Initial commit
This commit is contained in:
commit
74304f975f
1
.gitignore
vendored
Normal file
1
.gitignore
vendored
Normal file
@ -0,0 +1 @@
|
||||
wg0.conf
|
15
3proxy.cfg
Normal file
15
3proxy.cfg
Normal file
@ -0,0 +1,15 @@
|
||||
## DNS servers
|
||||
# nserver 1.1.1.1
|
||||
# nserver 8.8.8.8
|
||||
nscache 65536
|
||||
|
||||
## Log settings
|
||||
log
|
||||
logformat "L%Y-%m-%d %H:%M:%S %U %C:%c %R:%r %O %I %h %T"
|
||||
|
||||
## Set up the HTTP proxy on port 3128
|
||||
proxy -p3128
|
||||
|
||||
## Set up the SOCKS5 proxy on port 1080
|
||||
socks -p1080
|
||||
|
47
Dockerfile
Normal file
47
Dockerfile
Normal file
@ -0,0 +1,47 @@
|
||||
# Stage 1: Build 3proxy
|
||||
FROM debian:bullseye-slim AS builder
|
||||
|
||||
# Install build dependencies
|
||||
RUN apt-get update && apt-get install -y --no-install-recommends \
|
||||
build-essential \
|
||||
git \
|
||||
ca-certificates \
|
||||
&& apt-get clean && rm -rf /var/lib/apt/lists/*
|
||||
|
||||
# Clone and build 3proxy
|
||||
WORKDIR /usr/src/3proxy
|
||||
RUN git clone https://github.com/3proxy/3proxy.git . && \
|
||||
ln -s Makefile.Linux Makefile && \
|
||||
make -f Makefile
|
||||
|
||||
# Stage 2: Runtime Image
|
||||
FROM debian:bullseye-slim
|
||||
|
||||
# Install runtime dependencies
|
||||
RUN apt-get update && apt-get install -y --no-install-recommends \
|
||||
openresolv \
|
||||
iproute2 \
|
||||
iptables \
|
||||
wireguard-tools \
|
||||
ca-certificates \
|
||||
procps \
|
||||
&& apt-get clean && rm -rf /var/lib/apt/lists/*
|
||||
|
||||
# Copy 3proxy from the builder stage
|
||||
COPY --from=builder /usr/src/3proxy/bin/ /usr/local/bin/
|
||||
|
||||
# Create necessary directories
|
||||
RUN mkdir -p /etc/3proxy /var/log/3proxy && \
|
||||
chown -R nobody:nogroup /var/log/3proxy
|
||||
|
||||
# Copy configuration files
|
||||
COPY 3proxy.cfg /etc/3proxy/3proxy.cfg
|
||||
COPY entrypoint.sh /entrypoint.sh
|
||||
RUN chmod +x /entrypoint.sh
|
||||
|
||||
# Expose proxy ports
|
||||
EXPOSE 3128 1080
|
||||
|
||||
# Set entrypoint
|
||||
ENTRYPOINT ["/entrypoint.sh"]
|
||||
|
35
Makefile
Normal file
35
Makefile
Normal file
@ -0,0 +1,35 @@
|
||||
CONTAINER_MANAGER := docker
|
||||
COMPOSE := $(CONTAINER_MANAGER) compose
|
||||
DC_FILE := compose.yaml
|
||||
|
||||
.PHONY: ps
|
||||
ps:
|
||||
$(COMPOSE) -f $(DC_FILE) ps
|
||||
|
||||
.PHONY: config
|
||||
config:
|
||||
$(COMPOSE) -f $(DC_FILE) config
|
||||
|
||||
.PHONY: up
|
||||
up:
|
||||
$(COMPOSE) -f $(DC_FILE) up -d
|
||||
|
||||
.PHONY: down
|
||||
down:
|
||||
$(COMPOSE) -f $(DC_FILE) down
|
||||
|
||||
.PHONY: start
|
||||
start:
|
||||
$(COMPOSE) -f $(DC_FILE) start
|
||||
|
||||
.PHONY: stop
|
||||
stop:
|
||||
$(COMPOSE) -f $(DC_FILE) stop
|
||||
|
||||
.PHONY: restart
|
||||
restart:
|
||||
$(COMPOSE) -f $(DC_FILE) restart
|
||||
|
||||
.PHONY: logs
|
||||
logs:
|
||||
$(COMPOSE) -f $(DC_FILE) logs -f
|
87
README.md
Normal file
87
README.md
Normal file
@ -0,0 +1,87 @@
|
||||
# wireguard-3proxy-docker
|
||||
|
||||
Docker container combining WireGuard VPN with 3proxy to provide HTTP and SOCKS5 proxy services through an encrypted tunnel.
|
||||
|
||||
## Features
|
||||
|
||||
- WireGuard VPN for secure, encrypted tunneling
|
||||
- HTTP proxy (port 3128)
|
||||
- SOCKS5 proxy (port 1080)
|
||||
- DNS resolution through VPN
|
||||
- Container logs to stdout
|
||||
- Multi-stage build for minimal image size
|
||||
|
||||
## Requirements
|
||||
|
||||
- Docker
|
||||
- Docker Compose
|
||||
- WireGuard configuration file (`wg0.conf`)
|
||||
|
||||
## Quick Start
|
||||
|
||||
1. Clone the repository:
|
||||
```bash
|
||||
git clone https://github.com/rbehzadan/wireguard-3proxy-docker.git
|
||||
cd wireguard-3proxy-docker
|
||||
```
|
||||
|
||||
2. Create WireGuard configuration file `wg0.conf`:
|
||||
```ini
|
||||
[Interface]
|
||||
PrivateKey = your_private_key
|
||||
Address = your_ip_address
|
||||
DNS = 1.1.1.1, 8.8.8.8
|
||||
|
||||
[Peer]
|
||||
PublicKey = peer_public_key
|
||||
AllowedIPs = 0.0.0.0/0
|
||||
Endpoint = peer_endpoint:port
|
||||
```
|
||||
|
||||
3. Start the container:
|
||||
```bash
|
||||
docker compose up -d
|
||||
```
|
||||
|
||||
## Docker Compose Configuration
|
||||
|
||||
```yaml
|
||||
services:
|
||||
wireguard:
|
||||
image: rbehzadan/wireguard-3proxy
|
||||
container_name: wireguard
|
||||
cap_add:
|
||||
- NET_ADMIN
|
||||
- SYS_MODULE
|
||||
devices:
|
||||
- /dev/net/tun
|
||||
privileged: true
|
||||
volumes:
|
||||
- ./wg0.conf:/etc/wireguard/wg0.conf
|
||||
ports:
|
||||
- "3128:3128"
|
||||
- "1080:1080"
|
||||
```
|
||||
|
||||
## Build from Source
|
||||
|
||||
```bash
|
||||
git clone https://github.com/rbehzadan/wireguard-3proxy-docker.git
|
||||
cd wireguard-3proxy-docker
|
||||
docker build -t wireguard-3proxy:latest .
|
||||
```
|
||||
|
||||
## Security Notes
|
||||
|
||||
- Container runs with privileged access (required for WireGuard)
|
||||
- No authentication configured by default
|
||||
- All traffic routed through VPN tunnel
|
||||
- DNS queries resolved through VPN DNS servers
|
||||
|
||||
## Contributing
|
||||
|
||||
Pull requests are welcome. For major changes, please open an issue first to discuss what you would like to change.
|
||||
|
||||
## License
|
||||
|
||||
This project is licensed under the MIT License.
|
103
README_DOCKER_HUB.md
Normal file
103
README_DOCKER_HUB.md
Normal file
@ -0,0 +1,103 @@
|
||||
# WireGuard with 3proxy Docker Image
|
||||
|
||||
This Docker image combines WireGuard VPN with 3proxy to provide both HTTP and SOCKS5 proxy services through a VPN tunnel.
|
||||
|
||||
## Features
|
||||
|
||||
- WireGuard VPN connectivity
|
||||
- HTTP proxy (port 3128)
|
||||
- SOCKS5 proxy (port 1080)
|
||||
- DNS resolution through VPN
|
||||
- Logging to stdout for container monitoring
|
||||
|
||||
## Prerequisites
|
||||
|
||||
- Docker
|
||||
- Docker Compose
|
||||
- WireGuard configuration file (`wg0.conf`)
|
||||
|
||||
## Usage
|
||||
|
||||
1. Prepare your WireGuard configuration file `wg0.conf`. Example:
|
||||
```ini
|
||||
[Interface]
|
||||
PrivateKey = your_private_key
|
||||
Address = your_ip_address
|
||||
DNS = 1.1.1.1, 8.8.8.8
|
||||
|
||||
[Peer]
|
||||
PublicKey = peer_public_key
|
||||
AllowedIPs = 0.0.0.0/0
|
||||
Endpoint = peer_endpoint:port
|
||||
```
|
||||
|
||||
2. Run with Docker Compose:
|
||||
```bash
|
||||
docker compose up -d
|
||||
```
|
||||
|
||||
## Docker Compose Configuration
|
||||
|
||||
```yaml
|
||||
services:
|
||||
wireguard:
|
||||
image: rbehzadan/wireguard-3proxy
|
||||
container_name: wireguard
|
||||
cap_add:
|
||||
- NET_ADMIN
|
||||
- SYS_MODULE
|
||||
devices:
|
||||
- /dev/net/tun
|
||||
privileged: true
|
||||
volumes:
|
||||
- ./wg0.conf:/etc/wireguard/wg0.conf
|
||||
ports:
|
||||
- "3128:3128"
|
||||
- "1080:1080"
|
||||
```
|
||||
|
||||
## Configuration
|
||||
|
||||
The image uses the following default ports:
|
||||
- HTTP Proxy: 3128
|
||||
- SOCKS5 Proxy: 1080
|
||||
|
||||
### Environment Variables
|
||||
None required.
|
||||
|
||||
### Volumes
|
||||
Mount your WireGuard configuration:
|
||||
```yaml
|
||||
volumes:
|
||||
- ./wg0.conf:/etc/wireguard/wg0.conf
|
||||
```
|
||||
|
||||
### Required Capabilities
|
||||
```yaml
|
||||
cap_add:
|
||||
- NET_ADMIN
|
||||
- SYS_MODULE
|
||||
devices:
|
||||
- /dev/net/tun
|
||||
privileged: true
|
||||
```
|
||||
|
||||
## Security Considerations
|
||||
|
||||
- The container runs in privileged mode due to WireGuard requirements
|
||||
- No authentication is configured by default
|
||||
- All traffic is routed through the VPN tunnel
|
||||
- DNS queries are resolved through the VPN's DNS servers
|
||||
|
||||
## Building
|
||||
|
||||
```bash
|
||||
docker build -t rbehzadan/wireguard-3proxy:tag .
|
||||
```
|
||||
|
||||
## License
|
||||
|
||||
This project is licensed under the MIT License.
|
||||
|
||||
## Similar Projects
|
||||
[linuxserver/wireguard](https://hub.docker.com/r/linuxserver/wireguard) - A robust WireGuard container that focuses on VPN functionality. Our project extends this concept by adding HTTP and SOCKS5 proxy capabilities through 3proxy.
|
16
compose.yaml
Normal file
16
compose.yaml
Normal file
@ -0,0 +1,16 @@
|
||||
services:
|
||||
wireguard:
|
||||
image: rbehzadan/wireguard-3proxy
|
||||
container_name: wireguard
|
||||
cap_add:
|
||||
- NET_ADMIN
|
||||
- SYS_MODULE
|
||||
devices:
|
||||
- /dev/net/tun
|
||||
privileged: true
|
||||
volumes:
|
||||
- ./wg0.conf:/etc/wireguard/wg0.conf
|
||||
ports:
|
||||
- "3128:3128"
|
||||
- "1080:1080"
|
||||
|
9
entrypoint.sh
Normal file
9
entrypoint.sh
Normal file
@ -0,0 +1,9 @@
|
||||
#!/bin/bash
|
||||
|
||||
# Start WireGuard
|
||||
wg-quick up /etc/wireguard/wg0.conf
|
||||
|
||||
# Wait for WireGuard interface to be up
|
||||
sleep 1
|
||||
|
||||
exec /usr/local/bin/3proxy /etc/3proxy/3proxy.cfg
|
Loading…
Reference in New Issue
Block a user