Simplify entrypoint.sh
This commit is contained in:
parent
74c3645405
commit
326b11022f
1 changed files with 26 additions and 33 deletions
|
@ -1,4 +1,4 @@
|
|||
#!/bin/bash
|
||||
#!/bin/ash
|
||||
|
||||
set -e
|
||||
|
||||
|
@ -10,7 +10,7 @@ fi
|
|||
|
||||
configs=`find /etc/wireguard -type f -printf "%f\n"`
|
||||
if [[ -z "$configs" ]]; then
|
||||
echo "No configuration files found in /etc/wireguard" >&2
|
||||
echo "No configuration file found in /etc/wireguard" >&2
|
||||
exit 1
|
||||
fi
|
||||
|
||||
|
@ -22,34 +22,27 @@ if [[ "$(cat /proc/sys/net/ipv4/conf/all/src_valid_mark)" != "1" ]]; then
|
|||
exit 1
|
||||
fi
|
||||
|
||||
# The net.ipv4.conf.all.src_valid_mark sysctl is set when running the Docker container, so don't have WireGuard also set it
|
||||
# The net.ipv4.conf.all.src_valid_mark sysctl is set when running the container, so don't have WireGuard also set it
|
||||
sed -i "s:sysctl -q net.ipv4.conf.all.src_valid_mark=1:echo Skipping setting net.ipv4.conf.all.src_valid_mark:" /usr/bin/wg-quick
|
||||
|
||||
# Start WireGuard
|
||||
wg-quick up $interface
|
||||
|
||||
# IPv4 kill switch: traffic must be either (1) to the WireGuard interface, (2) marked as a WireGuard packet, (3) to a local address, or (4) to the Docker network
|
||||
docker_network="$(ip -o addr show dev eth0 | awk '$3 == "inet" {print $4}')"
|
||||
docker_network_rule=$([ ! -z "$docker_network" ] && echo "! -d $docker_network" || echo "")
|
||||
iptables -I OUTPUT ! -o $interface -m mark ! --mark $(wg show $interface fwmark) -m addrtype ! --dst-type LOCAL $docker_network_rule -j REJECT
|
||||
# IPv4 kill switch: traffic must be either (1) to the WireGuard interface, (2) marked as a WireGuard packet, (3) to a local address, or (4) to the container network
|
||||
container_ipv4_network="$(ip -o addr show dev eth0 | awk '$3 == "inet" {print $4}')"
|
||||
container_ipv4_network_rule=$([ ! -z "$container_ipv4_network" ] && echo "! -d $container_ipv4_network" || echo "")
|
||||
iptables -I OUTPUT ! -o $interface -m mark ! --mark $(wg show $interface fwmark) -m addrtype ! --dst-type LOCAL $container_ipv4_network_rule -j REJECT
|
||||
|
||||
# IPv6 kill switch: traffic must be either (1) to the WireGuard interface, (2) marked as a WireGuard packet, (3) to a local address, or (4) to the Docker network
|
||||
docker6_network="$(ip -o addr show dev eth0 | awk '$3 == "inet6" {print $4}')"
|
||||
if [[ "$docker6_network" ]]; then
|
||||
docker6_network_rule=$([ ! -z "$docker6_network" ] && echo "! -d $docker6_network" || echo "")
|
||||
ip6tables -I OUTPUT ! -o $interface -m mark ! --mark $(wg show $interface fwmark) -m addrtype ! --dst-type LOCAL $docker6_network_rule -j REJECT
|
||||
# IPv6 kill switch: traffic must be either (1) to the WireGuard interface, (2) marked as a WireGuard packet, (3) to a local address, or (4) to the container network
|
||||
container_ipv6_network="$(ip -o addr show dev eth0 | awk '$3 == "inet6" {print $4}')"
|
||||
if [[ "$container_ipv6_network" ]]; then
|
||||
container_ipv6_network_rule=$([ ! -z "$container_ipv6_network" ] && echo "! -d $container_ipv6_network" || echo "")
|
||||
ip6tables -I OUTPUT ! -o $interface -m mark ! --mark $(wg show $interface fwmark) -m addrtype ! --dst-type LOCAL $container_ipv6_network_rule -j REJECT
|
||||
else
|
||||
echo "Skipping IPv6 kill switch setup since IPv6 interface was not found" >&2
|
||||
fi
|
||||
|
||||
# Support LOCAL_NETWORK environment variable, which was replaced by LOCAL_SUBNETS
|
||||
if [[ -z "$LOCAL_SUBNETS" && "$LOCAL_NETWORK" ]]; then
|
||||
LOCAL_SUBNETS=$LOCAL_NETWORK
|
||||
fi
|
||||
|
||||
# Support LOCAL_SUBNET environment variable, which was replaced by LOCAL_SUBNETS (plural)
|
||||
if [[ -z "$LOCAL_SUBNETS" && "$LOCAL_SUBNET" ]]; then
|
||||
LOCAL_SUBNETS=$LOCAL_SUBNET
|
||||
echo "IPv6 interface not found, skipping IPv6 kill switch" >&2
|
||||
fi
|
||||
|
||||
# Allow traffic to local subnets
|
||||
for local_subnet in ${LOCAL_SUBNETS//,/$IFS}
|
||||
do
|
||||
echo "Allowing traffic to local subnet ${local_subnet}" >&2
|
||||
|
|
Loading…
Reference in a new issue