edited docker compose

This commit is contained in:
2026-01-21 13:45:40 +01:00
parent 4970f80b70
commit 0a7f83f6e8

View File

@@ -55,6 +55,7 @@ services:
--address=/frontend/172.25.0.2 --address=/frontend/172.25.0.2
--address=/backend/172.25.0.3 --address=/backend/172.25.0.3
--address=/database/172.25.0.4 --address=/database/172.25.0.4
--address=/wg-admin/172.25.0.10
networks: networks:
ca-lose-internal: ca-lose-internal:
ipv4_address: 172.25.0.53 ipv4_address: 172.25.0.53
@@ -67,37 +68,34 @@ services:
cap_add: cap_add:
- NET_ADMIN - NET_ADMIN
- SYS_MODULE - SYS_MODULE
env_file:
- wireguard.env
environment: environment:
# Sprache # Sprache
- LANG=de LANG: de
# Deine Server-URL/IP # Deine Server-URL/IP
- WG_HOST=dus3.the1s.de WG_HOST: dus3.the1s.de
# WireGuard Port (anders als dein bestehender VPN!) # WireGuard Port (anders als dein bestehender VPN!)
- WG_PORT=51830 WG_PORT: "51830"
# Web-UI Port (intern) # Web-UI Port (intern)
- PORT=51821 PORT: "51821"
# Admin Passwort (als bcrypt hash) - Ändere dies!
# Generiere einen neuen Hash mit: docker run -it ghcr.io/wg-easy/wg-easy wgpw 'DEIN_PASSWORT'
#- PASSWORD_HASH="$2a$12$NcTLIp6gMnPoJ9rxSLf1pOEvxtoEfofOsGFUBxIAGoQJ0SbAVxK82"
# Internes Subnetz für VPN-Clients # Internes Subnetz für VPN-Clients
- WG_DEFAULT_ADDRESS=10.14.14.x WG_DEFAULT_ADDRESS: 10.14.14.x
# DNS Server für VPN-Clients (zeigt auf unseren dnsmasq) # DNS Server für VPN-Clients (zeigt auf unseren dnsmasq)
- WG_DEFAULT_DNS=172.25.0.53 WG_DEFAULT_DNS: "172.25.0.53"
# WICHTIG: Nur Zugriff auf das Frontend-Netzwerk erlauben! # WICHTIG: Nur Zugriff auf das Frontend-Netzwerk erlauben!
- WG_ALLOWED_IPS=172.25.0.0/24 WG_ALLOWED_IPS: 172.25.0.0/24
# Persistenter Keepalive für NAT # Persistenter Keepalive für NAT
- WG_PERSISTENT_KEEPALIVE=25 WG_PERSISTENT_KEEPALIVE: "25"
# PostUp/PostDown für Routing - NUR Frontend erlauben # PostUp/PostDown für Routing - NUR Frontend erlauben
- WG_POST_UP=iptables -t nat -A POSTROUTING -s 10.14.14.0/24 -o eth0 -j MASQUERADE; iptables -A FORWARD -i wg0 -o eth0 -j ACCEPT; iptables -A FORWARD -i eth0 -o wg0 -m state --state RELATED,ESTABLISHED -j ACCEPT; iptables -A FORWARD -i wg0 -d 172.25.0.2 -j ACCEPT; iptables -A FORWARD -i wg0 -d 172.25.0.53 -j ACCEPT; iptables -A FORWARD -i wg0 -j DROP WG_POST_UP: "iptables -t nat -A POSTROUTING -s 10.14.14.0/24 -o eth0 -j MASQUERADE; iptables -A FORWARD -i wg0 -o eth0 -j ACCEPT; iptables -A FORWARD -i eth0 -o wg0 -m state --state RELATED,ESTABLISHED -j ACCEPT; iptables -A FORWARD -i wg0 -d 172.25.0.2 -j ACCEPT; iptables -A FORWARD -i wg0 -d 172.25.0.53 -j ACCEPT; iptables -A FORWARD -i wg0 -j DROP"
- WG_POST_DOWN=iptables -t nat -D POSTROUTING -s 10.14.14.0/24 -o eth0 -j MASQUERADE; iptables -D FORWARD -i wg0 -o eth0 -j ACCEPT; iptables -D FORWARD -i eth0 -o wg0 -m state --state RELATED,ESTABLISHED -j ACCEPT; iptables -D FORWARD -i wg0 -d 172.25.0.2 -j ACCEPT; iptables -D FORWARD -i wg0 -d 172.25.0.53 -j ACCEPT; iptables -D FORWARD -i wg0 -j DROP WG_POST_DOWN: "iptables -t nat -D POSTROUTING -s 10.14.14.0/24 -o eth0 -j MASQUERADE; iptables -D FORWARD -i wg0 -o eth0 -j ACCEPT; iptables -D FORWARD -i eth0 -o wg0 -m state --state RELATED,ESTABLISHED -j ACCEPT; iptables -D FORWARD -i wg0 -d 172.25.0.2 -j ACCEPT; iptables -D FORWARD -i wg0 -d 172.25.0.53 -j ACCEPT; iptables -D FORWARD -i wg0 -j DROP"
volumes: volumes:
- wireguard-data:/etc/wireguard - wireguard-data:/etc/wireguard
- /lib/modules:/lib/modules:ro - /lib/modules:/lib/modules:ro
ports: ports:
# WireGuard UDP Port # WireGuard UDP Port (öffentlich für VPN-Verbindungen)
- "51830:51830/udp" - "51830:51830/udp"
# Web-UI Port (nur lokal oder über Reverse Proxy!)
- "0.0.0.0:51831:51821/tcp"
sysctls: sysctls:
- net.ipv4.ip_forward=1 - net.ipv4.ip_forward=1
- net.ipv4.conf.all.src_valid_mark=1 - net.ipv4.conf.all.src_valid_mark=1
@@ -108,6 +106,8 @@ services:
networks: networks:
ca-lose-internal: ca-lose-internal:
ipv4_address: 172.25.0.10 ipv4_address: 172.25.0.10
proxynet:
ipv4_address: 172.20.0.50
volumes: volumes:
ca-lose_mysql: ca-lose_mysql:
@@ -120,3 +120,5 @@ networks:
config: config:
- subnet: 172.25.0.0/24 - subnet: 172.25.0.0/24
gateway: 172.25.0.1 gateway: 172.25.0.1
proxynet:
external: true