1
0
Fork 0
mirror of https://github.com/moby/moby.git synced 2022-11-09 12:21:53 -05:00
moby--moby/libnetwork
Flavio Crisciani a0e0231909 Add the data-path-addr
During configuration in SWARM mode is now possible to pass an additional
parameter --data-path-addr <ip|interface>.
The information is going to be used to configure which is the interface
that is going to be used for the data path for global scope drivers.
Up to now the only driver really using this extra parameter is the
overlay driver.

Signed-off-by: Flavio Crisciani <flavio.crisciani@docker.com>
2017-04-14 16:52:40 -07:00
..
api fix some misspells in api/api_test.go 2017-03-20 20:40:53 +08:00
bitseq Merge pull request #1568 from likel/refactor 2016-12-29 12:18:06 -08:00
client Remove unnecessary string formats 2016-11-22 09:29:53 +08:00
cluster Add the data-path-addr 2017-04-14 16:52:40 -07:00
cmd Add the data-path-addr 2017-04-14 16:52:40 -07:00
config Revert "validate network and endpoint name more strictly" 2017-02-01 18:18:17 -08:00
datastore replace individual endpoint_cnt read from store with 1 bulk read 2017-02-02 14:45:38 -08:00
discoverapi fix nits in comments and log 2016-10-29 19:35:18 +08:00
docs Fix typo 2017-03-16 16:39:57 +08:00
driverapi swarm mode network inspect should provide cluser-wide task details 2017-03-10 19:12:00 -08:00
drivers Flush container flows in conntrack (Bug #8795) 2017-04-07 18:30:45 -07:00
drvregistry swarm mode network inspect should provide cluser-wide task details 2017-03-10 19:12:00 -08:00
etchosts Fix file descriptor leaks 2016-07-01 16:29:51 -07:00
hostdiscovery Remove unnecessary string formats 2016-11-22 09:29:53 +08:00
idm Merge pull request #1568 from likel/refactor 2016-12-29 12:18:06 -08:00
ipam Merge pull request #1568 from likel/refactor 2016-12-29 12:18:06 -08:00
ipamapi Internal interface to differentiate built-in drivers from remote 2016-12-19 05:17:42 -08:00
ipams Merge pull request #1599 from mavenugo/v0.9 2017-01-04 15:02:06 -08:00
ipamutils use grep to find a/an misuse 2016-06-03 16:35:33 +08:00
iptables Flush container flows in conntrack (Bug #8795) 2017-04-07 18:30:45 -07:00
ipvs handle err and fix t.Skip() in ipvs/ipvs_test.go 2017-02-07 14:31:11 +08:00
netlabel Support for com.docker.network.bridge.container_interface_prefix label 2017-03-01 03:09:45 +01:00
netutils Remove unnecessary string formats 2016-11-22 09:29:53 +08:00
networkdb control-plane hardning: cleanup local state on peer leaving a network 2017-03-31 01:49:03 -07:00
ns Flush container flows in conntrack (Bug #8795) 2017-04-07 18:30:45 -07:00
options use grep to find a/an misuse 2016-06-03 16:35:33 +08:00
osl Do not manage ipv6 for host mode containers 2017-04-07 14:14:26 -07:00
portallocator libnetwork support for Solaris 2016-10-14 16:38:23 -07:00
portmapper libnetwork support for Solaris 2016-10-14 16:38:23 -07:00
resolvconf Fix GetNameServerAsCIDR 2017-01-26 01:34:07 -08:00
test/integration Provide a way for libnetwork to make use of Agent mode functionalities 2016-06-05 18:41:21 -07:00
testutils libnetwork support for Solaris 2016-10-14 16:38:23 -07:00
types Merge pull request #1205 from allencloud/fix-typos 2016-08-01 09:49:31 -07:00
vendor Vendoring the netlink changes 2017-04-07 15:12:22 -07:00
.dockerignore Multi-Arch Support 2015-11-25 22:47:41 +00:00
.gitignore IPAM to run consistency check over its bitmasks 2016-01-14 08:26:14 -08:00
agent.go Add the data-path-addr 2017-04-14 16:52:40 -07:00
agent.pb.go Add container short-id as an alias for swarm mode tasks 2016-08-02 20:28:33 -07:00
agent.proto Add container short-id as an alias for swarm mode tasks 2016-08-02 20:28:33 -07:00
CHANGELOG.md Changelog for 0.8.0-dev.2 2016-05-07 11:16:00 -07:00
circle.yml Force go 1.7.1 in circle.yml to resolve failure to get golint 2016-10-12 13:02:53 -07:00
controller.go Merge pull request #1681 from krasi-georgiev/31610-ingress-sandbox-files-location-with-custom-daemon-root-directory 2017-04-10 16:39:12 -07:00
default_gateway.go Remove gw endpoint on gw nw join failure 2017-04-11 17:48:46 -07:00
default_gateway_freebsd.go Default GW support for overlay networks 2016-11-08 14:12:29 -08:00
default_gateway_linux.go Default GW support for overlay networks 2016-11-08 14:12:29 -08:00
default_gateway_solaris.go Default GW support for overlay networks 2016-11-08 14:12:29 -08:00
default_gateway_windows.go Default GW support for overlay networks 2016-11-08 14:12:29 -08:00
Dockerfile.build WIP: Update golang version to 1.7.1 2016-10-04 10:12:34 -07:00
drivers_experimental_linux.go Handling the new experimental daemon flag 2016-12-13 13:57:17 -08:00
drivers_freebsd.go Handling the new experimental daemon flag 2016-12-13 13:57:17 -08:00
drivers_ipam.go Moving IPAM initalization out of drvRegistry into libnetwork core 2016-07-05 16:42:34 -07:00
drivers_linux.go Handling the new experimental daemon flag 2016-12-13 13:57:17 -08:00
drivers_solaris.go Handling the new experimental daemon flag 2016-12-13 13:57:17 -08:00
drivers_windows.go Handling the new experimental daemon flag 2016-12-13 13:57:17 -08:00
endpoint.go Remove gw endpoint on gw nw join failure 2017-04-11 17:48:46 -07:00
endpoint_cnt.go Fix endpoint cnt decline overflow 2016-07-14 22:52:44 -04:00
endpoint_info.go Trust the endpoint state if we have a valid sandbox-id 2017-02-02 14:46:59 -08:00
endpoint_info_unix.go Default GW support for overlay networks 2016-11-08 14:12:29 -08:00
endpoint_info_windows.go Default GW support for overlay networks 2016-11-08 14:12:29 -08:00
error.go Merge pull request #1616 from chchliang/testnetwork 2017-04-10 13:54:44 -07:00
errors_test.go
libnetwork_internal_test.go swarm mode network inspect should provide cluser-wide task details 2017-03-10 19:12:00 -08:00
libnetwork_linux_test.go fix nits in comments 2016-12-28 18:49:18 +08:00
libnetwork_test.go Merge pull request #1531 from daehyeok/logrus_formating 2016-11-08 13:23:39 -08:00
LICENSE
machines Use Docker Machine for Test Environments 2015-11-10 21:47:59 +00:00
MAINTAINERS Update maintainers file 2017-03-06 19:30:37 +01:00
Makefile Use vndr for managing libnetwork dependencies 2017-01-11 17:22:05 -08:00
network.go Merge pull request #1678 from aboch/cingr 2017-03-13 13:57:16 -07:00
network_unix.go Windows overlay driver support 2016-11-03 16:50:04 -07:00
network_windows.go Fixed misspelling 2016-11-28 11:46:52 -07:00
README.md Add support to accepting arbitrary network ID 2016-04-15 12:34:21 -07:00
resolver.go Fix the data model inconsistency that breaks daemon upgrade to 1.14-dev 2017-01-19 14:25:26 -08:00
resolver_unix.go Refactoring logrus import and formatting 2016-11-08 12:42:41 -07:00
resolver_windows.go Move the iptables setup for embedded DNS into a reexec process 2016-04-15 23:37:20 -07:00
ROADMAP.md fix typos 2016-05-30 18:20:52 +08:00
sandbox.go Sandbox.SetKey() should not reset the osl sandbox on failure 2017-03-28 13:17:10 -07:00
sandbox_dns_unix.go Fix the data model inconsistency that breaks daemon upgrade to 1.14-dev 2017-01-19 14:25:26 -08:00
sandbox_dns_windows.go Add network restore to support docker live restore container 2016-06-13 23:48:00 -07:00
sandbox_externalkey.go sandbox_externalkey.go: split for cross compilation 2015-11-26 00:18:27 +01:00
sandbox_externalkey_solaris.go Get libnetwork to build on Solaris 2016-04-14 14:03:50 -07:00
sandbox_externalkey_unix.go Moving the UDS file out of /var/lib/docker and into /run/ 2016-07-15 13:38:23 -07:00
sandbox_externalkey_windows.go Fix netns path setting from hook 2016-03-16 07:57:27 -07:00
sandbox_store.go Fix the data model inconsistency that breaks daemon upgrade to 1.14-dev 2017-01-19 14:25:26 -08:00
sandbox_test.go Check subnet overlap when programming of sandbox interface 2016-11-08 11:22:38 -08:00
service.go Cleanup service bindings when leaving cluster 2016-08-19 18:11:15 -07:00
service_common.go swarm mode network inspect should provide cluser-wide task details 2017-03-10 19:12:00 -08:00
service_linux.go Fix service logs 2017-02-01 17:32:08 -08:00
service_unsupported.go Windows overlay driver support 2016-11-03 16:50:04 -07:00
service_windows.go Make virtual service programming more robust 2017-02-01 15:54:31 -08:00
store.go improve error for getStore() 2017-04-05 05:37:58 +00:00
store_linux_test.go libnetwork support for Solaris 2016-10-14 16:38:23 -07:00
store_test.go libnetwork support for Solaris 2016-10-14 16:38:23 -07:00
support.sh Simple support script to gather libnetwork info 2016-08-23 14:19:33 -07:00
Vagrantfile Updated vagrant box, ubuntu/vivid64 was remove from atlas.hasicorp.com 2016-10-19 15:28:46 -06:00
vendor.conf Vendoring the netlink changes 2017-04-07 15:12:22 -07:00
wrapmake.sh Allow tests to be interrupted 2015-09-01 21:48:09 -07:00

libnetwork - networking for containers

Circle CI Coverage Status GoDoc

Libnetwork provides a native Go implementation for connecting containers

The goal of libnetwork is to deliver a robust Container Network Model that provides a consistent programming interface and the required network abstractions for applications.

Design

Please refer to the design for more information.

Using libnetwork

There are many networking solutions available to suit a broad range of use-cases. libnetwork uses a driver / plugin model to support all of these solutions while abstracting the complexity of the driver implementations by exposing a simple and consistent Network Model to users.

func main() {
	if reexec.Init() {
		return
	}

	// Select and configure the network driver
	networkType := "bridge"

	// Create a new controller instance
	driverOptions := options.Generic{}
	genericOption := make(map[string]interface{})
	genericOption[netlabel.GenericData] = driverOptions
	controller, err := libnetwork.New(config.OptionDriverConfig(networkType, genericOption))
	if err != nil {
		log.Fatalf("libnetwork.New: %s", err)
	}

	// Create a network for containers to join.
	// NewNetwork accepts Variadic optional arguments that libnetwork and Drivers can use.
	network, err := controller.NewNetwork(networkType, "network1", "")
	if err != nil {
		log.Fatalf("controller.NewNetwork: %s", err)
	}

	// For each new container: allocate IP and interfaces. The returned network
	// settings will be used for container infos (inspect and such), as well as
	// iptables rules for port publishing. This info is contained or accessible
	// from the returned endpoint.
	ep, err := network.CreateEndpoint("Endpoint1")
	if err != nil {
		log.Fatalf("network.CreateEndpoint: %s", err)
	}

	// Create the sandbox for the container.
	// NewSandbox accepts Variadic optional arguments which libnetwork can use.
	sbx, err := controller.NewSandbox("container1",
		libnetwork.OptionHostname("test"),
		libnetwork.OptionDomainname("docker.io"))
	if err != nil {
		log.Fatalf("controller.NewSandbox: %s", err)
	}

	// A sandbox can join the endpoint via the join api.
	err = ep.Join(sbx)
	if err != nil {
		log.Fatalf("ep.Join: %s", err)
	}

	// libnetwork client can check the endpoint's operational data via the Info() API
	epInfo, err := ep.DriverInfo()
	if err != nil {
		log.Fatalf("ep.DriverInfo: %s", err)
	}

	macAddress, ok := epInfo[netlabel.MacAddress]
	if !ok {
		log.Fatalf("failed to get mac address from endpoint info")
	}

	fmt.Printf("Joined endpoint %s (%s) to sandbox %s (%s)\n", ep.Name(), macAddress, sbx.ContainerID(), sbx.Key())
}

Future

Please refer to roadmap for more information.

Contributing

Want to hack on libnetwork? Docker's contributions guidelines apply.

Code and documentation copyright 2015 Docker, inc. Code released under the Apache 2.0 license. Docs released under Creative commons.