feat: added better options to teh firewall
This commit is contained in:
parent
7428a53325
commit
c2e4fde98d
2 changed files with 45 additions and 24 deletions
|
@ -17,7 +17,8 @@
|
||||||
'';
|
'';
|
||||||
};
|
};
|
||||||
|
|
||||||
own_ip = lib.mkOption {
|
own = {
|
||||||
|
ip = lib.mkOption {
|
||||||
default = "127.0.0.1";
|
default = "127.0.0.1";
|
||||||
type = lib.types.str;
|
type = lib.types.str;
|
||||||
description = ''
|
description = ''
|
||||||
|
@ -25,13 +26,26 @@
|
||||||
'';
|
'';
|
||||||
};
|
};
|
||||||
|
|
||||||
own_ports = lib.mkOption {
|
ports = {
|
||||||
|
tcp = lib.mkOption {
|
||||||
default = [ ];
|
default = [ ];
|
||||||
type = lib.types.listOf lib.types.int;
|
type = lib.types.listOf lib.types.int;
|
||||||
description = ''
|
description = ''
|
||||||
A list of ports for the machiene running the firewall
|
A list of TCP ports for the machiene running the firewall
|
||||||
'';
|
'';
|
||||||
};
|
};
|
||||||
|
|
||||||
|
udp = lib.mkOption {
|
||||||
|
default = [ ];
|
||||||
|
type = lib.types.listOf lib.types.int;
|
||||||
|
description = ''
|
||||||
|
A list of UDP ports for the machiene running the firewall
|
||||||
|
'';
|
||||||
|
};
|
||||||
|
|
||||||
|
};
|
||||||
|
|
||||||
|
};
|
||||||
};
|
};
|
||||||
};
|
};
|
||||||
|
|
||||||
|
@ -73,8 +87,13 @@
|
||||||
table ip filter {
|
table ip filter {
|
||||||
chain input {
|
chain input {
|
||||||
type filter hook input priority filter; policy accept;
|
type filter hook input priority filter; policy accept;
|
||||||
|
|
||||||
# for the host machiene
|
# for the host machiene
|
||||||
${lib.strings.concatMapStrings (x: x + "\n") (map (port: "tcp dport ${toString port} counter packets 0 bytes 0 accept") config.skynet_firewall.own_ports)}
|
# TCP
|
||||||
|
${lib.strings.concatMapStrings (x: x + "\n") (map (port: "tcp dport ${toString port} counter packets 0 bytes 0 accept") config.skynet_firewall.own.ports.tcp)}
|
||||||
|
|
||||||
|
# UDP
|
||||||
|
${lib.strings.concatMapStrings (x: x + "\n") (map (port: "udp dport ${toString port} counter packets 0 bytes 0 accept") config.skynet_firewall.own.ports.udp)}
|
||||||
}
|
}
|
||||||
|
|
||||||
chain forward {
|
chain forward {
|
||||||
|
|
|
@ -16,17 +16,19 @@
|
||||||
# this server is teh firewall
|
# this server is teh firewall
|
||||||
skynet_firewall = {
|
skynet_firewall = {
|
||||||
# always good to know oneself
|
# always good to know oneself
|
||||||
#own_ip = "193.1.99.72";
|
|
||||||
own_ip = "192.168.1.157";
|
|
||||||
|
|
||||||
own_ports = [
|
own = {
|
||||||
# ssh
|
#ip = "193.1.99.72";
|
||||||
|
ip = "192.168.1.157";
|
||||||
|
|
||||||
|
ports = {
|
||||||
|
tcp = [
|
||||||
|
# ssh in
|
||||||
22
|
22
|
||||||
# dns
|
|
||||||
53
|
|
||||||
# wireguard
|
|
||||||
51820
|
|
||||||
];
|
];
|
||||||
|
udp = [];
|
||||||
|
};
|
||||||
|
};
|
||||||
|
|
||||||
enable = true;
|
enable = true;
|
||||||
|
|
||||||
|
|
Loading…
Reference in a new issue