Browse Source

default DROP policy on firewall reload also for IPv6

Signed-off-by: Benjamin Böhmke <benjamin@boehmke.net>
Benjamin Böhmke 5 years ago
parent
commit
9cf5335269
1 changed files with 6 additions and 0 deletions
  1. 6 0
      libnetwork/drivers/bridge/setup_ip_forwarding.go

+ 6 - 0
libnetwork/drivers/bridge/setup_ip_forwarding.go

@@ -60,6 +60,12 @@ func setupIPForwarding(enableIPTables bool, enableIP6Tables bool) error {
 		if err := iptable.SetDefaultPolicy(iptables.Filter, "FORWARD", iptables.Drop); err != nil {
 		if err := iptable.SetDefaultPolicy(iptables.Filter, "FORWARD", iptables.Drop); err != nil {
 			logrus.Warnf("Setting the default DROP policy on firewall reload failed, %v", err)
 			logrus.Warnf("Setting the default DROP policy on firewall reload failed, %v", err)
 		}
 		}
+		iptables.OnReloaded(func() {
+			logrus.Debug("Setting the default DROP policy on firewall reload")
+			if err := iptable.SetDefaultPolicy(iptables.Filter, "FORWARD", iptables.Drop); err != nil {
+				logrus.Warnf("Setting the default DROP policy on firewall reload failed, %v", err)
+			}
+		})
 	}
 	}
 
 
 	return nil
 	return nil