Skip to content
Projects
Groups
Snippets
Help
This project
Loading...
Sign in / Register
Toggle navigation
L
lxc
Project
Overview
Details
Activity
Cycle Analytics
Repository
Repository
Files
Commits
Branches
Tags
Contributors
Graph
Compare
Charts
Issues
0
Issues
0
List
Board
Labels
Milestones
Merge Requests
0
Merge Requests
0
CI / CD
CI / CD
Pipelines
Jobs
Schedules
Charts
Wiki
Wiki
Snippets
Snippets
Members
Members
Collapse sidebar
Close sidebar
Activity
Graph
Charts
Create a new issue
Jobs
Commits
Issue Boards
Open sidebar
Chen Yisong
lxc
Commits
b2a3f33e
Commit
b2a3f33e
authored
Jan 30, 2014
by
Stéphane Graber
Browse files
Options
Browse Files
Download
Email Patches
Plain Diff
upstart: Make sure FORWARD is allowed for containers
Signed-off-by:
Stéphane Graber
<
stgraber@ubuntu.com
>
Acked-by:
Serge E. Hallyn
<
serge.hallyn@ubuntu.com
>
parent
5c8a9fc6
Hide whitespace changes
Inline
Side-by-side
Showing
1 changed file
with
6 additions
and
0 deletions
+6
-0
lxc-net.conf
config/init/upstart/lxc-net.conf
+6
-0
No files found.
config/init/upstart/lxc-net.conf
View file @
b2a3f33e
...
@@ -28,6 +28,8 @@ pre-start script
...
@@ -28,6 +28,8 @@ pre-start script
iptables
$
use_iptables_lock
-
D
INPUT
-
i
${
LXC_BRIDGE
} -
p
tcp
--
dport
67
-
j
ACCEPT
iptables
$
use_iptables_lock
-
D
INPUT
-
i
${
LXC_BRIDGE
} -
p
tcp
--
dport
67
-
j
ACCEPT
iptables
$
use_iptables_lock
-
D
INPUT
-
i
${
LXC_BRIDGE
} -
p
udp
--
dport
53
-
j
ACCEPT
iptables
$
use_iptables_lock
-
D
INPUT
-
i
${
LXC_BRIDGE
} -
p
udp
--
dport
53
-
j
ACCEPT
iptables
$
use_iptables_lock
-
D
INPUT
-
i
${
LXC_BRIDGE
} -
p
tcp
--
dport
53
-
j
ACCEPT
iptables
$
use_iptables_lock
-
D
INPUT
-
i
${
LXC_BRIDGE
} -
p
tcp
--
dport
53
-
j
ACCEPT
iptables
$
use_iptables_lock
-
D
FORWARD
-
i
${
LXC_BRIDGE
} -
j
ACCEPT
iptables
$
use_iptables_lock
-
D
FORWARD
-
o
${
LXC_BRIDGE
} -
j
ACCEPT
iptables
$
use_iptables_lock
-
t
nat
-
D
POSTROUTING
-
s
${
LXC_NETWORK
} ! -
d
${
LXC_NETWORK
} -
j
MASQUERADE
||
true
iptables
$
use_iptables_lock
-
t
nat
-
D
POSTROUTING
-
s
${
LXC_NETWORK
} ! -
d
${
LXC_NETWORK
} -
j
MASQUERADE
||
true
iptables
$
use_iptables_lock
-
t
mangle
-
D
POSTROUTING
-
o
${
LXC_BRIDGE
} -
p
udp
-
m
udp
--
dport
68
-
j
CHECKSUM
--
checksum
-
fill
iptables
$
use_iptables_lock
-
t
mangle
-
D
POSTROUTING
-
o
${
LXC_BRIDGE
} -
p
udp
-
m
udp
--
dport
68
-
j
CHECKSUM
--
checksum
-
fill
ifconfig
${
LXC_BRIDGE
}
down
||
true
ifconfig
${
LXC_BRIDGE
}
down
||
true
...
@@ -51,6 +53,8 @@ pre-start script
...
@@ -51,6 +53,8 @@ pre-start script
iptables
$
use_iptables_lock
-
I
INPUT
-
i
${
LXC_BRIDGE
} -
p
tcp
--
dport
67
-
j
ACCEPT
iptables
$
use_iptables_lock
-
I
INPUT
-
i
${
LXC_BRIDGE
} -
p
tcp
--
dport
67
-
j
ACCEPT
iptables
$
use_iptables_lock
-
I
INPUT
-
i
${
LXC_BRIDGE
} -
p
udp
--
dport
53
-
j
ACCEPT
iptables
$
use_iptables_lock
-
I
INPUT
-
i
${
LXC_BRIDGE
} -
p
udp
--
dport
53
-
j
ACCEPT
iptables
$
use_iptables_lock
-
I
INPUT
-
i
${
LXC_BRIDGE
} -
p
tcp
--
dport
53
-
j
ACCEPT
iptables
$
use_iptables_lock
-
I
INPUT
-
i
${
LXC_BRIDGE
} -
p
tcp
--
dport
53
-
j
ACCEPT
iptables
$
use_iptables_lock
-
I
FORWARD
-
i
${
LXC_BRIDGE
} -
j
ACCEPT
iptables
$
use_iptables_lock
-
I
FORWARD
-
o
${
LXC_BRIDGE
} -
j
ACCEPT
iptables
$
use_iptables_lock
-
t
nat
-
A
POSTROUTING
-
s
${
LXC_NETWORK
} ! -
d
${
LXC_NETWORK
} -
j
MASQUERADE
iptables
$
use_iptables_lock
-
t
nat
-
A
POSTROUTING
-
s
${
LXC_NETWORK
} ! -
d
${
LXC_NETWORK
} -
j
MASQUERADE
iptables
$
use_iptables_lock
-
t
mangle
-
A
POSTROUTING
-
o
${
LXC_BRIDGE
} -
p
udp
-
m
udp
--
dport
68
-
j
CHECKSUM
--
checksum
-
fill
iptables
$
use_iptables_lock
-
t
mangle
-
A
POSTROUTING
-
o
${
LXC_BRIDGE
} -
p
udp
-
m
udp
--
dport
68
-
j
CHECKSUM
--
checksum
-
fill
...
@@ -76,6 +80,8 @@ post-stop script
...
@@ -76,6 +80,8 @@ post-stop script
iptables
$
use_iptables_lock
-
D
INPUT
-
i
${
LXC_BRIDGE
} -
p
tcp
--
dport
67
-
j
ACCEPT
iptables
$
use_iptables_lock
-
D
INPUT
-
i
${
LXC_BRIDGE
} -
p
tcp
--
dport
67
-
j
ACCEPT
iptables
$
use_iptables_lock
-
D
INPUT
-
i
${
LXC_BRIDGE
} -
p
udp
--
dport
53
-
j
ACCEPT
iptables
$
use_iptables_lock
-
D
INPUT
-
i
${
LXC_BRIDGE
} -
p
udp
--
dport
53
-
j
ACCEPT
iptables
$
use_iptables_lock
-
D
INPUT
-
i
${
LXC_BRIDGE
} -
p
tcp
--
dport
53
-
j
ACCEPT
iptables
$
use_iptables_lock
-
D
INPUT
-
i
${
LXC_BRIDGE
} -
p
tcp
--
dport
53
-
j
ACCEPT
iptables
$
use_iptables_lock
-
D
FORWARD
-
i
${
LXC_BRIDGE
} -
j
ACCEPT
iptables
$
use_iptables_lock
-
D
FORWARD
-
o
${
LXC_BRIDGE
} -
j
ACCEPT
iptables
$
use_iptables_lock
-
t
nat
-
D
POSTROUTING
-
s
${
LXC_NETWORK
} ! -
d
${
LXC_NETWORK
} -
j
MASQUERADE
||
true
iptables
$
use_iptables_lock
-
t
nat
-
D
POSTROUTING
-
s
${
LXC_NETWORK
} ! -
d
${
LXC_NETWORK
} -
j
MASQUERADE
||
true
iptables
$
use_iptables_lock
-
t
mangle
-
D
POSTROUTING
-
o
${
LXC_BRIDGE
} -
p
udp
-
m
udp
--
dport
68
-
j
CHECKSUM
--
checksum
-
fill
iptables
$
use_iptables_lock
-
t
mangle
-
D
POSTROUTING
-
o
${
LXC_BRIDGE
} -
p
udp
-
m
udp
--
dport
68
-
j
CHECKSUM
--
checksum
-
fill
pid
=`
cat
${
varrun
}/
dnsmasq
.
pid
2
>/
dev
/
null
` &&
kill
-
9
$
pid
||
true
pid
=`
cat
${
varrun
}/
dnsmasq
.
pid
2
>/
dev
/
null
` &&
kill
-
9
$
pid
||
true
...
...
Write
Preview
Markdown
is supported
0%
Try again
or
attach a new file
Attach a file
Cancel
You are about to add
0
people
to the discussion. Proceed with caution.
Finish editing this message first!
Cancel
Please
register
or
sign in
to comment