Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

v4.0.0 Gluetun #1113

Open
qdm12 opened this issue Aug 21, 2022 · 4 comments
Open

v4.0.0 Gluetun #1113

qdm12 opened this issue Aug 21, 2022 · 4 comments
Labels
Status: 🔒 After next release Will be done after the next release

Comments

@qdm12
Copy link
Owner

qdm12 commented Aug 21, 2022

What's the feature 🧐

There are several pending breaking changes that will simplify the code and allow for faster development.
There is no fixed date really for a v4.0.0 release, but it will ultimately happen.

Changes to be made are listed here:

  • Remove FIREWALL_DEBUG in favor of LOG_LEVEL=debug
  • Remove Surfshark region retro compatibility (search for // TODO .*v4) and remove RetroLoc from server model
  • Split DOT_PRIVATE_ADDRESS in two: ips and cidr ranges
  • Rename UNBLOCK to a better name
  • ProtonVPN: remove name field from updater code
  • Throw out v0 http server
  • Remove /v1/openvpn route and have a /vpn, /vpn/openvpn and /vpn/wireguard routes
  • MAYBE have the http server as json rpc instead of json rest?
  • Change OPENVPN_ENDPOINT_IP + OPENVPN_ENDPOINT_PORT -> OPENVPN_ENDPOINT, same for Wireguard
  • Change control server /unbound/ route to /dns
  • Change Public iP period == 0 => disabled to a boolean on or off setting
  • Merge file and secret file sources together. Use env variable suffix _FILE to define custom paths, and drop _SECRETFILE variables. Each key try can check first in /run/secrets then in /gluetun.
  • Storage servers.json: change vpn field to be an array for example ["openvpn", "wireguard"]
  • Storage: split servers.json per provider
  • Storage: only load as required, to reduce memory footprint
  • Server: disable by default
  • Remove protonvpn option from VPN_PORT_FORWARDING_PROVIDER since it's now automated and no need to use the custom provider anymore for wireguard.

Extra information and references

No response

@ksurl
Copy link
Contributor

ksurl commented Sep 28, 2022

Rename UNBLOCK

How about DOMAIN_ALLOW_LIST

@qdm12 qdm12 added the Status: 🔒 After next release Will be done after the next release label Sep 24, 2023
@qdm12 qdm12 pinned this issue Sep 24, 2023
@moookino

This comment was marked as off-topic.

@qdm12

This comment was marked as off-topic.

@burnbrigther

This comment was marked as off-topic.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
Status: 🔒 After next release Will be done after the next release
Projects
None yet
Development

No branches or pull requests

4 participants