mirror of
https://github.com/eduardogsilva/wireguard_webadmin.git
synced 2026-01-01 14:16:18 +00:00
Remove REJECT from forward policy
This commit is contained in:
@@ -0,0 +1,23 @@
|
|||||||
|
# Generated by Django 5.2.9 on 2025-12-29 18:49
|
||||||
|
|
||||||
|
from django.db import migrations, models
|
||||||
|
|
||||||
|
|
||||||
|
class Migration(migrations.Migration):
|
||||||
|
|
||||||
|
dependencies = [
|
||||||
|
('firewall', '0014_redirectrule_port_forward'),
|
||||||
|
]
|
||||||
|
|
||||||
|
operations = [
|
||||||
|
migrations.AlterField(
|
||||||
|
model_name='firewallsettings',
|
||||||
|
name='default_forward_policy',
|
||||||
|
field=models.CharField(choices=[('accept', 'ACCEPT'), ('drop', 'DROP')], default='accept', max_length=6),
|
||||||
|
),
|
||||||
|
migrations.AlterField(
|
||||||
|
model_name='firewallsettings',
|
||||||
|
name='default_output_policy',
|
||||||
|
field=models.CharField(choices=[('accept', 'ACCEPT'), ('drop', 'DROP')], default='accept', max_length=6),
|
||||||
|
),
|
||||||
|
]
|
||||||
@@ -72,8 +72,8 @@ class FirewallRule(models.Model):
|
|||||||
|
|
||||||
class FirewallSettings(models.Model):
|
class FirewallSettings(models.Model):
|
||||||
name = models.CharField(max_length=6, default='global', unique=True)
|
name = models.CharField(max_length=6, default='global', unique=True)
|
||||||
default_forward_policy = models.CharField(max_length=6, default='accept', choices=[('accept', _('ACCEPT')), ('reject', _('REJECT')), ('drop', _('DROP'))])
|
default_forward_policy = models.CharField(max_length=6, default='accept', choices=[('accept', _('ACCEPT')), ('drop', _('DROP'))])
|
||||||
default_output_policy = models.CharField(max_length=6, default='accept', choices=[('accept', _('ACCEPT')), ('reject', _('REJECT')), ('drop', _('DROP'))])
|
default_output_policy = models.CharField(max_length=6, default='accept', choices=[('accept', _('ACCEPT')), ('drop', _('DROP'))])
|
||||||
allow_peer_to_peer = models.BooleanField(default=True)
|
allow_peer_to_peer = models.BooleanField(default=True)
|
||||||
allow_instance_to_instance = models.BooleanField(default=True)
|
allow_instance_to_instance = models.BooleanField(default=True)
|
||||||
wan_interface = models.CharField(max_length=12, default='eth0')
|
wan_interface = models.CharField(max_length=12, default='eth0')
|
||||||
|
|||||||
@@ -200,7 +200,10 @@ def generate_firewall_footer():
|
|||||||
|
|
||||||
footer = '# The following rules come from Firewall settings\n'
|
footer = '# The following rules come from Firewall settings\n'
|
||||||
footer += '# Default FORWARD policy\n'
|
footer += '# Default FORWARD policy\n'
|
||||||
|
if firewall_settings.default_forward_policy:
|
||||||
footer += f'iptables -t filter -P FORWARD {firewall_settings.default_forward_policy.upper()}\n'
|
footer += f'iptables -t filter -P FORWARD {firewall_settings.default_forward_policy.upper()}\n'
|
||||||
|
else:
|
||||||
|
footer += f'iptables -t filter -P FORWARD DROP\n'
|
||||||
|
|
||||||
footer += '# Same instance Peer to Peer traffic\n'
|
footer += '# Same instance Peer to Peer traffic\n'
|
||||||
for wireguard_instance in WireGuardInstance.objects.all().order_by('instance_id'):
|
for wireguard_instance in WireGuardInstance.objects.all().order_by('instance_id'):
|
||||||
|
|||||||
Reference in New Issue
Block a user