firewall?
This commit is contained in:
@@ -13,6 +13,7 @@
|
|||||||
|
|
||||||
allowedTCPPorts =
|
allowedTCPPorts =
|
||||||
(if (config.syscfg.server != false && config.syscfg.server.web) then [ 80 443 22 ] else [ ]) ++
|
(if (config.syscfg.server != false && config.syscfg.server.web) then [ 80 443 22 ] else [ ]) ++
|
||||||
|
(if (config.syscfg.server != false) then [ 5432 6379 ] else [ ]) ++
|
||||||
[ ];
|
[ ];
|
||||||
};
|
};
|
||||||
};
|
};
|
||||||
|
|||||||
@@ -28,12 +28,6 @@ in{
|
|||||||
${if cfg.wireguard then ''tcp dport {1515} accept'' else ""}
|
${if cfg.wireguard then ''tcp dport {1515} accept'' else ""}
|
||||||
${if cfg.wireguard then ''udp dport {1515} accept'' else ""}
|
${if cfg.wireguard then ''udp dport {1515} accept'' else ""}
|
||||||
}
|
}
|
||||||
chain forward {
|
|
||||||
type filter hook forward priority filter; policy drop;
|
|
||||||
ct state established,related accept
|
|
||||||
iifname { "podman*", "veth*" } accept
|
|
||||||
oifname { "podman*", "veth*" } accept
|
|
||||||
}
|
|
||||||
}
|
}
|
||||||
${if cfg.nftables.enable then ''
|
${if cfg.nftables.enable then ''
|
||||||
table inet nat {
|
table inet nat {
|
||||||
|
|||||||
Reference in New Issue
Block a user