Skip to content

Django application for Wireguard client side private key generation with third party LDAP authentication

License

Notifications You must be signed in to change notification settings

moriglia/wireguest

Repository files navigation

WireGuest

Check Python code with Pylava codecov GitHub license

A Django web application for Wireguard key generation and management.

WhyreGuest?

Because with WireGuest private keys are created on the client side of the application. The server never sees the private keys. It receives the public keys from the user.

Usage

In all the following methods substitute make config with make CONFIGURATION_HEADERS=production config after reading config_headers/README.md when working with a custom configuration

Just run

# Only the first time:
make config ;

# then:
python3 manage.py runserver

Run with pipenv

# Only the first time:
pipenv install ;
make config ;

# then:
pipenv run python manage.py runserver

Run with make

# Only the first time:
pipenv install ;
make config ;

# then:
make run

Install as user service

# Pipenv environment creation and service configuration
make config ;
make install ;

# start service
systemctl --user start django-wireguest ;

Install as global service

# without privileges
make service ;

# as root:
cp django-wireguest.service /etc/systemd/system/ ;
systemctl daemon-reload;
systemctl enable django-wireguest ;
systemctl start django-wireguest ;

Requirements

If you use pipenv you may need to install:

  • libsasl2-dev
  • libldap2-dev
  • libssl-dev
  • python-dev

Credits

About

Django application for Wireguard client side private key generation with third party LDAP authentication

Topics

Resources

License

Stars

Watchers

Forks