chore(portforward): move vpn gateway obtention within port forwarding service
This commit is contained in:
@@ -376,7 +376,7 @@ func _main(ctx context.Context, buildInfo models.BuildInformation,
|
|||||||
|
|
||||||
portForwardLogger := logger.New(log.SetComponent("port forwarding"))
|
portForwardLogger := logger.New(log.SetComponent("port forwarding"))
|
||||||
portForwardLooper := portforward.NewLoop(allSettings.VPN.Provider.PortForwarding,
|
portForwardLooper := portforward.NewLoop(allSettings.VPN.Provider.PortForwarding,
|
||||||
httpClient, firewallConf, portForwardLogger, puid, pgid)
|
routingConf, httpClient, firewallConf, portForwardLogger, puid, pgid)
|
||||||
portForwardRunError, _ := portForwardLooper.Start(context.Background())
|
portForwardRunError, _ := portForwardLooper.Start(context.Background())
|
||||||
|
|
||||||
unboundLogger := logger.New(log.SetComponent("dns"))
|
unboundLogger := logger.New(log.SetComponent("dns"))
|
||||||
|
|||||||
@@ -1,6 +1,9 @@
|
|||||||
package portforward
|
package portforward
|
||||||
|
|
||||||
import "context"
|
import (
|
||||||
|
"context"
|
||||||
|
"net/netip"
|
||||||
|
)
|
||||||
|
|
||||||
type Service interface {
|
type Service interface {
|
||||||
Start(ctx context.Context) (runError <-chan error, err error)
|
Start(ctx context.Context) (runError <-chan error, err error)
|
||||||
@@ -8,6 +11,10 @@ type Service interface {
|
|||||||
GetPortForwarded() (port uint16)
|
GetPortForwarded() (port uint16)
|
||||||
}
|
}
|
||||||
|
|
||||||
|
type Routing interface {
|
||||||
|
VPNLocalGatewayIP(vpnInterface string) (gateway netip.Addr, err error)
|
||||||
|
}
|
||||||
|
|
||||||
type PortAllower interface {
|
type PortAllower interface {
|
||||||
SetAllowedPort(ctx context.Context, port uint16, intf string) (err error)
|
SetAllowedPort(ctx context.Context, port uint16, intf string) (err error)
|
||||||
RemoveAllowedPort(ctx context.Context, port uint16) (err error)
|
RemoveAllowedPort(ctx context.Context, port uint16) (err error)
|
||||||
|
|||||||
@@ -16,6 +16,7 @@ type Loop struct {
|
|||||||
settingsMutex sync.RWMutex
|
settingsMutex sync.RWMutex
|
||||||
service Service
|
service Service
|
||||||
// Fixed injected objets
|
// Fixed injected objets
|
||||||
|
routing Routing
|
||||||
client *http.Client
|
client *http.Client
|
||||||
portAllower PortAllower
|
portAllower PortAllower
|
||||||
logger Logger
|
logger Logger
|
||||||
@@ -30,13 +31,14 @@ type Loop struct {
|
|||||||
runDone <-chan struct{}
|
runDone <-chan struct{}
|
||||||
}
|
}
|
||||||
|
|
||||||
func NewLoop(settings settings.PortForwarding,
|
func NewLoop(settings settings.PortForwarding, routing Routing,
|
||||||
client *http.Client, portAllower PortAllower,
|
client *http.Client, portAllower PortAllower,
|
||||||
logger Logger, uid, gid int) *Loop {
|
logger Logger, uid, gid int) *Loop {
|
||||||
return &Loop{
|
return &Loop{
|
||||||
settings: service.Settings{
|
settings: service.Settings{
|
||||||
UserSettings: settings,
|
UserSettings: settings,
|
||||||
},
|
},
|
||||||
|
routing: routing,
|
||||||
client: client,
|
client: client,
|
||||||
portAllower: portAllower,
|
portAllower: portAllower,
|
||||||
logger: logger,
|
logger: logger,
|
||||||
@@ -85,7 +87,7 @@ func (l *Loop) run(runCtx context.Context, runDone chan<- struct{},
|
|||||||
}
|
}
|
||||||
|
|
||||||
l.settingsMutex.RLock()
|
l.settingsMutex.RLock()
|
||||||
l.service = service.New(l.settings, l.client,
|
l.service = service.New(l.settings, l.routing, l.client,
|
||||||
l.portAllower, l.logger, l.uid, l.gid)
|
l.portAllower, l.logger, l.uid, l.gid)
|
||||||
l.settingsMutex.RUnlock()
|
l.settingsMutex.RUnlock()
|
||||||
|
|
||||||
|
|||||||
@@ -2,6 +2,9 @@ package service
|
|||||||
|
|
||||||
import (
|
import (
|
||||||
"context"
|
"context"
|
||||||
|
"net/netip"
|
||||||
|
|
||||||
|
"github.com/qdm12/gluetun/internal/provider/utils"
|
||||||
)
|
)
|
||||||
|
|
||||||
type PortAllower interface {
|
type PortAllower interface {
|
||||||
@@ -9,8 +12,19 @@ type PortAllower interface {
|
|||||||
RemoveAllowedPort(ctx context.Context, port uint16) (err error)
|
RemoveAllowedPort(ctx context.Context, port uint16) (err error)
|
||||||
}
|
}
|
||||||
|
|
||||||
|
type Routing interface {
|
||||||
|
VPNLocalGatewayIP(vpnInterface string) (gateway netip.Addr, err error)
|
||||||
|
}
|
||||||
|
|
||||||
type Logger interface {
|
type Logger interface {
|
||||||
Info(s string)
|
Info(s string)
|
||||||
Warn(s string)
|
Warn(s string)
|
||||||
Error(s string)
|
Error(s string)
|
||||||
}
|
}
|
||||||
|
|
||||||
|
type PortForwarder interface {
|
||||||
|
Name() string
|
||||||
|
PortForward(ctx context.Context, objects utils.PortForwardObjects) (
|
||||||
|
port uint16, err error)
|
||||||
|
KeepPortForward(ctx context.Context, objects utils.PortForwardObjects) (err error)
|
||||||
|
}
|
||||||
|
|||||||
@@ -15,6 +15,7 @@ type Service struct {
|
|||||||
puid int
|
puid int
|
||||||
pgid int
|
pgid int
|
||||||
// Fixed injected objets
|
// Fixed injected objets
|
||||||
|
routing Routing
|
||||||
client *http.Client
|
client *http.Client
|
||||||
portAllower PortAllower
|
portAllower PortAllower
|
||||||
logger Logger
|
logger Logger
|
||||||
@@ -24,7 +25,7 @@ type Service struct {
|
|||||||
keepPortDoneCh <-chan struct{}
|
keepPortDoneCh <-chan struct{}
|
||||||
}
|
}
|
||||||
|
|
||||||
func New(settings Settings, client *http.Client,
|
func New(settings Settings, routing Routing, client *http.Client,
|
||||||
portAllower PortAllower, logger Logger, puid, pgid int) *Service {
|
portAllower PortAllower, logger Logger, puid, pgid int) *Service {
|
||||||
return &Service{
|
return &Service{
|
||||||
// Fixed parameters
|
// Fixed parameters
|
||||||
@@ -32,6 +33,7 @@ func New(settings Settings, client *http.Client,
|
|||||||
puid: puid,
|
puid: puid,
|
||||||
pgid: pgid,
|
pgid: pgid,
|
||||||
// Fixed injected objets
|
// Fixed injected objets
|
||||||
|
routing: routing,
|
||||||
client: client,
|
client: client,
|
||||||
portAllower: portAllower,
|
portAllower: portAllower,
|
||||||
logger: logger,
|
logger: logger,
|
||||||
|
|||||||
@@ -3,21 +3,18 @@ package service
|
|||||||
import (
|
import (
|
||||||
"errors"
|
"errors"
|
||||||
"fmt"
|
"fmt"
|
||||||
"net/netip"
|
|
||||||
|
|
||||||
"github.com/qdm12/gluetun/internal/configuration/settings"
|
"github.com/qdm12/gluetun/internal/configuration/settings"
|
||||||
"github.com/qdm12/gluetun/internal/constants/providers"
|
"github.com/qdm12/gluetun/internal/constants/providers"
|
||||||
"github.com/qdm12/gluetun/internal/provider"
|
|
||||||
"github.com/qdm12/gosettings"
|
"github.com/qdm12/gosettings"
|
||||||
)
|
)
|
||||||
|
|
||||||
type Settings struct {
|
type Settings struct {
|
||||||
UserSettings settings.PortForwarding
|
UserSettings settings.PortForwarding
|
||||||
PortForwarder provider.PortForwarder
|
PortForwarder PortForwarder
|
||||||
Gateway netip.Addr // needed for PIA and ProtonVPN
|
Interface string // needed for PIA and ProtonVPN, tun0 for example
|
||||||
ServerName string // needed for PIA
|
ServerName string // needed for PIA
|
||||||
Interface string // needed for PIA and ProtonVPN, tun0 for example
|
VPNProvider string // used to validate new settings
|
||||||
VPNProvider string // used to validate new settings
|
|
||||||
}
|
}
|
||||||
|
|
||||||
// UpdateWith deep copies the receiving settings, overrides the copy with
|
// UpdateWith deep copies the receiving settings, overrides the copy with
|
||||||
@@ -37,9 +34,8 @@ func (s Settings) UpdateWith(partialUpdate Settings) (updatedSettings Settings,
|
|||||||
func (s Settings) copy() (copied Settings) {
|
func (s Settings) copy() (copied Settings) {
|
||||||
copied.UserSettings = s.UserSettings.Copy()
|
copied.UserSettings = s.UserSettings.Copy()
|
||||||
copied.PortForwarder = s.PortForwarder
|
copied.PortForwarder = s.PortForwarder
|
||||||
copied.Gateway = s.Gateway
|
|
||||||
copied.ServerName = s.ServerName
|
|
||||||
copied.Interface = s.Interface
|
copied.Interface = s.Interface
|
||||||
|
copied.ServerName = s.ServerName
|
||||||
copied.VPNProvider = s.VPNProvider
|
copied.VPNProvider = s.VPNProvider
|
||||||
return copied
|
return copied
|
||||||
}
|
}
|
||||||
@@ -47,9 +43,8 @@ func (s Settings) copy() (copied Settings) {
|
|||||||
func (s *Settings) overrideWith(update Settings) {
|
func (s *Settings) overrideWith(update Settings) {
|
||||||
s.UserSettings.OverrideWith(update.UserSettings)
|
s.UserSettings.OverrideWith(update.UserSettings)
|
||||||
s.PortForwarder = gosettings.OverrideWithInterface(s.PortForwarder, update.PortForwarder)
|
s.PortForwarder = gosettings.OverrideWithInterface(s.PortForwarder, update.PortForwarder)
|
||||||
s.Gateway = gosettings.OverrideWithValidator(s.Gateway, update.Gateway)
|
|
||||||
s.ServerName = gosettings.OverrideWithString(s.ServerName, update.ServerName)
|
|
||||||
s.Interface = gosettings.OverrideWithString(s.Interface, update.Interface)
|
s.Interface = gosettings.OverrideWithString(s.Interface, update.Interface)
|
||||||
|
s.ServerName = gosettings.OverrideWithString(s.ServerName, update.ServerName)
|
||||||
s.VPNProvider = gosettings.OverrideWithString(s.VPNProvider, update.VPNProvider)
|
s.VPNProvider = gosettings.OverrideWithString(s.VPNProvider, update.VPNProvider)
|
||||||
}
|
}
|
||||||
|
|
||||||
@@ -69,8 +64,6 @@ func (s *Settings) validate() (err error) {
|
|||||||
return fmt.Errorf("%w", ErrServerNameNotSet)
|
return fmt.Errorf("%w", ErrServerNameNotSet)
|
||||||
case s.PortForwarder == nil:
|
case s.PortForwarder == nil:
|
||||||
return fmt.Errorf("%w", ErrPortForwarderNotSet)
|
return fmt.Errorf("%w", ErrPortForwarderNotSet)
|
||||||
case !s.Gateway.IsValid():
|
|
||||||
return fmt.Errorf("%w", ErrGatewayNotSet)
|
|
||||||
case s.Interface == "":
|
case s.Interface == "":
|
||||||
return fmt.Errorf("%w", ErrInterfaceNotSet)
|
return fmt.Errorf("%w", ErrInterfaceNotSet)
|
||||||
}
|
}
|
||||||
|
|||||||
@@ -3,6 +3,8 @@ package service
|
|||||||
import (
|
import (
|
||||||
"context"
|
"context"
|
||||||
"fmt"
|
"fmt"
|
||||||
|
|
||||||
|
"github.com/qdm12/gluetun/internal/provider/utils"
|
||||||
)
|
)
|
||||||
|
|
||||||
func (s *Service) Start(ctx context.Context) (runError <-chan error, err error) {
|
func (s *Service) Start(ctx context.Context) (runError <-chan error, err error) {
|
||||||
@@ -14,8 +16,19 @@ func (s *Service) Start(ctx context.Context) (runError <-chan error, err error)
|
|||||||
}
|
}
|
||||||
|
|
||||||
s.logger.Info("starting")
|
s.logger.Info("starting")
|
||||||
port, err := s.settings.PortForwarder.PortForward(ctx, s.client, s.logger,
|
|
||||||
s.settings.Gateway, s.settings.ServerName)
|
gateway, err := s.routing.VPNLocalGatewayIP(s.settings.Interface)
|
||||||
|
if err != nil {
|
||||||
|
return nil, fmt.Errorf("getting VPN local gateway IP: %w", err)
|
||||||
|
}
|
||||||
|
|
||||||
|
obj := utils.PortForwardObjects{
|
||||||
|
Logger: s.logger,
|
||||||
|
Gateway: gateway,
|
||||||
|
Client: s.client,
|
||||||
|
ServerName: s.settings.ServerName,
|
||||||
|
}
|
||||||
|
port, err := s.settings.PortForwarder.PortForward(ctx, obj)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return nil, fmt.Errorf("port forwarding for the first time: %w", err)
|
return nil, fmt.Errorf("port forwarding for the first time: %w", err)
|
||||||
}
|
}
|
||||||
@@ -43,18 +56,17 @@ func (s *Service) Start(ctx context.Context) (runError <-chan error, err error)
|
|||||||
keepPortDoneCh := make(chan struct{})
|
keepPortDoneCh := make(chan struct{})
|
||||||
s.keepPortDoneCh = keepPortDoneCh
|
s.keepPortDoneCh = keepPortDoneCh
|
||||||
|
|
||||||
go func(ctx context.Context, settings Settings, port uint16,
|
go func(ctx context.Context, portForwarder PortForwarder,
|
||||||
runError chan<- error, doneCh chan<- struct{}) {
|
obj utils.PortForwardObjects, runError chan<- error, doneCh chan<- struct{}) {
|
||||||
defer close(doneCh)
|
defer close(doneCh)
|
||||||
err = settings.PortForwarder.KeepPortForward(ctx, port,
|
err = portForwarder.KeepPortForward(ctx, obj)
|
||||||
settings.Gateway, settings.ServerName, s.logger)
|
|
||||||
crashed := ctx.Err() == nil
|
crashed := ctx.Err() == nil
|
||||||
if !crashed { // stopped by Stop call
|
if !crashed { // stopped by Stop call
|
||||||
return
|
return
|
||||||
}
|
}
|
||||||
_ = s.cleanup()
|
_ = s.cleanup()
|
||||||
runError <- err
|
runError <- err
|
||||||
}(keepPortCtx, s.settings, port, runErrorCh, keepPortDoneCh)
|
}(keepPortCtx, s.settings.PortForwarder, obj, runErrorCh, keepPortDoneCh)
|
||||||
|
|
||||||
return runErrorCh, nil
|
return runErrorCh, nil
|
||||||
}
|
}
|
||||||
|
|||||||
@@ -22,30 +22,33 @@ import (
|
|||||||
)
|
)
|
||||||
|
|
||||||
var (
|
var (
|
||||||
ErrServerNameNotFound = errors.New("server name not found in servers")
|
ErrServerNameNotFound = errors.New("server name not found in servers")
|
||||||
ErrGatewayIPIsNotValid = errors.New("gateway IP address is not valid")
|
|
||||||
ErrServerNameEmpty = errors.New("server name is empty")
|
|
||||||
)
|
)
|
||||||
|
|
||||||
// PortForward obtains a VPN server side port forwarded from PIA.
|
// PortForward obtains a VPN server side port forwarded from PIA.
|
||||||
func (p *Provider) PortForward(ctx context.Context, client *http.Client,
|
func (p *Provider) PortForward(ctx context.Context,
|
||||||
logger utils.Logger, gateway netip.Addr, serverName string) (
|
objects utils.PortForwardObjects) (port uint16, err error) {
|
||||||
port uint16, err error) {
|
switch {
|
||||||
|
case objects.ServerName == "":
|
||||||
|
panic("server name cannot be empty")
|
||||||
|
case !objects.Gateway.IsValid():
|
||||||
|
panic("gateway is not set")
|
||||||
|
}
|
||||||
|
|
||||||
|
serverName := objects.ServerName
|
||||||
|
|
||||||
server, ok := p.storage.GetServerByName(providers.PrivateInternetAccess, serverName)
|
server, ok := p.storage.GetServerByName(providers.PrivateInternetAccess, serverName)
|
||||||
if !ok {
|
if !ok {
|
||||||
return 0, fmt.Errorf("%w: %s", ErrServerNameNotFound, serverName)
|
return 0, fmt.Errorf("%w: %s", ErrServerNameNotFound, serverName)
|
||||||
}
|
}
|
||||||
|
|
||||||
|
logger := objects.Logger
|
||||||
|
|
||||||
if !server.PortForward {
|
if !server.PortForward {
|
||||||
logger.Error("The server " + serverName +
|
logger.Error("The server " + serverName +
|
||||||
" (region " + server.Region + ") does not support port forwarding")
|
" (region " + server.Region + ") does not support port forwarding")
|
||||||
return 0, nil
|
return 0, nil
|
||||||
}
|
}
|
||||||
if !gateway.IsValid() {
|
|
||||||
return 0, fmt.Errorf("%w: %s", ErrGatewayIPIsNotValid, gateway)
|
|
||||||
} else if serverName == "" {
|
|
||||||
return 0, ErrServerNameEmpty
|
|
||||||
}
|
|
||||||
|
|
||||||
privateIPClient, err := newHTTPClient(serverName)
|
privateIPClient, err := newHTTPClient(serverName)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
@@ -70,7 +73,8 @@ func (p *Provider) PortForward(ctx context.Context, client *http.Client,
|
|||||||
}
|
}
|
||||||
|
|
||||||
if !dataFound || expired {
|
if !dataFound || expired {
|
||||||
data, err = refreshPIAPortForwardData(ctx, client, privateIPClient, gateway,
|
client := objects.Client
|
||||||
|
data, err = refreshPIAPortForwardData(ctx, client, privateIPClient, objects.Gateway,
|
||||||
p.portForwardPath, p.authFilePath)
|
p.portForwardPath, p.authFilePath)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return 0, fmt.Errorf("refreshing port forward data: %w", err)
|
return 0, fmt.Errorf("refreshing port forward data: %w", err)
|
||||||
@@ -80,7 +84,7 @@ func (p *Provider) PortForward(ctx context.Context, client *http.Client,
|
|||||||
logger.Info("Port forwarded data expires in " + format.FriendlyDuration(durationToExpiration))
|
logger.Info("Port forwarded data expires in " + format.FriendlyDuration(durationToExpiration))
|
||||||
|
|
||||||
// First time binding
|
// First time binding
|
||||||
if err := bindPort(ctx, privateIPClient, gateway, data); err != nil {
|
if err := bindPort(ctx, privateIPClient, objects.Gateway, data); err != nil {
|
||||||
return 0, fmt.Errorf("binding port: %w", err)
|
return 0, fmt.Errorf("binding port: %w", err)
|
||||||
}
|
}
|
||||||
|
|
||||||
@@ -91,9 +95,16 @@ var (
|
|||||||
ErrPortForwardedExpired = errors.New("port forwarded data expired")
|
ErrPortForwardedExpired = errors.New("port forwarded data expired")
|
||||||
)
|
)
|
||||||
|
|
||||||
func (p *Provider) KeepPortForward(ctx context.Context, _ uint16,
|
func (p *Provider) KeepPortForward(ctx context.Context,
|
||||||
gateway netip.Addr, serverName string, _ utils.Logger) (err error) {
|
objects utils.PortForwardObjects) (err error) {
|
||||||
privateIPClient, err := newHTTPClient(serverName)
|
switch {
|
||||||
|
case objects.ServerName == "":
|
||||||
|
panic("server name cannot be empty")
|
||||||
|
case !objects.Gateway.IsValid():
|
||||||
|
panic("gateway is not set")
|
||||||
|
}
|
||||||
|
|
||||||
|
privateIPClient, err := newHTTPClient(objects.ServerName)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return fmt.Errorf("creating custom HTTP client: %w", err)
|
return fmt.Errorf("creating custom HTTP client: %w", err)
|
||||||
}
|
}
|
||||||
@@ -120,7 +131,7 @@ func (p *Provider) KeepPortForward(ctx context.Context, _ uint16,
|
|||||||
}
|
}
|
||||||
return ctx.Err()
|
return ctx.Err()
|
||||||
case <-keepAliveTimer.C:
|
case <-keepAliveTimer.C:
|
||||||
err := bindPort(ctx, privateIPClient, gateway, data)
|
err = bindPort(ctx, privateIPClient, objects.Gateway, data)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return fmt.Errorf("binding port: %w", err)
|
return fmt.Errorf("binding port: %w", err)
|
||||||
}
|
}
|
||||||
|
|||||||
@@ -2,10 +2,7 @@ package protonvpn
|
|||||||
|
|
||||||
import (
|
import (
|
||||||
"context"
|
"context"
|
||||||
"errors"
|
|
||||||
"fmt"
|
"fmt"
|
||||||
"net/http"
|
|
||||||
"net/netip"
|
|
||||||
"strings"
|
"strings"
|
||||||
"time"
|
"time"
|
||||||
|
|
||||||
@@ -13,31 +10,24 @@ import (
|
|||||||
"github.com/qdm12/gluetun/internal/provider/utils"
|
"github.com/qdm12/gluetun/internal/provider/utils"
|
||||||
)
|
)
|
||||||
|
|
||||||
var (
|
|
||||||
ErrGatewayIPNotValid = errors.New("gateway IP address is not valid")
|
|
||||||
)
|
|
||||||
|
|
||||||
// PortForward obtains a VPN server side port forwarded from ProtonVPN gateway.
|
// PortForward obtains a VPN server side port forwarded from ProtonVPN gateway.
|
||||||
func (p *Provider) PortForward(ctx context.Context, _ *http.Client,
|
func (p *Provider) PortForward(ctx context.Context, objects utils.PortForwardObjects) (
|
||||||
logger utils.Logger, gateway netip.Addr, _ string) (
|
|
||||||
port uint16, err error) {
|
port uint16, err error) {
|
||||||
if !gateway.IsValid() {
|
|
||||||
return 0, fmt.Errorf("%w", ErrGatewayIPNotValid)
|
|
||||||
}
|
|
||||||
|
|
||||||
client := natpmp.New()
|
client := natpmp.New()
|
||||||
_, externalIPv4Address, err := client.ExternalAddress(ctx,
|
_, externalIPv4Address, err := client.ExternalAddress(ctx,
|
||||||
gateway)
|
objects.Gateway)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return 0, fmt.Errorf("getting external IPv4 address: %w", err)
|
return 0, fmt.Errorf("getting external IPv4 address: %w", err)
|
||||||
}
|
}
|
||||||
|
|
||||||
|
logger := objects.Logger
|
||||||
|
|
||||||
logger.Info("gateway external IPv4 address is " + externalIPv4Address.String())
|
logger.Info("gateway external IPv4 address is " + externalIPv4Address.String())
|
||||||
const internalPort, externalPort = 0, 0
|
const internalPort, externalPort = 0, 0
|
||||||
const lifetime = 60 * time.Second
|
const lifetime = 60 * time.Second
|
||||||
|
|
||||||
_, _, assignedUDPExternalPort, assignedLifetime, err :=
|
_, _, assignedUDPExternalPort, assignedLifetime, err :=
|
||||||
client.AddPortMapping(ctx, gateway, "udp",
|
client.AddPortMapping(ctx, objects.Gateway, "udp",
|
||||||
internalPort, externalPort, lifetime)
|
internalPort, externalPort, lifetime)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return 0, fmt.Errorf("adding UDP port mapping: %w", err)
|
return 0, fmt.Errorf("adding UDP port mapping: %w", err)
|
||||||
@@ -45,7 +35,7 @@ func (p *Provider) PortForward(ctx context.Context, _ *http.Client,
|
|||||||
checkLifetime(logger, "UDP", lifetime, assignedLifetime)
|
checkLifetime(logger, "UDP", lifetime, assignedLifetime)
|
||||||
|
|
||||||
_, _, assignedTCPExternalPort, assignedLifetime, err :=
|
_, _, assignedTCPExternalPort, assignedLifetime, err :=
|
||||||
client.AddPortMapping(ctx, gateway, "tcp",
|
client.AddPortMapping(ctx, objects.Gateway, "tcp",
|
||||||
internalPort, externalPort, lifetime)
|
internalPort, externalPort, lifetime)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return 0, fmt.Errorf("adding TCP port mapping: %w", err)
|
return 0, fmt.Errorf("adding TCP port mapping: %w", err)
|
||||||
@@ -55,6 +45,8 @@ func (p *Provider) PortForward(ctx context.Context, _ *http.Client,
|
|||||||
checkExternalPorts(logger, assignedUDPExternalPort, assignedTCPExternalPort)
|
checkExternalPorts(logger, assignedUDPExternalPort, assignedTCPExternalPort)
|
||||||
port = assignedTCPExternalPort
|
port = assignedTCPExternalPort
|
||||||
|
|
||||||
|
p.portForwarded = port
|
||||||
|
|
||||||
return port, nil
|
return port, nil
|
||||||
}
|
}
|
||||||
|
|
||||||
@@ -74,11 +66,12 @@ func checkExternalPorts(logger utils.Logger, udpPort, tcpPort uint16) {
|
|||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
func (p *Provider) KeepPortForward(ctx context.Context, port uint16,
|
func (p *Provider) KeepPortForward(ctx context.Context,
|
||||||
gateway netip.Addr, _ string, logger utils.Logger) (err error) {
|
objects utils.PortForwardObjects) (err error) {
|
||||||
client := natpmp.New()
|
client := natpmp.New()
|
||||||
const refreshTimeout = 45 * time.Second
|
const refreshTimeout = 45 * time.Second
|
||||||
timer := time.NewTimer(refreshTimeout)
|
timer := time.NewTimer(refreshTimeout)
|
||||||
|
logger := objects.Logger
|
||||||
for {
|
for {
|
||||||
select {
|
select {
|
||||||
case <-ctx.Done():
|
case <-ctx.Done():
|
||||||
@@ -92,8 +85,8 @@ func (p *Provider) KeepPortForward(ctx context.Context, port uint16,
|
|||||||
|
|
||||||
for _, networkProtocol := range networkProtocols {
|
for _, networkProtocol := range networkProtocols {
|
||||||
_, _, assignedExternalPort, assignedLiftetime, err :=
|
_, _, assignedExternalPort, assignedLiftetime, err :=
|
||||||
client.AddPortMapping(ctx, gateway, networkProtocol,
|
client.AddPortMapping(ctx, objects.Gateway, networkProtocol,
|
||||||
internalPort, port, lifetime)
|
internalPort, p.portForwarded, lifetime)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return fmt.Errorf("adding port mapping: %w", err)
|
return fmt.Errorf("adding port mapping: %w", err)
|
||||||
}
|
}
|
||||||
@@ -104,10 +97,10 @@ func (p *Provider) KeepPortForward(ctx context.Context, port uint16,
|
|||||||
assignedLiftetime, lifetime))
|
assignedLiftetime, lifetime))
|
||||||
}
|
}
|
||||||
|
|
||||||
if port != assignedExternalPort {
|
if p.portForwarded != assignedExternalPort {
|
||||||
logger.Warn(fmt.Sprintf("external port assigned %d changed to %d",
|
objects.Logger.Warn(fmt.Sprintf("external port assigned %d changed to %d",
|
||||||
port, assignedExternalPort))
|
p.portForwarded, assignedExternalPort))
|
||||||
port = assignedExternalPort
|
p.portForwarded = assignedExternalPort
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|||||||
@@ -13,6 +13,7 @@ type Provider struct {
|
|||||||
storage common.Storage
|
storage common.Storage
|
||||||
randSource rand.Source
|
randSource rand.Source
|
||||||
common.Fetcher
|
common.Fetcher
|
||||||
|
portForwarded uint16
|
||||||
}
|
}
|
||||||
|
|
||||||
func New(storage common.Storage, randSource rand.Source,
|
func New(storage common.Storage, randSource rand.Source,
|
||||||
|
|||||||
@@ -2,8 +2,6 @@ package provider
|
|||||||
|
|
||||||
import (
|
import (
|
||||||
"context"
|
"context"
|
||||||
"net/http"
|
|
||||||
"net/netip"
|
|
||||||
|
|
||||||
"github.com/qdm12/gluetun/internal/configuration/settings"
|
"github.com/qdm12/gluetun/internal/configuration/settings"
|
||||||
"github.com/qdm12/gluetun/internal/models"
|
"github.com/qdm12/gluetun/internal/models"
|
||||||
@@ -22,9 +20,7 @@ type Provider interface {
|
|||||||
|
|
||||||
type PortForwarder interface {
|
type PortForwarder interface {
|
||||||
Name() string
|
Name() string
|
||||||
PortForward(ctx context.Context, client *http.Client,
|
PortForward(ctx context.Context, objects utils.PortForwardObjects) (
|
||||||
logger utils.Logger, gateway netip.Addr, serverName string) (
|
|
||||||
port uint16, err error)
|
port uint16, err error)
|
||||||
KeepPortForward(ctx context.Context, port uint16, gateway netip.Addr,
|
KeepPortForward(ctx context.Context, objects utils.PortForwardObjects) (err error)
|
||||||
serverName string, _ utils.Logger) (err error)
|
|
||||||
}
|
}
|
||||||
|
|||||||
@@ -4,16 +4,11 @@ import (
|
|||||||
"context"
|
"context"
|
||||||
"errors"
|
"errors"
|
||||||
"fmt"
|
"fmt"
|
||||||
"net/http"
|
|
||||||
"net/netip"
|
|
||||||
)
|
)
|
||||||
|
|
||||||
type NoPortForwarder interface {
|
type NoPortForwarder interface {
|
||||||
PortForward(ctx context.Context, client *http.Client,
|
PortForward(ctx context.Context, objects PortForwardObjects) (port uint16, err error)
|
||||||
logger Logger, gateway netip.Addr, serverName string) (
|
KeepPortForward(ctx context.Context, objects PortForwardObjects) (err error)
|
||||||
port uint16, err error)
|
|
||||||
KeepPortForward(ctx context.Context, port uint16, gateway netip.Addr,
|
|
||||||
serverName string, logger Logger) (err error)
|
|
||||||
}
|
}
|
||||||
|
|
||||||
type NoPortForwarding struct {
|
type NoPortForwarding struct {
|
||||||
@@ -28,12 +23,11 @@ func NewNoPortForwarding(providerName string) *NoPortForwarding {
|
|||||||
|
|
||||||
var ErrPortForwardingNotSupported = errors.New("custom port forwarding obtention is not supported")
|
var ErrPortForwardingNotSupported = errors.New("custom port forwarding obtention is not supported")
|
||||||
|
|
||||||
func (n *NoPortForwarding) PortForward(context.Context, *http.Client,
|
func (n *NoPortForwarding) PortForward(context.Context, PortForwardObjects) (
|
||||||
Logger, netip.Addr, string) (port uint16, err error) {
|
port uint16, err error) {
|
||||||
return 0, fmt.Errorf("%w: for %s", ErrPortForwardingNotSupported, n.providerName)
|
return 0, fmt.Errorf("%w: for %s", ErrPortForwardingNotSupported, n.providerName)
|
||||||
}
|
}
|
||||||
|
|
||||||
func (n *NoPortForwarding) KeepPortForward(context.Context, uint16, netip.Addr,
|
func (n *NoPortForwarding) KeepPortForward(context.Context, PortForwardObjects) (err error) {
|
||||||
string, Logger) (err error) {
|
|
||||||
return fmt.Errorf("%w: for %s", ErrPortForwardingNotSupported, n.providerName)
|
return fmt.Errorf("%w: for %s", ErrPortForwardingNotSupported, n.providerName)
|
||||||
}
|
}
|
||||||
|
|||||||
27
internal/provider/utils/portforward.go
Normal file
27
internal/provider/utils/portforward.go
Normal file
@@ -0,0 +1,27 @@
|
|||||||
|
package utils
|
||||||
|
|
||||||
|
import (
|
||||||
|
"net/http"
|
||||||
|
"net/netip"
|
||||||
|
)
|
||||||
|
|
||||||
|
// PortForwardObjects contains fields that may or may not need to be set
|
||||||
|
// depending on the port forwarding provider code.
|
||||||
|
type PortForwardObjects struct {
|
||||||
|
// Logger is a logger, used by both Private Internet Access and ProtonVPN.
|
||||||
|
Logger Logger
|
||||||
|
// Gateway is the VPN gateway IP address, used by Private Internet Access
|
||||||
|
// and ProtonVPN.
|
||||||
|
Gateway netip.Addr
|
||||||
|
// Client is used to query the VPN gateway for Private Internet Access.
|
||||||
|
Client *http.Client
|
||||||
|
// ServerName is used by Private Internet Access for port forwarding,
|
||||||
|
// and to look up the server data from storage.
|
||||||
|
// TODO use server data directly to remove storage dependency for port
|
||||||
|
// forwarding implementation.
|
||||||
|
ServerName string
|
||||||
|
}
|
||||||
|
|
||||||
|
type Routing interface {
|
||||||
|
VPNLocalGatewayIP(vpnInterface string) (gateway netip.Addr, err error)
|
||||||
|
}
|
||||||
@@ -1,22 +1,13 @@
|
|||||||
package vpn
|
package vpn
|
||||||
|
|
||||||
import (
|
import (
|
||||||
"fmt"
|
|
||||||
|
|
||||||
"github.com/qdm12/gluetun/internal/configuration/settings"
|
"github.com/qdm12/gluetun/internal/configuration/settings"
|
||||||
"github.com/qdm12/gluetun/internal/portforward/service"
|
"github.com/qdm12/gluetun/internal/portforward/service"
|
||||||
)
|
)
|
||||||
|
|
||||||
func (l *Loop) startPortForwarding(data tunnelUpData) (err error) {
|
func (l *Loop) startPortForwarding(data tunnelUpData) (err error) {
|
||||||
gateway, err := l.routing.VPNLocalGatewayIP(data.vpnIntf)
|
|
||||||
if err != nil {
|
|
||||||
return fmt.Errorf("obtaining VPN local gateway IP for interface %s: %w", data.vpnIntf, err)
|
|
||||||
}
|
|
||||||
l.logger.Info("VPN gateway IP address: " + gateway.String())
|
|
||||||
|
|
||||||
partialUpdate := service.Settings{
|
partialUpdate := service.Settings{
|
||||||
PortForwarder: data.portForwarder,
|
PortForwarder: data.portForwarder,
|
||||||
Gateway: gateway,
|
|
||||||
Interface: data.vpnIntf,
|
Interface: data.vpnIntf,
|
||||||
ServerName: data.serverName,
|
ServerName: data.serverName,
|
||||||
VPNProvider: data.portForwarder.Name(),
|
VPNProvider: data.portForwarder.Name(),
|
||||||
|
|||||||
Reference in New Issue
Block a user