mirror of https://github.com/wg-easy/wg-easy
committed by
GitHub
29 changed files with 1062 additions and 307 deletions
@ -1,2 +1,4 @@ |
|||
# Copyright (c) Emile Nijssen |
|||
# Copyright (c) Emile Nijssen (WeeJeWel) |
|||
# Founder and Codeowner of WireGuard Easy (wg-easy) |
|||
# Maintained by Philip Heiduck (pheiduck) |
|||
* @pheiduck |
|||
|
@ -0,0 +1,28 @@ |
|||
<!--- Provide a general summary of your changes in the Title above --> |
|||
|
|||
## Description |
|||
<!--- Describe your changes in detail --> |
|||
|
|||
## Motivation and Context |
|||
<!--- Why is this change required? What problem does it solve? --> |
|||
<!--- If it fixes an open issue, please link to the issue here. --> |
|||
|
|||
## How has this been tested? |
|||
<!--- Please describe in detail how you tested your changes. --> |
|||
<!--- Include details of your testing environment, tests ran to see how --> |
|||
<!--- your change affects other areas of the code, etc. --> |
|||
|
|||
## Screenshots (if appropriate): |
|||
|
|||
## Types of changes |
|||
<!--- What types of changes does your code introduce? Put an `x` in all the boxes that apply: --> |
|||
- [ ] Bug fix (non-breaking change which fixes an issue) |
|||
- [ ] New feature (non-breaking change which adds functionality) |
|||
- [ ] Breaking change (fix or feature that would cause existing functionality to not work as expected) |
|||
|
|||
## Checklist: |
|||
<!--- Go over all the following points, and put an `x` in all the boxes that apply. --> |
|||
<!--- If you're unsure about any of these, don't hesitate to ask. We're here to help! --> |
|||
- [ ] My code follows the code style of this project. |
|||
- [ ] My change requires a change to the documentation. |
|||
- [ ] I have updated the documentation accordingly. |
@ -0,0 +1,28 @@ |
|||
# wg-password |
|||
|
|||
`wg-password` (wgpw) is a script that generates bcrypt password hashes for use with `wg-easy`, enhancing security by requiring passwords. |
|||
|
|||
## Features |
|||
|
|||
- Generate bcrypt password hashes. |
|||
- Easily integrate with `wg-easy` to enforce password requirements. |
|||
|
|||
## Usage with Docker |
|||
|
|||
To generate a bcrypt password hash using docker, run the following command : |
|||
|
|||
```sh |
|||
docker run ghcr.io/wg-easy/wg-easy wgpw YOUR_PASSWORD |
|||
PASSWORD_HASH='$2b$12$coPqCsPtcFO.Ab99xylBNOW4.Iu7OOA2/ZIboHN6/oyxca3MWo7fW' // literally YOUR_PASSWORD |
|||
``` |
|||
|
|||
*Important* : make sure to enclose your password in single quotes when you run `docker run` command : |
|||
|
|||
```bash |
|||
$ echo $2b$12$coPqCsPtcF |
|||
b2 |
|||
$ echo "$2b$12$coPqCsPtcF" |
|||
b2 |
|||
$ echo '$2b$12$coPqCsPtcF' |
|||
$2b$12$coPqCsPtcF |
|||
``` |
Before Width: | Height: | Size: 105 KiB After Width: | Height: | Size: 104 KiB |
@ -1,9 +1,17 @@ |
|||
services: |
|||
wg-easy: |
|||
image: wg-easy |
|||
build: |
|||
dockerfile: ./Dockerfile |
|||
command: npm run serve |
|||
volumes: |
|||
- ./src/:/app/ |
|||
# - ./data/:/etc/wireguard |
|||
ports: |
|||
- "51820:51820/udp" |
|||
- "51821:51821/tcp" |
|||
cap_add: |
|||
- NET_ADMIN |
|||
- SYS_MODULE |
|||
environment: |
|||
# - PASSWORD=p |
|||
- WG_HOST=192.168.1.233 |
|||
|
@ -1,8 +1,10 @@ |
|||
{ |
|||
"version": "1.0.1", |
|||
"scripts": { |
|||
"sudobuild": "DOCKER_BUILDKIT=1 sudo docker build --tag wg-easy .", |
|||
"build": "DOCKER_BUILDKIT=1 docker build --tag wg-easy .", |
|||
"serve": "docker compose -f docker-compose.yml -f docker-compose.dev.yml up", |
|||
"sudostart": "sudo docker run --env WG_HOST=0.0.0.0 --name wg-easy --cap-add=NET_ADMIN --cap-add=SYS_MODULE --sysctl=\"net.ipv4.conf.all.src_valid_mark=1\" --mount type=bind,source=\"$(pwd)\"/config,target=/etc/wireguard -p 51820:51820/udp -p 51821:51821/tcp wg-easy", |
|||
"start": "docker run --env WG_HOST=0.0.0.0 --name wg-easy --cap-add=NET_ADMIN --cap-add=SYS_MODULE --sysctl=\"net.ipv4.conf.all.src_valid_mark=1\" --mount type=bind,source=\"$(pwd)\"/config,target=/etc/wireguard -p 51820:51820/udp -p 51821:51821/tcp wg-easy" |
|||
} |
|||
} |
|||
} |
File diff suppressed because it is too large
@ -0,0 +1,54 @@ |
|||
'use strict'; |
|||
|
|||
// Import needed libraries
|
|||
import bcrypt from 'bcryptjs'; |
|||
|
|||
// Function to generate hash
|
|||
const generateHash = async (password) => { |
|||
try { |
|||
const salt = await bcrypt.genSalt(12); |
|||
const hash = await bcrypt.hash(password, salt); |
|||
// eslint-disable-next-line no-console
|
|||
console.log(`PASSWORD_HASH='${hash}'`); |
|||
} catch (error) { |
|||
throw new Error(`Failed to generate hash : ${error}`); |
|||
} |
|||
}; |
|||
|
|||
// Function to compare password with hash
|
|||
const comparePassword = async (password, hash) => { |
|||
try { |
|||
const match = await bcrypt.compare(password, hash); |
|||
if (match) { |
|||
// eslint-disable-next-line no-console
|
|||
console.log('Password matches the hash !'); |
|||
} else { |
|||
// eslint-disable-next-line no-console
|
|||
console.log('Password does not match the hash.'); |
|||
} |
|||
} catch (error) { |
|||
throw new Error(`Failed to compare password and hash : ${error}`); |
|||
} |
|||
}; |
|||
|
|||
(async () => { |
|||
try { |
|||
// Retrieve command line arguments
|
|||
const args = process.argv.slice(2); // Ignore the first two arguments
|
|||
if (args.length > 2) { |
|||
throw new Error('Usage : wgpw YOUR_PASSWORD [HASH]'); |
|||
} |
|||
|
|||
const [password, hash] = args; |
|||
if (password && hash) { |
|||
await comparePassword(password, hash); |
|||
} else if (password) { |
|||
await generateHash(password); |
|||
} |
|||
} catch (error) { |
|||
// eslint-disable-next-line no-console
|
|||
console.error(error); |
|||
// eslint-disable-next-line no-process-exit
|
|||
process.exit(1); |
|||
} |
|||
})(); |
@ -0,0 +1,5 @@ |
|||
#!/bin/sh |
|||
# This script is intended to be run only inside a docker container, not on the development host machine |
|||
set -e |
|||
# proxy command |
|||
node /app/wgpw.mjs "$@" |
File diff suppressed because one or more lines are too long
Loading…
Reference in new issue