1
0
mirror of https://github.com/donaldzou/WGDashboard.git synced 2024-11-06 16:00:28 +01:00
WGDashboard/src/dashboard.py

1462 lines
55 KiB
Python
Raw Normal View History

2021-09-08 18:39:25 +02:00
"""
< WGDashboard > - by Donald Zou [https://github.com/donaldzou]
2021-09-08 18:39:25 +02:00
Under Apache-2.0 License
"""
2021-12-26 00:26:39 +01:00
import configparser
import hashlib
import ipaddress
import json
2021-05-04 07:32:34 +02:00
# Python Built-in Library
2020-10-18 07:10:13 +02:00
import os
2021-12-26 00:26:39 +01:00
import secrets
2020-10-18 07:10:13 +02:00
import subprocess
2021-12-26 00:26:39 +01:00
import threading
2021-07-02 19:23:04 +02:00
import time
2021-12-28 20:53:51 +01:00
import re
2021-12-26 00:26:39 +01:00
import urllib.parse
import urllib.request
2021-12-28 20:53:51 +01:00
from datetime import datetime, timedelta
2021-04-03 02:48:00 +02:00
from operator import itemgetter
2021-12-26 00:26:39 +01:00
2021-05-04 07:32:34 +02:00
# PIP installed library
import ifcfg
2021-12-26 00:26:39 +01:00
from flask import Flask, request, render_template, redirect, url_for, session, jsonify
from flask_qrcode import QRcode
2021-12-26 00:26:39 +01:00
from icmplib import ping, traceroute
2021-04-03 02:48:00 +02:00
from tinydb import TinyDB, Query
2021-12-26 00:26:39 +01:00
# Import other python files
2021-12-28 20:53:51 +01:00
from util import regex_match, check_DNS, check_Allowed_IPs, check_remote_endpoint,\
check_IP_with_range, clean_IP_with_range
2021-12-26 00:26:39 +01:00
2021-05-14 00:00:40 +02:00
# Dashboard Version
2021-12-28 20:53:51 +01:00
DASHBOARD_VERSION = 'v3.0'
2022-01-01 01:20:30 +01:00
# WireGuard configuration path
WG_CONF_PATH = None
2021-05-14 00:00:40 +02:00
# Dashboard Config Name
configuration_path = os.getenv('CONFIGURATION_PATH', '.')
2022-01-01 00:57:59 +01:00
DB_PATH = os.path.join(configuration_path, 'db')
if not os.path.isdir(DB_PATH):
os.mkdir(DB_PATH)
DASHBOARD_CONF = os.path.join(configuration_path, 'wg-dashboard.ini')
2021-05-14 00:00:40 +02:00
# Upgrade Required
2021-12-28 20:53:51 +01:00
UPDATE = None
2021-05-14 00:00:40 +02:00
# Flask App Configuration
app = Flask("WGDashboard")
2021-12-25 20:44:14 +01:00
app.config['SEND_FILE_MAX_AGE_DEFAULT'] = 5206928
2021-05-04 07:32:34 +02:00
app.secret_key = secrets.token_urlsafe(16)
2020-10-18 07:10:13 +02:00
app.config['TEMPLATES_AUTO_RELOAD'] = True
2021-08-14 23:13:16 +02:00
# Enable QR Code Generator
QRcode(app)
2021-04-03 20:06:21 +02:00
2021-12-24 03:26:24 +01:00
# TODO: Testing semaphore on reading/writing database
sem = threading.RLock()
2021-09-08 18:39:25 +02:00
2021-05-05 03:26:40 +02:00
2021-09-08 18:39:25 +02:00
# Read / Write Dashboard Config File
def get_dashboard_conf():
2021-12-26 00:26:39 +01:00
"""
Dashboard Configuration Related
"""
2021-09-08 18:39:25 +02:00
config = configparser.ConfigParser(strict=False)
2021-12-28 20:53:51 +01:00
config.read(DASHBOARD_CONF)
2021-09-08 18:39:25 +02:00
return config
2021-12-26 00:26:39 +01:00
2021-09-08 18:39:25 +02:00
def set_dashboard_conf(config):
2021-12-28 20:53:51 +01:00
with open(DASHBOARD_CONF, "w", encoding='utf-8') as conf_object:
2021-12-26 11:04:39 +01:00
config.write(conf_object)
2021-09-08 18:39:25 +02:00
2021-12-26 00:26:39 +01:00
2021-09-08 18:39:25 +02:00
# Get all keys from a configuration
2020-10-23 07:31:10 +02:00
def get_conf_peer_key(config_name):
2021-12-26 00:26:39 +01:00
"""
Configuration Related
"""
2021-04-03 20:06:21 +02:00
try:
2021-12-26 00:26:39 +01:00
peer_key = subprocess.run(f"wg show {config_name} peers",
check=True, shell=True, capture_output=True).stdout
2021-05-14 00:00:40 +02:00
peer_key = peer_key.decode("UTF-8").split()
return peer_key
2021-12-26 00:26:39 +01:00
except subprocess.CalledProcessError:
2021-08-14 23:13:16 +02:00
return config_name + " is not running."
2021-12-26 00:26:39 +01:00
2021-09-08 18:39:25 +02:00
# Get numbers of connected peer of a configuration
2020-12-26 06:17:42 +01:00
def get_conf_running_peer_number(config_name):
running = 0
2021-04-03 20:06:21 +02:00
# Get latest handshakes
try:
2021-12-26 00:26:39 +01:00
data_usage = subprocess.run(f"wg show {config_name} latest-handshakes",
check=True, shell=True, capture_output=True).stdout
except subprocess.CalledProcessError:
2021-04-03 20:06:21 +02:00
return "stopped"
2020-12-26 06:17:42 +01:00
data_usage = data_usage.decode("UTF-8").split()
count = 0
now = datetime.now()
2021-12-28 20:53:51 +01:00
time_delta = timedelta(minutes=2)
for _ in range(int(len(data_usage) / 2)):
2021-04-03 20:06:21 +02:00
minus = now - datetime.fromtimestamp(int(data_usage[count + 1]))
2021-12-28 20:53:51 +01:00
if minus < time_delta:
2020-12-26 06:17:42 +01:00
running += 1
count += 2
return running
2020-10-18 07:10:13 +02:00
2021-12-26 00:26:39 +01:00
2021-09-08 18:39:25 +02:00
# Read [Interface] section from configuration file
2021-08-15 05:30:05 +02:00
def read_conf_file_interface(config_name):
2022-01-01 01:20:30 +01:00
conf_location = WG_CONF_PATH + "/" + config_name + ".conf"
2021-12-28 20:53:51 +01:00
with open(conf_location, 'r', encoding='utf-8') as file_object:
2021-12-26 11:04:39 +01:00
file = file_object.read().split("\n")
data = {}
2021-12-28 20:53:51 +01:00
for i in file:
if not regex_match("#(.*)", i):
if len(i) > 0:
if i != "[Interface]":
tmp = re.split(r'\s*=\s*', i, 1)
2021-12-26 11:04:39 +01:00
if len(tmp) == 2:
data[tmp[0]] = tmp[1]
2021-08-15 05:30:05 +02:00
return data
2021-12-26 00:26:39 +01:00
2021-09-08 18:39:25 +02:00
# Read the whole configuration file
2021-04-09 06:07:37 +02:00
def read_conf_file(config_name):
2021-04-03 20:06:21 +02:00
# Read Configuration File Start
2022-01-01 01:20:30 +01:00
conf_location = WG_CONF_PATH + "/" + config_name + ".conf"
2021-12-29 20:57:44 +01:00
f = open(conf_location, 'r')
file = f.read().split("\n")
2021-04-03 20:06:21 +02:00
conf_peer_data = {
"Interface": {},
"Peers": []
}
peers_start = 0
2021-12-29 20:57:44 +01:00
for i in range(len(file)):
if not regex_match("#(.*)", file[i]):
if file[i] == "[Peer]":
2021-05-14 00:00:40 +02:00
peers_start = i
break
2021-12-29 20:57:44 +01:00
else:
if len(file[i]) > 0:
if file[i] != "[Interface]":
tmp = re.split(r'\s*=\s*', file[i], 1)
if len(tmp) == 2:
conf_peer_data['Interface'][tmp[0]] = tmp[1]
2021-04-03 20:06:21 +02:00
conf_peers = file[peers_start:]
peer = -1
for i in conf_peers:
2021-09-08 18:39:25 +02:00
if not regex_match("#(.*)", i):
2021-05-14 00:00:40 +02:00
if i == "[Peer]":
peer += 1
conf_peer_data["Peers"].append({})
2021-07-02 19:23:04 +02:00
elif peer > -1:
2021-05-14 00:00:40 +02:00
if len(i) > 0:
2021-12-29 20:57:44 +01:00
tmp = re.split('\s*=\s*', i, 1)
2021-05-14 00:00:40 +02:00
if len(tmp) == 2:
conf_peer_data["Peers"][peer][tmp[0]] = tmp[1]
2021-07-02 19:23:04 +02:00
2021-12-29 20:57:44 +01:00
f.close()
2021-04-03 20:06:21 +02:00
# Read Configuration File End
2021-04-09 06:07:37 +02:00
return conf_peer_data
2021-04-03 20:06:21 +02:00
2021-12-26 00:26:39 +01:00
2021-09-08 18:39:25 +02:00
# Get latest handshake from all peers of a configuration
2021-07-02 19:23:04 +02:00
def get_latest_handshake(config_name, db, peers):
# Get latest handshakes
try:
2021-12-26 00:26:39 +01:00
data_usage = subprocess.run(f"wg show {config_name} latest-handshakes",
check=True, shell=True, capture_output=True).stdout
except subprocess.CalledProcessError:
2021-07-02 19:23:04 +02:00
return "stopped"
data_usage = data_usage.decode("UTF-8").split()
count = 0
now = datetime.now()
2021-12-28 20:53:51 +01:00
time_delta = timedelta(minutes=2)
for _ in range(int(len(data_usage) / 2)):
2021-07-02 19:23:04 +02:00
minus = now - datetime.fromtimestamp(int(data_usage[count + 1]))
2021-12-28 20:53:51 +01:00
if minus < time_delta:
2021-07-02 19:23:04 +02:00
status = "running"
else:
status = "stopped"
if int(data_usage[count + 1]) > 0:
2021-12-28 20:53:51 +01:00
db.update({"latest_handshake": str(minus).split(".", maxsplit=1)[0], "status": status},
2021-07-02 19:23:04 +02:00
peers.id == data_usage[count])
else:
db.update({"latest_handshake": "(None)", "status": status}, peers.id == data_usage[count])
count += 2
2021-04-09 06:07:37 +02:00
2021-12-28 20:53:51 +01:00
return None
2021-12-26 00:26:39 +01:00
2021-09-08 18:39:25 +02:00
# Get transfer from all peers of a configuration
2021-07-02 19:23:04 +02:00
def get_transfer(config_name, db, peers):
2021-04-03 20:06:21 +02:00
# Get transfer
try:
2021-12-26 00:26:39 +01:00
data_usage = subprocess.run(f"wg show {config_name} transfer",
check=True, shell=True, capture_output=True).stdout
except subprocess.CalledProcessError:
2021-04-03 20:06:21 +02:00
return "stopped"
data_usage = data_usage.decode("UTF-8").split("\n")
final = []
for i in data_usage:
final.append(i.split("\t"))
data_usage = final
for i in range(len(data_usage)):
cur_i = db.search(peers.id == data_usage[i][0])
2021-12-29 20:57:44 +01:00
if len(cur_i) > 0:
total_sent = cur_i[0]['total_sent']
total_receive = cur_i[0]['total_receive']
traffic = cur_i[0]['traffic']
cur_total_sent = round(int(data_usage[i][2]) / (1024 ** 3), 4)
cur_total_receive = round(int(data_usage[i][1]) / (1024 ** 3), 4)
2021-12-29 20:57:44 +01:00
if cur_i[0]["status"] == "running":
if total_sent <= cur_total_sent and total_receive <= cur_total_receive:
total_sent = cur_total_sent
total_receive = cur_total_receive
else:
now = datetime.now()
ctime = now.strftime("%d/%m/%Y %H:%M:%S")
traffic.append(
{
"time": ctime, "total_receive": round(total_receive, 4),
"total_sent": round(total_sent, 4),
"total_data": round(total_receive + total_sent, 4)
}
)
2021-12-29 20:57:44 +01:00
total_sent = 0
total_receive = 0
db.update({"traffic": traffic}, peers.id == data_usage[i][0])
db.update({"total_receive": round(total_receive, 4), "total_sent": round(total_sent, 4),
"total_data": round(total_receive + total_sent, 4)}, peers.id == data_usage[i][0])
2021-12-28 20:53:51 +01:00
return None
2021-12-26 00:26:39 +01:00
2021-09-08 18:39:25 +02:00
# Get endpoint from all peers of a configuration
2021-07-02 19:23:04 +02:00
def get_endpoint(config_name, db, peers):
2021-04-03 20:06:21 +02:00
# Get endpoint
try:
2021-12-26 00:26:39 +01:00
data_usage = subprocess.run(f"wg show {config_name} endpoints",
check=True, shell=True, capture_output=True).stdout
except subprocess.CalledProcessError:
2021-04-03 20:06:21 +02:00
return "stopped"
2020-10-18 07:10:13 +02:00
data_usage = data_usage.decode("UTF-8").split()
count = 0
2021-12-28 20:53:51 +01:00
for _ in range(int(len(data_usage) / 2)):
2021-04-03 20:06:21 +02:00
db.update({"endpoint": data_usage[count + 1]}, peers.id == data_usage[count])
2020-10-18 07:10:13 +02:00
count += 2
2021-04-03 20:06:21 +02:00
2021-12-28 20:53:51 +01:00
return None
2021-12-26 00:26:39 +01:00
2021-09-08 18:39:25 +02:00
# Get allowed ips from all peers of a configuration
2021-12-26 00:26:39 +01:00
def get_allowed_ip(db, peers, conf_peer_data):
2021-04-03 20:06:21 +02:00
# Get allowed ip
for i in conf_peer_data["Peers"]:
2021-05-14 00:00:40 +02:00
db.update({"allowed_ip": i.get('AllowedIPs', '(None)')}, peers.id == i["PublicKey"])
2021-07-02 19:23:04 +02:00
2021-12-26 00:26:39 +01:00
2021-09-08 18:39:25 +02:00
# Look for new peers from WireGuard
2021-08-14 23:13:16 +02:00
def get_all_peers_data(config_name):
2021-12-28 03:01:02 +01:00
sem.acquire(timeout=1)
2022-01-01 00:57:59 +01:00
db = TinyDB(os.path.join(DB_PATH, config_name + '.json'))
2021-07-02 19:23:04 +02:00
peers = Query()
conf_peer_data = read_conf_file(config_name)
2021-09-08 18:39:25 +02:00
config = get_dashboard_conf()
2021-07-02 19:23:04 +02:00
for i in conf_peer_data['Peers']:
search = db.search(peers.id == i['PublicKey'])
if not search:
new_data = {
2021-07-02 19:23:04 +02:00
"id": i['PublicKey'],
"private_key": "",
2021-09-08 18:39:25 +02:00
"DNS": config.get("Peers", "peer_global_DNS"),
2021-12-26 00:26:39 +01:00
"endpoint_allowed_ip": config.get("Peers", "peer_endpoint_allowed_ip"),
2021-07-02 19:23:04 +02:00
"name": "",
"total_receive": 0,
"total_sent": 0,
"total_data": 0,
2021-09-08 18:39:25 +02:00
"endpoint": "N/A",
"status": "stopped",
"latest_handshake": "N/A",
"allowed_ip": "N/A",
"traffic": [],
"mtu": config.get("Peers", "peer_mtu"),
2021-12-26 00:26:39 +01:00
"keepalive": config.get("Peers", "peer_keep_alive"),
"remote_endpoint": config.get("Peers", "remote_endpoint"),
"preshared_key": ""
}
if "PresharedKey" in i.keys():
new_data["preshared_key"] = i["PresharedKey"]
db.insert(new_data)
else:
# Update database since V2.2
update_db = {}
2021-09-08 18:39:25 +02:00
# Required peer settings
if "DNS" not in search[0]:
2021-09-08 18:39:25 +02:00
update_db['DNS'] = config.get("Peers", "peer_global_DNS")
2021-08-14 23:13:16 +02:00
if "endpoint_allowed_ip" not in search[0]:
2021-09-08 18:39:25 +02:00
update_db['endpoint_allowed_ip'] = config.get("Peers", "peer_endpoint_allowed_ip")
# Not required peers settings (Only for QR code)
if "private_key" not in search[0]:
update_db['private_key'] = ''
if "mtu" not in search[0]:
update_db['mtu'] = config.get("Peers", "peer_mtu")
if "keepalive" not in search[0]:
2021-12-26 00:26:39 +01:00
update_db['keepalive'] = config.get("Peers", "peer_keep_alive")
2021-09-08 18:39:25 +02:00
if "remote_endpoint" not in search[0]:
update_db['remote_endpoint'] = config.get("Peers","remote_endpoint")
if "preshared_key" not in search[0]:
if "PresharedKey" in i.keys():
update_db['preshared_key'] = i["PresharedKey"]
else:
update_db['preshared_key'] = ""
db.update(update_db, peers.id == i['PublicKey'])
# Remove peers no longer exist in WireGuard configuration file
db_key = list(map(lambda a: a['id'], db.all()))
wg_key = list(map(lambda a: a['PublicKey'], conf_peer_data['Peers']))
for i in db_key:
if i not in wg_key:
db.remove(peers.id == i)
2021-07-02 19:23:04 +02:00
tic = time.perf_counter()
get_latest_handshake(config_name, db, peers)
get_transfer(config_name, db, peers)
get_endpoint(config_name, db, peers)
2021-12-26 00:26:39 +01:00
get_allowed_ip(db, peers, conf_peer_data)
2021-07-02 19:23:04 +02:00
toc = time.perf_counter()
print(f"Finish fetching data in {toc - tic:0.4f} seconds")
2021-05-14 00:00:40 +02:00
db.close()
2021-12-28 03:01:02 +01:00
try:
sem.release()
except RuntimeError as e:
print("RuntimeError: cannot release un-acquired lock")
2021-04-03 20:06:21 +02:00
2021-12-26 00:26:39 +01:00
2021-09-08 18:39:25 +02:00
# Search for peers
2021-08-14 23:13:16 +02:00
def get_peers(config_name, search, sort_t):
2021-12-26 00:26:39 +01:00
"""
Frontend Related Functions
"""
2021-08-14 23:13:16 +02:00
get_all_peers_data(config_name)
2021-12-28 03:01:02 +01:00
sem.acquire(timeout=1)
2022-01-01 00:57:59 +01:00
db = TinyDB(os.path.join(DB_PATH, config_name + ".json"))
2021-08-14 23:13:16 +02:00
peer = Query()
if len(search) == 0:
result = db.all()
else:
result = db.search(peer.name.matches('(.*)(' + re.escape(search) + ')(.*)'))
2021-12-24 03:26:24 +01:00
if sort_t == "allowed_ip":
2021-12-26 00:26:39 +01:00
result = sorted(result, key=lambda d: ipaddress.ip_network(d[sort_t].split(",")[0]))
2021-12-24 03:26:24 +01:00
else:
result = sorted(result, key=lambda d: d[sort_t])
2021-05-14 00:00:40 +02:00
db.close()
try:
sem.release()
except RuntimeError as e:
print("RuntimeError: cannot release un-acquired lock")
2021-04-03 02:48:00 +02:00
return result
2020-10-18 07:10:13 +02:00
2021-08-14 23:13:16 +02:00
2021-09-08 18:39:25 +02:00
# Get configuration public key
2020-10-18 07:10:13 +02:00
def get_conf_pub_key(config_name):
2021-12-29 20:57:44 +01:00
try:
conf = configparser.ConfigParser(strict=False)
2022-01-01 01:20:30 +01:00
conf.read(WG_CONF_PATH + "/" + config_name + ".conf")
2021-12-29 20:57:44 +01:00
pri = conf.get("Interface", "PrivateKey")
pub = subprocess.run(f"echo '{pri}' | wg pubkey", check=True, shell=True, capture_output=True).stdout
conf.clear()
return pub.decode().strip("\n")
except configparser.NoSectionError as e:
return ""
2020-10-18 07:10:13 +02:00
2021-12-26 00:26:39 +01:00
2021-09-08 18:39:25 +02:00
# Get configuration listen port
2020-10-18 07:10:13 +02:00
def get_conf_listen_port(config_name):
2021-05-04 07:32:34 +02:00
conf = configparser.ConfigParser(strict=False)
2022-01-01 01:20:30 +01:00
conf.read(WG_CONF_PATH + "/" + config_name + ".conf")
2021-09-08 18:39:25 +02:00
port = ""
try:
port = conf.get("Interface", "ListenPort")
2021-12-26 00:26:39 +01:00
except (configparser.NoSectionError, configparser.NoOptionError):
2021-09-08 18:39:25 +02:00
if get_conf_status(config_name) == "running":
2021-12-26 00:26:39 +01:00
port = subprocess.run(f"wg show {config_name} listen-port",
check=True, shell=True, capture_output=True).stdout
2021-09-08 18:39:25 +02:00
port = port.decode("UTF-8")
2021-05-04 07:32:34 +02:00
conf.clear()
return port
2021-04-03 20:06:21 +02:00
2021-12-26 00:26:39 +01:00
2021-09-08 18:39:25 +02:00
# Get configuration total data
2020-10-18 07:10:13 +02:00
def get_conf_total_data(config_name):
2021-12-28 03:01:02 +01:00
sem.acquire(timeout=1)
2022-01-01 00:57:59 +01:00
db = TinyDB(os.path.join(DB_PATH, config_name + ".json"))
2020-10-18 07:10:13 +02:00
upload_total = 0
download_total = 0
2021-04-09 06:07:37 +02:00
for i in db.all():
2021-05-14 00:00:40 +02:00
upload_total += i['total_sent']
download_total += i['total_receive']
for k in i['traffic']:
upload_total += k['total_sent']
download_total += k['total_receive']
2021-04-09 06:07:37 +02:00
total = round(upload_total + download_total, 4)
2021-05-14 00:00:40 +02:00
upload_total = round(upload_total, 4)
download_total = round(download_total, 4)
db.close()
try:
sem.release()
except RuntimeError as e:
print("RuntimeError: cannot release un-acquired lock")
2020-10-18 07:10:13 +02:00
return [total, upload_total, download_total]
2021-12-26 00:26:39 +01:00
2021-09-08 18:39:25 +02:00
# Get configuration status
2020-10-18 07:10:13 +02:00
def get_conf_status(config_name):
2021-04-09 06:07:37 +02:00
ifconfig = dict(ifcfg.interfaces().items())
2021-12-28 20:53:51 +01:00
return "running" if config_name in ifconfig.keys() else "stopped"
2020-10-18 07:10:13 +02:00
2021-12-26 00:26:39 +01:00
2021-09-08 18:39:25 +02:00
# Get all configuration as a list
2020-10-18 07:10:13 +02:00
def get_conf_list():
conf = []
2022-01-01 01:20:30 +01:00
for i in os.listdir(WG_CONF_PATH):
2021-09-08 18:39:25 +02:00
if regex_match("^(.{1,}).(conf)$", i):
i = i.replace('.conf', '')
temp = {"conf": i, "status": get_conf_status(i), "public_key": get_conf_pub_key(i)}
if temp['status'] == "running":
temp['checked'] = 'checked'
else:
temp['checked'] = ""
conf.append(temp)
2021-07-02 19:23:04 +02:00
if len(conf) > 0:
conf = sorted(conf, key=itemgetter('conf'))
2020-10-18 07:10:13 +02:00
return conf
2021-12-26 00:26:39 +01:00
2021-09-08 18:39:25 +02:00
# Generate private key
def gen_private_key():
gen = subprocess.check_output('wg genkey > private_key.txt && wg pubkey < private_key.txt > public_key.txt',
shell=True)
gen_psk = subprocess.check_output('wg genpsk', shell=True)
preshare_key = gen_psk.decode("UTF-8").strip()
2021-12-28 20:53:51 +01:00
with open('private_key.txt', encoding='utf-8') as file_object:
2021-12-26 11:04:39 +01:00
private_key = file_object.readline().strip()
2021-12-28 20:53:51 +01:00
with open('public_key.txt', encoding='utf-8') as file_object:
2021-12-26 11:04:39 +01:00
public_key = file_object.readline().strip()
data = {"private_key": private_key, "public_key": public_key, "preshared_key": preshare_key}
return data
2021-12-26 00:26:39 +01:00
2021-09-08 18:39:25 +02:00
# Generate public key
def gen_public_key(private_key):
2021-12-28 20:53:51 +01:00
with open('private_key.txt', 'w', encoding='utf-8') as file_object:
2021-12-26 11:04:39 +01:00
file_object.write(private_key)
try:
check = subprocess.check_output("wg pubkey < private_key.txt > public_key.txt", shell=True)
2021-12-28 20:53:51 +01:00
with open('public_key.txt', encoding='utf-8') as file_object:
2021-12-26 11:04:39 +01:00
public_key = file_object.readline().strip()
os.remove('private_key.txt')
os.remove('public_key.txt')
2021-08-14 23:13:16 +02:00
return {"status": 'success', "msg": "", "data": public_key}
2021-12-26 00:26:39 +01:00
except subprocess.CalledProcessError:
os.remove('private_key.txt')
2021-08-14 23:13:16 +02:00
return {"status": 'failed', "msg": "Key is not the correct length or format", "data": ""}
2021-12-26 00:26:39 +01:00
2021-09-08 18:39:25 +02:00
# Check if private key and public key match
2021-12-28 20:53:51 +01:00
def f_check_key_match(private_key, public_key, config_name):
2021-09-08 18:39:25 +02:00
result = gen_public_key(private_key)
if result['status'] == 'failed':
return result
else:
2021-12-28 03:01:02 +01:00
sem.acquire(timeout=1)
2022-01-01 00:57:59 +01:00
db = TinyDB(os.path.join(DB_PATH, config_name + ".json"))
peers = Query()
match = db.search(peers.id == result['data'])
if len(match) != 1 or result['data'] != public_key:
2021-12-24 03:26:24 +01:00
db.close()
try:
sem.release()
except RuntimeError as e:
print("RuntimeError: cannot release un-acquired lock")
return {'status': 'failed', 'msg': 'Please check your private key, it does not match with the public key.'}
else:
2021-12-24 03:26:24 +01:00
db.close()
try:
sem.release()
except RuntimeError as e:
print("RuntimeError: cannot release un-acquired lock")
return {'status': 'success'}
2021-12-26 00:26:39 +01:00
2021-09-08 18:39:25 +02:00
# Check if there is repeated allowed IP
2021-12-28 20:53:51 +01:00
def check_repeat_allowed_ip(public_key, ip, config_name):
2021-12-28 03:01:02 +01:00
sem.acquire(timeout=1)
2022-01-01 00:57:59 +01:00
db = TinyDB(os.path.join(DB_PATH, config_name + ".json"))
peers = Query()
peer = db.search(peers.id == public_key)
if len(peer) != 1:
return {'status': 'failed', 'msg': 'Peer does not exist'}
else:
existed_ip = db.search((peers.id != public_key) & (peers.allowed_ip == ip))
if len(existed_ip) != 0:
2021-12-24 03:26:24 +01:00
db.close()
try:
sem.release()
except RuntimeError as e:
print("RuntimeError: cannot release un-acquired lock")
2021-08-14 23:13:16 +02:00
return {'status': 'failed', 'msg': "Allowed IP already taken by another peer."}
else:
2021-12-24 03:26:24 +01:00
db.close()
try:
sem.release()
except RuntimeError as e:
print("RuntimeError: cannot release un-acquired lock")
2021-08-14 23:13:16 +02:00
return {'status': 'success'}
2021-08-15 05:30:05 +02:00
2021-09-08 18:39:25 +02:00
"""
Flask Functions
"""
2021-08-14 23:13:16 +02:00
2021-12-26 00:26:39 +01:00
2021-09-08 18:39:25 +02:00
# Before request
2021-05-04 07:32:34 +02:00
@app.before_request
def auth_req():
conf = get_dashboard_conf()
2021-05-04 07:32:34 +02:00
req = conf.get("Server", "auth_req")
2021-12-28 20:53:51 +01:00
session['update'] = UPDATE
session['dashboard_version'] = DASHBOARD_VERSION
2021-05-04 07:32:34 +02:00
if req == "true":
if '/static/' not in request.path and \
request.endpoint != "signin" and \
request.endpoint != "signout" and \
request.endpoint != "auth" and \
"username" not in session:
2021-08-14 23:13:16 +02:00
print("User not loggedin - Attemped access: " + str(request.endpoint))
if request.endpoint != "index":
session['message'] = "You need to sign in first!"
else:
session['message'] = ""
conf.clear()
2021-05-04 07:32:34 +02:00
return redirect(url_for("signin"))
else:
2021-05-14 00:00:40 +02:00
if request.endpoint in ['signin', 'signout', 'auth', 'settings', 'update_acct', 'update_pwd',
'update_app_ip_port', 'update_wg_conf_path']:
conf.clear()
2021-05-04 07:32:34 +02:00
return redirect(url_for("index"))
conf.clear()
2021-12-28 20:53:51 +01:00
return None
2021-12-26 00:26:39 +01:00
2021-09-08 18:39:25 +02:00
"""
Sign In / Sign Out
"""
2021-12-26 00:26:39 +01:00
# Sign In
2021-05-04 07:32:34 +02:00
@app.route('/signin', methods=['GET'])
def signin():
message = ""
if "message" in session:
message = session['message']
session.pop("message")
return render_template('signin.html', message=message)
2021-12-26 00:26:39 +01:00
# Sign Out
2021-05-04 07:32:34 +02:00
@app.route('/signout', methods=['GET'])
def signout():
if "username" in session:
session.pop("username")
message = "Sign out successfully!"
return render_template('signin.html', message=message)
2021-12-26 00:26:39 +01:00
2021-09-08 18:39:25 +02:00
# Authentication
@app.route('/auth', methods=['POST'])
def auth():
config = get_dashboard_conf()
2021-09-08 18:39:25 +02:00
password = hashlib.sha256(request.form['password'].encode())
2021-12-26 00:26:39 +01:00
if password.hexdigest() == config["Account"]["password"] \
and request.form['username'] == config["Account"]["username"]:
2021-09-08 18:39:25 +02:00
session['username'] = request.form['username']
config.clear()
return redirect(url_for("index"))
2021-12-28 20:53:51 +01:00
session['message'] = "Username or Password is incorrect."
config.clear()
return redirect(url_for("signin"))
2021-09-08 18:39:25 +02:00
2021-12-26 00:26:39 +01:00
2021-09-08 18:39:25 +02:00
@app.route('/', methods=['GET'])
def index():
2021-12-26 00:26:39 +01:00
"""
Index Page Related
"""
2021-09-08 18:39:25 +02:00
return render_template('index.html', conf=get_conf_list())
2021-05-04 07:32:34 +02:00
2021-12-26 00:26:39 +01:00
2021-09-08 18:39:25 +02:00
# Setting Page
2021-05-04 07:32:34 +02:00
@app.route('/settings', methods=['GET'])
def settings():
2021-12-26 00:26:39 +01:00
"""
Setting Page Related
"""
2021-05-04 07:32:34 +02:00
message = ""
status = ""
config = get_dashboard_conf()
2021-05-04 07:32:34 +02:00
if "message" in session and "message_status" in session:
message = session['message']
status = session['message_status']
session.pop("message")
session.pop("message_status")
required_auth = config.get("Server", "auth_req")
2021-05-14 00:00:40 +02:00
return render_template('settings.html', conf=get_conf_list(), message=message, status=status,
app_ip=config.get("Server", "app_ip"), app_port=config.get("Server", "app_port"),
2021-08-14 23:13:16 +02:00
required_auth=required_auth, wg_conf_path=config.get("Server", "wg_conf_path"),
2021-08-15 05:30:05 +02:00
peer_global_DNS=config.get("Peers", "peer_global_DNS"),
2021-09-08 18:39:25 +02:00
peer_endpoint_allowed_ip=config.get("Peers", "peer_endpoint_allowed_ip"),
peer_mtu=config.get("Peers", "peer_mtu"),
2021-12-26 00:26:39 +01:00
peer_keepalive=config.get("Peers", "peer_keep_alive"),
peer_remote_endpoint=config.get("Peers", "remote_endpoint"))
2021-05-14 00:00:40 +02:00
2021-09-08 18:39:25 +02:00
# Update account username
2021-05-04 07:32:34 +02:00
@app.route('/update_acct', methods=['POST'])
def update_acct():
2021-08-14 23:13:16 +02:00
if len(request.form['username']) == 0:
session['message'] = "Username cannot be empty."
session['message_status'] = "danger"
return redirect(url_for("settings"))
config = get_dashboard_conf()
2021-05-04 07:32:34 +02:00
config.set("Account", "username", request.form['username'])
try:
set_dashboard_conf(config)
config.clear()
2021-05-04 07:32:34 +02:00
session['message'] = "Username update successfully!"
session['message_status'] = "success"
session['username'] = request.form['username']
return redirect(url_for("settings"))
except Exception:
session['message'] = "Username update failed."
session['message_status'] = "danger"
config.clear()
return redirect(url_for("settings"))
2021-12-26 00:26:39 +01:00
2021-09-08 18:39:25 +02:00
# Update peer default settting
2021-08-14 23:13:16 +02:00
@app.route('/update_peer_default_config', methods=['POST'])
def update_peer_default_config():
config = get_dashboard_conf()
2021-09-08 18:39:25 +02:00
if len(request.form['peer_endpoint_allowed_ip']) == 0 or \
len(request.form['peer_global_DNS']) == 0 or \
len(request.form['peer_remote_endpoint']) == 0:
session['message'] = "Please fill in all required boxes."
2021-08-14 23:13:16 +02:00
session['message_status'] = "danger"
config.clear()
2021-08-14 23:13:16 +02:00
return redirect(url_for("settings"))
# Check DNS Format
2021-12-26 00:26:39 +01:00
dns_addresses = request.form['peer_global_DNS']
if not check_DNS(dns_addresses):
2021-09-08 18:39:25 +02:00
session['message'] = "Peer DNS Format Incorrect."
2021-08-14 23:13:16 +02:00
session['message_status'] = "danger"
config.clear()
2021-08-14 23:13:16 +02:00
return redirect(url_for("settings"))
2021-12-26 00:26:39 +01:00
dns_addresses = dns_addresses.replace(" ", "").split(',')
dns_addresses = ",".join(dns_addresses)
2021-08-14 23:13:16 +02:00
# Check Endpoint Allowed IPs
ip = request.form['peer_endpoint_allowed_ip']
2021-09-08 18:39:25 +02:00
if not check_Allowed_IPs(ip):
2021-12-26 00:26:39 +01:00
session['message'] = "Peer Endpoint Allowed IPs Format Incorrect. " \
"Example: 192.168.1.1/32 or 192.168.1.1/32,192.168.1.2/32"
2021-09-08 18:39:25 +02:00
session['message_status'] = "danger"
config.clear()
2021-09-08 18:39:25 +02:00
return redirect(url_for("settings"))
# Check MTU Format
2021-12-26 11:04:39 +01:00
if not len(request.form['peer_mtu']) > 0 or not request.form['peer_mtu'].isdigit():
session['message'] = "MTU format is incorrect."
session['message_status'] = "danger"
config.clear()
2021-12-26 11:04:39 +01:00
return redirect(url_for("settings"))
2021-09-08 18:39:25 +02:00
# Check keepalive Format
2021-12-26 11:04:39 +01:00
if not len(request.form['peer_keep_alive']) > 0 or not request.form['peer_keep_alive'].isdigit():
session['message'] = "Persistent keepalive format is incorrect."
session['message_status'] = "danger"
config.clear()
2021-12-26 11:04:39 +01:00
return redirect(url_for("settings"))
2021-09-08 18:39:25 +02:00
# Check peer remote endpoint
if not check_remote_endpoint(request.form['peer_remote_endpoint']):
2021-12-26 00:26:39 +01:00
session['message'] = "Peer Remote Endpoint format is incorrect. It can only be a valid " \
"IP address or valid domain (without http:// or https://). "
2021-08-14 23:13:16 +02:00
session['message_status'] = "danger"
config.clear()
2021-08-14 23:13:16 +02:00
return redirect(url_for("settings"))
2021-09-08 18:39:25 +02:00
config.set("Peers", "remote_endpoint", request.form['peer_remote_endpoint'])
config.set("Peers", "peer_keep_alive", request.form['peer_keep_alive'])
config.set("Peers", "peer_mtu", request.form['peer_mtu'])
config.set("Peers", "peer_endpoint_allowed_ip", ','.join(clean_IP_with_range(ip)))
2021-12-26 00:26:39 +01:00
config.set("Peers", "peer_global_DNS", dns_addresses)
2021-08-14 23:13:16 +02:00
try:
set_dashboard_conf(config)
session['message'] = "Peer Default Settings update successfully!"
session['message_status'] = "success"
config.clear()
2021-08-14 23:13:16 +02:00
return redirect(url_for("settings"))
except Exception:
2021-09-08 18:39:25 +02:00
session['message'] = "Peer Default Settings update failed."
2021-08-14 23:13:16 +02:00
session['message_status'] = "danger"
config.clear()
return redirect(url_for("settings"))
2021-12-26 00:26:39 +01:00
2021-09-08 18:39:25 +02:00
# Update dashboard password
2021-05-04 07:32:34 +02:00
@app.route('/update_pwd', methods=['POST'])
def update_pwd():
config = get_dashboard_conf()
2021-05-04 07:32:34 +02:00
if hashlib.sha256(request.form['currentpass'].encode()).hexdigest() == config.get("Account", "password"):
2021-05-14 00:00:40 +02:00
if hashlib.sha256(request.form['newpass'].encode()).hexdigest() == hashlib.sha256(
request.form['repnewpass'].encode()).hexdigest():
2021-05-04 07:32:34 +02:00
config.set("Account", "password", hashlib.sha256(request.form['repnewpass'].encode()).hexdigest())
try:
set_dashboard_conf(config)
session['message'] = "Password update successfully!"
session['message_status'] = "success"
config.clear()
return redirect(url_for("settings"))
2021-05-04 07:32:34 +02:00
except Exception:
session['message'] = "Password update failed"
session['message_status'] = "danger"
config.clear()
return redirect(url_for("settings"))
else:
session['message'] = "Your New Password does not match."
session['message_status'] = "danger"
config.clear()
return redirect(url_for("settings"))
else:
session['message'] = "Your Password does not match."
session['message_status'] = "danger"
config.clear()
return redirect(url_for("settings"))
2021-12-26 00:26:39 +01:00
2021-09-08 18:39:25 +02:00
# Update dashboard IP and port
2021-05-04 07:32:34 +02:00
@app.route('/update_app_ip_port', methods=['POST'])
def update_app_ip_port():
config = get_dashboard_conf()
2021-05-04 07:32:34 +02:00
config.set("Server", "app_ip", request.form['app_ip'])
config.set("Server", "app_port", request.form['app_port'])
set_dashboard_conf(config)
config.clear()
2021-05-04 07:32:34 +02:00
os.system('bash wgd.sh restart')
2021-12-26 00:26:39 +01:00
2021-09-08 18:39:25 +02:00
# Update WireGuard configuration file path
2021-05-05 03:26:40 +02:00
@app.route('/update_wg_conf_path', methods=['POST'])
def update_wg_conf_path():
config = get_dashboard_conf()
2021-05-05 03:26:40 +02:00
config.set("Server", "wg_conf_path", request.form['wg_conf_path'])
set_dashboard_conf(config)
config.clear()
2021-05-05 03:26:40 +02:00
session['message'] = "WireGuard Configuration Path Update Successfully!"
session['message_status'] = "success"
os.system('bash wgd.sh restart')
2021-12-26 00:26:39 +01:00
2021-09-08 18:39:25 +02:00
# Update configuration sorting
2021-08-14 23:13:16 +02:00
@app.route('/update_dashboard_sort', methods=['POST'])
def update_dashbaord_sort():
2021-12-26 00:26:39 +01:00
"""
Configuration Page Related
"""
config = get_dashboard_conf()
2021-08-14 23:13:16 +02:00
data = request.get_json()
sort_tag = ['name', 'status', 'allowed_ip']
if data['sort'] in sort_tag:
config.set("Server", "dashboard_sort", data['sort'])
else:
config.set("Server", "dashboard_sort", 'status')
set_dashboard_conf(config)
config.clear()
2021-08-14 23:13:16 +02:00
return "true"
2021-12-26 00:26:39 +01:00
2021-09-08 18:39:25 +02:00
# Update configuration refresh interval
2021-05-14 00:00:40 +02:00
@app.route('/update_dashboard_refresh_interval', methods=['POST'])
def update_dashboard_refresh_interval():
preset_interval = ["5000", "10000", "30000", "60000"]
if request.form["interval"] in preset_interval:
config = get_dashboard_conf()
config.set("Server", "dashboard_refresh_interval", str(request.form['interval']))
set_dashboard_conf(config)
config.clear()
return "true"
else:
return "false"
2021-05-14 00:00:40 +02:00
2021-12-26 00:26:39 +01:00
2021-09-08 18:39:25 +02:00
# Configuration Page
2020-10-18 07:10:13 +02:00
@app.route('/configuration/<config_name>', methods=['GET'])
2021-12-28 20:53:51 +01:00
def configuration(config_name):
config = get_dashboard_conf()
2021-04-03 02:48:00 +02:00
conf_data = {
"name": config_name,
"status": get_conf_status(config_name),
"checked": ""
}
if conf_data['status'] == "stopped":
2021-05-04 07:32:34 +02:00
conf_data['checked'] = "nope"
2021-04-03 02:48:00 +02:00
else:
conf_data['checked'] = "checked"
2021-07-02 19:23:04 +02:00
config_list = get_conf_list()
if config_name not in [conf['conf'] for conf in config_list]:
return render_template('index.html', conf=get_conf_list())
refresh_interval = int(config.get("Server", "dashboard_refresh_interval"))
dns_address = config.get("Peers", "peer_global_DNS")
allowed_ip = config.get("Peers", "peer_endpoint_allowed_ip")
peer_mtu = config.get("Peers", "peer_MTU")
peer_keep_alive = config.get("Peers", "peer_keep_alive")
config.clear()
2021-08-14 23:13:16 +02:00
return render_template('configuration.html', conf=get_conf_list(), conf_data=conf_data,
dashboard_refresh_interval=refresh_interval,
DNS=dns_address,
endpoint_allowed_ip=allowed_ip,
2021-09-08 18:39:25 +02:00
title=config_name,
mtu=peer_mtu,
keep_alive=peer_keep_alive)
2021-12-26 00:26:39 +01:00
2021-04-03 20:06:21 +02:00
2021-09-08 18:39:25 +02:00
# Get configuration details
2021-04-03 02:48:00 +02:00
@app.route('/get_config/<config_name>', methods=['GET'])
def get_conf(config_name):
2021-08-15 05:30:05 +02:00
config_interface = read_conf_file_interface(config_name)
2021-08-14 23:13:16 +02:00
search = request.args.get('search')
2021-12-28 03:01:02 +01:00
if len(search) == 0:
2021-12-26 00:26:39 +01:00
search = ""
2021-08-14 23:13:16 +02:00
search = urllib.parse.unquote(search)
config = get_dashboard_conf()
2021-08-14 23:13:16 +02:00
sort = config.get("Server", "dashboard_sort")
2021-09-03 23:32:51 +02:00
peer_display_mode = config.get("Peers", "peer_display_mode")
2021-12-30 21:21:25 +01:00
wg_ip = config.get("Peers","remote_endpoint")
2021-12-28 20:53:51 +01:00
if "Address" not in config_interface:
2021-09-08 18:39:25 +02:00
conf_address = "N/A"
else:
conf_address = config_interface['Address']
2020-10-18 07:10:13 +02:00
conf_data = {
2021-08-14 23:13:16 +02:00
"peer_data": get_peers(config_name, search, sort),
2020-10-18 07:10:13 +02:00
"name": config_name,
"status": get_conf_status(config_name),
"total_data_usage": get_conf_total_data(config_name),
"public_key": get_conf_pub_key(config_name),
"listen_port": get_conf_listen_port(config_name),
2020-12-26 06:17:42 +01:00
"running_peer": get_conf_running_peer_number(config_name),
2021-12-28 03:01:02 +01:00
"conf_address": conf_address,
2021-12-30 21:21:25 +01:00
"wg_ip": wg_ip,
2021-12-28 03:01:02 +01:00
"sort_tag": sort,
"dashboard_refresh_interval": int(config.get("Server", "dashboard_refresh_interval")),
"peer_display_mode": peer_display_mode
2020-10-18 07:10:13 +02:00
}
2020-10-18 18:23:38 +02:00
if conf_data['status'] == "stopped":
2021-05-04 07:32:34 +02:00
conf_data['checked'] = "nope"
2020-10-18 18:23:38 +02:00
else:
conf_data['checked'] = "checked"
2021-12-30 21:21:25 +01:00
print(wg_ip)
config.clear()
2021-12-28 03:01:02 +01:00
return jsonify(conf_data)
# return render_template('get_conf.html', conf_data=conf_data, wg_ip=config.get("Peers","remote_endpoint"), sort_tag=sort,
# dashboard_refresh_interval=int(config.get("Server", "dashboard_refresh_interval")), peer_display_mode=peer_display_mode)
2020-10-18 18:23:38 +02:00
2021-09-08 18:39:25 +02:00
# Turn on / off a configuration
2020-10-18 18:23:38 +02:00
@app.route('/switch/<config_name>', methods=['GET'])
def switch(config_name):
2021-05-04 07:32:34 +02:00
if "username" not in session:
print("not loggedin")
return redirect(url_for("signin"))
2020-10-18 18:23:38 +02:00
status = get_conf_status(config_name)
if status == "running":
2021-04-03 20:06:21 +02:00
try:
2021-12-26 00:26:39 +01:00
subprocess.run("wg-quick down " + config_name,
check=True, shell=True, capture_output=True).stdout
except subprocess.CalledProcessError:
2021-04-03 20:06:21 +02:00
return redirect('/')
2020-10-18 18:23:38 +02:00
elif status == "stopped":
2021-04-03 20:06:21 +02:00
try:
2021-12-26 00:26:39 +01:00
subprocess.run("wg-quick up " + config_name,
check=True, shell=True, capture_output=True).stdout
except subprocess.CalledProcessError:
2021-04-03 20:06:21 +02:00
return redirect('/')
2021-05-05 03:26:40 +02:00
return redirect(request.referrer)
2020-10-18 18:23:38 +02:00
2021-09-08 18:39:25 +02:00
# Add peer
2020-10-23 07:31:10 +02:00
@app.route('/add_peer/<config_name>', methods=['POST'])
def add_peer(config_name):
2021-12-28 03:01:02 +01:00
sem.acquire(timeout=1)
2022-01-01 00:57:59 +01:00
db = TinyDB(os.path.join(DB_PATH, config_name + ".json"))
peers = Query()
2020-10-23 07:31:10 +02:00
data = request.get_json()
public_key = data['public_key']
allowed_ips = data['allowed_ips']
2021-08-14 23:13:16 +02:00
endpoint_allowed_ip = data['endpoint_allowed_ip']
2021-12-29 20:56:19 +01:00
dns_addresses = data['DNS']
enable_preshared_key = data["enable_preshared_key"]
2020-10-23 07:31:10 +02:00
keys = get_conf_peer_key(config_name)
2021-12-26 00:26:39 +01:00
if len(public_key) == 0 or len(dns_addresses) == 0 or len(allowed_ips) == 0 or len(endpoint_allowed_ip) == 0:
2021-12-24 03:26:24 +01:00
db.close()
try:
sem.release()
except RuntimeError as e:
print("RuntimeError: cannot release un-acquired lock")
2021-08-15 05:30:05 +02:00
return "Please fill in all required box."
2021-12-28 20:53:51 +01:00
if not isinstance(keys, list):
2021-12-24 03:26:24 +01:00
db.close()
try:
sem.release()
except RuntimeError as e:
print("RuntimeError: cannot release un-acquired lock")
2021-08-14 23:13:16 +02:00
return config_name + " is not running."
2020-10-23 07:31:10 +02:00
if public_key in keys:
2021-12-24 03:26:24 +01:00
db.close()
try:
sem.release()
except RuntimeError as e:
print("RuntimeError: cannot release un-acquired lock")
return "Public key already exist."
if len(db.search(peers.allowed_ip.matches(allowed_ips))) != 0:
2021-12-24 03:26:24 +01:00
db.close()
try:
sem.release()
except RuntimeError as e:
print("RuntimeError: cannot release un-acquired lock")
return "Allowed IP already taken by another peer."
2021-12-26 00:26:39 +01:00
if not check_DNS(dns_addresses):
2021-12-24 03:26:24 +01:00
db.close()
try:
sem.release()
except RuntimeError as e:
print("RuntimeError: cannot release un-acquired lock")
2021-08-14 23:13:16 +02:00
return "DNS formate is incorrect. Example: 1.1.1.1"
2021-09-08 18:39:25 +02:00
if not check_Allowed_IPs(endpoint_allowed_ip):
2021-12-24 03:26:24 +01:00
db.close()
try:
sem.release()
except RuntimeError as e:
print("RuntimeError: cannot release un-acquired lock")
2021-08-14 23:13:16 +02:00
return "Endpoint Allowed IPs format is incorrect."
2021-12-26 11:04:39 +01:00
if len(data['MTU']) == 0 or not data['MTU'].isdigit():
2021-12-29 19:57:11 +01:00
db.close()
try:
sem.release()
except RuntimeError as e:
print("RuntimeError: cannot release un-acquired lock")
return "MTU format is not correct."
2021-12-26 11:04:39 +01:00
if len(data['keep_alive']) == 0 or not data['keep_alive'].isdigit():
2021-12-29 19:57:11 +01:00
db.close()
try:
sem.release()
except RuntimeError as e:
print("RuntimeError: cannot release un-acquired lock")
return "Persistent Keepalive format is not correct."
2021-09-08 18:39:25 +02:00
try:
if enable_preshared_key == True:
key = subprocess.check_output("wg genpsk > tmp_psk.txt", shell=True)
2021-12-29 19:57:11 +01:00
status = subprocess.check_output(f"wg set {config_name} peer {public_key} allowed-ips {allowed_ips} preshared-key tmp_psk.txt",
shell=True, stderr=subprocess.STDOUT)
os.remove("tmp_psk.txt")
elif enable_preshared_key == False:
2021-12-29 19:57:11 +01:00
status = subprocess.check_output(f"wg set {config_name} peer {public_key} allowed-ips {allowed_ips}",
shell=True, stderr=subprocess.STDOUT)
2021-09-08 18:39:25 +02:00
status = subprocess.check_output("wg-quick save " + config_name, shell=True, stderr=subprocess.STDOUT)
2021-12-29 19:57:11 +01:00
2021-09-08 18:39:25 +02:00
get_all_peers_data(config_name)
db.update({"name": data['name'], "private_key": data['private_key'], "DNS": data['DNS'],
"endpoint_allowed_ip": endpoint_allowed_ip},
peers.id == public_key)
db.close()
try:
sem.release()
except RuntimeError as e:
print("RuntimeError: cannot release un-acquired lock")
2021-09-08 18:39:25 +02:00
return "true"
except subprocess.CalledProcessError as exc:
db.close()
try:
sem.release()
except RuntimeError as e:
print("RuntimeError: cannot release un-acquired lock")
2021-09-08 18:39:25 +02:00
return exc.output.strip()
2021-04-03 20:06:21 +02:00
2021-12-26 00:26:39 +01:00
2021-09-08 18:39:25 +02:00
# Remove peer
2020-12-27 05:42:41 +01:00
@app.route('/remove_peer/<config_name>', methods=['POST'])
def remove_peer(config_name):
2021-05-05 03:26:40 +02:00
if get_conf_status(config_name) == "stopped":
2021-05-14 00:00:40 +02:00
return "Your need to turn on " + config_name + " first."
2021-12-28 03:01:02 +01:00
sem.acquire(timeout=1)
2022-01-01 00:57:59 +01:00
db = TinyDB(os.path.join(DB_PATH, config_name + ".json"))
2021-04-03 02:48:00 +02:00
peers = Query()
2020-12-27 05:42:41 +01:00
data = request.get_json()
delete_key = data['peer_id']
keys = get_conf_peer_key(config_name)
2021-12-28 20:53:51 +01:00
if not isinstance(keys, list):
2021-08-14 23:13:16 +02:00
return config_name + " is not running."
2020-12-27 05:42:41 +01:00
if delete_key not in keys:
2021-05-14 00:00:40 +02:00
db.close()
2020-12-27 05:42:41 +01:00
return "This key does not exist"
else:
try:
2021-12-29 19:57:11 +01:00
remove_wg = subprocess.check_output(f"wg set {config_name} peer {delete_key} remove",
shell=True, stderr=subprocess.STDOUT)
save_wg = subprocess.check_output(f"wg-quick save {config_name}",
shell=True, stderr=subprocess.STDOUT)
2021-04-03 02:48:00 +02:00
db.remove(peers.id == delete_key)
2021-05-14 00:00:40 +02:00
db.close()
try:
sem.release()
except RuntimeError as e:
print("RuntimeError: cannot release un-acquired lock")
2020-12-27 05:42:41 +01:00
return "true"
except subprocess.CalledProcessError as exc:
2021-12-24 03:26:24 +01:00
db.close()
try:
sem.release()
except RuntimeError as e:
print("RuntimeError: cannot release un-acquired lock")
2020-12-27 05:42:41 +01:00
return exc.output.strip()
2021-12-26 00:26:39 +01:00
2021-09-08 18:39:25 +02:00
# Save peer settings
@app.route('/save_peer_setting/<config_name>', methods=['POST'])
def save_peer_setting(config_name):
2021-04-03 02:48:00 +02:00
data = request.get_json()
id = data['id']
name = data['name']
private_key = data['private_key']
2021-12-26 00:26:39 +01:00
dns_addresses = data['DNS']
allowed_ip = data['allowed_ip']
2021-08-14 23:13:16 +02:00
endpoint_allowed_ip = data['endpoint_allowed_ip']
preshared_key = data['preshared_key']
2021-12-28 03:01:02 +01:00
sem.acquire(timeout=1)
2022-01-01 00:57:59 +01:00
db = TinyDB(os.path.join(DB_PATH, config_name + ".json"))
2021-04-03 02:48:00 +02:00
peers = Query()
if len(db.search(peers.id == id)) == 1:
2021-12-28 20:53:51 +01:00
check_ip = check_repeat_allowed_ip(id, allowed_ip, config_name)
2021-09-08 18:39:25 +02:00
if not check_IP_with_range(endpoint_allowed_ip):
2021-12-24 03:26:24 +01:00
db.close()
try:
sem.release()
except RuntimeError as e:
print("RuntimeError: cannot release un-acquired lock")
2021-08-16 21:26:15 +02:00
return jsonify({"status": "failed", "msg": "Endpoint Allowed IPs format is incorrect."})
2021-12-26 00:26:39 +01:00
if not check_DNS(dns_addresses):
2021-12-24 03:26:24 +01:00
db.close()
try:
sem.release()
except RuntimeError as e:
print("RuntimeError: cannot release un-acquired lock")
return jsonify({"status": "failed", "msg": "DNS format is incorrect."})
2021-12-26 11:04:39 +01:00
if len(data['MTU']) == 0 or not data['MTU'].isdigit():
db.close()
2021-09-08 18:39:25 +02:00
try:
2021-12-29 19:57:11 +01:00
sem.release()
except RuntimeError as e:
print("RuntimeError: cannot release un-acquired lock")
2021-12-26 11:04:39 +01:00
return jsonify({"status": "failed", "msg": "MTU format is not correct."})
if len(data['keep_alive']) == 0 or not data['keep_alive'].isdigit():
db.close()
2021-09-08 18:39:25 +02:00
try:
2021-12-29 19:57:11 +01:00
sem.release()
except RuntimeError as e:
print("RuntimeError: cannot release un-acquired lock")
2021-12-26 11:04:39 +01:00
return jsonify({"status": "failed", "msg": "Persistent Keepalive format is not correct."})
if private_key != "":
2021-12-28 20:53:51 +01:00
check_key = f_check_key_match(private_key, id, config_name)
if check_key['status'] == "failed":
2021-12-24 03:26:24 +01:00
db.close()
try:
sem.release()
except RuntimeError as e:
print("RuntimeError: cannot release un-acquired lock")
return jsonify(check_key)
if check_ip['status'] == "failed":
2021-12-24 03:26:24 +01:00
db.close()
try:
sem.release()
except RuntimeError as e:
print("RuntimeError: cannot release un-acquired lock")
return jsonify(check_ip)
try:
tmp_psk = open("tmp_edit_psk.txt", "w+")
tmp_psk.write(preshared_key)
tmp_psk.close()
change_psk = subprocess.check_output(f"wg set {config_name} peer {id} preshared-key tmp_edit_psk.txt",
shell=True, stderr=subprocess.STDOUT)
if change_psk.decode("UTF-8") != "":
db.close()
try:
sem.release()
except RuntimeError as e:
print("RuntimeError: cannot release un-acquired lock")
return jsonify({"status": "failed", "msg": change_psk.decode("UTF-8")})
2021-12-24 03:26:24 +01:00
if allowed_ip == "":
allowed_ip = '""'
allowed_ip = allowed_ip.replace(" ", "")
change_ip = subprocess.check_output(f"wg set {config_name} peer {id} allowed-ips {allowed_ip}",
shell=True, stderr=subprocess.STDOUT)
subprocess.check_output(f'wg-quick save {config_name}', shell=True, stderr=subprocess.STDOUT)
if change_ip.decode("UTF-8") != "":
2021-12-24 03:26:24 +01:00
db.close()
try:
sem.release()
except RuntimeError as e:
print("RuntimeError: cannot release un-acquired lock")
2021-08-14 23:13:16 +02:00
return jsonify({"status": "failed", "msg": change_ip.decode("UTF-8")})
2021-08-15 05:30:05 +02:00
db.update(
2021-12-29 19:57:11 +01:00
{
"name": name,
"private_key": private_key,
"DNS": dns_addresses,
"endpoint_allowed_ip": endpoint_allowed_ip,
"mtu": data['MTU'],
"keepalive":data['keep_alive'], "preshared_key": preshared_key
}, peers.id == id)
db.close()
try:
sem.release()
except RuntimeError as e:
print("RuntimeError: cannot release un-acquired lock")
return jsonify({"status": "success", "msg": ""})
except subprocess.CalledProcessError as exc:
2021-12-24 03:26:24 +01:00
db.close()
try:
sem.release()
except RuntimeError as e:
print("RuntimeError: cannot release un-acquired lock")
2021-08-14 23:13:16 +02:00
return jsonify({"status": "failed", "msg": str(exc.output.decode("UTF-8").strip())})
else:
2021-12-24 03:26:24 +01:00
db.close()
try:
sem.release()
except RuntimeError as e:
print("RuntimeError: cannot release un-acquired lock")
2021-08-14 23:13:16 +02:00
return jsonify({"status": "failed", "msg": "This peer does not exist."})
2021-04-03 02:48:00 +02:00
2021-12-26 00:26:39 +01:00
2021-09-08 18:39:25 +02:00
# Get peer settings
@app.route('/get_peer_data/<config_name>', methods=['POST'])
2021-04-03 02:48:00 +02:00
def get_peer_name(config_name):
data = request.get_json()
id = data['id']
2021-12-28 03:01:02 +01:00
sem.acquire(timeout=1)
2022-01-01 00:57:59 +01:00
db = TinyDB(os.path.join(DB_PATH, config_name + ".json"))
2021-04-03 02:48:00 +02:00
peers = Query()
result = db.search(peers.id == id)
2021-05-14 00:00:40 +02:00
db.close()
2021-08-14 23:13:16 +02:00
data = {"name": result[0]['name'], "allowed_ip": result[0]['allowed_ip'], "DNS": result[0]['DNS'],
2021-09-08 18:39:25 +02:00
"private_key": result[0]['private_key'], "endpoint_allowed_ip": result[0]['endpoint_allowed_ip'],
"mtu": result[0]['mtu'], "keep_alive": result[0]['keepalive'], "preshared_key": result[0]["preshared_key"]}
try:
sem.release()
except RuntimeError as e:
print("RuntimeError: cannot release un-acquired lock")
return jsonify(data)
2021-04-03 02:48:00 +02:00
2021-12-26 00:26:39 +01:00
2021-09-08 18:39:25 +02:00
# Generate a private key
@app.route('/generate_peer', methods=['GET'])
def generate_peer():
2021-09-08 18:39:25 +02:00
return jsonify(gen_private_key())
2021-08-14 23:13:16 +02:00
2021-12-26 00:26:39 +01:00
2021-09-08 18:39:25 +02:00
# Generate a public key from a private key
@app.route('/generate_public_key', methods=['POST'])
def generate_public_key():
data = request.get_json()
private_key = data['private_key']
2021-09-08 18:39:25 +02:00
return jsonify(gen_public_key(private_key))
2021-08-14 23:13:16 +02:00
2021-12-26 00:26:39 +01:00
2021-09-08 18:39:25 +02:00
# Check if both key match
@app.route('/check_key_match/<config_name>', methods=['POST'])
def check_key_match(config_name):
data = request.get_json()
private_key = data['private_key']
public_key = data['public_key']
2021-12-28 20:53:51 +01:00
return jsonify(f_check_key_match(private_key, public_key, config_name))
2021-08-14 23:13:16 +02:00
2021-12-24 03:26:24 +01:00
@app.route("/qrcode/<config_name>", methods=['GET'])
def generate_qrcode(config_name):
id = request.args.get('id')
2021-12-28 03:01:02 +01:00
sem.acquire(timeout=1)
2022-01-01 00:57:59 +01:00
db = TinyDB(os.path.join(DB_PATH, config_name + ".json"))
2021-12-24 03:26:24 +01:00
peers = Query()
get_peer = db.search(peers.id == id)
config = get_dashboard_conf()
if len(get_peer) == 1:
peer = get_peer[0]
if peer['private_key'] != "":
public_key = get_conf_pub_key(config_name)
listen_port = get_conf_listen_port(config_name)
endpoint = config.get("Peers", "remote_endpoint") + ":" + listen_port
private_key = peer['private_key']
allowed_ip = peer['allowed_ip']
2021-12-26 00:26:39 +01:00
dns_addresses = peer['DNS']
mtu_value = peer['mtu']
2021-12-24 03:26:24 +01:00
endpoint_allowed_ip = peer['endpoint_allowed_ip']
keepalive = peer['keepalive']
preshared_key = peer["preshared_key"]
2021-12-24 03:26:24 +01:00
conf = {
"public_key": public_key,
"listen_port": listen_port,
"endpoint": endpoint,
"private_key": private_key,
"allowed_ip": allowed_ip,
2021-12-26 00:26:39 +01:00
"DNS": dns_addresses,
"mtu": mtu_value,
2021-12-24 03:26:24 +01:00
"endpoint_allowed_ip": endpoint_allowed_ip,
"keepalive": keepalive,
"preshared_key": preshared_key
2021-12-24 03:26:24 +01:00
}
db.close()
try:
sem.release()
except RuntimeError as e:
print("RuntimeError: cannot release un-acquired lock")
result = "[Interface]\nPrivateKey = "+conf['private_key']+"\nAddress = "+conf['allowed_ip']+"\nMTU = "+conf['mtu']+"\nDNS = "+conf['DNS']\
+"\n\n[Peer]\nPublicKey = "+conf['public_key']+"\nAllowedIPs = "+conf['endpoint_allowed_ip']+"\nPersistentKeepalive = "+conf['keepalive']+"\nEndpoint = "+conf['endpoint']
if preshared_key != "":
result += "\nPresharedKey = "+preshared_key
return render_template("qrcode.html", i=result)
2021-12-24 03:26:24 +01:00
else:
db.close()
try:
sem.release()
except RuntimeError as e:
print("RuntimeError: cannot release un-acquired lock")
2021-12-24 03:26:24 +01:00
return redirect("/configuration/" + config_name)
2021-12-26 00:26:39 +01:00
2021-09-08 18:39:25 +02:00
# Download configuration file
@app.route('/download/<config_name>', methods=['GET'])
def download(config_name):
2021-08-14 23:13:16 +02:00
print(request.headers.get('User-Agent'))
id = request.args.get('id')
2021-12-28 03:01:02 +01:00
sem.acquire(timeout=1)
2022-01-01 00:57:59 +01:00
db = TinyDB(os.path.join(DB_PATH, config_name + ".json"))
peers = Query()
get_peer = db.search(peers.id == id)
2021-09-08 18:39:25 +02:00
config = get_dashboard_conf()
if len(get_peer) == 1:
peer = get_peer[0]
if peer['private_key'] != "":
public_key = get_conf_pub_key(config_name)
listen_port = get_conf_listen_port(config_name)
2021-12-26 00:26:39 +01:00
endpoint = config.get("Peers", "remote_endpoint") + ":" + listen_port
private_key = peer['private_key']
allowed_ip = peer['allowed_ip']
2021-12-26 00:26:39 +01:00
dns_addresses = peer['DNS']
mtu_value = peer['mtu']
2021-08-15 05:43:30 +02:00
endpoint_allowed_ip = peer['endpoint_allowed_ip']
keepalive = peer['keepalive']
2021-08-14 23:13:16 +02:00
filename = peer['name']
preshared_key = peer["preshared_key"]
2021-08-14 23:13:16 +02:00
if len(filename) == 0:
filename = "Untitled_Peers"
else:
filename = peer['name']
# Clean filename
illegal_filename = [".", ",", "/", "?", "<", ">", "\\", ":", "*", '|' '\"', "com1", "com2", "com3",
"com4", "com5", "com6", "com7", "com8", "com9", "lpt1", "lpt2", "lpt3", "lpt4",
"lpt5", "lpt6", "lpt7", "lpt8", "lpt9", "con", "nul", "prn"]
for i in illegal_filename:
filename = filename.replace(i, "")
if len(filename) == 0:
filename = "Untitled_Peer"
filename = "".join(filename.split(' '))
filename = filename + "_" + config_name
psk = ""
if preshared_key != "":
psk = "\nPresharedKey = "+preshared_key
2021-12-24 03:26:24 +01:00
db.close()
try:
sem.release()
except RuntimeError as e:
print("RuntimeError: cannot release un-acquired lock")
2021-12-26 00:26:39 +01:00
result = "[Interface]\nPrivateKey = " + private_key + "\nAddress = " + allowed_ip + "\nDNS = " + \
dns_addresses + "\nMTU = " + mtu_value + "\n\n[Peer]\nPublicKey = " + \
public_key + "\nAllowedIPs = " + endpoint_allowed_ip + "\nEndpoint = " + \
2021-12-29 19:57:11 +01:00
endpoint + "\nPersistentKeepalive = " + keepalive + psk
return app.response_class((yield result), mimetype='text/conf', headers={"Content-Disposition": "attachment;filename=" + filename + ".conf"})
2021-12-28 20:53:51 +01:00
db.close()
return redirect("/configuration/" + config_name)
2021-12-26 00:26:39 +01:00
# Switch peer display mode
2021-09-03 23:32:51 +02:00
@app.route('/switch_display_mode/<mode>', methods=['GET'])
def switch_display_mode(mode):
2021-12-26 00:26:39 +01:00
if mode in ['list', 'grid']:
config = get_dashboard_conf()
2021-09-03 23:32:51 +02:00
config.set("Peers", "peer_display_mode", mode)
set_dashboard_conf(config)
config.clear()
2021-09-03 23:32:51 +02:00
return "true"
2021-12-28 20:53:51 +01:00
return "false"
2021-09-03 23:32:51 +02:00
2021-09-08 18:39:25 +02:00
"""
Dashboard Tools Related
"""
2021-12-26 00:26:39 +01:00
2021-09-08 18:39:25 +02:00
# Get all IP for ping
@app.route('/get_ping_ip', methods=['POST'])
def get_ping_ip():
2021-12-29 20:56:19 +01:00
config = request.form['config']
2021-12-28 03:01:02 +01:00
sem.acquire(timeout=1)
2022-01-01 00:57:59 +01:00
db = TinyDB(os.path.join(DB_PATH, config + ".json"))
2021-09-08 18:39:25 +02:00
html = ""
for i in db.all():
html += '<optgroup label="' + i['name'] + ' - ' + i['id'] + '">'
allowed_ip = str(i['allowed_ip']).split(",")
for k in allowed_ip:
k = k.split("/")
if len(k) == 2:
html += "<option value=" + k[0] + ">" + k[0] + "</option>"
endpoint = str(i['endpoint']).split(":")
if len(endpoint) == 2:
html += "<option value=" + endpoint[0] + ">" + endpoint[0] + "</option>"
html += "</optgroup>"
2021-12-24 03:26:24 +01:00
db.close()
try:
sem.release()
except RuntimeError as e:
print("RuntimeError: cannot release un-acquired lock")
2021-09-08 18:39:25 +02:00
return html
2021-12-26 00:26:39 +01:00
2021-09-08 18:39:25 +02:00
# Ping IP
@app.route('/ping_ip', methods=['POST'])
def ping_ip():
try:
result = ping('' + request.form['ip'] + '', count=int(request.form['count']), privileged=True, source=None)
returnjson = {
"address": result.address,
"is_alive": result.is_alive,
"min_rtt": result.min_rtt,
"avg_rtt": result.avg_rtt,
"max_rtt": result.max_rtt,
"package_sent": result.packets_sent,
"package_received": result.packets_received,
"package_loss": result.packet_loss
}
if returnjson['package_loss'] == 1.0:
returnjson['package_loss'] = returnjson['package_sent']
return jsonify(returnjson)
except Exception:
return "Error"
2021-12-26 00:26:39 +01:00
2021-09-08 18:39:25 +02:00
# Traceroute IP
@app.route('/traceroute_ip', methods=['POST'])
def traceroute_ip():
try:
result = traceroute('' + request.form['ip'] + '', first_hop=1, max_hops=30, count=1, fast=True)
returnjson = []
last_distance = 0
for hop in result:
if last_distance + 1 != hop.distance:
returnjson.append({"hop": "*", "ip": "*", "avg_rtt": "", "min_rtt": "", "max_rtt": ""})
returnjson.append({"hop": hop.distance, "ip": hop.address, "avg_rtt": hop.avg_rtt, "min_rtt": hop.min_rtt,
"max_rtt": hop.max_rtt})
last_distance = hop.distance
return jsonify(returnjson)
except Exception:
return "Error"
2021-12-26 00:26:39 +01:00
2021-09-08 18:39:25 +02:00
"""
Dashboard Initialization
"""
2021-12-26 00:26:39 +01:00
2021-05-04 08:10:06 +02:00
def init_dashboard():
# Set Default INI File
if not os.path.isfile(DASHBOARD_CONF):
conf_file = open(DASHBOARD_CONF, "w+")
config = get_dashboard_conf()
2021-09-08 18:39:25 +02:00
# Defualt dashboard account setting
2021-05-04 08:10:06 +02:00
if "Account" not in config:
config['Account'] = {}
if "username" not in config['Account']:
config['Account']['username'] = 'admin'
if "password" not in config['Account']:
config['Account']['password'] = '8c6976e5b5410415bde908bd4dee15dfb167a9c873fc4bb8a81f6f2ab448a918'
2021-09-08 18:39:25 +02:00
# Defualt dashboard server setting
2021-05-04 08:10:06 +02:00
if "Server" not in config:
config['Server'] = {}
2021-05-05 03:26:40 +02:00
if 'wg_conf_path' not in config['Server']:
config['Server']['wg_conf_path'] = '/etc/wireguard'
2021-12-22 17:36:29 +01:00
# TODO: IPv6 for the app IP might need to configure with Gunicorn...
2021-05-04 08:10:06 +02:00
if 'app_ip' not in config['Server']:
2021-12-22 17:36:29 +01:00
config['Server']['app_ip'] = '0.0.0.0'
2021-05-04 08:10:06 +02:00
if 'app_port' not in config['Server']:
config['Server']['app_port'] = '10086'
if 'auth_req' not in config['Server']:
config['Server']['auth_req'] = 'true'
2021-12-28 20:53:51 +01:00
if 'version' not in config['Server'] or config['Server']['version'] != DASHBOARD_VERSION:
config['Server']['version'] = DASHBOARD_VERSION
2021-05-14 00:00:40 +02:00
if 'dashboard_refresh_interval' not in config['Server']:
2021-09-03 23:32:51 +02:00
config['Server']['dashboard_refresh_interval'] = '60000'
2021-08-14 23:13:16 +02:00
if 'dashboard_sort' not in config['Server']:
config['Server']['dashboard_sort'] = 'status'
# Default dashboard peers setting
2021-08-14 23:13:16 +02:00
if "Peers" not in config:
config['Peers'] = {}
if 'peer_global_DNS' not in config['Peers']:
config['Peers']['peer_global_DNS'] = '1.1.1.1'
if 'peer_endpoint_allowed_ip' not in config['Peers']:
config['Peers']['peer_endpoint_allowed_ip'] = '0.0.0.0/0'
2021-09-03 23:32:51 +02:00
if 'peer_display_mode' not in config['Peers']:
config['Peers']['peer_display_mode'] = 'grid'
2021-09-08 18:39:25 +02:00
if 'remote_endpoint' not in config['Peers']:
config['Peers']['remote_endpoint'] = ifcfg.default_interface()['inet']
if 'peer_MTU' not in config['Peers']:
config['Peers']['peer_MTU'] = "1420"
if 'peer_keep_alive' not in config['Peers']:
config['Peers']['peer_keep_alive'] = "21"
set_dashboard_conf(config)
config.clear()
2021-05-05 03:26:40 +02:00
2021-12-26 00:26:39 +01:00
2021-05-05 03:26:40 +02:00
def check_update():
2021-12-26 00:26:39 +01:00
"""
Dashboard check update
"""
config = get_dashboard_conf()
2021-09-09 18:43:49 +02:00
data = urllib.request.urlopen("https://api.github.com/repos/donaldzou/WGDashboard/releases").read()
2021-05-05 03:26:40 +02:00
output = json.loads(data)
2021-05-14 00:21:10 +02:00
release = []
for i in output:
2021-12-26 00:26:39 +01:00
if not i["prerelease"]:
release.append(i)
2021-12-28 20:53:51 +01:00
if config.get("Server", "version") == release[0]["tag_name"]:
result = "false"
2021-05-05 03:26:40 +02:00
else:
2021-12-28 20:53:51 +01:00
result = "true"
return result
2021-05-05 03:26:40 +02:00
2021-05-04 08:10:06 +02:00
2021-04-03 20:06:21 +02:00
if __name__ == "__main__":
2021-05-04 08:10:06 +02:00
init_dashboard()
2021-12-28 20:53:51 +01:00
UPDATE = check_update()
configuration_settings = get_dashboard_conf()
2021-12-28 20:53:51 +01:00
app_ip = configuration_settings.get("Server", "app_ip")
app_port = int(configuration_settings.get("Server", "app_port"))
2022-01-01 01:20:30 +01:00
WG_CONF_PATH = configuration_settings.get("Server", "wg_conf_path")
2021-12-28 20:53:51 +01:00
configuration_settings.clear()
app.run(host=app_ip, debug=False, port=app_port)