moby--moby/libnetwork
Billy Ridgway 8dbb5b5a7d Implement NAT IPv6 to fix the issue https://github.com/moby/moby/issues/25407
Signed-off-by: Billy Ridgway <wrridgwa@us.ibm.com>
Signed-off-by: Benjamin Böhmke <benjamin@boehmke.net>
2020-07-19 16:16:51 +02:00
..
.circleci Build with latest docker stable engine 2018-12-10 08:36:52 -08:00
api Remove Solaris support 2017-10-25 15:33:06 +02:00
bitseq Fix gofmt in preparation of Go 1.13 update 2020-02-27 11:46:16 +01:00
client Spelling fixes 2018-07-12 12:54:44 -07:00
cluster Switch from x/net/context -> context 2018-04-24 14:57:04 -07:00
cmd Migrate from github.com/codegangsta/cli to github.com/urfave/cli 2020-01-24 11:12:07 +01:00
config Added API to set ephemeral port allocator range. 2019-10-11 18:48:07 +00:00
datastore Spelling fixes 2018-07-12 12:54:44 -07:00
diagnostic doc: fix typo 2018-09-07 11:48:15 +08:00
discoverapi fix nits in comments and log 2016-10-29 19:35:18 +08:00
docs Update design.md 2020-02-18 17:21:39 -08:00
driverapi Updating IPAM config with results from HNS create network call. 2019-08-23 09:58:29 -07:00
drivers Implement NAT IPv6 to fix the issue https://github.com/moby/moby/issues/25407 2020-07-19 16:16:51 +02:00
drvregistry Spelling fixes 2018-07-12 12:54:44 -07:00
etchosts Enable network-db test image creation 2018-05-29 08:03:32 -07:00
hostdiscovery test: fix ineffectual assignments 2018-05-29 18:08:32 +08:00
idm Adding a unit case to verify rollover 2017-10-03 12:15:34 -07:00
internal Create internal directory 2018-07-16 17:34:20 -07:00
ipam typo fix about mismatch 2018-09-27 20:43:13 +08:00
ipamapi Adding a unit case to verify rollover 2017-10-03 12:15:34 -07:00
ipams Fixes moby/moby#40388 2020-03-18 00:09:10 +08:00
ipamutils Add getter function for Default Address Pools 2018-08-16 15:48:42 -04:00
iptables Implement NAT IPv6 to fix the issue https://github.com/moby/moby/issues/25407 2020-07-19 16:16:51 +02:00
netlabel Support for com.docker.network.host_ipv4 driver label 2019-09-24 22:15:43 -07:00
netutils Use errors.Wrap to preserve original error 2019-04-01 20:14:54 +02:00
networkdb regenerate protobufs with debian buster 2020-02-26 16:03:42 +01:00
ns Revert "Adjust LockOSThread" 2019-08-15 14:44:03 -07:00
options
osl Improving load balancer performance 2020-02-14 13:24:06 -08:00
portallocator Added API to set ephemeral port allocator range. 2019-10-11 18:48:07 +00:00
portmapper Implement NAT IPv6 to fix the issue https://github.com/moby/moby/issues/25407 2020-07-19 16:16:51 +02:00
resolvconf gofmt: Fix formatting warnings 2019-06-26 16:54:31 +01:00
support Resolve "bridge fdb show" hang issue 2019-09-26 21:29:22 +00:00
test/integration Merge pull request #1656 from huikang/remove-unused-testcode 2019-06-27 09:57:12 +01:00
testutils Revert "Adjust LockOSThread" 2019-08-15 14:44:03 -07:00
types Update sctp package 2019-06-24 17:26:33 +02:00
vendor vendor: update moby/ipvs v1.0.1 2020-04-28 17:04:14 +02:00
.dockerignore Added back dockerignore 2018-06-22 16:10:22 -07:00
.gitignore Added back dockerignore 2018-06-22 16:10:22 -07:00
CHANGELOG.md Spelling fixes 2018-07-12 12:54:44 -07:00
Dockerfile Dockerfile: update to Go 1.13.8 2020-02-27 11:46:18 +01:00
LICENSE
MAINTAINERS Add Arko to maintainers 2019-12-31 11:04:32 +01:00
Makefile Dockerfile: use GO_VERSION build-arg for overriding Go version 2019-07-18 11:01:07 +02:00
README.md road map loss tracing, just keep use 'Design' describe the 'Future' 2019-06-25 22:06:30 +08:00
Vagrantfile Updated vagrant box, ubuntu/vivid64 was remove from atlas.hasicorp.com 2016-10-19 15:28:46 -06:00
agent.go Fix NPE due to null value returned by ep.Iface() 2020-04-02 22:34:55 -07:00
agent.pb.go Gracefully remove LB endpoints from services 2018-03-16 15:19:49 -04:00
agent.proto Gracefully remove LB endpoints from services 2018-03-16 15:19:49 -04:00
controller.go store.getNetworksFromStore() remove unused error return 2020-05-26 10:39:38 +02:00
default_gateway.go Fix gosimple 2019-01-03 15:25:37 -08:00
default_gateway_freebsd.go Default GW support for overlay networks 2016-11-08 14:12:29 -08:00
default_gateway_linux.go Default GW support for overlay networks 2016-11-08 14:12:29 -08:00
default_gateway_windows.go Default GW support for overlay networks 2016-11-08 14:12:29 -08:00
drivers_freebsd.go Handling the new experimental daemon flag 2016-12-13 13:57:17 -08:00
drivers_ipam.go Allow user to specify default address pools for docker networks 2018-02-22 12:14:59 -05:00
drivers_linux.go Removing experimental driver interface 2018-09-25 10:30:56 -07:00
drivers_windows.go Add support for Internal and Private network types on windows 2018-07-12 13:58:10 -07:00
endpoint.go etchosts: additionally include the container's IPv6 address if available 2019-09-04 01:58:00 +02:00
endpoint_cnt.go endpoint_cnt store updates should not create an object 2017-10-26 17:52:40 -07:00
endpoint_info.go Add SrcName() method to return interface name 2018-06-28 12:08:18 -04:00
endpoint_info_unix.go Default GW support for overlay networks 2016-11-08 14:12:29 -08:00
endpoint_info_windows.go Default GW support for overlay networks 2016-11-08 14:12:29 -08:00
endpoint_test.go etchosts: additionally include the container's IPv6 address if available 2019-09-04 01:58:00 +02:00
error.go Merge pull request #1616 from chchliang/testnetwork 2017-04-10 13:54:44 -07:00
errors_test.go
firewall_linux.go Implement NAT IPv6 to fix the issue https://github.com/moby/moby/issues/25407 2020-07-19 16:16:51 +02:00
firewall_others.go DOCKER-USER chain not created when IPTableEnable=false. 2019-11-12 16:32:42 +00:00
firewall_test.go Implement NAT IPv6 to fix the issue https://github.com/moby/moby/issues/25407 2020-07-19 16:16:51 +02:00
libnetwork_internal_test.go Create internal directory 2018-07-16 17:34:20 -07:00
libnetwork_linux_test.go Revert "Adjust LockOSThread" 2019-08-15 14:44:03 -07:00
libnetwork_test.go Implement NAT IPv6 to fix the issue https://github.com/moby/moby/issues/25407 2020-07-19 16:16:51 +02:00
machines
network.go Fix 'failed to get network during CreateEndpoint' 2020-06-01 17:16:07 +08:00
network_unix.go Windows overlay driver support 2016-11-03 16:50:04 -07:00
network_windows.go Fix for docker intercepting DNS requests on ICS network 2017-11-17 13:06:14 -08:00
resolver.go Resolver: fix error handling if we didn't receive a response 2020-05-21 17:50:39 +00:00
resolver_test.go Make DNS records and queries case-insensitive 2019-06-19 11:23:31 -07:00
resolver_unix.go Implement NAT IPv6 to fix the issue https://github.com/moby/moby/issues/25407 2020-07-19 16:16:51 +02:00
resolver_windows.go
sandbox.go Make DSR an overlay-specific driver "option" 2018-10-11 14:13:19 -04:00
sandbox_dns_unix.go etchosts: allow adding multiple container ips 2019-08-30 23:49:33 +02:00
sandbox_dns_windows.go etchosts: allow adding multiple container ips 2019-08-30 23:49:33 +02:00
sandbox_externalkey.go
sandbox_externalkey_unix.go Shorten controller ID in exec-root to not hit UNIX_PATH_MAX 2019-08-28 18:59:49 +01:00
sandbox_externalkey_windows.go
sandbox_store.go Use fmt precision to limit string length 2018-07-05 17:44:04 -04:00
sandbox_test.go Improve interface order 2018-05-25 17:40:32 +02:00
service.go Create internal directory 2018-07-16 17:34:20 -07:00
service_common.go Cleanup VFP during overlay network removal 2020-03-03 19:48:38 -05:00
service_common_test.go Migrate to gotest.tools :) 2018-07-06 11:01:37 -07:00
service_linux.go Implement NAT IPv6 to fix the issue https://github.com/moby/moby/issues/25407 2020-07-19 16:16:51 +02:00
service_unsupported.go Add endpoint load-balancing mode 2018-06-28 12:08:18 -04:00
service_windows.go Add endpoint load-balancing mode 2018-06-28 12:08:18 -04:00
store.go Fix 'failed to get network during CreateEndpoint' 2020-06-01 17:16:07 +08:00
store_linux_test.go libnetwork support for Solaris 2016-10-14 16:38:23 -07:00
store_test.go libnetwork support for Solaris 2016-10-14 16:38:23 -07:00
vendor.conf vendor: update moby/ipvs v1.0.1 2020-04-28 17:04:14 +02:00

README.md

libnetwork - networking for containers

Circle CI Coverage Status GoDoc Go Report Card

Libnetwork provides a native Go implementation for connecting containers

The goal of libnetwork is to deliver a robust Container Network Model that provides a consistent programming interface and the required network abstractions for applications.

Design

Please refer to the design for more information.

Using libnetwork

There are many networking solutions available to suit a broad range of use-cases. libnetwork uses a driver / plugin model to support all of these solutions while abstracting the complexity of the driver implementations by exposing a simple and consistent Network Model to users.

import (
	"fmt"
	"log"

	"github.com/docker/docker/pkg/reexec"
	"github.com/docker/libnetwork"
	"github.com/docker/libnetwork/config"
	"github.com/docker/libnetwork/netlabel"
	"github.com/docker/libnetwork/options"
)

func main() {
	if reexec.Init() {
		return
	}

	// Select and configure the network driver
	networkType := "bridge"

	// Create a new controller instance
	driverOptions := options.Generic{}
	genericOption := make(map[string]interface{})
	genericOption[netlabel.GenericData] = driverOptions
	controller, err := libnetwork.New(config.OptionDriverConfig(networkType, genericOption))
	if err != nil {
		log.Fatalf("libnetwork.New: %s", err)
	}

	// Create a network for containers to join.
	// NewNetwork accepts Variadic optional arguments that libnetwork and Drivers can use.
	network, err := controller.NewNetwork(networkType, "network1", "")
	if err != nil {
		log.Fatalf("controller.NewNetwork: %s", err)
	}

	// For each new container: allocate IP and interfaces. The returned network
	// settings will be used for container infos (inspect and such), as well as
	// iptables rules for port publishing. This info is contained or accessible
	// from the returned endpoint.
	ep, err := network.CreateEndpoint("Endpoint1")
	if err != nil {
		log.Fatalf("network.CreateEndpoint: %s", err)
	}

	// Create the sandbox for the container.
	// NewSandbox accepts Variadic optional arguments which libnetwork can use.
	sbx, err := controller.NewSandbox("container1",
		libnetwork.OptionHostname("test"),
		libnetwork.OptionDomainname("docker.io"))
	if err != nil {
		log.Fatalf("controller.NewSandbox: %s", err)
	}

	// A sandbox can join the endpoint via the join api.
	err = ep.Join(sbx)
	if err != nil {
		log.Fatalf("ep.Join: %s", err)
	}

	// libnetwork client can check the endpoint's operational data via the Info() API
	epInfo, err := ep.DriverInfo()
	if err != nil {
		log.Fatalf("ep.DriverInfo: %s", err)
	}

	macAddress, ok := epInfo[netlabel.MacAddress]
	if !ok {
		log.Fatalf("failed to get mac address from endpoint info")
	}

	fmt.Printf("Joined endpoint %s (%s) to sandbox %s (%s)\n", ep.Name(), macAddress, sbx.ContainerID(), sbx.Key())
}

Contributing

Want to hack on libnetwork? Docker's contributions guidelines apply.

Code and documentation copyright 2015 Docker, inc. Code released under the Apache 2.0 license. Docs released under Creative commons.