moby--moby/libnetwork
Madhu Venugopal 4e9df02c8f Merge pull request #1444 from aboch/bs
Fix bitseq.SetAnyInRange
2016-09-14 14:38:30 -07:00
..
Godeps Update Godeps 2016-09-12 15:32:19 -07:00
api
bitseq Fix bitseq.SetAnyInRange 2016-09-13 11:52:12 -07:00
client Add mflag package locally to libnetwork 2016-09-07 13:47:32 -07:00
cluster Move engine-api to docker/docker/api 2016-09-07 14:38:45 -07:00
cmd Move engine-api to docker/docker/api 2016-09-07 14:38:45 -07:00
config Remove pkg/tlsconfig dependency 2016-09-06 14:10:58 -07:00
datastore Merge pull request #1205 from allencloud/fix-typos 2016-08-01 09:49:31 -07:00
discoverapi Adding Advertise-addr support 2016-07-21 02:44:25 -07:00
docs Merge pull request #1205 from allencloud/fix-typos 2016-08-01 09:49:31 -07:00
driverapi
drivers Revert "add s390x arch build info at the netlink_deprecated_linux bridge driver" 2016-09-09 18:04:45 +02:00
drvregistry Moving IPAM initalization out of drvRegistry into libnetwork core 2016-07-05 16:42:34 -07:00
etchosts Fix file descriptor leaks 2016-07-01 16:29:51 -07:00
hostdiscovery Merge pull request #1205 from allencloud/fix-typos 2016-08-01 09:49:31 -07:00
idm
ipam
ipamapi Merge pull request #1205 from allencloud/fix-typos 2016-08-01 09:49:31 -07:00
ipams Move engine-api to docker/docker/api 2016-09-07 14:38:45 -07:00
ipamutils
iptables
ipvs Merge pull request #1205 from allencloud/fix-typos 2016-08-01 09:49:31 -07:00
netlabel
netutils Fix CircleCI 2016-08-30 12:23:19 -07:00
networkdb Revert "Add sandbox API for task insertion to service LB and service discovery" 2016-09-14 08:44:20 -07:00
ns
options
osl Merge pull request #1284 from liubin/fix-typos 2016-08-01 09:49:00 -07:00
portallocator
portmapper portmapper: touch iptables only for IPv4 2016-07-31 00:29:24 +02:00
resolvconf
test/integration
testutils
types Merge pull request #1205 from allencloud/fix-typos 2016-08-01 09:49:31 -07:00
.dockerignore
.gitignore
CHANGELOG.md
Dockerfile.build
LICENSE
MAINTAINERS
Makefile Make the docker proxy a standalone binary not a re-exec 2016-07-04 13:17:16 +01:00
README.md
ROADMAP.md
Vagrantfile
agent.go Avoid double close of agentInitDone 2016-08-24 14:00:36 -07:00
agent.pb.go Add container short-id as an alias for swarm mode tasks 2016-08-02 20:28:33 -07:00
agent.proto Add container short-id as an alias for swarm mode tasks 2016-08-02 20:28:33 -07:00
circle.yml
controller.go Serialize dynamic network creation 2016-09-12 15:24:38 -07:00
default_gateway.go fix typo in comments and log 2016-07-30 02:21:10 +08:00
default_gateway_freebsd.go
default_gateway_linux.go
default_gateway_solaris.go
default_gateway_windows.go
drivers_experimental_linux.go
drivers_freebsd.go
drivers_ipam.go Moving IPAM initalization out of drvRegistry into libnetwork core 2016-07-05 16:42:34 -07:00
drivers_linux.go
drivers_solaris.go
drivers_stub_linux.go
drivers_windows.go
endpoint.go Revert "Add sandbox API for task insertion to service LB and service discovery" 2016-09-14 08:44:20 -07:00
endpoint_cnt.go Fix endpoint cnt decline overflow 2016-07-14 22:52:44 -04:00
endpoint_info.go Ensure drivertable entries in joininfo is uptodate 2016-08-02 14:06:41 -07:00
error.go
errors_test.go
libnetwork_internal_test.go Relax SRV name validation and fix external SRV query handling 2016-08-14 11:27:07 -07:00
libnetwork_test.go Revert "Add sandbox API for task insertion to service LB and service discovery" 2016-09-14 08:44:20 -07:00
machines
network.go Fix potential deadlock in getSvcRecords() 2016-08-30 12:40:46 -07:00
resolver.go Drop queries in root doamin when ndots is set 2016-09-12 14:25:05 -07:00
resolver_unix.go
resolver_windows.go
sandbox.go Revert "Add sandbox API for task insertion to service LB and service discovery" 2016-09-14 08:44:20 -07:00
sandbox_dns_unix.go Drop queries in root doamin when ndots is set 2016-09-12 14:25:05 -07:00
sandbox_dns_windows.go
sandbox_externalkey.go
sandbox_externalkey_solaris.go
sandbox_externalkey_unix.go Moving the UDS file out of /var/lib/docker and into /run/ 2016-07-15 13:38:23 -07:00
sandbox_externalkey_windows.go
sandbox_store.go Better error handling in restoring sandbox states 2016-07-27 00:55:46 -07:00
sandbox_test.go
service.go Cleanup service bindings when leaving cluster 2016-08-19 18:11:15 -07:00
service_linux.go Merge pull request #1398 from sanimej/access 2016-08-30 23:06:12 +02:00
service_unsupported.go Merge pull request #1398 from sanimej/access 2016-08-30 23:06:12 +02:00
store.go Avoid k/v store endpoint update in swarm mode 2016-08-23 14:14:11 -07:00
store_test.go
support.sh Simple support script to gather libnetwork info 2016-08-23 14:19:33 -07:00
wrapmake.sh

README.md

libnetwork - networking for containers

Circle CI Coverage Status GoDoc

Libnetwork provides a native Go implementation for connecting containers

The goal of libnetwork is to deliver a robust Container Network Model that provides a consistent programming interface and the required network abstractions for applications.

Design

Please refer to the design for more information.

Using libnetwork

There are many networking solutions available to suit a broad range of use-cases. libnetwork uses a driver / plugin model to support all of these solutions while abstracting the complexity of the driver implementations by exposing a simple and consistent Network Model to users.

func main() {
	if reexec.Init() {
		return
	}

	// Select and configure the network driver
	networkType := "bridge"

	// Create a new controller instance
	driverOptions := options.Generic{}
	genericOption := make(map[string]interface{})
	genericOption[netlabel.GenericData] = driverOptions
	controller, err := libnetwork.New(config.OptionDriverConfig(networkType, genericOption))
	if err != nil {
		log.Fatalf("libnetwork.New: %s", err)
	}

	// Create a network for containers to join.
	// NewNetwork accepts Variadic optional arguments that libnetwork and Drivers can use.
	network, err := controller.NewNetwork(networkType, "network1", "")
	if err != nil {
		log.Fatalf("controller.NewNetwork: %s", err)
	}

	// For each new container: allocate IP and interfaces. The returned network
	// settings will be used for container infos (inspect and such), as well as
	// iptables rules for port publishing. This info is contained or accessible
	// from the returned endpoint.
	ep, err := network.CreateEndpoint("Endpoint1")
	if err != nil {
		log.Fatalf("network.CreateEndpoint: %s", err)
	}

	// Create the sandbox for the container.
	// NewSandbox accepts Variadic optional arguments which libnetwork can use.
	sbx, err := controller.NewSandbox("container1",
		libnetwork.OptionHostname("test"),
		libnetwork.OptionDomainname("docker.io"))
	if err != nil {
		log.Fatalf("controller.NewSandbox: %s", err)
	}

	// A sandbox can join the endpoint via the join api.
	err = ep.Join(sbx)
	if err != nil {
		log.Fatalf("ep.Join: %s", err)
	}

	// libnetwork client can check the endpoint's operational data via the Info() API
	epInfo, err := ep.DriverInfo()
	if err != nil {
		log.Fatalf("ep.DriverInfo: %s", err)
	}

	macAddress, ok := epInfo[netlabel.MacAddress]
	if !ok {
		log.Fatalf("failed to get mac address from endpoint info")
	}

	fmt.Printf("Joined endpoint %s (%s) to sandbox %s (%s)\n", ep.Name(), macAddress, sbx.ContainerID(), sbx.Key())
}

Future

Please refer to roadmap for more information.

Contributing

Want to hack on libnetwork? Docker's contributions guidelines apply.

Code and documentation copyright 2015 Docker, inc. Code released under the Apache 2.0 license. Docs released under Creative commons.