2024-06-04 17:05:17 +02:00
# Pull from small Debian stable image.
2024-08-20 16:58:25 +02:00
FROM debian:stable-slim AS build
2024-06-04 17:05:17 +02:00
LABEL maintainer = "dselen@nerthus.nl"
2024-06-04 22:49:17 +02:00
# Declaring environment variables, change Peernet to an address you like, standard is a 24 bit subnet.
2024-06-06 00:12:11 +02:00
ENV wg_net = "10.0.0.1"
# wg_net is used functionally as an ARG for its environment variable nature, do not change unless you know what you are doing.
2024-06-05 20:27:24 +02:00
2024-06-06 16:11:49 +02:00
# Following ENV variables are changable on container runtime because /entrypoint.sh handles that. See compose.yaml for more info.
2024-06-05 20:27:24 +02:00
ENV tz = "Europe/Amsterdam"
ENV global_dns = "1.1.1.1"
2024-08-20 16:58:25 +02:00
ENV enable = "(`none`)"
2024-06-06 00:12:11 +02:00
ENV isolated_peers = "true"
ENV public_ip = "0.0.0.0"
2024-06-04 17:05:17 +02:00
# Doing basic system maintenance. Change the timezone to the desired timezone.
2024-06-06 16:11:49 +02:00
RUN ln -sf /usr/share/zoneinfo/${ tz } /etc/localtime
2024-06-04 17:05:17 +02:00
2024-06-07 13:25:46 +02:00
# Using WGDASH -- like wg_net functionally as a ARG command. But it is needed in entrypoint.sh so it needs to be exported as environment variable.
2024-06-08 13:30:24 +02:00
ENV WGDASH = /opt/wireguarddashboard
2024-08-20 16:58:25 +02:00
# Doing package management operations, such as upgrading
RUN apt-get update && \
apt-get install -y --no-install-recommends \
curl \
git \
iproute2 \
iptables \
iputils-ping \
openresolv \
procps \
python3 \
python3-pip \
python3-venv \
traceroute \
wireguard \
wireguard-tools \
sudo && \
apt-get remove -y linux-image-* && \
apt-get autoremove -y && \
apt-get clean && \
rm -rf /var/lib/apt/lists/* /tmp/* /var/tmp/*
# Removing the Linux Image package to preserve space on the image, for this reason also deleting apt lists, to be able to install packages: run apt update.
2024-06-04 17:05:17 +02:00
2024-06-08 13:30:24 +02:00
# Doing WireGuard Dashboard installation measures. Modify the git clone command to get the preferred version, with a specific branch for example.
2024-08-20 16:58:25 +02:00
RUN git clone https://github.com/donaldzou/WGDashboard.git ${ WGDASH } \
&& rm ${ WGDASH } /.git -rdf \
&& python3 -m venv ${ WGDASH } /src/venv \
&& . ${ WGDASH } /src/venv/bin/activate \
&& chmod +x ${ WGDASH } /src/wgd.sh \
&& cd ${ WGDASH } /src \
&& ./wgd.sh install
2024-06-04 17:05:17 +02:00
2024-08-20 16:58:25 +02:00
# Set the volume to be used for WireGuard configuration persistency.
2024-06-04 17:05:17 +02:00
VOLUME /etc/wireguard
2024-08-20 16:58:25 +02:00
VOLUME ${WGDASH}
2024-06-04 17:05:17 +02:00
2024-06-04 22:49:17 +02:00
# Generate basic WireGuard interface. Echoing the WireGuard interface config for readability, adjust if you want it for efficiency.
2024-06-06 16:11:49 +02:00
# Also setting the pipefail option, verbose: https://github.com/hadolint/hadolint/wiki/DL4006.
SHELL [ "/bin/bash" , "-o" , "pipefail" , "-c" ]
2024-06-04 17:05:17 +02:00
RUN wg genkey | tee /etc/wireguard/wg0_privatekey \
2024-06-08 13:30:24 +02:00
&& echo "[Interface]" > /wg0.conf \
&& echo "SaveConfig = true" >> /wg0.conf \
&& echo " Address = ${ wg_net } /24 " >> /wg0.conf \
&& echo " PrivateKey = $( cat /etc/wireguard/wg0_privatekey) " >> /wg0.conf \
&& echo " PostUp = iptables -t nat -I POSTROUTING 1 -s ${ wg_net } /24 -o $( ip -o -4 route show to default | awk '{print $NF}' ) -j MASQUERADE " >> /wg0.conf \
&& echo "PostUp = iptables -I FORWARD -i wg0 -o wg0 -j DROP" >> /wg0.conf \
&& echo "PreDown = iptables -t nat -D POSTROUTING 1" >> /wg0.conf \
&& echo "PreDown = iptables -D FORWARD -i wg0 -o wg0 -j DROP" >> /wg0.conf \
&& echo "ListenPort = 51820" >> /wg0.conf \
#&& echo "DNS = ${global_dns}" >> /wg0.conf \
2024-06-04 17:05:17 +02:00
&& rm /etc/wireguard/wg0_privatekey
2024-06-09 23:11:22 +02:00
# Defining a way for Docker to check the health of the container. In this case: checking the login URL.
2024-08-20 16:58:25 +02:00
HEALTHCHECK --interval=30s --timeout=10s --start-period= 5s --retries= 3 \
CMD [ " $( curl -s -o /dev/null -w '%{http_code}' http://localhost:10086/) " -eq "200" ] || exit 1
2024-06-07 13:25:46 +02:00
2024-06-08 13:30:24 +02:00
# Copy the basic entrypoint.sh script.
COPY entrypoint.sh /entrypoint.sh
2024-06-04 17:05:17 +02:00
# Exposing the default WireGuard Dashboard port for web access.
EXPOSE 10086
ENTRYPOINT [ "/bin/bash" , "/entrypoint.sh" ]