Advertisement
Kyosune

Kyo WireGuard Config

Oct 22nd, 2024
29
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 2.18 KB | None | 0 0
  1. 'use strict';
  2.  
  3. const { release: { version } } = require('./package.json');
  4.  
  5. module.exports.RELEASE = version;
  6. module.exports.PORT = process.env.PORT || '51821';
  7. module.exports.WEBUI_HOST = process.env.WEBUI_HOST || '0.0.0.0';
  8. /** This is only kept for migration purpose. DO NOT USE! */
  9. module.exports.PASSWORD = process.env.PASSWORD;
  10. module.exports.PASSWORD_HASH = process.env.PASSWORD_HASH;
  11. module.exports.WG_PATH = process.env.WG_PATH || '/etc/wireguard/';
  12. module.exports.WG_DEVICE = process.env.WG_DEVICE || 'eth0';
  13. module.exports.WG_HOST = process.env.WG_HOST;
  14. module.exports.WG_PORT = process.env.WG_PORT || '51820';
  15. module.exports.WG_CONFIG_PORT = process.env.WG_CONFIG_PORT || process.env.WG_PORT || '51820';
  16. module.exports.WG_MTU = process.env.WG_MTU || null;
  17. module.exports.WG_PERSISTENT_KEEPALIVE = process.env.WG_PERSISTENT_KEEPALIVE || '0';
  18. module.exports.WG_DEFAULT_ADDRESS = process.env.WG_DEFAULT_ADDRESS || '10.8.0.x';
  19. module.exports.WG_DEFAULT_DNS = typeof process.env.WG_DEFAULT_DNS === 'string'
  20. ? process.env.WG_DEFAULT_DNS
  21. : '1.1.1.1';
  22. module.exports.WG_ALLOWED_IPS = process.env.WG_ALLOWED_IPS || '0.0.0.0/0, ::/0';
  23.  
  24. module.exports.WG_PRE_UP = process.env.WG_PRE_UP || '';
  25. module.exports.WG_POST_UP = process.env.WG_POST_UP || `
  26. iptables -t nat -A POSTROUTING -s ${module.exports.WG_DEFAULT_ADDRESS.replace('x', '0')}/24 -o ${module.exports.WG_DEVICE} -j MASQUERADE;
  27. iptables -A INPUT -p udp -m udp --dport ${module.exports.WG_PORT} -j ACCEPT;
  28. iptables -A FORWARD -i wg0 -j ACCEPT;
  29. iptables -A FORWARD -o wg0 -j ACCEPT;
  30. `.split('\n').join(' ');
  31.  
  32. module.exports.WG_PRE_DOWN = process.env.WG_PRE_DOWN || '';
  33. module.exports.WG_POST_DOWN = process.env.WG_POST_DOWN || `
  34. iptables -t nat -D POSTROUTING -s ${module.exports.WG_DEFAULT_ADDRESS.replace('x', '0')}/24 -o ${module.exports.WG_DEVICE} -j MASQUERADE;
  35. iptables -D INPUT -p udp -m udp --dport ${module.exports.WG_PORT} -j ACCEPT;
  36. iptables -D FORWARD -i wg0 -j ACCEPT;
  37. iptables -D FORWARD -o wg0 -j ACCEPT;
  38. `.split('\n').join(' ');
  39. module.exports.LANG = process.env.LANG || 'en';
  40. module.exports.UI_TRAFFIC_STATS = process.env.UI_TRAFFIC_STATS || 'false';
  41. module.exports.UI_CHART_TYPE = process.env.UI_CHART_TYPE || 0;
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement