1
0
Fork 0
mirror of https://github.com/moby/moby.git synced 2022-11-09 12:21:53 -05:00
moby--moby/libnetwork
Madhu Venugopal ed9601e4c6 Make macvlan and ipvlan drivers as experimental
Signed-off-by: Madhu Venugopal <madhu@docker.com>
2016-03-09 19:43:20 -05:00
..
api Use gofmt with -s instead of goimports 2016-02-12 14:07:00 +01:00
bitseq Use gofmt with -s instead of goimports 2016-02-12 14:07:00 +01:00
client Don't allow passing EnableIPv6 as a driver option (a label) 2016-01-30 16:01:29 +00:00
cmd Use gofmt with -s instead of goimports 2016-02-12 14:07:00 +01:00
config Allow to pass global datastore config 2016-02-17 13:13:58 -08:00
datastore Allow to pass global datastore config 2016-02-17 13:13:58 -08:00
discoverapi Handle datastore update in Ipam and overlay drivers 2016-02-16 13:49:49 -08:00
docs Stop referring to requested IP address as "preferred", 2016-01-26 15:09:29 +00:00
driverapi Use gofmt with -s instead of goimports 2016-02-12 14:07:00 +01:00
drivers Make macvlan and ipvlan drivers as experimental 2016-03-09 19:43:20 -05:00
etchosts Use gofmt with -s instead of goimports 2016-02-12 14:07:00 +01:00
Godeps Windows HNS integration 2016-02-12 15:01:37 -08:00
hostdiscovery Use gofmt with -s instead of goimports 2016-02-12 14:07:00 +01:00
idm
ipam Handle datastore update in Ipam and overlay drivers 2016-02-16 13:49:49 -08:00
ipamapi Handle datastore update in Ipam and overlay drivers 2016-02-16 13:49:49 -08:00
ipams Fix cross compilation breakage 2016-02-17 16:35:11 -08:00
ipamutils
iptables Change in programming iptables in container 2016-02-05 15:25:43 -08:00
netlabel Handle datastore update in Ipam and overlay drivers 2016-02-16 13:49:49 -08:00
netutils Retain V6 DNS server in resolv.conf; use only V4 servers for fallback 2016-01-19 00:06:19 -08:00
ns
options
osl Delete the interface on endpoint delete in overlay 2016-01-29 16:04:14 -08:00
portallocator
portmapper Use gofmt with -s instead of goimports 2016-02-12 14:07:00 +01:00
resolvconf Retain V6 DNS server in resolv.conf; use only V4 servers for fallback 2016-01-19 00:06:19 -08:00
test/integration Reducing the complexity in default gateway service handling 2016-01-23 11:10:00 -08:00
testutils Fixed build tags for linux files 2016-02-17 11:45:51 -08:00
types
.dockerignore
.gitignore IPAM to run consistency check over its bitmasks 2016-01-14 08:26:14 -08:00
CHANGELOG.md changelog for v0.7.0-dev.3 2016-02-17 16:17:21 -08:00
circle.yml
controller.go Allow to pass global datastore config 2016-02-17 13:13:58 -08:00
default_gateway.go Handle concurrent creation of default GW network 2016-01-25 17:19:58 -08:00
default_gateway_freebsd.go
default_gateway_linux.go Don't allow passing EnableIPv6 as a driver option (a label) 2016-01-30 16:01:29 +00:00
default_gateway_windows.go
Dockerfile.build Use gofmt with -s instead of goimports 2016-02-12 14:07:00 +01:00
drivers.go Merge pull request #908 from aboch/dds 2016-02-17 15:19:39 -08:00
drivers_experimental_linux.go Make macvlan and ipvlan drivers as experimental 2016-03-09 19:43:20 -05:00
drivers_freebsd.go
drivers_linux.go Make macvlan and ipvlan drivers as experimental 2016-03-09 19:43:20 -05:00
drivers_stub_linux.go Make macvlan and ipvlan drivers as experimental 2016-03-09 19:43:20 -05:00
drivers_windows.go Windows HNS integration 2016-02-12 15:01:37 -08:00
endpoint.go Fix some races in getNetworkFromStore 2016-01-29 11:06:33 -08:00
endpoint_cnt.go
endpoint_info.go Force delete sandbox during sandboxCleanup 2016-01-17 14:47:49 -08:00
error.go
errors_test.go
libnetwork_internal_test.go Use gofmt with -s instead of goimports 2016-02-12 14:07:00 +01:00
libnetwork_test.go Use gofmt with -s instead of goimports 2016-02-12 14:07:00 +01:00
LICENSE
machines
MAINTAINERS Add Santhosh as libnetwork maintainer 2016-02-10 10:18:31 -08:00
Makefile Make macvlan and ipvlan drivers as experimental 2016-03-09 19:43:20 -05:00
network.go Use gofmt with -s instead of goimports 2016-02-12 14:07:00 +01:00
README.md Fix up example code 2015-12-23 11:47:14 -08:00
resolver.go Merge pull request #894 from sanimej/dns 2016-02-17 08:42:17 -08:00
ROADMAP.md
sandbox.go Windows HNS integration 2016-02-12 15:01:37 -08:00
sandbox_dns_unix.go Windows HNS integration 2016-02-12 15:01:37 -08:00
sandbox_dns_windows.go Windows HNS integration 2016-02-12 15:01:37 -08:00
sandbox_externalkey.go
sandbox_externalkey_unix.go Fixed build tags for linux files 2016-02-17 11:45:51 -08:00
sandbox_externalkey_windows.go
sandbox_store.go Force delete sandbox during sandboxCleanup 2016-01-17 14:47:49 -08:00
sandbox_test.go expose Endpoints API for a Sandbox 2016-01-25 16:23:00 -08:00
store.go Merge pull request #908 from aboch/dds 2016-02-17 15:19:39 -08:00
store_test.go
Vagrantfile
wrapmake.sh

libnetwork - networking for containers

Circle CI Coverage Status GoDoc

Libnetwork provides a native Go implementation for connecting containers

The goal of libnetwork is to deliver a robust Container Network Model that provides a consistent programming interface and the required network abstractions for applications.

Design

Please refer to the design for more information.

Using libnetwork

There are many networking solutions available to suit a broad range of use-cases. libnetwork uses a driver / plugin model to support all of these solutions while abstracting the complexity of the driver implementations by exposing a simple and consistent Network Model to users.

func main() {
	if reexec.Init() {
		return
	}

	// Select and configure the network driver
	networkType := "bridge"

	// Create a new controller instance
	driverOptions := options.Generic{}
	genericOption := make(map[string]interface{})
	genericOption[netlabel.GenericData] = driverOptions
	controller, err := libnetwork.New(config.OptionDriverConfig(networkType, genericOption))
	if err != nil {
		log.Fatalf("libnetwork.New: %s", err)
	}

	// Create a network for containers to join.
	// NewNetwork accepts Variadic optional arguments that libnetwork and Drivers can use.
	network, err := controller.NewNetwork(networkType, "network1")
	if err != nil {
		log.Fatalf("controller.NewNetwork: %s", err)
	}

	// For each new container: allocate IP and interfaces. The returned network
	// settings will be used for container infos (inspect and such), as well as
	// iptables rules for port publishing. This info is contained or accessible
	// from the returned endpoint.
	ep, err := network.CreateEndpoint("Endpoint1")
	if err != nil {
		log.Fatalf("network.CreateEndpoint: %s", err)
	}

	// Create the sandbox for the container.
	// NewSandbox accepts Variadic optional arguments which libnetwork can use.
	sbx, err := controller.NewSandbox("container1",
		libnetwork.OptionHostname("test"),
		libnetwork.OptionDomainname("docker.io"))
	if err != nil {
		log.Fatalf("controller.NewSandbox: %s", err)
	}

	// A sandbox can join the endpoint via the join api.
	err = ep.Join(sbx)
	if err != nil {
		log.Fatalf("ep.Join: %s", err)
	}

	// libnetwork client can check the endpoint's operational data via the Info() API
	epInfo, err := ep.DriverInfo()
	if err != nil {
		log.Fatalf("ep.DriverInfo: %s", err)
	}

	macAddress, ok := epInfo[netlabel.MacAddress]
	if !ok {
		log.Fatalf("failed to get mac address from endpoint info")
	}

	fmt.Printf("Joined endpoint %s (%s) to sandbox %s (%s)\n", ep.Name(), macAddress, sbx.ContainerID(), sbx.Key())
}

Future

Please refer to roadmap for more information.

Contributing

Want to hack on libnetwork? Docker's contributions guidelines apply.

Code and documentation copyright 2015 Docker, inc. Code released under the Apache 2.0 license. Docs released under Creative commons.