mirror of
https://github.com/netbirdio/netbird.git
synced 2025-02-03 03:49:26 +01:00
246abda46d
Add a default firewall rule to allow netbird traffic to be handled by the access control managers. Userspace manager behavior: - When running on Windows, a default rule is add on Windows firewall - For Linux, we are using one of the Kernel managers to add a single rule - This PR doesn't handle macOS Kernel manager behavior: - For NFtables, if there is a filter table, an INPUT rule is added - Iptables follows the previous flow if running on kernel mode. If running on userspace mode, it adds a single rule for INPUT and OUTPUT chains A new checkerFW package has been introduced to consolidate checks across route and access control managers. It supports a new environment variable to skip nftables and allow iptables tests |
||
---|---|---|
.. | ||
acl | ||
auth | ||
checkfw | ||
dns | ||
peer | ||
routemanager | ||
stdnet | ||
templates | ||
wgproxy | ||
config_test.go | ||
config.go | ||
connect.go | ||
device_auth.go | ||
engine_stdnet_android.go | ||
engine_stdnet.go | ||
engine_test.go | ||
engine.go | ||
login.go | ||
mobile_dependency.go | ||
pkce_auth.go | ||
state.go |