Fix ipv6 forwarding for datapath bridges #2390
Closed
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
Fixes #2389
On many platforms and following security best practices, the default policy for IP forwarding is "drop". This PR modifies the existing firewall logic to dynamically create forwarding rules for both ipv4 and ipv6, on all bridges used in the topology.
This results in new rules in the
DOCKER-USER
chain for table ip (v4) and ip6, enabling IPv6 forwarding across bridgesImplementation notes:
endpoint_bridge Deploy
function gets called many times, once per endpoint. The rules only need to be created once - the remaining calls go ignored. Feel free to move this logic to a more suitable place if needed'IPv4' if v==xyz else 'IPv6'
but I don't know the Go equivalent