You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: .github/ISSUE_TEMPLATE/provider.md
+30-7Lines changed: 30 additions & 7 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -6,12 +6,35 @@ labels: ":bulb: New provider"
6
6
7
7
---
8
8
9
-
One of the following is required:
9
+
Important notes:
10
10
11
-
- Publicly accessible URL to a zip file containing the Openvpn configuration files
12
-
- Publicly accessible URL to a structured (JSON etc.) list of servers **and attach** an example Openvpn configuration file for both TCP and UDP
13
-
- Publicly accessible URL to the list of servers **and attach** an example Openvpn configuration file for both TCP and UDP
11
+
- There is no need to support both OpenVPN and Wireguard for a provider, but it's better to support both if possible
12
+
- We do **not** implement authentication to access servers information behind a login. This is way too time consuming unfortunately
13
+
- If it's not possible to support a provider natively, you can still use the [the custom provider](https://github.com/qdm12/gluetun-wiki/blob/main/setup/providers/custom.md)
14
+
15
+
## For Wireguard
16
+
17
+
Wireguard can be natively supported ONLY if:
18
+
19
+
- the `PrivateKey` field value is the same across all servers for one user account
20
+
- the `Address` field value is:
21
+
- can be found in a structured (JSON etc.) list of servers publicly available; OR
22
+
- the same across all servers for one user account
23
+
- the `PublicKey` field value is:
24
+
- can be found in a structured (JSON etc.) list of servers publicly available; OR
25
+
- the same across all servers for one user account
26
+
- the `Endpoint` field value:
27
+
- can be found in a structured (JSON etc.) list of servers publicly available
28
+
- can be determined using a pattern, for example using country codes in hostnames
29
+
30
+
If any of these conditions are not met, Wireguard cannot be natively supported or there is no advantage compared to using a custom Wireguard configuration file.
14
31
15
-
If the list of servers requires to login **or** is hidden behind an interactive configurator,
16
-
you can only use a custom Openvpn configuration file.
17
-
[The Wiki's OpenVPN configuration file page](https://github.com/qdm12/gluetun-wiki/blob/main/setup/openvpn-configuration-file.md) describes how to do so.
32
+
If **all** of these conditions are met, please provide an answer for each of them.
33
+
34
+
## For OpenVPN
35
+
36
+
OpenVPN can be natively supported ONLY if one of the following can be provided, by preference in this order:
37
+
38
+
- Publicly accessible URL to a structured (JSON etc.) list of servers **and attach** an example Openvpn configuration file for both TCP and UDP; OR
39
+
- Publicly accessible URL to a zip file containing the Openvpn configuration files; OR
40
+
- Publicly accessible URL to the list of servers **and attach** an example Openvpn configuration file for both TCP and UDP
<!-- Please describe the reason for the changes being proposed. -->
4
+
5
+
# Issue
6
+
7
+
<!-- Please link to the issue(s) this change relates to. -->
8
+
9
+
# Assertions
10
+
11
+
*[ ] I am aware that we do not accept manual changes to the servers.json file <!-- If this is your goal, please consult https://github.com/qdm12/gluetun-wiki/blob/main/setup/servers.md#update-using-the-command-line -->
12
+
*[ ] I am aware that any changes to settings should be reflected in the [wiki](https://github.com/qdm12/gluetun-wiki/)
0 commit comments