mirror of
https://github.com/adamwalach/openvpn-web-ui.git
synced 2026-04-25 04:46:24 +03:00
[GH-ISSUE #40] Delete an existing users #33
Labels
No labels
pull-request
No milestone
No project
No assignees
1 participant
Notifications
Due date
No due date set.
Dependencies
No dependencies set.
Reference
starred/openvpn-web-ui#33
Loading…
Add table
Add a link
Reference in a new issue
No description provided.
Delete branch "%!s()"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
Originally created by @3721518 on GitHub (Oct 19, 2022).
Original GitHub issue: https://github.com/adamwalach/openvpn-web-ui/issues/40
1,The Clients certificates generated through web-gui are not stored in the database, are they!!!
2,How do I delete an existing user!!!
@d3vilh commented on GitHub (Jan 10, 2023):
Hey @3721518 if you are still interesting, you can try to adopt my fork branch for this project.
It does include certificate revocation feature via GUI and OpenVPN back-end restart (as OpenVPN should be restarted to apply revocation).
@bnhf commented on GitHub (Jan 10, 2023):
@d3vilh
Looks like we've been working along the same lines in terms of updating this project. I started with a fork myself but moved it early last year to a standalone project. I've just completed another round of additional features, so if you have a chance check out what I've done and perhaps we can combine our efforts? Probably doesn't make too much sense for us to be duplicating our endeavors. :-)
I've done certificate revocation and removal as well, along with adding a password option to certificate creation. https:// is now an option for the web ui. I've moved OpenVPN support to 2.5.x along with the latest version of EasyRSA. Dark Theme, host-based OpenVPN support (required to support TAP), all kinds of fixes and upgrades. I'm currently working on adding password support for the Management Interface. It would be great if we could work together in the great spirit of open source!
https://github.com/bnhf/pivpn-tap-web-ui
@d3vilh commented on GitHub (Jan 10, 2023):
@bnhf seems everyone suddenly would have own and private VPN servers.
I did most of the things by my friend request, who is not much familiar with Linux, but would have same private VPN server with Pi-Hole on Raspberry-PI :)
BTW, we are using lot of the same features. You are welcome to grab password support from my repo, I pass it via Docker env to container with openvpn-web-ui, getting user and pass from Ansible config.
Here is main project Raspberry-Gateway.
@bnhf commented on GitHub (Jan 10, 2023):
@d3vilh
Also, I haven't updated the README since the improvements I did in December, so don't rely on the screenshots for supported features. You'll need to spin-up the container to get the whole picture. PiVPN has been my standard for an OpenVPN installation script on the host. Debian, Ubuntu, and Raspbian are supported, and OpenVPN 2.5.x or higher is required.
@bnhf commented on GitHub (Jan 10, 2023):
@d3vilh
Looks nice -- and I see that you are off in a somewhat different direction, focusing on the Raspberry Pi. And yes, it does seem that we've added many of the same features. I'll definitely take a look at what you did for Management Interface password support.
@bnhf commented on GitHub (Jan 10, 2023):
@d3vilh
I actually didn't realize the original username and password environment variables didn't work, so I may incorporate what you've done there. However, I was talking about password protecting the OpenVPN Management Interface, and since you're still using the original go-openvpn library there wouldn't be any password support. Not a big deal when you're using a two container stack, but starts to matter when you want to control a host-based instance of OpenVPN.
Also, I updated the screenshots in my repository to reflect some of the more recent work I've done if you want to take a look. Here's an example showing certificate management, which includes revoke, remove and create with passphrase protection:
Also, here's the updated status page with a couple of TAP clients connected. It's great to have TAP as an option for clients that support it: