VPN tunnel for apps
-
THAT WAS IT! Well, there's more to box code changes than just proving the vpn client connection works. But @girish was overriding the network name in dockerproxy.js which took an entire day to figure out! but really
Alright, @mehdi, I'm glad you pushed me enter into box code realms. I'm still intimidated by it. But I've got (sub)container creation down pretty well now.
-
One of the worst parts of box code is that all these containers (aside from contained cloudron services and cloudron itself) have hshes for names. So, when trying to connect one to another and then inspecting the attributes of all of them is so confusing.
-
To get this app store ready, it might even need modifications to the nginx reverse proxy. @mehdi Maybe you can help? Is there a way, in cloudron to open more than one port? The manifest seems to be a way to publish a random port to forward to the specified-in-the-manifest port
Example:
Using
docker container ls --format "table {{.ID}}\t{{.Names}}\t{{.Ports}}" -a
- I can look at all the "published" ports. They all seems to be going through a nginx reverse proxy to reach port 80 / 443. And their original port that forwards to that is random (?).NAMES ----------------------------------- PORTS
0b993ea5-85fc-4465-af5f-a1cd5ea5aeb7 127.0.0.1:43641->8080/tcp
57c94244-112d-4b98-abc4-0f15d6b07ca7 127.0.0.1:40875->8000/tcp
10a9ae64-689e-4765-a990-89a3d5e400d2 127.0.0.1:44749->80/tcp
-
I'm having a reverse proxy battle. Everything works now, but the "connected-to-the-vpn-client" app can't access the outside world. Cloudron doesn't publish ports in the standard way, there's some proxy between it all, and I have to RE that to get the apps connected to the
openvpn-client
to use the proxy somehow. It should just work by default looking at the code, but - there's always something. -
Okay, so there's a problem here:
appPortBindings.hostPort
needs to be set for all of Cloudron's containers or Cloudron turns them off. The only reason I know my OpenVPN client works is because Icurl icanhazip.com
beforebox
stops the container for not passing all of it's "checks."But this is a special case. To connect to the VPN Client - the app container can't have a hostPort as it inherits that from the VPN Client as part of the connection. But Cloudron requires the App published to have a port (I hardcode it not to), so even though the app works, Cloudron will stop it from running eventually once it fails enough checks until I figure out how to deal with this reverse proxy thing works.
-
I just have to figure out how to let
appdb.js
know that there's an actual http port set, it's just not in the **connected-to-vpn-client's`` app / container, it's defined in the OpenVPN Client's app / container.Barring figuring that out though, I have to have the openvpn-client app mirror the ports that are exposed for every app connnected to it (right now, I'm just letting one container connect since Cloudron doesn't support more than one exposed port). Ahhh, so basically the OpenVPN client's http port has to be variable depending on the connecting app (or apps if people want to connect more than one other app to it at a time - I only personally need one app connected to it). So that's
manifest.js
code to also modify to get this to work. -
The first step in making any tunnel is digging a hole
-
Nice metaphor for a VPN tunnel app. Iām so close to get this working. I found the SQL that inserts the httpPort into the DB so Iām going to try to have the container āattaching to the openvpn clientā inherit the port and port type from the VPN Client while still having it be discoverable by the database. Letās hope this works.
-
Alright, I got the container both running and entered into the database (I'm pretty sure). So Cloudron can "see" the app. I copied the exposed and host ports to the container returned at the end of
createContainer
while nulling them during the containers initialization.That seems to be enough for app discovery, now to see if I can get the reverse proxy working which will be the last piece of the puzzle I hope.
-
Dig, Forest, Dig!
-
@marcusquinn Iām not positive but I think the Nguni reverse proxy is being fed a null or 0 hostPort. The exposedPort is part of Cloudronās environment variables. Maybe Iāll add the hostPort to that and read it back during reverse proxy configuration.
-
I hope nobody finds me logging my development on this app to be annoying. I needed a place to keep all of these new concepts in my head. Iāve never worked with Docker or Cloudron before this month and Iām trying to jot down my experiences for me to read later until I complete this.
If I hardcode the health checks to all pass. My app connected to the VPN stays connected and itās terminal working but never gets past the āStartingā phase until it times out in like ten minutes (the reverse proxy doesnāt work so neither does Letās Encrypt...which then times out the app). This is because itās reverse proxy isnāt set up correctly. I believe that the NGINX reverse proxy either gets the wrong hostPort or the wrong exposedPort or both.
Iām actually amazed that I got this far. Because both the
hostPort
does make it into the database now for it to be discoverable by Cloudron. But why the reverse proxyWriteNginxReverseConfig
receives different info than `apps.jsā āadd-to-dbā function (since that happens first) is really confusing. Iāll keep working on it though. I canāt hardcode (wellll...I technically can for the same container but donāt want to).Another problem is that my NetworkMode to container changes only (for now) take effect upon installation. Have to figure out why that is - but I also have some guesses.
Nobody told me
box
code was this hard. -
And Iām still using the appās FQDN variable to hardcode its attachment to the VPN rather than its manifest ID since I canāt find the function to read an appās manifest to get its ID. So much more work to be done (I need the VPN clientās
containerCreate
optionexposedPort(s)
to be variable depending on its ID and the app connecting to it) - which is another reason I need to learn to use manifest data. But thatās a simple function Iām sure Iām missing somewhere. @girish - do you know it off the top of your head? -
I suddently have a doubt about what your goal is ...
Are you trying to make the app itself, when it tries to connect to an external service, use the VPN, but still be exposed through normal internet?
Or are you trying to restrict the users from accessing the app itself if they are not going through the VPN?
-
Iām trying to accomplish your first idea.
I made a Cloudron app called āOpenVPN Clientā and it works perfectly. It can connect to any OpenVPN Server. I put a basic Apache configuration in front of it just to pass the Cloudronās Health Check.
Now, my use case is to have a singular other app (any app, but Iām using the basic LAMP from the Cloudron store for testing) route all of that appās traffic through my OpenVPN Client app. I understand other users may want to connect more than one other app and itās technically possible to do so via setting their
NetworkMode
tocontainer:open-vpn-id
- but that introduces an extra complexity of exposing more than one port which Cloudron cannot do rn (but is technically possible if girish wanted to make those edits). I donāt mind though since my use case is a 1:1 OpenVPN Client + Other Cloudron app connection.Thatās the entire thing in a nutshell. Iāve had to dig into a lot of
box
code to understand how to make it happen but my OpenVPN Client app is completely working and even passes all the Cloudron health checks but the singular app connecting to it and routing all of its web traffic through it does not pass the Cloudron Healthcheck because a container connecting to the network of another container is forced to inherit all the network properties of that container. That means, the reverse proxy sees nohostPort
(Cloudron is looking for it in the wrong place) when trying to configure the app and thus literally stays in the **Starting up...ā statuses (with itās terminal working and traffic is verified routing through the OpenVPN Client). -
@Lonk sounds like you need an internal network interface for internal liveness checks and external interface for the outgoing VPN traffic and it's checks.
otherwise you're forced to check liveness on the wrong app just because it's routing through it.