mirror of https://github.com/wg-easy/wg-easy
committed by
GitHub
29 changed files with 1062 additions and 307 deletions
@ -1,2 +1,4 @@ |
|||||
# Copyright (c) Emile Nijssen |
# Copyright (c) Emile Nijssen (WeeJeWel) |
||||
# Founder and Codeowner of WireGuard Easy (wg-easy) |
# Founder and Codeowner of WireGuard Easy (wg-easy) |
||||
|
# Maintained by Philip Heiduck (pheiduck) |
||||
|
* @pheiduck |
||||
|
@ -0,0 +1,28 @@ |
|||||
|
<!--- Provide a general summary of your changes in the Title above --> |
||||
|
|
||||
|
## Description |
||||
|
<!--- Describe your changes in detail --> |
||||
|
|
||||
|
## Motivation and Context |
||||
|
<!--- Why is this change required? What problem does it solve? --> |
||||
|
<!--- If it fixes an open issue, please link to the issue here. --> |
||||
|
|
||||
|
## How has this been tested? |
||||
|
<!--- Please describe in detail how you tested your changes. --> |
||||
|
<!--- Include details of your testing environment, tests ran to see how --> |
||||
|
<!--- your change affects other areas of the code, etc. --> |
||||
|
|
||||
|
## Screenshots (if appropriate): |
||||
|
|
||||
|
## Types of changes |
||||
|
<!--- What types of changes does your code introduce? Put an `x` in all the boxes that apply: --> |
||||
|
- [ ] Bug fix (non-breaking change which fixes an issue) |
||||
|
- [ ] New feature (non-breaking change which adds functionality) |
||||
|
- [ ] Breaking change (fix or feature that would cause existing functionality to not work as expected) |
||||
|
|
||||
|
## Checklist: |
||||
|
<!--- Go over all the following points, and put an `x` in all the boxes that apply. --> |
||||
|
<!--- If you're unsure about any of these, don't hesitate to ask. We're here to help! --> |
||||
|
- [ ] My code follows the code style of this project. |
||||
|
- [ ] My change requires a change to the documentation. |
||||
|
- [ ] I have updated the documentation accordingly. |
@ -0,0 +1,28 @@ |
|||||
|
# wg-password |
||||
|
|
||||
|
`wg-password` (wgpw) is a script that generates bcrypt password hashes for use with `wg-easy`, enhancing security by requiring passwords. |
||||
|
|
||||
|
## Features |
||||
|
|
||||
|
- Generate bcrypt password hashes. |
||||
|
- Easily integrate with `wg-easy` to enforce password requirements. |
||||
|
|
||||
|
## Usage with Docker |
||||
|
|
||||
|
To generate a bcrypt password hash using docker, run the following command : |
||||
|
|
||||
|
```sh |
||||
|
docker run ghcr.io/wg-easy/wg-easy wgpw YOUR_PASSWORD |
||||
|
PASSWORD_HASH='$2b$12$coPqCsPtcFO.Ab99xylBNOW4.Iu7OOA2/ZIboHN6/oyxca3MWo7fW' // literally YOUR_PASSWORD |
||||
|
``` |
||||
|
|
||||
|
*Important* : make sure to enclose your password in single quotes when you run `docker run` command : |
||||
|
|
||||
|
```bash |
||||
|
$ echo $2b$12$coPqCsPtcF |
||||
|
b2 |
||||
|
$ echo "$2b$12$coPqCsPtcF" |
||||
|
b2 |
||||
|
$ echo '$2b$12$coPqCsPtcF' |
||||
|
$2b$12$coPqCsPtcF |
||||
|
``` |
Before Width: | Height: | Size: 105 KiB After Width: | Height: | Size: 104 KiB |
@ -1,9 +1,17 @@ |
|||||
services: |
services: |
||||
wg-easy: |
wg-easy: |
||||
image: wg-easy |
build: |
||||
|
dockerfile: ./Dockerfile |
||||
command: npm run serve |
command: npm run serve |
||||
volumes: |
volumes: |
||||
- ./src/:/app/ |
- ./src/:/app/ |
||||
|
# - ./data/:/etc/wireguard |
||||
|
ports: |
||||
|
- "51820:51820/udp" |
||||
|
- "51821:51821/tcp" |
||||
|
cap_add: |
||||
|
- NET_ADMIN |
||||
|
- SYS_MODULE |
||||
environment: |
environment: |
||||
# - PASSWORD=p |
# - PASSWORD=p |
||||
- WG_HOST=192.168.1.233 |
- WG_HOST=192.168.1.233 |
||||
|
@ -1,8 +1,10 @@ |
|||||
{ |
{ |
||||
"version": "1.0.1", |
"version": "1.0.1", |
||||
"scripts": { |
"scripts": { |
||||
|
"sudobuild": "DOCKER_BUILDKIT=1 sudo docker build --tag wg-easy .", |
||||
"build": "DOCKER_BUILDKIT=1 docker build --tag wg-easy .", |
"build": "DOCKER_BUILDKIT=1 docker build --tag wg-easy .", |
||||
"serve": "docker compose -f docker-compose.yml -f docker-compose.dev.yml up", |
"serve": "docker compose -f docker-compose.yml -f docker-compose.dev.yml up", |
||||
|
"sudostart": "sudo docker run --env WG_HOST=0.0.0.0 --name wg-easy --cap-add=NET_ADMIN --cap-add=SYS_MODULE --sysctl=\"net.ipv4.conf.all.src_valid_mark=1\" --mount type=bind,source=\"$(pwd)\"/config,target=/etc/wireguard -p 51820:51820/udp -p 51821:51821/tcp wg-easy", |
||||
"start": "docker run --env WG_HOST=0.0.0.0 --name wg-easy --cap-add=NET_ADMIN --cap-add=SYS_MODULE --sysctl=\"net.ipv4.conf.all.src_valid_mark=1\" --mount type=bind,source=\"$(pwd)\"/config,target=/etc/wireguard -p 51820:51820/udp -p 51821:51821/tcp wg-easy" |
"start": "docker run --env WG_HOST=0.0.0.0 --name wg-easy --cap-add=NET_ADMIN --cap-add=SYS_MODULE --sysctl=\"net.ipv4.conf.all.src_valid_mark=1\" --mount type=bind,source=\"$(pwd)\"/config,target=/etc/wireguard -p 51820:51820/udp -p 51821:51821/tcp wg-easy" |
||||
} |
} |
||||
} |
} |
File diff suppressed because it is too large
@ -0,0 +1,54 @@ |
|||||
|
'use strict'; |
||||
|
|
||||
|
// Import needed libraries
|
||||
|
import bcrypt from 'bcryptjs'; |
||||
|
|
||||
|
// Function to generate hash
|
||||
|
const generateHash = async (password) => { |
||||
|
try { |
||||
|
const salt = await bcrypt.genSalt(12); |
||||
|
const hash = await bcrypt.hash(password, salt); |
||||
|
// eslint-disable-next-line no-console
|
||||
|
console.log(`PASSWORD_HASH='${hash}'`); |
||||
|
} catch (error) { |
||||
|
throw new Error(`Failed to generate hash : ${error}`); |
||||
|
} |
||||
|
}; |
||||
|
|
||||
|
// Function to compare password with hash
|
||||
|
const comparePassword = async (password, hash) => { |
||||
|
try { |
||||
|
const match = await bcrypt.compare(password, hash); |
||||
|
if (match) { |
||||
|
// eslint-disable-next-line no-console
|
||||
|
console.log('Password matches the hash !'); |
||||
|
} else { |
||||
|
// eslint-disable-next-line no-console
|
||||
|
console.log('Password does not match the hash.'); |
||||
|
} |
||||
|
} catch (error) { |
||||
|
throw new Error(`Failed to compare password and hash : ${error}`); |
||||
|
} |
||||
|
}; |
||||
|
|
||||
|
(async () => { |
||||
|
try { |
||||
|
// Retrieve command line arguments
|
||||
|
const args = process.argv.slice(2); // Ignore the first two arguments
|
||||
|
if (args.length > 2) { |
||||
|
throw new Error('Usage : wgpw YOUR_PASSWORD [HASH]'); |
||||
|
} |
||||
|
|
||||
|
const [password, hash] = args; |
||||
|
if (password && hash) { |
||||
|
await comparePassword(password, hash); |
||||
|
} else if (password) { |
||||
|
await generateHash(password); |
||||
|
} |
||||
|
} catch (error) { |
||||
|
// eslint-disable-next-line no-console
|
||||
|
console.error(error); |
||||
|
// eslint-disable-next-line no-process-exit
|
||||
|
process.exit(1); |
||||
|
} |
||||
|
})(); |
@ -0,0 +1,5 @@ |
|||||
|
#!/bin/sh |
||||
|
# This script is intended to be run only inside a docker container, not on the development host machine |
||||
|
set -e |
||||
|
# proxy command |
||||
|
node /app/wgpw.mjs "$@" |
File diff suppressed because one or more lines are too long
Loading…
Reference in new issue