Revert "Merge pull request #180 from squeed/v0.7-bump-iptables"

This reverts commit 19f2f28178aa88772f69c4eeb3793d4a63c244b0, reversing
changes made to 72b62babeeb3d7b25c9809ea9eb9fc9c02cc0f71.
This commit is contained in:
Casey Callendrello 2018-09-10 14:04:49 +02:00
parent 19f2f28178
commit 01ff074ef3
3 changed files with 40 additions and 138 deletions

6
Godeps/Godeps.json generated
View File

@ -1,7 +1,7 @@
{ {
"ImportPath": "github.com/containernetworking/plugins", "ImportPath": "github.com/containernetworking/plugins",
"GoVersion": "go1.7", "GoVersion": "go1.7",
"GodepVersion": "v80", "GodepVersion": "v79",
"Packages": [ "Packages": [
"./..." "./..."
], ],
@ -47,8 +47,8 @@
}, },
{ {
"ImportPath": "github.com/coreos/go-iptables/iptables", "ImportPath": "github.com/coreos/go-iptables/iptables",
"Comment": "v0.4.0", "Comment": "v0.2.0",
"Rev": "47f22b0dd3355c0ba570ba12b0b8a36bf214c04b" "Rev": "259c8e6a4275d497442c721fa52204d7a58bde8b"
}, },
{ {
"ImportPath": "github.com/coreos/go-systemd/activation", "ImportPath": "github.com/coreos/go-systemd/activation",

View File

@ -1,5 +0,0 @@
CoreOS Project
Copyright 2018 CoreOS, Inc
This product includes software developed at CoreOS, Inc.
(http://www.coreos.com/).

View File

@ -31,13 +31,9 @@ type Error struct {
exec.ExitError exec.ExitError
cmd exec.Cmd cmd exec.Cmd
msg string msg string
exitStatus *int //for overriding
} }
func (e *Error) ExitStatus() int { func (e *Error) ExitStatus() int {
if e.exitStatus != nil {
return *e.exitStatus
}
return e.Sys().(syscall.WaitStatus).ExitStatus() return e.Sys().(syscall.WaitStatus).ExitStatus()
} }
@ -45,13 +41,6 @@ func (e *Error) Error() string {
return fmt.Sprintf("running %v: exit status %v: %v", e.cmd.Args, e.ExitStatus(), e.msg) return fmt.Sprintf("running %v: exit status %v: %v", e.cmd.Args, e.ExitStatus(), e.msg)
} }
// IsNotExist returns true if the error is due to the chain or rule not existing
func (e *Error) IsNotExist() bool {
return e.ExitStatus() == 1 &&
(e.msg == "iptables: Bad rule (does a matching rule exist in that chain?).\n" ||
e.msg == "iptables: No chain/target/match by that name.\n")
}
// Protocol to differentiate between IPv4 and IPv6 // Protocol to differentiate between IPv4 and IPv6
type Protocol byte type Protocol byte
@ -65,11 +54,6 @@ type IPTables struct {
proto Protocol proto Protocol
hasCheck bool hasCheck bool
hasWait bool hasWait bool
hasRandomFully bool
v1 int
v2 int
v3 int
mode string // the underlying iptables operating mode, e.g. nf_tables
} }
// New creates a new IPTables. // New creates a new IPTables.
@ -85,21 +69,15 @@ func NewWithProtocol(proto Protocol) (*IPTables, error) {
if err != nil { if err != nil {
return nil, err return nil, err
} }
vstring, err := getIptablesVersionString(path) checkPresent, waitPresent, err := getIptablesCommandSupport(path)
v1, v2, v3, mode, err := extractIptablesVersion(vstring) if err != nil {
return nil, fmt.Errorf("error checking iptables version: %v", err)
checkPresent, waitPresent, randomFullyPresent := getIptablesCommandSupport(v1, v2, v3) }
ipt := IPTables{ ipt := IPTables{
path: path, path: path,
proto: proto, proto: proto,
hasCheck: checkPresent, hasCheck: checkPresent,
hasWait: waitPresent, hasWait: waitPresent,
hasRandomFully: randomFullyPresent,
v1: v1,
v2: v2,
v3: v3,
mode: mode,
} }
return &ipt, nil return &ipt, nil
} }
@ -270,27 +248,10 @@ func (ipt *IPTables) executeList(args []string) ([]string, error) {
} }
rules := strings.Split(stdout.String(), "\n") rules := strings.Split(stdout.String(), "\n")
// strip trailing newline
if len(rules) > 0 && rules[len(rules)-1] == "" { if len(rules) > 0 && rules[len(rules)-1] == "" {
rules = rules[:len(rules)-1] rules = rules[:len(rules)-1]
} }
// nftables mode doesn't return an error code when listing a non-existent
// chain. Patch that up.
if len(rules) == 0 && ipt.mode == "nf_tables" {
v := 1
return nil, &Error{
cmd: exec.Cmd{Args: args},
msg: "iptables: No chain/target/match by that name.",
exitStatus: &v,
}
}
for i, rule := range rules {
rules[i] = filterRuleOutput(rule)
}
return rules, nil return rules, nil
} }
@ -305,18 +266,11 @@ func (ipt *IPTables) NewChain(table, chain string) error {
func (ipt *IPTables) ClearChain(table, chain string) error { func (ipt *IPTables) ClearChain(table, chain string) error {
err := ipt.NewChain(table, chain) err := ipt.NewChain(table, chain)
// the exit code for "this table already exists" is different for
// different iptables modes
existsErr := 1
if ipt.mode == "nf_tables" {
existsErr = 4
}
eerr, eok := err.(*Error) eerr, eok := err.(*Error)
switch { switch {
case err == nil: case err == nil:
return nil return nil
case eok && eerr.ExitStatus() == existsErr: case eok && eerr.ExitStatus() == 1:
// chain already exists. Flush (clear) it. // chain already exists. Flush (clear) it.
return ipt.run("-t", table, "-F", chain) return ipt.run("-t", table, "-F", chain)
default: default:
@ -335,21 +289,6 @@ func (ipt *IPTables) DeleteChain(table, chain string) error {
return ipt.run("-t", table, "-X", chain) return ipt.run("-t", table, "-X", chain)
} }
// ChangePolicy changes policy on chain to target
func (ipt *IPTables) ChangePolicy(table, chain, target string) error {
return ipt.run("-t", table, "-P", chain, target)
}
// Check if the underlying iptables command supports the --random-fully flag
func (ipt *IPTables) HasRandomFully() bool {
return ipt.hasRandomFully
}
// Return version components of the underlying iptables command
func (ipt *IPTables) GetIptablesVersion() (int, int, int) {
return ipt.v1, ipt.v2, ipt.v3
}
// run runs an iptables command with the given arguments, ignoring // run runs an iptables command with the given arguments, ignoring
// any stdout output // any stdout output
func (ipt *IPTables) run(args ...string) error { func (ipt *IPTables) run(args ...string) error {
@ -385,7 +324,7 @@ func (ipt *IPTables) runWithOutput(args []string, stdout io.Writer) error {
if err := cmd.Run(); err != nil { if err := cmd.Run(); err != nil {
switch e := err.(type) { switch e := err.(type) {
case *exec.ExitError: case *exec.ExitError:
return &Error{*e, cmd, stderr.String(), nil} return &Error{*e, cmd, stderr.String()}
default: default:
return err return err
} }
@ -404,40 +343,45 @@ func getIptablesCommand(proto Protocol) string {
} }
// Checks if iptables has the "-C" and "--wait" flag // Checks if iptables has the "-C" and "--wait" flag
func getIptablesCommandSupport(v1 int, v2 int, v3 int) (bool, bool, bool) { func getIptablesCommandSupport(path string) (bool, bool, error) {
return iptablesHasCheckCommand(v1, v2, v3), iptablesHasWaitCommand(v1, v2, v3), iptablesHasRandomFully(v1, v2, v3) vstring, err := getIptablesVersionString(path)
if err != nil {
return false, false, err
} }
// getIptablesVersion returns the first three components of the iptables version v1, v2, v3, err := extractIptablesVersion(vstring)
// and the operating mode (e.g. nf_tables or legacy) if err != nil {
// e.g. "iptables v1.3.66" would return (1, 3, 66, legacy, nil) return false, false, err
func extractIptablesVersion(str string) (int, int, int, string, error) { }
versionMatcher := regexp.MustCompile(`v([0-9]+)\.([0-9]+)\.([0-9]+)(?:\s+\((\w+))?`)
return iptablesHasCheckCommand(v1, v2, v3), iptablesHasWaitCommand(v1, v2, v3), nil
}
// getIptablesVersion returns the first three components of the iptables version.
// e.g. "iptables v1.3.66" would return (1, 3, 66, nil)
func extractIptablesVersion(str string) (int, int, int, error) {
versionMatcher := regexp.MustCompile("v([0-9]+)\\.([0-9]+)\\.([0-9]+)")
result := versionMatcher.FindStringSubmatch(str) result := versionMatcher.FindStringSubmatch(str)
if result == nil { if result == nil {
return 0, 0, 0, "", fmt.Errorf("no iptables version found in string: %s", str) return 0, 0, 0, fmt.Errorf("no iptables version found in string: %s", str)
} }
v1, err := strconv.Atoi(result[1]) v1, err := strconv.Atoi(result[1])
if err != nil { if err != nil {
return 0, 0, 0, "", err return 0, 0, 0, err
} }
v2, err := strconv.Atoi(result[2]) v2, err := strconv.Atoi(result[2])
if err != nil { if err != nil {
return 0, 0, 0, "", err return 0, 0, 0, err
} }
v3, err := strconv.Atoi(result[3]) v3, err := strconv.Atoi(result[3])
if err != nil { if err != nil {
return 0, 0, 0, "", err return 0, 0, 0, err
} }
mode := "legacy" return v1, v2, v3, nil
if result[4] != "" {
mode = result[4]
}
return v1, v2, v3, mode, nil
} }
// Runs "iptables --version" to get the version string // Runs "iptables --version" to get the version string
@ -480,20 +424,6 @@ func iptablesHasWaitCommand(v1 int, v2 int, v3 int) bool {
return false return false
} }
// Checks if an iptables version is after 1.6.2, when --random-fully was added
func iptablesHasRandomFully(v1 int, v2 int, v3 int) bool {
if v1 > 1 {
return true
}
if v1 == 1 && v2 > 6 {
return true
}
if v1 == 1 && v2 == 6 && v3 >= 2 {
return true
}
return false
}
// Checks if a rule specification exists for a table // Checks if a rule specification exists for a table
func (ipt *IPTables) existsForOldIptables(table, chain string, rulespec []string) (bool, error) { func (ipt *IPTables) existsForOldIptables(table, chain string, rulespec []string) (bool, error) {
rs := strings.Join(append([]string{"-A", chain}, rulespec...), " ") rs := strings.Join(append([]string{"-A", chain}, rulespec...), " ")
@ -505,26 +435,3 @@ func (ipt *IPTables) existsForOldIptables(table, chain string, rulespec []string
} }
return strings.Contains(stdout.String(), rs), nil return strings.Contains(stdout.String(), rs), nil
} }
// counterRegex is the regex used to detect nftables counter format
var counterRegex = regexp.MustCompile(`^\[([0-9]+):([0-9]+)\] `)
// filterRuleOutput works around some inconsistencies in output.
// For example, when iptables is in legacy vs. nftables mode, it produces
// different results.
func filterRuleOutput(rule string) string {
out := rule
// work around an output difference in nftables mode where counters
// are output in iptables-save format, rather than iptables -S format
// The string begins with "[0:0]"
//
// Fixes #49
if groups := counterRegex.FindStringSubmatch(out); groups != nil {
// drop the brackets
out = out[len(groups[0]):]
out = fmt.Sprintf("%s -c %s %s", out, groups[1], groups[2])
}
return out
}