wg-easy
vouch-proxy
Our great sponsors
wg-easy | vouch-proxy | |
---|---|---|
20 | 48 | |
11,629 | 2,643 | |
7.6% | 2.2% | |
9.8 | 3.2 | |
1 day ago | about 1 month ago | |
JavaScript | Go | |
GNU General Public License v3.0 or later | MIT License |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
wg-easy
-
PiHole after wireguard install?
Check out wg-easy on GitHub. There is also a wg with pinole on their page. Works so easily together. https://github.com/wg-easy/wg-easy
-
Alternative to Headscale?
sounds like you just want wg-easy.
-
WireHole is a combination of WireGuard, Pi-hole, and Unbound
This wg-easy?
Definitely not an OSI approved license, but does look like they made an attempt in the spirit of GPL, no?
https://github.com/wg-easy/wg-easy/blob/master/LICENSE.md
> You may:
Use this software for yourself;
Use this software for a company;
Modify this software, as long as you:
Publish the changes on GitHub as an open-source & linked fork;
Don't remove any links to the original project or donation pages;
You may not:
Use this software in a commercial product without a license from the original author;
- The Tailscale Universal Docker Mod
-
Who do you use for port forwarding?
wg-easy running in Docker. Then access it using WireGuard on my mobile devices.
-
Netmaker/Tailscale Vs Traditional VPNs
Just plain wg-easy (wireguard with frontend). No 3rd parties involved, just me & my endpoint
-
Is it possible to make a phone connect to a server without having to open any ports on the server side ?
I suggest running a VPN server like wireguard (very easy to install on phone and set up using https://github.com/wg-easy/wg-easy) and have the port open only to that. The VPN will do the rest in terms of NATing ports and whatnot.
- Which is more of a pain in the ass: connecting to databases via SSH tunnels, or whitelisting IP addresses?
-
Self-Hosted Mesh Network / VPN For User-Friendly LAN Gaming Network?
https://github.com/wg-easy/wg-easy (7.6k stars)
-
Changing Private IP to domain or something locally for selfhosted RSS-Bridge?
I use wg-easy for now https://github.com/wg-easy/wg-easy
vouch-proxy
- I'm looking for an SSO server/reverse proxy with features I'm not sure exist
-
Keycloak vs. Authentik vs. Authelia, help choose SSO
Look into vouch proxy
- Solf-hosted login form for self-hosted app ?
- AWS EKS front end authentication with Okta?
-
Is there something like Keycloak or Authelia that supports both forward auth and identity providers?
Vouch proxy is designed for this usage: https://github.com/vouch/vouch-proxy I don't think there are any nice UIs to configure it though so you'll need to be familiar with running it yourself.
-
cloudflare and ingress-nginx
Not sure this is a "best practice", but it lets me keep control of the Ingress resources inside their YAML configs. I've also layered Vouch Proxy into the ingress configurations to require SSO/MFA auth to access the resources behind the Ingress. Cloudflare has the ability to do this, but I found it cumbersome to keep track of the configs outside the K8s cluster.
-
Single Sign on for reverse proxy (NGINX Proxy Manager)
I've used vouch proxy for my own stuff previously, before more recently moving to Cloudflare Access. vouch can be slightly janky at times to get working right, but once set up, it's been solid.
-
Yubikey support in Jellyfin
For example: nginx -> Vouch proxy -> KeyCloak -> Jellyfin
-
Jump Host SSO to Internal Apps
While this works, we were hoping to make access a bit easier with say an OpenID Connect SSO and reverse-proxy solution. I've seen Vouch Proxy, https://github.com/vouch/vouch-proxy which is really just SSO on top of nginx, but I'm wondering if there's a simpler way to do this.
-
Do you prefer to build your own auth, or use some library or provider (like auth0, Next Auth, Supabase, etc)?
You seem to be quite knowledgeable and a minimal provider with just the bare minimum would suffice for you. Have a look at Vouch Proxy, it does one thing and it does it well.
What are some alternatives?
wireguard-ui - Wireguard web interface
oauth2-proxy - A reverse proxy that provides authentication with Google, Azure, OpenID Connect and many more identity providers.
pivpn - The Simplest VPN installer, designed for Raspberry Pi
jfa-go - a better way to manage your Jellyfin users, now in go
firezone - Open-source VPN server and egress firewall for Linux built on WireGuard. Firezone is easy to set up (all dependencies are bundled thanks to Chef Omnibus), secure, performant, and self hostable.
authentik - The authentication glue you need.
wg-manager - A easy to use WireGuard dashboard and management tool
authelia - The Single Sign-On Multi-Factor portal for web apps
wg-gen-web - Simple Web based configuration generator for WireGuard
traefik-forward-auth - Minimal forward authentication service that provides Google/OpenID oauth based login and authentication for the traefik reverse proxy
WGDashboard - Simplest dashboard for WireGuard VPN written in Python w/ Flask
Nginx Proxy Manager - Docker container for managing Nginx proxy hosts with a simple, powerful interface