1
0
Fork 0
mirror of https://github.com/moby/moby.git synced 2022-11-09 12:21:53 -05:00
moby--moby/libnetwork
Derek McGowan ccabedfbe3 Fix file descriptor leaks
Ensures network connections and file are closed when done writing.

Signed-off-by: Derek McGowan <derek@mcgstyle.net> (github: dmcgowan)
2016-07-01 16:29:51 -07:00
..
api Dnet agent mode support and IT 2016-05-05 13:59:00 -07:00
bitseq Merge pull request #1120 from mrjana/store 2016-04-15 15:50:46 -07:00
client Fix sanbox typo 2016-06-24 15:14:01 -07:00
cluster Provide a way for libnetwork to make use of Agent mode functionalities 2016-06-05 18:41:21 -07:00
cmd Provide a way for libnetwork to make use of Agent mode functionalities 2016-06-05 18:41:21 -07:00
config Add network restore to support docker live restore container 2016-06-13 23:48:00 -07:00
datastore Merge pull request #1206 from jimmycmh/master 2016-06-24 06:38:05 -07:00
discoverapi Update key handling logic to process keyring with 3 keys 2016-06-11 04:50:25 -07:00
docs Fixed missing v6 enable flag in macvlan doc 2016-06-22 19:59:55 -04:00
driverapi Add driver api enhancements for gossip 2016-04-18 19:55:39 -07:00
drivers ovmanager: Error out on vxlan id alloc failure 2016-06-28 13:46:22 -07:00
drvregistry Avoid persisting ipam data if it can be reconstructed 2016-05-12 10:27:10 -07:00
etchosts Fix file descriptor leaks 2016-07-01 16:29:51 -07:00
Godeps Update vishvananda/netlink 734d02c 2016-06-20 12:54:58 -07:00
hostdiscovery Use gofmt with -s instead of goimports 2016-02-12 14:07:00 +01:00
idm Fix some typos. 2016-02-29 19:20:50 +08:00
ipam IPAM allocator to not accept a datastore update if already present 2016-05-12 16:43:51 -07:00
ipamapi Avoid persisting ipam data if it can be reconstructed 2016-05-12 10:27:10 -07:00
ipams Avoid persisting ipam data if it can be reconstructed 2016-05-12 10:27:10 -07:00
ipamutils Fix cross compilation issues 2016-04-21 11:20:01 -07:00
iptables modprobe when needed 2016-03-21 16:35:28 -07:00
ipvs Make sure to close nshandle in ipvs.New 2016-06-13 15:09:02 -07:00
netlabel Add overlay manager driver 2016-04-14 10:37:42 -07:00
netutils Migrate libnetwork to use netlink.Handle 2016-06-08 21:05:36 -07:00
networkdb Do not bulk sync state which is getting deleted 2016-06-18 17:58:51 -07:00
ns Gracefully handle missing xfrm modules 2016-06-20 17:25:32 -07:00
options
osl Make sure route selected is direct 2016-06-23 16:23:47 -04:00
portallocator
portmapper Use gofmt with -s instead of goimports 2016-02-12 14:07:00 +01:00
resolvconf Remove all netlink/osl deps from ipam/ipamutils 2016-04-10 11:05:39 -07:00
test/integration Provide a way for libnetwork to make use of Agent mode functionalities 2016-06-05 18:41:21 -07:00
testutils Migrate libnetwork to use netlink.Handle 2016-06-08 21:05:36 -07:00
types Add support for encrypting gossip traffic 2016-06-04 03:55:14 -07:00
.dockerignore
.gitignore IPAM to run consistency check over its bitmasks 2016-01-14 08:26:14 -08:00
agent.go Add service alias support 2016-06-14 16:40:54 -07:00
agent.pb.go Add service alias support 2016-06-14 16:40:54 -07:00
agent.proto Add service alias support 2016-06-14 16:40:54 -07:00
CHANGELOG.md Changelog for 0.8.0-dev.2 2016-05-07 11:16:00 -07:00
circle.yml for fix CI tools/cmd/vet has been deleted 2016-05-24 17:41:41 +09:00
controller.go Do not add loadbalancer to unpopulated sandboxes 2016-06-15 19:58:33 -07:00
default_gateway.go Fix when connecting/disconnecting to/from default gw network 2016-04-06 09:29:41 -07:00
default_gateway_freebsd.go
default_gateway_linux.go Add support to accepting arbitrary network ID 2016-04-15 12:34:21 -07:00
default_gateway_solaris.go Get libnetwork to build on Solaris 2016-04-14 14:03:50 -07:00
default_gateway_windows.go
Dockerfile.build Switch to golang 1.5.4 2016-05-20 16:35:34 +02:00
drivers_experimental_linux.go Moving MacVlan driver out of experimental 2016-06-13 22:42:20 -07:00
drivers_freebsd.go
drivers_linux.go Moving MacVlan driver out of experimental 2016-06-13 22:42:20 -07:00
drivers_solaris.go Get libnetwork to build on Solaris 2016-04-14 14:03:50 -07:00
drivers_stub_linux.go Make macvlan and ipvlan drivers as experimental 2016-03-09 19:43:20 -05:00
drivers_windows.go Renaming driver name to lower case for usability and allowing portmapping to surface 2016-02-25 15:53:08 -08:00
endpoint.go Remove locator check on endpoint force removal 2016-06-22 18:34:30 -07:00
endpoint_cnt.go Fixing a possible endpoint_cnt state inconsistency issue 2016-03-15 21:07:42 -07:00
endpoint_info.go Add network restore to support docker live restore container 2016-06-13 23:48:00 -07:00
error.go Provide a way for libnetwork to make use of Agent mode functionalities 2016-06-05 18:41:21 -07:00
errors_test.go
libnetwork_internal_test.go Add support for SRV query in embedded DNS 2016-05-19 00:27:59 -07:00
libnetwork_test.go Add network restore to support docker live restore container 2016-06-13 23:48:00 -07:00
LICENSE
machines
MAINTAINERS Chen Chun as libnetwork maintainer 2016-02-22 09:26:08 -08:00
Makefile Use protobuf in networkdb core messages 2016-05-17 09:18:24 -07:00
network.go Make getSvcRecords() more robust 2016-06-17 18:51:57 -07:00
README.md Add support to accepting arbitrary network ID 2016-04-15 12:34:21 -07:00
resolver.go For cached connections ignore late replies after read timeout 2016-06-13 23:50:02 -07:00
resolver_unix.go Add network restore to support docker live restore container 2016-06-13 23:48:00 -07:00
resolver_windows.go Move the iptables setup for embedded DNS into a reexec process 2016-04-15 23:37:20 -07:00
ROADMAP.md fix typos 2016-05-30 18:20:52 +08:00
sandbox.go Do not add loadbalancer to unpopulated sandboxes 2016-06-15 19:58:33 -07:00
sandbox_dns_unix.go Fix file descriptor leaks 2016-07-01 16:29:51 -07:00
sandbox_dns_windows.go Add network restore to support docker live restore container 2016-06-13 23:48:00 -07:00
sandbox_externalkey.go
sandbox_externalkey_solaris.go Get libnetwork to build on Solaris 2016-04-14 14:03:50 -07:00
sandbox_externalkey_unix.go Fix file descriptor leaks 2016-07-01 16:29:51 -07:00
sandbox_externalkey_windows.go Fix netns path setting from hook 2016-03-16 07:57:27 -07:00
sandbox_store.go Do not add loadbalancer to unpopulated sandboxes 2016-06-15 19:58:33 -07:00
sandbox_test.go Do not allow network creation if datastore is missing 2016-05-12 16:36:54 -07:00
service.go Add ingress load balancer 2016-06-04 20:38:32 -07:00
service_linux.go Match only locally destined requests for ingress 2016-06-17 09:57:58 -07:00
service_unsupported.go Add service alias support 2016-06-14 16:40:54 -07:00
store.go Refresh special drivers networks if present in store 2016-06-14 21:50:58 -07:00
store_test.go Migrate libnetwork to use netlink.Handle 2016-06-08 21:05:36 -07:00
Vagrantfile
wrapmake.sh

libnetwork - networking for containers

Circle CI Coverage Status GoDoc

Libnetwork provides a native Go implementation for connecting containers

The goal of libnetwork is to deliver a robust Container Network Model that provides a consistent programming interface and the required network abstractions for applications.

Design

Please refer to the design for more information.

Using libnetwork

There are many networking solutions available to suit a broad range of use-cases. libnetwork uses a driver / plugin model to support all of these solutions while abstracting the complexity of the driver implementations by exposing a simple and consistent Network Model to users.

func main() {
	if reexec.Init() {
		return
	}

	// Select and configure the network driver
	networkType := "bridge"

	// Create a new controller instance
	driverOptions := options.Generic{}
	genericOption := make(map[string]interface{})
	genericOption[netlabel.GenericData] = driverOptions
	controller, err := libnetwork.New(config.OptionDriverConfig(networkType, genericOption))
	if err != nil {
		log.Fatalf("libnetwork.New: %s", err)
	}

	// Create a network for containers to join.
	// NewNetwork accepts Variadic optional arguments that libnetwork and Drivers can use.
	network, err := controller.NewNetwork(networkType, "network1", "")
	if err != nil {
		log.Fatalf("controller.NewNetwork: %s", err)
	}

	// For each new container: allocate IP and interfaces. The returned network
	// settings will be used for container infos (inspect and such), as well as
	// iptables rules for port publishing. This info is contained or accessible
	// from the returned endpoint.
	ep, err := network.CreateEndpoint("Endpoint1")
	if err != nil {
		log.Fatalf("network.CreateEndpoint: %s", err)
	}

	// Create the sandbox for the container.
	// NewSandbox accepts Variadic optional arguments which libnetwork can use.
	sbx, err := controller.NewSandbox("container1",
		libnetwork.OptionHostname("test"),
		libnetwork.OptionDomainname("docker.io"))
	if err != nil {
		log.Fatalf("controller.NewSandbox: %s", err)
	}

	// A sandbox can join the endpoint via the join api.
	err = ep.Join(sbx)
	if err != nil {
		log.Fatalf("ep.Join: %s", err)
	}

	// libnetwork client can check the endpoint's operational data via the Info() API
	epInfo, err := ep.DriverInfo()
	if err != nil {
		log.Fatalf("ep.DriverInfo: %s", err)
	}

	macAddress, ok := epInfo[netlabel.MacAddress]
	if !ok {
		log.Fatalf("failed to get mac address from endpoint info")
	}

	fmt.Printf("Joined endpoint %s (%s) to sandbox %s (%s)\n", ep.Name(), macAddress, sbx.ContainerID(), sbx.Key())
}

Future

Please refer to roadmap for more information.

Contributing

Want to hack on libnetwork? Docker's contributions guidelines apply.

Code and documentation copyright 2015 Docker, inc. Code released under the Apache 2.0 license. Docs released under Creative commons.