mirror of
https://github.com/netbirdio/netbird.git
synced 2024-12-01 20:43:43 +01:00
246abda46d
Add a default firewall rule to allow netbird traffic to be handled by the access control managers. Userspace manager behavior: - When running on Windows, a default rule is add on Windows firewall - For Linux, we are using one of the Kernel managers to add a single rule - This PR doesn't handle macOS Kernel manager behavior: - For NFtables, if there is a filter table, an INPUT rule is added - Iptables follows the previous flow if running on kernel mode. If running on userspace mode, it adds a single rule for INPUT and OUTPUT chains A new checkerFW package has been introduced to consolidate checks across route and access control managers. It supports a new environment variable to skip nftables and allow iptables tests |
||
---|---|---|
.. | ||
client_test.go | ||
client.go | ||
common_linux_test.go | ||
firewall_linux.go | ||
firewall_nonlinux.go | ||
firewall.go | ||
iptables_linux_test.go | ||
iptables_linux.go | ||
manager_test.go | ||
manager.go | ||
mock.go | ||
nftables_linux_test.go | ||
nftables_linux.go | ||
notifier.go | ||
router_pair.go | ||
server_android.go | ||
server_nonandroid.go | ||
server.go | ||
systemops_android.go | ||
systemops_bsd.go | ||
systemops_linux.go | ||
systemops_nonandroid_test.go | ||
systemops_nonandroid.go | ||
systemops_nonlinux.go | ||
systemops_windows.go |