From: Ben Pfaff Date: Thu, 23 Jun 2011 16:59:49 +0000 (-0700) Subject: ovs-ctl: Use iptables -n -L instead of -S for compatibility. X-Git-Url: https://pintos-os.org/cgi-bin/gitweb.cgi?a=commitdiff_plain;h=b053c7c1a0c12669a4591e73893d4f426fef571f;p=openvswitch ovs-ctl: Use iptables -n -L instead of -S for compatibility. The -S command isn't present in old versions of iptables, including the version installed on Citrix XenServer. We have to use -n -L instead. Bug #6071. --- diff --git a/utilities/ovs-ctl.in b/utilities/ovs-ctl.in index d316adf0..6b0337f3 100755 --- a/utilities/ovs-ctl.in +++ b/utilities/ovs-ctl.in @@ -270,37 +270,40 @@ force_reload_kmod () { ## --------------- ## enable_protocol () { - set X "-p $PROTOCOL" + # Translate the protocol name to a number, because "iptables -n -L" prints + # some protocols by name (despite the -n) and therefore we need to look for + # both forms. + # + # (iptables -S output is more uniform but old iptables doesn't have it.) + protonum=`grep "^$PROTOCOL[ ]" /etc/protocols | awk '{print $2}'` + if expr X"$protonum" : X'[0-9]\{1,\}$' > /dev/null; then :; else + log_failure_msg "unknown protocol $PROTOCOL" + return 1 + fi + name=$PROTOCOL + match="(\$2 == \"$PROTOCOL\" || \$2 == $protonum)" + insert="iptables -I INPUT -p $PROTOCOL" if test X"$DPORT" != X; then - set "$@" "--dport $DPORT" name="$name to port $DPORT" + match="$match && /dpt:$DPORT/" + insert="$insert --dport $DPORT" fi if test X"$SPORT" != X; then - set "$@" "--sport $SPORT" name="$name from port $SPORT" + match="$match && /spt:$SPORT/" + insert="$insert --sport $SPORT" fi - shift - - search="/^-A INPUT/!d" - insert="iptables -I INPUT" - for arg; do - search="$search -/ $arg /!d" - insert="$insert $arg" - done insert="$insert -j ACCEPT" - if (iptables -S INPUT) >/dev/null 2>&1; then - case `iptables -S INPUT | sed "$search"` in - '') - action "Enabling $name with iptables" $insert - ;; - *) - # There's already a rule for this protocol. Don't override it. - log_success_msg "iptables already has a rule for $name, not explicitly enabling" - ;; - esac + if (iptables -n -L INPUT) >/dev/null 2>&1; then + if iptables -n -L INPUT | awk "$match { n++ } END { exit n == 0 }" + then + # There's already a rule for this protocol. Don't override it. + log_success_msg "iptables already has a rule for $name, not explicitly enabling" + else + action "Enabling $name with iptables" $insert + fi elif (iptables --version) >/dev/null 2>&1; then action "cannot list iptables rules, not adding a rule for $name" else