1
0
Fork 0
mirror of https://github.com/moby/moby.git synced 2022-11-09 12:21:53 -05:00
moby--moby/libnetwork
Pavel Matěja e2b2318e14 Macvlan internal network shouldln't change gw
Since docker container can be connected to combination of several
internal and external networks change of default gateway of the internal
ones breaks communication via the external ones.

This fixes only macvlan network type

Signed-off-by: Pavel Matěja <pavel@verotel.cz>
2019-06-26 14:23:51 +02:00
..
.circleci Build with latest docker stable engine 2018-12-10 08:36:52 -08:00
api
bitseq doc: fix typo 2018-09-07 11:48:15 +08:00
client Spelling fixes 2018-07-12 12:54:44 -07:00
cluster
cmd Update sctp package 2019-06-24 17:26:33 +02:00
config allow propagating custom exec-root (e.g. "/run/docker") to libnetwork-setkey 2018-09-14 14:09:09 +09:00
datastore Spelling fixes 2018-07-12 12:54:44 -07:00
diagnostic doc: fix typo 2018-09-07 11:48:15 +08:00
discoverapi
docs Merge pull request #1723 from sebradloff/patch-1 2019-06-25 15:09:04 +01:00
driverapi Spelling fixes 2018-07-12 12:54:44 -07:00
drivers Macvlan internal network shouldln't change gw 2019-06-26 14:23:51 +02:00
drvregistry Spelling fixes 2018-07-12 12:54:44 -07:00
etchosts
hostdiscovery
idm
internal Create internal directory 2018-07-16 17:34:20 -07:00
ipam typo fix about mismatch 2018-09-27 20:43:13 +08:00
ipamapi
ipams Global Default Address Pool support 2018-08-16 11:28:24 -04:00
ipamutils Add getter function for Default Address Pools 2018-08-16 15:48:42 -04:00
iptables Revert "debian has iptables-legacy and iptables-nft now" 2019-03-01 11:50:47 -08:00
ipvs Bump vishvananda/netlink to 1.0.0 2019-06-24 14:56:49 +02:00
netlabel
netutils Use errors.Wrap to preserve original error 2019-04-01 20:14:54 +02:00
networkdb Merge pull request #2238 from talex5/networkdb-docs 2019-03-14 16:05:31 -07:00
ns Add init_windows.go for compilation 2018-09-13 09:20:03 -07:00
options
osl Set east-west load balancing to use direct routing 2018-10-11 14:13:19 -04:00
portallocator Pick a random host port if the user does not specify a host port. 2019-04-22 17:43:27 +00:00
portmapper Update sctp package 2019-06-24 17:26:33 +02:00
resolvconf resolvconf: use /run/systemd/resolve/resolv.conf if systemd-resolved manages DNS 2019-06-04 04:50:37 +00:00
support add check on node LB in support.sh 2019-05-07 16:45:01 +08:00
test/integration doc: fix typo 2018-09-07 11:48:15 +08:00
testutils
types Update sctp package 2019-06-24 17:26:33 +02:00
vendor Update sctp package 2019-06-24 17:26:33 +02:00
.dockerignore Added back dockerignore 2018-06-22 16:10:22 -07:00
.gitignore Added back dockerignore 2018-06-22 16:10:22 -07:00
agent.go Cleanup the cluster provider when the agent is closed 2019-01-25 08:36:28 -08:00
agent.pb.go
agent.proto
CHANGELOG.md Spelling fixes 2018-07-12 12:54:44 -07:00
controller.go controller.loadIPAMDriver: Unwrap error type returned by PluginGetter 2019-06-24 16:40:51 +02:00
default_gateway.go Fix gosimple 2019-01-03 15:25:37 -08:00
default_gateway_freebsd.go
default_gateway_linux.go
default_gateway_windows.go
Dockerfile remove gosimple - package is gone and it's not important 2019-06-04 04:50:37 +00:00
drivers_freebsd.go
drivers_ipam.go
drivers_linux.go Removing experimental driver interface 2018-09-25 10:30:56 -07:00
drivers_windows.go
endpoint.go Add endpoint load-balancing mode 2018-06-28 12:08:18 -04:00
endpoint_cnt.go
endpoint_info.go Add SrcName() method to return interface name 2018-06-28 12:08:18 -04:00
endpoint_info_unix.go
endpoint_info_windows.go
error.go
errors_test.go
firewall_linux.go Move hasIPTablesEnabled check into firewall_linux.go 2019-04-29 13:51:15 +01:00
firewall_others.go
libnetwork_internal_test.go Create internal directory 2018-07-16 17:34:20 -07:00
libnetwork_linux_test.go Fix handling of the resolv.conf 2018-07-24 10:18:10 -07:00
libnetwork_test.go Add Delete endpoint for plugin in test 2019-05-23 14:55:29 +02:00
LICENSE
machines
MAINTAINERS Maintainers update 2019-06-21 14:27:00 -07:00
Makefile remove gosimple - package is gone and it's not important 2019-06-04 04:50:37 +00:00
network.go Make DNS records and queries case-insensitive 2019-06-19 11:23:31 -07:00
network_unix.go
network_windows.go
README.md road map loss tracing, just keep use 'Design' describe the 'Future' 2019-06-25 22:06:30 +08:00
resolver.go Make DNS records and queries case-insensitive 2019-06-19 11:23:31 -07:00
resolver_test.go Make DNS records and queries case-insensitive 2019-06-19 11:23:31 -07:00
resolver_unix.go Rolling back the port configs if failed to programIngress() 2018-09-11 19:10:59 +08:00
resolver_windows.go
sandbox.go Make DSR an overlay-specific driver "option" 2018-10-11 14:13:19 -04:00
sandbox_dns_unix.go resolvconf: use /run/systemd/resolve/resolv.conf if systemd-resolved manages DNS 2019-06-04 04:50:37 +00:00
sandbox_dns_windows.go
sandbox_externalkey.go
sandbox_externalkey_unix.go account for removal of configs.HookState 2018-12-07 01:47:05 +00:00
sandbox_externalkey_windows.go
sandbox_store.go Use fmt precision to limit string length 2018-07-05 17:44:04 -04:00
sandbox_test.go
service.go Create internal directory 2018-07-16 17:34:20 -07:00
service_common.go Do not add IP to Name records for aliases 2018-11-10 20:53:06 +02:00
service_common_test.go Migrate to gotest.tools :) 2018-07-06 11:01:37 -07:00
service_linux.go Make DSR an overlay-specific driver "option" 2018-10-11 14:13:19 -04:00
service_unsupported.go Add endpoint load-balancing mode 2018-06-28 12:08:18 -04:00
service_windows.go Add endpoint load-balancing mode 2018-06-28 12:08:18 -04:00
store.go Add option processing to network.Delete() 2018-06-28 12:08:12 -04:00
store_linux_test.go
store_test.go
Vagrantfile
vendor.conf Update sctp package 2019-06-24 17:26:33 +02:00

libnetwork - networking for containers

Circle CI Coverage Status GoDoc Go Report Card

Libnetwork provides a native Go implementation for connecting containers

The goal of libnetwork is to deliver a robust Container Network Model that provides a consistent programming interface and the required network abstractions for applications.

Design

Please refer to the design for more information.

Using libnetwork

There are many networking solutions available to suit a broad range of use-cases. libnetwork uses a driver / plugin model to support all of these solutions while abstracting the complexity of the driver implementations by exposing a simple and consistent Network Model to users.

import (
	"fmt"
	"log"

	"github.com/docker/docker/pkg/reexec"
	"github.com/docker/libnetwork"
	"github.com/docker/libnetwork/config"
	"github.com/docker/libnetwork/netlabel"
	"github.com/docker/libnetwork/options"
)

func main() {
	if reexec.Init() {
		return
	}

	// Select and configure the network driver
	networkType := "bridge"

	// Create a new controller instance
	driverOptions := options.Generic{}
	genericOption := make(map[string]interface{})
	genericOption[netlabel.GenericData] = driverOptions
	controller, err := libnetwork.New(config.OptionDriverConfig(networkType, genericOption))
	if err != nil {
		log.Fatalf("libnetwork.New: %s", err)
	}

	// Create a network for containers to join.
	// NewNetwork accepts Variadic optional arguments that libnetwork and Drivers can use.
	network, err := controller.NewNetwork(networkType, "network1", "")
	if err != nil {
		log.Fatalf("controller.NewNetwork: %s", err)
	}

	// For each new container: allocate IP and interfaces. The returned network
	// settings will be used for container infos (inspect and such), as well as
	// iptables rules for port publishing. This info is contained or accessible
	// from the returned endpoint.
	ep, err := network.CreateEndpoint("Endpoint1")
	if err != nil {
		log.Fatalf("network.CreateEndpoint: %s", err)
	}

	// Create the sandbox for the container.
	// NewSandbox accepts Variadic optional arguments which libnetwork can use.
	sbx, err := controller.NewSandbox("container1",
		libnetwork.OptionHostname("test"),
		libnetwork.OptionDomainname("docker.io"))
	if err != nil {
		log.Fatalf("controller.NewSandbox: %s", err)
	}

	// A sandbox can join the endpoint via the join api.
	err = ep.Join(sbx)
	if err != nil {
		log.Fatalf("ep.Join: %s", err)
	}

	// libnetwork client can check the endpoint's operational data via the Info() API
	epInfo, err := ep.DriverInfo()
	if err != nil {
		log.Fatalf("ep.DriverInfo: %s", err)
	}

	macAddress, ok := epInfo[netlabel.MacAddress]
	if !ok {
		log.Fatalf("failed to get mac address from endpoint info")
	}

	fmt.Printf("Joined endpoint %s (%s) to sandbox %s (%s)\n", ep.Name(), macAddress, sbx.ContainerID(), sbx.Key())
}

Contributing

Want to hack on libnetwork? Docker's contributions guidelines apply.

Code and documentation copyright 2015 Docker, inc. Code released under the Apache 2.0 license. Docs released under Creative commons.