- `internal/wireguard` client package with unit tests - Implementation works with kernel space or user space if unavailable - `WIREGUARD_PRIVATE_KEY` - `WIREGUARD_ADDRESS` - `WIREGUARD_PRESHARED_KEY` - `WIREGUARD_PORT` - `internal/netlink` package used by `internal/wireguard`
1.1 KiB
1.1 KiB
Maintenance
With caution
- Remove duplicate
/gluetundirectory creation - Remove firewall shadowsocks input port?
- Re-add
persist-tun? Run openvpn without root? - Remove
script-securityoption
Uniformization
- Filter servers by protocol for all
- Multiple IPs addresses support for all proviedrs
- Use
internal/netlinkin firewall and routing packages
Code
- Use
github.com/qdm12/ddns-updater/pkg/publicip - Change firewall debug logs to use
logger.Debuginstead offmt.Println
Features
- Pprof server
- Pre-install DNSSEC files so DoT can be activated even before the tunnel is up
- Gluetun entire logs available at control server, maybe in structured format
- Authentication with the control server
Gluetun V4
- Remove retro environment variables
- Updater servers version reset to 1
- Change models to all have IPs instead of IP
- Remove HTTP server v0
PORTtoOPENVPN_PORTUNBLOCKtoDOT_UNBOUND_UNBLOCKPROTOCOLtoOPENVPN_PROTOCOLPORT_FORWARDING- Change servers filtering environment variables to plural