12345678910111213141516171819202122232425262728293031323334353637383940414243444546 |
- package libnetwork
- import (
- "github.com/docker/libnetwork/iptables"
- "github.com/sirupsen/logrus"
- )
- const userChain = "DOCKER-USER"
- var (
- ctrl *controller = nil
- )
- func setupArrangeUserFilterRule(c *controller) {
- ctrl = c
- iptables.OnReloaded(arrangeUserFilterRule)
- }
- // This chain allow users to configure firewall policies in a way that persists
- // docker operations/restarts. Docker will not delete or modify any pre-existing
- // rules from the DOCKER-USER filter chain.
- // Note once DOCKER-USER chain is created, docker engine does not remove it when
- // IPTableForwarding is disabled, because it contains rules configured by user that
- // are beyond docker engine's control.
- func arrangeUserFilterRule() {
- if ctrl == nil || !ctrl.iptablesEnabled() {
- return
- }
- // TODO IPv6 support
- iptable := iptables.GetIptable(iptables.IPv4)
- _, err := iptable.NewChain(userChain, iptables.Filter, false)
- if err != nil {
- logrus.Warnf("Failed to create %s chain: %v", userChain, err)
- return
- }
- if err = iptable.AddReturnRule(userChain); err != nil {
- logrus.Warnf("Failed to add the RETURN rule for %s: %v", userChain, err)
- return
- }
- err = iptable.EnsureJumpRule("FORWARD", userChain)
- if err != nil {
- logrus.Warnf("Failed to ensure the jump rule for %s: %v", userChain, err)
- }
- }
|