Skip to content

Commit

Permalink
Change logging
Browse files Browse the repository at this point in the history
  • Loading branch information
pappz committed Feb 2, 2025
1 parent 4db673c commit b9029e0
Show file tree
Hide file tree
Showing 3 changed files with 7 additions and 6 deletions.
4 changes: 2 additions & 2 deletions client/firewall/iptables/router_linux.go
Original file line number Diff line number Diff line change
Expand Up @@ -251,7 +251,7 @@ func (r *router) AddNatRule(pair firewall.RouterPair) error {
// RemoveNatRule removes an iptables rule pair from forwarding and nat chains
func (r *router) RemoveNatRule(pair firewall.RouterPair) error {
if err := r.ipFwdState.ReleaseForwarding(); err != nil {
log.Errorf("failed to disable sysctl IP forwarding: %v", err)
log.Errorf("%v", err)
}

if err := r.removeNatRule(pair); err != nil {
Expand Down Expand Up @@ -685,7 +685,7 @@ func (r *router) rollbackRules(rules map[string]ruleInfo) error {

func (r *router) DeleteDNATRule(rule firewall.Rule) error {
if err := r.ipFwdState.ReleaseForwarding(); err != nil {
log.Errorf("failed to disable sysctl IP forwarding: %v", err)
log.Errorf("%v", err)
}

ruleKey := rule.ID()
Expand Down
4 changes: 2 additions & 2 deletions client/firewall/nftables/router_linux.go
Original file line number Diff line number Diff line change
Expand Up @@ -898,7 +898,7 @@ func (r *router) removeAcceptForwardRulesIptables(ipt *iptables.IPTables) error
// RemoveNatRule removes the prerouting mark rule
func (r *router) RemoveNatRule(pair firewall.RouterPair) error {
if err := r.ipFwdState.ReleaseForwarding(); err != nil {
log.Errorf("failed to disable sysctl IP forwarding: %v", err)
log.Errorf("%v", err)
}

if err := r.refreshRulesMap(); err != nil {
Expand Down Expand Up @@ -1190,7 +1190,7 @@ func (r *router) addDnatMasq(rule firewall.ForwardRule, protoNum uint8, ruleKey

func (r *router) DeleteDNATRule(rule firewall.Rule) error {
if err := r.ipFwdState.ReleaseForwarding(); err != nil {
log.Errorf("failed to disable sysctl IP forwarding: %v", err)
log.Errorf("%v", err)
}

ruleKey := rule.ID()
Expand Down
5 changes: 3 additions & 2 deletions client/internal/routemanager/ipfwdstate/ipfwdstate.go
Original file line number Diff line number Diff line change
@@ -1,6 +1,7 @@
package ipfwdstate

import (
"fmt"
"github.com/netbirdio/netbird/client/internal/routemanager/systemops"
)

Expand All @@ -19,7 +20,7 @@ func (f *IPForwardingState) RequestForwarding() error {
}

if err := systemops.EnableIPForwarding(); err != nil {
return err
return fmt.Errorf("failed to enable IP forwarding with sysctl: %w", err)
}
f.enabledCounter = 1

Expand All @@ -40,7 +41,7 @@ func (f *IPForwardingState) ReleaseForwarding() error {
f.enabledCounter = 0

if err := systemops.DisableIPForwarding(); err != nil {

Check failure on line 43 in client/internal/routemanager/ipfwdstate/ipfwdstate.go

View workflow job for this annotation

GitHub Actions / test

undefined: systemops.DisableIPForwarding

Check failure on line 43 in client/internal/routemanager/ipfwdstate/ipfwdstate.go

View workflow job for this annotation

GitHub Actions / test (sqlite)

undefined: systemops.DisableIPForwarding

Check failure on line 43 in client/internal/routemanager/ipfwdstate/ipfwdstate.go

View workflow job for this annotation

GitHub Actions / lint (macos-latest)

undefined: systemops.DisableIPForwarding (typecheck)
return err
return fmt.Errorf("failed to disable IP forwarding with sysctl: %w", err)
}
return nil
}

0 comments on commit b9029e0

Please sign in to comment.