chore(deps): update docker.io/qmcgaw/gluetun docker tag to v3.40.0 #103
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
This PR contains the following updates:
v3.34.3->v3.40.0Warning
Some dependencies could not be looked up. Check the warning logs for more information.
Release Notes
qdm12/gluetun (docker.io/qmcgaw/gluetun)
v3.40.0Compare Source
Happy holidays release time 🎄 🎅 🎁
💁 If anything doesn't work compared to previous release, please create an issue and revert to using v3.39.1 😉
ℹ️ Life is pretty busy all around currently (moving soon, new job, ill parent) so I might be even slower than usual until summer 2025, I'll do my best!
Features
WaitForDNSbefore querying the public ip address (partly address #2325)VPN_PORT_FORWARDING_UP_COMMANDoption (#2399)VPN_PORT_FORWARDING_DOWN_COMMANDoptionconnection refusederror is encountered (partly address #2325)echoip#https://...(#2529)ifconfigcooption andcloudflareoption (#2502)PUBLICIP_ENABLEDreplacesPUBLICIP_PERIODPUBLICIP_ENABLED(on, off) can be set to enable or not public ip data fetching on VPN connectionPUBLICIP_PERIOD=0still works to indicate to disable public ip fetchingPUBLICIP_PERIOD!= 0 means to enable public ip fetchingPUBLICIP_PERIODSTORAGE_FILEPATHoption (#2416)STORAGE_FILEPATH=disables storing to and reading from a local servers.json fileSTORAGE_FILEPATHdefaults to/gluetun/servers.jsoninternal/tun: mention in 'operation not permitted' error the user should specify--device /dev/net/tun(resolves #2606)genkeycommand to generate API keysaes-256-gcmto OpenVPN ciphers listformat-serverscommand supports the json format optionFixes
WIREGUARD_MTUfrom1400to1320(partially address #2533)-nflag for testing iptables path (#2574)comp-lzooptionDocumentation
OPENVPN_MSSFIXenvironment variableSTREAM_ONLYFREE_ONLYPORT_FORWARD_ONLYis for both PIA and ProtonVPNMaintenance
Code quality
github.com/qdm12/golibs/commandlocally (#2418)internal/natpmp: fix determinism for testTest_Client_ExternalAddressinternal/routing: remove redundantrule ip rulein error messagesinternal/netlinkdebug log ip rule commands in netlink instead of routing packageinternal/server: move log middleware tointernal/server/middlewares/loggofumptfor code formattingexecinqueryandexportlooprefgoerr113toerr113andgomndtomndcanonicalheader,copyloopvar,fatcontext,intrangeDependencies
VPN_PORT_FORWARDING_UP_COMMANDCI
canonicalheadersince it's not reliable--device /dev/net/tunfor test containerDevelopment setup
:v0.20-alpinedevcontainer.jsonsettings directlyv3.39.1Compare Source
🎥 https://youtu.be/O09rP1DlcFU?si=qPdzWUWnzciNxAc7
Fixes
internal/storage: add missing selection fields to buildnoServerFoundError(see #2470)v3.39.0Compare Source
🎥 Youtube video explaining all this
Features
iptables)iptables-nftoveriptables-legacy(Alpine new default is nft backend iptables)WIREGUARD_PERSISTENT_KEEPALIVE_INTERVALoptionVPN_PORT_FORWARDING=on(applies only to PIA and ProtonVPN for now)SERVER_CITYVPN_PORT_FORWARDING=on(#2378)VPN_PORT_FORWARDING_USERNAMEandVPN_PORT_FORWARDING_PASSWORD(retro-compatible withOPENVPN_USERandOPENVPN_PASSWORD)SECURE_CORE_ONLY,TOR_ONLYandPORT_FORWARD_ONLY(#2182)VPN_ENDPOINT_IPsplit intoOPENVPN_ENDPOINT_IPandWIREGUARD_ENDPOINT_IPVPN_ENDPOINT_PORTsplit intoOPENVPN_ENDPOINT_PORTandWIREGUARD_ENDPOINT_PORTFixes
VPN_PORT_FORWARDING_LISTENING_PORTfixedportoption line for OpenVPNN / Awith no data for serversinternal/server:/openvpnroute status get and putPORT_FORWARD_ONLYis enabled in the server filtering tree of settingsformat-serversfixed missing VPN type header for providers supporting Wireguard: NordVPN and Surfsharkinternal/tun: only create tun device if it does not exist, do not create if it exists and does not workDocumentation
/choosesuffix to github links in logsFIREWALL_ENABLEDtoFIREWALL_ENABLED_DISABLING_IT_SHOOTS_YOU_IN_YOUR_FOOTdue to the sheer amount of users misusing it.FIREWALL_ENABLEDwon't do anything anymore. At least you've been warned not to use it...Maintenance
internal/config:github.com/qdm12/gosettingsv0.4.2github.com/qdm12/govaliddependencygithub.com/qdm12/ss-serverto v0.6.0CONTROL_SERVER_ADDRESSandCONTROL_SERVER_PORTinternal/portforward: support multiple ports forwardedinternal/tun: fix unit test for unprivileged usersource.organizeImportsvscode setting value/choosesuffix to issue and discussion linksv3.38.1Compare Source
ℹ️ This is a bugfix release for v3.38.0. If you can, please instead use release v3.39.0
Fixes
VPN_PORT_FORWARDING_LISTENING_PORTfixedportoption line for OpenVPNN / Awith no data for serversinternal/server:/openvpnroute status get and putPORT_FORWARD_ONLYis enabled in the server filtering tree of settingsformat-serversfixed missing VPN type header for providers supporting Wireguard: NordVPN and Surfsharkinternal/tun: only create tun device if it does not exist, do not create if it exists and does not workv3.38.0Compare Source
Features
PUBLICIP_API_TOKENvariablePUBLICIP_APIvariable supportingipinfoandip2locationPORT_FORWARD_ONLYvariable (#2070)SERVER_CATEGORIES(#1806)/run/secrets/wg0.confwhich can be changed with variableWIREGUARD_CONF_SECRETFILE0.0.0.0/0or::/0) for outbound subnetsFixes
STREAM_ONLYbehavior fixed (#2126)Maintenance
v3.37.1Compare Source
ℹ️ This is a bugfix release for v3.37.0. If you can, please instead use the newer v3.39.0 release.
Fixes
VPN_PORT_FORWARDING_LISTENING_PORTfixedSTREAM_ONLYbehavior fixed (#2126)portoption line for OpenVPNN / Awith no data for serversinternal/server:/openvpnroute status get and putformat-serversfixed missing VPN type header for providers supporting Wireguard: NordVPN and Surfsharkinternal/tun: only create tun device if it does not exist, do not create if it exists and does not workPS: sorry for re-releasing this one 3 times, CI has been capricious with passing
v3.37.0Compare Source
🎉 🎆 Happy new year 2024 🎉 🎆 Personal note at the bottom 😉
Features
VPN_PORT_FORWARDING_LISTENING_PORTFixes
tcp-clientprotocol astcpDEFAULT:@​SECLEVEL=0server nameheader for PIAMaintenance
Personal note on the state of Gluetun
I have been focusing my effort since mid November on a DNSSEC validator to finalize a Go library on par with the usage we have of Unbound, in order to replace Unbound in Gluetun and add DNS special features for Gluetun. For example:
This is a tough problem not so well documented with few complete and valid implementations, so it's taking some time. There is likely 2 more weeks of work left before finalization.
v3.36.0Compare Source
🎃 Happy Halloween 🎃 Hopefully it is not a spooky release! 😸
Features
WIREGUARD_ALLOWED_IPSvariable (#1291)/gluetun/wireguard/wg0.conf(#1120)VPN_PORT_FORWARDING_PROVIDERvariable (#1616)-minratioif not enough servers are found/32if not present for Wireguard addressesFixes
DNS_KEEP_NAMESERVERleaves DNS fully untouchedupdatecommand uses dashes instead of spaces for provider names (i.e.-vpn\ unlimited->-vpn-unlimited)aes-256-gcmcipher for OpenVPNVPNLocalGatewayIPWireguard supportDocumentation
UPDATER_VPN_SERVICE_PROVIDERSin docker-compose configMaintenance
OPENVPN_PROCESS_USERvalue defaults torootHTTPPROXY_STEALTH=offHTTP_CONTROL_SERVER_LOG=oninternal/settings: change source precedence order: Secret files then files then environment variablesinternal/routing: WrapsetupIPv6rule error correctlyinternal/vpn: fix typoportForwader->portForwarderinternal/provider: use type assertion for port forwardersMarkdown*.mdfiles onlyv3.35.0Compare Source
➡️ 📖 Corresponding wiki
Features
WIREGUARD_MTUenviromnent variable (#1571)OPENVPN_VERSION=2.6supportFixes
RouteListlist routes from all tables and does no longer filter by linkAddrReplaceinstead ofAddrAddDocumentation
Maintenance
Code
internal/routing:IPIsPrivateasipIsPrivateVPNDestinationIPinternal/settings: usegithub.com/qdm12/gosettingsFileExists,ObfuscateKey,BoolToYesNogosettings/sources/envfunctionsinternal/netlink:github.com/vishvananda/netlinkinternal/httpproxy: addTest_returnRedirectto prevent error wrap ofErrUseLastResponseinternal/settings/secrets: add test forreadSecretFileAsStringPtrDependencies
CI
Development tooling
linuxfor cross development.vscoderecommendationsdupword,paralleltest,gosmopolitan,mirror,tagalign,zerologlintandgocheckcompilerdirectivesmusttagand fix lint errors (change JSON fields in control server)Configuration
📅 Schedule: Branch creation - At any time (no schedule defined), Automerge - At any time (no schedule defined).
🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.
♻ Rebasing: Whenever PR becomes conflicted, or you tick the rebase/retry checkbox.
🔕 Ignore: Close this PR and you won't be reminded about this update again.
This PR has been generated by Renovate Bot.