1
0
Fork 0
mirror of https://github.com/moby/moby.git synced 2022-11-09 12:21:53 -05:00
moby--moby/libnetwork
Alessandro Boch cea4dd457c Do not allow overlay destroySandbox() to be interrupted
- Concurrent leave/join of one member overlay network can end with the error:
  "subnet sandbox join failed for "A.B.C.D/MM": error creating vxlan interface: file exists"
  This happens when the join is processed while the leave has already started.
  Having the network one member only, the leave resets the once variable for this network subnets
  and triggers the sandbox destroy for each subnet's vxlan interface, when the n.joinCnt goes to 0.
  But given the destroySandbox() is not atomic, the join thread can trigger the creation of the
  vxlan interface in between (given subnet.once was re-initialized) before the leave thread
  removes the vxlan interface for this subnet.
- The fix is to not allow interruptions between the re-initialization of the subnet.once var and
  consequent vxlan interface removal.

Signed-off-by: Alessandro Boch <aboch@docker.com>
2016-03-30 16:53:34 -07:00
..
api Move exposed ports from Endpoint to Sandbox 2016-03-06 09:31:26 -08:00
bitseq Fix some typos in comments and strings 2016-03-01 16:45:14 +01:00
client Move exposed ports from Endpoint to Sandbox 2016-03-06 09:31:26 -08:00
cmd Use gofmt with -s instead of goimports 2016-02-12 14:07:00 +01:00
config Allow to pass global datastore config 2016-02-17 13:13:58 -08:00
datastore Fix some typos. 2016-02-29 19:20:50 +08:00
discoverapi Fix some typos. 2016-02-29 19:20:50 +08:00
docs Fix IPAM driver documentation 2016-03-02 15:56:46 -08:00
driverapi Move exposed ports from Endpoint to Sandbox 2016-03-06 09:31:26 -08:00
drivers Do not allow overlay destroySandbox() to be interrupted 2016-03-30 16:53:34 -07:00
etchosts Fix out of bound slice access in Delete() 2016-03-06 10:03:03 -08:00
Godeps Fixing support for static mac and updating dependencies 2016-03-16 11:07:20 -07:00
hostdiscovery Use gofmt with -s instead of goimports 2016-02-12 14:07:00 +01:00
idm Fix some typos. 2016-02-29 19:20:50 +08:00
ipam Fix some typos. 2016-02-29 19:20:50 +08:00
ipamapi Add nil ipam driver 2016-03-02 10:55:38 +07:00
ipams Fixing support for static mac and updating dependencies 2016-03-16 11:07:20 -07:00
ipamutils Allow libnetwork to compile on freebsd 2015-11-26 10:10:09 -05:00
iptables modprobe when needed 2016-03-21 16:35:28 -07:00
netlabel Handle datastore update in Ipam and overlay drivers 2016-02-16 13:49:49 -08:00
netutils Retain V6 DNS server in resolv.conf; use only V4 servers for fallback 2016-01-19 00:06:19 -08:00
ns Move test specific functions to a testutils package. 2015-09-07 13:33:28 -04:00
options Move test specific functions to a testutils package. 2015-09-07 13:33:28 -04:00
osl Format network address using %v instead of %p 2016-03-16 17:23:13 -04:00
portallocator Move test specific functions to a testutils package. 2015-09-07 13:33:28 -04:00
portmapper Use gofmt with -s instead of goimports 2016-02-12 14:07:00 +01:00
resolvconf Retain V6 DNS server in resolv.conf; use only V4 servers for fallback 2016-01-19 00:06:19 -08:00
test/integration Fix some typos in comments and strings 2016-03-01 16:45:14 +01:00
testutils Fixed build tags for linux files 2016-02-17 11:45:51 -08:00
types Fix some typos. 2016-02-29 19:20:50 +08:00
.dockerignore Multi-Arch Support 2015-11-25 22:47:41 +00:00
.gitignore IPAM to run consistency check over its bitmasks 2016-01-14 08:26:14 -08:00
CHANGELOG.md Changelog for v0.7.0-dev.10 2016-03-19 07:05:45 -07:00
circle.yml Multi-Arch Support 2015-11-25 22:47:41 +00:00
controller.go Reload config should initialize only the appropriate datastore 2016-03-25 01:10:03 -07:00
default_gateway.go Move exposed ports from Endpoint to Sandbox 2016-03-06 09:31:26 -08:00
default_gateway_freebsd.go Made use of map[string]string for nw options in default-gateway impl 2015-10-12 15:28:28 -07:00
default_gateway_linux.go Don't allow passing EnableIPv6 as a driver option (a label) 2016-01-30 16:01:29 +00:00
default_gateway_windows.go Made use of map[string]string for nw options in default-gateway impl 2015-10-12 15:28:28 -07:00
Dockerfile.build Fix CI 2016-03-18 14:49:57 -07:00
drivers.go Add nil ipam driver 2016-03-02 10:55:38 +07:00
drivers_experimental_linux.go Make macvlan and ipvlan drivers as experimental 2016-03-09 19:43:20 -05:00
drivers_freebsd.go Push driver config during Init 2015-09-19 08:43:34 -07:00
drivers_linux.go Make macvlan and ipvlan drivers as experimental 2016-03-09 19:43:20 -05:00
drivers_stub_linux.go Make macvlan and ipvlan drivers as experimental 2016-03-09 19:43:20 -05:00
drivers_windows.go Renaming driver name to lower case for usability and allowing portmapping to surface 2016-02-25 15:53:08 -08:00
endpoint.go On network disconnect clear the cached connections to external 2016-03-20 05:00:58 -07:00
endpoint_cnt.go Fixing a possible endpoint_cnt state inconsistency issue 2016-03-15 21:07:42 -07:00
endpoint_info.go Force delete sandbox during sandboxCleanup 2016-01-17 14:47:49 -08:00
error.go Fixed a couple of error messages to address UX related comments 2015-10-09 01:45:24 -07:00
errors_test.go Provide interface to categorize errors 2015-05-20 22:29:29 -07:00
libnetwork_internal_test.go Move exposed ports from Endpoint to Sandbox 2016-03-06 09:31:26 -08:00
libnetwork_test.go Avoid V6 queries in docker domain going to external nameservers 2016-03-19 03:07:08 -07:00
LICENSE Initial commit 2015-02-19 17:20:15 -08:00
machines Use Docker Machine for Test Environments 2015-11-10 21:47:59 +00:00
MAINTAINERS Chen Chun as libnetwork maintainer 2016-02-22 09:26:08 -08:00
Makefile Make macvlan and ipvlan drivers as experimental 2016-03-09 19:43:20 -05:00
network.go Merge pull request #870 from sanimej/bugs 2016-03-20 10:20:53 -07:00
README.md Fix up example code 2015-12-23 11:47:14 -08:00
resolver.go Limit number of concurrent DNS queries 2016-03-29 06:23:01 -07:00
ROADMAP.md Update ROADMAP.md 2015-06-09 15:06:02 -07:00
sandbox.go Log time taken to set sandbox key 2016-03-28 20:40:51 -07:00
sandbox_dns_unix.go Windows HNS integration 2016-02-12 15:01:37 -08:00
sandbox_dns_windows.go Windows HNS integration 2016-02-12 15:01:37 -08:00
sandbox_externalkey.go sandbox_externalkey.go: split for cross compilation 2015-11-26 00:18:27 +01:00
sandbox_externalkey_unix.go Fix netns path setting from hook 2016-03-16 07:57:27 -07:00
sandbox_externalkey_windows.go Fix netns path setting from hook 2016-03-16 07:57:27 -07:00
sandbox_store.go Log stale resource cleanup 2016-03-16 11:57:19 -07:00
sandbox_test.go expose Endpoints API for a Sandbox 2016-01-25 16:23:00 -08:00
store.go Reload config should initialize only the appropriate datastore 2016-03-25 01:10:03 -07:00
store_test.go Add customer_prefix to the store URL for integration test 2015-10-26 17:48:52 +08:00
Vagrantfile Fixed Vagrantfile to use systemd script 2015-10-16 05:03:47 -07:00
wrapmake.sh Allow tests to be interrupted 2015-09-01 21:48:09 -07:00

libnetwork - networking for containers

Circle CI Coverage Status GoDoc

Libnetwork provides a native Go implementation for connecting containers

The goal of libnetwork is to deliver a robust Container Network Model that provides a consistent programming interface and the required network abstractions for applications.

Design

Please refer to the design for more information.

Using libnetwork

There are many networking solutions available to suit a broad range of use-cases. libnetwork uses a driver / plugin model to support all of these solutions while abstracting the complexity of the driver implementations by exposing a simple and consistent Network Model to users.

func main() {
	if reexec.Init() {
		return
	}

	// Select and configure the network driver
	networkType := "bridge"

	// Create a new controller instance
	driverOptions := options.Generic{}
	genericOption := make(map[string]interface{})
	genericOption[netlabel.GenericData] = driverOptions
	controller, err := libnetwork.New(config.OptionDriverConfig(networkType, genericOption))
	if err != nil {
		log.Fatalf("libnetwork.New: %s", err)
	}

	// Create a network for containers to join.
	// NewNetwork accepts Variadic optional arguments that libnetwork and Drivers can use.
	network, err := controller.NewNetwork(networkType, "network1")
	if err != nil {
		log.Fatalf("controller.NewNetwork: %s", err)
	}

	// For each new container: allocate IP and interfaces. The returned network
	// settings will be used for container infos (inspect and such), as well as
	// iptables rules for port publishing. This info is contained or accessible
	// from the returned endpoint.
	ep, err := network.CreateEndpoint("Endpoint1")
	if err != nil {
		log.Fatalf("network.CreateEndpoint: %s", err)
	}

	// Create the sandbox for the container.
	// NewSandbox accepts Variadic optional arguments which libnetwork can use.
	sbx, err := controller.NewSandbox("container1",
		libnetwork.OptionHostname("test"),
		libnetwork.OptionDomainname("docker.io"))
	if err != nil {
		log.Fatalf("controller.NewSandbox: %s", err)
	}

	// A sandbox can join the endpoint via the join api.
	err = ep.Join(sbx)
	if err != nil {
		log.Fatalf("ep.Join: %s", err)
	}

	// libnetwork client can check the endpoint's operational data via the Info() API
	epInfo, err := ep.DriverInfo()
	if err != nil {
		log.Fatalf("ep.DriverInfo: %s", err)
	}

	macAddress, ok := epInfo[netlabel.MacAddress]
	if !ok {
		log.Fatalf("failed to get mac address from endpoint info")
	}

	fmt.Printf("Joined endpoint %s (%s) to sandbox %s (%s)\n", ep.Name(), macAddress, sbx.ContainerID(), sbx.Key())
}

Future

Please refer to roadmap for more information.

Contributing

Want to hack on libnetwork? Docker's contributions guidelines apply.

Code and documentation copyright 2015 Docker, inc. Code released under the Apache 2.0 license. Docs released under Creative commons.