From 6e08e5a824cf3ebe50deb7ca240d74f9cd6c8e4b Mon Sep 17 00:00:00 2001 From: Comet1903 Date: Sun, 24 Dec 2023 01:19:06 +0100 Subject: [PATCH 1/4] add custom port and interface --- docker-compose.yml | 1 + src/config.js | 7 ++++--- src/lib/WireGuard.js | 25 +++++++++++++------------ 3 files changed, 18 insertions(+), 15 deletions(-) diff --git a/docker-compose.yml b/docker-compose.yml index 489825bc..b87d0962 100644 --- a/docker-compose.yml +++ b/docker-compose.yml @@ -9,6 +9,7 @@ services: # Optional: # - PASSWORD=foobar123 # - WG_PORT=51820 + # - WG_INTERFACE=wg0 # - WG_DEFAULT_ADDRESS=10.8.0.x # - WG_DEFAULT_DNS=1.1.1.1 # - WG_MTU=1420 diff --git a/src/config.js b/src/config.js index 30f9221c..e2b4279c 100644 --- a/src/config.js +++ b/src/config.js @@ -7,6 +7,7 @@ module.exports.PORT = process.env.PORT || 51821; module.exports.PASSWORD = process.env.PASSWORD; module.exports.WG_PATH = process.env.WG_PATH || '/etc/wireguard/'; module.exports.WG_DEVICE = process.env.WG_DEVICE || 'eth0'; +module.exports.WG_INTERFACE = process.env.WG_INTERFACE.toLowerCase() || 'wg0' module.exports.WG_HOST = process.env.WG_HOST; module.exports.WG_PORT = process.env.WG_PORT || 51820; module.exports.WG_MTU = process.env.WG_MTU || null; @@ -20,9 +21,9 @@ module.exports.WG_ALLOWED_IPS = process.env.WG_ALLOWED_IPS || '0.0.0.0/0, ::/0'; module.exports.WG_PRE_UP = process.env.WG_PRE_UP || ''; module.exports.WG_POST_UP = process.env.WG_POST_UP || ` iptables -t nat -A POSTROUTING -s ${module.exports.WG_DEFAULT_ADDRESS.replace('x', '0')}/24 -o ${module.exports.WG_DEVICE} -j MASQUERADE; -iptables -A INPUT -p udp -m udp --dport 51820 -j ACCEPT; -iptables -A FORWARD -i wg0 -j ACCEPT; -iptables -A FORWARD -o wg0 -j ACCEPT; +iptables -A INPUT -p udp -m udp --dport ${module.exports.WG_PORT} -j ACCEPT; +iptables -A FORWARD -i ${module.exports.WG_INTERFACE} -j ACCEPT; +iptables -A FORWARD -o ${module.exports.WG_INTERFACE} -j ACCEPT; `.split('\n').join(' '); module.exports.WG_PRE_DOWN = process.env.WG_PRE_DOWN || ''; diff --git a/src/lib/WireGuard.js b/src/lib/WireGuard.js index 7886ac91..636effa0 100644 --- a/src/lib/WireGuard.js +++ b/src/lib/WireGuard.js @@ -23,6 +23,7 @@ const { WG_POST_UP, WG_PRE_DOWN, WG_POST_DOWN, + WG_INTERFACE } = require('../config'); module.exports = class WireGuard { @@ -59,18 +60,18 @@ module.exports = class WireGuard { } await this.__saveConfig(config); - await Util.exec('wg-quick down wg0').catch(() => { }); - await Util.exec('wg-quick up wg0').catch(err => { - if (err && err.message && err.message.includes('Cannot find device "wg0"')) { - throw new Error('WireGuard exited with the error: Cannot find device "wg0"\nThis usually means that your host\'s kernel does not support WireGuard!'); + await Util.exec('wg-quick down ' + WG_INTERFACE).catch(() => { }); + await Util.exec('wg-quick up ' + WG_INTERFACE).catch(err => { + if (err && err.message && err.message.includes('Cannot find device ' + WG_INTERFACE)) { + throw new Error('WireGuard exited with the error: Cannot find device ' + WG_INTERFACE + '\nThis usually means that your host\'s kernel does not support WireGuard!'); } throw err; }); - // await Util.exec(`iptables -t nat -A POSTROUTING -s ${WG_DEFAULT_ADDRESS.replace('x', '0')}/24 -o eth0 -j MASQUERADE`); - // await Util.exec('iptables -A INPUT -p udp -m udp --dport 51820 -j ACCEPT'); - // await Util.exec('iptables -A FORWARD -i wg0 -j ACCEPT'); - // await Util.exec('iptables -A FORWARD -o wg0 -j ACCEPT'); + // await Util.exec(`iptables -t nat -A POSTROUTING -s ${WG_DEFAULT_ADDRESS.replace('x', '0')}/24 -o ' + WG_DEVICE + ' -j MASQUERADE`); + // await Util.exec('iptables -A INPUT -p udp -m udp --dport ' + WG_PORT + ' -j ACCEPT'); + // await Util.exec('iptables -A FORWARD -i ' + WG_INTERFACE + ' -j ACCEPT'); + // await Util.exec('iptables -A FORWARD -o ' + WG_INTERFACE + ' -j ACCEPT'); await this.__syncConfig(); return config; @@ -95,7 +96,7 @@ module.exports = class WireGuard { [Interface] PrivateKey = ${config.server.privateKey} Address = ${config.server.address}/24 -ListenPort = 51820 +ListenPort = ${WG_PORT} PreUp = ${WG_PRE_UP} PostUp = ${WG_POST_UP} PreDown = ${WG_PRE_DOWN} @@ -118,7 +119,7 @@ AllowedIPs = ${client.address}/32`; await fs.writeFile(path.join(WG_PATH, 'wg0.json'), JSON.stringify(config, false, 2), { mode: 0o660, }); - await fs.writeFile(path.join(WG_PATH, 'wg0.conf'), result, { + await fs.writeFile(path.join(WG_PATH, WG_INTERFACE + '.conf'), result, { mode: 0o600, }); debug('Config saved.'); @@ -126,7 +127,7 @@ AllowedIPs = ${client.address}/32`; async __syncConfig() { debug('Config syncing...'); - await Util.exec('wg syncconf wg0 <(wg-quick strip wg0)'); + await Util.exec('wg syncconf ' + WG_INTERFACE + ' <(wg-quick strip ' + WG_INTERFACE + ')'); debug('Config synced.'); } @@ -149,7 +150,7 @@ AllowedIPs = ${client.address}/32`; })); // Loop WireGuard status - const dump = await Util.exec('wg show wg0 dump', { + const dump = await Util.exec('wg show ' + WG_INTERFACE + ' dump', { log: false, }); dump From 71284317b798293a9113a5179b626998ea51c152 Mon Sep 17 00:00:00 2001 From: Comet1903 Date: Sun, 24 Dec 2023 01:40:11 +0100 Subject: [PATCH 2/4] update readme.md --- README.md | 3 ++- 1 file changed, 2 insertions(+), 1 deletion(-) diff --git a/README.md b/README.md index dc811861..fee1de85 100644 --- a/README.md +++ b/README.md @@ -87,7 +87,8 @@ These options can be configured by setting environment variables using `-e KEY=" | `PASSWORD` | - | `foobar123` | When set, requires a password when logging in to the Web UI. | | `WG_HOST` | - | `vpn.myserver.com` | The public hostname of your VPN server. | | `WG_DEVICE` | `eth0` | `ens6f0` | Ethernet device the wireguard traffic should be forwarded through. | -| `WG_PORT` | `51820` | `12345` | The public UDP port of your VPN server. WireGuard will always listen on `51820` inside the Docker container. | +| `WG_PORT` | `51820` | `12345` | The public UDP port of your VPN server. This will also change the port wireguard will listen to. | +| `WG_INTERFACE` | `wg0` | `wg1` | The interface wireguard will use in the container. (Only needed if `network_mode: host` or `--net=host` is used) | | `WG_MTU` | `null` | `1420` | The MTU the clients will use. Server uses default WG MTU. | | `WG_PERSISTENT_KEEPALIVE` | `0` | `25` | Value in seconds to keep the "connection" open. If this value is 0, then connections won't be kept alive. | | `WG_DEFAULT_ADDRESS` | `10.8.0.x` | `10.6.0.x` | Clients IP address range. | From fe3e3004ad8935b86084305f110ee1042e35a219 Mon Sep 17 00:00:00 2001 From: Philip H <47042125+pheiduck@users.noreply.github.com> Date: Sun, 24 Dec 2023 15:08:05 +0100 Subject: [PATCH 3/4] config.js: fixup lint errors --- src/config.js | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/src/config.js b/src/config.js index 735b3534..378d4b8f 100644 --- a/src/config.js +++ b/src/config.js @@ -8,7 +8,7 @@ module.exports.WEBUI_HOST = process.env.WEBUI_HOST || '0.0.0.0'; module.exports.PASSWORD = process.env.PASSWORD; module.exports.WG_PATH = process.env.WG_PATH || '/etc/wireguard/'; module.exports.WG_DEVICE = process.env.WG_DEVICE || 'eth0'; -module.exports.WG_INTERFACE = process.env.WG_INTERFACE.toLowerCase() || 'wg0' +module.exports.WG_INTERFACE = process.env.WG_INTERFACE.toLowerCase() || 'wg0'; module.exports.WG_HOST = process.env.WG_HOST; module.exports.WG_PORT = process.env.WG_PORT || 51820; module.exports.WG_MTU = process.env.WG_MTU || null; From a73dbcc8e2a858c27dda468cfc7e48c1cf1e9d33 Mon Sep 17 00:00:00 2001 From: Philip H <47042125+pheiduck@users.noreply.github.com> Date: Sun, 24 Dec 2023 15:09:03 +0100 Subject: [PATCH 4/4] WireGuard.js: fixup lint errors --- src/lib/WireGuard.js | 16 ++++++++-------- 1 file changed, 8 insertions(+), 8 deletions(-) diff --git a/src/lib/WireGuard.js b/src/lib/WireGuard.js index 270d866b..fb66f22e 100644 --- a/src/lib/WireGuard.js +++ b/src/lib/WireGuard.js @@ -23,7 +23,7 @@ const { WG_POST_UP, WG_PRE_DOWN, WG_POST_DOWN, - WG_INTERFACE + WG_INTERFACE, } = require('../config'); module.exports = class WireGuard { @@ -60,10 +60,10 @@ module.exports = class WireGuard { } await this.__saveConfig(config); - await Util.exec('wg-quick down ' + WG_INTERFACE).catch(() => { }); - await Util.exec('wg-quick up ' + WG_INTERFACE).catch(err => { - if (err && err.message && err.message.includes('Cannot find device ' + WG_INTERFACE)) { - throw new Error('WireGuard exited with the error: Cannot find device ' + WG_INTERFACE + '\nThis usually means that your host\'s kernel does not support WireGuard!'); + await Util.exec(`wg-quick down ${WG_INTERFACE}`).catch(() => { }); + await Util.exec(`wg-quick up ${WG_INTERFACE}`).catch((err) => { + if (err && err.message && err.message.includes(`Cannot find device ${WG_INTERFACE}`)) { + throw new Error(`WireGuard exited with the error: Cannot find device ${WG_INTERFACE}\nThis usually means that your host's kernel does not support WireGuard!`); } throw err; @@ -119,7 +119,7 @@ AllowedIPs = ${client.address}/32`; await fs.writeFile(path.join(WG_PATH, 'wg0.json'), JSON.stringify(config, false, 2), { mode: 0o660, }); - await fs.writeFile(path.join(WG_PATH, WG_INTERFACE + '.conf'), result, { + await fs.writeFile(path.join(WG_PATH, `${WG_INTERFACE}.conf`), result, { mode: 0o600, }); debug('Config saved.'); @@ -127,7 +127,7 @@ AllowedIPs = ${client.address}/32`; async __syncConfig() { debug('Config syncing...'); - await Util.exec('wg syncconf ' + WG_INTERFACE + ' <(wg-quick strip ' + WG_INTERFACE + ')'); + await Util.exec(`wg syncconf ${WG_INTERFACE} <(wg-quick strip ${WG_INTERFACE})`); debug('Config synced.'); } @@ -150,7 +150,7 @@ AllowedIPs = ${client.address}/32`; })); // Loop WireGuard status - const dump = await Util.exec('wg show ' + WG_INTERFACE + ' dump', { + const dump = await Util.exec(`wg show ${WG_INTERFACE} dump`, { log: false, }); dump