-
Notifications
You must be signed in to change notification settings - Fork 18.7k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
vendor libnetwork @1861587 #28257
vendor libnetwork @1861587 #28257
Conversation
Signed-off-by: Santhosh Manohar <santhosh@docker.com>
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
LGTM
LGTM |
this seems to have broken the following fix #490 EDIT: I worked around the issue with |
It appears this change of policy broke my use case (PHP debugging with XDebug, which involves opening TCP connections from the container back to the host). How can I restore the old policy (short of pinning the 1.12.6 version on my development machine)? |
Solved. Note that if you accidentally upgraded to 1.13 its not enough to downgrade back to 1.12, the iptables default policy has to be manually reverted. |
@1ma what if I remove docker 1.13 and install 1.12, should I fix iptables policy manually? |
Yes, that's what I had to do. |
* Swarm-mode is the fastest cluster to deploy since it doesn't require to pull anything from outside. * Add the output nodes for swarm-mode too. * Disable copy logs (I think a better practice is to copy logs on demand). * Don't run test_create_list_sign_delete_clusters, because it is very unstable on the CI. Partially-Implements: blueprint swarm-mode-support 2nd commit message: Update to Fedora Atomic 26 This patch moves the current master to test against Fedora Atomic 26, in addition, it switches to downloading from Fedora mirrors. 2nd-Change-Id: I9a97c0eb78b2c9d10e8be1501babb19e73ee70c1 3rd commit message: Set default iptables FORWARD policy to ACCEPT With the release of Docker 1.13 which is available in Fedora Atomic 26, it no longer sets the policy of the FORWARD chain to ACCEPT[1]. Therefore, CNI networking such as Flannel will cease to work. This patch sets the policy to ACCEPT so that traffic can work once again for deployments which are based on Docker versions which are newer than 1.13 [1]: moby/moby#28257 3rd-Change-Id: I1457602748619f38f87542fc01a2996ee80e58b7 Closes-Bug: #1708454 Co-Authored-By: Mohammed Naser <mnaser@vexxhost.com> Change-Id: I86d4dcc94fff622be4ee2acc8dd60ed81bc5d433
Docker 1.13 has changed a default policy of FORWARD chain to DROP (moby/moby#28257) which makes containers inaccessible from a remote host when the bridge is exposed. The change breaks e.g. the AWSVPC mode. To overcome this we install an explicit rule for accepting forwarded ingress traffic to an exposed subnet which is appended to the WEAVE-EXPOSE chain. The chain is a target of the rule "-t filter -A FORWARD -o weave".
Docker 1.13 has changed a default policy of FORWARD chain to DROP (moby/moby#28257) which makes containers inaccessible from a remote host when the bridge is exposed. The change breaks e.g. the AWSVPC mode. To overcome this we install an explicit rule for accepting forwarded ingress traffic to an exposed subnet which is appended to the WEAVE-EXPOSE chain. The chain is a target of the rule "-t filter -A FORWARD -o weave".
Docker 1.13 has changed a default policy of FORWARD chain to DROP (moby/moby#28257) which makes containers inaccessible from a remote host when the bridge is exposed. The change breaks e.g. the AWSVPC mode. To overcome this we install an explicit rule for accepting forwarded ingress traffic to an exposed subnet which is appended to the WEAVE-EXPOSE chain. The chain is a target of the rule "-t filter -A FORWARD -o weave".
Docker 1.13 has changed a default policy of FORWARD chain to DROP (moby/moby#28257) which makes containers inaccessible from a remote host when the bridge is exposed. The change breaks e.g. the AWSVPC mode. To overcome this we install an explicit rule for accepting forwarded ingress traffic to an exposed subnet which is appended to the WEAVE-EXPOSE chain. The chain is a target of the rule "-t filter -A FORWARD -o weave".
Docker 1.13 has changed a default policy of FORWARD chain to DROP (moby/moby#28257) which makes containers inaccessible from a remote host when the bridge is exposed. The change breaks e.g. the AWSVPC mode. To overcome this we install an explicit rule for accepting forwarded ingress traffic to an exposed subnet which is appended to the WEAVE-EXPOSE chain. The chain is a target of the rule "-t filter -A FORWARD -o weave".
Docker 1.13 has changed a default policy of FORWARD chain to DROP (moby/moby#28257) which makes containers inaccessible from a remote host when the bridge is exposed. The change breaks e.g. the AWSVPC mode. To overcome this we install an explicit rule for accepting forwarded ingress traffic to an exposed subnet which is appended to the WEAVE-EXPOSE chain. The chain is a target of the rule "-t filter -A FORWARD -o weave".
Docker 1.13 has changed a default policy of FORWARD chain to DROP (moby/moby#28257) which makes containers inaccessible from a remote host when the bridge is exposed. The change breaks e.g. the AWSVPC mode. To overcome this we install an explicit rule for accepting forwarded ingress traffic to an exposed subnet which is appended to the WEAVE-EXPOSE chain. The chain is a target of the rule "-t filter -A FORWARD -o weave".
Docker 1.13 has changed a default policy of FORWARD chain to DROP (moby/moby#28257) which makes containers inaccessible from a remote host when the bridge is exposed. The change breaks e.g. the AWSVPC mode. To overcome this we install an explicit rule for accepting forwarded ingress traffic to an exposed subnet which is appended to the WEAVE-EXPOSE chain. The chain is a target of the rule "-t filter -A FORWARD -o weave".
Docker 1.13 has changed a default policy of FORWARD chain to DROP (moby/moby#28257) which makes containers inaccessible from a remote host when the bridge is exposed. The change breaks e.g. the AWSVPC mode. To overcome this we install an explicit rule for accepting forwarded ingress traffic to an exposed subnet which is appended to the WEAVE-EXPOSE chain. The chain is a target of the rule "-t filter -A FORWARD -o weave".
…ecent Docker versions. Some details: moby/moby#28257
* replace service to systemctl call for sync time * Add forward policy accept after docker install due to moby/moby#28257 break gtw node Change-Id: I790bc9c1b2f203119d4142ec25956634bf6bb94f
…ting. Relevant issues: * moby/moby#28257 * boot2docker/boot2docker#1364
…routing. Relevant issues: * moby/moby#28257 * boot2docker/boot2docker#1364
Is Ip-forwarding required to run docker. If i disable ipforwarding will it impact any functionality of docker application. |
@bharathvishwanathan please don't use old PR's (this pull request was merged three years ago) to start new discussions. Please keep in mind that the GitHub issue tracker is not intended as a general support forum,
|
Fixes #14041
With this change if
ip_forward
is enabled by docker daemon then the iptables FORWARD policy will be set to DROP. On a docker upgrade ifip_forward
is already enabled this change will not take effect, because in that case the user might have intended to have the default policy ACCEPT. Changing it to DROP will break such setups. Current users of docker can avoid this issue by eitherip_forward
its not persistent. So after a reload the fix will take effect and the policy will be set to DROP.Signed-off-by: Santhosh Manohar santhosh@docker.com