-
Notifications
You must be signed in to change notification settings - Fork 1.1k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
V0.2.2 + back-ported [plugins/bridge: clean masquerading rules] #202
Conversation
This script uses rkt and a fedora image to build release tarballs.
* use SHA1 instead of MD5
For two reasons: 1. They're not functional within rkt 2. They rebuild the binaries dynamically
In the Add command we set up masquerading rules that didn't have a corresponding clean-up code in Del. Add the clean-up code.
I think we need #177 too to fix rkt/rkt#1765 for the nspawn flavor. |
@iaguis Alright I'll turn this into |
nope, not that I can think of |
Let's hold off on that one for now. #2565 is a lot more critical. |
@tmrts github is confusing me - is this against v0.2.2, even though it says "tmrts wants to merge 6 commits into containernetworking:master from tmrts:v0.2.2"? |
@jonboulle I specifically selected a new branch, I'll make sure that's the case before merging |
@jonboulle as it turns out, I can't even push a PR to a non-existant branch without write access. |
Closing in favor of #203 |
Backports #195 to v0.2.2, which is a fix for iptable rule leaks in rkt (See rkt#2565)