2015-03-06 01:43:14 -05:00
|
|
|
package bridge
|
|
|
|
|
|
|
|
import (
|
|
|
|
"fmt"
|
|
|
|
"net"
|
|
|
|
|
2015-06-11 21:12:00 -04:00
|
|
|
"github.com/Sirupsen/logrus"
|
2015-05-16 19:02:51 -04:00
|
|
|
"github.com/docker/libnetwork/iptables"
|
2015-04-13 14:40:42 -04:00
|
|
|
"github.com/docker/libnetwork/netutils"
|
2015-03-06 01:43:14 -05:00
|
|
|
)
|
|
|
|
|
|
|
|
// DockerChain: DOCKER iptable chain name
|
|
|
|
const (
|
2015-12-15 00:57:56 -05:00
|
|
|
DockerChain = "DOCKER"
|
|
|
|
IsolationChain = "DOCKER-ISOLATION"
|
2015-03-06 01:43:14 -05:00
|
|
|
)
|
|
|
|
|
2015-12-15 00:57:56 -05:00
|
|
|
func setupIPChains(config *configuration) (*iptables.ChainInfo, *iptables.ChainInfo, *iptables.ChainInfo, error) {
|
2015-03-06 01:43:14 -05:00
|
|
|
// Sanity check.
|
2015-04-15 01:25:42 -04:00
|
|
|
if config.EnableIPTables == false {
|
2015-12-15 00:57:56 -05:00
|
|
|
return nil, nil, nil, fmt.Errorf("cannot create new chains, EnableIPTable is disabled")
|
2015-03-06 01:43:14 -05:00
|
|
|
}
|
|
|
|
|
2015-05-18 19:49:12 -04:00
|
|
|
hairpinMode := !config.EnableUserlandProxy
|
|
|
|
|
2015-06-11 21:12:00 -04:00
|
|
|
natChain, err := iptables.NewChain(DockerChain, iptables.Nat, hairpinMode)
|
|
|
|
if err != nil {
|
2015-12-15 00:57:56 -05:00
|
|
|
return nil, nil, nil, fmt.Errorf("failed to create NAT chain: %v", err)
|
2015-06-11 21:12:00 -04:00
|
|
|
}
|
|
|
|
defer func() {
|
|
|
|
if err != nil {
|
|
|
|
if err := iptables.RemoveExistingChain(DockerChain, iptables.Nat); err != nil {
|
2015-12-15 00:57:56 -05:00
|
|
|
logrus.Warnf("failed on removing iptables NAT chain on cleanup: %v", err)
|
2015-06-11 21:12:00 -04:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}()
|
|
|
|
|
2015-12-15 00:57:56 -05:00
|
|
|
filterChain, err := iptables.NewChain(DockerChain, iptables.Filter, false)
|
2015-06-11 21:12:00 -04:00
|
|
|
if err != nil {
|
2015-12-15 00:57:56 -05:00
|
|
|
return nil, nil, nil, fmt.Errorf("failed to create FILTER chain: %v", err)
|
|
|
|
}
|
|
|
|
defer func() {
|
|
|
|
if err != nil {
|
|
|
|
if err := iptables.RemoveExistingChain(DockerChain, iptables.Filter); err != nil {
|
|
|
|
logrus.Warnf("failed on removing iptables FILTER chain on cleanup: %v", err)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}()
|
|
|
|
|
|
|
|
isolationChain, err := iptables.NewChain(IsolationChain, iptables.Filter, false)
|
|
|
|
if err != nil {
|
|
|
|
return nil, nil, nil, fmt.Errorf("failed to create FILTER isolation chain: %v", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
if err := addReturnRule(IsolationChain); err != nil {
|
|
|
|
return nil, nil, nil, err
|
2015-06-11 21:12:00 -04:00
|
|
|
}
|
|
|
|
|
2015-12-15 00:57:56 -05:00
|
|
|
return natChain, filterChain, isolationChain, nil
|
2015-06-11 21:12:00 -04:00
|
|
|
}
|
|
|
|
|
|
|
|
func (n *bridgeNetwork) setupIPTables(config *networkConfiguration, i *bridgeInterface) error {
|
|
|
|
d := n.driver
|
|
|
|
d.Lock()
|
|
|
|
driverConfig := d.config
|
|
|
|
d.Unlock()
|
|
|
|
|
|
|
|
// Sanity check.
|
|
|
|
if driverConfig.EnableIPTables == false {
|
|
|
|
return fmt.Errorf("Cannot program chains, EnableIPTable is disabled")
|
|
|
|
}
|
|
|
|
|
|
|
|
// Pickup this configuraton option from driver
|
|
|
|
hairpinMode := !driverConfig.EnableUserlandProxy
|
|
|
|
|
2015-04-15 01:25:42 -04:00
|
|
|
addrv4, _, err := netutils.GetIfaceAddr(config.BridgeName)
|
2015-03-06 01:43:14 -05:00
|
|
|
if err != nil {
|
|
|
|
return fmt.Errorf("Failed to setup IP tables, cannot acquire Interface address: %s", err.Error())
|
|
|
|
}
|
2015-07-13 04:23:02 -04:00
|
|
|
ipnet := addrv4.(*net.IPNet)
|
|
|
|
maskedAddrv4 := &net.IPNet{
|
|
|
|
IP: ipnet.IP.Mask(ipnet.Mask),
|
|
|
|
Mask: ipnet.Mask,
|
|
|
|
}
|
|
|
|
if err = setupIPTablesInternal(config.BridgeName, maskedAddrv4, config.EnableICC, config.EnableIPMasquerade, hairpinMode, true); err != nil {
|
2015-03-06 01:43:14 -05:00
|
|
|
return fmt.Errorf("Failed to Setup IP tables: %s", err.Error())
|
|
|
|
}
|
2015-10-05 01:53:45 -04:00
|
|
|
n.registerIptCleanFunc(func() error {
|
|
|
|
return setupIPTablesInternal(config.BridgeName, maskedAddrv4, config.EnableICC, config.EnableIPMasquerade, hairpinMode, false)
|
|
|
|
})
|
2015-03-06 01:43:14 -05:00
|
|
|
|
2015-12-15 00:57:56 -05:00
|
|
|
natChain, filterChain, _, err := n.getDriverChains()
|
2015-06-11 21:12:00 -04:00
|
|
|
if err != nil {
|
|
|
|
return fmt.Errorf("Failed to setup IP tables, cannot acquire chain info %s", err.Error())
|
|
|
|
}
|
|
|
|
|
2015-10-05 01:53:45 -04:00
|
|
|
err = iptables.ProgramChain(natChain, config.BridgeName, hairpinMode, true)
|
2015-03-06 01:43:14 -05:00
|
|
|
if err != nil {
|
2015-06-11 21:12:00 -04:00
|
|
|
return fmt.Errorf("Failed to program NAT chain: %s", err.Error())
|
2015-03-06 01:43:14 -05:00
|
|
|
}
|
|
|
|
|
2015-10-05 01:53:45 -04:00
|
|
|
err = iptables.ProgramChain(filterChain, config.BridgeName, hairpinMode, true)
|
2015-03-06 01:43:14 -05:00
|
|
|
if err != nil {
|
2015-06-11 21:12:00 -04:00
|
|
|
return fmt.Errorf("Failed to program FILTER chain: %s", err.Error())
|
2015-03-06 01:43:14 -05:00
|
|
|
}
|
2015-12-15 00:57:56 -05:00
|
|
|
|
|
|
|
if err := ensureJumpRule("FORWARD", IsolationChain); err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
2015-10-05 01:53:45 -04:00
|
|
|
n.registerIptCleanFunc(func() error {
|
|
|
|
return iptables.ProgramChain(filterChain, config.BridgeName, hairpinMode, false)
|
|
|
|
})
|
2015-03-06 01:43:14 -05:00
|
|
|
|
2015-06-11 21:12:00 -04:00
|
|
|
n.portMapper.SetIptablesChain(filterChain, n.getNetworkBridgeName())
|
2015-03-06 01:43:14 -05:00
|
|
|
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2015-04-10 14:59:05 -04:00
|
|
|
type iptRule struct {
|
|
|
|
table iptables.Table
|
|
|
|
chain string
|
|
|
|
preArgs []string
|
|
|
|
args []string
|
|
|
|
}
|
|
|
|
|
2015-05-18 19:49:12 -04:00
|
|
|
func setupIPTablesInternal(bridgeIface string, addr net.Addr, icc, ipmasq, hairpin, enable bool) error {
|
2015-04-10 14:59:05 -04:00
|
|
|
|
2015-03-06 01:43:14 -05:00
|
|
|
var (
|
2015-05-18 19:49:12 -04:00
|
|
|
address = addr.String()
|
|
|
|
natRule = iptRule{table: iptables.Nat, chain: "POSTROUTING", preArgs: []string{"-t", "nat"}, args: []string{"-s", address, "!", "-o", bridgeIface, "-j", "MASQUERADE"}}
|
|
|
|
hpNatRule = iptRule{table: iptables.Nat, chain: "POSTROUTING", preArgs: []string{"-t", "nat"}, args: []string{"-m", "addrtype", "--src-type", "LOCAL", "-o", bridgeIface, "-j", "MASQUERADE"}}
|
|
|
|
outRule = iptRule{table: iptables.Filter, chain: "FORWARD", args: []string{"-i", bridgeIface, "!", "-o", bridgeIface, "-j", "ACCEPT"}}
|
|
|
|
inRule = iptRule{table: iptables.Filter, chain: "FORWARD", args: []string{"-o", bridgeIface, "-m", "conntrack", "--ctstate", "RELATED,ESTABLISHED", "-j", "ACCEPT"}}
|
2015-03-06 01:43:14 -05:00
|
|
|
)
|
|
|
|
|
|
|
|
// Set NAT.
|
|
|
|
if ipmasq {
|
|
|
|
if err := programChainRule(natRule, "NAT", enable); err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2015-05-18 19:49:12 -04:00
|
|
|
// In hairpin mode, masquerade traffic from localhost
|
|
|
|
if hairpin {
|
|
|
|
if err := programChainRule(hpNatRule, "MASQ LOCAL HOST", enable); err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2015-03-06 01:43:14 -05:00
|
|
|
// Set Inter Container Communication.
|
|
|
|
if err := setIcc(bridgeIface, icc, enable); err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
|
|
|
// Set Accept on all non-intercontainer outgoing packets.
|
|
|
|
if err := programChainRule(outRule, "ACCEPT NON_ICC OUTGOING", enable); err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
|
|
|
// Set Accept on incoming packets for existing connections.
|
|
|
|
if err := programChainRule(inRule, "ACCEPT INCOMING", enable); err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2015-04-10 14:59:05 -04:00
|
|
|
func programChainRule(rule iptRule, ruleDescr string, insert bool) error {
|
2015-03-06 01:43:14 -05:00
|
|
|
var (
|
|
|
|
prefix []string
|
|
|
|
operation string
|
|
|
|
condition bool
|
2015-04-10 14:59:05 -04:00
|
|
|
doesExist = iptables.Exists(rule.table, rule.chain, rule.args...)
|
2015-03-06 01:43:14 -05:00
|
|
|
)
|
|
|
|
|
|
|
|
if insert {
|
2015-04-10 14:59:05 -04:00
|
|
|
condition = !doesExist
|
|
|
|
prefix = []string{"-I", rule.chain}
|
2015-03-06 01:43:14 -05:00
|
|
|
operation = "enable"
|
|
|
|
} else {
|
2015-04-10 14:59:05 -04:00
|
|
|
condition = doesExist
|
|
|
|
prefix = []string{"-D", rule.chain}
|
2015-03-06 01:43:14 -05:00
|
|
|
operation = "disable"
|
|
|
|
}
|
2015-04-10 14:59:05 -04:00
|
|
|
if rule.preArgs != nil {
|
|
|
|
prefix = append(rule.preArgs, prefix...)
|
|
|
|
}
|
2015-03-06 01:43:14 -05:00
|
|
|
|
|
|
|
if condition {
|
2015-12-15 00:57:56 -05:00
|
|
|
if err := iptables.RawCombinedOutput(append(prefix, rule.args...)...); err != nil {
|
2015-03-06 01:43:14 -05:00
|
|
|
return fmt.Errorf("Unable to %s %s rule: %s", operation, ruleDescr, err.Error())
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
func setIcc(bridgeIface string, iccEnable, insert bool) error {
|
|
|
|
var (
|
2015-04-10 14:59:05 -04:00
|
|
|
table = iptables.Filter
|
|
|
|
chain = "FORWARD"
|
|
|
|
args = []string{"-i", bridgeIface, "-o", bridgeIface, "-j"}
|
2015-03-06 01:43:14 -05:00
|
|
|
acceptArgs = append(args, "ACCEPT")
|
|
|
|
dropArgs = append(args, "DROP")
|
|
|
|
)
|
|
|
|
|
|
|
|
if insert {
|
|
|
|
if !iccEnable {
|
2015-04-10 14:59:05 -04:00
|
|
|
iptables.Raw(append([]string{"-D", chain}, acceptArgs...)...)
|
2015-03-06 01:43:14 -05:00
|
|
|
|
2015-04-10 14:59:05 -04:00
|
|
|
if !iptables.Exists(table, chain, dropArgs...) {
|
2015-12-15 00:57:56 -05:00
|
|
|
if err := iptables.RawCombinedOutput(append([]string{"-A", chain}, dropArgs...)...); err != nil {
|
2015-03-06 01:43:14 -05:00
|
|
|
return fmt.Errorf("Unable to prevent intercontainer communication: %s", err.Error())
|
|
|
|
}
|
|
|
|
}
|
|
|
|
} else {
|
2015-04-10 14:59:05 -04:00
|
|
|
iptables.Raw(append([]string{"-D", chain}, dropArgs...)...)
|
2015-03-06 01:43:14 -05:00
|
|
|
|
2015-04-10 14:59:05 -04:00
|
|
|
if !iptables.Exists(table, chain, acceptArgs...) {
|
2015-12-15 00:57:56 -05:00
|
|
|
if err := iptables.RawCombinedOutput(append([]string{"-I", chain}, acceptArgs...)...); err != nil {
|
2015-03-06 01:43:14 -05:00
|
|
|
return fmt.Errorf("Unable to allow intercontainer communication: %s", err.Error())
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
} else {
|
|
|
|
// Remove any ICC rule.
|
|
|
|
if !iccEnable {
|
2015-04-10 14:59:05 -04:00
|
|
|
if iptables.Exists(table, chain, dropArgs...) {
|
|
|
|
iptables.Raw(append([]string{"-D", chain}, dropArgs...)...)
|
2015-03-06 01:43:14 -05:00
|
|
|
}
|
|
|
|
} else {
|
2015-04-10 14:59:05 -04:00
|
|
|
if iptables.Exists(table, chain, acceptArgs...) {
|
|
|
|
iptables.Raw(append([]string{"-D", chain}, acceptArgs...)...)
|
2015-03-06 01:43:14 -05:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
return nil
|
|
|
|
}
|
2015-06-02 21:40:55 -04:00
|
|
|
|
|
|
|
// Control Inter Network Communication. Install/remove only if it is not/is present.
|
2015-12-15 00:57:56 -05:00
|
|
|
func setINC(iface1, iface2 string, enable bool) error {
|
2015-06-02 21:40:55 -04:00
|
|
|
var (
|
|
|
|
table = iptables.Filter
|
2015-12-15 00:57:56 -05:00
|
|
|
chain = IsolationChain
|
|
|
|
args = [2][]string{{"-i", iface1, "-o", iface2, "-j", "DROP"}, {"-i", iface2, "-o", iface1, "-j", "DROP"}}
|
2015-06-02 21:40:55 -04:00
|
|
|
)
|
|
|
|
|
|
|
|
if enable {
|
|
|
|
for i := 0; i < 2; i++ {
|
|
|
|
if iptables.Exists(table, chain, args[i]...) {
|
|
|
|
continue
|
|
|
|
}
|
2015-12-15 00:57:56 -05:00
|
|
|
if err := iptables.RawCombinedOutput(append([]string{"-I", chain}, args[i]...)...); err != nil {
|
|
|
|
return fmt.Errorf("unable to add inter-network communication rule: %v", err)
|
2015-06-02 21:40:55 -04:00
|
|
|
}
|
|
|
|
}
|
|
|
|
} else {
|
|
|
|
for i := 0; i < 2; i++ {
|
|
|
|
if !iptables.Exists(table, chain, args[i]...) {
|
|
|
|
continue
|
|
|
|
}
|
2015-12-15 00:57:56 -05:00
|
|
|
if err := iptables.RawCombinedOutput(append([]string{"-D", chain}, args[i]...)...); err != nil {
|
|
|
|
return fmt.Errorf("unable to remove inter-network communication rule: %v", err)
|
2015-06-02 21:40:55 -04:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
return nil
|
|
|
|
}
|
2015-12-15 00:57:56 -05:00
|
|
|
|
|
|
|
func addReturnRule(chain string) error {
|
|
|
|
var (
|
|
|
|
table = iptables.Filter
|
|
|
|
args = []string{"-j", "RETURN"}
|
|
|
|
)
|
|
|
|
|
|
|
|
if iptables.Exists(table, chain, args...) {
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
err := iptables.RawCombinedOutput(append([]string{"-I", chain}, args...)...)
|
|
|
|
if err != nil {
|
|
|
|
return fmt.Errorf("unable to add return rule in %s chain: %s", chain, err.Error())
|
|
|
|
}
|
|
|
|
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
// Ensure the jump rule is on top
|
|
|
|
func ensureJumpRule(fromChain, toChain string) error {
|
|
|
|
var (
|
|
|
|
table = iptables.Filter
|
|
|
|
args = []string{"-j", toChain}
|
|
|
|
)
|
|
|
|
|
|
|
|
if iptables.Exists(table, fromChain, args...) {
|
|
|
|
err := iptables.RawCombinedOutput(append([]string{"-D", fromChain}, args...)...)
|
|
|
|
if err != nil {
|
|
|
|
return fmt.Errorf("unable to remove jump to %s rule in %s chain: %s", toChain, fromChain, err.Error())
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
err := iptables.RawCombinedOutput(append([]string{"-I", fromChain}, args...)...)
|
|
|
|
if err != nil {
|
|
|
|
return fmt.Errorf("unable to insert jump to %s rule in %s chain: %s", toChain, fromChain, err.Error())
|
|
|
|
}
|
|
|
|
|
|
|
|
return nil
|
|
|
|
}
|
2015-09-15 04:30:10 -04:00
|
|
|
|
|
|
|
func removeIPChains() {
|
|
|
|
for _, chainInfo := range []iptables.ChainInfo{
|
|
|
|
iptables.ChainInfo{Name: DockerChain, Table: iptables.Nat},
|
|
|
|
iptables.ChainInfo{Name: DockerChain, Table: iptables.Filter},
|
|
|
|
iptables.ChainInfo{Name: IsolationChain, Table: iptables.Filter},
|
|
|
|
} {
|
|
|
|
if err := chainInfo.Remove(); err != nil {
|
|
|
|
logrus.Warnf("Failed to remove existing iptables entries in table %s chain %s : %v", chainInfo.Table, chainInfo.Name, err)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|