moby--moby/libnetwork
Madhu Venugopal c92b196d2e Reload config should initialize only the appropriate datastore
With the current implementation, a config relaod event causes all the
datastores to reinitialize and that impacts objects with Persist=false
such as none and host network.

Signed-off-by: Madhu Venugopal <madhu@docker.com>
2016-03-25 01:10:03 -07:00
..
Godeps Fixing support for static mac and updating dependencies 2016-03-16 11:07:20 -07:00
api Move exposed ports from Endpoint to Sandbox 2016-03-06 09:31:26 -08:00
bitseq Fix some typos in comments and strings 2016-03-01 16:45:14 +01:00
client Move exposed ports from Endpoint to Sandbox 2016-03-06 09:31:26 -08:00
cmd
config Allow to pass global datastore config 2016-02-17 13:13:58 -08:00
datastore Fix some typos. 2016-02-29 19:20:50 +08:00
discoverapi Fix some typos. 2016-02-29 19:20:50 +08:00
docs Fix IPAM driver documentation 2016-03-02 15:56:46 -08:00
driverapi Move exposed ports from Endpoint to Sandbox 2016-03-06 09:31:26 -08:00
drivers modprobe when needed 2016-03-21 16:35:28 -07:00
etchosts Fix out of bound slice access in Delete() 2016-03-06 10:03:03 -08:00
hostdiscovery
idm Fix some typos. 2016-02-29 19:20:50 +08:00
ipam Fix some typos. 2016-02-29 19:20:50 +08:00
ipamapi Add nil ipam driver 2016-03-02 10:55:38 +07:00
ipams Fixing support for static mac and updating dependencies 2016-03-16 11:07:20 -07:00
ipamutils
iptables modprobe when needed 2016-03-21 16:35:28 -07:00
netlabel Handle datastore update in Ipam and overlay drivers 2016-02-16 13:49:49 -08:00
netutils
ns
options
osl Format network address using %v instead of %p 2016-03-16 17:23:13 -04:00
portallocator
portmapper
resolvconf
test/integration Fix some typos in comments and strings 2016-03-01 16:45:14 +01:00
testutils Fixed build tags for linux files 2016-02-17 11:45:51 -08:00
types Fix some typos. 2016-02-29 19:20:50 +08:00
.dockerignore
.gitignore
CHANGELOG.md Changelog for v0.7.0-dev.10 2016-03-19 07:05:45 -07:00
Dockerfile.build Fix CI 2016-03-18 14:49:57 -07:00
LICENSE
MAINTAINERS Chen Chun as libnetwork maintainer 2016-02-22 09:26:08 -08:00
Makefile Make macvlan and ipvlan drivers as experimental 2016-03-09 19:43:20 -05:00
README.md
ROADMAP.md
Vagrantfile
circle.yml
controller.go Reload config should initialize only the appropriate datastore 2016-03-25 01:10:03 -07:00
default_gateway.go Move exposed ports from Endpoint to Sandbox 2016-03-06 09:31:26 -08:00
default_gateway_freebsd.go
default_gateway_linux.go
default_gateway_windows.go
drivers.go Add nil ipam driver 2016-03-02 10:55:38 +07:00
drivers_experimental_linux.go Make macvlan and ipvlan drivers as experimental 2016-03-09 19:43:20 -05:00
drivers_freebsd.go
drivers_linux.go Make macvlan and ipvlan drivers as experimental 2016-03-09 19:43:20 -05:00
drivers_stub_linux.go Make macvlan and ipvlan drivers as experimental 2016-03-09 19:43:20 -05:00
drivers_windows.go Renaming driver name to lower case for usability and allowing portmapping to surface 2016-02-25 15:53:08 -08:00
endpoint.go Log stale resource cleanup 2016-03-16 11:57:19 -07:00
endpoint_cnt.go Fixing a possible endpoint_cnt state inconsistency issue 2016-03-15 21:07:42 -07:00
endpoint_info.go
error.go
errors_test.go
libnetwork_internal_test.go Move exposed ports from Endpoint to Sandbox 2016-03-06 09:31:26 -08:00
libnetwork_test.go Avoid V6 queries in docker domain going to external nameservers 2016-03-19 03:07:08 -07:00
machines
network.go Merge pull request #870 from sanimej/bugs 2016-03-20 10:20:53 -07:00
resolver.go Avoid V6 queries in docker domain going to external nameservers 2016-03-19 03:07:08 -07:00
sandbox.go Avoid V6 queries in docker domain going to external nameservers 2016-03-19 03:07:08 -07:00
sandbox_dns_unix.go Windows HNS integration 2016-02-12 15:01:37 -08:00
sandbox_dns_windows.go Windows HNS integration 2016-02-12 15:01:37 -08:00
sandbox_externalkey.go
sandbox_externalkey_unix.go Fix netns path setting from hook 2016-03-16 07:57:27 -07:00
sandbox_externalkey_windows.go Fix netns path setting from hook 2016-03-16 07:57:27 -07:00
sandbox_store.go Log stale resource cleanup 2016-03-16 11:57:19 -07:00
sandbox_test.go
store.go Reload config should initialize only the appropriate datastore 2016-03-25 01:10:03 -07:00
store_test.go
wrapmake.sh

README.md

libnetwork - networking for containers

Circle CI Coverage Status GoDoc

Libnetwork provides a native Go implementation for connecting containers

The goal of libnetwork is to deliver a robust Container Network Model that provides a consistent programming interface and the required network abstractions for applications.

Design

Please refer to the design for more information.

Using libnetwork

There are many networking solutions available to suit a broad range of use-cases. libnetwork uses a driver / plugin model to support all of these solutions while abstracting the complexity of the driver implementations by exposing a simple and consistent Network Model to users.

func main() {
	if reexec.Init() {
		return
	}

	// Select and configure the network driver
	networkType := "bridge"

	// Create a new controller instance
	driverOptions := options.Generic{}
	genericOption := make(map[string]interface{})
	genericOption[netlabel.GenericData] = driverOptions
	controller, err := libnetwork.New(config.OptionDriverConfig(networkType, genericOption))
	if err != nil {
		log.Fatalf("libnetwork.New: %s", err)
	}

	// Create a network for containers to join.
	// NewNetwork accepts Variadic optional arguments that libnetwork and Drivers can use.
	network, err := controller.NewNetwork(networkType, "network1")
	if err != nil {
		log.Fatalf("controller.NewNetwork: %s", err)
	}

	// For each new container: allocate IP and interfaces. The returned network
	// settings will be used for container infos (inspect and such), as well as
	// iptables rules for port publishing. This info is contained or accessible
	// from the returned endpoint.
	ep, err := network.CreateEndpoint("Endpoint1")
	if err != nil {
		log.Fatalf("network.CreateEndpoint: %s", err)
	}

	// Create the sandbox for the container.
	// NewSandbox accepts Variadic optional arguments which libnetwork can use.
	sbx, err := controller.NewSandbox("container1",
		libnetwork.OptionHostname("test"),
		libnetwork.OptionDomainname("docker.io"))
	if err != nil {
		log.Fatalf("controller.NewSandbox: %s", err)
	}

	// A sandbox can join the endpoint via the join api.
	err = ep.Join(sbx)
	if err != nil {
		log.Fatalf("ep.Join: %s", err)
	}

	// libnetwork client can check the endpoint's operational data via the Info() API
	epInfo, err := ep.DriverInfo()
	if err != nil {
		log.Fatalf("ep.DriverInfo: %s", err)
	}

	macAddress, ok := epInfo[netlabel.MacAddress]
	if !ok {
		log.Fatalf("failed to get mac address from endpoint info")
	}

	fmt.Printf("Joined endpoint %s (%s) to sandbox %s (%s)\n", ep.Name(), macAddress, sbx.ContainerID(), sbx.Key())
}

Future

Please refer to roadmap for more information.

Contributing

Want to hack on libnetwork? Docker's contributions guidelines apply.

Code and documentation copyright 2015 Docker, inc. Code released under the Apache 2.0 license. Docs released under Creative commons.