-
Notifications
You must be signed in to change notification settings - Fork 3
fix: bypass Squid for host.docker.internal MCP gateway traffic #543
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Changes from all commits
File filter
Filter by extension
Conversations
Jump to
Diff view
Diff view
There are no files selected for viewing
| Original file line number | Diff line number | Diff line change | ||||
|---|---|---|---|---|---|---|
|
|
@@ -557,6 +557,7 @@ export function generateDockerCompose( | |||||
| // Enable host.docker.internal for agent when --enable-host-access is set | ||||||
| if (config.enableHostAccess) { | ||||||
| agentService.extra_hosts = ['host.docker.internal:host-gateway']; | ||||||
| environment.AWF_ENABLE_HOST_ACCESS = '1'; | ||||||
|
||||||
| environment.AWF_ENABLE_HOST_ACCESS = '1'; | |
| environment.AWF_ENABLE_HOST_ACCESS = 'true'; |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
The OUTPUT filter chain rule (line 132) is placed in the middle of the NAT table configuration section, which makes the script structure harder to follow. According to the script's organization pattern (as documented by the "OUTPUT filter chain rules" comment at line 203), all filter chain rules should be grouped together after the NAT table rules are configured. While this works functionally (iptables evaluates NAT first, then filter), consider moving this ACCEPT rule to the OUTPUT filter chain section (after line 221) alongside the other filter rules for better code organization and maintainability.