Jamil a91c2db887 0.3.0 (#465)
* Found endpoint empty bug

* Fix use_site_ bugs

* Generate private keys client-side instead of on the Firezone server (#451)

* Rename events; add crypto lib

* seemingly working keygen

* Checkpoint

* Remove private key from devices; make tests pass

* Refactor auth to use simplified new router helper

* Fix js bundle

* Refactor event listeners into their own file

* Refactor settings

* Fix JS

* Working live views in unprivileged sections

* Rough draft working

* Checkpoint before fixing tests

* Tests passing

* Max devices per user configuration option (#471)

* Max tunnels per user configuration option

* Clean up remaining tunnel references

* Replace local auth system with Ueberauth / Guardian (#475)

* Checkpoint working authentication

* Working admin and unprivileged auth using Guardian

* Remove Sessions cruft

* More cleanup

* load new secrets

* Remove firezone tmp dirs

* Okta and Google Oauth (#485)

* working oauth!

* Remove keycloak; working google

* Ensure nil to_s

* Passing tests

* Add compile-time prod config

* Fix live_view typo

* Revert key_ttl to vpn_session_duration

* print logs after first configure

* Use get_env/1 for fetching optional config vars

* Disable telemetry from config

* miss the to_s

* Fix sign in page

* add tunnel admin guide

* auth path

* Fix tests

* Device editing no more (#491)
2022-03-04 09:32:13 -08:00
2022-03-04 09:32:13 -08:00
2022-03-04 09:32:13 -08:00
2022-03-04 09:32:13 -08:00
2022-03-04 09:32:13 -08:00
2022-03-04 09:32:13 -08:00
2022-03-04 09:32:13 -08:00
2022-03-04 09:32:13 -08:00
2020-04-21 20:49:55 -07:00
2022-02-24 15:44:02 -08:00
2022-02-05 15:42:25 -08:00
2020-11-04 10:14:20 -06:00
2022-02-05 15:42:25 -08:00
2022-01-28 11:31:06 -08:00
2021-09-25 14:25:52 -07:00
2022-01-26 08:46:53 -08:00
2020-04-21 20:49:55 -07:00
2022-03-04 09:32:13 -08:00
2022-02-09 09:40:05 -08:00
2022-01-18 12:04:31 -08:00

firezone logo

firezone Discourse firezone Coverage Status follow on Twitter

Firezone is a self-managed WireGuard-based VPN server and Linux firewall designed for simplicity and security.


Get Started

Follow our installation guide at https://docs.firez.one/docs/deploy to install your self-hosted instance of Firezone.

Using Firezone for your team? We'd love to hear from you and help you get set up.

What is Firezone?

Firezone is a Linux package to manage your WireGuard VPN through a simple web interface.

firezone-usage

Features

  • Fast: Uses WireGuard to be 3-4 times faster than OpenVPN.
  • No dependencies: All dependencies are bundled thanks to Chef Omnibus.
  • Simple: Takes minutes to set up. Manage via a simple CLI.
  • Secure: Runs unprivileged. HTTPS enforced. Encrypted cookies.
  • Firewall included: Uses Linux nftables to block unwanted egress traffic.

Anti-features

Firezone is not:

  • An inbound firewall
  • A tool for creating mesh networks
  • A full-featured router
  • An IPSec or OpenVPN server

Documentation

Additional documentation on general usage, troubleshooting, and configuration can be found at https://docs.firez.one/.

Get Help

If you're looking for help installing and configuring Firezone, we're happy to help:

Developing and Contributing

See CONTRIBUTING.md.

Security

See SECURITY.md.

License

See LICENSE.

WireGuard® is a registered trademark of Jason A. Donenfeld.

Description
No description provided
Readme Apache-2.0 169 MiB
Languages
Elixir 57.1%
Rust 29.2%
TypeScript 5.9%
Swift 3.3%
Kotlin 1.8%
Other 2.5%