moby--moby/libnetwork
Cory Snider 3e2f0c7a39 libnetwork: fixup thread locking in Linux tests
The parallel tests were unconditionally unlocking the test case
goroutine from the OS thread, irrespective of whether the thread's
network namespace was successfully restored. This was not a problem in
practice as the unpaired calls to runtime.LockOSThread() peppered
through the test case would have prevented the goroutine from being
unlocked. Unlock the goroutine from the thread iff the thread's network
namespace is successfully restored.

Signed-off-by: Cory Snider <csnider@mirantis.com>
2022-10-25 13:35:44 -04:00
..
bitseq libnetwork: fix empty-lines (revive) 2022-09-26 19:21:58 +02:00
cluster
cmd fix formatting of "nolint" tags for go1.19 2022-07-13 22:31:53 +02:00
config libnetwork/config: rename ParseConfigOptions() to New() 2022-09-26 19:20:55 +02:00
datastore libnetwork: fix empty-lines (revive) 2022-09-26 19:21:58 +02:00
diagnostic set ReadHeaderTimeout to address G112: Potential Slowloris Attack (gosec) 2022-09-22 12:13:28 +02:00
discoverapi
docs
driverapi
drivers libnetwork/drivers/overlay: use filepath.WalkDir instead of filepath.Walk 2022-10-09 17:25:03 +02:00
drvregistry
etchosts libnetwork: fix empty-lines (revive) 2022-09-26 19:21:58 +02:00
idm
internal
ipam Merge pull request #44193 from thaJeztah/libnetwork_cleanup 2022-09-27 22:41:32 +02:00
ipamapi
ipams libnetwork: fix empty-lines (revive) 2022-09-26 19:21:58 +02:00
ipamutils
iptables libnetwork: fix empty-lines (revive) 2022-09-26 19:21:58 +02:00
netlabel
netutils
networkdb libnetwork: fix empty-lines (revive) 2022-09-26 19:21:58 +02:00
ns
options golangci-lint: update to v1.49.0 2022-09-23 23:31:27 +02:00
osl libnetwork/testutils: restore netns on teardown 2022-10-24 15:37:46 -04:00
portallocator
portmapper Lock OS threads when exec'ing with Pdeathsig 2022-10-05 12:18:03 -04:00
resolvconf libnetwork/resolvconf: removed unused GetIfChanged() and GetLastModified() 2022-09-22 13:58:34 +02:00
support
testutils libnetwork/testutils: restore netns on teardown 2022-10-24 15:37:46 -04:00
types
.dockerignore
.gitignore
CHANGELOG.md
README.md
agent.go libnetwork: fix empty-lines (revive) 2022-09-26 19:21:58 +02:00
agent.pb.go
agent.proto
controller.go libnetwork: fix empty-lines (revive) 2022-09-26 19:21:58 +02:00
default_gateway.go libnetwork: fix empty-lines (revive) 2022-09-26 19:21:58 +02:00
default_gateway_freebsd.go
default_gateway_linux.go
default_gateway_windows.go
drivers_freebsd.go libnetwork/config: remove "Experimental" and "Debug" options 2022-09-26 12:05:22 +02:00
drivers_ipam.go
drivers_linux.go libnetwork/config: remove "Experimental" and "Debug" options 2022-09-26 12:05:22 +02:00
drivers_windows.go libnetwork/config: remove "Experimental" and "Debug" options 2022-09-26 12:05:22 +02:00
endpoint.go libnetwork: fix empty-lines (revive) 2022-09-26 19:21:58 +02:00
endpoint_cnt.go
endpoint_info.go fix formatting of "nolint" tags for go1.19 2022-07-13 22:31:53 +02:00
endpoint_info_unix.go
endpoint_info_windows.go
endpoint_test.go
error.go
errors_test.go libnetwork: fix empty-lines (revive) 2022-09-26 19:21:58 +02:00
firewall_linux.go
firewall_linux_test.go libnetwork/config: merge DaemonCfg into Config 2022-09-26 12:05:37 +02:00
firewall_others.go
libnetwork_internal_test.go libnetwork: fix empty-lines (revive) 2022-09-26 19:21:58 +02:00
libnetwork_linux_test.go libnetwork: fixup thread locking in Linux tests 2022-10-25 13:35:44 -04:00
libnetwork_test.go libnetwork: fix empty-lines (revive) 2022-09-26 19:21:58 +02:00
libnetwork_unix_test.go
libnetwork_windows_test.go
network.go Merge pull request #44193 from thaJeztah/libnetwork_cleanup 2022-09-27 22:41:32 +02:00
network_unix.go
network_windows.go
resolver.go libnetwork: fix empty-lines (revive) 2022-09-26 19:21:58 +02:00
resolver_test.go libnetwork: fix empty-lines (revive) 2022-09-26 19:21:58 +02:00
resolver_unix.go
resolver_windows.go
sandbox.go libnetwork: remove some outdated comments 2022-10-04 15:34:39 +02:00
sandbox_dns_unix.go libnetwork: sandbox.updateDNS(): use const for file permissions 2022-10-02 01:28:05 +02:00
sandbox_dns_windows.go libnetwork: fix some whitespace formatting 2022-10-02 01:26:14 +02:00
sandbox_externalkey.go
sandbox_externalkey_unix.go libnetwork/config: merge DaemonCfg into Config 2022-09-26 12:05:37 +02:00
sandbox_externalkey_windows.go
sandbox_store.go
sandbox_test.go
service.go
service_common.go libnetwork: fix empty-lines (revive) 2022-09-26 19:21:58 +02:00
service_common_test.go
service_linux.go
service_unsupported.go
service_windows.go
store.go libnetwork: fix empty-lines (revive) 2022-09-26 19:21:58 +02:00
store_linux_test.go libnetwork: fix empty-lines (revive) 2022-09-26 19:21:58 +02:00
store_test.go

README.md

libnetwork - networking for containers

Libnetwork provides a native Go implementation for connecting containers

The goal of libnetwork is to deliver a robust Container Network Model that provides a consistent programming interface and the required network abstractions for applications.

Design

Please refer to the design for more information.

Using libnetwork

There are many networking solutions available to suit a broad range of use-cases. libnetwork uses a driver / plugin model to support all of these solutions while abstracting the complexity of the driver implementations by exposing a simple and consistent Network Model to users.

package main

import (
	"fmt"
	"log"

	"github.com/docker/docker/pkg/reexec"
	"github.com/docker/docker/libnetwork"
	"github.com/docker/docker/libnetwork/config"
	"github.com/docker/docker/libnetwork/netlabel"
	"github.com/docker/docker/libnetwork/options"
)

func main() {
	if reexec.Init() {
		return
	}

	// Select and configure the network driver
	networkType := "bridge"

	// Create a new controller instance
	driverOptions := options.Generic{}
	genericOption := make(map[string]interface{})
	genericOption[netlabel.GenericData] = driverOptions
	controller, err := libnetwork.New(config.OptionDriverConfig(networkType, genericOption))
	if err != nil {
		log.Fatalf("libnetwork.New: %s", err)
	}

	// Create a network for containers to join.
	// NewNetwork accepts Variadic optional arguments that libnetwork and Drivers can use.
	network, err := controller.NewNetwork(networkType, "network1", "")
	if err != nil {
		log.Fatalf("controller.NewNetwork: %s", err)
	}

	// For each new container: allocate IP and interfaces. The returned network
	// settings will be used for container infos (inspect and such), as well as
	// iptables rules for port publishing. This info is contained or accessible
	// from the returned endpoint.
	ep, err := network.CreateEndpoint("Endpoint1")
	if err != nil {
		log.Fatalf("network.CreateEndpoint: %s", err)
	}

	// Create the sandbox for the container.
	// NewSandbox accepts Variadic optional arguments which libnetwork can use.
	sbx, err := controller.NewSandbox("container1",
		libnetwork.OptionHostname("test"),
		libnetwork.OptionDomainname("docker.io"))
	if err != nil {
		log.Fatalf("controller.NewSandbox: %s", err)
	}

	// A sandbox can join the endpoint via the join api.
	err = ep.Join(sbx)
	if err != nil {
		log.Fatalf("ep.Join: %s", err)
	}

	// libnetwork client can check the endpoint's operational data via the Info() API
	epInfo, err := ep.DriverInfo()
	if err != nil {
		log.Fatalf("ep.DriverInfo: %s", err)
	}

	macAddress, ok := epInfo[netlabel.MacAddress]
	if !ok {
		log.Fatalf("failed to get mac address from endpoint info")
	}

	fmt.Printf("Joined endpoint %s (%s) to sandbox %s (%s)\n", ep.Name(), macAddress, sbx.ContainerID(), sbx.Key())
}

Contributing

Want to hack on libnetwork? Docker's contributions guidelines apply.

Code and documentation copyright 2015 Docker, inc. Code released under the Apache 2.0 license. Docs released under Creative commons.