mirror of
https://github.com/MarkusMcNugen/docker-qBittorrentvpn
synced 2024-11-22 18:45:25 +00:00
Added missing files
This commit is contained in:
parent
9290798c91
commit
a97f839b63
69
qbittorrent/default/qBittorrent.conf
Normal file
69
qbittorrent/default/qBittorrent.conf
Normal file
@ -0,0 +1,69 @@
|
|||||||
|
[AutoRun]
|
||||||
|
enabled=false
|
||||||
|
program=
|
||||||
|
|
||||||
|
[Preferences]
|
||||||
|
Advanced\AnonymousMode=false
|
||||||
|
Advanced\IncludeOverhead=false
|
||||||
|
Bittorrent\DHT=true
|
||||||
|
Bittorrent\Encryption=0
|
||||||
|
Bittorrent\LSD=true
|
||||||
|
Bittorrent\MaxConnecs=500
|
||||||
|
Bittorrent\MaxConnecsPerTorrent=100
|
||||||
|
Bittorrent\MaxRatio=-1
|
||||||
|
Bittorrent\MaxRatioAction=@Variant(\0\0\0\x7f\0\0\0\xfMaxRatioAction\0\0\0\0\0)
|
||||||
|
Bittorrent\MaxUploads=-1
|
||||||
|
Bittorrent\MaxUploadsPerTorrent=-1
|
||||||
|
Bittorrent\PeX=true
|
||||||
|
Bittorrent\uTP=true
|
||||||
|
Bittorrent\uTP_rate_limited=true
|
||||||
|
Connection\GlobalDLLimit=-1
|
||||||
|
Connection\GlobalDLLimitAlt=10
|
||||||
|
Connection\GlobalUPLimit=-1
|
||||||
|
Connection\GlobalUPLimitAlt=10
|
||||||
|
Connection\PortRangeMin=8999
|
||||||
|
Connection\Proxy\Authentication=false
|
||||||
|
Connection\Proxy\IP=0.0.0.0
|
||||||
|
Connection\Proxy\Password=
|
||||||
|
Connection\Proxy\Port=8080
|
||||||
|
Connection\Proxy\Username=
|
||||||
|
Connection\ProxyForce=true
|
||||||
|
Connection\ProxyPeerConnections=false
|
||||||
|
Connection\ProxyType=-1
|
||||||
|
Connection\UPnP=true
|
||||||
|
Downloads\FinishedTorrentExportDir=
|
||||||
|
Downloads\PreAllocation=false
|
||||||
|
Downloads\SavePath=/downloads
|
||||||
|
Downloads\TempPath=
|
||||||
|
Downloads\TempPathEnabled=true
|
||||||
|
Downloads\TorrentExportDir=
|
||||||
|
Downloads\UseIncompleteExtension=false
|
||||||
|
DynDNS\DomainName=changeme.dyndns.org
|
||||||
|
DynDNS\Enabled=false
|
||||||
|
DynDNS\Password=
|
||||||
|
DynDNS\Service=0
|
||||||
|
DynDNS\Username=
|
||||||
|
General\Locale=
|
||||||
|
General\UseRandomPort=false
|
||||||
|
IPFilter\Enabled=false
|
||||||
|
IPFilter\File=
|
||||||
|
IPFilter\FilterTracker=false
|
||||||
|
MailNotification\email=
|
||||||
|
MailNotification\enabled=false
|
||||||
|
MailNotification\password=
|
||||||
|
MailNotification\req_auth=false
|
||||||
|
MailNotification\req_ssl=false
|
||||||
|
MailNotification\smtp_server=smtp.changeme.com
|
||||||
|
MailNotification\username=
|
||||||
|
Queueing\IgnoreSlowTorrents=false
|
||||||
|
Queueing\MaxActiveDownloads=3
|
||||||
|
Queueing\MaxActiveTorrents=5
|
||||||
|
Queueing\MaxActiveUploads=3
|
||||||
|
Queueing\QueueingEnabled=true
|
||||||
|
Scheduler\Enabled=false
|
||||||
|
WebUI\HTTPS\Enabled=false
|
||||||
|
WebUI\LocalHostAuth=true
|
||||||
|
WebUI\Port=8080
|
||||||
|
WebUI\UseUPnP=true
|
||||||
|
WebUI\Username=admin
|
||||||
|
|
179
qbittorrent/scripts/iptables.sh
Normal file
179
qbittorrent/scripts/iptables.sh
Normal file
@ -0,0 +1,179 @@
|
|||||||
|
#!/bin/bash
|
||||||
|
# Kanged from binhex's OpenVPN dockers
|
||||||
|
|
||||||
|
# Wait until tunnel is up
|
||||||
|
while : ; do
|
||||||
|
if [ -c /dev/net/tun ]; then
|
||||||
|
break
|
||||||
|
else
|
||||||
|
sleep 1
|
||||||
|
fi
|
||||||
|
done
|
||||||
|
|
||||||
|
# ip route
|
||||||
|
###
|
||||||
|
|
||||||
|
DEBUG=false
|
||||||
|
|
||||||
|
|
||||||
|
# split comma seperated string into list from LAN_NETWORK env variable
|
||||||
|
IFS=',' read -ra lan_network_list <<< "${LAN_NETWORK}"
|
||||||
|
|
||||||
|
lancount=0
|
||||||
|
# process lan networks in the list
|
||||||
|
for lan_network_item in "${lan_network_list[@]}"; do
|
||||||
|
|
||||||
|
# get default gateway of interfaces as looping through them
|
||||||
|
DEFAULT_GATEWAY=$(ip -4 route list 0/${lancount} | cut -d ' ' -f 3)
|
||||||
|
|
||||||
|
# strip whitespace from start and end of lan_network_item
|
||||||
|
lan_network_item=$(echo "${lan_network_item}" | sed -e 's~^[ \t]*~~;s~[ \t]*$~~')
|
||||||
|
|
||||||
|
echo "[info] Adding ${lan_network_item} as route via docker eth0"
|
||||||
|
ip route add "${lan_network_item}" via "${DEFAULT_GATEWAY}" dev eth0
|
||||||
|
|
||||||
|
lancount=$((lancount+1))
|
||||||
|
done
|
||||||
|
|
||||||
|
echo "[info] ip route defined as follows..." | ts '%Y-%m-%d %H:%M:%.S'
|
||||||
|
echo "--------------------"
|
||||||
|
ip route
|
||||||
|
echo "--------------------"
|
||||||
|
|
||||||
|
# setup iptables marks to allow routing of defined ports via eth0
|
||||||
|
###
|
||||||
|
|
||||||
|
if [[ "${DEBUG}" == "true" ]]; then
|
||||||
|
echo "[debug] Modules currently loaded for kernel" ; lsmod
|
||||||
|
fi
|
||||||
|
|
||||||
|
# check we have iptable_mangle, if so setup fwmark
|
||||||
|
lsmod | grep iptable_mangle
|
||||||
|
iptable_mangle_exit_code=$?
|
||||||
|
|
||||||
|
if [[ $iptable_mangle_exit_code == 0 ]]; then
|
||||||
|
|
||||||
|
echo "[info] iptable_mangle support detected, adding fwmark for tables" | ts '%Y-%m-%d %H:%M:%.S'
|
||||||
|
|
||||||
|
# setup route for deluge webui using set-mark to route traffic for port 8080 to eth0
|
||||||
|
echo "8080 webui" >> /etc/iproute2/rt_tables
|
||||||
|
ip rule add fwmark 1 table webui
|
||||||
|
ip route add default via $DEFAULT_GATEWAY table webui
|
||||||
|
|
||||||
|
fi
|
||||||
|
|
||||||
|
# identify docker bridge interface name (probably eth0)
|
||||||
|
# docker_interface=$(netstat -ie | grep -vE "lo|tun|tap" | sed -n '1!p' | grep -P -o -m 1 '^[^:]+')
|
||||||
|
# if [[ "${DEBUG}" == "true" ]]; then
|
||||||
|
# echo "[debug] Docker interface defined as ${docker_interface}"
|
||||||
|
# fi
|
||||||
|
|
||||||
|
# identify ip for docker bridge interface
|
||||||
|
# docker_ip=$(ifconfig "${docker_interface}" | grep -P -o -m 1 '(?<=inet\s)[^\s]+')
|
||||||
|
# if [[ "${DEBUG}" == "true" ]]; then
|
||||||
|
# echo "[debug] Docker IP defined as ${docker_ip}"
|
||||||
|
# fi
|
||||||
|
|
||||||
|
# identify netmask for docker bridge interface
|
||||||
|
# docker_mask=$(ifconfig "${docker_interface}" | grep -P -o -m 1 '(?<=netmask\s)[^\s]+')
|
||||||
|
# if [[ "${DEBUG}" == "true" ]]; then
|
||||||
|
# echo "[debug] Docker netmask defined as ${docker_mask}"
|
||||||
|
# fi
|
||||||
|
|
||||||
|
# convert netmask into cidr format
|
||||||
|
# docker_network_cidr=$(ipcalc "${docker_ip}" "${docker_mask}" | grep -P -o -m 1 "(?<=Network:)\s+[^\s]+")
|
||||||
|
# echo "[info] Docker network defined as ${docker_network_cidr}" | ts '%Y-%m-%d %H:%M:%.S'
|
||||||
|
|
||||||
|
# input iptable rules
|
||||||
|
###
|
||||||
|
|
||||||
|
# set policy to drop ipv4 for input
|
||||||
|
iptables -P INPUT DROP
|
||||||
|
|
||||||
|
# set policy to drop ipv6 for input
|
||||||
|
ip6tables -P INPUT DROP 1>&- 2>&-
|
||||||
|
|
||||||
|
# accept input to tunnel adapter
|
||||||
|
iptables -A INPUT -i "${VPN_DEVICE_TYPE}" -j ACCEPT
|
||||||
|
|
||||||
|
# accept input to/from docker containers (172.x range is internal dhcp)
|
||||||
|
# iptables -A INPUT -s "${docker_network_cidr}" -d "${docker_network_cidr}" -j ACCEPT
|
||||||
|
|
||||||
|
# accept input to vpn gateway
|
||||||
|
iptables -A INPUT -i eth0 -p $VPN_PROTOCOL --sport $VPN_PORT -j ACCEPT
|
||||||
|
|
||||||
|
# accept input to deluge webui port 8080
|
||||||
|
iptables -A INPUT -i eth0 -p tcp --dport 8080 -j ACCEPT
|
||||||
|
iptables -A INPUT -i eth0 -p tcp --sport 8080 -j ACCEPT
|
||||||
|
|
||||||
|
# process lan networks in the list
|
||||||
|
for lan_network_item in "${lan_network_list[@]}"; do
|
||||||
|
|
||||||
|
# strip whitespace from start and end of lan_network_item
|
||||||
|
lan_network_item=$(echo "${lan_network_item}" | sed -e 's~^[ \t]*~~;s~[ \t]*$~~')
|
||||||
|
|
||||||
|
# accept input to deluge daemon port - used for lan access
|
||||||
|
iptables -A INPUT -i eth0 -s "${lan_network_item}" -p tcp --dport 8999 -j ACCEPT
|
||||||
|
|
||||||
|
done
|
||||||
|
|
||||||
|
# accept input icmp (ping)
|
||||||
|
iptables -A INPUT -p icmp --icmp-type echo-reply -j ACCEPT
|
||||||
|
|
||||||
|
# accept input to local loopback
|
||||||
|
iptables -A INPUT -i lo -j ACCEPT
|
||||||
|
|
||||||
|
# output iptable rules
|
||||||
|
###
|
||||||
|
|
||||||
|
# set policy to drop ipv4 for output
|
||||||
|
iptables -P OUTPUT DROP
|
||||||
|
|
||||||
|
# set policy to drop ipv6 for output
|
||||||
|
ip6tables -P OUTPUT DROP 1>&- 2>&-
|
||||||
|
|
||||||
|
# accept output from tunnel adapter
|
||||||
|
iptables -A OUTPUT -o "${VPN_DEVICE_TYPE}" -j ACCEPT
|
||||||
|
|
||||||
|
# accept output to/from docker containers (172.x range is internal dhcp)
|
||||||
|
# iptables -A OUTPUT -s "${docker_network_cidr}" -d "${docker_network_cidr}" -j ACCEPT
|
||||||
|
|
||||||
|
# accept output from vpn gateway
|
||||||
|
iptables -A OUTPUT -o eth0 -p $VPN_PROTOCOL --dport $VPN_PORT -j ACCEPT
|
||||||
|
|
||||||
|
# if iptable mangle is available (kernel module) then use mark
|
||||||
|
if [[ $iptable_mangle_exit_code == 0 ]]; then
|
||||||
|
|
||||||
|
# accept output from deluge webui port 8112 - used for external access
|
||||||
|
iptables -t mangle -A OUTPUT -p tcp --dport 8080 -j MARK --set-mark 1
|
||||||
|
iptables -t mangle -A OUTPUT -p tcp --sport 8080 -j MARK --set-mark 1
|
||||||
|
|
||||||
|
fi
|
||||||
|
|
||||||
|
# accept output from deluge webui port 8112 - used for lan access
|
||||||
|
iptables -A OUTPUT -o eth0 -p tcp --dport 8080 -j ACCEPT
|
||||||
|
iptables -A OUTPUT -o eth0 -p tcp --sport 8080 -j ACCEPT
|
||||||
|
|
||||||
|
# process lan networks in the list
|
||||||
|
for lan_network_item in "${lan_network_list[@]}"; do
|
||||||
|
|
||||||
|
# strip whitespace from start and end of lan_network_item
|
||||||
|
lan_network_item=$(echo "${lan_network_item}" | sed -e 's~^[ \t]*~~;s~[ \t]*$~~')
|
||||||
|
|
||||||
|
# accept output to deluge daemon port - used for lan access
|
||||||
|
iptables -A OUTPUT -o eth0 -d "${lan_network_item}" -p tcp --sport 8999 -j ACCEPT
|
||||||
|
|
||||||
|
done
|
||||||
|
|
||||||
|
# accept output for icmp (ping)
|
||||||
|
iptables -A OUTPUT -p icmp --icmp-type echo-request -j ACCEPT
|
||||||
|
|
||||||
|
# accept output from local loopback adapter
|
||||||
|
iptables -A OUTPUT -o lo -j ACCEPT
|
||||||
|
|
||||||
|
echo "[info] iptables defined as follows..." | ts '%Y-%m-%d %H:%M:%.S'
|
||||||
|
echo "--------------------"
|
||||||
|
iptables -S
|
||||||
|
echo "--------------------"
|
||||||
|
|
||||||
|
exec /bin/bash /etc/qbittorrent/start.sh
|
27
qbittorrent/scripts/start.sh
Normal file
27
qbittorrent/scripts/start.sh
Normal file
@ -0,0 +1,27 @@
|
|||||||
|
#!/bin/bash
|
||||||
|
set -x
|
||||||
|
|
||||||
|
function trap_handler
|
||||||
|
{
|
||||||
|
echo "[info] Shutdown detected... copying config file to /config/qbittorrent" | ts '%Y-%m-%d %H:%M:%.S'
|
||||||
|
yes | cp /root/.config/qBittorrent/qBittorrent.conf /config/qbittorrent/qBittorrent.conf
|
||||||
|
}
|
||||||
|
|
||||||
|
# if config file doesnt exist then copy default config file
|
||||||
|
if [[ ! -f /config/qbittorrent/qBittorrent.conf ]]; then
|
||||||
|
echo "[warn] qBittorrent config file does not exist, copying default settings to /config/qbittorrent" | ts '%Y-%m-%d %H:%M:%.S'
|
||||||
|
echo "[info] You can edit the conf file at /config/qbittorrent to change qBittorrents settings and restart the container" | ts '%Y-%m-%d %H:%M:%.S'
|
||||||
|
yes | cp /root/.config/qBittorrent/qBittorrent.conf /config/qbittorrent/qBittorrent.conf
|
||||||
|
chown -R "${PUID}":"${PGID}" /config/qbittorrent
|
||||||
|
chmod -R 775 /config/qbittorrent
|
||||||
|
else
|
||||||
|
echo "qBittorrent config file exists in /config, copying to qbittorrent config directory" | ts '%Y-%m-%d %H:%M:%.S'
|
||||||
|
yes | cp /config/qbittorrent/qBittorrent.conf /root/.config/qBittorrent/qBittorrent.conf
|
||||||
|
chmod 644 /root/.config/qBittorrent/qBittorrent.conf
|
||||||
|
fi
|
||||||
|
|
||||||
|
trap trap_handler SIGINT SIGTERM SIGHUP
|
||||||
|
|
||||||
|
echo "[info] Starting qBittorrent daemon..." | ts '%Y-%m-%d %H:%M:%.S'
|
||||||
|
/usr/bin/qbittorrent-nox -d &
|
||||||
|
wait
|
Loading…
Reference in New Issue
Block a user