24 +02:00
# Doing WireGuard Dashboard installation measures. Modify the git clone command to get the preferred version, with a specific branch for example.
2024-10-24 00:23:12 +02:00
RUN mkdir /data \
&& mkdir /configs \
2024-10-24 00:09:27 +02:00
&& mkdir -p ${ WGDASH } /src
COPY ./src ${ WGDASH } /src
2024-06-04 17:05:17 +02:00
2024-06-04 22:49:17 +02:00
# Generate basic WireGuard interface. Echoing the WireGuard interface config for readability, adjust if you want it for efficiency.
2024-06-06 16:11:49 +02:00
# Also setting the pipefail option, verbose: https://github.com/hadolint/hadolint/wiki/DL4006.
SHELL [ "/bin/bash" , "-o" , "pipefail" , "-c" ]
2024-10-03 14:45:24 +02:00
RUN out_adapt = $( ip -o -4 route show to default | awk '{print $NF}' ) \
&& echo -e " [Interface]\n \
Add ress = ${ wg_net } /24\n \
PrivateKey = \n \
PostUp = iptables -t nat -I POSTROUTING 1 -s ${ wg_net } /24 -o ${ out_adapt } -j MASQUERADE\n \
PostUp = iptables -I FORWARD -i wg0 -o wg0 -j DROP\n \
PreDown = iptables -t nat -D POSTROUTING -s ${ wg_net } /24 -o ${ out_adapt } -j MASQUERADE\n \
PreDown = iptables -D FORWARD -i wg0 -o wg0 -j DROP\n \
ListenPort = ${ wg_port } \n \
SaveConfig = true\n \
2024-10-24 00:23:12 +02:00
DNS = ${ global_dns } " > /configs/wg0.conf.template \
&& chmod 600 /configs/wg0.conf.template
2024-06-04 17:05:17 +02:00
2024-10-24 10:13:33 +02:00
# Defining a way for Docker to check the health of the container. In this case: checking the gunicorn process.
2024-08-26 22:28:27 +02:00
HEALTHCHECK --interval=30s --timeout=10s --start-period= 5s --retries= 3 \
CMD sh -c 'pgrep gunicorn > /dev/null && pgrep tail > /dev/null' || exit 1
2024-08-20 16:58:25 +02:00
2024-06-08 13:30:24 +02:00
# Copy the basic entrypoint.sh script.
COPY entrypoint.sh /entrypoint.sh
2024-06-04 17:05:17 +02:00
# Exposing the default WireGuard Dashboard port for web access.
EXPOSE 10086
2024-10-23 23:15:41 +02:00
ENTRYPOINT [ "/bin/bash" , "/entrypoint.sh" ]