wireguard-go-docker
wg-gen-web
Our great sponsors
wireguard-go-docker | wg-gen-web | |
---|---|---|
2 | 9 | |
176 | 1,498 | |
- | - | |
4.0 | 0.0 | |
about 2 months ago | 6 months ago | |
Dockerfile | Go | |
GNU General Public License v3.0 only | Do What The F*ck You Want To Public License |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
wireguard-go-docker
-
Our User Mode WireGuard Year
I thought wireguard-go requires the kernel tun device. See for example this Docker image for wireguard-go which maps the tun device and requires elevated permissions - https://github.com/masipcat/wireguard-go-docker
-
Unable to run WG on multiple OS's: wireguard RTNETLINK answers: Operation not permitted
I was just curious if it's just me. It seems theres a few posts on various places on the internet on this and the questions are not answered on any of them (EG: https://github.com/masipcat/wireguard-go-docker/issues/19)
wg-gen-web
-
What is everyone using to manage WireGuard?
For client devices (like phones, laptops, workstations) i use wg-gen-web
-
A very minimalist, easy WireGuard VPN server
If he goes funky there's always this: https://github.com/vx3r/wg-gen-web
- Netmaker 0.7 - Very Fast Linux Server Networking over WireGuard and Other Things
- Are there any good self-hosted Wireguard UI alternatives to OpenVPN Access server?
-
GUI Options
I ended up working with wg-gen-web (https://github.com/vx3r/wg-gen-web). It’s pretty slick looking, easy to use, and after some struggles I managed to get authentication working. I also tweaked the docker image to change a few things to my liking (page title, etc). I still feel like this is the missing piece in WireGuard. I know it’s still new, but with this GUI, I have a pretty damn good solution for the few users I have that need it.
-
GUI to add new tunnels?
You would have to do some more Setup around it but wg-gen-web can do this
-
Good guide on Wireguard docker install + GUI to control it
Not sure about running wireguard itself in a container but i've been running this GUI and the github page also provide some systemd hooks so that when the config changes, wireguard is restarted on the host.
-
Multiple devices with one client
There are scripts that generate the configs for you but also web services you can host yourself which also have a nice ui.
-
Security Considerations For Nextcloud On Raspi 4
Your VPN (Wiregiard) is independent of that - it will allow you to access the Rpi itself from outside (as if you were in your LAN). I recommend https://github.com/vx3r/wg-gen-web to manage your WG configuration.
What are some alternatives?
nordvpn - NordVpn Docker Client
wg-easy - The easiest way to run WireGuard VPN + Web-based Admin UI. [Moved to: https://github.com/wg-easy/wg-easy]
subspace - A simple WireGuard VPN server GUI
wg-portal - WireGuard Configuration Portal with LDAP connection
wirehole - WireHole is a combination of WireGuard, Pi-hole, and Unbound in a docker-compose project with the intent of enabling users to quickly and easily create a personally managed full or split-tunnel WireGuard VPN with ad blocking capabilities thanks to Pi-hole, and DNS caching, additional privacy options, and upstream providers via Unbound.
wg-access-server - An all-in-one WireGuard VPN solution with a web ui for connecting devices
helmfiles - Comprehensive Distribution of Helmfiles for Kubernetes
wg-easy - The easiest way to run WireGuard VPN + Web-based Admin UI.
Pulumi - Pulumi - Infrastructure as Code in any programming language. Build infrastructure intuitively on any cloud using familiar languages 🚀
wireguard-vanity-keygen - WireGuard vanity key generator
slirp4netns - User-mode networking for unprivileged network namespaces
netbox-wireguard - Script to generate wireguard/BGP configs based on Netbox data