From 6a48109132b6e3fe32ed6fd39de4446c21dfafae Mon Sep 17 00:00:00 2001 From: Sayan Chowdhury Date: Mon, 14 Jun 2021 20:54:27 +0530 Subject: [PATCH] net-firewall/iptables: Apply the Flatcar patches Signed-off-by: Sayan Chowdhury --- .../iptables/files/systemd/ip6tables.service | 6 ++++ .../iptables/files/systemd/iptables.service | 6 ++++ .../iptables/iptables-1.8.8-r5.ebuild | 33 ++++++++----------- 3 files changed, 26 insertions(+), 19 deletions(-) create mode 100644 sdk_container/src/third_party/coreos-overlay/net-firewall/iptables/files/systemd/ip6tables.service create mode 100644 sdk_container/src/third_party/coreos-overlay/net-firewall/iptables/files/systemd/iptables.service diff --git a/sdk_container/src/third_party/coreos-overlay/net-firewall/iptables/files/systemd/ip6tables.service b/sdk_container/src/third_party/coreos-overlay/net-firewall/iptables/files/systemd/ip6tables.service new file mode 100644 index 0000000000..0a6d7fa1c8 --- /dev/null +++ b/sdk_container/src/third_party/coreos-overlay/net-firewall/iptables/files/systemd/ip6tables.service @@ -0,0 +1,6 @@ +[Unit] +Description=Store and restore ip6tables firewall rules + +[Install] +Also=ip6tables-store.service +Also=ip6tables-restore.service diff --git a/sdk_container/src/third_party/coreos-overlay/net-firewall/iptables/files/systemd/iptables.service b/sdk_container/src/third_party/coreos-overlay/net-firewall/iptables/files/systemd/iptables.service new file mode 100644 index 0000000000..3643a3e310 --- /dev/null +++ b/sdk_container/src/third_party/coreos-overlay/net-firewall/iptables/files/systemd/iptables.service @@ -0,0 +1,6 @@ +[Unit] +Description=Store and restore iptables firewall rules + +[Install] +Also=iptables-store.service +Also=iptables-restore.service diff --git a/sdk_container/src/third_party/coreos-overlay/net-firewall/iptables/iptables-1.8.8-r5.ebuild b/sdk_container/src/third_party/coreos-overlay/net-firewall/iptables/iptables-1.8.8-r5.ebuild index 992da3a8d4..f5aff78b2e 100644 --- a/sdk_container/src/third_party/coreos-overlay/net-firewall/iptables/iptables-1.8.8-r5.ebuild +++ b/sdk_container/src/third_party/coreos-overlay/net-firewall/iptables/iptables-1.8.8-r5.ebuild @@ -37,13 +37,13 @@ BDEPEND=" app-alternatives/yacc ) " +# Flatcar: Drop net-firewall/arptables as we don't ship arptables. RDEPEND=" ${COMMON_DEPEND} nftables? ( net-misc/ethertypes ) !/dev/null; then elog "Current iptables implementation is unset, setting to ${default_iptables}" eselect iptables set "${default_iptables}" fi - + # Flatcar: Drop the arptables, but retain the `for` structure in favor of lesser diff + # to upstream if use nftables; then local tables - for tables in {arp,eb}tables; do + for tables in ebtables; do if ! eselect ${tables} show &>/dev/null; then elog "Current ${tables} implementation is unset, setting to ${default_iptables}" - eselect ${tables} set xtables-nft-multi + eselect ${tables} set "${default_iptables}" fi done fi @@ -167,17 +173,6 @@ pkg_prerm() { if ! has_version 'net-firewall/ebtables'; then elog "Unsetting ebtables symlinks before removal" eselect ebtables unset - elif [[ -z ${REPLACED_BY_VERSION} ]]; then - elog "Resetting ebtables symlinks to ebtables-legacy" - eselect ebtables set ebtables-legacy - fi - - if ! has_version 'net-firewall/arptables'; then - elog "Unsetting arptables symlinks before removal" - eselect arptables unset - elif [[ -z ${REPLACED_BY_VERSION} ]]; then - elog "Resetting arptables symlinks to arptables-legacy" - eselect arptables set arptables-legacy fi # The eselect module failing should not be fatal