mirror of
https://github.com/eduardogsilva/wireguard_webadmin.git
synced 2025-03-18 18:14:02 +00:00
Small deployment fixes
This commit is contained in:
parent
8bd6f1d6bb
commit
91502f6cc5
1
.gitignore
vendored
1
.gitignore
vendored
@ -4,3 +4,4 @@
|
||||
*__pycache__/
|
||||
*.pyo
|
||||
*.pyd
|
||||
wireguard_webadmin/production_settings.py
|
||||
|
@ -1,7 +1,6 @@
|
||||
version: '3'
|
||||
services:
|
||||
wireguard-webadmin:
|
||||
image: ubuntu:latest
|
||||
container_name: wireguard-webadmin
|
||||
build:
|
||||
context: .
|
||||
@ -10,9 +9,12 @@ services:
|
||||
- static_volume:/app_static_files/
|
||||
- .:/app
|
||||
ports:
|
||||
# Do not directly expose the Django port to the internet, use the reverse proxy below instead
|
||||
- "127.0.0.1:8000:8000"
|
||||
# dont go crazy increasing the udp port range. Docker will have a hard time handling with a large range of ports
|
||||
# Actually, you probably will use only one port, but you can add more server instances if you want
|
||||
- "51820-51839:51820-51839/udp"
|
||||
# dont go crazy adding ports. Docker will have a hard time handling with a large range of ports
|
||||
|
||||
cap_add:
|
||||
- NET_ADMIN
|
||||
- SYS_MODULE
|
||||
|
@ -1,4 +1,6 @@
|
||||
asgiref==3.7.2
|
||||
Django==5.0.1
|
||||
pypng==0.20220715.0
|
||||
qrcode==7.4.2
|
||||
sqlparse==0.4.4
|
||||
typing_extensions==4.9.0
|
||||
typing_extensions==4.9.0
|
||||
|
@ -9,8 +9,8 @@ server {
|
||||
ssl_certificate_key /certificate/nginx.key;
|
||||
|
||||
# if you are using cloudflare, you can use this enable authenticated origin pull. Dont forget to activate it in cloudflare
|
||||
ssl_client_certificate /certificate/cloudflare_authenticated_origin_pull_ca.pem;
|
||||
ssl_verify_client on;
|
||||
#ssl_client_certificate /certificate/cloudflare_authenticated_origin_pull_ca.pem;
|
||||
#ssl_verify_client on;
|
||||
|
||||
location /static/ {
|
||||
alias /static/;
|
||||
|
@ -17,28 +17,35 @@ def clean_command_field(command_field):
|
||||
return cleaned_field
|
||||
|
||||
|
||||
|
||||
def generate_peer_config(peer_uuid):
|
||||
peer = get_object_or_404(Peer, uuid=peer_uuid)
|
||||
wg_instance = peer.wireguard_instance
|
||||
|
||||
allowed_ips = PeerAllowedIP.objects.filter(peer=peer).order_by('priority')
|
||||
allowed_ips_line = ", ".join([f"{ip.allowed_ip}/{ip.netmask}" for ip in allowed_ips])
|
||||
priority_zero_ip = PeerAllowedIP.objects.filter(peer=peer, priority=0).first()
|
||||
|
||||
if not priority_zero_ip:
|
||||
return "No IP with priority zero found for this peer."
|
||||
|
||||
client_address = f"{priority_zero_ip.allowed_ip}/{priority_zero_ip.netmask}"
|
||||
|
||||
#allowed_ips = PeerAllowedIP.objects.filter(peer=peer).exclude(uuid=priority_zero_ip.uuid).order_by('priority')
|
||||
#allowed_ips_line = ", ".join([f"{ip.allowed_ip}/{ip.netmask}" for ip in allowed_ips])
|
||||
|
||||
config_lines = [
|
||||
"[Interface]",
|
||||
f"PrivateKey = {peer.private_key}" if peer.private_key else "",
|
||||
f"Address = {wg_instance.address}/{wg_instance.netmask}",
|
||||
f"DNS = 8.8.8.8", # Sorry, it's hardcoded for now, I will fix it later
|
||||
f"Address = {client_address}",
|
||||
f"DNS = 8.8.8.8",
|
||||
"\n[Peer]",
|
||||
f"PublicKey = {wg_instance.public_key}",
|
||||
f"Endpoint = {wg_instance.hostname}:{wg_instance.listen_port}",
|
||||
f"AllowedIPs = {allowed_ips_line}", # Usar os AllowedIPs do banco de dados
|
||||
f"AllowedIPs = 0.0.0.0/0, ::/0",
|
||||
f"PresharedKey = {peer.pre_shared_key}" if peer.pre_shared_key else "",
|
||||
f"PersistentKeepalive = {peer.persistent_keepalive}",
|
||||
]
|
||||
return "\n".join(config_lines)
|
||||
|
||||
|
||||
@login_required
|
||||
def export_wireguard_configs(request):
|
||||
if not UserAcl.objects.filter(user=request.user).filter(user_level__gte=30).exists():
|
||||
@ -57,7 +64,6 @@ def export_wireguard_configs(request):
|
||||
f"ListenPort = {instance.listen_port}",
|
||||
f"PostUp = {post_up_processed}",
|
||||
f"PostDown = {post_down_processed}",
|
||||
f"PersistentKeepalive = {instance.persistent_keepalive}\n",
|
||||
]
|
||||
|
||||
peers = Peer.objects.filter(wireguard_instance=instance)
|
||||
@ -122,22 +128,37 @@ def download_config_or_qrcode(request):
|
||||
def restart_wireguard_interfaces(request):
|
||||
if not UserAcl.objects.filter(user=request.user).filter(user_level__gte=30).exists():
|
||||
return render(request, 'access_denied.html', {'page_title': 'Access Denied'})
|
||||
|
||||
config_dir = "/etc/wireguard"
|
||||
interface_count = 0
|
||||
error_count = 0
|
||||
|
||||
for filename in os.listdir(config_dir):
|
||||
if filename.endswith(".conf"):
|
||||
interface_name = filename[:-5]
|
||||
# Parar a interface
|
||||
stop_command = f"wg-quick down {interface_name}"
|
||||
subprocess.run(stop_command, shell=True, check=True)
|
||||
stop_result = subprocess.run(stop_command, shell=True, capture_output=True, text=True)
|
||||
if stop_result.returncode != 0:
|
||||
messages.warning(request, f"Error stopping {interface_name}|{stop_result.stderr}")
|
||||
error_count += 1
|
||||
start_command = f"wg-quick up {interface_name}"
|
||||
subprocess.run(start_command, shell=True, check=True)
|
||||
interface_count += 1
|
||||
if interface_count == 1:
|
||||
messages.success(request, "Interface restarted|The WireGuard interface has been restarted.")
|
||||
elif interface_count > 1:
|
||||
messages.success(request, "Interfaces restarted|" + str(interface_count) + " WireGuard interfaces have been restarted.")
|
||||
else:
|
||||
messages.warning(request, "No interfaces found|No WireGuard interfaces were found to restart.")
|
||||
start_result = subprocess.run(start_command, shell=True, capture_output=True, text=True)
|
||||
if start_result.returncode != 0:
|
||||
messages.warning(request, f"Error starting {interface_name}|{start_result.stderr}")
|
||||
error_count += 1
|
||||
else:
|
||||
interface_count += 1
|
||||
|
||||
if interface_count > 0 and error_count == 0:
|
||||
if interface_count == 1:
|
||||
messages.success(request, "Interface restarted|The WireGuard interface has been restarted.")
|
||||
else:
|
||||
messages.success(request, f"Interfaces restarted|{interface_count} WireGuard interfaces have been restarted.")
|
||||
elif error_count > 0:
|
||||
messages.warning(request, f"Errors encountered|There were errors restarting some interfaces. See warnings for details.")
|
||||
|
||||
if interface_count == 0 and error_count == 0:
|
||||
messages.info(request, "No interfaces found|No WireGuard interfaces were found to restart.")
|
||||
|
||||
return redirect("/status/")
|
||||
|
||||
|
@ -27,7 +27,6 @@ DEBUG = True
|
||||
|
||||
ALLOWED_HOSTS = []
|
||||
|
||||
|
||||
# Application definition
|
||||
|
||||
INSTALLED_APPS = [
|
||||
@ -127,3 +126,5 @@ STATICFILES_DIRS = [
|
||||
# https://docs.djangoproject.com/en/5.0/ref/settings/#default-auto-field
|
||||
|
||||
DEFAULT_AUTO_FIELD = 'django.db.models.BigAutoField'
|
||||
|
||||
from wireguard_webadmin.production_settings import *
|
Loading…
Reference in New Issue
Block a user