Lines Matching refs:add
85 bool add) {
88 if (!iptables_cmd.Run(argument, add)) {
93 if (add)
130 return ApplyVpnSetup(usernames, interface, true /* add */);
231 LOG(ERROR) << "Could not add ACCEPT rule using '" << kIpTablesPath << "'";
240 LOG(ERROR) << "Could not add ACCEPT rule using '" << kIp6TablesPath
246 LOG(WARNING) << "Could not add ACCEPT rule using '" << kIp6TablesPath
265 bool add) {
269 if (!ApplyRuleForUserTraffic(add)) {
270 if (add) {
277 if (!ApplyMasquerade(interface, add)) {
278 if (add) {
286 if (!ApplyMarkForUserTraffic(username, add)) {
287 if (add) {
293 if (add) {
301 bool IpTables::ApplyMasquerade(const std::string& interface, bool add) {
308 apply_masquerade, {kIpTablesPath, kIp6TablesPath}, add);
311 bool IpTables::ApplyMarkForUserTraffic(const std::string& username, bool add) {
317 return RunForAllArguments(apply_mark, {kIpTablesPath, kIp6TablesPath}, add);
320 bool IpTables::ApplyRuleForUserTraffic(bool add) {
324 return RunForAllArguments(apply_rule, {kIPv4, kIPv6}, add);
377 bool add) {
382 argv.push_back(add ? "-A" : "-D"); // rule
393 LOG(ERROR) << (add ? "Adding" : "Removing")
401 const std::string& username, const std::string& executable_path, bool add) {
406 argv.push_back(add ? "-A" : "-D"); // rule
421 LOG(ERROR) << (add ? "Adding" : "Removing")
429 bool add) {
435 ip.AddArg(add ? "add" : "delete");
444 LOG(ERROR) << (add ? "Adding" : "Removing") << " rule for " << ip_version