2024-06-05 09:16:29 +02:00
#!/bin/bash
2024-06-05 20:27:24 +02:00
echo "Starting the WireGuard Dashboard Docker container."
2024-06-05 09:16:29 +02:00
2024-06-05 20:27:24 +02:00
clean_up( ) {
echo "Looking for remains of previous instances..."
if [ -f "/opt/wireguardashboard/app/src/gunicorn.pid" ] ; then
echo "Found old .pid file, removing."
rm /opt/wireguardashboard/app/src/gunicorn.pid
else
echo "No remains found, continuing."
fi
}
2024-06-05 09:16:29 +02:00
start_core( ) {
# Cleaning out previous data such as the .pid file and starting the WireGuard Dashboard. Making sure to use the python venv.
2024-06-05 20:27:24 +02:00
echo "Activating Python venv and executing the WireGuard Dashboard service."
2024-06-05 09:16:29 +02:00
2024-06-06 16:11:49 +02:00
. " ${ WGDASH } " /venv/bin/activate
cd " ${ WGDASH } " /app/src || return # If changing the directory fails (permission or presence error), then bash will exist this function, causing the WireGuard Dashboard to not be succesfully launched.
2024-06-05 20:27:24 +02:00
bash wgd.sh start
2024-06-06 16:11:49 +02:00
# The following section takes care of the firewall rules regarding the 'isolated_peers' feature, which allows or drops packets destined from the wg0 to the wg0 interface.
2024-06-06 00:12:11 +02:00
if [ " ${ isolated_peers ,, } " = = "false" ] ; then
echo "Isolated peers disabled, adjusting."
2024-06-06 16:11:49 +02:00
sed -i '/PostUp = iptables -I FORWARD -i wg0 -o wg0 -j DROP/d' /etc/wireguard/wg0.conf
sed -i '/PreDown = iptables -D FORWARD -i wg0 -o wg0 -j DROP/d' /etc/wireguard/wg0.conf
elif [ " ${ isolated_peers ,, } " = = "true" ] && \
[ " $( grep -c "PostUp = iptables -I FORWARD -i wg0 -o wg0 -j DROP" /etc/wireguard/wg0.conf) " -lt 1 ] && \
[ " $( grep -c "PreDown = iptables -D FORWARD -i wg0 -o wg0 -j DROP" /etc/wireguard/wg0.conf) " -lt 1 ] ; then
2024-06-06 00:12:11 +02:00
echo "Isolated peers enabled, adjusting."
2024-06-06 16:11:49 +02:00
sed -i '/PostUp = iptables -t nat -I POSTROUTING 1 -s/a PostUp = iptables -I FORWARD -i wg0 -o wg0 -j DROP' /etc/wireguard/wg0.conf
sed -i '/PreDown = iptables -t nat -D POSTROUTING 1 -s/a PreDown = iptables -D FORWARD -i wg0 -o wg0 -j DROP' /etc/wireguard/wg0.conf
2024-06-06 00:12:11 +02:00
fi
2024-06-06 16:11:49 +02:00
# The following section takes care of
2024-06-05 20:27:24 +02:00
if [ " ${ enable_wg0 ,, } " = = "true" ] ; then
echo "Preference for wg0 to be turned on found."
2024-06-06 00:12:11 +02:00
2024-06-05 20:27:24 +02:00
wg-quick up wg0
else
echo "Preference for wg0 to be turned off found."
fi
2024-06-05 09:16:29 +02:00
}
set_envvars( ) {
2024-06-05 20:27:24 +02:00
echo "Setting relevant variables for operation."
2024-06-05 09:16:29 +02:00
# If the timezone is different, for example in North-America or Asia.
2024-06-05 20:27:24 +02:00
if [ " ${ tz } " != " $( cat /etc/timezone) " ] ; then
echo "Changing timezone."
2024-06-05 09:16:29 +02:00
2024-06-06 16:11:49 +02:00
ln -sf /usr/share/zoneinfo/" ${ tz } " /etc/localtime
echo " ${ tz } " > /etc/timezone
2024-06-05 09:16:29 +02:00
fi
# Changing the DNS used for clients and the dashboard itself.
2024-06-05 20:27:24 +02:00
if [ " ${ global_dns } " != " $( grep "peer_global_dns = " /opt/wireguardashboard/app/src/wg-dashboard.ini | awk '{print $NF}' ) " ] ; then
echo "Changing default dns."
2024-06-05 09:16:29 +02:00
2024-06-06 16:11:49 +02:00
#sed -i "s/^DNS = .*/DNS = ${global_dns}/" /etc/wireguard/wg0.conf # Uncomment if you want to have DNS on server-level.
2024-06-05 20:27:24 +02:00
sed -i " s/^peer_global_dns = .*/peer_global_dns = ${ global_dns } / " /opt/wireguardashboard/app/src/wg-dashboard.ini
2024-06-05 09:16:29 +02:00
fi
# Setting the public IP of the WireGuard Dashboard container host. If not defined, it will trying fetching it using a curl to ifconfig.me.
2024-06-05 20:27:24 +02:00
if [ " ${ public_ip } " = = "0.0.0.0" ] ; then
default_ip = $( curl -s ifconfig.me)
echo " Trying to fetch the Public-IP using ifconfig.me: ${ default_ip } "
2024-06-05 09:16:29 +02:00
2024-06-05 20:27:24 +02:00
sed -i " s/^remote_endpoint = .*/remote_endpoint = ${ default_ip } / " /opt/wireguardashboard/app/src/wg-dashboard.ini
2024-06-06 16:11:49 +02:00
elif [ " ${ public_ip } " != " $( grep "remote_endpoint = " /opt/wireguardashboard/app/src/wg-dashboard.ini | awk '{print $NF}' ) " ] ; then
2024-06-05 20:27:24 +02:00
echo " Setting the Public-IP using given variable: ${ public_ip } "
2024-06-05 09:16:29 +02:00
2024-06-05 20:27:24 +02:00
sed -i " s/^remote_endpoint = .*/remote_endpoint = ${ public_ip } / " /opt/wireguardashboard/app/src/wg-dashboard.ini
2024-06-05 09:16:29 +02:00
fi
}
ensure_blocking( ) {
2024-06-07 13:25:46 +02:00
sleep 1s
2024-06-05 20:27:24 +02:00
echo "Ensuring container continuation."
2024-06-05 09:16:29 +02:00
# This function checks if the latest error log is created and tails it for docker logs uses.
if find "/opt/wireguardashboard/app/src/log" -mindepth 1 -maxdepth 1 -type f | read -r; then
2024-06-07 13:25:46 +02:00
latestErrLog = $( find /opt/wireguardashboard/app/src/log -name "error_*.log" | head -n 1)
latestAccLog = $( find /opt/wireguardashboard/app/src/log -name "access_*.log" | head -n 1)
tail -f " ${ latestErrLog } " " ${ latestAccLog } "
2024-06-05 09:16:29 +02:00
fi
# Blocking command in case of erroring. So the container does not quit.
sleep infinity
2024-06-05 20:27:24 +02:00
}
# Execute functions for the WireGuard Dashboard services, then set the environment variables
clean_up
start_core
set_envvars
ensure_blocking