mirror of
https://github.com/donaldzou/WGDashboard.git
synced 2024-11-22 07:10:09 +01:00
Rebase
This commit is contained in:
parent
2a46c873b8
commit
dd38809866
@ -3,7 +3,6 @@ FROM alpine:latest AS build
|
|||||||
LABEL maintainer="dselen@nerthus.nl"
|
LABEL maintainer="dselen@nerthus.nl"
|
||||||
|
|
||||||
# Declaring environment variables, change Peernet to an address you like, standard is a 24 bit subnet.
|
# Declaring environment variables, change Peernet to an address you like, standard is a 24 bit subnet.
|
||||||
ARG Git_Url="https://github.com/DaanSelen/WGDashboard.git"
|
|
||||||
ARG wg_net="10.0.0.1"
|
ARG wg_net="10.0.0.1"
|
||||||
ARG wg_port="51820"
|
ARG wg_port="51820"
|
||||||
|
|
||||||
@ -17,7 +16,7 @@ ENV public_ip="0.0.0.0"
|
|||||||
# Doing package management operations, such as upgrading
|
# Doing package management operations, such as upgrading
|
||||||
RUN apk update \
|
RUN apk update \
|
||||||
&& apk add --no-cache bash git tzdata \
|
&& apk add --no-cache bash git tzdata \
|
||||||
iptables ip6tables curl openrc wireguard-tools \
|
iptables ip6tables openrc curl wireguard-tools \
|
||||||
sudo py3-psutil py3-bcrypt
|
sudo py3-psutil py3-bcrypt
|
||||||
|
|
||||||
# Using WGDASH -- like wg_net functionally as a ARG command. But it is needed in entrypoint.sh so it needs to be exported as environment variable.
|
# Using WGDASH -- like wg_net functionally as a ARG command. But it is needed in entrypoint.sh so it needs to be exported as environment variable.
|
||||||
@ -26,8 +25,8 @@ ENV WGDASH=/opt/wireguarddashboard
|
|||||||
# Removing the Linux Image package to preserve space on the image, for this reason also deleting apt lists, to be able to install packages: run apt update.
|
# Removing the Linux Image package to preserve space on the image, for this reason also deleting apt lists, to be able to install packages: run apt update.
|
||||||
|
|
||||||
# Doing WireGuard Dashboard installation measures. Modify the git clone command to get the preferred version, with a specific branch for example.
|
# Doing WireGuard Dashboard installation measures. Modify the git clone command to get the preferred version, with a specific branch for example.
|
||||||
RUN mkdir -p /setup/conf && mkdir /setup/app && mkdir ${WGDASH} \
|
RUN mkdir -p /setup/conf && mkdir /setup/app && mkdir ${WGDASH}
|
||||||
&& git clone ${Git_Url} /setup/app
|
COPY ./src /setup/app/src
|
||||||
#COPY src /setup/app/src
|
#COPY src /setup/app/src
|
||||||
|
|
||||||
# Set the volume to be used for WireGuard configuration persistency.
|
# Set the volume to be used for WireGuard configuration persistency.
|
||||||
@ -37,16 +36,19 @@ VOLUME ${WGDASH}
|
|||||||
# Generate basic WireGuard interface. Echoing the WireGuard interface config for readability, adjust if you want it for efficiency.
|
# Generate basic WireGuard interface. Echoing the WireGuard interface config for readability, adjust if you want it for efficiency.
|
||||||
# Also setting the pipefail option, verbose: https://github.com/hadolint/hadolint/wiki/DL4006.
|
# Also setting the pipefail option, verbose: https://github.com/hadolint/hadolint/wiki/DL4006.
|
||||||
SHELL ["/bin/bash", "-o", "pipefail", "-c"]
|
SHELL ["/bin/bash", "-o", "pipefail", "-c"]
|
||||||
RUN echo "[Interface]" > /setup/conf/wg0.conf \
|
RUN out_adapt=$(ip -o -4 route show to default | awk '{print $NF}') \
|
||||||
&& echo "Address = ${wg_net}/24" >> /setup/conf/wg0.conf \
|
&& echo -e "[Interface]\n\
|
||||||
&& echo "PrivateKey =" >> /setup/conf/wg0.conf \
|
Address = ${wg_net}/24\n\
|
||||||
&& echo "PostUp = iptables -t nat -I POSTROUTING 1 -s ${wg_net}/24 -o $(ip -o -4 route show to default | awk '{print $NF}') -j MASQUERADE" >> /setup/conf/wg0.conf \
|
PrivateKey =\n\
|
||||||
&& echo "PostUp = iptables -I FORWARD -i wg0 -o wg0 -j DROP" >> /setup/conf/wg0.conf \
|
PostUp = iptables -t nat -I POSTROUTING 1 -s ${wg_net}/24 -o ${out_adapt} -j MASQUERADE\n\
|
||||||
&& echo "PreDown = iptables -t nat -D POSTROUTING -s ${wg_net}/24 -o $(ip -o -4 route show to default | awk '{print $NF}') -j MASQUERADE" >> /setup/conf/wg0.conf \
|
PostUp = iptables -I FORWARD -i wg0 -o wg0 -j DROP\n\
|
||||||
&& echo "PreDown = iptables -D FORWARD -i wg0 -o wg0 -j DROP" >> /setup/conf/wg0.conf \
|
PreDown = iptables -t nat -D POSTROUTING -s ${wg_net}/24 -o ${out_adapt} -j MASQUERADE\n\
|
||||||
&& echo "ListenPort = ${wg_port}" >> /setup/conf/wg0.conf \
|
PreDown = iptables -D FORWARD -i wg0 -o wg0 -j DROP\n\
|
||||||
&& echo "SaveConfig = true" >> /setup/conf/wg0.conf \
|
ListenPort = ${wg_port}\n\
|
||||||
&& echo "DNS = ${global_dns}" >> /setup/conf/wg0.conf
|
SaveConfig = true\n\
|
||||||
|
DNS = ${global_dns}" > /setup/conf/wg0.conf
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
# Defining a way for Docker to check the health of the container. In this case: checking the login URL.
|
# Defining a way for Docker to check the health of the container. In this case: checking the login URL.
|
||||||
HEALTHCHECK --interval=30s --timeout=10s --start-period=5s --retries=3 \
|
HEALTHCHECK --interval=30s --timeout=10s --start-period=5s --retries=3 \
|
@ -1,6 +1,6 @@
|
|||||||
services:
|
services:
|
||||||
wireguard-dashboard:
|
wireguard-dashboard:
|
||||||
image: dselen:alpine
|
image: test:latest
|
||||||
restart: unless-stopped
|
restart: unless-stopped
|
||||||
container_name: wgdashboard
|
container_name: wgdashboard
|
||||||
environment:
|
environment:
|
@ -11,7 +11,8 @@ ensure_installation() {
|
|||||||
echo "Detected empty directory, moving over..."
|
echo "Detected empty directory, moving over..."
|
||||||
|
|
||||||
mv /setup/app/* "${WGDASH}"
|
mv /setup/app/* "${WGDASH}"
|
||||||
mv /setup/app/.* "${WGDASH}"
|
#mv /setup/app/.* "${WGDASH}"
|
||||||
|
|
||||||
python3 -m venv "${WGDASH}"/src/venv
|
python3 -m venv "${WGDASH}"/src/venv
|
||||||
. "${WGDASH}/src/venv/bin/activate"
|
. "${WGDASH}/src/venv/bin/activate"
|
||||||
|
|
Loading…
Reference in New Issue
Block a user