From 159a51cff4a1e6787993b1c4d10839b3623cf638 Mon Sep 17 00:00:00 2001 From: Bernd Storath <32197462+kaaax0815@users.noreply.github.com> Date: Fri, 7 Mar 2025 14:59:06 +0100 Subject: [PATCH] Feat: Global config override (#1720) * be able to change dns. implement global override * link donate to readme * implement global config for allowed ips * change translations, fix generation * improve docs --- README.md | 2 +- .../examples/tutorials/auto-updates.md | 6 +- docs/content/examples/tutorials/docker-run.md | 6 +- src/app/components/Form/NullArrayField.vue | 68 +++++++++++++++++++ src/app/components/Ui/Footer.vue | 2 +- src/app/pages/admin/config.vue | 2 +- src/app/pages/clients/[id].vue | 29 +++++--- src/i18n/locales/en.json | 16 +++-- .../database/migrations/0000_short_skin.sql | 4 +- .../migrations/meta/0000_snapshot.json | 6 +- .../migrations/meta/0001_snapshot.json | 8 +-- .../database/migrations/meta/_journal.json | 4 +- .../database/repositories/client/schema.ts | 6 +- .../database/repositories/client/service.ts | 2 - .../database/repositories/client/types.ts | 4 +- src/server/utils/wgHelper.ts | 4 +- 16 files changed, 124 insertions(+), 45 deletions(-) create mode 100644 src/app/components/Form/NullArrayField.vue diff --git a/README.md b/README.md index 6efed05a..ec6718e7 100644 --- a/README.md +++ b/README.md @@ -102,7 +102,7 @@ Now setup a reverse proxy to be able to access the Web UI from the internet. If you want to access the Web UI over HTTP, change the env var `INSECURE` to `true`. This is not recommended. Only use this for testing -### 3. Sponsor +### Donate Are you enjoying this project? Consider donating. diff --git a/docs/content/examples/tutorials/auto-updates.md b/docs/content/examples/tutorials/auto-updates.md index 008c057b..eaabe3b1 100644 --- a/docs/content/examples/tutorials/auto-updates.md +++ b/docs/content/examples/tutorials/auto-updates.md @@ -4,13 +4,13 @@ title: Auto Updates ## Docker Compose -With Docker Compose WireGuard Easy can be updated with a single command: +With Docker Compose `wg-easy` can be updated with a single command: Replace `$DIR` with the directory where your `docker-compose.yml` is located. ```shell cd $DIR -sudo docker compose -f up -d --pull always +sudo docker compose up -d --pull always ``` ## Docker Run @@ -27,7 +27,7 @@ And then run the `docker run -d \ ...` command from [Docker Run][docker-run] aga ## Podman -To update `wg-easy` (and every container that has auto updates enabled), you can run the following commands: +To update `wg-easy` (and every container that has auto updates enabled), you can run the following command: ```shell sudo podman auto-update diff --git a/docs/content/examples/tutorials/docker-run.md b/docs/content/examples/tutorials/docker-run.md index d0ff6f4a..d6d5be37 100644 --- a/docs/content/examples/tutorials/docker-run.md +++ b/docs/content/examples/tutorials/docker-run.md @@ -4,7 +4,7 @@ title: Docker Run To setup the IPv6 Network, simply run once: -```bash +```shell docker network create \ -d bridge --ipv6 \ -d default \ @@ -14,9 +14,9 @@ To setup the IPv6 Network, simply run once: -To automatically install & run wg-easy, simply run: +To automatically install & run ``wg-easy, simply run: -```bash +```shell docker run -d \ --net wg \ -e INSECURE=true \ diff --git a/src/app/components/Form/NullArrayField.vue b/src/app/components/Form/NullArrayField.vue new file mode 100644 index 00000000..79d137c2 --- /dev/null +++ b/src/app/components/Form/NullArrayField.vue @@ -0,0 +1,68 @@ + + + diff --git a/src/app/components/Ui/Footer.vue b/src/app/components/Ui/Footer.vue index bf464dcf..78aef5a3 100644 --- a/src/app/components/Ui/Footer.vue +++ b/src/app/components/Ui/Footer.vue @@ -24,7 +24,7 @@ ยท {{ $t('layout.donate') }} diff --git a/src/app/pages/admin/config.vue b/src/app/pages/admin/config.vue index e7217ba7..80d868bb 100644 --- a/src/app/pages/admin/config.vue +++ b/src/app/pages/admin/config.vue @@ -27,7 +27,7 @@ {{ - $t('admin.config.dns') + $t('general.dns') }} diff --git a/src/app/pages/clients/[id].vue b/src/app/pages/clients/[id].vue index 72060349..21daa9e9 100644 --- a/src/app/pages/clients/[id].vue +++ b/src/app/pages/clients/[id].vue @@ -41,21 +41,26 @@ /> - {{ - $t('general.allowedIps') - }} - + + {{ $t('general.allowedIps') }} + + - {{ - $t('client.serverAllowedIps') - }} + + {{ $t('client.serverAllowedIps') }} + - + + + {{ $t('general.dns') }} + + + {{ $t('form.sectionAdvanced') }} { - await navigateTo('/'); + revert: async (success) => { + if (success) { + await navigateTo('/'); + } else { + await revert(); + } }, } ); diff --git a/src/i18n/locales/en.json b/src/i18n/locales/en.json index 3723a09d..e78e6d99 100644 --- a/src/i18n/locales/en.json +++ b/src/i18n/locales/en.json @@ -25,6 +25,7 @@ "updatePassword": "Update Password", "mtu": "MTU", "allowedIps": "Allowed IPs", + "dns": "DNS", "persistentKeepalive": "Persistent Keepalive", "logout": "Logout", "continue": "Continue", @@ -95,13 +96,14 @@ "noPrivKey": "This client has no known private key. Cannot create Configuration.", "showQR": "Show QR Code", "downloadConfig": "Download Configuration", - "allowedIpsDesc": "Which IPs will be routed through the VPN", + "allowedIpsDesc": "Which IPs will be routed through the VPN (overrides global config)", "serverAllowedIpsDesc": "Which IPs the server will route to the client", "mtuDesc": "Sets the maximum transmission unit (packet size) for the VPN tunnel", "persistentKeepaliveDesc": "Sets the interval (in seconds) for keep-alive packets. 0 disables it", "hooks": "Hooks", "hooksDescription": "Hooks only work with wg-quick", - "hooksLeaveEmpty": "Only for wg-quick. Otherwise, leave it empty" + "hooksLeaveEmpty": "Only for wg-quick. Otherwise, leave it empty", + "dnsDesc": "DNS server clients will use (overrides global config)" }, "dialog": { "change": "Change", @@ -121,6 +123,7 @@ "sectionGeneral": "General", "sectionAdvanced": "Advanced", "noItems": "No items", + "nullNoItems": "No items. Using global config", "add": "Add" }, "admin": { @@ -139,11 +142,10 @@ "connection": "Connection", "hostDesc": "Public hostname clients will connect to (invalidates config)", "portDesc": "Public UDP port clients will connect to (invalidates config)", - "allowedIpsDesc": "Allowed IPs clients will use (invalidates config)", - "dns": "DNS", - "dnsDesc": "DNS server clients will use (invalidates config)", - "mtuDesc": "MTU clients will use (invalidates config)", - "persistentKeepaliveDesc": "Interval in seconds to send keepalives to the server. 0 = disabled (invalidates config)" + "allowedIpsDesc": "Allowed IPs clients will use (global config)", + "dnsDesc": "DNS server clients will use (global config)", + "mtuDesc": "MTU clients will use (only for new clients)", + "persistentKeepaliveDesc": "Interval in seconds to send keepalives to the server. 0 = disabled (only for new clients)" }, "interface": { "cidrSuccess": "Changed CIDR", diff --git a/src/server/database/migrations/0000_short_skin.sql b/src/server/database/migrations/0000_short_skin.sql index dfe5cd17..268da7f6 100644 --- a/src/server/database/migrations/0000_short_skin.sql +++ b/src/server/database/migrations/0000_short_skin.sql @@ -12,11 +12,11 @@ CREATE TABLE `clients_table` ( `public_key` text NOT NULL, `pre_shared_key` text NOT NULL, `expires_at` text, - `allowed_ips` text NOT NULL, + `allowed_ips` text, `server_allowed_ips` text NOT NULL, `persistent_keepalive` integer NOT NULL, `mtu` integer NOT NULL, - `dns` text NOT NULL, + `dns` text, `enabled` integer NOT NULL, `created_at` text DEFAULT (CURRENT_TIMESTAMP) NOT NULL, `updated_at` text DEFAULT (CURRENT_TIMESTAMP) NOT NULL, diff --git a/src/server/database/migrations/meta/0000_snapshot.json b/src/server/database/migrations/meta/0000_snapshot.json index 7d3b105e..6da7ebf5 100644 --- a/src/server/database/migrations/meta/0000_snapshot.json +++ b/src/server/database/migrations/meta/0000_snapshot.json @@ -1,7 +1,7 @@ { "version": "6", "dialect": "sqlite", - "id": "383501e4-f8de-4413-847f-a9082f6dc398", + "id": "8c2af02b-c4bd-4880-a9ad-b38805636208", "prevId": "00000000-0000-0000-0000-000000000000", "tables": { "clients_table": { @@ -106,7 +106,7 @@ "name": "allowed_ips", "type": "text", "primaryKey": false, - "notNull": true, + "notNull": false, "autoincrement": false }, "server_allowed_ips": { @@ -134,7 +134,7 @@ "name": "dns", "type": "text", "primaryKey": false, - "notNull": true, + "notNull": false, "autoincrement": false }, "enabled": { diff --git a/src/server/database/migrations/meta/0001_snapshot.json b/src/server/database/migrations/meta/0001_snapshot.json index 53f320d5..35ea74a2 100644 --- a/src/server/database/migrations/meta/0001_snapshot.json +++ b/src/server/database/migrations/meta/0001_snapshot.json @@ -1,6 +1,6 @@ { - "id": "bf316694-e2ce-4e29-bd66-ce6c0a9d3c90", - "prevId": "383501e4-f8de-4413-847f-a9082f6dc398", + "id": "a61263b1-9af1-4d2e-99e9-80d08127b545", + "prevId": "8c2af02b-c4bd-4880-a9ad-b38805636208", "version": "6", "dialect": "sqlite", "tables": { @@ -106,7 +106,7 @@ "name": "allowed_ips", "type": "text", "primaryKey": false, - "notNull": true, + "notNull": false, "autoincrement": false }, "server_allowed_ips": { @@ -134,7 +134,7 @@ "name": "dns", "type": "text", "primaryKey": false, - "notNull": true, + "notNull": false, "autoincrement": false }, "enabled": { diff --git a/src/server/database/migrations/meta/_journal.json b/src/server/database/migrations/meta/_journal.json index e8612099..a1b7501f 100644 --- a/src/server/database/migrations/meta/_journal.json +++ b/src/server/database/migrations/meta/_journal.json @@ -5,14 +5,14 @@ { "idx": 0, "version": "6", - "when": 1741335144499, + "when": 1741355094140, "tag": "0000_short_skin", "breakpoints": true }, { "idx": 1, "version": "6", - "when": 1741335153054, + "when": 1741355098159, "tag": "0001_classy_the_stranger", "breakpoints": true } diff --git a/src/server/database/repositories/client/schema.ts b/src/server/database/repositories/client/schema.ts index 08b2c764..8f5f402e 100644 --- a/src/server/database/repositories/client/schema.ts +++ b/src/server/database/repositories/client/schema.ts @@ -3,6 +3,8 @@ import { int, sqliteTable, text } from 'drizzle-orm/sqlite-core'; import { oneTimeLink, user } from '../../schema'; +/** null means use value from userConfig */ + export const client = sqliteTable('clients_table', { id: int().primaryKey({ autoIncrement: true }), userId: int('user_id') @@ -22,13 +24,13 @@ export const client = sqliteTable('clients_table', { publicKey: text('public_key').notNull(), preSharedKey: text('pre_shared_key').notNull(), expiresAt: text('expires_at'), - allowedIps: text('allowed_ips', { mode: 'json' }).$type().notNull(), + allowedIps: text('allowed_ips', { mode: 'json' }).$type(), serverAllowedIps: text('server_allowed_ips', { mode: 'json' }) .$type() .notNull(), persistentKeepalive: int('persistent_keepalive').notNull(), mtu: int().notNull(), - dns: text({ mode: 'json' }).$type().notNull(), + dns: text({ mode: 'json' }).$type(), enabled: int({ mode: 'boolean' }).notNull(), createdAt: text('created_at') .notNull() diff --git a/src/server/database/repositories/client/service.ts b/src/server/database/repositories/client/service.ts index 3cc5a2b9..422378f1 100644 --- a/src/server/database/repositories/client/service.ts +++ b/src/server/database/repositories/client/service.ts @@ -115,8 +115,6 @@ export class ClientService { ipv4Address, ipv6Address, mtu: clientConfig.defaultMtu, - allowedIps: clientConfig.defaultAllowedIps, - dns: clientConfig.defaultDns, persistentKeepalive: clientConfig.defaultPersistentKeepalive, serverAllowedIps: [], enabled: true, diff --git a/src/server/database/repositories/client/types.ts b/src/server/database/repositories/client/types.ts index 06bffc00..f52afabc 100644 --- a/src/server/database/repositories/client/types.ts +++ b/src/server/database/repositories/client/types.ts @@ -61,11 +61,11 @@ export const ClientUpdateSchema = schemaForType()( postUp: HookSchema, preDown: HookSchema, postDown: HookSchema, - allowedIps: AllowedIpsSchema, + allowedIps: AllowedIpsSchema.nullable(), serverAllowedIps: serverAllowedIps, mtu: MtuSchema, persistentKeepalive: PersistentKeepaliveSchema, - dns: DnsSchema, + dns: DnsSchema.nullable(), }) ); diff --git a/src/server/utils/wgHelper.ts b/src/server/utils/wgHelper.ts index 5fdb8604..170a140f 100644 --- a/src/server/utils/wgHelper.ts +++ b/src/server/utils/wgHelper.ts @@ -59,13 +59,13 @@ PostDown = ${iptablesTemplate(hooks.postDown, wgInterface)}`; return `[Interface] PrivateKey = ${client.privateKey} Address = ${client.ipv4Address}/${cidr4Block}, ${client.ipv6Address}/${cidr6Block} -DNS = ${client.dns.join(', ')} +DNS = ${(client.dns ?? userConfig.defaultDns).join(', ')} MTU = ${client.mtu} ${hookLines.length ? `${hookLines.join('\n')}\n` : ''} [Peer] PublicKey = ${wgInterface.publicKey} PresharedKey = ${client.preSharedKey} -AllowedIPs = ${client.allowedIps.join(', ')} +AllowedIPs = ${(client.allowedIps ?? userConfig.defaultAllowedIps).join(', ')} PersistentKeepalive = ${client.persistentKeepalive} Endpoint = ${userConfig.host}:${userConfig.port}`; },