Skip to Content
πŸš€ Wiredoor v1.6.0 now available - Ready to expose your private services? Get Started β†’
DocumentationAdvanced Configuration

Wiredoor Configuration

Wiredoor is configured through environment variables passed to the container (e.g. via docker-compose.yml). This page describes all available configuration options.


DNS Providers Integration

Wiredoor can integrate with external DNS providers to manage DNS zones automatically.

Cloudflare

To enable Cloudflare DNS management, Wiredoor requires a Cloudflare API Token with DNS edit permissions for the zones you want to use.

The token must include at least:

  • Zone β†’ DNS β†’ Edit

You can create a token at https://dash.cloudflare.com/profile/api-tokensΒ .

Make sure the token has access only to the specific zones you intend to manage for improved security.

VariableDescriptionRequiredExample
DNS_PROVIDERSet to cloudflare to enable Cloudflare DNS integration❌ Optionalcloudflare
CLOUDFLARE_API_TOKENAPI token with DNS edit permissions❌ Optional01ab23cd45ef6789ghij0123klmn4567opqrs890tuvwx

GoDaddy

To enable GoDaddy DNS integration, set the following environment variables:

VariableDescriptionRequiredExample
DNS_PROVIDERSet to godaddy to enable GoDaddy DNS integration❌ Optional
GODADDY_API_KEYGoDaddy API key❌ OptionalABCD1234EFGH5678
GODADDY_API_SECRETGoDaddy API secret❌ Optionala1b2c3d4e5f6g7h8i9j0k1l2m3n4o5p6q7r8s9t0u1v2w3x4y5z6

Advanced Environment Variables

VariableDescriptionRequiredExample
PRIVATE_KEYPrivate key to issue tokens, auto-generated for each environment by default❌ OptionalhtcVZnbD7yp8+z1R3vb6ww...gNrKNc/C7fkbHwBbw6uzIX61wLzlYg==
SERVER_LOGS_DIRCustom directory to store nginx logs inside the container❌ Optional/var/log/nginx

Volumes

Container PathPurposeExample Host Mapping
/dataPersistent configuration and runtime data./wiredoor-data
/etc/letsencryptStores Let’s Encrypt SSL certificates./wiredoor-certbot
/var/log/nginx(Optional) Stores NGINX access logs./wiredoor-logs

Network Ports

PortProtocolPurpose
80TCPHTTP traffic (used for Certbot validation)
443TCPHTTPS traffic
51820 (default)UDPWireGuard VPN connection
32760-32767 (optional)TCPPort range for exposing TCP services (controlled via TCP_SERVICES_PORT_RANGE)

You can change the VPN port or the TCP service range, but make sure those ports are open and accessible from the internet or from the client network.


Security Notes

  • ⚠️ Never expose your .env or docker-compose.yml with secrets in public repositories.
  • βœ… Use a .env file to define your environment variables securely.
  • πŸ“ Make sure to add .env to your .gitignore and restrict read access to it using filesystem permissions (e.g., chmod 600 .env).
  • πŸ”’ Avoid hardcoding secrets or tokens in version-controlled files.
Last updated on