A Django web application for Wireguard key generation and management.
Because with WireGuest private keys are created on the client side of the application. The server never sees the private keys. It receives the public keys from the user.
In all the following methods substitute
make config
with make CONFIGURATION_HEADERS=production config
after reading config_headers/README.md
when working
with a custom configuration
# Only the first time:
make config ;
# then:
python3 manage.py runserver
# Only the first time:
pipenv install ;
make config ;
# then:
pipenv run python manage.py runserver
# Only the first time:
pipenv install ;
make config ;
# then:
make run
# Pipenv environment creation and service configuration
make config ;
make install ;
# start service
systemctl --user start django-wireguest ;
# without privileges
make service ;
# as root:
cp django-wireguest.service /etc/systemd/system/ ;
systemctl daemon-reload;
systemctl enable django-wireguest ;
systemctl start django-wireguest ;
If you use pipenv
you may need to install:
libsasl2-dev
libldap2-dev
libssl-dev
python-dev
- Riccardo Mancini for his precious suggestions about cryptography