Browse Source

Update README for Podman

pull/35/head
Jordan Potter 2 years ago
parent
commit
07596efd7f
  1. 97
      README.md

97
README.md

@ -1,28 +1,30 @@
# Wireguard
# WireGuard
This is a simple Docker image to run a Wireguard client. It includes a kill switch to ensure that any traffic not encrypted via Wireguard is dropped.
This is a simple image to run a WireGuard client. It includes a kill switch to ensure that any traffic not encrypted via WireGuard is dropped.
Wireguard is implemented as a kernel module, which is key to its performance and simplicity. However, this means that Wireguard _must_ be installed on the host operating system for this container to work properly. Instructions for installing Wireguard can be found [here](http://wireguard.com/install).
WireGuard is implemented as a kernel module, which is key to its performance and simplicity. However, this means that WireGuard _must_ be installed on the host operating system for this container to work properly. Instructions for installing WireGuard can be found [here](http://wireguard.com/install).
You will need a configuration file for your Wireguard interface. Many VPN providers will create this configuration file for you. For example, [here](http://mullvad.net/en/download/wireguard-config) is the configuration generator for Mullvad. Be sure to NOT include a kill switch in the configuration file, since the Docker image already has one.
You will need a configuration file for your WireGuard interface. Many VPN providers will create this configuration file for you. If your VPN provider offers to include a kill switch in the configuration file, be sure to DECLINE, since this container image already has one.
Now simply mount the configuration file and run! For example, if your configuration file is located at `/path/to/conf/mullvad.conf`:
Now simply mount the configuration file and run!
## Docker
```bash
docker run --name wireguard \
--cap-add NET_ADMIN \
--cap-add SYS_MODULE \
--sysctl net.ipv4.conf.all.src_valid_mark=1 \
-v /path/to/conf/mullvad.conf:/etc/wireguard/mullvad.conf \
jordanpotter/wireguard
$ docker run --name wireguard \
--cap-add NET_ADMIN \
--cap-add SYS_MODULE \
--sysctl net.ipv4.conf.all.src_valid_mark=1 \
-v /path/to/your/config.conf:/etc/wireguard/wg0.conf \
jordanpotter/wireguard
```
Afterwards, you can link other containers to this one:
```bash
docker run -it --rm \
--net=container:wireguard \
appropriate/curl http://httpbin.org/ip
$ docker run --rm \
--net=container:wireguard \
curlimages/curl ifconfig.io
```
## Docker Compose
@ -40,51 +42,64 @@ services:
sysctls:
net.ipv4.conf.all.src_valid_mark: 1
volumes:
- /path/to/conf/mullvad.conf:/etc/wireguard/mullvad.conf
- /path/to/your/config.conf:/etc/wireguard/wg0.conf
restart: unless-stopped
curl:
image: appropriate/curl
command: http://httpbin.org/ip
image: curlimages/curl
command: ifconfig.io
network_mode: service:wireguard
depends_on:
- wireguard
```
## Local Network
If you wish to allow traffic to your local network, specify the subnet(s) using the `LOCAL_SUBNETS` environment variable:
## Podman
```bash
docker run --name wireguard \
--cap-add NET_ADMIN \
--cap-add SYS_MODULE \
--sysctl net.ipv4.conf.all.src_valid_mark=1 \
-v /path/to/conf/mullvad.conf:/etc/wireguard/mullvad.conf \
-e LOCAL_SUBNETS=10.1.0.0/16,10.2.0.0/16,10.3.0.0/16 \
jordanpotter/wireguard
$ podman run --name wireguard \
--cap-add NET_ADMIN \
--cap-add NET_RAW \
--sysctl net.ipv4.conf.all.src_valid_mark=1 \
-v /path/to/your/config.conf:/etc/wireguard/wg0.conf \
docker.io/jordanpotter/wireguard
```
Additionally, you can expose ports to allow your local network to access services linked to the Wireguard container:
Afterwards, you can link other containers to this one:
```bash
docker run --name wireguard \
--cap-add NET_ADMIN \
--cap-add SYS_MODULE \
--sysctl net.ipv4.conf.all.src_valid_mark=1 \
-v /path/to/conf/mullvad.conf:/etc/wireguard/mullvad.conf \
-p 8080:80 \
jordanpotter/wireguard
$ podman run --rm \
--net=container:wireguard \
docker.io/curlimages/curl ifconfig.io
```
## Local Network
If you wish to allow traffic to your local network, specify the subnet(s) using the `LOCAL_SUBNETS` environment variable:
```bash
docker run -it --rm \
--net=container:wireguard \
nginx
$ docker run --name wireguard \
--cap-add NET_ADMIN \
--cap-add SYS_MODULE \
--sysctl net.ipv4.conf.all.src_valid_mark=1 \
-v /path/to/your/config.conf:/etc/wireguard/wg0.conf \
-e LOCAL_SUBNETS=10.1.0.0/16,10.2.0.0/16,10.3.0.0/16 \
jordanpotter/wireguard
```
## Versioning
Additionally, you can expose ports to allow your local network to access services linked to the WireGuard container:
Wireguard is new technology and its behavior may change in the future. For this reason, it's recommended to specify an image tag when running this container, such as `jordanpotter/wireguard:2.1.4`.
```bash
$ docker run --name wireguard \
--cap-add NET_ADMIN \
--cap-add SYS_MODULE \
--sysctl net.ipv4.conf.all.src_valid_mark=1 \
-v /path/to/your/config.conf:/etc/wireguard/wg0.conf \
-p 8080:80 \
jordanpotter/wireguard
```
The available tags are listed [here](https://hub.docker.com/r/jordanpotter/wireguard/tags).
```bash
$ docker run --rm \
--net=container:wireguard \
nginx
```

Loading…
Cancel
Save