Tunneled Mesh Reverse Proxy Server with Identity and Access Control and Dashboard UI https://fossorial.io
Find a file
2025-01-01 23:03:15 -05:00
bruno Newt registration? 2024-11-15 21:53:58 -05:00
install refactor and reorganize 2025-01-01 21:41:31 -05:00
public/screenshots first readme 2025-01-01 23:03:15 -05:00
server first readme 2025-01-01 23:03:15 -05:00
src refactor and reorganize 2025-01-01 21:41:31 -05:00
.dockerignore Basic setup script working? 2024-12-26 18:26:08 -05:00
.editorconfig add .editorconfig and fix db imports in scripts 2024-09-28 17:42:07 -04:00
.eslintrc.json typescript issues and add eslint back 2024-11-24 11:52:46 -05:00
.gitignore refactor and reorganize 2025-01-01 21:41:31 -05:00
.nvmrc add shad 2024-10-06 09:55:45 -04:00
.prettierrc env context and refactor api support different ports 2024-12-12 22:46:58 -05:00
COMPLIANCE.md first readme 2025-01-01 23:03:15 -05:00
components.json Format files and fix http response 2024-10-06 18:05:20 -04:00
config.example.yml Edit session cookie 2024-12-27 00:46:19 -05:00
CONTRIBUTING.md first readme 2025-01-01 23:03:15 -05:00
docker-compose.example.yml Add setup script 2024-12-26 18:05:23 -05:00
Dockerfile use bottom sheet instead of vaul drawer 2024-12-30 15:48:34 -05:00
drizzle.config.ts refactor and reorganize 2025-01-01 21:41:31 -05:00
esbuild.mjs Merge branch 'main' of https://github.com/fosrl/pangolin 2024-12-26 11:45:39 -05:00
LICENSE first readme 2025-01-01 23:03:15 -05:00
Makefile Updates 2024-12-01 19:45:36 -05:00
next.config.mjs disable eslint in build mode bc it's annoying 2024-10-06 20:03:53 -04:00
package.json make config class and separate migrations script 2025-01-01 17:50:12 -05:00
postcss.config.mjs bootstrapped 2024-09-27 21:39:03 -04:00
README.md first readme 2025-01-01 23:03:15 -05:00
tailwind.config.ts Format files and fix http response 2024-10-06 18:05:20 -04:00
tsconfig.json migrate to next 15 and react 19 2024-10-23 13:30:23 -04:00

Pangolin

Pangolin is a self-hosted reverse proxy management server with identity and access management, designed to securely expose private resources through encrypted WireGuard tunnels. With Pangolin, you retain full control over your infrastructure while providing a user-friendly and feature-rich solution for managing proxies, authentication, and access, and simplifiy complex network setups.


Key Features

Secure Reverse Proxy Management

  • Expose private resources on your network without opening ports.
  • Built-in support for WireGuard tunnels for secure and efficient site-to-site connectivity.
  • Automated SSL certificates (https) via LetsEncrypt.

Identity & Access Management

  • Centralized authentication system using platform SSO. Users will only have to manage one login.
  • Create organizations, each with multiple sites, users, and roles.
  • Role-based access control to manage resource access permissions.
  • Authentication options include:
    • Email whitelisting with one-time passcodes.
    • Temporary, self-destructing share links.
    • Resource specific pin codes.
    • Resource specific passwords.

Modular Design

  • Extend functionality with existing Traefik plugins, such as Fail2Ban or CrowdSec, which integrate seamlessly.
  • Attach as many sites to the central server as you wish.

Flexible Deployment

  • Docker Compose-based setup for simplified deployment.
  • Future-proof installation script for streamlined setup and feature additions.
  • Run on any VPS.
  • Use your preferred WireGuard client to connect, or use Newt, our custom client for the best user experience.

Workflow Example

Deployment and Usage Example

  1. Deploy the Central Server:
    Deploy the Docker Compose stack containing Pangolin, Gerbil, and Traefik onto a VPS hosted on a cloud platform like Amazon EC2, DigitalOcean Droplet, or similar. There are many VPS hosting options available to suit your needs.

  2. Domain Configuration:
    Point your domain name to the VPS and configure Pangolin with your preferred settings.

  3. Connect Private Sites:

    • Install Newt or use another WireGuard client on private sites.
    • Establish a connection from these sites to the central server.
    • This approach allows you to securely expose resources even in environments where the ISP prevents port forwarding.
  4. Use Case Example - Bypassing Port Restrictions:
    Imagine private sites where the ISP restricts port forwarding. By connecting these sites to Pangolin via WireGuard, you can securely expose HTTP and HTTPS resources on the private network without any networking complexity.

  5. Use Case Example - IoT Networks:
    IoT networks are often fragmented and difficult to manage. By deploying Pangolin on a central server, you can connect all your IoT sites via Newt or another WireGuard client. This creates a simple, secure, and centralized way to access IoT resources without the need for intricate networking setups.


Similar Projects and Inspirations

Pangolin was inspired by several existing projects and concepts:

  • Cloudflare Tunnels:
    A similar approach to proxying private resources securely, but Pangolin is a self-hosted alternative, giving you full control over your infrastructure.

  • Authentic and Authelia:
    These projects inspired Pangolins centralized authentication system for proxies, enabling robust user and role management.


Screenshots

Here are some examples of Pangolin in action:

Authentication Example Connectivity Example Share Link Example
Authentication Connectivity Share Link
Sites Example Users Example
Sites Users

Technical Setup

Components Overview

Pangolins architecture consists of the following components, each designed to handle a specific aspect of the system:

  1. Pangolin (Management Application & Central Server):
    The central hub for managing users, roles, organizations, and resources. Pangolin handles authentication, access control, and API management.

  2. Gerbil (WireGuard Interface Management):
    Acts as the intermediary for managing WireGuard configurations. It creates and maintains the secure tunnels between sites and the Pangolin server.

  3. Traefik (Reverse Proxy):
    A high-performance, modular reverse proxy that routes requests to private resources. Traefik is widely adopted, and its plugin system allows further customization and security enhancements. For example:

    • Out-of-the-box compatibility with plugins like Fail2Ban or CrowdSec.
    • Enhanced security via our custom Traefik plugin Badger, which acts as an authentication bouncer.
  4. Newt (Minimal WireGuard Client):
    A lightweight client designed to run on the private network. Newt:

    • Connects to the Pangolin server via WebSocket for managing endpoints.
    • Facilitates networking through its connection to Gerbil over the encrypted tunnel.

Licensing

Pangolin is released under the ... license. For inquiries about commercial licensing, please contact us.

Contributions

Please see CONTRIBUTIONS in the repository for guidelines and best practices.