Go to file
dependabot[bot] b6bfa1f6de
Some checks failed
Docker / Build and Push (push) Has been cancelled
github-pages / deploy (push) Has been cancelled
Docker / release (push) Has been cancelled
chore(deps): bump golang.org/x/crypto in the golang group (#454)
Bumps the golang group with 1 update: [golang.org/x/crypto](https://github.com/golang/crypto).


Updates `golang.org/x/crypto` from 0.38.0 to 0.39.0
- [Commits](https://github.com/golang/crypto/compare/v0.38.0...v0.39.0)

---
updated-dependencies:
- dependency-name: golang.org/x/crypto
  dependency-version: 0.39.0
  dependency-type: direct:production
  update-type: version-update:semver-minor
  dependency-group: golang
...

Signed-off-by: dependabot[bot] <support@github.com>
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
2025-06-26 20:10:32 +02:00
.github Separate tag-based and branch-based documentation deployment 2025-05-13 20:01:33 +02:00
.run V2 alpha - initial version (#172) 2023-08-04 13:34:18 +02:00
cmd add webauthn (passkey) support 2025-05-12 22:53:43 +02:00
deploy/helm feat(helm): add optional volumeName to persistence configuration #379 (#380) 2025-02-27 22:58:15 +01:00
docs add/improve documentation 2025-05-16 14:58:05 +02:00
frontend add/improve documentation 2025-05-16 14:58:05 +02:00
internal improve logging of OAuth login issues, decrease auth-code exchange timeout (#451) 2025-06-10 17:51:45 +02:00
scripts - fix docker image name 2023-10-26 15:08:11 +02:00
.dockerignore chore: CI files update (#306) 2024-09-23 21:54:22 +02:00
.gitignore docs: add reverse-proxy example, improve docker examples, fix slow_query_threshold documentation; feat: allow config.yml and config.yaml as configuration files 2025-05-03 22:21:56 +02:00
config.yml.sample add simple webhook feature for peer, interface and user events (#398) 2025-04-19 21:29:26 +02:00
ct.yaml Init Helm chart (#255) 2024-07-04 22:37:30 +02:00
docker-compose.yml further improve documentation and examples (#423) 2025-05-04 14:48:34 +02:00
Dockerfile update documentation for Docker usage (#419), include wireguard-tools in Docker image 2025-05-02 10:29:04 +02:00
go.mod chore(deps): bump golang.org/x/crypto in the golang group (#454) 2025-06-26 20:10:32 +02:00
go.sum chore(deps): bump golang.org/x/crypto in the golang group (#454) 2025-06-26 20:10:32 +02:00
LICENSE.txt V2 alpha - initial version (#172) 2023-08-04 13:34:18 +02:00
Makefile Improve admin privilege handling for OAuth. Update documentation. 2025-01-18 11:55:56 +01:00
mkdocs.yml add/improve documentation 2025-05-16 14:58:05 +02:00
README.md add/improve documentation 2025-05-16 14:58:05 +02:00
SECURITY.md chore: get rid of static code warnings 2025-02-28 16:11:55 +01:00

WireGuard Portal v2

Build Status License: MIT GitHub last commit Go Report Card GitHub go.mod Go version GitHub code size in bytes Docker Pulls

Introduction

WireGuard Portal is a simple, web-based configuration portal for WireGuard server management. The portal uses the WireGuard wgctrl library to manage existing VPN interfaces. This allows for the seamless activation or deactivation of new users without disturbing existing VPN connections.

The configuration portal supports using a database (SQLite, MySQL, MsSQL, or Postgres), OAuth or LDAP (Active Directory or OpenLDAP) as a user source for authentication and profile data.

Features

  • Self-hosted - the whole application is a single binary
  • Responsive multi-language web UI written in Vue.js
  • Automatically selects IP from the network pool assigned to the client
  • QR-Code for convenient mobile client configuration
  • Sends email to the client with QR-code and client config
  • Enable / Disable clients seamlessly
  • Generation of wg-quick configuration file (wgX.conf) if required
  • User authentication (database, OAuth, or LDAP), Passkey support
  • IPv6 ready
  • Docker ready
  • Can be used with existing WireGuard setups
  • Support for multiple WireGuard interfaces
  • Peer Expiry Feature
  • Handles route and DNS settings like wg-quick does
  • Exposes Prometheus metrics for monitoring and alerting
  • REST API for management and client deployment
  • Webhook for custom actions on peer, interface, or user updates

Screenshot

Documentation

For the complete documentation visit wgportal.org.

What is out of scope

  • Automatic generation or application of any iptables or nftables rules.
  • Support for operating systems other than linux.
  • Automatic import of private keys of an existing WireGuard setup.

Application stack

License

Important

Since the project was accepted by the Docker-Sponsored Open Source Program, the Docker image location has moved to wgportal/wg-portal. Please update the Docker image from h44z/wg-portal to wgportal/wg-portal.