1
0
Fork 0
mirror of https://github.com/moby/moby.git synced 2022-11-09 12:21:53 -05:00
moby--moby/vendor/github.com/docker/libnetwork
Sebastiaan van Stijn 9cf349d0f8
bump libnetwork 90afbb01e1d8acacb505a092744ea42b9f167377
full diff: 0025177e3d...90afbb01e1

includes:

- docker/libnetwork#/2459 Fix Error Check in NewNetwork
- docker/libnetwork#/2466 Revert "Merge pull request #2339 from phyber/iptables-check"
    - reverts docker/libnetwork#/2339 controller: Check if IPTables is enabled for arrangeUserFilterRule
    - re-opens docker/libnetwork#2158 dockerd when run with --iptables=false modifies iptables by adding DOCKER-USER
    - re-opens moby/moby#35777 With iptables=false dockerd still creates DOCKER-USER chain and rules
    - re-opens docker/for-linux#136 dockerd --iptables=false adds DOCKER-USER chain and modify FORWARD chain anyway

Signed-off-by: Sebastiaan van Stijn <github@gone.nl>
2019-11-07 13:43:42 -08:00
..
bitseq Vendor libnetwork @ 36d3bed0e9 2018-09-13 13:52:45 -07:00
cluster bump libnetwork to eb6b2a57955e5c149d47c3973573216e8f8baa09 2018-05-21 00:37:54 +02:00
config daemon: propagate exec-root to libnetwork-setkey 2018-09-15 13:49:30 +09:00
datastore Vendor libnetwork 2018-07-26 11:17:56 -07:00
diagnostic Vendor libnetwork @ 36d3bed0e9 2018-09-13 13:52:45 -07:00
discoverapi
driverapi bump libnetwork to 96bcc0dae898308ed659c5095526788a602f4726 2019-09-20 19:48:49 +02:00
drivers daemon: Use short libnetwork ID in exec-root & update libnetwork 2019-10-15 11:40:24 +01:00
drvregistry Vendor libnetwork 2018-07-26 11:17:56 -07:00
etchosts
hostdiscovery Update imports for logrus version 2017-07-31 13:19:38 -07:00
idm Vendoring libnetwork and swarmkit 2017-10-09 13:08:03 -07:00
internal Vendor libnetwork 2018-07-26 11:17:56 -07:00
ipam Global Default Address Pool feature support 2018-08-20 15:07:08 -04:00
ipamapi Vendoring libnetwork and swarmkit 2017-10-09 13:08:03 -07:00
ipams Global Default Address Pool feature support 2018-08-20 15:07:08 -04:00
ipamutils Global Default Address Pool feature support 2018-08-20 15:07:08 -04:00
iptables bump libnetwork to 09cdcc8c0eab3946c2d70e8f6225b05baf1e90d1 2019-07-30 10:37:48 -07:00
ipvs daemon: Use short libnetwork ID in exec-root & update libnetwork 2019-10-15 11:40:24 +01:00
netlabel Vendor libnetwork @b6cb1ee 2017-03-24 11:07:33 -07:00
netutils Vendor Libnetwork 48f8463 2019-04-07 13:06:53 -07:00
networkdb bump libnetwork to ebcade70ad1059b070d0040d798ecca359bc5fed 2019-04-01 19:40:09 +02:00
ns bump libnetwork to 09cdcc8c0eab3946c2d70e8f6225b05baf1e90d1 2019-07-30 10:37:48 -07:00
options
osl Update modules to support riscv64 2019-06-29 18:45:42 +00:00
portallocator bump libnetwork 9ff9b57c344df5cd47443ad9e65702ec85c5aeb0 2019-04-23 18:37:36 +02:00
portmapper Update modules to support riscv64 2019-06-29 18:45:42 +00:00
resolvconf build: buildkit now also uses systemd's resolv.conf 2019-06-04 16:04:10 +00:00
types Update modules to support riscv64 2019-06-29 18:45:42 +00:00
agent.go bump libnetwork to ebcade70ad1059b070d0040d798ecca359bc5fed 2019-04-01 19:40:09 +02:00
agent.pb.go Import libnetwork fix for rolling updates 2018-03-28 14:16:31 -04:00
agent.proto Import libnetwork fix for rolling updates 2018-03-28 14:16:31 -04:00
controller.go bump libnetwork 90afbb01e1d8acacb505a092744ea42b9f167377 2019-11-07 13:43:42 -08:00
default_gateway.go bump libnetwork to ebcade70ad1059b070d0040d798ecca359bc5fed 2019-04-01 19:40:09 +02:00
default_gateway_freebsd.go
default_gateway_linux.go
default_gateway_windows.go
drivers_freebsd.go
drivers_ipam.go Update vendoring for libnetwork PR #2097 2018-03-12 15:19:08 -04:00
drivers_linux.go bump libnetwork to ebcade70ad1059b070d0040d798ecca359bc5fed 2019-04-01 19:40:09 +02:00
drivers_windows.go Update modules to support riscv64 2019-06-29 18:45:42 +00:00
endpoint.go bump libnetwork to b0186632 2018-07-03 13:46:19 -04:00
endpoint_cnt.go Libnetwork vendoring 2017-11-27 14:57:45 -08:00
endpoint_info.go bump libnetwork to b0186632 2018-07-03 13:46:19 -04:00
endpoint_info_unix.go
endpoint_info_windows.go
error.go Vendoring Libnetwork library 2017-04-10 17:52:16 -07:00
firewall_linux.go bump libnetwork 90afbb01e1d8acacb505a092744ea42b9f167377 2019-11-07 13:43:42 -08:00
firewall_others.go Update libnetwork commit 2018-01-18 20:59:40 -05:00
LICENSE
network.go bump libnetwork to 96bcc0dae898308ed659c5095526788a602f4726 2019-09-20 19:48:49 +02:00
network_unix.go
network_windows.go Vendoring libnetwork_vendoring 2017-12-14 16:57:17 -08:00
README.md Update modules to support riscv64 2019-06-29 18:45:42 +00:00
resolver.go bump libnetwork. vishvananda/netlink 1.0, vishvananda/netns 2019-06-25 14:10:15 +02:00
resolver_unix.go Vendor libnetwork @ 36d3bed0e9 2018-09-13 13:52:45 -07:00
resolver_windows.go
sandbox.go Vendor libnetwork 2018-10-12 08:44:48 -07:00
sandbox_dns_unix.go build: buildkit now also uses systemd's resolv.conf 2019-06-04 16:04:10 +00:00
sandbox_dns_windows.go
sandbox_externalkey.go
sandbox_externalkey_unix.go daemon: Use short libnetwork ID in exec-root & update libnetwork 2019-10-15 11:40:24 +01:00
sandbox_externalkey_windows.go
sandbox_store.go Bump libnetwork to 3ac297bc 2018-07-06 13:58:09 -04:00
service.go Vendor libnetwork 2018-07-26 11:17:56 -07:00
service_common.go vndr libnetwork to adjust for updated runc 2018-12-07 18:43:43 +01:00
service_linux.go Vendor libnetwork 2018-10-12 08:44:48 -07:00
service_unsupported.go bump libnetwork to b0186632 2018-07-03 13:46:19 -04:00
service_windows.go bump libnetwork to b0186632 2018-07-03 13:46:19 -04:00
store.go daemon: Use short libnetwork ID in exec-root & update libnetwork 2019-10-15 11:40:24 +01:00
vendor.conf bump libnetwork 90afbb01e1d8acacb505a092744ea42b9f167377 2019-11-07 13:43:42 -08:00

libnetwork - networking for containers

Circle CI Coverage Status GoDoc Go Report Card

Libnetwork provides a native Go implementation for connecting containers

The goal of libnetwork is to deliver a robust Container Network Model that provides a consistent programming interface and the required network abstractions for applications.

Design

Please refer to the design for more information.

Using libnetwork

There are many networking solutions available to suit a broad range of use-cases. libnetwork uses a driver / plugin model to support all of these solutions while abstracting the complexity of the driver implementations by exposing a simple and consistent Network Model to users.

import (
	"fmt"
	"log"

	"github.com/docker/docker/pkg/reexec"
	"github.com/docker/libnetwork"
	"github.com/docker/libnetwork/config"
	"github.com/docker/libnetwork/netlabel"
	"github.com/docker/libnetwork/options"
)

func main() {
	if reexec.Init() {
		return
	}

	// Select and configure the network driver
	networkType := "bridge"

	// Create a new controller instance
	driverOptions := options.Generic{}
	genericOption := make(map[string]interface{})
	genericOption[netlabel.GenericData] = driverOptions
	controller, err := libnetwork.New(config.OptionDriverConfig(networkType, genericOption))
	if err != nil {
		log.Fatalf("libnetwork.New: %s", err)
	}

	// Create a network for containers to join.
	// NewNetwork accepts Variadic optional arguments that libnetwork and Drivers can use.
	network, err := controller.NewNetwork(networkType, "network1", "")
	if err != nil {
		log.Fatalf("controller.NewNetwork: %s", err)
	}

	// For each new container: allocate IP and interfaces. The returned network
	// settings will be used for container infos (inspect and such), as well as
	// iptables rules for port publishing. This info is contained or accessible
	// from the returned endpoint.
	ep, err := network.CreateEndpoint("Endpoint1")
	if err != nil {
		log.Fatalf("network.CreateEndpoint: %s", err)
	}

	// Create the sandbox for the container.
	// NewSandbox accepts Variadic optional arguments which libnetwork can use.
	sbx, err := controller.NewSandbox("container1",
		libnetwork.OptionHostname("test"),
		libnetwork.OptionDomainname("docker.io"))
	if err != nil {
		log.Fatalf("controller.NewSandbox: %s", err)
	}

	// A sandbox can join the endpoint via the join api.
	err = ep.Join(sbx)
	if err != nil {
		log.Fatalf("ep.Join: %s", err)
	}

	// libnetwork client can check the endpoint's operational data via the Info() API
	epInfo, err := ep.DriverInfo()
	if err != nil {
		log.Fatalf("ep.DriverInfo: %s", err)
	}

	macAddress, ok := epInfo[netlabel.MacAddress]
	if !ok {
		log.Fatalf("failed to get mac address from endpoint info")
	}

	fmt.Printf("Joined endpoint %s (%s) to sandbox %s (%s)\n", ep.Name(), macAddress, sbx.ContainerID(), sbx.Key())
}

Contributing

Want to hack on libnetwork? Docker's contributions guidelines apply.

Code and documentation copyright 2015 Docker, inc. Code released under the Apache 2.0 license. Docs released under Creative commons.