1
0
mirror of https://github.com/donaldzou/WGDashboard.git synced 2024-11-22 07:10:09 +01:00
This commit is contained in:
Dselen 2024-10-03 07:45:24 -05:00
parent 2a46c873b8
commit dd38809866
3 changed files with 19 additions and 16 deletions

View File

@ -3,7 +3,6 @@ FROM alpine:latest AS build
LABEL maintainer="dselen@nerthus.nl" LABEL maintainer="dselen@nerthus.nl"
# Declaring environment variables, change Peernet to an address you like, standard is a 24 bit subnet. # Declaring environment variables, change Peernet to an address you like, standard is a 24 bit subnet.
ARG Git_Url="https://github.com/DaanSelen/WGDashboard.git"
ARG wg_net="10.0.0.1" ARG wg_net="10.0.0.1"
ARG wg_port="51820" ARG wg_port="51820"
@ -17,7 +16,7 @@ ENV public_ip="0.0.0.0"
# Doing package management operations, such as upgrading # Doing package management operations, such as upgrading
RUN apk update \ RUN apk update \
&& apk add --no-cache bash git tzdata \ && apk add --no-cache bash git tzdata \
iptables ip6tables curl openrc wireguard-tools \ iptables ip6tables openrc curl wireguard-tools \
sudo py3-psutil py3-bcrypt sudo py3-psutil py3-bcrypt
# Using WGDASH -- like wg_net functionally as a ARG command. But it is needed in entrypoint.sh so it needs to be exported as environment variable. # Using WGDASH -- like wg_net functionally as a ARG command. But it is needed in entrypoint.sh so it needs to be exported as environment variable.
@ -26,8 +25,8 @@ ENV WGDASH=/opt/wireguarddashboard
# Removing the Linux Image package to preserve space on the image, for this reason also deleting apt lists, to be able to install packages: run apt update. # Removing the Linux Image package to preserve space on the image, for this reason also deleting apt lists, to be able to install packages: run apt update.
# Doing WireGuard Dashboard installation measures. Modify the git clone command to get the preferred version, with a specific branch for example. # Doing WireGuard Dashboard installation measures. Modify the git clone command to get the preferred version, with a specific branch for example.
RUN mkdir -p /setup/conf && mkdir /setup/app && mkdir ${WGDASH} \ RUN mkdir -p /setup/conf && mkdir /setup/app && mkdir ${WGDASH}
&& git clone ${Git_Url} /setup/app COPY ./src /setup/app/src
#COPY src /setup/app/src #COPY src /setup/app/src
# Set the volume to be used for WireGuard configuration persistency. # Set the volume to be used for WireGuard configuration persistency.
@ -37,16 +36,19 @@ VOLUME ${WGDASH}
# Generate basic WireGuard interface. Echoing the WireGuard interface config for readability, adjust if you want it for efficiency. # Generate basic WireGuard interface. Echoing the WireGuard interface config for readability, adjust if you want it for efficiency.
# Also setting the pipefail option, verbose: https://github.com/hadolint/hadolint/wiki/DL4006. # Also setting the pipefail option, verbose: https://github.com/hadolint/hadolint/wiki/DL4006.
SHELL ["/bin/bash", "-o", "pipefail", "-c"] SHELL ["/bin/bash", "-o", "pipefail", "-c"]
RUN echo "[Interface]" > /setup/conf/wg0.conf \ RUN out_adapt=$(ip -o -4 route show to default | awk '{print $NF}') \
&& echo "Address = ${wg_net}/24" >> /setup/conf/wg0.conf \ && echo -e "[Interface]\n\
&& echo "PrivateKey =" >> /setup/conf/wg0.conf \ Address = ${wg_net}/24\n\
&& echo "PostUp = iptables -t nat -I POSTROUTING 1 -s ${wg_net}/24 -o $(ip -o -4 route show to default | awk '{print $NF}') -j MASQUERADE" >> /setup/conf/wg0.conf \ PrivateKey =\n\
&& echo "PostUp = iptables -I FORWARD -i wg0 -o wg0 -j DROP" >> /setup/conf/wg0.conf \ PostUp = iptables -t nat -I POSTROUTING 1 -s ${wg_net}/24 -o ${out_adapt} -j MASQUERADE\n\
&& echo "PreDown = iptables -t nat -D POSTROUTING -s ${wg_net}/24 -o $(ip -o -4 route show to default | awk '{print $NF}') -j MASQUERADE" >> /setup/conf/wg0.conf \ PostUp = iptables -I FORWARD -i wg0 -o wg0 -j DROP\n\
&& echo "PreDown = iptables -D FORWARD -i wg0 -o wg0 -j DROP" >> /setup/conf/wg0.conf \ PreDown = iptables -t nat -D POSTROUTING -s ${wg_net}/24 -o ${out_adapt} -j MASQUERADE\n\
&& echo "ListenPort = ${wg_port}" >> /setup/conf/wg0.conf \ PreDown = iptables -D FORWARD -i wg0 -o wg0 -j DROP\n\
&& echo "SaveConfig = true" >> /setup/conf/wg0.conf \ ListenPort = ${wg_port}\n\
&& echo "DNS = ${global_dns}" >> /setup/conf/wg0.conf SaveConfig = true\n\
DNS = ${global_dns}" > /setup/conf/wg0.conf
# Defining a way for Docker to check the health of the container. In this case: checking the login URL. # Defining a way for Docker to check the health of the container. In this case: checking the login URL.
HEALTHCHECK --interval=30s --timeout=10s --start-period=5s --retries=3 \ HEALTHCHECK --interval=30s --timeout=10s --start-period=5s --retries=3 \

View File

@ -1,6 +1,6 @@
services: services:
wireguard-dashboard: wireguard-dashboard:
image: dselen:alpine image: test:latest
restart: unless-stopped restart: unless-stopped
container_name: wgdashboard container_name: wgdashboard
environment: environment:

View File

@ -11,7 +11,8 @@ ensure_installation() {
echo "Detected empty directory, moving over..." echo "Detected empty directory, moving over..."
mv /setup/app/* "${WGDASH}" mv /setup/app/* "${WGDASH}"
mv /setup/app/.* "${WGDASH}" #mv /setup/app/.* "${WGDASH}"
python3 -m venv "${WGDASH}"/src/venv python3 -m venv "${WGDASH}"/src/venv
. "${WGDASH}/src/venv/bin/activate" . "${WGDASH}/src/venv/bin/activate"