mirror of
https://github.com/YunoHost-Apps/wireguard_ynh.git
synced 2024-09-03 20:35:58 +02:00
commit
ee491145a6
29 changed files with 210 additions and 310 deletions
33
README.md
33
README.md
|
@ -15,9 +15,9 @@ If you don't have YunoHost, please consult [the guide](https://yunohost.org/#/in
|
|||
|
||||
## Overview
|
||||
|
||||
Virtual Private Networks (VPN) via WireGuard, with a web UI to ease configuration
|
||||
WireGuard® is fast and modern VPN that utilizes state-of-the-art cryptography. It aims to be faster, simpler, leaner, and more useful than IPsec. It intends to be considerably more performant than OpenVPN. WireGuard is designed as a general purpose VPN.
|
||||
|
||||
**Shipped version:** 0.2.7~ynh8
|
||||
**Shipped version:** 0.3.2~ynh1
|
||||
|
||||
|
||||
|
||||
|
@ -31,35 +31,12 @@ Virtual Private Networks (VPN) via WireGuard, with a web UI to ease configuratio
|
|||
* WireGuard for YunoHost will add a DMKS module to your Linux kernel.
|
||||
* You may need to reboot your server for WireGuard to be able to start.
|
||||
* The package includes WireGuard and non-official web UI to configure it.
|
||||
* Avoid altering the configuration files via the command line interface, though.
|
||||
* Do not manually alter the configuration files.
|
||||
* Use YunoHost permissions panel to allow users to access the web UI.
|
||||
* Only one network interface, *wg0*, can be managed with this app at the moment.
|
||||
* `Status` page is not working for the time being.
|
||||
|
||||
### Make your server share its Internet connection
|
||||
|
||||
#### Enable port forwarding
|
||||
|
||||
```bash
|
||||
sudo nano /etc/sysctl.conf
|
||||
# Uncomment the following lines:
|
||||
net.ipv4.ip_forward = 1
|
||||
net.ipv6.conf.all.forwarding = 1
|
||||
# Save and quit (CTRL+O, CTRL+X)
|
||||
sudo sysctl -p
|
||||
```
|
||||
|
||||
Add the following commands in `WireGuard Server` menu, like in [this picture](https://user-images.githubusercontent.com/8769166/124400150-cf354980-dd20-11eb-87c6-9478938d9c82.png). Replace `eth0` with the interface connected to the Internet:
|
||||
|
||||
#### Post Up Script
|
||||
```
|
||||
iptables -A FORWARD -i %i -j ACCEPT; iptables -A FORWARD -o %i -j ACCEPT; iptables -t nat -A POSTROUTING -o eth0 -j MASQUERADE
|
||||
```
|
||||
|
||||
#### Post Down Script
|
||||
```
|
||||
iptables -D FORWARD -i %i -j ACCEPT; iptables -D FORWARD -o %i -j ACCEPT; iptables -t nat -D POSTROUTING -o eth0 -j MASQUERADE
|
||||
```
|
||||
|
||||
After installation, you need to `Apply Config` once in the UI before the VPN service can be started.
|
||||
|
||||
## Documentation and resources
|
||||
|
||||
|
|
33
README_fr.md
33
README_fr.md
|
@ -11,9 +11,9 @@ Si vous n'avez pas YunoHost, regardez [ici](https://yunohost.org/#/install) pour
|
|||
|
||||
## Vue d'ensemble
|
||||
|
||||
Réseaux Privés Virtuels (VPN) via WireGuard, avec une web UI pour faciliter sa configuration
|
||||
WireGuard® is fast and modern VPN that utilizes state-of-the-art cryptography. It aims to be faster, simpler, leaner, and more useful than IPsec. It intends to be considerably more performant than OpenVPN. WireGuard is designed as a general purpose VPN.
|
||||
|
||||
**Version incluse :** 0.2.7~ynh8
|
||||
**Version incluse :** 0.3.2~ynh1
|
||||
|
||||
|
||||
|
||||
|
@ -27,35 +27,12 @@ Réseaux Privés Virtuels (VPN) via WireGuard, avec une web UI pour faciliter sa
|
|||
* Cette application ajoutera un module DMKS à votre noyau Linux.
|
||||
* Vous devriez redémarrer votre serveur pour que WireGuard puisse se lancer.
|
||||
* Cette application inclut WireGuard et une interface web non-officielle pour le configurer.
|
||||
* Évitez de modifier les fichiers de configuration via la ligne de commande.
|
||||
* Ne modifiez pas les fichiers de configuration à la main.
|
||||
* Utiliser le panneau de permissions de YunoHost pour autoriser des utilisateurs à accéder à WireGuard UI.
|
||||
* Une seule interface réseau, *wg0*, peut actuellement être gérée par cette app.
|
||||
* La page `Status` demeure non fonctionnelle pour l'instant.
|
||||
|
||||
### Partagez votre connexion Internet via WireGuard
|
||||
|
||||
#### Activez le *port forwarding*
|
||||
|
||||
```bash
|
||||
sudo nano /etc/sysctl.conf
|
||||
# Décommentez les lignes suivantes :
|
||||
net.ipv4.ip_forward = 1
|
||||
net.ipv6.conf.all.forwarding = 1
|
||||
# Sauvegardez et quittez (CTRL+O, CTRL+X)
|
||||
sudo sysctl -p
|
||||
```
|
||||
|
||||
Ajoutez les commandes suivantes dans le menu `WireGuard Server`, tel que dans [cette image](https://user-images.githubusercontent.com/8769166/124400150-cf354980-dd20-11eb-87c6-9478938d9c82.png). Remplacez `eth0` avec l'interface connectée à Internet :
|
||||
|
||||
#### Post Up Script
|
||||
```
|
||||
iptables -A FORWARD -i %i -j ACCEPT; iptables -A FORWARD -o %i -j ACCEPT; iptables -t nat -A POSTROUTING -o eth0 -j MASQUERADE
|
||||
```
|
||||
|
||||
#### Post Down Script
|
||||
```
|
||||
iptables -D FORWARD -i %i -j ACCEPT; iptables -D FORWARD -o %i -j ACCEPT; iptables -t nat -D POSTROUTING -o eth0 -j MASQUERADE
|
||||
```
|
||||
|
||||
Après installation, vous devrez cliquer sur `Apply Config` une fois dans l'UI avant que le service VPN puisse être démarré.
|
||||
|
||||
## Documentations et ressources
|
||||
|
||||
|
|
|
@ -1,13 +1,8 @@
|
|||
# See here for more information
|
||||
# https://github.com/YunoHost/package_check#syntax-check_process-file
|
||||
|
||||
# Move this file from check_process.default to check_process when you have filled it.
|
||||
|
||||
;; Test complet
|
||||
; Manifest
|
||||
domain="domain.tld" (DOMAIN)
|
||||
path="/" (PATH)
|
||||
admin="john" (USER)
|
||||
domain="domain.tld"
|
||||
path="/"
|
||||
admin="john"
|
||||
; Checks
|
||||
pkg_linter=1
|
||||
setup_sub_dir=0
|
||||
|
@ -19,11 +14,7 @@
|
|||
upgrade=1 from_commit=797a3e5990571629a8525764ce6e8d359277313f
|
||||
backup_restore=1
|
||||
multi_instance=0
|
||||
port_already_use=0
|
||||
change_url=0
|
||||
;;; Levels
|
||||
# If the level 5 (Package linter) is forced to 1. Please add justifications here.
|
||||
Level 5=auto
|
||||
;;; Options
|
||||
Email=
|
||||
Notification=none
|
||||
|
|
|
@ -1,6 +0,0 @@
|
|||
SOURCE_URL=https://github.com/ngoduykhanh/wireguard-ui/releases/download/v0.2.7/wireguard-ui-v0.2.7-linux-386.tar.gz
|
||||
SOURCE_SUM=16EA7A77E5BAC17C1B680ABF9CFF31E3F8313F8E00F9B88F8F6151D8F6A6EE12
|
||||
SOURCE_SUM_PRG=sha256sum
|
||||
SOURCE_FORMAT=tar.gz
|
||||
SOURCE_IN_SUBDIR=false
|
||||
SOURCE_FILENAME=
|
|
@ -1,6 +1,5 @@
|
|||
SOURCE_URL=https://github.com/ngoduykhanh/wireguard-ui/releases/download/v0.2.7/wireguard-ui-v0.2.7-linux-amd64.tar.gz
|
||||
SOURCE_SUM=DC0FF54ABD2E08DB5ED722E07CEDA6E007CD5E6DFABD3A3B5A948CC8275D8100
|
||||
SOURCE_URL=https://github.com/ngoduykhanh/wireguard-ui/releases/download/v0.3.2/wireguard-ui-v0.3.2-linux-amd64.tar.gz
|
||||
SOURCE_SUM=71972b81f2d2ade50484cc1501a5896c8a08cfd82297f81c1d6279d7e0ff1f35
|
||||
SOURCE_SUM_PRG=sha256sum
|
||||
SOURCE_FORMAT=tar.gz
|
||||
SOURCE_IN_SUBDIR=false
|
||||
SOURCE_FILENAME=
|
||||
|
|
|
@ -1,6 +0,0 @@
|
|||
SOURCE_URL=https://github.com/ngoduykhanh/wireguard-ui/releases/download/v0.2.7/wireguard-ui-v0.2.7-linux-arm.tar.gz
|
||||
SOURCE_SUM=07003BF178A81C3D699CB3977028DB728C5E4D44003A7972855C3488F416E467
|
||||
SOURCE_SUM_PRG=sha256sum
|
||||
SOURCE_FORMAT=tar.gz
|
||||
SOURCE_IN_SUBDIR=false
|
||||
SOURCE_FILENAME=
|
|
@ -1,6 +1,5 @@
|
|||
SOURCE_URL=https://github.com/ngoduykhanh/wireguard-ui/releases/download/v0.2.7/wireguard-ui-v0.2.7-linux-arm64.tar.gz
|
||||
SOURCE_SUM=32331E591B0C3B9E4EC360B53B967A3CCEEEFE5B7FFEC3ADD61A9483B50B9F0D
|
||||
SOURCE_URL=https://github.com/ngoduykhanh/wireguard-ui/releases/download/v0.3.2/wireguard-ui-v0.3.2-linux-arm64.tar.gz
|
||||
SOURCE_SUM=8d31fc39495f8a6480531859f225f0fee36788515532d75d9cfaaa866000f52f
|
||||
SOURCE_SUM_PRG=sha256sum
|
||||
SOURCE_FORMAT=tar.gz
|
||||
SOURCE_IN_SUBDIR=false
|
||||
SOURCE_FILENAME=
|
||||
|
|
5
conf/armhf.src
Normal file
5
conf/armhf.src
Normal file
|
@ -0,0 +1,5 @@
|
|||
SOURCE_URL=https://github.com/ngoduykhanh/wireguard-ui/releases/download/v0.3.2/wireguard-ui-v0.3.2-linux-arm.tar.gz
|
||||
SOURCE_SUM=4632fd96c7574321031907695fbbe6535884a8006b517c7f7d3ab289fb94be5f
|
||||
SOURCE_SUM_PRG=sha256sum
|
||||
SOURCE_FORMAT=tar.gz
|
||||
SOURCE_IN_SUBDIR=false
|
5
conf/i386.src
Normal file
5
conf/i386.src
Normal file
|
@ -0,0 +1,5 @@
|
|||
SOURCE_URL=https://github.com/ngoduykhanh/wireguard-ui/releases/download/v0.3.2/wireguard-ui-v0.3.2-linux-386.tar.gz
|
||||
SOURCE_SUM=f76fc030d54e735977236d1984a906e749abb038208f410b406a2972498e3b9e
|
||||
SOURCE_SUM_PRG=sha256sum
|
||||
SOURCE_FORMAT=tar.gz
|
||||
SOURCE_IN_SUBDIR=false
|
|
@ -1,8 +1,9 @@
|
|||
{
|
||||
"addresses": [
|
||||
"10.10.10.0/24"
|
||||
"10.10.10.0/24",
|
||||
"fd42::/112"
|
||||
],
|
||||
"listen_port": "__PORT_WG__",
|
||||
"post_up": "",
|
||||
"post_down": ""
|
||||
"post_up": "iptables -A FORWARD -i %i -j ACCEPT; iptables -A FORWARD -o %i -j ACCEPT; iptables -t nat -A POSTROUTING -o __INTERFACE__ -j MASQUERADE; ip6tables -A FORWARD -i %i -j ACCEPT; ip6tables -A FORWARD -o %i -j ACCEPT; ip6tables -t nat -A POSTROUTING -o __INTERFACE__ -j MASQUERADE; ip link set multicast on dev %i",
|
||||
"post_down": "iptables -D FORWARD -i %i -j ACCEPT; iptables -D FORWARD -o %i -j ACCEPT; iptables -t nat -D POSTROUTING -o __INTERFACE__ -j MASQUERADE; ip6tables -D FORWARD -i %i -j ACCEPT; ip6tables -D FORWARD -o %i -j ACCEPT; ip6tables -t nat -D POSTROUTING -o __INTERFACE__ -j MASQUERADE"
|
||||
}
|
||||
|
|
|
@ -1,11 +1,6 @@
|
|||
#sub_path_only rewrite ^__PATH__$ __PATH__/ permanent;
|
||||
location __PATH__/ {
|
||||
|
||||
# Force usage of https
|
||||
if ($scheme = http) {
|
||||
rewrite ^ https://$server_name$request_uri? permanent;
|
||||
}
|
||||
|
||||
proxy_pass http://127.0.0.1:__PORT__/;
|
||||
proxy_redirect off;
|
||||
proxy_set_header Host $host;
|
||||
|
|
|
@ -1,2 +0,0 @@
|
|||
Cmnd_Alias WIREGUARDSERVICE = /usr/bin/systemctl restart wg-quick@wg0.service
|
||||
%__USER__ ALL = NOPASSWD: WIREGUARDSERVICE
|
2
conf/sysctl.conf
Normal file
2
conf/sysctl.conf
Normal file
|
@ -0,0 +1,2 @@
|
|||
net.ipv4.ip_forward = 1
|
||||
net.ipv6.conf.all.forwarding = 1
|
|
@ -1,12 +0,0 @@
|
|||
# This file was generated using wireguard-ui (https://github.com/ngoduykhanh/wireguard-ui)
|
||||
# Please don't modify it manually, otherwise your change might got replaced.
|
||||
|
||||
# Address updated at:
|
||||
# Private Key updated at:
|
||||
[Interface]
|
||||
Address = 10.10.10.0/24
|
||||
ListenPort = __PORT_WG__
|
||||
PrivateKey = __PRIVATE_KEY__
|
||||
MTU = 1450
|
||||
PostUp =
|
||||
PostDown =
|
8
conf/wireguard@.path
Normal file
8
conf/wireguard@.path
Normal file
|
@ -0,0 +1,8 @@
|
|||
[Unit]
|
||||
Description=Watch WireGuard %I.conf for changes
|
||||
|
||||
[Path]
|
||||
PathModified=/etc/wireguard/%I.conf
|
||||
|
||||
[Install]
|
||||
WantedBy=multi-user.target
|
14
conf/wireguard@.service
Normal file
14
conf/wireguard@.service
Normal file
|
@ -0,0 +1,14 @@
|
|||
[Unit]
|
||||
Description=WireGuard on %I
|
||||
After=network-online.target nss-lookup.target
|
||||
Wants=network-online.target nss-lookup.target
|
||||
|
||||
[Service]
|
||||
Type=oneshot
|
||||
User=root
|
||||
RemainAfterExit=yes
|
||||
ExecStart=/bin/systemctl restart wg-quick@%I.service
|
||||
ExecStop=/bin/systemctl stop wg-quick@%I.service
|
||||
|
||||
[Install]
|
||||
WantedBy=multi-user.target
|
|
@ -9,5 +9,40 @@ Group=__APP__
|
|||
WorkingDirectory=__FINALPATH__/
|
||||
ExecStart=__FINALPATH__/wireguard-ui --bind-address="127.0.0.1:__PORT__" --disable-login
|
||||
|
||||
# Sandboxing options to harden security
|
||||
# Depending on specificities of your service/app, you may need to tweak these
|
||||
# .. but this should be a good baseline
|
||||
# Details for these options: https://www.freedesktop.org/software/systemd/man/systemd.exec.html
|
||||
NoNewPrivileges=yes
|
||||
PrivateTmp=yes
|
||||
PrivateDevices=yes
|
||||
# Disabling the following restriction since the UI needs to poll the interfaces
|
||||
#RestrictAddressFamilies=AF_UNIX AF_INET AF_INET6
|
||||
RestrictNamespaces=yes
|
||||
RestrictRealtime=yes
|
||||
DevicePolicy=closed
|
||||
ProtectSystem=full
|
||||
ProtectControlGroups=yes
|
||||
ProtectKernelModules=yes
|
||||
ProtectKernelTunables=yes
|
||||
LockPersonality=yes
|
||||
SystemCallFilter=~@clock @debug @module @mount @obsolete @reboot @setuid @swap
|
||||
|
||||
# Denying access to capabilities that should not be relevant for webapps
|
||||
# Doc: https://man7.org/linux/man-pages/man7/capabilities.7.html
|
||||
CapabilityBoundingSet=~CAP_RAWIO CAP_MKNOD
|
||||
CapabilityBoundingSet=~CAP_AUDIT_CONTROL CAP_AUDIT_READ CAP_AUDIT_WRITE
|
||||
CapabilityBoundingSet=~CAP_SYS_BOOT CAP_SYS_TIME CAP_SYS_MODULE CAP_SYS_PACCT
|
||||
CapabilityBoundingSet=~CAP_LEASE CAP_LINUX_IMMUTABLE CAP_IPC_LOCK
|
||||
CapabilityBoundingSet=~CAP_BLOCK_SUSPEND CAP_WAKE_ALARM
|
||||
CapabilityBoundingSet=~CAP_SYS_TTY_CONFIG
|
||||
CapabilityBoundingSet=~CAP_MAC_ADMIN CAP_MAC_OVERRIDE
|
||||
# Disabling the following restriction since the UI needs to poll the interfaces
|
||||
#CapabilityBoundingSet=~CAP_NET_ADMIN CAP_NET_BROADCAST CAP_NET_RAW
|
||||
CapabilityBoundingSet=~CAP_SYS_ADMIN CAP_SYS_PTRACE CAP_SYSLOG
|
||||
|
||||
# Exception to ProtectSystem
|
||||
ReadWritePaths=/etc/wireguard
|
||||
|
||||
[Install]
|
||||
WantedBy=multi-user.target
|
||||
|
|
|
@ -1,8 +0,0 @@
|
|||
[Unit]
|
||||
Description=Watch WireGuard wg0.conf for changes
|
||||
|
||||
[Path]
|
||||
PathModified=/etc/wireguard/wg0.conf
|
||||
|
||||
[Install]
|
||||
WantedBy=multi-user.target
|
|
@ -1,9 +0,0 @@
|
|||
[Unit]
|
||||
Description=WireGuard restart
|
||||
After=network.target
|
||||
|
||||
[Service]
|
||||
Type=oneshot
|
||||
User=__APP__
|
||||
Group=__APP__
|
||||
ExecStart=sudo /usr/bin/systemctl restart wg-quick@wg0.service
|
1
doc/DESCRIPTION.md
Normal file
1
doc/DESCRIPTION.md
Normal file
|
@ -0,0 +1 @@
|
|||
WireGuard® is fast and modern VPN that utilizes state-of-the-art cryptography. It aims to be faster, simpler, leaner, and more useful than IPsec. It intends to be considerably more performant than OpenVPN. WireGuard is designed as a general purpose VPN.
|
|
@ -1,32 +1,9 @@
|
|||
* WireGuard for YunoHost will add a DMKS module to your Linux kernel.
|
||||
* You may need to reboot your server for WireGuard to be able to start.
|
||||
* The package includes WireGuard and non-official web UI to configure it.
|
||||
* Avoid altering the configuration files via the command line interface, though.
|
||||
* Do not manually alter the configuration files.
|
||||
* Use YunoHost permissions panel to allow users to access the web UI.
|
||||
* Only one network interface, *wg0*, can be managed with this app at the moment.
|
||||
* `Status` page is not working for the time being.
|
||||
|
||||
### Make your server share its Internet connection
|
||||
|
||||
#### Enable port forwarding
|
||||
|
||||
```bash
|
||||
sudo nano /etc/sysctl.conf
|
||||
# Uncomment the following lines:
|
||||
net.ipv4.ip_forward = 1
|
||||
net.ipv6.conf.all.forwarding = 1
|
||||
# Save and quit (CTRL+O, CTRL+X)
|
||||
sudo sysctl -p
|
||||
```
|
||||
|
||||
Add the following commands in `WireGuard Server` menu, like in [this picture](https://user-images.githubusercontent.com/8769166/124400150-cf354980-dd20-11eb-87c6-9478938d9c82.png). Replace `eth0` with the interface connected to the Internet:
|
||||
|
||||
#### Post Up Script
|
||||
```
|
||||
iptables -A FORWARD -i %i -j ACCEPT; iptables -A FORWARD -o %i -j ACCEPT; iptables -t nat -A POSTROUTING -o eth0 -j MASQUERADE
|
||||
```
|
||||
|
||||
#### Post Down Script
|
||||
```
|
||||
iptables -D FORWARD -i %i -j ACCEPT; iptables -D FORWARD -o %i -j ACCEPT; iptables -t nat -D POSTROUTING -o eth0 -j MASQUERADE
|
||||
```
|
||||
|
||||
After installation, you need to `Apply Config` once in the UI before the VPN service can be started.
|
||||
|
|
|
@ -1,32 +1,9 @@
|
|||
* Cette application ajoutera un module DMKS à votre noyau Linux.
|
||||
* Vous devriez redémarrer votre serveur pour que WireGuard puisse se lancer.
|
||||
* Cette application inclut WireGuard et une interface web non-officielle pour le configurer.
|
||||
* Évitez de modifier les fichiers de configuration via la ligne de commande.
|
||||
* Ne modifiez pas les fichiers de configuration à la main.
|
||||
* Utiliser le panneau de permissions de YunoHost pour autoriser des utilisateurs à accéder à WireGuard UI.
|
||||
* Une seule interface réseau, *wg0*, peut actuellement être gérée par cette app.
|
||||
* La page `Status` demeure non fonctionnelle pour l'instant.
|
||||
|
||||
### Partagez votre connexion Internet via WireGuard
|
||||
|
||||
#### Activez le *port forwarding*
|
||||
|
||||
```bash
|
||||
sudo nano /etc/sysctl.conf
|
||||
# Décommentez les lignes suivantes :
|
||||
net.ipv4.ip_forward = 1
|
||||
net.ipv6.conf.all.forwarding = 1
|
||||
# Sauvegardez et quittez (CTRL+O, CTRL+X)
|
||||
sudo sysctl -p
|
||||
```
|
||||
|
||||
Ajoutez les commandes suivantes dans le menu `WireGuard Server`, tel que dans [cette image](https://user-images.githubusercontent.com/8769166/124400150-cf354980-dd20-11eb-87c6-9478938d9c82.png). Remplacez `eth0` avec l'interface connectée à Internet :
|
||||
|
||||
#### Post Up Script
|
||||
```
|
||||
iptables -A FORWARD -i %i -j ACCEPT; iptables -A FORWARD -o %i -j ACCEPT; iptables -t nat -A POSTROUTING -o eth0 -j MASQUERADE
|
||||
```
|
||||
|
||||
#### Post Down Script
|
||||
```
|
||||
iptables -D FORWARD -i %i -j ACCEPT; iptables -D FORWARD -o %i -j ACCEPT; iptables -t nat -D POSTROUTING -o eth0 -j MASQUERADE
|
||||
```
|
||||
|
||||
Après installation, vous devrez cliquer sur `Apply Config` une fois dans l'UI avant que le service VPN puisse être démarré.
|
||||
|
|
|
@ -3,10 +3,10 @@
|
|||
"id": "wireguard",
|
||||
"packaging_format": 1,
|
||||
"description": {
|
||||
"en": "Virtual Private Networks (VPN) via WireGuard, with a web UI to ease configuration",
|
||||
"fr": "Réseaux Privés Virtuels (VPN) via WireGuard, avec une web UI pour faciliter sa configuration"
|
||||
"en": "Web user interface to manage your WireGuard setup",
|
||||
"fr": "Interface utilisateur Web pour gérer votre configuration WireGuard"
|
||||
},
|
||||
"version": "0.2.7~ynh8",
|
||||
"version": "0.3.2~ynh1",
|
||||
"url": "https://github.com/ngoduykhanh/wireguard-ui",
|
||||
"upstream": {
|
||||
"license": "MIT",
|
||||
|
@ -19,7 +19,7 @@
|
|||
"email": "tituspijean@outlook.com"
|
||||
},
|
||||
"requirements": {
|
||||
"yunohost": ">= 4.2"
|
||||
"yunohost": ">= 4.3.0"
|
||||
},
|
||||
"multi_instance": false,
|
||||
"services": [
|
||||
|
@ -37,17 +37,11 @@
|
|||
},
|
||||
{
|
||||
"name": "domain",
|
||||
"type": "domain",
|
||||
"example": "wg.example.com",
|
||||
"help": {
|
||||
"en": "The web UI requires its own dedicated domain.",
|
||||
"fr": "L'interface web nécessite son propre domaine."
|
||||
}
|
||||
"type": "domain"
|
||||
},
|
||||
{
|
||||
"name": "admin",
|
||||
"type": "user",
|
||||
"example": "johndoe"
|
||||
"type": "user"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
|
|
@ -4,16 +4,19 @@
|
|||
# COMMON VARIABLES
|
||||
#=================================================
|
||||
|
||||
# dependencies used by the app
|
||||
if grep "Raspberry Pi" /proc/device-tree/model; then
|
||||
pkg_headers="raspberrypi-kernel-headers"
|
||||
# WireGuard was integrated in Linux kernel 5.6
|
||||
# Before that, we need Linux Headers
|
||||
if dpkg --compare-versions $(uname -r) lt 5.6; then
|
||||
pkg_headers="raspberrypi-kernel-headers|linux-headers-generic|linux-headers-virtual|linux-headers-$(uname -r)"
|
||||
else
|
||||
pkg_headers="linux-headers-$(uname -r)"
|
||||
pkg_headers=""
|
||||
fi
|
||||
|
||||
# dependencies used by the app
|
||||
pkg_dependencies="$pkg_headers wireguard-dkms wireguard"
|
||||
|
||||
interface=$(ip route | awk '/default/ { print $5 }')
|
||||
|
||||
#=================================================
|
||||
# PERSONAL HELPERS
|
||||
#=================================================
|
||||
|
@ -63,30 +66,6 @@ ynh_install_repo_gpg () {
|
|||
# EXPERIMENTAL HELPERS
|
||||
#=================================================
|
||||
|
||||
# Check the architecture
|
||||
#
|
||||
# example: architecture=$(ynh_detect_arch)
|
||||
#
|
||||
# usage: ynh_detect_arch
|
||||
#
|
||||
# Requires YunoHost version 2.2.4 or higher.
|
||||
|
||||
ynh_detect_arch(){
|
||||
local architecture
|
||||
if [ -n "$(uname -m | grep arm64)" ] || [ -n "$(uname -m | grep aarch64)" ]; then
|
||||
architecture="arm64"
|
||||
elif [ -n "$(uname -m | grep 64)" ]; then
|
||||
architecture="amd64"
|
||||
elif [ -n "$(uname -m | grep 86)" ]; then
|
||||
architecture="386"
|
||||
elif [ -n "$(uname -m | grep arm)" ]; then
|
||||
architecture="arm"
|
||||
else
|
||||
architecture="unknown"
|
||||
fi
|
||||
echo $architecture
|
||||
}
|
||||
|
||||
# Send an email to inform the administrator
|
||||
#
|
||||
# usage: ynh_send_readme_to_admin --app_message=app_message [--recipients=recipients] [--type=type]
|
||||
|
|
|
@ -55,9 +55,8 @@ ynh_backup --src_path="/etc/nginx/conf.d/$domain.d/$app.conf"
|
|||
#=================================================
|
||||
|
||||
ynh_backup --src_path=/etc/systemd/system/wireguard_ui.service
|
||||
ynh_backup --src_path=/etc/systemd/system/wireguard_ui_conf.path
|
||||
ynh_backup --src_path=/etc/systemd/system/wireguard_ui_conf.service
|
||||
ynh_backup --src_path="/etc/sudoers.d/${app}_ynh"
|
||||
ynh_backup --src_path=/etc/systemd/system/wireguard@.path
|
||||
ynh_backup --src_path=/etc/systemd/system/wireguard@.service
|
||||
|
||||
#=================================================
|
||||
# BACKUP VARIOUS FILES
|
||||
|
@ -66,6 +65,12 @@ ynh_backup --src_path="/etc/sudoers.d/${app}_ynh"
|
|||
# Backup the wireguard interface config
|
||||
ynh_backup --src_path="/etc/wireguard"
|
||||
|
||||
# Backing up specific config file, in case of it is not in /etc/wireguard
|
||||
ynh_backup --src_path="$(jq -r ".config_file_path" $final_path/db/server/global_settings.json)" --not_mandatory
|
||||
|
||||
# Backup the sysctl config file to enable port forwarding
|
||||
ynh_backup --src_path="/etc/sysctl.d/$app.conf"
|
||||
|
||||
#=================================================
|
||||
# END OF SCRIPT
|
||||
#=================================================
|
||||
|
|
|
@ -27,6 +27,7 @@ ynh_abort_if_errors
|
|||
domain=$YNH_APP_ARG_DOMAIN
|
||||
path_url="/"
|
||||
admin=$YNH_APP_ARG_ADMIN
|
||||
architecture=$YNH_ARCH
|
||||
|
||||
app=$YNH_APP_INSTANCE_NAME
|
||||
|
||||
|
@ -49,13 +50,14 @@ ynh_script_progression --message="Storing installation settings..." --weight=1
|
|||
ynh_app_setting_set --app=$app --key=domain --value=$domain
|
||||
ynh_app_setting_set --app=$app --key=path --value=$path_url
|
||||
ynh_app_setting_set --app=$app --key=admin --value=$admin
|
||||
ynh_app_setting_set --app=$app --key=interface --value=$interface
|
||||
|
||||
#=================================================
|
||||
# STANDARD MODIFICATIONS
|
||||
#=================================================
|
||||
# FIND AND OPEN A PORT
|
||||
#=================================================
|
||||
ynh_script_progression --message="Configuring firewall..." --weight=1
|
||||
ynh_script_progression --message="Finding an available port..." --weight=1
|
||||
|
||||
# Find an available port for WireGuard
|
||||
port_wg=$(ynh_find_port --port=8095)
|
||||
|
@ -66,6 +68,7 @@ port=$(ynh_find_port --port=$(($port_wg+1)))
|
|||
ynh_app_setting_set --app=$app --key=port --value=$port
|
||||
|
||||
# Open the WireGuard port
|
||||
ynh_script_progression --message="Configuring firewall..." --weight=1
|
||||
ynh_exec_warn_less yunohost firewall allow --no-upnp UDP $port_wg
|
||||
|
||||
#=================================================
|
||||
|
@ -97,12 +100,12 @@ ynh_script_progression --message="Setting up source files..." --weight=1
|
|||
|
||||
ynh_app_setting_set --app=$app --key=final_path --value=$final_path
|
||||
# Download, check integrity, uncompress and patch the source from app.src
|
||||
ynh_setup_source --dest_dir="$final_path" --source_id="$(ynh_detect_arch)"
|
||||
ynh_setup_source --dest_dir="$final_path" --source_id="$architecture"
|
||||
|
||||
#=================================================
|
||||
# NGINX CONFIGURATION
|
||||
#=================================================
|
||||
ynh_script_progression --message="Configuring nginx web server..." --weight=1
|
||||
ynh_script_progression --message="Configuring NGINX web server..." --weight=1
|
||||
|
||||
# Create a dedicated nginx config
|
||||
ynh_add_nginx_config
|
||||
|
@ -115,10 +118,6 @@ ynh_script_progression --message="Configuring system user..." --weight=1
|
|||
# Create a system user
|
||||
ynh_system_user_create --username=$app
|
||||
|
||||
# Ensure the system user has enough permissions
|
||||
install -b -o root -g root -m 0440 ../conf/sudoers.conf /etc/sudoers.d/${app}_ynh
|
||||
ynh_replace_string "__USER__" "${app}" /etc/sudoers.d/${app}_ynh
|
||||
|
||||
#=================================================
|
||||
# SPECIFIC SETUP
|
||||
#=================================================
|
||||
|
@ -129,17 +128,12 @@ ynh_replace_string "__USER__" "${app}" /etc/sudoers.d/${app}_ynh
|
|||
mkdir -p $final_path/db/server
|
||||
|
||||
# Add interface configuration file for the Web UI
|
||||
cp ../conf/interfaces.json $final_path/db/server/interfaces.json
|
||||
ynh_replace_string --match_string="__PORT_WG__" --replace_string="$port_wg" --target_file="$final_path/db/server/interfaces.json"
|
||||
ynh_add_config --template="../conf/interfaces.json" --destination="$final_path/db/server/interfaces.json"
|
||||
ynh_delete_file_checksum --file="$final_path/db/server/interfaces.json"
|
||||
|
||||
# Create WireGuard configuration directory
|
||||
mkdir -p /etc/wireguard
|
||||
|
||||
# Add interface configuration file for WireGuard
|
||||
cp ../conf/wg0.conf /etc/wireguard/wg0.conf
|
||||
ynh_replace_string --match_string="__PORT_WG__" --replace_string="$port_wg" --target_file="/etc/wireguard/wg0.conf"
|
||||
ynh_replace_string --match_string="__PRIVATE_KEY__" --replace_string="$(wg genkey)" --target_file="/etc/wireguard/wg0.conf"
|
||||
|
||||
#=================================================
|
||||
# SETUP SYSTEMD
|
||||
#=================================================
|
||||
|
@ -148,12 +142,20 @@ ynh_script_progression --message="Configuring a systemd service..." --weight=1
|
|||
# Create a dedicated systemd config for the web UI
|
||||
ynh_add_systemd_config --service=wireguard_ui --template=wireguard_ui.service
|
||||
|
||||
# Create a dedicated systemd config for monitoring WireGuard's configuration
|
||||
cp ../conf/wireguard_ui_conf.path /etc/systemd/system/wireguard_ui_conf.path
|
||||
systemctl enable --quiet wireguard_ui_conf.path
|
||||
# Create dedicated systemd configs for starting and monitoring WireGuard's configuration
|
||||
cp ../conf/wireguard@.service /etc/systemd/system/wireguard@.service
|
||||
cp ../conf/wireguard@.path /etc/systemd/system/wireguard@.path
|
||||
systemctl daemon-reload
|
||||
systemctl enable --quiet wireguard@wg0.service
|
||||
systemctl enable --quiet --now wireguard@wg0.path
|
||||
|
||||
# Create a dedicated systemd config for restarting WireGuard when its configuration changes
|
||||
ynh_add_systemd_config --service=wireguard_ui_conf --template=wireguard_ui_conf.service
|
||||
#=================================================
|
||||
# ENABLE PORT FORWARDING
|
||||
#=================================================
|
||||
ynh_script_progression --message="Enabling port forwarding..." --weight=1
|
||||
|
||||
ynh_add_config --template="../conf/sysctl.conf" --destination="/etc/sysctl.d/$app.conf"
|
||||
sysctl -p /etc/sysctl.d/$app.conf
|
||||
|
||||
#=================================================
|
||||
# GENERIC FINALIZATION
|
||||
|
@ -175,13 +177,13 @@ chown -R $app: /etc/wireguard
|
|||
#=================================================
|
||||
ynh_script_progression --message="Integrating service in YunoHost..." --weight=1
|
||||
|
||||
yunohost service add wg-quick@wg0 --description "WireGuard VPN" --needs_exposed_ports $port_wg --test_status "wg show | grep wg0"
|
||||
yunohost service add wireguard_ui --description "WireGuard UI"
|
||||
yunohost service add wireguard@wg0 --description="WireGuard VPN" --needs_exposed_ports="$port_wg" --test_status="wg show | grep wg0"
|
||||
yunohost service add wireguard_ui --description="WireGuard UI"
|
||||
|
||||
#=================================================
|
||||
# START SYSTEMD SERVICE
|
||||
# START UI SYSTEMD SERVICE
|
||||
#=================================================
|
||||
ynh_script_progression --message="Starting a systemd service..." --weight=1
|
||||
ynh_script_progression --message="Starting the systemd service for the UI..." --weight=1
|
||||
|
||||
# Start a systemd service
|
||||
ynh_systemd_action --service_name=wireguard_ui --action="start" --line_match="http server started" --log_path="systemd" --timeout=30
|
||||
|
@ -191,12 +193,12 @@ ynh_systemd_action --service_name=wireguard_ui --action="start" --line_match="ht
|
|||
#=================================================
|
||||
ynh_script_progression --message="Configuring permissions..." --weight=1
|
||||
|
||||
ynh_permission_update --permission "main" --remove "all_users" --add "$admin"
|
||||
ynh_permission_update --permission="main" --remove="all_users" --add="$admin"
|
||||
|
||||
#=================================================
|
||||
# RELOAD NGINX
|
||||
#=================================================
|
||||
ynh_script_progression --message="Reloading nginx web server..." --weight=1
|
||||
ynh_script_progression --message="Reloading NGINX web server..." --weight=1
|
||||
|
||||
ynh_systemd_action --service_name=nginx --action=reload
|
||||
|
||||
|
|
|
@ -35,10 +35,10 @@ then
|
|||
yunohost service remove wireguard_ui
|
||||
fi
|
||||
|
||||
if ynh_exec_warn_less yunohost service status wg-quick@wg0 >/dev/null
|
||||
if ynh_exec_warn_less yunohost service status wireguard@wg0 >/dev/null
|
||||
then
|
||||
ynh_script_progression --message="Removing WireGuard service integration..." --weight=1
|
||||
yunohost service remove wg-quick@wg0
|
||||
yunohost service remove wireguard@wg0
|
||||
fi
|
||||
|
||||
#=================================================
|
||||
|
@ -47,13 +47,14 @@ fi
|
|||
ynh_script_progression --message="Stopping and removing the systemd service..." --weight=1
|
||||
|
||||
# YunoHost does not handle services not ending with .service, let's remove it manually
|
||||
systemctl stop wireguard_ui_conf.path
|
||||
systemctl disable wireguard_ui_conf.path --quiet
|
||||
ynh_secure_remove --file="/etc/systemd/system/wireguard_ui_conf.path"
|
||||
systemctl daemon-reload
|
||||
systemctl stop wireguard@wg0.path
|
||||
systemctl disable wireguard@wg0.path --quiet
|
||||
ynh_secure_remove --file="/etc/systemd/system/wireguard@.path"
|
||||
|
||||
systemctl stop wireguard@wg0.service
|
||||
systemctl disable wireguard@wg0.service --quiet
|
||||
ynh_secure_remove --file="/etc/systemd/system/wireguard@.service"
|
||||
|
||||
# Remove the dedicated systemd configs
|
||||
ynh_remove_systemd_config --service=wireguard_ui_conf
|
||||
ynh_remove_systemd_config --service=wireguard_ui
|
||||
|
||||
#=================================================
|
||||
|
@ -78,7 +79,7 @@ ynh_secure_remove --file="/etc/wireguard"
|
|||
#=================================================
|
||||
# REMOVE NGINX CONFIGURATION
|
||||
#=================================================
|
||||
ynh_script_progression --message="Removing nginx web server configuration..." --weight=1
|
||||
ynh_script_progression --message="Removing NGINX web server configuration..." --weight=1
|
||||
|
||||
# Remove the dedicated nginx config
|
||||
ynh_remove_nginx_config
|
||||
|
@ -101,12 +102,6 @@ then
|
|||
ynh_exec_warn_less yunohost firewall disallow UDP $port_wg
|
||||
fi
|
||||
|
||||
if yunohost firewall list | grep -q "\- $port$"
|
||||
then
|
||||
ynh_script_progression --message="Closing port $port..." --weight=1
|
||||
ynh_exec_warn_less yunohost firewall disallow TCP $port
|
||||
fi
|
||||
|
||||
#=================================================
|
||||
# SPECIFIC REMOVE
|
||||
#=================================================
|
||||
|
@ -116,6 +111,9 @@ fi
|
|||
# Remove sudoers file
|
||||
ynh_secure_remove --file="/etc/sudoers.d/${app}_ynh"
|
||||
|
||||
# Remove sysctl file for port forwarding
|
||||
ynh_secure_remove --file="/etc/sysctl.d/$app.conf"
|
||||
|
||||
#=================================================
|
||||
# GENERIC FINALIZATION
|
||||
#=================================================
|
||||
|
|
|
@ -39,10 +39,7 @@ final_path=$(ynh_app_setting_get --app=$app --key=final_path)
|
|||
#=================================================
|
||||
ynh_script_progression --message="Validating restoration parameters..." --weight=1
|
||||
|
||||
ynh_webpath_available --domain=$domain --path_url=$path_url \
|
||||
|| ynh_die --message="Path not available: ${domain}${path_url}"
|
||||
test ! -d $final_path \
|
||||
|| ynh_die --message="There is already a directory: $final_path "
|
||||
test ! -d $final_path || ynh_die --message="There is already a directory: $final_path "
|
||||
|
||||
#=================================================
|
||||
# STANDARD RESTORATION STEPS
|
||||
|
@ -68,9 +65,6 @@ ynh_script_progression --message="Recreating the dedicated system user..." --wei
|
|||
# Create the dedicated user (if not existing)
|
||||
ynh_system_user_create --username=$app
|
||||
|
||||
# Restore sudoers file
|
||||
ynh_restore_file --origin_path="/etc/sudoers.d/${app}_ynh"
|
||||
|
||||
#=================================================
|
||||
# RESTORE USER RIGHTS
|
||||
#=================================================
|
||||
|
@ -96,10 +90,10 @@ ynh_script_progression --message="Reinstalling dependencies..." --weight=5
|
|||
# Add buster-backports gpg key
|
||||
ynh_install_repo_gpg --key="https://ftp-master.debian.org/keys/archive-key-10.asc" --name="$app"
|
||||
|
||||
#Add buster-backports repo
|
||||
# Add buster-backports repo
|
||||
ynh_add_repo --uri="http://deb.debian.org/debian" --suite="buster-backports" --component="main" --name="$app"
|
||||
|
||||
#Add pin-priority for wireguard packages
|
||||
# Add pin-priority for wireguard packages
|
||||
ynh_pin_repo --package="wireguard*" --pin="origin deb http://deb.debian.org/debian buster-backports main" --priority=995 --name="$app"
|
||||
|
||||
# Update the list of package with the new repo
|
||||
|
@ -116,41 +110,50 @@ ynh_remove_extra_repo --name=$app
|
|||
ynh_script_progression --message="Restoring the systemd configuration..." --weight=1
|
||||
|
||||
ynh_restore_file --origin_path=/etc/systemd/system/wireguard_ui.service
|
||||
ynh_restore_file --origin_path=/etc/systemd/system/wireguard_ui_conf.path
|
||||
ynh_restore_file --origin_path=/etc/systemd/system/wireguard_ui_conf.service
|
||||
ynh_restore_file --origin_path=/etc/systemd/system/wireguard@.service
|
||||
ynh_restore_file --origin_path=/etc/systemd/system/wireguard@.path
|
||||
|
||||
systemctl daemon-reload
|
||||
|
||||
systemctl enable --quiet wireguard_ui.service
|
||||
systemctl enable --quiet wireguard_ui_conf.path
|
||||
systemctl enable --quiet wireguard_ui_conf.service
|
||||
systemctl enable --quiet wireguard@wg0.service
|
||||
systemctl enable --quiet --now wireguard@wg0.path
|
||||
|
||||
#=================================================
|
||||
# ENABLE PORT FORWARDING
|
||||
#=================================================
|
||||
ynh_script_progression --message="Enabling port forwarding..." --weight=1
|
||||
|
||||
ynh_restore_file --origin_path="/etc/sysctl.d/$app.conf"
|
||||
sysctl -p /etc/sysctl.d/$app.conf
|
||||
|
||||
#=================================================
|
||||
# INTEGRATE SERVICE IN YUNOHOST
|
||||
#=================================================
|
||||
ynh_script_progression --message="Integrating service in YunoHost..." --weight=1
|
||||
|
||||
yunohost service add wg-quick@wg0 --description "WireGuard VPN" --needs_exposed_ports "$port_wg" --test_status "wg show | grep wg0"
|
||||
yunohost service add wireguard_ui --description "WireGuard UI"
|
||||
yunohost service add wireguard@wg0 --description="WireGuard VPN" --needs_exposed_ports="$port_wg" --test_status="wg show | grep wg0"
|
||||
yunohost service add wireguard_ui --description="WireGuard UI"
|
||||
|
||||
#=================================================
|
||||
# RESTORE VARIOUS FILES
|
||||
#=================================================
|
||||
|
||||
ynh_restore_file --origin_path=$(jq -r ".config_file_path" $final_path/db/server/global_settings.json)
|
||||
ynh_restore_file --origin_path=$(jq -r ".config_file_path" $final_path/db/server/global_settings.json) --not_mandatory
|
||||
|
||||
#=================================================
|
||||
# START SYSTEMD SERVICE
|
||||
# START UI SYSTEMD SERVICE
|
||||
#=================================================
|
||||
ynh_script_progression --message="Starting a systemd service..." --weight=1
|
||||
ynh_script_progression --message="Starting the systemd service for the UI..." --weight=1
|
||||
|
||||
ynh_systemd_action --service_name=wireguard_ui --action="start" --line_match="http server started" --log_path="systemd" --timeout=30
|
||||
sleep 5
|
||||
|
||||
#=================================================
|
||||
# GENERIC FINALIZATION
|
||||
#=================================================
|
||||
# RELOAD NGINX AND PHP-FPM
|
||||
#=================================================
|
||||
ynh_script_progression --message="Reloading nginx web server and php-fpm..." --weight=1
|
||||
ynh_script_progression --message="Reloading NGINX web server..." --weight=1
|
||||
|
||||
ynh_systemd_action --service_name=nginx --action=reload
|
||||
|
||||
|
|
|
@ -21,6 +21,7 @@ path_url=$(ynh_app_setting_get --app=$app --key=path)
|
|||
port=$(ynh_app_setting_get --app=$app --key=port)
|
||||
port_wg=$(ynh_app_setting_get --app=$app --key=port_wg)
|
||||
final_path=$(ynh_app_setting_get --app=$app --key=final_path)
|
||||
architecture=$YNH_ARCH
|
||||
|
||||
#=================================================
|
||||
# CHECK VERSION
|
||||
|
@ -70,14 +71,13 @@ then
|
|||
fi
|
||||
|
||||
# Downgrade linux-image-$arch if updated to the buster-backports version
|
||||
arch=$(ynh_detect_arch)
|
||||
linuximage_version=$(ynh_package_version --package=linux-image-$arch)
|
||||
linuximage_version=$(ynh_package_version --package=linux-image-$architecture)
|
||||
if [[ $linuximage_version == *"bpo10"* ]]
|
||||
then
|
||||
# Downgrading using ynh_package_install apt command without "--no-remove" and with "--allow-downgrades"
|
||||
# It will remove wireguard-ynh-deps and wireguard but they will be reinstalled throught upgrade process
|
||||
ynh_apt --allow-downgrades --option Dpkg::Options::=--force-confdef \
|
||||
--option Dpkg::Options::=--force-confold install linux-image-$arch/stable
|
||||
--option Dpkg::Options::=--force-confold install linux-image-$architecture/stable
|
||||
|
||||
#Remove backports kernel if running on it and send a mail to the admin to ask him to reboot
|
||||
linuxkernel_version=$(uname -r)
|
||||
|
@ -92,18 +92,21 @@ Now wireguard_ynh use a DKMS module allowing itself to be used with the stable k
|
|||
fi
|
||||
fi
|
||||
|
||||
# Add sudoers file if missing
|
||||
# Drop sudoers file if present
|
||||
if [ -f "/etc/sudoers.d/${app}_ynh" ]; then
|
||||
install -b -o root -g root -m 0440 ../conf/sudoers.conf /etc/sudoers.d/${app}_ynh
|
||||
ynh_replace_string "__USER__" "${app}" /etc/sudoers.d/${app}_ynh
|
||||
ynh_secure_remove /etc/sudoers.d/${app}_ynh
|
||||
fi
|
||||
|
||||
# Remove deprecated services
|
||||
if systemctl list-units --full -all | grep -Fq "wireguard.path"; then
|
||||
systemctl disable --now --quiet wireguard.path
|
||||
ynh_secure_remove --file="/etc/systemd/system/wireguard.path"
|
||||
if systemctl list-units --full -all | grep -Fq "wireguard_ui_conf.path"; then
|
||||
systemctl disable --now --quiet wireguard_ui_conf.path
|
||||
ynh_secure_remove --file="/etc/systemd/system/wireguard_ui_conf.path"
|
||||
fi
|
||||
if systemctl list-units --full -all | grep -Fq "wireguard_ui_conf.service"; then
|
||||
systemctl disable --now --quiet wireguard_ui_conf.service
|
||||
ynh_secure_remove --file="/etc/systemd/system/wireguard_ui_conf.service"
|
||||
yunohost service remove wireguard_ui_conf
|
||||
fi
|
||||
ynh_remove_systemd_config --service="wireguard.service"
|
||||
|
||||
#=================================================
|
||||
# STANDARD UPGRADE STEPS
|
||||
|
@ -113,7 +116,7 @@ ynh_remove_systemd_config --service="wireguard.service"
|
|||
ynh_script_progression --message="Stopping a systemd service..." --weight=1
|
||||
|
||||
ynh_systemd_action --service_name=wireguard_ui --action="stop" --line_match="Stopped WireGuard UI" --log_path="systemd" --timeout=30
|
||||
ynh_systemd_action --service_name=wg-quick@wg0 --action="stop" --line_match="Stopped WireGuard via wg-quick(8) for wg0." --log_path="systemd" --timeout=30
|
||||
ynh_systemd_action --service_name=wireguard@wg0 --action="stop"
|
||||
|
||||
#=================================================
|
||||
# DOWNLOAD, CHECK AND UNPACK SOURCE
|
||||
|
@ -124,13 +127,13 @@ then
|
|||
ynh_script_progression --message="Upgrading source files..." --weight=1
|
||||
|
||||
# Download, check integrity, uncompress and patch the source from app.src
|
||||
ynh_setup_source --dest_dir="$final_path" --source_id="$(ynh_detect_arch)"
|
||||
ynh_setup_source --dest_dir="$final_path" --source_id="$architecture"
|
||||
fi
|
||||
|
||||
#=================================================
|
||||
# NGINX CONFIGURATION
|
||||
#=================================================
|
||||
ynh_script_progression --message="Upgrading nginx web server configuration..." --weight=1
|
||||
ynh_script_progression --message="Upgrading NGINX web server configuration..." --weight=1
|
||||
|
||||
# Create a dedicated nginx config
|
||||
ynh_add_nginx_config
|
||||
|
@ -175,23 +178,20 @@ ynh_script_progression --message="Upgrading systemd configuration..." --weight=1
|
|||
# Create a dedicated systemd config for the web UI
|
||||
ynh_add_systemd_config --service=wireguard_ui --template=wireguard_ui.service
|
||||
|
||||
# Create a dedicated systemd config for monitoring WireGuard's configuration
|
||||
cp ../conf/wireguard_ui_conf.path /etc/systemd/system/wireguard_ui_conf.path
|
||||
systemctl enable --quiet wireguard_ui_conf.path
|
||||
|
||||
# Create a dedicated systemd config for restarting WireGuard when its configuration changes
|
||||
ynh_add_systemd_config --service=wireguard_ui_conf --template=wireguard_ui_conf.service
|
||||
# Create dedicated systemd configs for starting and monitoring WireGuard's configuration
|
||||
cp ../conf/wireguard@.service /etc/systemd/system/wireguard@.service
|
||||
cp ../conf/wireguard@.path /etc/systemd/system/wireguard@.path
|
||||
systemctl daemon-reload
|
||||
systemctl enable --quiet wireguard@wg0.service
|
||||
systemctl enable --quiet --now wireguard@wg0.path
|
||||
|
||||
#=================================================
|
||||
# CONFIGURING WIREGUARD
|
||||
# ENABLE PORT FORWARDING
|
||||
#=================================================
|
||||
ynh_script_progression --message="Enabling port forwarding..." --weight=1
|
||||
|
||||
# Create db directory for securing it later
|
||||
mkdir -p $final_path/db/server
|
||||
|
||||
# Add interface configuration file
|
||||
cp ../conf/interfaces.json $final_path/db/server/interfaces.json
|
||||
ynh_replace_string --match_string="__PORT_WG__" --replace_string="$port_wg" --target_file="$final_path/db/server/interfaces.json"
|
||||
ynh_add_config --template="../conf/sysctl.conf" --destination="/etc/sysctl.d/$app.conf"
|
||||
sysctl -p /etc/sysctl.d/$app.conf
|
||||
|
||||
#=================================================
|
||||
# GENERIC FINALIZATION
|
||||
|
@ -213,17 +213,16 @@ chown -R $app: /etc/wireguard
|
|||
#=================================================
|
||||
ynh_script_progression --message="Integrating service in YunoHost..." --weight=1
|
||||
|
||||
yunohost service add wg-quick@wg0 --description "WireGuard VPN" --needs_exposed_ports "$port_wg" --test_status "wg show | grep wg0"
|
||||
yunohost service add wireguard_ui --description "WireGuard UI"
|
||||
yunohost service add wireguard@wg0 --description="WireGuard VPN" --needs_exposed_ports="$port_wg" --test_status="wg show | grep wg0"
|
||||
yunohost service add wireguard_ui --description="WireGuard UI"
|
||||
|
||||
#=================================================
|
||||
# START SYSTEMD SERVICE
|
||||
#=================================================
|
||||
ynh_script_progression --message="Starting a systemd service..." --weight=1
|
||||
ynh_script_progression --message="Starting the systemd service for the UI..." --weight=1
|
||||
|
||||
# Start a systemd service
|
||||
ynh_systemd_action --service_name=wireguard_ui --action="start" --line_match="http server started" --log_path="systemd" --timeout=30
|
||||
sleep 5
|
||||
|
||||
#=================================================
|
||||
# RELOAD NGINX
|
||||
|
|
Loading…
Reference in a new issue