1
0
Fork 0
mirror of https://github.com/moby/moby.git synced 2022-11-09 12:21:53 -05:00
moby--moby/vendor/github.com/docker/libnetwork
Tibor Vass 83199187ef vendor libnetwork to 2e24aed516bd5c836e11378bb457dd612aa868ed
Signed-off-by: Tibor Vass <tibor@docker.com>
2020-05-28 03:28:51 +00:00
..
bitseq Vendor libnetwork @ 36d3bed0e9 2018-09-13 13:52:45 -07:00
cluster bump libnetwork to eb6b2a57955e5c149d47c3973573216e8f8baa09 2018-05-21 00:37:54 +02:00
config Bump libnetwork to latest refpoint 2020-01-16 16:28:23 -08:00
datastore Vendor libnetwork 2018-07-26 11:17:56 -07:00
diagnostic Vendor libnetwork @ 36d3bed0e9 2018-09-13 13:52:45 -07:00
discoverapi
driverapi bump libnetwork to 96bcc0dae898308ed659c5095526788a602f4726 2019-09-20 19:48:49 +02:00
drivers vendor: bump libnetwork ef149a924dfde2e506ea3cb3f617d7d0fa96b8ee 2020-03-19 17:15:58 +08:00
drvregistry Vendor libnetwork 2018-07-26 11:17:56 -07:00
etchosts
hostdiscovery Update imports for logrus version 2017-07-31 13:19:38 -07:00
idm Vendoring libnetwork and swarmkit 2017-10-09 13:08:03 -07:00
internal Vendor libnetwork 2018-07-26 11:17:56 -07:00
ipam Global Default Address Pool feature support 2018-08-20 15:07:08 -04:00
ipamapi Vendoring libnetwork and swarmkit 2017-10-09 13:08:03 -07:00
ipams vendor: update libnetwork 1a17fb36132631a95fe6bb055b91e24a516ad81d 2020-04-21 13:00:22 +02:00
ipamutils Global Default Address Pool feature support 2018-08-20 15:07:08 -04:00
iptables vendor: bump libnetwork bf2bd42abc0a3734f12b5ec724e571434e42c669 2020-03-07 00:35:47 +01:00
netlabel Update DNS library 2020-02-25 17:05:57 -05:00
netutils Vendor Libnetwork 48f8463 2019-04-07 13:06:53 -07:00
networkdb vendor: bump libnetwork bf2bd42abc0a3734f12b5ec724e571434e42c669 2020-03-07 00:35:47 +01:00
ns bump libnetwork to 09cdcc8c0eab3946c2d70e8f6225b05baf1e90d1 2019-07-30 10:37:48 -07:00
options
osl Update DNS library 2020-02-25 17:05:57 -05:00
portallocator Bump libnetwork to latest refpoint 2020-01-16 16:28:23 -08:00
portmapper Update modules to support riscv64 2019-06-29 18:45:42 +00:00
resolvconf build: buildkit now also uses systemd's resolv.conf 2019-06-04 16:04:10 +00:00
types Update modules to support riscv64 2019-06-29 18:45:42 +00:00
agent.go vendor: update libnetwork 1a17fb36132631a95fe6bb055b91e24a516ad81d 2020-04-21 13:00:22 +02:00
agent.pb.go Import libnetwork fix for rolling updates 2018-03-28 14:16:31 -04:00
agent.proto Import libnetwork fix for rolling updates 2018-03-28 14:16:31 -04:00
controller.go vendor: update libnetwork 1a17fb36132631a95fe6bb055b91e24a516ad81d 2020-04-21 13:00:22 +02:00
default_gateway.go bump libnetwork to ebcade70ad1059b070d0040d798ecca359bc5fed 2019-04-01 19:40:09 +02:00
default_gateway_freebsd.go Vendoring latest swarmkit and libnetwork 2016-11-10 09:54:47 -08:00
default_gateway_linux.go Vendoring latest swarmkit and libnetwork 2016-11-10 09:54:47 -08:00
default_gateway_windows.go Vendoring latest swarmkit and libnetwork 2016-11-10 09:54:47 -08:00
drivers_freebsd.go Vendor libnetwork with experimental daemon flag handling 2016-12-13 14:22:48 -08:00
drivers_ipam.go Update vendoring for libnetwork PR #2097 2018-03-12 15:19:08 -04:00
drivers_linux.go bump libnetwork to ebcade70ad1059b070d0040d798ecca359bc5fed 2019-04-01 19:40:09 +02:00
drivers_windows.go Update modules to support riscv64 2019-06-29 18:45:42 +00:00
endpoint.go Bump libnetwork to latest refpoint 2020-01-16 16:28:23 -08:00
endpoint_cnt.go Libnetwork vendoring 2017-11-27 14:57:45 -08:00
endpoint_info.go bump libnetwork to b0186632 2018-07-03 13:46:19 -04:00
endpoint_info_unix.go Vendoring latest swarmkit and libnetwork 2016-11-10 09:54:47 -08:00
endpoint_info_windows.go Vendoring latest swarmkit and libnetwork 2016-11-10 09:54:47 -08:00
error.go Vendoring Libnetwork library 2017-04-10 17:52:16 -07:00
firewall_linux.go vendor: update libnetwork 1a17fb36132631a95fe6bb055b91e24a516ad81d 2020-04-21 13:00:22 +02:00
firewall_others.go vendor: update libnetwork 1a17fb36132631a95fe6bb055b91e24a516ad81d 2020-04-21 13:00:22 +02:00
LICENSE
network.go vendor: update libnetwork 1a17fb36132631a95fe6bb055b91e24a516ad81d 2020-04-21 13:00:22 +02:00
network_unix.go Vendoring latest swarmkit and libnetwork 2016-11-10 09:54:47 -08:00
network_windows.go Vendoring libnetwork_vendoring 2017-12-14 16:57:17 -08:00
README.md Update modules to support riscv64 2019-06-29 18:45:42 +00:00
resolver.go vendor libnetwork to 2e24aed516bd5c836e11378bb457dd612aa868ed 2020-05-28 03:28:51 +00:00
resolver_unix.go Vendor libnetwork @ 36d3bed0e9 2018-09-13 13:52:45 -07:00
resolver_windows.go
sandbox.go Vendor libnetwork 2018-10-12 08:44:48 -07:00
sandbox_dns_unix.go Bump libnetwork to latest refpoint 2020-01-16 16:28:23 -08:00
sandbox_dns_windows.go Bump libnetwork to latest refpoint 2020-01-16 16:28:23 -08:00
sandbox_externalkey.go
sandbox_externalkey_unix.go daemon: Use short libnetwork ID in exec-root & update libnetwork 2019-10-15 11:40:24 +01:00
sandbox_externalkey_windows.go
sandbox_store.go Bump libnetwork to 3ac297bc 2018-07-06 13:58:09 -04:00
service.go Vendor libnetwork 2018-07-26 11:17:56 -07:00
service_common.go vendor: bump libnetwork bf2bd42abc0a3734f12b5ec724e571434e42c669 2020-03-07 00:35:47 +01:00
service_linux.go vendor: vishvananda/netlink v1.1.0 2020-03-12 22:57:23 +01:00
service_unsupported.go bump libnetwork to b0186632 2018-07-03 13:46:19 -04:00
service_windows.go bump libnetwork to b0186632 2018-07-03 13:46:19 -04:00
store.go daemon: Use short libnetwork ID in exec-root & update libnetwork 2019-10-15 11:40:24 +01:00
vendor.conf vendor libnetwork to 2e24aed516bd5c836e11378bb457dd612aa868ed 2020-05-28 03:28:51 +00:00

libnetwork - networking for containers

Circle CI Coverage Status GoDoc Go Report Card

Libnetwork provides a native Go implementation for connecting containers

The goal of libnetwork is to deliver a robust Container Network Model that provides a consistent programming interface and the required network abstractions for applications.

Design

Please refer to the design for more information.

Using libnetwork

There are many networking solutions available to suit a broad range of use-cases. libnetwork uses a driver / plugin model to support all of these solutions while abstracting the complexity of the driver implementations by exposing a simple and consistent Network Model to users.

import (
	"fmt"
	"log"

	"github.com/docker/docker/pkg/reexec"
	"github.com/docker/libnetwork"
	"github.com/docker/libnetwork/config"
	"github.com/docker/libnetwork/netlabel"
	"github.com/docker/libnetwork/options"
)

func main() {
	if reexec.Init() {
		return
	}

	// Select and configure the network driver
	networkType := "bridge"

	// Create a new controller instance
	driverOptions := options.Generic{}
	genericOption := make(map[string]interface{})
	genericOption[netlabel.GenericData] = driverOptions
	controller, err := libnetwork.New(config.OptionDriverConfig(networkType, genericOption))
	if err != nil {
		log.Fatalf("libnetwork.New: %s", err)
	}

	// Create a network for containers to join.
	// NewNetwork accepts Variadic optional arguments that libnetwork and Drivers can use.
	network, err := controller.NewNetwork(networkType, "network1", "")
	if err != nil {
		log.Fatalf("controller.NewNetwork: %s", err)
	}

	// For each new container: allocate IP and interfaces. The returned network
	// settings will be used for container infos (inspect and such), as well as
	// iptables rules for port publishing. This info is contained or accessible
	// from the returned endpoint.
	ep, err := network.CreateEndpoint("Endpoint1")
	if err != nil {
		log.Fatalf("network.CreateEndpoint: %s", err)
	}

	// Create the sandbox for the container.
	// NewSandbox accepts Variadic optional arguments which libnetwork can use.
	sbx, err := controller.NewSandbox("container1",
		libnetwork.OptionHostname("test"),
		libnetwork.OptionDomainname("docker.io"))
	if err != nil {
		log.Fatalf("controller.NewSandbox: %s", err)
	}

	// A sandbox can join the endpoint via the join api.
	err = ep.Join(sbx)
	if err != nil {
		log.Fatalf("ep.Join: %s", err)
	}

	// libnetwork client can check the endpoint's operational data via the Info() API
	epInfo, err := ep.DriverInfo()
	if err != nil {
		log.Fatalf("ep.DriverInfo: %s", err)
	}

	macAddress, ok := epInfo[netlabel.MacAddress]
	if !ok {
		log.Fatalf("failed to get mac address from endpoint info")
	}

	fmt.Printf("Joined endpoint %s (%s) to sandbox %s (%s)\n", ep.Name(), macAddress, sbx.ContainerID(), sbx.Key())
}

Contributing

Want to hack on libnetwork? Docker's contributions guidelines apply.

Code and documentation copyright 2015 Docker, inc. Code released under the Apache 2.0 license. Docs released under Creative commons.