Simple Web based configuration generator for WireGuard.
All WireGuard UI implementations are trying to manage the service by applying configurations and creating network rules. This implementation only generates configuration and its up to you to create network rules and apply configuration to WireGuard. For example by monitoring generated directory with inotifywait.
The goal is to run Wg Gen Web in a container and WireGuard on host system.
- Self-hosted and web based
- Automatically select IP from the netowrk pool assigned to client
- QR-Code for convenient mobile client configuration
- Sent email to client with QR-code and client config
- Enable / Disable client
- Generation of
wg0.conf
after any modification - Dockerized
- Pretty cool look
The easiest way to run Wg Gen Web is using the container image
docker run --rm -it -v /tmp/wireguard:/data -p 8080:8080 -e "WG_CONF_DIR=/data" vx3r/wg-gen-web:latest
Docker compose snippet
version: '3.6'
services:
wg-gen-web:
image: vx3r/wg-gen-web:latest
container_name: wg-gen-web
restart: unless-stopped
ports:
- 8080:8080
environment:
- WG_CONF_DIR=/data
- WG_INTERFACE_NAME=wg0.conf
- SMTP_HOST=smtp.gmail.com
- SMTP_PORT=587
- [email protected]
- SMTP_PASSWORD="*************"
- SMTP_FROM=Wg Gen Web <[email protected]>
volumes:
- /etc/wireguard:/data
Please note that mapping /etc/wireguard
to /data
inside the docker, will erase your host's current configuration.
If needed, please make sure to backup your files from /etc/wireguard
.
A workaround would be to change the WG_INTERFACE_NAME
to something different, as it will create a new interface (wg-auto.conf
for example), note that if you do so, you will have to adapt your daemon accordingly.
Fill free to download latest artefacts from my GitLab server:
Put everything in one directory, create .env
file with all configurations and run the backend.
Using systemd.path
monitor for directory changes see systemd doc
# /etc/systemd/system/wg-gen-web.path
[Unit]
Description=Watch /etc/wireguard for changes
[Path]
PathModified=/etc/wireguard
[Install]
WantedBy=multi-user.target
This .path
will activate unit file with the same name
# /etc/systemd/system/wg-gen-web.service
[Unit]
Description=Restart WireGuard
After=network.target
[Service]
Type=oneshot
ExecStart=/usr/bin/systemctl restart [email protected]
[Install]
WantedBy=multi-user.target
Which will restart WireGuard service
For any other init system, create a daemon running this script
#!/bin/sh
while inotifywait -e modify -e create /etc/wireguard; do
wg-quick down wg0
wg-quick up wg0
done
After first run Wg Gen Web will create server.json
in data directory with all server informations.
Feel free to modify this file in order to use your existing keys
- Generation or application of any
iptables
ornftables
rules - Application of configuration to WireGuard by Wg Gen Web itself
- Multi-user support behind Authelia (suggestions / thoughts are welcome)
Send configs by email to client
- Join us on Discord
- Create an issue
- Gin, HTTP web framework written in Go
- go-template, data-driven templates for generating textual output
- Vue.js, progressive javaScript framework
- Vuetify, material design component framework
- Do What the Fuck You Want to Public License. LICENSE-WTFPL or http://www.wtfpl.net