mirror of
https://github.com/netbirdio/netbird.git
synced 2024-12-04 22:10:56 +01:00
246abda46d
Add a default firewall rule to allow netbird traffic to be handled by the access control managers. Userspace manager behavior: - When running on Windows, a default rule is add on Windows firewall - For Linux, we are using one of the Kernel managers to add a single rule - This PR doesn't handle macOS Kernel manager behavior: - For NFtables, if there is a filter table, an INPUT rule is added - Iptables follows the previous flow if running on kernel mode. If running on userspace mode, it adds a single rule for INPUT and OUTPUT chains A new checkerFW package has been introduced to consolidate checks across route and access control managers. It supports a new environment variable to skip nftables and allow iptables tests
22 lines
417 B
Plaintext
22 lines
417 B
Plaintext
.idea
|
|
.run
|
|
*.iml
|
|
dist/
|
|
bin/
|
|
.env
|
|
conf.json
|
|
http-cmds.sh
|
|
infrastructure_files/management.json
|
|
infrastructure_files/management-*.json
|
|
infrastructure_files/docker-compose.yml
|
|
infrastructure_files/openid-configuration.json
|
|
infrastructure_files/turnserver.conf
|
|
management/management
|
|
client/client
|
|
client/client.exe
|
|
*.syso
|
|
client/.distfiles/
|
|
infrastructure_files/setup.env
|
|
infrastructure_files/setup-*.env
|
|
.vscode
|
|
.DS_Store |