From 855eb121aac5d5a7cd91227b3bb67d6b79d27c5b Mon Sep 17 00:00:00 2001 From: Alessandro Boch Date: Sun, 19 Feb 2017 13:35:31 -0800 Subject: [PATCH] Vendoring libnetwork @ce28404 Signed-off-by: Alessandro Boch --- vendor.conf | 2 +- .../libnetwork/drivers/overlay/encryption.go | 34 +++++++++++++++++++ .../libnetwork/drivers/overlay/ov_network.go | 2 ++ 3 files changed, 37 insertions(+), 1 deletion(-) diff --git a/vendor.conf b/vendor.conf index a3ab0d6817..a75894c393 100644 --- a/vendor.conf +++ b/vendor.conf @@ -23,7 +23,7 @@ github.com/RackSec/srslog 456df3a81436d29ba874f3590eeeee25d666f8a5 github.com/imdario/mergo 0.2.1 #get libnetwork packages -github.com/docker/libnetwork bba65e5e191eccfbc8e2f6455c527b407c2be5ff +github.com/docker/libnetwork ce28404512e8fac9b8103b9072e75cf8d4339302 github.com/docker/go-events 18b43f1bc85d9cdd42c05a6cd2d444c7a200a894 github.com/armon/go-radix e39d623f12e8e41c7b5529e9a9dd67a1e2261f80 github.com/armon/go-metrics eb0af217e5e9747e41dd5303755356b62d28e3ec diff --git a/vendor/github.com/docker/libnetwork/drivers/overlay/encryption.go b/vendor/github.com/docker/libnetwork/drivers/overlay/encryption.go index 2bf07b066d..b4c3aade49 100644 --- a/vendor/github.com/docker/libnetwork/drivers/overlay/encryption.go +++ b/vendor/github.com/docker/libnetwork/drivers/overlay/encryption.go @@ -138,6 +138,11 @@ func setupEncryption(localIP, advIP, remoteIP net.IP, vni uint32, em *encrMap, k logrus.Warn(err) } + err = programInput(vni, true) + if err != nil { + logrus.Warn(err) + } + for i, k := range keys { spis := &spi{buildSPI(advIP, remoteIP, k.tag), buildSPI(remoteIP, advIP, k.tag)} dir := reverse @@ -219,6 +224,35 @@ func programMangle(vni uint32, add bool) (err error) { return } +func programInput(vni uint32, add bool) (err error) { + var ( + port = strconv.FormatUint(uint64(vxlanPort), 10) + vniMatch = fmt.Sprintf("0>>22&0x3C@12&0xFFFFFF00=%d", int(vni)<<8) + plainVxlan = []string{"-p", "udp", "--dport", port, "-m", "u32", "--u32", vniMatch, "-j"} + ipsecVxlan = append([]string{"-m", "policy", "--dir", "in", "--pol", "ipsec"}, plainVxlan...) + block = append(plainVxlan, "DROP") + accept = append(ipsecVxlan, "ACCEPT") + chain = "INPUT" + action = iptables.Append + msg = "add" + ) + + if !add { + action = iptables.Delete + msg = "remove" + } + + if err := iptables.ProgramRule(iptables.Filter, chain, action, accept); err != nil { + logrus.Errorf("could not %s input rule: %v. Please do it manually.", msg, err) + } + + if err := iptables.ProgramRule(iptables.Filter, chain, action, block); err != nil { + logrus.Errorf("could not %s input rule: %v. Please do it manually.", msg, err) + } + + return +} + func programSA(localIP, remoteIP net.IP, spi *spi, k *key, dir int, add bool) (fSA *netlink.XfrmState, rSA *netlink.XfrmState, err error) { var ( action = "Removing" diff --git a/vendor/github.com/docker/libnetwork/drivers/overlay/ov_network.go b/vendor/github.com/docker/libnetwork/drivers/overlay/ov_network.go index 9b04a2a4bc..34d37e9913 100644 --- a/vendor/github.com/docker/libnetwork/drivers/overlay/ov_network.go +++ b/vendor/github.com/docker/libnetwork/drivers/overlay/ov_network.go @@ -154,6 +154,7 @@ func (d *driver) CreateNetwork(id string, option map[string]interface{}, nInfo d if !n.secure { for _, vni := range vnis { programMangle(vni, false) + programInput(vni, false) } } @@ -204,6 +205,7 @@ func (d *driver) DeleteNetwork(nid string) error { if n.secure { for _, vni := range vnis { programMangle(vni, false) + programInput(vni, false) } }