Skip to content

Commit 11e7d61

Browse files
committed
fix: cut out some spare ports & fixed exposable ranges
1 parent 467d4bb commit 11e7d61

File tree

5 files changed

+9
-9
lines changed

5 files changed

+9
-9
lines changed

README.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -51,7 +51,7 @@
5151

5252
## Key Concepts
5353

54-
- **GATEWAY** – a Linux-based machine with Docker installed, a public IP address, and the following open ports: 80/tcp, 443/tcp, 4060/tcp, 51820/udp and 32420-32430/tcp+udp. This node acts as the ingress gateway and an entry point to your published services.
54+
- **GATEWAY** – a Linux-based machine with Docker installed, a public IP address, and the following open ports: 80/tcp, 443/tcp, 4060/tcp, 51820/udp and 32420-32421/tcp+udp. This node acts as the ingress gateway and an entry point to your published services.
5555
- **CLIENT** – any number of laptops/PCs that will connect to the WireGuard network to manage the ingress network and expose services from their local machines to the Internet.
5656
- **SERVER** *(optional)* – one or more Linux-based machines (with Docker) that run the workloads you want to expose. These nodes join the same private WireGuard network, provided by the GATEWAY.
5757

@@ -257,15 +257,15 @@ wireport gateway up sshuser@140.120.110.10:22 --ssh-key-path ~/.ssh/id_rsa --ssh
257257
* 80/tcp and 443/tcp (HTTP/HTTPS)
258258
* 4060/tcp (Wireport control channel)
259259
* 51820/udp (WireGuard)
260-
* 32420-32430/tcp+udp (reserved ports for exposing services with wireport)
260+
* 32420-32421/tcp+udp (reserved ports for exposing services with wireport)
261261

262262
Example with UFW:
263263

264264
```bash
265265
sudo ufw allow 22,80,443,4060/tcp
266266
sudo ufw allow 51820/udp
267-
sudo ufw allow 32420:32430/tcp
268-
sudo ufw allow 32420:32430/udp
267+
sudo ufw allow 32420:32421/tcp
268+
sudo ufw allow 32420:32421/udp
269269
sudo ufw enable
270270
```
271271

app/cmd/server/commands/service.go

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -72,7 +72,7 @@ var PublishServiceCmd = &cobra.Command{
7272
Long: `Publish a new public service that should be exposed to the Internet.
7373
7474
Supported protocols: tcp, udp, http, https
75-
Supported public ports: 80, 443, 32420-32430 (tcp+udp; should be open in the firewall on the gateway node)
75+
Supported public ports: 80, 443, 32420-32421 (tcp+udp; should be open in the firewall on the gateway node)
7676
Supported local ports: any
7777
Supported local hosts: private IP addresses (e.g. 10.0.0.2) of CLIENT and SERVER nodes on wireport network
7878

app/cmd/server/main.go

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -20,7 +20,7 @@ var rootCmd = &cobra.Command{
2020
2121
Key Concepts:
2222
23-
- GATEWAY – a Linux-based machine with Docker installed, a public IP address, and the following open ports: 80/tcp, 443/tcp, 4060/tcp, 51820/udp and, optionally, 32420-32430/tcp+udp. This node acts as the ingress gateway and an entry point to your published services.
23+
- GATEWAY – a Linux-based machine with Docker installed, a public IP address, and the following open ports: 80/tcp, 443/tcp, 4060/tcp, 51820/udp and, optionally, 32420-32421/tcp+udp. This node acts as the ingress gateway and an entry point to your published services.
2424
- CLIENT – any number of laptops/PCs that will connect to the WireGuard network to manage the ingress network and expose services.
2525
- SERVER (optional) – one or more Linux-based machines (with Docker) that run the workloads you want to expose. These nodes join the same private WireGuard network, provided by the GATEWAY.
2626
@@ -47,7 +47,7 @@ Now you should be able to access the Docker-based services from your local machi
4747
4848
If the installation process fails, or the service is not accessible over the Internet, make sure that:
4949
50-
- the required ports are open on the gateway VPS (80/tcp, 443/tcp, 4060/tcp, 51820/udp and, optionally, 32420-32430/tcp+udp)
50+
- the required ports are open on the gateway VPS (80/tcp, 443/tcp, 4060/tcp, 51820/udp and, optionally, 32420-32421/tcp+udp)
5151
- there's a correct DNS A-record, pointing to your gateway VPS
5252
- the gateway VPS has docker installed
5353
- the ssh user, used for bootstraping the gateway VPS, is allowed to run docker commands on the gateway VPS

app/internal/templates/scripts/up/gateway.hbs

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@ docker pull {{ wireportGatewayContainerImage }} && docker run -d -it --privilege
22
-p 80:80/tcp -p 443:443/tcp \
33
-p 51820:51820/udp \
44
-p 4060:4060/tcp \
5-
-p 32420-32430/tcp -p 32420-32430/udp \
5+
-p 32420-32421:32420-32421/tcp -p 32420-32421:32420-32421/udp \
66
-e DATABASE_PATH=/app/wireport/wireport.db \
77
-v /var/run/docker.sock:/var/run/docker.sock \
88
-v ~/.wireport-docker/gateway:/app/wireport \

app/internal/templates/scripts/upgrade/gateway.hbs

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ docker run -d -it --privileged --sysctl "net.ipv4.ip_forward=1" --sysctl "net.ip
55
-p 80:80/tcp -p 443:443/tcp \
66
-p 51820:51820/udp \
77
-p 4060:4060/tcp \
8-
-p 32420-32430/tcp -p 32420-32430/udp \
8+
-p 32420-32421:32420-32421/tcp -p 32420-32421:32420-32421/udp \
99
-e DATABASE_PATH=/app/wireport/wireport.db \
1010
-v /var/run/docker.sock:/var/run/docker.sock \
1111
-v ~/.wireport-docker/gateway:/app/wireport \

0 commit comments

Comments
 (0)