fix(routing): change firewall only for matching ip families
This commit is contained in:
@@ -3,6 +3,8 @@ package firewall
|
||||
import (
|
||||
"context"
|
||||
"fmt"
|
||||
|
||||
"github.com/qdm12/gluetun/internal/netlink"
|
||||
)
|
||||
|
||||
func (c *Config) SetEnabled(ctx context.Context, enabled bool) (err error) {
|
||||
@@ -147,7 +149,16 @@ func (c *Config) allowVPNIP(ctx context.Context) (err error) {
|
||||
|
||||
func (c *Config) allowOutboundSubnets(ctx context.Context) (err error) {
|
||||
for _, subnet := range c.outboundSubnets {
|
||||
subnetIsIPv6 := subnet.Addr().Is6()
|
||||
firewallUpdated := false
|
||||
for _, defaultRoute := range c.defaultRoutes {
|
||||
defaultRouteIsIPv6 := defaultRoute.Family == netlink.FamilyV6
|
||||
ipFamilyMatch := subnetIsIPv6 == defaultRouteIsIPv6
|
||||
if !ipFamilyMatch {
|
||||
continue
|
||||
}
|
||||
firewallUpdated = true
|
||||
|
||||
const remove = false
|
||||
err := c.acceptOutputFromIPToSubnet(ctx, defaultRoute.NetInterface,
|
||||
defaultRoute.AssignedIP, subnet, remove)
|
||||
@@ -155,6 +166,11 @@ func (c *Config) allowOutboundSubnets(ctx context.Context) (err error) {
|
||||
return err
|
||||
}
|
||||
}
|
||||
|
||||
if !firewallUpdated {
|
||||
c.logger.Info(fmt.Sprintf("ignoring subnet %s which has "+
|
||||
"no default route matching its family", subnet))
|
||||
}
|
||||
}
|
||||
return nil
|
||||
}
|
||||
|
||||
@@ -5,6 +5,7 @@ import (
|
||||
"fmt"
|
||||
"net/netip"
|
||||
|
||||
"github.com/qdm12/gluetun/internal/netlink"
|
||||
"github.com/qdm12/gluetun/internal/subnet"
|
||||
)
|
||||
|
||||
@@ -37,7 +38,16 @@ func (c *Config) SetOutboundSubnets(ctx context.Context, subnets []netip.Prefix)
|
||||
func (c *Config) removeOutboundSubnets(ctx context.Context, subnets []netip.Prefix) {
|
||||
const remove = true
|
||||
for _, subNet := range subnets {
|
||||
subnetIsIPv6 := subNet.Addr().Is6()
|
||||
firewallUpdated := false
|
||||
for _, defaultRoute := range c.defaultRoutes {
|
||||
defaultRouteIsIPv6 := defaultRoute.Family == netlink.FamilyV6
|
||||
ipFamilyMatch := subnetIsIPv6 == defaultRouteIsIPv6
|
||||
if !ipFamilyMatch {
|
||||
continue
|
||||
}
|
||||
|
||||
firewallUpdated = true
|
||||
err := c.acceptOutputFromIPToSubnet(ctx, defaultRoute.NetInterface,
|
||||
defaultRoute.AssignedIP, subNet, remove)
|
||||
if err != nil {
|
||||
@@ -45,6 +55,12 @@ func (c *Config) removeOutboundSubnets(ctx context.Context, subnets []netip.Pref
|
||||
continue
|
||||
}
|
||||
}
|
||||
|
||||
if !firewallUpdated {
|
||||
c.logger.Info(fmt.Sprintf("ignoring subnet %s which has "+
|
||||
"no default route matching its family", subNet))
|
||||
continue
|
||||
}
|
||||
c.outboundSubnets = subnet.RemoveSubnetFromSubnets(c.outboundSubnets, subNet)
|
||||
}
|
||||
}
|
||||
@@ -52,13 +68,28 @@ func (c *Config) removeOutboundSubnets(ctx context.Context, subnets []netip.Pref
|
||||
func (c *Config) addOutboundSubnets(ctx context.Context, subnets []netip.Prefix) error {
|
||||
const remove = false
|
||||
for _, subnet := range subnets {
|
||||
subnetIsIPv6 := subnet.Addr().Is6()
|
||||
firewallUpdated := false
|
||||
for _, defaultRoute := range c.defaultRoutes {
|
||||
defaultRouteIsIPv6 := defaultRoute.Family == netlink.FamilyV6
|
||||
ipFamilyMatch := subnetIsIPv6 == defaultRouteIsIPv6
|
||||
if !ipFamilyMatch {
|
||||
continue
|
||||
}
|
||||
|
||||
firewallUpdated = true
|
||||
err := c.acceptOutputFromIPToSubnet(ctx, defaultRoute.NetInterface,
|
||||
defaultRoute.AssignedIP, subnet, remove)
|
||||
if err != nil {
|
||||
return err
|
||||
}
|
||||
}
|
||||
|
||||
if !firewallUpdated {
|
||||
c.logger.Info(fmt.Sprintf("ignoring subnet %s which has "+
|
||||
"no default route matching its family", subnet))
|
||||
continue
|
||||
}
|
||||
c.outboundSubnets = append(c.outboundSubnets, subnet)
|
||||
}
|
||||
return nil
|
||||
|
||||
Reference in New Issue
Block a user