cff4f20c44
The github.com/containerd/containerd/log package was moved to a separate module, which will also be used by upcoming (patch) releases of containerd. This patch moves our own uses of the package to use the new module. Signed-off-by: Sebastiaan van Stijn <github@gone.nl>
106 lines
3.6 KiB
Go
106 lines
3.6 KiB
Go
//go:build linux
|
|
|
|
package iptables
|
|
|
|
import (
|
|
"context"
|
|
"errors"
|
|
"net"
|
|
"syscall"
|
|
|
|
"github.com/containerd/log"
|
|
"github.com/docker/docker/libnetwork/types"
|
|
"github.com/vishvananda/netlink"
|
|
)
|
|
|
|
// checkConntrackProgrammable checks if the handle supports the
|
|
// NETLINK_NETFILTER and the base modules are loaded.
|
|
func checkConntrackProgrammable(nlh *netlink.Handle) error {
|
|
if !nlh.SupportsNetlinkFamily(syscall.NETLINK_NETFILTER) {
|
|
return errors.New("conntrack is not available")
|
|
}
|
|
return nil
|
|
}
|
|
|
|
// DeleteConntrackEntries deletes all the conntrack connections on the host for the specified IP
|
|
// Returns the number of flows deleted for IPv4, IPv6 else error
|
|
func DeleteConntrackEntries(nlh *netlink.Handle, ipv4List []net.IP, ipv6List []net.IP) error {
|
|
if err := checkConntrackProgrammable(nlh); err != nil {
|
|
return err
|
|
}
|
|
|
|
var totalIPv4FlowPurged uint
|
|
for _, ipAddress := range ipv4List {
|
|
flowPurged, err := purgeConntrackState(nlh, syscall.AF_INET, ipAddress)
|
|
if err != nil {
|
|
log.G(context.TODO()).Warnf("Failed to delete conntrack state for %s: %v", ipAddress, err)
|
|
continue
|
|
}
|
|
totalIPv4FlowPurged += flowPurged
|
|
}
|
|
|
|
var totalIPv6FlowPurged uint
|
|
for _, ipAddress := range ipv6List {
|
|
flowPurged, err := purgeConntrackState(nlh, syscall.AF_INET6, ipAddress)
|
|
if err != nil {
|
|
log.G(context.TODO()).Warnf("Failed to delete conntrack state for %s: %v", ipAddress, err)
|
|
continue
|
|
}
|
|
totalIPv6FlowPurged += flowPurged
|
|
}
|
|
|
|
if totalIPv4FlowPurged > 0 || totalIPv6FlowPurged > 0 {
|
|
log.G(context.TODO()).Debugf("DeleteConntrackEntries purged ipv4:%d, ipv6:%d", totalIPv4FlowPurged, totalIPv6FlowPurged)
|
|
}
|
|
|
|
return nil
|
|
}
|
|
|
|
func DeleteConntrackEntriesByPort(nlh *netlink.Handle, proto types.Protocol, ports []uint16) error {
|
|
if err := checkConntrackProgrammable(nlh); err != nil {
|
|
return err
|
|
}
|
|
|
|
var totalIPv4FlowPurged uint
|
|
var totalIPv6FlowPurged uint
|
|
|
|
for _, port := range ports {
|
|
filter := &netlink.ConntrackFilter{}
|
|
if err := filter.AddProtocol(uint8(proto)); err != nil {
|
|
log.G(context.TODO()).Warnf("Failed to delete conntrack state for %s port %d: %v", proto.String(), port, err)
|
|
continue
|
|
}
|
|
if err := filter.AddPort(netlink.ConntrackOrigDstPort, port); err != nil {
|
|
log.G(context.TODO()).Warnf("Failed to delete conntrack state for %s port %d: %v", proto.String(), port, err)
|
|
continue
|
|
}
|
|
|
|
v4FlowPurged, err := nlh.ConntrackDeleteFilter(netlink.ConntrackTable, syscall.AF_INET, filter)
|
|
if err != nil {
|
|
log.G(context.TODO()).Warnf("Failed to delete conntrack state for IPv4 %s port %d: %v", proto.String(), port, err)
|
|
}
|
|
totalIPv4FlowPurged += v4FlowPurged
|
|
|
|
v6FlowPurged, err := nlh.ConntrackDeleteFilter(netlink.ConntrackTable, syscall.AF_INET6, filter)
|
|
if err != nil {
|
|
log.G(context.TODO()).Warnf("Failed to delete conntrack state for IPv6 %s port %d: %v", proto.String(), port, err)
|
|
}
|
|
totalIPv6FlowPurged += v6FlowPurged
|
|
}
|
|
|
|
if totalIPv4FlowPurged > 0 || totalIPv6FlowPurged > 0 {
|
|
log.G(context.TODO()).Debugf("DeleteConntrackEntriesByPort for %s ports purged ipv4:%d, ipv6:%d", proto.String(), totalIPv4FlowPurged, totalIPv6FlowPurged)
|
|
}
|
|
|
|
return nil
|
|
}
|
|
|
|
func purgeConntrackState(nlh *netlink.Handle, family netlink.InetFamily, ipAddress net.IP) (uint, error) {
|
|
filter := &netlink.ConntrackFilter{}
|
|
// NOTE: doing the flush using the ipAddress is safe because today there cannot be multiple networks with the same subnet
|
|
// so it will not be possible to flush flows that are of other containers
|
|
if err := filter.AddIP(netlink.ConntrackNatAnyIP, ipAddress); err != nil {
|
|
return 0, err
|
|
}
|
|
return nlh.ConntrackDeleteFilter(netlink.ConntrackTable, family, filter)
|
|
}
|