moby--moby/libnetwork
Alessandro Boch b93c2c69ac Vendor vishvananda/netlink b824519
Signed-off-by: Alessandro Boch <aboch@docker.com>
2016-05-18 11:42:21 -07:00
..
Godeps Vendor vishvananda/netlink b824519 2016-05-18 11:42:21 -07:00
api Dnet agent mode support and IT 2016-05-05 13:59:00 -07:00
bitseq
client Dnet agent mode support and IT 2016-05-05 13:59:00 -07:00
cmd Dnet agent mode support and IT 2016-05-05 13:59:00 -07:00
config
datastore
discoverapi
docs
driverapi
drivers Vendoring vishvananda/netlink f9bc7a684edbe780a09b87689db6cb1706bf327f 2016-05-16 11:08:47 -07:00
drvregistry
etchosts
hostdiscovery
idm
ipam IPAM allocator to not accept a datastore update if already present 2016-05-12 16:43:51 -07:00
ipamapi
ipams
ipamutils
iptables
netlabel
netutils
networkdb Use protobuf in networkdb core messages 2016-05-17 09:18:24 -07:00
ns
options
osl
portallocator
portmapper
resolvconf
test/integration Fix flakiness in dnet_exec 2016-05-17 14:16:23 -07:00
testutils
types
.dockerignore
.gitignore
CHANGELOG.md Changelog for 0.8.0-dev.2 2016-05-07 11:16:00 -07:00
Dockerfile.build
LICENSE
MAINTAINERS
Makefile Use protobuf in networkdb core messages 2016-05-17 09:18:24 -07:00
README.md
ROADMAP.md
Vagrantfile
agent.go Convert endpoint gossip to use protobuf 2016-05-17 19:05:06 -07:00
agent.pb.go Convert endpoint gossip to use protobuf 2016-05-17 19:05:06 -07:00
agent.proto Convert endpoint gossip to use protobuf 2016-05-17 19:05:06 -07:00
circle.yml
controller.go Add service support 2016-05-05 16:47:05 -07:00
default_gateway.go
default_gateway_freebsd.go
default_gateway_linux.go
default_gateway_solaris.go
default_gateway_windows.go
drivers_experimental_linux.go
drivers_freebsd.go
drivers_linux.go
drivers_solaris.go
drivers_stub_linux.go
drivers_windows.go
endpoint.go Add service support 2016-05-05 16:47:05 -07:00
endpoint_cnt.go
endpoint_info.go
error.go
errors_test.go
libnetwork_internal_test.go
libnetwork_test.go
machines
network.go Protect cap access in driver() 2016-05-15 18:10:50 -07:00
resolver.go
resolver_unix.go
resolver_windows.go
sandbox.go Add service support 2016-05-05 16:47:05 -07:00
sandbox_dns_unix.go
sandbox_dns_windows.go
sandbox_externalkey.go
sandbox_externalkey_solaris.go
sandbox_externalkey_unix.go
sandbox_externalkey_windows.go
sandbox_store.go Set persist flag on the dummy network object during cleanup 2016-05-06 18:38:56 -07:00
sandbox_test.go Do not allow network creation if datastore is missing 2016-05-12 16:36:54 -07:00
service.go Add service support 2016-05-05 16:47:05 -07:00
store.go Do not allow network creation if datastore is missing 2016-05-12 16:36:54 -07:00
store_test.go
wrapmake.sh

README.md

libnetwork - networking for containers

Circle CI Coverage Status GoDoc

Libnetwork provides a native Go implementation for connecting containers

The goal of libnetwork is to deliver a robust Container Network Model that provides a consistent programming interface and the required network abstractions for applications.

Design

Please refer to the design for more information.

Using libnetwork

There are many networking solutions available to suit a broad range of use-cases. libnetwork uses a driver / plugin model to support all of these solutions while abstracting the complexity of the driver implementations by exposing a simple and consistent Network Model to users.

func main() {
	if reexec.Init() {
		return
	}

	// Select and configure the network driver
	networkType := "bridge"

	// Create a new controller instance
	driverOptions := options.Generic{}
	genericOption := make(map[string]interface{})
	genericOption[netlabel.GenericData] = driverOptions
	controller, err := libnetwork.New(config.OptionDriverConfig(networkType, genericOption))
	if err != nil {
		log.Fatalf("libnetwork.New: %s", err)
	}

	// Create a network for containers to join.
	// NewNetwork accepts Variadic optional arguments that libnetwork and Drivers can use.
	network, err := controller.NewNetwork(networkType, "network1", "")
	if err != nil {
		log.Fatalf("controller.NewNetwork: %s", err)
	}

	// For each new container: allocate IP and interfaces. The returned network
	// settings will be used for container infos (inspect and such), as well as
	// iptables rules for port publishing. This info is contained or accessible
	// from the returned endpoint.
	ep, err := network.CreateEndpoint("Endpoint1")
	if err != nil {
		log.Fatalf("network.CreateEndpoint: %s", err)
	}

	// Create the sandbox for the container.
	// NewSandbox accepts Variadic optional arguments which libnetwork can use.
	sbx, err := controller.NewSandbox("container1",
		libnetwork.OptionHostname("test"),
		libnetwork.OptionDomainname("docker.io"))
	if err != nil {
		log.Fatalf("controller.NewSandbox: %s", err)
	}

	// A sandbox can join the endpoint via the join api.
	err = ep.Join(sbx)
	if err != nil {
		log.Fatalf("ep.Join: %s", err)
	}

	// libnetwork client can check the endpoint's operational data via the Info() API
	epInfo, err := ep.DriverInfo()
	if err != nil {
		log.Fatalf("ep.DriverInfo: %s", err)
	}

	macAddress, ok := epInfo[netlabel.MacAddress]
	if !ok {
		log.Fatalf("failed to get mac address from endpoint info")
	}

	fmt.Printf("Joined endpoint %s (%s) to sandbox %s (%s)\n", ep.Name(), macAddress, sbx.ContainerID(), sbx.Key())
}

Future

Please refer to roadmap for more information.

Contributing

Want to hack on libnetwork? Docker's contributions guidelines apply.

Code and documentation copyright 2015 Docker, inc. Code released under the Apache 2.0 license. Docs released under Creative commons.