@ -23,6 +23,7 @@ const {
WG_POST_UP ,
WG_PRE_DOWN ,
WG_POST_DOWN ,
WG_INTERFACE
} = require ( '../config' ) ;
module . exports = class WireGuard {
@ -59,18 +60,18 @@ module.exports = class WireGuard {
}
await this . __ saveConfig ( config ) ;
await Util . exec ( 'wg-quick down wg0 ' ) . catch ( ( ) => { } ) ;
await Util . exec ( 'wg-quick up wg0 ' ) . catch ( err => {
if ( err && err . message && err . message . includes ( 'Cannot find device "wg0"' ) ) {
throw new Error ( 'WireGuard exited with the error: Cannot find device "wg0" \nThis usually means that your host\'s kernel does not support WireGuard!' ) ;
await Util . exec ( 'wg-quick down ' + WG_INTERFACE ) . catch ( ( ) => { } ) ;
await Util . exec ( 'wg-quick up ' + WG_INTERFACE ) . catch ( err => {
if ( err && err . message && err . message . includes ( 'Cannot find device ' + WG_INTERFACE ) ) {
throw new Error ( 'WireGuard exited with the error: Cannot find device ' + WG_INTERFACE + ' \nThis usually means that your host\'s kernel does not support WireGuard!' ) ;
}
throw err ;
} ) ;
// await Util.exec(`iptables -t nat -A POSTROUTING -s ${WG_DEFAULT_ADDRESS.replace('x', '0')}/24 -o eth0 -j MASQUERADE`);
// await Util.exec('iptables -A INPUT -p udp -m udp --dport 51820 -j ACCEPT');
// await Util.exec('iptables -A FORWARD -i wg0 -j ACCEPT');
// await Util.exec('iptables -A FORWARD -o wg0 -j ACCEPT');
// await Util.exec(`iptables -t nat -A POSTROUTING -s ${WG_DEFAULT_ADDRESS.replace('x', '0')}/24 -o ' + WG_DEVICE + ' -j MASQUERADE`);
// await Util.exec('iptables -A INPUT -p udp -m udp --dport ' + WG_PORT + ' -j ACCEPT');
// await Util.exec('iptables -A FORWARD -i ' + WG_INTERFACE + ' -j ACCEPT');
// await Util.exec('iptables -A FORWARD -o ' + WG_INTERFACE + ' -j ACCEPT');
await this . __ syncConfig ( ) ;
return config ;
@ -95,7 +96,7 @@ module.exports = class WireGuard {
[ Interface ]
PrivateKey = $ { config . server . privateKey }
Address = $ { config . server . address } / 24
ListenPort = 51820
ListenPort = $ { WG_PORT }
PreUp = $ { WG_PRE_UP }
PostUp = $ { WG_POST_UP }
PreDown = $ { WG_PRE_DOWN }
@ -118,7 +119,7 @@ AllowedIPs = ${client.address}/32`;
await fs . writeFile ( path . join ( WG_PATH , 'wg0.json' ) , JSON . stringify ( config , false , 2 ) , {
mode : 0o660 ,
} ) ;
await fs . writeFile ( path . join ( WG_PATH , 'wg0 .conf') , result , {
await fs . writeFile ( path . join ( WG_PATH , WG_INTERFACE + '.conf') , result , {
mode : 0o600 ,
} ) ;
debug ( 'Config saved.' ) ;
@ -126,7 +127,7 @@ AllowedIPs = ${client.address}/32`;
async __ syncConfig ( ) {
debug ( 'Config syncing...' ) ;
await Util . exec ( 'wg syncconf wg0 <(wg-quick strip wg0 )' ) ;
await Util . exec ( 'wg syncconf ' + WG_INTERFACE + ' <(wg-quick strip ' + WG_INTERFACE + ' )' ) ;
debug ( 'Config synced.' ) ;
}
@ -149,7 +150,7 @@ AllowedIPs = ${client.address}/32`;
} ) ) ;
// Loop WireGuard status
const dump = await Util . exec ( 'wg show wg0 dump' , {
const dump = await Util . exec ( 'wg show ' + WG_INTERFACE + ' dump' , {
log : false ,
} ) ;
dump