Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Running websockproxy without TUN/TAP #23

Open
benjamincburns opened this issue Mar 1, 2023 Discussed in #22 · 0 comments
Open

Running websockproxy without TUN/TAP #23

benjamincburns opened this issue Mar 1, 2023 Discussed in #22 · 0 comments

Comments

@benjamincburns
Copy link
Owner

Discussed in #22

Originally posted by SSP6904 March 1, 2023
Hi!

I'm trying to do this in my v86 repo, along with the Docker file in the root.
But it takes a while or if that's just me..

Is there a version that can deploy on GitHub actions?

Unfortunately at the moment there is no way to run websockproxy as a standalone virtual switch. At the moment, websockproxy always expects to be able to allocate and connect to a TAP device. This means that it simply won't run in unprivileged environments, such as in a docker container that's created without the --privileged flag.

It should be easy however to make websockproxy fall back to being a dumb switch in cases when it fails to allocate or access a TAP device. This will get around the need to run it in a privileged context. Unfortunately this may create new problems for some use cases, however. Specifically, setups relying on websockproxy transitively depend on the operating system and other userspace daemons to provide the following features:

  • DHCP
  • Hostname allocation and DNS
  • NAT gateway (aka accessing the internet)

It is likely possible to bake some of these features into websockproxy directly, but I consider those to be out of scope for this ticket.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

No branches or pull requests

1 participant