-
-
Notifications
You must be signed in to change notification settings - Fork 1.2k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Transmission not automatically starting in container #2231
Comments
I'm having the same issue on Ubuntu 20.04/Docker 20.10.14 on Raspberry Pi 4b. Log stops at |
this log entry is the problem:
something is conflicting with the startup and overriding the openvpn --up script.. |
this is what the lines should be :
and the bottom part:
|
I have a OpenVPN server running on the host, not in a container. Could that be the issue? Apart from that, no there is nothing else in the container. As far as i can tell, the startup script is completely missing a call to the transmission start.sh |
this is the tunnelUp script
calls transmission once openVPN has established a tunnel based on docker-transmission-openvpn/openvpn/start.sh Line 172 in 8cc1870
|
I cannot check on stuff now, but when I checked looking for Maybe it was a bug with an old image for ARM? |
Using the :dev image fixed the issue of Transmission not starting ( Edit: Not entirely sure what was wrong but it was definitely a configuration issue. |
Yeah, you should definitely do a docker pull as that must be an ancient version.. |
403 most likely the transmission settings for whitelist not correctly set |
VPN_CONFIG_SOURCE does not need to be set, it has a default value.. |
The 403 was fixed when I removed and recreated the container using the command line instead of through Portainer like I normally do. Not sure what happened, but it works now and I'm not complaining.
This is the log output I get if I don't set
I had no problem using :latest, other than Transmission not starting. |
Yeah, that error is expected and can be ignored if using CUSTOM.. I think I fixed that in :dev to remove the error but still works fine. |
To clarify, that log output is all I get and the container doesn't start unless VPN_CONFIG_SOURCE is set. |
in that case something in your config isn't correct..
|
I just added an additional check and pushed it..try to pull in a few minutes. |
Pulling the latest :dev image seems to have removed the need to set VPN_CONFIG_SOURCE and the log does not show that it tried to download the configs now. |
Latest image is still not working, however the dev image fixed it. |
Is there a pinned issue for this?
Is there an existing or similar issue/discussion for this?
Is there any comment in the documentation for this?
Is this related to a provider?
Are you using the latest release?
Have you tried using the dev branch latest?
Docker run config used
docker run --cap-add=NET_ADMIN -d -v /home/pi/transmissionvpn:/data
-v /home/pi/transmissionvpnconfig:/etc/openvpn/custom/ -e OPENVPN_PROVIDER=custom
-e OPENVPN_CONFIG=vpnconfig -e OPENVPN_USERNAME=user
-e OPENVPN_PASSWORD=password -e LOCAL_NETWORK=192.168.1.0/24
--log-driver json-file --log-opt max-size=10m -p 9091:9091 haugene/transmission-openvpn
Current Behavior
Transmission WebUI is not reachable, but by attaching to the container and running
transmission-daemon
then it works as expectedExpected Behavior
transmission daemon should automatically start on container start
How have you tried to solve the problem?
Log output
Starting container with revision: 8cc1870
Creating TUN device /dev/net/tun
Using OpenVPN provider: CUSTOM
Running with VPN_CONFIG_SOURCE auto
No bundled config script found for CUSTOM. Defaulting to external config
Downloading configs from https://github.com/haugene/vpn-configs-contrib/archive/main.zip into /tmp/tmp.kJGnvYsO8q
Extracting configs to /tmp/tmp.fpEyVImGjS
ERROR: Could not find any configs for provider CUSTOM in downloaded configs
Cleanup: deleting /tmp/tmp.kJGnvYsO8q and /tmp/tmp.fpEyVImGjS
Starting OpenVPN using config vpnconfig.ovpn
Modifying /etc/openvpn/custom/vpnconfig.ovpn for best behaviour in this container
Modification: Point auth-user-pass option to the username/password file
Modification: Change ca certificate path
Modification: Change ping options
Modification: Update/set resolv-retry to 15 seconds
Modification: Change tls-crypt keyfile path
Modification: Set output verbosity to 3
Modification: Remap SIGUSR1 signal to SIGTERM, avoid OpenVPN restart loop
Setting OpenVPN credentials...
adding route to local network 192.168.1.0/24 via 172.17.0.1 dev eth0
Thu Mar 24 21:37:33 2022 Multiple --up scripts defined. The previously configured script is overridden.
Thu Mar 24 21:37:33 2022 OpenVPN 2.4.7 arm-unknown-linux-gnueabihf [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [PKCS11] [MH/PKTINFO] [AEAD] built on Jul 19 2021
Thu Mar 24 21:37:33 2022 library versions: OpenSSL 1.1.1f 31 Mar 2020, LZO 2.10
Thu Mar 24 21:37:33 2022 NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
Thu Mar 24 21:37:33 2022 Outgoing Control Channel Authentication: Using 512 bit message hash 'SHA512' for HMAC authentication
Thu Mar 24 21:37:33 2022 Incoming Control Channel Authentication: Using 512 bit message hash 'SHA512' for HMAC authentication
Thu Mar 24 21:37:33 2022 TCP/UDP: Preserving recently used remote address: [AF_INET]138.199.7.240:80
Thu Mar 24 21:37:33 2022 Socket Buffers: R=[180224->180224] S=[180224->180224]
Thu Mar 24 21:37:33 2022 UDP link local: (not bound)
Thu Mar 24 21:37:33 2022 UDP link remote: [AF_INET]138.199.7.240:80
Thu Mar 24 21:37:33 2022 TLS: Initial packet from [AF_INET]138.199.7.240:80, sid=55eef9f0 6193b3b7
Thu Mar 24 21:37:33 2022 WARNING: this configuration may cache passwords in memory -- use the auth-nocache option to prevent this
Thu Mar 24 21:37:33 2022 VERIFY OK: depth=2, C=CH, O=x AG, CN=x Root CA
Thu Mar 24 21:37:33 2022 VERIFY OK: depth=1, C=CH, O=x AG, CN=x Intermediate CA 1
Thu Mar 24 21:37:33 2022 VERIFY KU OK
Thu Mar 24 21:37:33 2022 Validating certificate extended key usage
Thu Mar 24 21:37:33 2022 ++ Certificate has EKU (str) TLS Web Client Authentication, expects TLS Web Server Authentication
Thu Mar 24 21:37:33 2022 ++ Certificate has EKU (oid) 1.3.6.1.5.5.7.3.2, expects TLS Web Server Authentication
Thu Mar 24 21:37:33 2022 ++ Certificate has EKU (str) 1.3.6.1.5.5.8.2.2, expects TLS Web Server Authentication
Thu Mar 24 21:37:33 2022 ++ Certificate has EKU (oid) 1.3.6.1.5.5.8.2.2, expects TLS Web Server Authentication
Thu Mar 24 21:37:33 2022 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
Thu Mar 24 21:37:33 2022 VERIFY EKU OK
Thu Mar 24 21:37:33 2022 VERIFY OK: depth=0, CN=x
Thu Mar 24 21:37:33 2022 WARNING: 'link-mtu' is used inconsistently, local='link-mtu 1633', remote='link-mtu 1634'
Thu Mar 24 21:37:33 2022 WARNING: 'comp-lzo' is present in remote config but missing in local config, remote='comp-lzo'
Thu Mar 24 21:37:33 2022 Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, 4096 bit RSA
Thu Mar 24 21:37:33 2022 [x] Peer Connection Initiated with [AF_INET]138.199.7.240:80
Thu Mar 24 21:37:34 2022 SENT CONTROL [x]: 'PUSH_REQUEST' (status=1)
Thu Mar 24 21:37:34 2022 PUSH: Received control message: 'PUSH_REPLY,dhcp-option DNS 10.19.0.1,sndbuf 524288,rcvbuf 524288,redirect-gateway def1,explicit-exit-notify,comp-lzo no,route-gateway 10.19.0.1,topology subnet,ping 10,ping-restart 60,socket-flags TCP_NODELAY,ifconfig 10.19.0.47 255.255.0.0,peer-id 196707,cipher AES-256-GCM'
Thu Mar 24 21:37:34 2022 OPTIONS IMPORT: timers and/or timeouts modified
Thu Mar 24 21:37:34 2022 OPTIONS IMPORT: explicit notify parm(s) modified
Thu Mar 24 21:37:34 2022 OPTIONS IMPORT: compression parms modified
Thu Mar 24 21:37:34 2022 OPTIONS IMPORT: --sndbuf/--rcvbuf options modified
Thu Mar 24 21:37:34 2022 Socket Buffers: R=[180224->360448] S=[180224->360448]
Thu Mar 24 21:37:34 2022 OPTIONS IMPORT: --socket-flags option modified
Thu Mar 24 21:37:34 2022 NOTE: setsockopt TCP_NODELAY=1 failed
Thu Mar 24 21:37:34 2022 OPTIONS IMPORT: --ifconfig/up options modified
Thu Mar 24 21:37:34 2022 OPTIONS IMPORT: route options modified
Thu Mar 24 21:37:34 2022 OPTIONS IMPORT: route-related options modified
Thu Mar 24 21:37:34 2022 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
Thu Mar 24 21:37:34 2022 OPTIONS IMPORT: peer-id set
Thu Mar 24 21:37:34 2022 OPTIONS IMPORT: adjusting link_mtu to 1656
Thu Mar 24 21:37:34 2022 OPTIONS IMPORT: data channel crypto options modified
Thu Mar 24 21:37:34 2022 Data Channel: using negotiated cipher 'AES-256-GCM'
Thu Mar 24 21:37:34 2022 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Thu Mar 24 21:37:34 2022 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Thu Mar 24 21:37:34 2022 ROUTE_GATEWAY 172.17.0.1/255.255.0.0 IFACE=eth0 HWADDR=02:42:ac:11:00:06
Thu Mar 24 21:37:34 2022 TUN/TAP device tun0 opened
Thu Mar 24 21:37:34 2022 TUN/TAP TX queue length set to 100
Thu Mar 24 21:37:34 2022 /sbin/ip link set dev tun0 up mtu 1500
Thu Mar 24 21:37:34 2022 /sbin/ip addr add dev tun0 10.19.0.47/16 broadcast 10.19.255.255
Thu Mar 24 21:37:34 2022 /etc/openvpn/update-resolv-conf tun0 1500 1584 10.19.0.47 255.255.0.0 init
Thu Mar 24 21:37:34 2022 /sbin/ip route add 138.199.7.240/32 via 172.17.0.1
Thu Mar 24 21:37:34 2022 /sbin/ip route add 0.0.0.0/1 via 10.19.0.1
Thu Mar 24 21:37:34 2022 /sbin/ip route add 128.0.0.0/1 via 10.19.0.1
Thu Mar 24 21:37:34 2022 Initialization Sequence Completed
Thu Mar 24 21:44:09 2022 AEAD Decrypt error: bad packet ID (may be a replay): [ #50 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings
Thu Mar 24 21:45:37 2022 AEAD Decrypt error: bad packet ID (may be a replay): [ #62 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings
Thu Mar 24 21:45:37 2022 AEAD Decrypt error: bad packet ID (may be a replay): [ #62 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings
Thu Mar 24 21:45:37 2022 AEAD Decrypt error: bad packet ID (may be a replay): [ #62 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings
Thu Mar 24 21:45:37 2022 AEAD Decrypt error: bad packet ID (may be a replay): [ #62 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings
Thu Mar 24 21:45:37 2022 AEAD Decrypt error: bad packet ID (may be a replay): [ #62 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings
Thu Mar 24 21:45:37 2022 AEAD Decrypt error: bad packet ID (may be a replay): [ #62 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings
Thu Mar 24 21:45:37 2022 AEAD Decrypt error: bad packet ID (may be a replay): [ #62 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings
HW/SW Environment
Anything else?
No response
The text was updated successfully, but these errors were encountered: