 c6f9c59eff
			
		
	
	
		c6f9c59eff
		
			
		
	
	
	
	
		
			
			* Fixes and standard enforcement * Update * Update * Update install/navidrome-install.sh Co-authored-by: Michel Roegl-Brunner <73236783+michelroegl-brunner@users.noreply.github.com> * Update install/ntfy-install.sh Co-authored-by: Michel Roegl-Brunner <73236783+michelroegl-brunner@users.noreply.github.com> * Update install/nzbget-install.sh Co-authored-by: Michel Roegl-Brunner <73236783+michelroegl-brunner@users.noreply.github.com> * Update install/n8n-install.sh Co-authored-by: Michel Roegl-Brunner <73236783+michelroegl-brunner@users.noreply.github.com> * Update install/openhab-install.sh Co-authored-by: Michel Roegl-Brunner <73236783+michelroegl-brunner@users.noreply.github.com> * Update install/paperless-ai-install.sh Co-authored-by: Michel Roegl-Brunner <73236783+michelroegl-brunner@users.noreply.github.com> * Update install/pairdrop-install.sh Co-authored-by: Michel Roegl-Brunner <73236783+michelroegl-brunner@users.noreply.github.com> * Pass 2 * Update * Update --------- Co-authored-by: Michel Roegl-Brunner <73236783+michelroegl-brunner@users.noreply.github.com>
		
			
				
	
	
		
			79 lines
		
	
	
		
			2.2 KiB
		
	
	
	
		
			Bash
		
	
	
	
	
	
			
		
		
	
	
			79 lines
		
	
	
		
			2.2 KiB
		
	
	
	
		
			Bash
		
	
	
	
	
	
| #!/usr/bin/env bash
 | |
| 
 | |
| # Copyright (c) 2021-2025 tteck
 | |
| # Author: tteck (tteckster)
 | |
| # License: MIT | https://github.com/community-scripts/ProxmoxVE/raw/main/LICENSE
 | |
| # Source: https://www.wireguard.com/
 | |
| 
 | |
| source /dev/stdin <<<"$FUNCTIONS_FILE_PATH"
 | |
| color
 | |
| verb_ip6
 | |
| catch_errors
 | |
| setting_up_container
 | |
| network_check
 | |
| update_os
 | |
| 
 | |
| msg_info "Installing Dependencies"
 | |
| $STD apt-get install -y git
 | |
| msg_ok "Installed Dependencies"
 | |
| 
 | |
| msg_info "Installing WireGuard"
 | |
| $STD apt-get install -y wireguard wireguard-tools net-tools iptables
 | |
| DEBIAN_FRONTEND=noninteractive apt-get -o Dpkg::Options::="--force-confnew" install -y iptables-persistent &>/dev/null
 | |
| $STD netfilter-persistent reload
 | |
| msg_ok "Installed WireGuard"
 | |
| 
 | |
| msg_info "Installing WGDashboard"
 | |
| git clone -q https://github.com/donaldzou/WGDashboard.git /etc/wgdashboard
 | |
| cd /etc/wgdashboard/src
 | |
| chmod u+x wgd.sh
 | |
| $STD ./wgd.sh install
 | |
| echo "net.ipv4.ip_forward=1" >>/etc/sysctl.conf
 | |
| $STD sysctl -p /etc/sysctl.conf
 | |
| msg_ok "Installed WGDashboard"
 | |
| 
 | |
| msg_info "Create Example Config for WGDashboard"
 | |
| private_key=$(wg genkey)
 | |
| cat <<EOF >/etc/wireguard/wg0.conf
 | |
| [Interface]
 | |
| PrivateKey = ${private_key}
 | |
| Address = 10.0.0.1/24
 | |
| SaveConfig = true
 | |
| PostUp = iptables -A FORWARD -i wg0 -j ACCEPT; iptables -A FORWARD -o wg0 -j ACCEPT; iptables -t nat -A POSTROUTING -o eth0 -j MASQUERADE;
 | |
| PostDown = iptables -D FORWARD -i wg0 -j ACCEPT; iptables -D FORWARD -o wg0 -j ACCEPT; iptables -t nat -D POSTROUTING -o eth0 -j MASQUERADE;
 | |
| ListenPort = 51820
 | |
| EOF
 | |
| msg_ok "Created Example Config for WGDashboard"
 | |
| 
 | |
| msg_info "Creating Service"
 | |
| cat <<EOF >/etc/systemd/system/wg-dashboard.service
 | |
| [Unit]
 | |
| After=syslog.target network-online.target
 | |
| Wants=wg-quick.target
 | |
| ConditionPathIsDirectory=/etc/wireguard
 | |
| 
 | |
| [Service]
 | |
| Type=forking
 | |
| PIDFile=/etc/wgdashboard/src/gunicorn.pid
 | |
| WorkingDirectory=/etc/wgdashboard/src
 | |
| ExecStart=/etc/wgdashboard/src/wgd.sh start
 | |
| ExecStop=/etc/wgdashboard/src/wgd.sh stop
 | |
| ExecReload=/etc/wgdashboard/src/wgd.sh restart
 | |
| TimeoutSec=120
 | |
| PrivateTmp=yes
 | |
| Restart=always
 | |
| 
 | |
| [Install]
 | |
| WantedBy=multi-user.target
 | |
| EOF
 | |
| systemctl enable -q --now wg-dashboard
 | |
| msg_ok "Created Service"
 | |
| 
 | |
| motd_ssh
 | |
| customize
 | |
| 
 | |
| msg_info "Cleaning up"
 | |
| $STD apt-get -y autoremove
 | |
| $STD apt-get -y autoclean
 | |
| msg_ok "Cleaned"
 |