mirror of
https://github.com/netbirdio/netbird.git
synced 2024-11-27 10:33:11 +01:00
e69ec6ab6a
* Optimize rules with All groups * Use IP sets in ACLs (nftables implementation) * Fix squash rule when we receive optimized rules list from management
34 lines
991 B
Go
34 lines
991 B
Go
package acl
|
|
|
|
import (
|
|
log "github.com/sirupsen/logrus"
|
|
|
|
"github.com/netbirdio/netbird/client/firewall"
|
|
"github.com/netbirdio/netbird/client/firewall/iptables"
|
|
"github.com/netbirdio/netbird/client/firewall/nftables"
|
|
"github.com/netbirdio/netbird/client/firewall/uspfilter"
|
|
)
|
|
|
|
// Create creates a firewall manager instance for the Linux
|
|
func Create(iface IFaceMapper) (manager *DefaultManager, err error) {
|
|
var fm firewall.Manager
|
|
if iface.IsUserspaceBind() {
|
|
// use userspace packet filtering firewall
|
|
if fm, err = uspfilter.Create(iface); err != nil {
|
|
log.Debugf("failed to create userspace filtering firewall: %s", err)
|
|
return nil, err
|
|
}
|
|
} else {
|
|
if fm, err = nftables.Create(iface); err != nil {
|
|
log.Debugf("failed to create nftables manager: %s", err)
|
|
// fallback to iptables
|
|
if fm, err = iptables.Create(iface); err != nil {
|
|
log.Errorf("failed to create iptables manager: %s", err)
|
|
return nil, err
|
|
}
|
|
}
|
|
}
|
|
|
|
return newDefaultManager(fm), nil
|
|
}
|