From 159a51cff4a1e6787993b1c4d10839b3623cf638 Mon Sep 17 00:00:00 2001
From: Bernd Storath <32197462+kaaax0815@users.noreply.github.com>
Date: Fri, 7 Mar 2025 14:59:06 +0100
Subject: [PATCH] Feat: Global config override (#1720)
* be able to change dns. implement global override
* link donate to readme
* implement global config for allowed ips
* change translations, fix generation
* improve docs
---
README.md | 2 +-
.../examples/tutorials/auto-updates.md | 6 +-
docs/content/examples/tutorials/docker-run.md | 6 +-
src/app/components/Form/NullArrayField.vue | 68 +++++++++++++++++++
src/app/components/Ui/Footer.vue | 2 +-
src/app/pages/admin/config.vue | 2 +-
src/app/pages/clients/[id].vue | 29 +++++---
src/i18n/locales/en.json | 16 +++--
.../database/migrations/0000_short_skin.sql | 4 +-
.../migrations/meta/0000_snapshot.json | 6 +-
.../migrations/meta/0001_snapshot.json | 8 +--
.../database/migrations/meta/_journal.json | 4 +-
.../database/repositories/client/schema.ts | 6 +-
.../database/repositories/client/service.ts | 2 -
.../database/repositories/client/types.ts | 4 +-
src/server/utils/wgHelper.ts | 4 +-
16 files changed, 124 insertions(+), 45 deletions(-)
create mode 100644 src/app/components/Form/NullArrayField.vue
diff --git a/README.md b/README.md
index 6efed05a..ec6718e7 100644
--- a/README.md
+++ b/README.md
@@ -102,7 +102,7 @@ Now setup a reverse proxy to be able to access the Web UI from the internet.
If you want to access the Web UI over HTTP, change the env var `INSECURE` to `true`. This is not recommended. Only use this for testing
-### 3. Sponsor
+### Donate
Are you enjoying this project? Consider donating.
diff --git a/docs/content/examples/tutorials/auto-updates.md b/docs/content/examples/tutorials/auto-updates.md
index 008c057b..eaabe3b1 100644
--- a/docs/content/examples/tutorials/auto-updates.md
+++ b/docs/content/examples/tutorials/auto-updates.md
@@ -4,13 +4,13 @@ title: Auto Updates
## Docker Compose
-With Docker Compose WireGuard Easy can be updated with a single command:
+With Docker Compose `wg-easy` can be updated with a single command:
Replace `$DIR` with the directory where your `docker-compose.yml` is located.
```shell
cd $DIR
-sudo docker compose -f up -d --pull always
+sudo docker compose up -d --pull always
```
## Docker Run
@@ -27,7 +27,7 @@ And then run the `docker run -d \ ...` command from [Docker Run][docker-run] aga
## Podman
-To update `wg-easy` (and every container that has auto updates enabled), you can run the following commands:
+To update `wg-easy` (and every container that has auto updates enabled), you can run the following command:
```shell
sudo podman auto-update
diff --git a/docs/content/examples/tutorials/docker-run.md b/docs/content/examples/tutorials/docker-run.md
index d0ff6f4a..d6d5be37 100644
--- a/docs/content/examples/tutorials/docker-run.md
+++ b/docs/content/examples/tutorials/docker-run.md
@@ -4,7 +4,7 @@ title: Docker Run
To setup the IPv6 Network, simply run once:
-```bash
+```shell
docker network create \
-d bridge --ipv6 \
-d default \
@@ -14,9 +14,9 @@ To setup the IPv6 Network, simply run once:
-To automatically install & run wg-easy, simply run:
+To automatically install & run ``wg-easy, simply run:
-```bash
+```shell
docker run -d \
--net wg \
-e INSECURE=true \
diff --git a/src/app/components/Form/NullArrayField.vue b/src/app/components/Form/NullArrayField.vue
new file mode 100644
index 00000000..79d137c2
--- /dev/null
+++ b/src/app/components/Form/NullArrayField.vue
@@ -0,0 +1,68 @@
+
+
+
+ {{ emptyText || $t('form.nullNoItems') }}
+
+
+
+
+
+
+
+
+
+
+
+
+
+
diff --git a/src/app/components/Ui/Footer.vue b/src/app/components/Ui/Footer.vue
index bf464dcf..78aef5a3 100644
--- a/src/app/components/Ui/Footer.vue
+++ b/src/app/components/Ui/Footer.vue
@@ -24,7 +24,7 @@
ยท
{{ $t('layout.donate') }}
diff --git a/src/app/pages/admin/config.vue b/src/app/pages/admin/config.vue
index e7217ba7..80d868bb 100644
--- a/src/app/pages/admin/config.vue
+++ b/src/app/pages/admin/config.vue
@@ -27,7 +27,7 @@
{{
- $t('admin.config.dns')
+ $t('general.dns')
}}
diff --git a/src/app/pages/clients/[id].vue b/src/app/pages/clients/[id].vue
index 72060349..21daa9e9 100644
--- a/src/app/pages/clients/[id].vue
+++ b/src/app/pages/clients/[id].vue
@@ -41,21 +41,26 @@
/>
- {{
- $t('general.allowedIps')
- }}
-
+
+ {{ $t('general.allowedIps') }}
+
+
- {{
- $t('client.serverAllowedIps')
- }}
+
+ {{ $t('client.serverAllowedIps') }}
+
-
+
+
+ {{ $t('general.dns') }}
+
+
+ {{ $t('form.sectionAdvanced') }} {
- await navigateTo('/');
+ revert: async (success) => {
+ if (success) {
+ await navigateTo('/');
+ } else {
+ await revert();
+ }
},
}
);
diff --git a/src/i18n/locales/en.json b/src/i18n/locales/en.json
index 3723a09d..e78e6d99 100644
--- a/src/i18n/locales/en.json
+++ b/src/i18n/locales/en.json
@@ -25,6 +25,7 @@
"updatePassword": "Update Password",
"mtu": "MTU",
"allowedIps": "Allowed IPs",
+ "dns": "DNS",
"persistentKeepalive": "Persistent Keepalive",
"logout": "Logout",
"continue": "Continue",
@@ -95,13 +96,14 @@
"noPrivKey": "This client has no known private key. Cannot create Configuration.",
"showQR": "Show QR Code",
"downloadConfig": "Download Configuration",
- "allowedIpsDesc": "Which IPs will be routed through the VPN",
+ "allowedIpsDesc": "Which IPs will be routed through the VPN (overrides global config)",
"serverAllowedIpsDesc": "Which IPs the server will route to the client",
"mtuDesc": "Sets the maximum transmission unit (packet size) for the VPN tunnel",
"persistentKeepaliveDesc": "Sets the interval (in seconds) for keep-alive packets. 0 disables it",
"hooks": "Hooks",
"hooksDescription": "Hooks only work with wg-quick",
- "hooksLeaveEmpty": "Only for wg-quick. Otherwise, leave it empty"
+ "hooksLeaveEmpty": "Only for wg-quick. Otherwise, leave it empty",
+ "dnsDesc": "DNS server clients will use (overrides global config)"
},
"dialog": {
"change": "Change",
@@ -121,6 +123,7 @@
"sectionGeneral": "General",
"sectionAdvanced": "Advanced",
"noItems": "No items",
+ "nullNoItems": "No items. Using global config",
"add": "Add"
},
"admin": {
@@ -139,11 +142,10 @@
"connection": "Connection",
"hostDesc": "Public hostname clients will connect to (invalidates config)",
"portDesc": "Public UDP port clients will connect to (invalidates config)",
- "allowedIpsDesc": "Allowed IPs clients will use (invalidates config)",
- "dns": "DNS",
- "dnsDesc": "DNS server clients will use (invalidates config)",
- "mtuDesc": "MTU clients will use (invalidates config)",
- "persistentKeepaliveDesc": "Interval in seconds to send keepalives to the server. 0 = disabled (invalidates config)"
+ "allowedIpsDesc": "Allowed IPs clients will use (global config)",
+ "dnsDesc": "DNS server clients will use (global config)",
+ "mtuDesc": "MTU clients will use (only for new clients)",
+ "persistentKeepaliveDesc": "Interval in seconds to send keepalives to the server. 0 = disabled (only for new clients)"
},
"interface": {
"cidrSuccess": "Changed CIDR",
diff --git a/src/server/database/migrations/0000_short_skin.sql b/src/server/database/migrations/0000_short_skin.sql
index dfe5cd17..268da7f6 100644
--- a/src/server/database/migrations/0000_short_skin.sql
+++ b/src/server/database/migrations/0000_short_skin.sql
@@ -12,11 +12,11 @@ CREATE TABLE `clients_table` (
`public_key` text NOT NULL,
`pre_shared_key` text NOT NULL,
`expires_at` text,
- `allowed_ips` text NOT NULL,
+ `allowed_ips` text,
`server_allowed_ips` text NOT NULL,
`persistent_keepalive` integer NOT NULL,
`mtu` integer NOT NULL,
- `dns` text NOT NULL,
+ `dns` text,
`enabled` integer NOT NULL,
`created_at` text DEFAULT (CURRENT_TIMESTAMP) NOT NULL,
`updated_at` text DEFAULT (CURRENT_TIMESTAMP) NOT NULL,
diff --git a/src/server/database/migrations/meta/0000_snapshot.json b/src/server/database/migrations/meta/0000_snapshot.json
index 7d3b105e..6da7ebf5 100644
--- a/src/server/database/migrations/meta/0000_snapshot.json
+++ b/src/server/database/migrations/meta/0000_snapshot.json
@@ -1,7 +1,7 @@
{
"version": "6",
"dialect": "sqlite",
- "id": "383501e4-f8de-4413-847f-a9082f6dc398",
+ "id": "8c2af02b-c4bd-4880-a9ad-b38805636208",
"prevId": "00000000-0000-0000-0000-000000000000",
"tables": {
"clients_table": {
@@ -106,7 +106,7 @@
"name": "allowed_ips",
"type": "text",
"primaryKey": false,
- "notNull": true,
+ "notNull": false,
"autoincrement": false
},
"server_allowed_ips": {
@@ -134,7 +134,7 @@
"name": "dns",
"type": "text",
"primaryKey": false,
- "notNull": true,
+ "notNull": false,
"autoincrement": false
},
"enabled": {
diff --git a/src/server/database/migrations/meta/0001_snapshot.json b/src/server/database/migrations/meta/0001_snapshot.json
index 53f320d5..35ea74a2 100644
--- a/src/server/database/migrations/meta/0001_snapshot.json
+++ b/src/server/database/migrations/meta/0001_snapshot.json
@@ -1,6 +1,6 @@
{
- "id": "bf316694-e2ce-4e29-bd66-ce6c0a9d3c90",
- "prevId": "383501e4-f8de-4413-847f-a9082f6dc398",
+ "id": "a61263b1-9af1-4d2e-99e9-80d08127b545",
+ "prevId": "8c2af02b-c4bd-4880-a9ad-b38805636208",
"version": "6",
"dialect": "sqlite",
"tables": {
@@ -106,7 +106,7 @@
"name": "allowed_ips",
"type": "text",
"primaryKey": false,
- "notNull": true,
+ "notNull": false,
"autoincrement": false
},
"server_allowed_ips": {
@@ -134,7 +134,7 @@
"name": "dns",
"type": "text",
"primaryKey": false,
- "notNull": true,
+ "notNull": false,
"autoincrement": false
},
"enabled": {
diff --git a/src/server/database/migrations/meta/_journal.json b/src/server/database/migrations/meta/_journal.json
index e8612099..a1b7501f 100644
--- a/src/server/database/migrations/meta/_journal.json
+++ b/src/server/database/migrations/meta/_journal.json
@@ -5,14 +5,14 @@
{
"idx": 0,
"version": "6",
- "when": 1741335144499,
+ "when": 1741355094140,
"tag": "0000_short_skin",
"breakpoints": true
},
{
"idx": 1,
"version": "6",
- "when": 1741335153054,
+ "when": 1741355098159,
"tag": "0001_classy_the_stranger",
"breakpoints": true
}
diff --git a/src/server/database/repositories/client/schema.ts b/src/server/database/repositories/client/schema.ts
index 08b2c764..8f5f402e 100644
--- a/src/server/database/repositories/client/schema.ts
+++ b/src/server/database/repositories/client/schema.ts
@@ -3,6 +3,8 @@ import { int, sqliteTable, text } from 'drizzle-orm/sqlite-core';
import { oneTimeLink, user } from '../../schema';
+/** null means use value from userConfig */
+
export const client = sqliteTable('clients_table', {
id: int().primaryKey({ autoIncrement: true }),
userId: int('user_id')
@@ -22,13 +24,13 @@ export const client = sqliteTable('clients_table', {
publicKey: text('public_key').notNull(),
preSharedKey: text('pre_shared_key').notNull(),
expiresAt: text('expires_at'),
- allowedIps: text('allowed_ips', { mode: 'json' }).$type().notNull(),
+ allowedIps: text('allowed_ips', { mode: 'json' }).$type(),
serverAllowedIps: text('server_allowed_ips', { mode: 'json' })
.$type()
.notNull(),
persistentKeepalive: int('persistent_keepalive').notNull(),
mtu: int().notNull(),
- dns: text({ mode: 'json' }).$type().notNull(),
+ dns: text({ mode: 'json' }).$type(),
enabled: int({ mode: 'boolean' }).notNull(),
createdAt: text('created_at')
.notNull()
diff --git a/src/server/database/repositories/client/service.ts b/src/server/database/repositories/client/service.ts
index 3cc5a2b9..422378f1 100644
--- a/src/server/database/repositories/client/service.ts
+++ b/src/server/database/repositories/client/service.ts
@@ -115,8 +115,6 @@ export class ClientService {
ipv4Address,
ipv6Address,
mtu: clientConfig.defaultMtu,
- allowedIps: clientConfig.defaultAllowedIps,
- dns: clientConfig.defaultDns,
persistentKeepalive: clientConfig.defaultPersistentKeepalive,
serverAllowedIps: [],
enabled: true,
diff --git a/src/server/database/repositories/client/types.ts b/src/server/database/repositories/client/types.ts
index 06bffc00..f52afabc 100644
--- a/src/server/database/repositories/client/types.ts
+++ b/src/server/database/repositories/client/types.ts
@@ -61,11 +61,11 @@ export const ClientUpdateSchema = schemaForType()(
postUp: HookSchema,
preDown: HookSchema,
postDown: HookSchema,
- allowedIps: AllowedIpsSchema,
+ allowedIps: AllowedIpsSchema.nullable(),
serverAllowedIps: serverAllowedIps,
mtu: MtuSchema,
persistentKeepalive: PersistentKeepaliveSchema,
- dns: DnsSchema,
+ dns: DnsSchema.nullable(),
})
);
diff --git a/src/server/utils/wgHelper.ts b/src/server/utils/wgHelper.ts
index 5fdb8604..170a140f 100644
--- a/src/server/utils/wgHelper.ts
+++ b/src/server/utils/wgHelper.ts
@@ -59,13 +59,13 @@ PostDown = ${iptablesTemplate(hooks.postDown, wgInterface)}`;
return `[Interface]
PrivateKey = ${client.privateKey}
Address = ${client.ipv4Address}/${cidr4Block}, ${client.ipv6Address}/${cidr6Block}
-DNS = ${client.dns.join(', ')}
+DNS = ${(client.dns ?? userConfig.defaultDns).join(', ')}
MTU = ${client.mtu}
${hookLines.length ? `${hookLines.join('\n')}\n` : ''}
[Peer]
PublicKey = ${wgInterface.publicKey}
PresharedKey = ${client.preSharedKey}
-AllowedIPs = ${client.allowedIps.join(', ')}
+AllowedIPs = ${(client.allowedIps ?? userConfig.defaultAllowedIps).join(', ')}
PersistentKeepalive = ${client.persistentKeepalive}
Endpoint = ${userConfig.host}:${userConfig.port}`;
},