mirror of
https://github.com/qdm12/gluetun.git
synced 2025-12-11 13:56:50 -06:00
- Better settings tree structure logged using `qdm12/gotree` - Read settings from environment variables, then files, then secret files - Settings methods to default them, merge them and override them - `DNS_PLAINTEXT_ADDRESS` default changed to `127.0.0.1` to use DoT. Warning added if set to something else. - `HTTPPROXY_LISTENING_ADDRESS` instead of `HTTPPROXY_PORT` (with retro-compatibility)
97 lines
2.5 KiB
Go
97 lines
2.5 KiB
Go
package env
|
|
|
|
import (
|
|
"errors"
|
|
"fmt"
|
|
"net"
|
|
"strconv"
|
|
|
|
"github.com/qdm12/gluetun/internal/configuration/settings"
|
|
)
|
|
|
|
func (r *Reader) readFirewall() (firewall settings.Firewall, err error) {
|
|
vpnInputPortStrings := envToCSV("FIREWALL_VPN_INPUT_PORTS")
|
|
firewall.VPNInputPorts, err = stringsToPorts(vpnInputPortStrings)
|
|
if err != nil {
|
|
return firewall, fmt.Errorf("environment variable FIREWALL_VPN_INPUT_PORTS: %w", err)
|
|
}
|
|
|
|
inputPortStrings := envToCSV("FIREWALL_INPUT_PORTS")
|
|
firewall.InputPorts, err = stringsToPorts(inputPortStrings)
|
|
if err != nil {
|
|
return firewall, fmt.Errorf("environment variable FIREWALL_INPUT_PORTS: %w", err)
|
|
}
|
|
|
|
outboundSubnetsKey := "FIREWALL_OUTBOUND_SUBNETS"
|
|
outboundSubnetStrings := envToCSV(outboundSubnetsKey)
|
|
if len(outboundSubnetStrings) == 0 {
|
|
// Retro-compatibility
|
|
outboundSubnetStrings = envToCSV("EXTRA_SUBNETS")
|
|
if len(outboundSubnetStrings) > 0 {
|
|
outboundSubnetsKey = "EXTRA_SUBNETS"
|
|
r.onRetroActive("EXTRA_SUBNETS", "FIREWALL_OUTBOUND_SUBNETS")
|
|
}
|
|
}
|
|
firewall.OutboundSubnets, err = stringsToIPNets(outboundSubnetStrings)
|
|
if err != nil {
|
|
return firewall, fmt.Errorf("environment variable %s: %w", outboundSubnetsKey, err)
|
|
}
|
|
|
|
firewall.Enabled, err = envToBoolPtr("FIREWALL")
|
|
if err != nil {
|
|
return firewall, fmt.Errorf("environment variable FIREWALL: %w", err)
|
|
}
|
|
|
|
firewall.Debug, err = envToBoolPtr("FIREWALL_DEBUG")
|
|
if err != nil {
|
|
return firewall, fmt.Errorf("environment variable FIREWALL_DEBUG: %w", err)
|
|
}
|
|
|
|
return firewall, nil
|
|
}
|
|
|
|
var (
|
|
ErrPortParsing = errors.New("cannot parse port")
|
|
ErrPortValue = errors.New("port value is not valid")
|
|
)
|
|
|
|
func stringsToPorts(ss []string) (ports []uint16, err error) {
|
|
if len(ss) == 0 {
|
|
return nil, nil
|
|
}
|
|
ports = make([]uint16, len(ss))
|
|
for i, s := range ss {
|
|
port, err := strconv.Atoi(s)
|
|
if err != nil {
|
|
return nil, fmt.Errorf("%w: %s: %s",
|
|
ErrPortParsing, s, err)
|
|
} else if port < 1 || port > 2^16 {
|
|
return nil, fmt.Errorf("%w: must be between 1 and 65535: %d",
|
|
ErrPortValue, port)
|
|
}
|
|
ports[i] = uint16(port)
|
|
}
|
|
return ports, nil
|
|
}
|
|
|
|
var (
|
|
ErrIPNetParsing = errors.New("cannot parse IP network")
|
|
)
|
|
|
|
func stringsToIPNets(ss []string) (ipNets []net.IPNet, err error) {
|
|
if len(ss) == 0 {
|
|
return nil, nil
|
|
}
|
|
ipNets = make([]net.IPNet, len(ss))
|
|
for i, s := range ss {
|
|
ip, ipNet, err := net.ParseCIDR(s)
|
|
if err != nil {
|
|
return nil, fmt.Errorf("%w: %s: %s",
|
|
ErrIPNetParsing, s, err)
|
|
}
|
|
ipNet.IP = ip
|
|
ipNets[i] = *ipNet
|
|
}
|
|
return ipNets, nil
|
|
}
|