friwall/web
Timotej Lazar d123db4e64 Consolidate NAT and VPN settings into IP sets
I have tried every possible permutation and I think this is the one.

NetBox-managed IP prefixes are pushed with ansible to firewall master.
The managed prefixes are added to custom IP sets defined in the app,
but only NAT addresses and VPN groups can be configured for them.

This way all NAT and VPN policy is (again) configured in the app. Also
both NetBox-managed and user-defined networks are treated the same.

Also improve^Wtweak config generation. Also templates.
2024-04-30 20:57:46 +02:00
..
static Make a squash 2023-01-26 10:51:51 +01:00
templates Consolidate NAT and VPN settings into IP sets 2024-04-30 20:57:46 +02:00
__init__.py Consolidate NAT and VPN settings into IP sets 2024-04-30 20:57:46 +02:00
auth.py Get OIDC end_session_endpoint from server metadata 2023-09-14 10:09:45 +02:00
config.py Set blueprint paths in main app 2023-12-04 09:46:37 +01:00
db.py Simplify database locking 2023-05-19 09:30:28 +02:00
errors.py Switch to OIDC authentication 2023-09-07 11:46:57 +02:00
ipsets.py Consolidate NAT and VPN settings into IP sets 2024-04-30 20:57:46 +02:00
rules.py Consolidate NAT and VPN settings into IP sets 2024-04-30 20:57:46 +02:00
system.py Consolidate NAT and VPN settings into IP sets 2024-04-30 20:57:46 +02:00
vpn.py Fix handling default settings 2024-04-30 09:54:39 +02:00