Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

How do I use this docker image? #2

Open
abcdef123ghi opened this issue Jan 19, 2019 · 0 comments
Open

How do I use this docker image? #2

abcdef123ghi opened this issue Jan 19, 2019 · 0 comments

Comments

@abcdef123ghi
Copy link

abcdef123ghi commented Jan 19, 2019

I have tried this docker image on a Ubuntu 16.04 machine,I have no idea what should I do the next?any help would be apperciated

cuz I hate running the program on the physical machine,I like running everything on the docker,then I tried to copy the configuration files from a wrieguard file from a CentOS 7 to this machine which is wireguard working fine there,

$ pwd
/etc/wireguard

$ ls
client.conf cprivatekey cpublickey sprivatekey spublickey wg0.conf

then I run the docker command

docker run -it --rm --cap-add net_admin --cap-add sys_module
-v /etc/wireguard:/etc/wireguard -v /lib/modules:/lib/modules
-p 5555:5555/udp activeeos/wireguard-docker

finaly I have such a concequence:

Good news! Module version 0.0.20181218 for wireguard.ko
exactly matches what is already found in kernel 4.4.0-21-generic.
DKMS will not replace this module.
You may override by specifying --force.

depmod.......

DKMS: install completed.
Setting up wireguard-tools (0.0.20181218-wg1xenial) ...
Setting up wireguard (0.0.20181218-wg1
xenial) ...
Processing triggers for libc-bin (2.23-0ubuntu10) ...
Processing triggers for systemd (229-4ubuntu21.2) ...
Processing triggers for menu (2.1.47ubuntu1.16.04.1) ...
Sat Jan 19 06:00:57 UTC 2019: Starting Wireguard
Usage: wg-quick [ up | down | save ] [ CONFIG_FILE | INTERFACE ]

CONFIG_FILE is a configuration file, whose filename is the interface name
followed by .conf'. Otherwise, INTERFACE is an interface name, with configuration found at /etc/wireguard/INTERFACE.conf. It is to be readable by wg(8)'s setconf' sub-command, with the exception of the following additions
to the [Interface] section, which are handled by wg-quick:

  • Address: may be specified one or more times and contains one or more
    IP addresses (with an optional CIDR mask) to be set for the interface.
  • DNS: an optional DNS server to use while the device is up.
  • MTU: an optional MTU for the interface; if unspecified, auto-calculated.
  • Table: an optional routing table to which routes will be added; if
    unspecified or auto', the default table is used. If off', no routes
    are added.
  • PreUp, PostUp, PreDown, PostDown: script snippets which will be executed
    by bash(1) at the corresponding phases of the link, most commonly used
    to configure DNS. The string `%i' is expanded to INTERFACE.
  • SaveConfig: if set to `true', the configuration is saved from the current
    state of the interface upon shutdown.

See wg-quick(8) for more info and examples.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

1 participant