1
0
mirror of https://github.com/donaldzou/WGDashboard.git synced 2024-11-06 16:00:28 +01:00
WGDashboard/docker/README.md
Daan 3ac9c23573 Removed the default value: wg0 in isolate and enable.
Removed clean_up() function because persistency is done differently.
Overal tried to make readability better in entrypoint.sh
Fixed bug where local config variable causes issues.
Applied ShellCheck recommendations.
2024-10-24 10:13:33 +02:00

5.9 KiB

WGDashboard Docker Explanation:

Author: DaanSelen

This document delves into how the WGDashboard Docker container has been built.
Of course there are two stages, one before run-time and one at/after run-time.
The Dockerfile describes how the container image is made, and the entrypoint.sh is executed after running the container.
In this example, WireGuard is integrated into the container itself, so it should be a run-and-go/out-of-the-box.
For more details on the source-code specific to this Docker image, refer to the source files, they have lots of comments.

I have tried to embed some new features such as isolate and interface startup on container-start (through enable). I hope you enjoy!

WG-Dashboard Logo

Getting the container running:

To get the container running you either pull the image from the repository, donaldzou/wgdashboard:latest.
From there either use the environment variables describe below as parameters or use the Docker Compose file: compose.yaml.
Be careful, the default generated WireGuard configuration file uses port 51820/udp. So use this port if you want to use it out of the box.
Otherwise edit the configuration file in /etc/wireguard/wg0.conf.

An example of a simple command to get the container running is show below:

docker run -d \
  --name wgdashboard \
  --restart unless-stopped \
  -e enable=wg0 \
  -e isolate=wg0 \
  -p 10086:10086/tcp \
  -p 51820:51820/udp \
  --cap-add NET_ADMIN \
  donaldzou/wgdashboard:latest

If you want to use Compose instead of a raw Docker command, refer to the example in the `compose.yaml` or the one pasted below:

services:
  wgdashboard:
    image: donaldzou/wgdashboard:latest
    restart: unless-stopped
    container_name: wgdashboard
    environment:
      #- tz= 
      #- global_dns=
      #- enable=
      #- isolate=
      #- public_ip=
    ports:
      - 10086:10086/tcp
      - 51820:51820/udp
    volumes:
      - conf:/etc/wireguard
      - data:/data
    cap_add:
      - NET_ADMIN

volumes:
  conf:
  data:

If you want to customize the yaml, make sure the core stays the same, but for example volume PATHs (ON THE HOST) can be freely changed.
This setup is just generic and will use the Docker volumes.

Updating the container:

Updating is right now in Alpha stage. I have got it to work, testing methods.

Working with the container and environment variables:

Once the container is running, the installation process is essentially the same as running it on bare-metal.
So go to the assign TCP port in this case HTTP, like the default 10086 one in the example and log into the WEB-GUI.

Environment variable Accepted arguments Default value Example value Verbose
tz Europe/Amsterdam or any confirming timezone notation. Europe/Amsterdam America/New_York Sets the timezone of the Docker container. This is to timesync the container to any other processes which would need it.
global_dns Any IPv4 address, such as my personal recommendation: 9.9.9.9 (QUAD9). 1.1.1.1 8.8.8.8 or any IP-Address that resolves DNS-names, and of course is reachable Set the default DNS given to clients once they connect to the WireGuard tunnel, and for new peers, set to Cloudflare DNS for reliability.
enable Anything, preferably an existing WireGuard interface name. none wg0,wg2,wg13 Enables or disables the starting of the WireGuard interface on container 'boot-up'.
isolate Anything, preferably an existing WireGuard interface name. none wg1,wg0 The Wireguard interface itself IS able to reach the peers (Done through the iptables package).
public_ip Any IPv4 (public recommended) address, such as the one returned by default Default uses the return of curl ifconfig.me 89.20.83.118 To reach your VPN from outside your own network, you need WG-Dashboard to know what your public IP-address is, otherwise it will generate faulty config files for clients. This happends because it is inside a Docker/Kubernetes container. In or outside of NAT is not relevant as long as the given IP-address is reachable from the internet or the target network.

Be careful with:

When you are going to work with multiple WireGuard interfaces, you need to also open them up to the Docker host. This done by either adding the port mappings like: 51821:51821/udp in the Docker Compose file, or to open a range like: 51820-51830:51820-51830/udp
The latter opens up UDP ports from 51820 to 51830, so all ports in between as well! Be careful, it is good security practise to open only needed ports!

Building the image yourself:

To build the image yourself, you need to do a couple things:

  1. Clone the Github repository containing the source code of WGDashboard including the docker directory. For example do: git clone https://github.com/donaldzou/WGDashboard.git
  2. Navigate into the cloned repository.
  3. (Make sure you have Docker correctly installed, if not: Click here) and run: docker build . -t <Image name>:<Image tag> as an example: docker build . -t dselen/wgdashboard:latest.
    This will make Docker compile the image from the resources in the directory you mention, in this case the source/root one. Let it compile, it takes only a couple seconds with a minute at most.
  4. If all went well, see your image with docker images. Example below:
dselen@dev-mach:~/development/WGDashboard/docker$ docker images
REPOSITORY           TAG       IMAGE ID       CREATED             SIZE
dselen/wgdashboard   latest       c96fd96ee3b3   42 minutes ago      314MB

Closing remarks:

For feedback please submit an issue to the repository. Or message dselen@nerthus.nl.