1
0
Fork 0
mirror of https://github.com/moby/moby.git synced 2022-11-09 12:21:53 -05:00
moby--moby/libnetwork
Flavio Crisciani 6d768ef73c Fix leak of handleTableEvents
The channel ch.C is never closed.
Added the listen of the ch.Done() to guarantee
that the goroutine is exiting once the event channel
is closed

Signed-off-by: Flavio Crisciani <flavio.crisciani@docker.com>
2017-05-31 11:04:19 -07:00
..
api fix some misspells in api/api_test.go 2017-03-20 20:40:53 +08:00
bitseq
client
cluster Revert "Move Cluster provider back to Moby" 2017-05-25 10:47:02 -07:00
cmd Revert "Move Cluster provider back to Moby" 2017-05-25 10:47:02 -07:00
config Revert "Move Cluster provider back to Moby" 2017-05-25 10:47:02 -07:00
datastore Add ConnectivityScope capability for network drivers along with scope network option 2017-05-12 17:16:34 -07:00
discoverapi
docs Add ConnectivityScope capability for network drivers along with scope network option 2017-05-12 17:16:34 -07:00
driverapi Add ConnectivityScope capability for network drivers along with scope network option 2017-05-12 17:16:34 -07:00
drivers Merge pull request #1675 from wenjianhn/forward-top 2017-05-16 22:47:59 -07:00
drvregistry swarm mode network inspect should provide cluser-wide task details 2017-03-10 19:12:00 -08:00
etchosts
hostdiscovery
idm
ipam
ipamapi
ipams
ipamutils
iptables Add a filter chain to allow persistent rules 2017-05-16 10:24:56 +08:00
ipvs fix review comments 2017-05-25 10:40:42 +05:30
netlabel
netutils
networkdb Fix leak of handleTableEvents 2017-05-31 11:04:19 -07:00
ns Flush container flows in conntrack (Bug #8795) 2017-04-07 18:30:45 -07:00
options
osl Do not manage ipv6 for host mode containers 2017-04-07 14:14:26 -07:00
portallocator
portmapper
resolvconf
test/integration
testutils
types
vendor Revert "Move Cluster provider back to Moby" 2017-05-25 10:47:02 -07:00
.dockerignore
.gitignore
agent.go Fix leak of handleTableEvents 2017-05-31 11:04:19 -07:00
agent.pb.go
agent.proto
CHANGELOG.md
circle.yml
controller.go Removing the override for ipamdriver for local scope networks 2017-05-30 16:01:15 -07:00
default_gateway.go Remove gw endpoint on gw nw join failure 2017-04-11 17:48:46 -07:00
default_gateway_freebsd.go
default_gateway_linux.go
default_gateway_solaris.go
default_gateway_windows.go
Dockerfile.build
drivers_experimental_linux.go
drivers_freebsd.go
drivers_ipam.go
drivers_linux.go
drivers_solaris.go
drivers_windows.go
endpoint.go Support configuration networks 2017-05-11 11:37:18 -07:00
endpoint_cnt.go
endpoint_info.go
endpoint_info_unix.go
endpoint_info_windows.go
error.go Merge pull request #1616 from chchliang/testnetwork 2017-04-10 13:54:44 -07:00
errors_test.go
firewall_linux.go Add a filter chain to allow persistent rules 2017-05-16 10:24:56 +08:00
firewall_others.go Add a filter chain to allow persistent rules 2017-05-16 10:24:56 +08:00
libnetwork_internal_test.go Support configuration networks 2017-05-11 11:37:18 -07:00
libnetwork_linux_test.go
libnetwork_test.go Support configuration networks 2017-05-11 11:37:18 -07:00
LICENSE
machines
MAINTAINERS
Makefile
network.go Removing the override for ipamdriver for local scope networks 2017-05-30 16:01:15 -07:00
network_unix.go
network_windows.go
README.md
resolver.go
resolver_unix.go
resolver_windows.go
ROADMAP.md
sandbox.go Sandbox.SetKey() should not reset the osl sandbox on failure 2017-03-28 13:17:10 -07:00
sandbox_dns_unix.go
sandbox_dns_windows.go
sandbox_externalkey.go
sandbox_externalkey_solaris.go
sandbox_externalkey_unix.go
sandbox_externalkey_windows.go
sandbox_store.go
sandbox_test.go
service.go
service_common.go swarm mode network inspect should provide cluser-wide task details 2017-03-10 19:12:00 -08:00
service_linux.go
service_unsupported.go
service_windows.go
store.go Do not reset network scope during store read 2017-05-15 12:05:56 -07:00
store_linux_test.go
store_test.go
support.sh Add network inspect -v to the support script 2017-05-11 15:04:28 -07:00
Vagrantfile
vendor.conf Revert "Move Cluster provider back to Moby" 2017-05-25 10:47:02 -07:00
wrapmake.sh

libnetwork - networking for containers

Circle CI Coverage Status GoDoc

Libnetwork provides a native Go implementation for connecting containers

The goal of libnetwork is to deliver a robust Container Network Model that provides a consistent programming interface and the required network abstractions for applications.

Design

Please refer to the design for more information.

Using libnetwork

There are many networking solutions available to suit a broad range of use-cases. libnetwork uses a driver / plugin model to support all of these solutions while abstracting the complexity of the driver implementations by exposing a simple and consistent Network Model to users.

func main() {
	if reexec.Init() {
		return
	}

	// Select and configure the network driver
	networkType := "bridge"

	// Create a new controller instance
	driverOptions := options.Generic{}
	genericOption := make(map[string]interface{})
	genericOption[netlabel.GenericData] = driverOptions
	controller, err := libnetwork.New(config.OptionDriverConfig(networkType, genericOption))
	if err != nil {
		log.Fatalf("libnetwork.New: %s", err)
	}

	// Create a network for containers to join.
	// NewNetwork accepts Variadic optional arguments that libnetwork and Drivers can use.
	network, err := controller.NewNetwork(networkType, "network1", "")
	if err != nil {
		log.Fatalf("controller.NewNetwork: %s", err)
	}

	// For each new container: allocate IP and interfaces. The returned network
	// settings will be used for container infos (inspect and such), as well as
	// iptables rules for port publishing. This info is contained or accessible
	// from the returned endpoint.
	ep, err := network.CreateEndpoint("Endpoint1")
	if err != nil {
		log.Fatalf("network.CreateEndpoint: %s", err)
	}

	// Create the sandbox for the container.
	// NewSandbox accepts Variadic optional arguments which libnetwork can use.
	sbx, err := controller.NewSandbox("container1",
		libnetwork.OptionHostname("test"),
		libnetwork.OptionDomainname("docker.io"))
	if err != nil {
		log.Fatalf("controller.NewSandbox: %s", err)
	}

	// A sandbox can join the endpoint via the join api.
	err = ep.Join(sbx)
	if err != nil {
		log.Fatalf("ep.Join: %s", err)
	}

	// libnetwork client can check the endpoint's operational data via the Info() API
	epInfo, err := ep.DriverInfo()
	if err != nil {
		log.Fatalf("ep.DriverInfo: %s", err)
	}

	macAddress, ok := epInfo[netlabel.MacAddress]
	if !ok {
		log.Fatalf("failed to get mac address from endpoint info")
	}

	fmt.Printf("Joined endpoint %s (%s) to sandbox %s (%s)\n", ep.Name(), macAddress, sbx.ContainerID(), sbx.Key())
}

Future

Please refer to roadmap for more information.

Contributing

Want to hack on libnetwork? Docker's contributions guidelines apply.

Code and documentation copyright 2015 Docker, inc. Code released under the Apache 2.0 license. Docs released under Creative commons.