1
0
mirror of https://github.com/juanfont/headscale.git synced 2025-11-27 20:04:00 +01:00
juanfont.headscale/hscontrol/mapper
copilot-swe-agent[bot] e0107024e8 Filter exit routes through ACL policy to fix issue #2788
Exit nodes are now only visible to nodes that have permission to use them
according to ACL policy. Previously, exit routes (0.0.0.0/0 and ::/0) were
unconditionally added to the AllowedIPs field in the network map, making
exit nodes visible to all peers regardless of policy.

Changes:
- Modified buildTailPeers and WithSelfNode in builder.go to filter exit
  routes through policy.ReduceRoutes, same as primary routes
- Removed unconditional addition of exit routes in tail.go tailNode function
- Updated tail_test.go to reflect new behavior where exit routes are filtered

The fix ensures that exit nodes are only visible when a node has
autogroup:internet in their ACL destination rules.

Co-authored-by: kradalby <98431+kradalby@users.noreply.github.com>
2025-11-01 08:52:29 +00:00
..
batcher_lockfree.go policy: fix autogroup:self propagation and optimize cache invalidation (#2807) 2025-10-23 17:57:41 +02:00
batcher_test.go mapper: send change instead of full update (#2775) 2025-09-17 14:23:21 +02:00
batcher.go mapper: send change instead of full update (#2775) 2025-09-17 14:23:21 +02:00
builder_test.go bunch of qol (#2748) 2025-08-27 17:09:13 +02:00
builder.go Filter exit routes through ACL policy to fix issue #2788 2025-11-01 08:52:29 +00:00
mapper_test.go state/nodestore: in memory representation of nodes 2025-09-09 09:40:00 +02:00
mapper.go mapper: send change instead of full update (#2775) 2025-09-17 14:23:21 +02:00
suite_test.go introduce mapper package 2023-06-08 16:34:15 +02:00
tail_test.go Filter exit routes through ACL policy to fix issue #2788 2025-11-01 08:52:29 +00:00
tail.go Filter exit routes through ACL policy to fix issue #2788 2025-11-01 08:52:29 +00:00
utils.go mapper: produce map before poll (#2628) 2025-07-28 11:15:53 +02:00