Backend demo kit
Deploy your own backend for testing purposes
1. Bring containers up
1.1 Prepare docker-compose file
Demo backend kit is provided as a set of docker containers:
fendvpn-proxy - slightly modified official traefik containers with embedded configuration files.
fendvpn-demo - simplified implementation of authorizer and discovery services.
fendvpn-tunnel - tunnel management layer, it handles all clients tunnels.
To simplify deployment we provide example docker-compose file. Please, update variable DOMAIN_NAME according to your server public domain name. It's required to get proper SSL certificate.
1.2 Start containers
As soon as you've done with tuning docker-compose file to your needs, bring it up:
You can check containers status using docker ps
command, you should get something like this:
If default ports are not suitable for your environment, please change it in both docker-compose file and service configuration files (see next section).
2. Configure tunnel manager
2.1 Overview and first login
Tunnel manager by default stores its configuration under /opt/fendvpn/tunnel
folder. It has next subfolders:
config/
keeps settings and peers.trusted_rsa/
keeps currently configured trusted RSA public keys for verifying JWT.
Tunnel manager provides web-interface, you can open it by address https://<your_server_domain_name>
or by IP address (in this case, please, dismiss invalid certificate warning).
Default username is "admin" and generated password is written into logs during first start. You can get it using next command:
After logging in to web-interface, you can change this password. If you forget your password, just edit /opt/fendvpn/tunnel/config/settings.json
, remove option "admin_password_hash" and restart vpn-node container. After startup, it will generate new password again.
2.2 Configure Trusted RSA keys
If you're going to use our demo SDK or application, you'll need to configure trusted RSA keys on tunnel manager side (fendvpn-tunnel
).
Right after startup, fendvpn-demo
container generates his own pair of private and public keys. Initially, tunnel manager does not know about this key, you need to add it manually.
Get demo public key
Key Id is stored in file /opt/fendvpn/demo/settings.json under option
key_id
(it's in UUID format).Public key itself is stored in file /opt/fendvpn/demo/public.pem
Adding key to tunnel manager
Please, open tunnel manager web-interface, open page "Trusted keys", then click "Add new", provide key UUID and public key in PEM format (as stored in public.pem) and save changes.
2.3 Configure server IPv4
Tunneling service, by design, has to know the server's public ipv4 address. It's used to generate configuration for client side. Please, open tunneling manager web-interface, open "Settings" page and set "Server IPv4" option.
2.4 Fine-tune tunneling manager
You can fine-tune tunnel manager by updating /opt/fendvpn/tunnel/config/settings.json
file. See table below for options explanation.
Option name | Meaning | Default value |
log_level | Service logging level (debug, info, warning, error) | "debug" |
sqlite_path | Path to storage of peers | "/opt/fendvpn/tunnel/config/storage.sqlite" |
static_path | Path to web-interface files | "/opt/fendvpn/tunnel/web/" |
trusted_rsa_dir | Directory to store trusted RSA keys | "/opt/fendvpn/tunnel/trusted_rsa/" |
wireguard_name | Name of wireguard interface | fendwg0 |
admin_user_name | Administrator's login | admin |
admin_password_hash | Hash of administrator's password | Autogenerated |
wg_server_ipv4 | Public IP for accessing wireguard (added to connect response) | Empty |
wg_server_port | Public UDP port for accessing wireguard | 3000 |
wg_listen_port | Wireguard listening port | 3000 |
wg_keepalive | Wireguard keepalive value, seconds | 60 |
wg_subnet | Wireguard private subnet | "10.235.0.0/16" |
wg_private_key | Wireguard private key | Autogenerated |
ping_interval | Peer ping interval. | 600 |
connection_timeout | Maximum peer inactivity interval value, seconds | 3600 |
http_listen_port | HTTP service listening port | "0.0.0.0:8085" |
access_token_lifetime | Administrator's access token lifetime, seconds | 1800 |
dns | Array of DNS servers, sent to client | ["8.8.8.8", "8.8.4.4"] |
3. Fine-tune authorizer and discovery demo container
Warning! Authorizing and discovery demo suite is only designed to show functionality, and does not really provide secure operation!
Authorizer and discovery demo suite configuration options
Option name | Meaning | Default value |
project | Project name. Used for identifying specific project connection in JWT data. | "Demo project" |
key_id | JWT key identifier. | Autogenerated |
issuer | Issuer field of JWT. | "Demo authorizer" |
authorizer_name | Authorizer name. Used for user ID generation. | "demo" |
private_key_path | Path to private RSA key in PEM format (for JWT signing). | "/opt/fendvpn/demo/private.pem" |
public_key_path | Path to public RSA key in PEM format (used during initial configuration generation). | "/opt/fendvpn/demo/public.pem" |
Last updated