chore(deps): update docker.io/qmcgaw/gluetun docker tag to v3.40.1 #288
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
This PR contains the following updates:
v3.32.0->v3.40.1Warning
Some dependencies could not be looked up. Check the Dependency Dashboard for more information.
Release Notes
qdm12/gluetun (docker.io/qmcgaw/gluetun)
v3.40.1Compare Source
Bug-fix-only release on top of v3.40.0.
v3.41.0 coming soon 🎉 If you have any issues with v3.40.0 please report it rather soon please 🙏 !
Fixes
PUBLICIP_ENABLEDis now respectedopenvpnconfigcommand no longer panics due to missingSetDefaultscallPS: sorry for the double notification, CI failed on the first release try
v3.40.0Compare Source
Happy holidays release time 🎄 🎅 🎁
💁 If anything doesn't work compared to previous release, please create an issue and revert to using v3.39.1 😉
ℹ️ Life is pretty busy all around currently (moving soon, new job, ill parent) so I might be even slower than usual until summer 2025, I'll do my best!
Features
WaitForDNSbefore querying the public ip address (partly address #2325)VPN_PORT_FORWARDING_UP_COMMANDoption (#2399)VPN_PORT_FORWARDING_DOWN_COMMANDoptionconnection refusederror is encountered (partly address #2325)echoip#https://...(#2529)ifconfigcooption andcloudflareoption (#2502)PUBLICIP_ENABLEDreplacesPUBLICIP_PERIODPUBLICIP_ENABLED(on, off) can be set to enable or not public ip data fetching on VPN connectionPUBLICIP_PERIOD=0still works to indicate to disable public ip fetchingPUBLICIP_PERIOD!= 0 means to enable public ip fetchingPUBLICIP_PERIODSTORAGE_FILEPATHoption (#2416)STORAGE_FILEPATH=disables storing to and reading from a local servers.json fileSTORAGE_FILEPATHdefaults to/gluetun/servers.jsoninternal/tun: mention in 'operation not permitted' error the user should specify--device /dev/net/tun(resolves #2606)genkeycommand to generate API keysaes-256-gcmto OpenVPN ciphers listformat-serverscommand supports the json format optionFixes
WIREGUARD_MTUfrom1400to1320(partially address #2533)-nflag for testing iptables path (#2574)comp-lzooptionDocumentation
OPENVPN_MSSFIXenvironment variableSTREAM_ONLYFREE_ONLYPORT_FORWARD_ONLYis for both PIA and ProtonVPNMaintenance
Code quality
github.com/qdm12/golibs/commandlocally (#2418)internal/natpmp: fix determinism for testTest_Client_ExternalAddressinternal/routing: remove redundantrule ip rulein error messagesinternal/netlinkdebug log ip rule commands in netlink instead of routing packageinternal/server: move log middleware tointernal/server/middlewares/loggofumptfor code formattingexecinqueryandexportlooprefgoerr113toerr113andgomndtomndcanonicalheader,copyloopvar,fatcontext,intrangeDependencies
VPN_PORT_FORWARDING_UP_COMMANDCI
canonicalheadersince it's not reliable--device /dev/net/tunfor test containerDevelopment setup
:v0.20-alpinedevcontainer.jsonsettings directlyv3.39.1Compare Source
🎥 https://youtu.be/O09rP1DlcFU?si=qPdzWUWnzciNxAc7
Fixes
internal/storage: add missing selection fields to buildnoServerFoundError(see #2470)v3.39.0Compare Source
🎥 Youtube video explaining all this
Features
iptables)iptables-nftoveriptables-legacy(Alpine new default is nft backend iptables)WIREGUARD_PERSISTENT_KEEPALIVE_INTERVALoptionVPN_PORT_FORWARDING=on(applies only to PIA and ProtonVPN for now)SERVER_CITYVPN_PORT_FORWARDING=on(#2378)VPN_PORT_FORWARDING_USERNAMEandVPN_PORT_FORWARDING_PASSWORD(retro-compatible withOPENVPN_USERandOPENVPN_PASSWORD)SECURE_CORE_ONLY,TOR_ONLYandPORT_FORWARD_ONLY(#2182)VPN_ENDPOINT_IPsplit intoOPENVPN_ENDPOINT_IPandWIREGUARD_ENDPOINT_IPVPN_ENDPOINT_PORTsplit intoOPENVPN_ENDPOINT_PORTandWIREGUARD_ENDPOINT_PORTFixes
VPN_PORT_FORWARDING_LISTENING_PORTfixedportoption line for OpenVPNN / Awith no data for serversinternal/server:/openvpnroute status get and putPORT_FORWARD_ONLYis enabled in the server filtering tree of settingsformat-serversfixed missing VPN type header for providers supporting Wireguard: NordVPN and Surfsharkinternal/tun: only create tun device if it does not exist, do not create if it exists and does not workDocumentation
/choosesuffix to github links in logsFIREWALL_ENABLEDtoFIREWALL_ENABLED_DISABLING_IT_SHOOTS_YOU_IN_YOUR_FOOTdue to the sheer amount of users misusing it.FIREWALL_ENABLEDwon't do anything anymore. At least you've been warned not to use it...Maintenance
internal/config:github.com/qdm12/gosettingsv0.4.2github.com/qdm12/govaliddependencygithub.com/qdm12/ss-serverto v0.6.0CONTROL_SERVER_ADDRESSandCONTROL_SERVER_PORTinternal/portforward: support multiple ports forwardedinternal/tun: fix unit test for unprivileged usersource.organizeImportsvscode setting value/choosesuffix to issue and discussion linksv3.38.1Compare Source
ℹ️ This is a bugfix release for v3.38.0. If you can, please instead use release v3.39.0
Fixes
VPN_PORT_FORWARDING_LISTENING_PORTfixedportoption line for OpenVPNN / Awith no data for serversinternal/server:/openvpnroute status get and putPORT_FORWARD_ONLYis enabled in the server filtering tree of settingsformat-serversfixed missing VPN type header for providers supporting Wireguard: NordVPN and Surfsharkinternal/tun: only create tun device if it does not exist, do not create if it exists and does not workv3.38.0Compare Source
Features
PUBLICIP_API_TOKENvariablePUBLICIP_APIvariable supportingipinfoandip2locationPORT_FORWARD_ONLYvariable (#2070)SERVER_CATEGORIES(#1806)/run/secrets/wg0.confwhich can be changed with variableWIREGUARD_CONF_SECRETFILE0.0.0.0/0or::/0) for outbound subnetsFixes
STREAM_ONLYbehavior fixed (#2126)Maintenance
v3.37.1Compare Source
ℹ️ This is a bugfix release for v3.37.0. If you can, please instead use the newer v3.39.0 release.
Fixes
VPN_PORT_FORWARDING_LISTENING_PORTfixedSTREAM_ONLYbehavior fixed (#2126)portoption line for OpenVPNN / Awith no data for serversinternal/server:/openvpnroute status get and putformat-serversfixed missing VPN type header for providers supporting Wireguard: NordVPN and Surfsharkinternal/tun: only create tun device if it does not exist, do not create if it exists and does not workPS: sorry for re-releasing this one 3 times, CI has been capricious with passing
v3.37.0Compare Source
🎉 🎆 Happy new year 2024 🎉 🎆 Personal note at the bottom 😉
Features
VPN_PORT_FORWARDING_LISTENING_PORTFixes
tcp-clientprotocol astcpDEFAULT:@​SECLEVEL=0server nameheader for PIAMaintenance
Personal note on the state of Gluetun
I have been focusing my effort since mid November on a DNSSEC validator to finalize a Go library on par with the usage we have of Unbound, in order to replace Unbound in Gluetun and add DNS special features for Gluetun. For example:
This is a tough problem not so well documented with few complete and valid implementations, so it's taking some time. There is likely 2 more weeks of work left before finalization.
v3.36.0Compare Source
🎃 Happy Halloween 🎃 Hopefully it is not a spooky release! 😸
Features
WIREGUARD_ALLOWED_IPSvariable (#1291)/gluetun/wireguard/wg0.conf(#1120)VPN_PORT_FORWARDING_PROVIDERvariable (#1616)-minratioif not enough servers are found/32if not present for Wireguard addressesFixes
DNS_KEEP_NAMESERVERleaves DNS fully untouchedupdatecommand uses dashes instead of spaces for provider names (i.e.-vpn\ unlimited->-vpn-unlimited)aes-256-gcmcipher for OpenVPNVPNLocalGatewayIPWireguard supportDocumentation
UPDATER_VPN_SERVICE_PROVIDERSin docker-compose configMaintenance
OPENVPN_PROCESS_USERvalue defaults torootHTTPPROXY_STEALTH=offHTTP_CONTROL_SERVER_LOG=oninternal/settings: change source precedence order: Secret files then files then environment variablesinternal/routing: WrapsetupIPv6rule error correctlyinternal/vpn: fix typoportForwader->portForwarderinternal/provider: use type assertion for port forwardersMarkdown*.mdfiles onlyv3.35.0Compare Source
➡️ 📖 Corresponding wiki
Features
WIREGUARD_MTUenviromnent variable (#1571)OPENVPN_VERSION=2.6supportFixes
RouteListlist routes from all tables and does no longer filter by linkAddrReplaceinstead ofAddrAddDocumentation
Maintenance
Code
internal/routing:IPIsPrivateasipIsPrivateVPNDestinationIPinternal/settings: usegithub.com/qdm12/gosettingsFileExists,ObfuscateKey,BoolToYesNogosettings/sources/envfunctionsinternal/netlink:github.com/vishvananda/netlinkinternal/httpproxy: addTest_returnRedirectto prevent error wrap ofErrUseLastResponseinternal/settings/secrets: add test forreadSecretFileAsStringPtrDependencies
CI
Development tooling
linuxfor cross development.vscoderecommendationsdupword,paralleltest,gosmopolitan,mirror,tagalign,zerologlintandgocheckcompilerdirectivesmusttagand fix lint errors (change JSON fields in control server)v3.34.3Compare Source
Just creating another bugfix release since released tag
v3.34.2was wrongly pointed to themasterbranch instead of thev3.34branch.I also deleted the previous release tag v3.34.2, re-created it and the v3.34.2 image will be overridden just in case.
For changes, check out the description of v3.34.2
v3.34.2Compare Source
Fixes
v3.34.1Compare Source
Fixes
net.IPNettonetip.Prefixconversion (fixes #1583)v3.34.0Compare Source
Features
HEALTH_SUCCESS_WAIT_DURATIONvariable, defaulting to 5sVPN_PORT_FORWARDING_STATUS_FILEVPN_PORT_FORWARDINGFixes
nilMaintenance
errors.Isinet.af/netaddrtonet/netipnetip.Prefixfor ip networks instead ofnet.IPNetandnetaddr.IPPrefixnetip.Addrinstead ofnet.IPnetip.AddrPortinstead of*net.UDPAddrinet.af/netaddrdependencygolang.org/x/netto0.10.0github.com/fatih/colorfrom1.14.1to1.15.0golangci-lintfromv1.51.2tov1.52.2github.com/vishvananda/netlinkfrom1.1.1-0.20211129163951-9ada19101fc5to1.2.1-beta.2golang.org/x/sysfrom0.7.0to0.8.0CopyNetipPrefixand settings/sources/envenvToIntfunction~/.gitconfigv3.33.0Compare Source
Features
WIREGUARD_IMPLEMENTATIONvariable which can beauto(default),userspaceorkernelspacegchr.io/qdm12/gluetunDocker image mirrorRTNETLINK answers: File existschanged to warning level with explanationLinux route add command failed:changed to warning level with explanationwgetpackage (fixes #1260, #1494 due to busybox's buggy wget)Important fixes
1on a program errorAES-256-GCMcipher443Documentation
gchr.io/qdm12/gluetunMinor fixes
github.com/breml/rootcertsfrom 0.2.8 to 0.2.10Maintenance
opensslinstalledgolangci-lintupgraded from v1.49.0 to v1.51.2github.com/stretchr/testifyupgraded from 1.8.1 to 1.8.2golang.org/x/textupgraded from 0.4.0 to 0.8.0github.com/fatih/colorupgraded from 1.13.0 to 1.14.1golang.org/x/sysupgraded from 0.3.0 to 0.6.0apk-toolsinternal/openvpn/extract: simplifyPEMextraction functioncannotandfailedprefixesunmarshalingtodecodingdocker/build-push-actionupgraded from 3.2.0 to 4.0.0Configuration
📅 Schedule: Branch creation - At any time (no schedule defined), Automerge - At any time (no schedule defined).
🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.
♻ Rebasing: Whenever PR becomes conflicted, or you tick the rebase/retry checkbox.
🔕 Ignore: Close this PR and you won't be reminded about this update again.
This PR was generated by Mend Renovate. View the repository job log.