Go to file
dependabot[bot] b918fb6522
chore(deps): bump github.com/vishvananda/netlink in the patch group (#434)
Bumps the patch group with 1 update: [github.com/vishvananda/netlink](https://github.com/vishvananda/netlink).


Updates `github.com/vishvananda/netlink` from 1.3.0 to 1.3.1
- [Release notes](https://github.com/vishvananda/netlink/releases)
- [Commits](https://github.com/vishvananda/netlink/compare/v1.3.0...v1.3.1)

---
updated-dependencies:
- dependency-name: github.com/vishvananda/netlink
  dependency-version: 1.3.1
  dependency-type: direct:production
  update-type: version-update:semver-patch
  dependency-group: patch
...

Signed-off-by: dependabot[bot] <support@github.com>
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
2025-05-13 20:12:52 +02:00
.github Separate tag-based and branch-based documentation deployment 2025-05-13 20:01:33 +02:00
.run
cmd allow to encrypt keys in db, add browser-only key generator, add hints that private keys are stored on the server (#420) 2025-05-02 18:48:35 +02:00
deploy/helm feat(helm): add optional volumeName to persistence configuration #379 (#380) 2025-02-27 22:58:15 +01:00
docs add API endpoints to prepare fresh interfaces and peers (#432) 2025-05-09 16:19:36 +02:00
frontend update portuguese translations (#430) 2025-05-09 15:45:13 +02:00
internal add API endpoints to prepare fresh interfaces and peers (#432) 2025-05-09 16:19:36 +02:00
scripts
.dockerignore chore: CI files update (#306) 2024-09-23 21:54:22 +02:00
.gitignore docs: add reverse-proxy example, improve docker examples, fix slow_query_threshold documentation; feat: allow config.yml and config.yaml as configuration files 2025-05-03 22:21:56 +02:00
config.yml.sample add simple webhook feature for peer, interface and user events (#398) 2025-04-19 21:29:26 +02:00
ct.yaml Init Helm chart (#255) 2024-07-04 22:37:30 +02:00
docker-compose.yml further improve documentation and examples (#423) 2025-05-04 14:48:34 +02:00
Dockerfile update documentation for Docker usage (#419), include wireguard-tools in Docker image 2025-05-02 10:29:04 +02:00
go.mod chore(deps): bump github.com/vishvananda/netlink in the patch group (#434) 2025-05-13 20:12:52 +02:00
go.sum chore(deps): bump github.com/vishvananda/netlink in the patch group (#434) 2025-05-13 20:12:52 +02:00
LICENSE.txt
Makefile Improve admin privilege handling for OAuth. Update documentation. 2025-01-18 11:55:56 +01:00
mkdocs.yml prepare for v2 release 2025-05-04 11:00:12 +02:00
README.md prepare for v2 release 2025-05-04 11:00:12 +02:00
SECURITY.md chore: get rid of static code warnings 2025-02-28 16:11:55 +01:00

WireGuard Portal v2

Build Status License: MIT GitHub last commit Go Report Card GitHub go.mod Go version GitHub code size in bytes Docker Pulls

Introduction

WireGuard Portal is a simple, web-based configuration portal for WireGuard server management. The portal uses the WireGuard wgctrl library to manage existing VPN interfaces. This allows for the seamless activation or deactivation of new users without disturbing existing VPN connections.

The configuration portal supports using a database (SQLite, MySQL, MsSQL, or Postgres), OAuth or LDAP (Active Directory or OpenLDAP) as a user source for authentication and profile data.

Features

  • Self-hosted - the whole application is a single binary
  • Responsive multi-language web UI written in Vue.js
  • Automatically selects IP from the network pool assigned to the client
  • QR-Code for convenient mobile client configuration
  • Sends email to the client with QR-code and client config
  • Enable / Disable clients seamlessly
  • Generation of wg-quick configuration file (wgX.conf) if required
  • User authentication (database, OAuth, or LDAP)
  • IPv6 ready
  • Docker ready
  • Can be used with existing WireGuard setups
  • Support for multiple WireGuard interfaces
  • Peer Expiry Feature
  • Handles route and DNS settings like wg-quick does
  • Exposes Prometheus metrics for monitoring and alerting
  • REST API for management and client deployment
  • Webhook for custom actions on peer, interface, or user updates

Screenshot

Documentation

For the complete documentation visit wgportal.org.

What is out of scope

  • Automatic generation or application of any iptables or nftables rules.
  • Support for operating systems other than linux.
  • Automatic import of private keys of an existing WireGuard setup.

Application stack

License

Important

Since the project was accepted by the Docker-Sponsored Open Source Program, the Docker image location has moved to wgportal/wg-portal. Please update the Docker image from h44z/wg-portal to wgportal/wg-portal.