mirror of
https://github.com/moby/moby.git
synced 2026-01-11 18:51:37 +00:00
Add daemon option --allow-direct-routing
Per-network option com.docker.network.bridge.trusted-host-interfaces accepts a list of interfaces that are allowed to route directly to a container's published ports in a bridge network with nat enabled. This daemon level option disables direct access filtering, enabling direct access to published ports on container addresses in all bridge networks, via all host interfaces. It overlaps with short-term env-var workaround: DOCKER_INSECURE_NO_IPTABLES_RAW=1 - it does not allow packets sent from outside the host to reach ports published only to 127.0.0.1 - it will outlive iptables (the workaround was initially intended for hosts that do not have kernel support for the "raw" iptables table). Signed-off-by: Rob Murray <rob.murray@docker.com>
This commit is contained in:
@@ -415,6 +415,10 @@ unix://[/path/to/socket] to use.
|
||||
Use TLS and verify the remote (daemon: verify client, client: verify daemon).
|
||||
Default is **false**.
|
||||
|
||||
**--allow-direct-routing**=**true**|**false**
|
||||
Allow remote access to published ports on container IP addresses.
|
||||
Default is **false**.
|
||||
|
||||
**--userland-proxy**=**true**|**false**
|
||||
Rely on a userland proxy implementation for inter-container and
|
||||
outside-to-container loopback communications. Default is **true**.
|
||||
|
||||
Reference in New Issue
Block a user