This commit is contained in:
Peter Galonza 2025-06-30 02:39:37 +00:00 committed by GitHub
commit 1d17b81ded
No known key found for this signature in database
GPG key ID: B5690EEEBB952194
7 changed files with 35 additions and 0 deletions

View file

@ -11,6 +11,11 @@ wg-quick down /opt/amnezia/awg/wg0.conf
# start daemons if configured
if [ -f /opt/amnezia/awg/wg0.conf ]; then (wg-quick up /opt/amnezia/awg/wg0.conf); fi
# check if nf_tables is loaded
if lsmod | grep -qw nf_tables; then
ln -sf /sbin/xtables-nft-multi /sbin/iptables
fi
# Allow traffic on the TUN interface.
iptables -A INPUT -i wg0 -j ACCEPT
iptables -A FORWARD -i wg0 -j ACCEPT

View file

@ -7,6 +7,11 @@ ifconfig eth0:0 $SERVER_IP_ADDRESS netmask 255.255.255.255 up
if [ ! -c /dev/net/tun ]; then mkdir -p /dev/net; mknod /dev/net/tun c 10 200; fi
# check if nf_tables is loaded
if lsmod | grep -qw nf_tables; then
ln -sf /sbin/xtables-nft-multi /sbin/iptables
fi
# Allow traffic on the TUN interface.
iptables -A INPUT -i tun0 -j ACCEPT
iptables -A FORWARD -i tun0 -j ACCEPT

View file

@ -7,6 +7,11 @@ ifconfig eth0:0 $SERVER_IP_ADDRESS netmask 255.255.255.255 up
if [ ! -c /dev/net/tun ]; then mkdir -p /dev/net; mknod /dev/net/tun c 10 200; fi
# check if nf_tables is loaded
if lsmod | grep -qw nf_tables; then
ln -sf /sbin/xtables-nft-multi /sbin/iptables
fi
# Allow traffic on the TUN interface.
iptables -A INPUT -i tun0 -j ACCEPT
iptables -A FORWARD -i tun0 -j ACCEPT

View file

@ -7,6 +7,11 @@ ifconfig eth0:0 $SERVER_IP_ADDRESS netmask 255.255.255.255 up
if [ ! -c /dev/net/tun ]; then mkdir -p /dev/net; mknod /dev/net/tun c 10 200; fi
# check if nf_tables is loaded
if lsmod | grep -qw nf_tables; then
ln -sf /sbin/xtables-nft-multi /sbin/iptables
fi
# Allow traffic on the TUN interface.
iptables -A INPUT -i tun0 -j ACCEPT
iptables -A FORWARD -i tun0 -j ACCEPT

View file

@ -7,3 +7,8 @@ if ! sudo docker network ls | grep -q amnezia-dns-net; then sudo docker network
--opt com.docker.network.bridge.name=amn0 \
amnezia-dns-net;\
fi
# check if nf_tables is loaded
if lsmod | grep -qw nf_tables; then
sudo update-alternatives --set iptables /usr/sbin/iptables-nft
fi

View file

@ -11,6 +11,11 @@ wg-quick down /opt/amnezia/wireguard/wg0.conf
# start daemons if configured
if [ -f /opt/amnezia/wireguard/wg0.conf ]; then (wg-quick up /opt/amnezia/wireguard/wg0.conf); fi
# check if nf_tables is loaded
if lsmod | grep -qw nf_tables; then
ln -sf /sbin/xtables-nft-multi /sbin/iptables
fi
# Allow traffic on the TUN interface.
iptables -A INPUT -i wg0 -j ACCEPT
iptables -A FORWARD -i wg0 -j ACCEPT

View file

@ -5,6 +5,11 @@
echo "Container startup"
#ifconfig eth0:0 $SERVER_IP_ADDRESS netmask 255.255.255.255 up
# check if nf_tables is loaded
if lsmod | grep -qw nf_tables; then
ln -sf /sbin/xtables-nft-multi /sbin/iptables
fi
iptables -A INPUT -i lo -j ACCEPT
iptables -A INPUT -m conntrack --ctstate ESTABLISHED,RELATED -j ACCEPT
iptables -A INPUT -p icmp -j ACCEPT