2017-05-13 19:21:58 -07:00
|
|
|
package libnetwork
|
|
|
|
|
|
|
|
import (
|
|
|
|
"github.com/docker/libnetwork/iptables"
|
2017-07-26 15:03:47 -07:00
|
|
|
"github.com/sirupsen/logrus"
|
2017-05-13 19:21:58 -07:00
|
|
|
)
|
|
|
|
|
|
|
|
const userChain = "DOCKER-USER"
|
|
|
|
|
2018-01-12 17:30:19 -05:00
|
|
|
func (c *controller) arrangeUserFilterRule() {
|
|
|
|
c.Lock()
|
2019-11-07 13:43:42 -08:00
|
|
|
arrangeUserFilterRule()
|
2018-01-12 17:30:19 -05:00
|
|
|
c.Unlock()
|
|
|
|
iptables.OnReloaded(func() {
|
|
|
|
c.Lock()
|
2019-11-07 13:43:42 -08:00
|
|
|
arrangeUserFilterRule()
|
2018-01-12 17:30:19 -05:00
|
|
|
c.Unlock()
|
|
|
|
})
|
|
|
|
}
|
|
|
|
|
2017-05-13 19:21:58 -07:00
|
|
|
// This chain allow users to configure firewall policies in a way that persists
|
|
|
|
// docker operations/restarts. Docker will not delete or modify any pre-existing
|
|
|
|
// rules from the DOCKER-USER filter chain.
|
|
|
|
func arrangeUserFilterRule() {
|
|
|
|
_, err := iptables.NewChain(userChain, iptables.Filter, false)
|
|
|
|
if err != nil {
|
|
|
|
logrus.Warnf("Failed to create %s chain: %v", userChain, err)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
if err = iptables.AddReturnRule(userChain); err != nil {
|
|
|
|
logrus.Warnf("Failed to add the RETURN rule for %s: %v", userChain, err)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
err = iptables.EnsureJumpRule("FORWARD", userChain)
|
|
|
|
if err != nil {
|
|
|
|
logrus.Warnf("Failed to ensure the jump rule for %s: %v", userChain, err)
|
|
|
|
}
|
|
|
|
}
|