Skip to content

Firewall support#354

Draft
nbrownus wants to merge 9 commits intomainfrom
firewall
Draft

Firewall support#354
nbrownus wants to merge 9 commits intomainfrom
firewall

Conversation

@nbrownus
Copy link
Contributor

WIP: CRUD and yaml import support for firewall rules

nebula/site.go Outdated
CASha *string `json:"caSha"`
}

func fromConfigFirewallRule(r configFirewallRule) firewallRule {
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

this is so so so close to the real rule parser it would be nice to uhhh not have this

nebula/site.go Outdated

port := strings.TrimSpace(r.Port)
switch {
case port == "" || strings.ToLower(port) == "any":
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

no code support smh my head

nebula/site.go Outdated
h := r.Host
rule.Host = &h
}
if r.Group != "" {
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

group and groups is illegal in nebula but not here

this.errors = errors ?? [];
this.unsafeRoutes = unsafeRoutes ?? [];
this.dnsResolvers = dnsResolvers ?? [];
this.inboundRules = inboundRules ?? [];
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

we don't have a default-icmp-allow-inbound today right?

Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

do we wanna add something to fall back to these if the configured rules aren't null but parse fails?

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants