chore(portforward): move vpn gateway obtention within port forwarding service

This commit is contained in:
Quentin McGaw
2023-09-23 11:46:14 +00:00
parent 71201411f4
commit 0406de399d
14 changed files with 135 additions and 92 deletions

View File

@@ -376,7 +376,7 @@ func _main(ctx context.Context, buildInfo models.BuildInformation,
portForwardLogger := logger.New(log.SetComponent("port forwarding")) portForwardLogger := logger.New(log.SetComponent("port forwarding"))
portForwardLooper := portforward.NewLoop(allSettings.VPN.Provider.PortForwarding, portForwardLooper := portforward.NewLoop(allSettings.VPN.Provider.PortForwarding,
httpClient, firewallConf, portForwardLogger, puid, pgid) routingConf, httpClient, firewallConf, portForwardLogger, puid, pgid)
portForwardRunError, _ := portForwardLooper.Start(context.Background()) portForwardRunError, _ := portForwardLooper.Start(context.Background())
unboundLogger := logger.New(log.SetComponent("dns")) unboundLogger := logger.New(log.SetComponent("dns"))

View File

@@ -1,6 +1,9 @@
package portforward package portforward
import "context" import (
"context"
"net/netip"
)
type Service interface { type Service interface {
Start(ctx context.Context) (runError <-chan error, err error) Start(ctx context.Context) (runError <-chan error, err error)
@@ -8,6 +11,10 @@ type Service interface {
GetPortForwarded() (port uint16) GetPortForwarded() (port uint16)
} }
type Routing interface {
VPNLocalGatewayIP(vpnInterface string) (gateway netip.Addr, err error)
}
type PortAllower interface { type PortAllower interface {
SetAllowedPort(ctx context.Context, port uint16, intf string) (err error) SetAllowedPort(ctx context.Context, port uint16, intf string) (err error)
RemoveAllowedPort(ctx context.Context, port uint16) (err error) RemoveAllowedPort(ctx context.Context, port uint16) (err error)

View File

@@ -16,6 +16,7 @@ type Loop struct {
settingsMutex sync.RWMutex settingsMutex sync.RWMutex
service Service service Service
// Fixed injected objets // Fixed injected objets
routing Routing
client *http.Client client *http.Client
portAllower PortAllower portAllower PortAllower
logger Logger logger Logger
@@ -30,13 +31,14 @@ type Loop struct {
runDone <-chan struct{} runDone <-chan struct{}
} }
func NewLoop(settings settings.PortForwarding, func NewLoop(settings settings.PortForwarding, routing Routing,
client *http.Client, portAllower PortAllower, client *http.Client, portAllower PortAllower,
logger Logger, uid, gid int) *Loop { logger Logger, uid, gid int) *Loop {
return &Loop{ return &Loop{
settings: service.Settings{ settings: service.Settings{
UserSettings: settings, UserSettings: settings,
}, },
routing: routing,
client: client, client: client,
portAllower: portAllower, portAllower: portAllower,
logger: logger, logger: logger,
@@ -85,7 +87,7 @@ func (l *Loop) run(runCtx context.Context, runDone chan<- struct{},
} }
l.settingsMutex.RLock() l.settingsMutex.RLock()
l.service = service.New(l.settings, l.client, l.service = service.New(l.settings, l.routing, l.client,
l.portAllower, l.logger, l.uid, l.gid) l.portAllower, l.logger, l.uid, l.gid)
l.settingsMutex.RUnlock() l.settingsMutex.RUnlock()

View File

@@ -2,6 +2,9 @@ package service
import ( import (
"context" "context"
"net/netip"
"github.com/qdm12/gluetun/internal/provider/utils"
) )
type PortAllower interface { type PortAllower interface {
@@ -9,8 +12,19 @@ type PortAllower interface {
RemoveAllowedPort(ctx context.Context, port uint16) (err error) RemoveAllowedPort(ctx context.Context, port uint16) (err error)
} }
type Routing interface {
VPNLocalGatewayIP(vpnInterface string) (gateway netip.Addr, err error)
}
type Logger interface { type Logger interface {
Info(s string) Info(s string)
Warn(s string) Warn(s string)
Error(s string) Error(s string)
} }
type PortForwarder interface {
Name() string
PortForward(ctx context.Context, objects utils.PortForwardObjects) (
port uint16, err error)
KeepPortForward(ctx context.Context, objects utils.PortForwardObjects) (err error)
}

View File

@@ -15,6 +15,7 @@ type Service struct {
puid int puid int
pgid int pgid int
// Fixed injected objets // Fixed injected objets
routing Routing
client *http.Client client *http.Client
portAllower PortAllower portAllower PortAllower
logger Logger logger Logger
@@ -24,7 +25,7 @@ type Service struct {
keepPortDoneCh <-chan struct{} keepPortDoneCh <-chan struct{}
} }
func New(settings Settings, client *http.Client, func New(settings Settings, routing Routing, client *http.Client,
portAllower PortAllower, logger Logger, puid, pgid int) *Service { portAllower PortAllower, logger Logger, puid, pgid int) *Service {
return &Service{ return &Service{
// Fixed parameters // Fixed parameters
@@ -32,6 +33,7 @@ func New(settings Settings, client *http.Client,
puid: puid, puid: puid,
pgid: pgid, pgid: pgid,
// Fixed injected objets // Fixed injected objets
routing: routing,
client: client, client: client,
portAllower: portAllower, portAllower: portAllower,
logger: logger, logger: logger,

View File

@@ -3,21 +3,18 @@ package service
import ( import (
"errors" "errors"
"fmt" "fmt"
"net/netip"
"github.com/qdm12/gluetun/internal/configuration/settings" "github.com/qdm12/gluetun/internal/configuration/settings"
"github.com/qdm12/gluetun/internal/constants/providers" "github.com/qdm12/gluetun/internal/constants/providers"
"github.com/qdm12/gluetun/internal/provider"
"github.com/qdm12/gosettings" "github.com/qdm12/gosettings"
) )
type Settings struct { type Settings struct {
UserSettings settings.PortForwarding UserSettings settings.PortForwarding
PortForwarder provider.PortForwarder PortForwarder PortForwarder
Gateway netip.Addr // needed for PIA and ProtonVPN Interface string // needed for PIA and ProtonVPN, tun0 for example
ServerName string // needed for PIA ServerName string // needed for PIA
Interface string // needed for PIA and ProtonVPN, tun0 for example VPNProvider string // used to validate new settings
VPNProvider string // used to validate new settings
} }
// UpdateWith deep copies the receiving settings, overrides the copy with // UpdateWith deep copies the receiving settings, overrides the copy with
@@ -37,9 +34,8 @@ func (s Settings) UpdateWith(partialUpdate Settings) (updatedSettings Settings,
func (s Settings) copy() (copied Settings) { func (s Settings) copy() (copied Settings) {
copied.UserSettings = s.UserSettings.Copy() copied.UserSettings = s.UserSettings.Copy()
copied.PortForwarder = s.PortForwarder copied.PortForwarder = s.PortForwarder
copied.Gateway = s.Gateway
copied.ServerName = s.ServerName
copied.Interface = s.Interface copied.Interface = s.Interface
copied.ServerName = s.ServerName
copied.VPNProvider = s.VPNProvider copied.VPNProvider = s.VPNProvider
return copied return copied
} }
@@ -47,9 +43,8 @@ func (s Settings) copy() (copied Settings) {
func (s *Settings) overrideWith(update Settings) { func (s *Settings) overrideWith(update Settings) {
s.UserSettings.OverrideWith(update.UserSettings) s.UserSettings.OverrideWith(update.UserSettings)
s.PortForwarder = gosettings.OverrideWithInterface(s.PortForwarder, update.PortForwarder) s.PortForwarder = gosettings.OverrideWithInterface(s.PortForwarder, update.PortForwarder)
s.Gateway = gosettings.OverrideWithValidator(s.Gateway, update.Gateway)
s.ServerName = gosettings.OverrideWithString(s.ServerName, update.ServerName)
s.Interface = gosettings.OverrideWithString(s.Interface, update.Interface) s.Interface = gosettings.OverrideWithString(s.Interface, update.Interface)
s.ServerName = gosettings.OverrideWithString(s.ServerName, update.ServerName)
s.VPNProvider = gosettings.OverrideWithString(s.VPNProvider, update.VPNProvider) s.VPNProvider = gosettings.OverrideWithString(s.VPNProvider, update.VPNProvider)
} }
@@ -69,8 +64,6 @@ func (s *Settings) validate() (err error) {
return fmt.Errorf("%w", ErrServerNameNotSet) return fmt.Errorf("%w", ErrServerNameNotSet)
case s.PortForwarder == nil: case s.PortForwarder == nil:
return fmt.Errorf("%w", ErrPortForwarderNotSet) return fmt.Errorf("%w", ErrPortForwarderNotSet)
case !s.Gateway.IsValid():
return fmt.Errorf("%w", ErrGatewayNotSet)
case s.Interface == "": case s.Interface == "":
return fmt.Errorf("%w", ErrInterfaceNotSet) return fmt.Errorf("%w", ErrInterfaceNotSet)
} }

View File

@@ -3,6 +3,8 @@ package service
import ( import (
"context" "context"
"fmt" "fmt"
"github.com/qdm12/gluetun/internal/provider/utils"
) )
func (s *Service) Start(ctx context.Context) (runError <-chan error, err error) { func (s *Service) Start(ctx context.Context) (runError <-chan error, err error) {
@@ -14,8 +16,19 @@ func (s *Service) Start(ctx context.Context) (runError <-chan error, err error)
} }
s.logger.Info("starting") s.logger.Info("starting")
port, err := s.settings.PortForwarder.PortForward(ctx, s.client, s.logger,
s.settings.Gateway, s.settings.ServerName) gateway, err := s.routing.VPNLocalGatewayIP(s.settings.Interface)
if err != nil {
return nil, fmt.Errorf("getting VPN local gateway IP: %w", err)
}
obj := utils.PortForwardObjects{
Logger: s.logger,
Gateway: gateway,
Client: s.client,
ServerName: s.settings.ServerName,
}
port, err := s.settings.PortForwarder.PortForward(ctx, obj)
if err != nil { if err != nil {
return nil, fmt.Errorf("port forwarding for the first time: %w", err) return nil, fmt.Errorf("port forwarding for the first time: %w", err)
} }
@@ -43,18 +56,17 @@ func (s *Service) Start(ctx context.Context) (runError <-chan error, err error)
keepPortDoneCh := make(chan struct{}) keepPortDoneCh := make(chan struct{})
s.keepPortDoneCh = keepPortDoneCh s.keepPortDoneCh = keepPortDoneCh
go func(ctx context.Context, settings Settings, port uint16, go func(ctx context.Context, portForwarder PortForwarder,
runError chan<- error, doneCh chan<- struct{}) { obj utils.PortForwardObjects, runError chan<- error, doneCh chan<- struct{}) {
defer close(doneCh) defer close(doneCh)
err = settings.PortForwarder.KeepPortForward(ctx, port, err = portForwarder.KeepPortForward(ctx, obj)
settings.Gateway, settings.ServerName, s.logger)
crashed := ctx.Err() == nil crashed := ctx.Err() == nil
if !crashed { // stopped by Stop call if !crashed { // stopped by Stop call
return return
} }
_ = s.cleanup() _ = s.cleanup()
runError <- err runError <- err
}(keepPortCtx, s.settings, port, runErrorCh, keepPortDoneCh) }(keepPortCtx, s.settings.PortForwarder, obj, runErrorCh, keepPortDoneCh)
return runErrorCh, nil return runErrorCh, nil
} }

View File

@@ -22,30 +22,33 @@ import (
) )
var ( var (
ErrServerNameNotFound = errors.New("server name not found in servers") ErrServerNameNotFound = errors.New("server name not found in servers")
ErrGatewayIPIsNotValid = errors.New("gateway IP address is not valid")
ErrServerNameEmpty = errors.New("server name is empty")
) )
// PortForward obtains a VPN server side port forwarded from PIA. // PortForward obtains a VPN server side port forwarded from PIA.
func (p *Provider) PortForward(ctx context.Context, client *http.Client, func (p *Provider) PortForward(ctx context.Context,
logger utils.Logger, gateway netip.Addr, serverName string) ( objects utils.PortForwardObjects) (port uint16, err error) {
port uint16, err error) { switch {
case objects.ServerName == "":
panic("server name cannot be empty")
case !objects.Gateway.IsValid():
panic("gateway is not set")
}
serverName := objects.ServerName
server, ok := p.storage.GetServerByName(providers.PrivateInternetAccess, serverName) server, ok := p.storage.GetServerByName(providers.PrivateInternetAccess, serverName)
if !ok { if !ok {
return 0, fmt.Errorf("%w: %s", ErrServerNameNotFound, serverName) return 0, fmt.Errorf("%w: %s", ErrServerNameNotFound, serverName)
} }
logger := objects.Logger
if !server.PortForward { if !server.PortForward {
logger.Error("The server " + serverName + logger.Error("The server " + serverName +
" (region " + server.Region + ") does not support port forwarding") " (region " + server.Region + ") does not support port forwarding")
return 0, nil return 0, nil
} }
if !gateway.IsValid() {
return 0, fmt.Errorf("%w: %s", ErrGatewayIPIsNotValid, gateway)
} else if serverName == "" {
return 0, ErrServerNameEmpty
}
privateIPClient, err := newHTTPClient(serverName) privateIPClient, err := newHTTPClient(serverName)
if err != nil { if err != nil {
@@ -70,7 +73,8 @@ func (p *Provider) PortForward(ctx context.Context, client *http.Client,
} }
if !dataFound || expired { if !dataFound || expired {
data, err = refreshPIAPortForwardData(ctx, client, privateIPClient, gateway, client := objects.Client
data, err = refreshPIAPortForwardData(ctx, client, privateIPClient, objects.Gateway,
p.portForwardPath, p.authFilePath) p.portForwardPath, p.authFilePath)
if err != nil { if err != nil {
return 0, fmt.Errorf("refreshing port forward data: %w", err) return 0, fmt.Errorf("refreshing port forward data: %w", err)
@@ -80,7 +84,7 @@ func (p *Provider) PortForward(ctx context.Context, client *http.Client,
logger.Info("Port forwarded data expires in " + format.FriendlyDuration(durationToExpiration)) logger.Info("Port forwarded data expires in " + format.FriendlyDuration(durationToExpiration))
// First time binding // First time binding
if err := bindPort(ctx, privateIPClient, gateway, data); err != nil { if err := bindPort(ctx, privateIPClient, objects.Gateway, data); err != nil {
return 0, fmt.Errorf("binding port: %w", err) return 0, fmt.Errorf("binding port: %w", err)
} }
@@ -91,9 +95,16 @@ var (
ErrPortForwardedExpired = errors.New("port forwarded data expired") ErrPortForwardedExpired = errors.New("port forwarded data expired")
) )
func (p *Provider) KeepPortForward(ctx context.Context, _ uint16, func (p *Provider) KeepPortForward(ctx context.Context,
gateway netip.Addr, serverName string, _ utils.Logger) (err error) { objects utils.PortForwardObjects) (err error) {
privateIPClient, err := newHTTPClient(serverName) switch {
case objects.ServerName == "":
panic("server name cannot be empty")
case !objects.Gateway.IsValid():
panic("gateway is not set")
}
privateIPClient, err := newHTTPClient(objects.ServerName)
if err != nil { if err != nil {
return fmt.Errorf("creating custom HTTP client: %w", err) return fmt.Errorf("creating custom HTTP client: %w", err)
} }
@@ -120,7 +131,7 @@ func (p *Provider) KeepPortForward(ctx context.Context, _ uint16,
} }
return ctx.Err() return ctx.Err()
case <-keepAliveTimer.C: case <-keepAliveTimer.C:
err := bindPort(ctx, privateIPClient, gateway, data) err = bindPort(ctx, privateIPClient, objects.Gateway, data)
if err != nil { if err != nil {
return fmt.Errorf("binding port: %w", err) return fmt.Errorf("binding port: %w", err)
} }

View File

@@ -2,10 +2,7 @@ package protonvpn
import ( import (
"context" "context"
"errors"
"fmt" "fmt"
"net/http"
"net/netip"
"strings" "strings"
"time" "time"
@@ -13,31 +10,24 @@ import (
"github.com/qdm12/gluetun/internal/provider/utils" "github.com/qdm12/gluetun/internal/provider/utils"
) )
var (
ErrGatewayIPNotValid = errors.New("gateway IP address is not valid")
)
// PortForward obtains a VPN server side port forwarded from ProtonVPN gateway. // PortForward obtains a VPN server side port forwarded from ProtonVPN gateway.
func (p *Provider) PortForward(ctx context.Context, _ *http.Client, func (p *Provider) PortForward(ctx context.Context, objects utils.PortForwardObjects) (
logger utils.Logger, gateway netip.Addr, _ string) (
port uint16, err error) { port uint16, err error) {
if !gateway.IsValid() {
return 0, fmt.Errorf("%w", ErrGatewayIPNotValid)
}
client := natpmp.New() client := natpmp.New()
_, externalIPv4Address, err := client.ExternalAddress(ctx, _, externalIPv4Address, err := client.ExternalAddress(ctx,
gateway) objects.Gateway)
if err != nil { if err != nil {
return 0, fmt.Errorf("getting external IPv4 address: %w", err) return 0, fmt.Errorf("getting external IPv4 address: %w", err)
} }
logger := objects.Logger
logger.Info("gateway external IPv4 address is " + externalIPv4Address.String()) logger.Info("gateway external IPv4 address is " + externalIPv4Address.String())
const internalPort, externalPort = 0, 0 const internalPort, externalPort = 0, 0
const lifetime = 60 * time.Second const lifetime = 60 * time.Second
_, _, assignedUDPExternalPort, assignedLifetime, err := _, _, assignedUDPExternalPort, assignedLifetime, err :=
client.AddPortMapping(ctx, gateway, "udp", client.AddPortMapping(ctx, objects.Gateway, "udp",
internalPort, externalPort, lifetime) internalPort, externalPort, lifetime)
if err != nil { if err != nil {
return 0, fmt.Errorf("adding UDP port mapping: %w", err) return 0, fmt.Errorf("adding UDP port mapping: %w", err)
@@ -45,7 +35,7 @@ func (p *Provider) PortForward(ctx context.Context, _ *http.Client,
checkLifetime(logger, "UDP", lifetime, assignedLifetime) checkLifetime(logger, "UDP", lifetime, assignedLifetime)
_, _, assignedTCPExternalPort, assignedLifetime, err := _, _, assignedTCPExternalPort, assignedLifetime, err :=
client.AddPortMapping(ctx, gateway, "tcp", client.AddPortMapping(ctx, objects.Gateway, "tcp",
internalPort, externalPort, lifetime) internalPort, externalPort, lifetime)
if err != nil { if err != nil {
return 0, fmt.Errorf("adding TCP port mapping: %w", err) return 0, fmt.Errorf("adding TCP port mapping: %w", err)
@@ -55,6 +45,8 @@ func (p *Provider) PortForward(ctx context.Context, _ *http.Client,
checkExternalPorts(logger, assignedUDPExternalPort, assignedTCPExternalPort) checkExternalPorts(logger, assignedUDPExternalPort, assignedTCPExternalPort)
port = assignedTCPExternalPort port = assignedTCPExternalPort
p.portForwarded = port
return port, nil return port, nil
} }
@@ -74,11 +66,12 @@ func checkExternalPorts(logger utils.Logger, udpPort, tcpPort uint16) {
} }
} }
func (p *Provider) KeepPortForward(ctx context.Context, port uint16, func (p *Provider) KeepPortForward(ctx context.Context,
gateway netip.Addr, _ string, logger utils.Logger) (err error) { objects utils.PortForwardObjects) (err error) {
client := natpmp.New() client := natpmp.New()
const refreshTimeout = 45 * time.Second const refreshTimeout = 45 * time.Second
timer := time.NewTimer(refreshTimeout) timer := time.NewTimer(refreshTimeout)
logger := objects.Logger
for { for {
select { select {
case <-ctx.Done(): case <-ctx.Done():
@@ -92,8 +85,8 @@ func (p *Provider) KeepPortForward(ctx context.Context, port uint16,
for _, networkProtocol := range networkProtocols { for _, networkProtocol := range networkProtocols {
_, _, assignedExternalPort, assignedLiftetime, err := _, _, assignedExternalPort, assignedLiftetime, err :=
client.AddPortMapping(ctx, gateway, networkProtocol, client.AddPortMapping(ctx, objects.Gateway, networkProtocol,
internalPort, port, lifetime) internalPort, p.portForwarded, lifetime)
if err != nil { if err != nil {
return fmt.Errorf("adding port mapping: %w", err) return fmt.Errorf("adding port mapping: %w", err)
} }
@@ -104,10 +97,10 @@ func (p *Provider) KeepPortForward(ctx context.Context, port uint16,
assignedLiftetime, lifetime)) assignedLiftetime, lifetime))
} }
if port != assignedExternalPort { if p.portForwarded != assignedExternalPort {
logger.Warn(fmt.Sprintf("external port assigned %d changed to %d", objects.Logger.Warn(fmt.Sprintf("external port assigned %d changed to %d",
port, assignedExternalPort)) p.portForwarded, assignedExternalPort))
port = assignedExternalPort p.portForwarded = assignedExternalPort
} }
} }

View File

@@ -13,6 +13,7 @@ type Provider struct {
storage common.Storage storage common.Storage
randSource rand.Source randSource rand.Source
common.Fetcher common.Fetcher
portForwarded uint16
} }
func New(storage common.Storage, randSource rand.Source, func New(storage common.Storage, randSource rand.Source,

View File

@@ -2,8 +2,6 @@ package provider
import ( import (
"context" "context"
"net/http"
"net/netip"
"github.com/qdm12/gluetun/internal/configuration/settings" "github.com/qdm12/gluetun/internal/configuration/settings"
"github.com/qdm12/gluetun/internal/models" "github.com/qdm12/gluetun/internal/models"
@@ -22,9 +20,7 @@ type Provider interface {
type PortForwarder interface { type PortForwarder interface {
Name() string Name() string
PortForward(ctx context.Context, client *http.Client, PortForward(ctx context.Context, objects utils.PortForwardObjects) (
logger utils.Logger, gateway netip.Addr, serverName string) (
port uint16, err error) port uint16, err error)
KeepPortForward(ctx context.Context, port uint16, gateway netip.Addr, KeepPortForward(ctx context.Context, objects utils.PortForwardObjects) (err error)
serverName string, _ utils.Logger) (err error)
} }

View File

@@ -4,16 +4,11 @@ import (
"context" "context"
"errors" "errors"
"fmt" "fmt"
"net/http"
"net/netip"
) )
type NoPortForwarder interface { type NoPortForwarder interface {
PortForward(ctx context.Context, client *http.Client, PortForward(ctx context.Context, objects PortForwardObjects) (port uint16, err error)
logger Logger, gateway netip.Addr, serverName string) ( KeepPortForward(ctx context.Context, objects PortForwardObjects) (err error)
port uint16, err error)
KeepPortForward(ctx context.Context, port uint16, gateway netip.Addr,
serverName string, logger Logger) (err error)
} }
type NoPortForwarding struct { type NoPortForwarding struct {
@@ -28,12 +23,11 @@ func NewNoPortForwarding(providerName string) *NoPortForwarding {
var ErrPortForwardingNotSupported = errors.New("custom port forwarding obtention is not supported") var ErrPortForwardingNotSupported = errors.New("custom port forwarding obtention is not supported")
func (n *NoPortForwarding) PortForward(context.Context, *http.Client, func (n *NoPortForwarding) PortForward(context.Context, PortForwardObjects) (
Logger, netip.Addr, string) (port uint16, err error) { port uint16, err error) {
return 0, fmt.Errorf("%w: for %s", ErrPortForwardingNotSupported, n.providerName) return 0, fmt.Errorf("%w: for %s", ErrPortForwardingNotSupported, n.providerName)
} }
func (n *NoPortForwarding) KeepPortForward(context.Context, uint16, netip.Addr, func (n *NoPortForwarding) KeepPortForward(context.Context, PortForwardObjects) (err error) {
string, Logger) (err error) {
return fmt.Errorf("%w: for %s", ErrPortForwardingNotSupported, n.providerName) return fmt.Errorf("%w: for %s", ErrPortForwardingNotSupported, n.providerName)
} }

View File

@@ -0,0 +1,27 @@
package utils
import (
"net/http"
"net/netip"
)
// PortForwardObjects contains fields that may or may not need to be set
// depending on the port forwarding provider code.
type PortForwardObjects struct {
// Logger is a logger, used by both Private Internet Access and ProtonVPN.
Logger Logger
// Gateway is the VPN gateway IP address, used by Private Internet Access
// and ProtonVPN.
Gateway netip.Addr
// Client is used to query the VPN gateway for Private Internet Access.
Client *http.Client
// ServerName is used by Private Internet Access for port forwarding,
// and to look up the server data from storage.
// TODO use server data directly to remove storage dependency for port
// forwarding implementation.
ServerName string
}
type Routing interface {
VPNLocalGatewayIP(vpnInterface string) (gateway netip.Addr, err error)
}

View File

@@ -1,22 +1,13 @@
package vpn package vpn
import ( import (
"fmt"
"github.com/qdm12/gluetun/internal/configuration/settings" "github.com/qdm12/gluetun/internal/configuration/settings"
"github.com/qdm12/gluetun/internal/portforward/service" "github.com/qdm12/gluetun/internal/portforward/service"
) )
func (l *Loop) startPortForwarding(data tunnelUpData) (err error) { func (l *Loop) startPortForwarding(data tunnelUpData) (err error) {
gateway, err := l.routing.VPNLocalGatewayIP(data.vpnIntf)
if err != nil {
return fmt.Errorf("obtaining VPN local gateway IP for interface %s: %w", data.vpnIntf, err)
}
l.logger.Info("VPN gateway IP address: " + gateway.String())
partialUpdate := service.Settings{ partialUpdate := service.Settings{
PortForwarder: data.portForwarder, PortForwarder: data.portForwarder,
Gateway: gateway,
Interface: data.vpnIntf, Interface: data.vpnIntf,
ServerName: data.serverName, ServerName: data.serverName,
VPNProvider: data.portForwarder.Name(), VPNProvider: data.portForwarder.Name(),