mirror of
https://github.com/eduardogsilva/wireguard_webadmin.git
synced 2025-08-12 07:12:22 +00:00
Denying Peer-to-Peer or instance-to-instance matches default forward policy.
This commit is contained in:
parent
9f440468a6
commit
54806edeb6
@ -170,12 +170,15 @@ iptables -t filter -I FORWARD -j WGWADM_FORWARD
|
|||||||
|
|
||||||
iptables -t filter -A WGWADM_FORWARD -m state --state RELATED,ESTABLISHED -j ACCEPT
|
iptables -t filter -A WGWADM_FORWARD -m state --state RELATED,ESTABLISHED -j ACCEPT
|
||||||
'''
|
'''
|
||||||
|
|
||||||
|
|
||||||
return header
|
return header
|
||||||
|
|
||||||
|
|
||||||
def generate_firewall_footer():
|
def generate_firewall_footer():
|
||||||
firewall_settings, firewall_settings_created = FirewallSettings.objects.get_or_create(name='global')
|
firewall_settings, firewall_settings_created = FirewallSettings.objects.get_or_create(name='global')
|
||||||
|
deny_policy = 'REJECT'
|
||||||
|
if firewall_settings.default_forward_policy == 'drop':
|
||||||
|
deny_policy = 'DROP'
|
||||||
|
|
||||||
footer = '# The following rules come from Firewall settings\n'
|
footer = '# The following rules come from Firewall settings\n'
|
||||||
footer += '# Default FORWARD policy\n'
|
footer += '# Default FORWARD policy\n'
|
||||||
footer += f'iptables -t filter -P FORWARD {firewall_settings.default_forward_policy.upper()}\n'
|
footer += f'iptables -t filter -P FORWARD {firewall_settings.default_forward_policy.upper()}\n'
|
||||||
@ -183,10 +186,10 @@ def generate_firewall_footer():
|
|||||||
footer += '# Same instance Peer to Peer traffic\n'
|
footer += '# Same instance Peer to Peer traffic\n'
|
||||||
for wireguard_instance in WireGuardInstance.objects.all().order_by('instance_id'):
|
for wireguard_instance in WireGuardInstance.objects.all().order_by('instance_id'):
|
||||||
footer += f'iptables -t filter -A WGWADM_FORWARD -i wg{wireguard_instance.instance_id} -o wg{wireguard_instance.instance_id} -j '
|
footer += f'iptables -t filter -A WGWADM_FORWARD -i wg{wireguard_instance.instance_id} -o wg{wireguard_instance.instance_id} -j '
|
||||||
footer += 'ACCEPT\n' if firewall_settings.allow_peer_to_peer else "REJECT\n"
|
footer += 'ACCEPT\n' if firewall_settings.allow_peer_to_peer else deny_policy + "\n"
|
||||||
footer += '# Instance to Instance traffic\n'
|
footer += '# Instance to Instance traffic\n'
|
||||||
footer += 'iptables -t filter -A WGWADM_FORWARD -i wg+ -o wg+ -j '
|
footer += 'iptables -t filter -A WGWADM_FORWARD -i wg+ -o wg+ -j '
|
||||||
footer += 'ACCEPT\n' if firewall_settings.allow_instance_to_instance else "REJECT\n"
|
footer += 'ACCEPT\n' if firewall_settings.allow_instance_to_instance else deny_policy + "\n"
|
||||||
return footer
|
return footer
|
||||||
|
|
||||||
|
|
||||||
|
@ -129,6 +129,6 @@ STATICFILES_DIRS = [
|
|||||||
|
|
||||||
DEFAULT_AUTO_FIELD = 'django.db.models.BigAutoField'
|
DEFAULT_AUTO_FIELD = 'django.db.models.BigAutoField'
|
||||||
|
|
||||||
WIREGUARD_WEBADMIN_VERSION = 9505
|
WIREGUARD_WEBADMIN_VERSION = 9506
|
||||||
|
|
||||||
from wireguard_webadmin.production_settings import *
|
from wireguard_webadmin.production_settings import *
|
Loading…
x
Reference in New Issue
Block a user