Skip to content

Conversation

@kradalby
Copy link
Collaborator

@kradalby kradalby commented May 3, 2025

Fixes #2365

@kradalby kradalby requested a review from juanfont as a code owner May 3, 2025 08:13
@ghost
Copy link

ghost commented May 3, 2025

Pull Request Revisions

RevisionDescription
r4
Route accessibility filtering implementedNew feature limits route distribution to only routes accessible to specific nodes
r3
Updated routing and ACL filtering logicRefactored policy management to improve route and node filtering based on ACL rules, adding more granular route access control and introducing a new ReduceRoutes function to filter routes for specific nodes
r2
Enhanced ACL and route filtering mechanismAdded new route reduction method in policy package with comprehensive ACL filtering for subnet routes, including support for granular access control based on source IPs and destination networks
r1
Policy route and node filtering updatedIntroduced ReduceNodes and ReduceRoutes methods to handle policy-based filtering of nodes and routes more flexibly, with accompanying test cases and implementation changes.

✅ AI review completed for r4
Help React with emojis to give feedback on AI-generated reviews:
  • 👍 means the feedback was helpful and actionable
  • 👎 means the feedback was incorrect or unhelpful
💬 Replying to feedback with a comment helps us improve the system. Your input also contributes to shaping future interactions with the AI reviewer.

We'd love to hear from you—reach out anytime at team@review.ai.

@kradalby kradalby force-pushed the kradalby/reduce-routes branch from b860003 to 1929942 Compare May 3, 2025 21:00
kradalby added 10 commits May 4, 2025 16:01
Signed-off-by: Kristoffer Dalby <kristoffer@tailscale.com>
Fixes juanfont#2365

Signed-off-by: Kristoffer Dalby <kristoffer@tailscale.com>
Signed-off-by: Kristoffer Dalby <kristoffer@tailscale.com>
Signed-off-by: Kristoffer Dalby <kristoffer@tailscale.com>
Signed-off-by: Kristoffer Dalby <kristoffer@tailscale.com>
Signed-off-by: Kristoffer Dalby <kristoffer@tailscale.com>
Signed-off-by: Kristoffer Dalby <kristoffer@tailscale.com>
Signed-off-by: Kristoffer Dalby <kristoffer@tailscale.com>
Signed-off-by: Kristoffer Dalby <kristoffer@tailscale.com>
Signed-off-by: Kristoffer Dalby <kristoffer@tailscale.com>
@kradalby kradalby force-pushed the kradalby/reduce-routes branch from 1929942 to 9aaa458 Compare May 4, 2025 14:12
Signed-off-by: Kristoffer Dalby <kristoffer@tailscale.com>
Copy link

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

In the ReduceFilterRules function in hscontrol/policy/policy.go, there's a comment typo at line 76-77: 'ensure they are note removed' should be 'ensure they are not removed'.

Copy link

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

In hscontrol/mapper/tail.go, consider adding error handling when calling policy.ReduceRoutes in case the function's behavior changes in the future to potentially return an error. Currently, it silently continues execution if there are any issues with route reduction.

@kradalby kradalby merged commit 45e38cb into juanfont:main May 4, 2025
143 of 146 checks passed
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

[Bug] Subnet routes are pushed to clients when not in allowed ACL

2 participants