123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301 |
- /*
- Package libnetwork provides the basic functionality and extension points to
- create network namespaces and allocate interfaces for containers to use.
- // Create a new controller instance
- controller, _err := libnetwork.New()
- // Select and configure the network driver
- networkType := "bridge"
- driverOptions := options.Generic{}
- genericOption := make(map[string]interface{})
- genericOption[netlabel.GenericData] = driverOptions
- err := controller.ConfigureNetworkDriver(networkType, genericOption)
- if err != nil {
- return
- }
- // Create a network for containers to join.
- // NewNetwork accepts Variadic optional arguments that libnetwork and Drivers can make of
- network, err := controller.NewNetwork(networkType, "network1")
- if err != nil {
- return
- }
- // For each new container: allocate IP and interfaces. The returned network
- // settings will be used for container infos (inspect and such), as well as
- // iptables rules for port publishing. This info is contained or accessible
- // from the returned endpoint.
- ep, err := network.CreateEndpoint("Endpoint1")
- if err != nil {
- return
- }
- // A container can join the endpoint by providing the container ID to the join
- // api which returns the sandbox key which can be used to access the sandbox
- // created for the container during join.
- // Join acceps Variadic arguments which will be made use of by libnetwork and Drivers
- _, err = ep.Join("container1",
- libnetwork.JoinOptionHostname("test"),
- libnetwork.JoinOptionDomainname("docker.io"))
- if err != nil {
- return
- }
- */
- package libnetwork
- import (
- "sync"
- "github.com/docker/docker/pkg/plugins"
- "github.com/docker/docker/pkg/stringid"
- "github.com/docker/libnetwork/driverapi"
- "github.com/docker/libnetwork/sandbox"
- "github.com/docker/libnetwork/types"
- )
- // NetworkController provides the interface for controller instance which manages
- // networks.
- type NetworkController interface {
- // ConfigureNetworkDriver applies the passed options to the driver instance for the specified network type
- ConfigureNetworkDriver(networkType string, options map[string]interface{}) error
- // Create a new network. The options parameter carries network specific options.
- // Labels support will be added in the near future.
- NewNetwork(networkType, name string, options ...NetworkOption) (Network, error)
- // Networks returns the list of Network(s) managed by this controller.
- Networks() []Network
- // WalkNetworks uses the provided function to walk the Network(s) managed by this controller.
- WalkNetworks(walker NetworkWalker)
- // NetworkByName returns the Network which has the passed name. If not found, the error ErrNoSuchNetwork is returned.
- NetworkByName(name string) (Network, error)
- // NetworkByID returns the Network which has the passed id. If not found, the error ErrNoSuchNetwork is returned.
- NetworkByID(id string) (Network, error)
- }
- // NetworkWalker is a client provided function which will be used to walk the Networks.
- // When the function returns true, the walk will stop.
- type NetworkWalker func(nw Network) bool
- type sandboxData struct {
- sandbox sandbox.Sandbox
- refCnt int
- }
- type networkTable map[types.UUID]*network
- type endpointTable map[types.UUID]*endpoint
- type sandboxTable map[string]*sandboxData
- type controller struct {
- networks networkTable
- drivers driverTable
- sandboxes sandboxTable
- sync.Mutex
- }
- // New creates a new instance of network controller.
- func New() (NetworkController, error) {
- c := &controller{
- networks: networkTable{},
- sandboxes: sandboxTable{},
- drivers: driverTable{}}
- if err := initDrivers(c); err != nil {
- return nil, err
- }
- return c, nil
- }
- func (c *controller) ConfigureNetworkDriver(networkType string, options map[string]interface{}) error {
- c.Lock()
- d, ok := c.drivers[networkType]
- c.Unlock()
- if !ok {
- return NetworkTypeError(networkType)
- }
- return d.Config(options)
- }
- func (c *controller) RegisterDriver(networkType string, driver driverapi.Driver) error {
- c.Lock()
- defer c.Unlock()
- if _, ok := c.drivers[networkType]; ok {
- return driverapi.ErrActiveRegistration(networkType)
- }
- c.drivers[networkType] = driver
- return nil
- }
- // NewNetwork creates a new network of the specified network type. The options
- // are network specific and modeled in a generic way.
- func (c *controller) NewNetwork(networkType, name string, options ...NetworkOption) (Network, error) {
- if name == "" {
- return nil, ErrInvalidName(name)
- }
- // Check if a driver for the specified network type is available
- c.Lock()
- d, ok := c.drivers[networkType]
- c.Unlock()
- if !ok {
- var err error
- d, err = c.loadDriver(networkType)
- if err != nil {
- return nil, err
- }
- }
- // Check if a network already exists with the specified network name
- c.Lock()
- for _, n := range c.networks {
- if n.name == name {
- c.Unlock()
- return nil, NetworkNameError(name)
- }
- }
- c.Unlock()
- // Construct the network object
- network := &network{
- name: name,
- id: types.UUID(stringid.GenerateRandomID()),
- ctrlr: c,
- driver: d,
- endpoints: endpointTable{},
- }
- network.processOptions(options...)
- // Create the network
- if err := d.CreateNetwork(network.id, network.generic); err != nil {
- return nil, err
- }
- // Store the network handler in controller
- c.Lock()
- c.networks[network.id] = network
- c.Unlock()
- return network, nil
- }
- func (c *controller) Networks() []Network {
- c.Lock()
- defer c.Unlock()
- list := make([]Network, 0, len(c.networks))
- for _, n := range c.networks {
- list = append(list, n)
- }
- return list
- }
- func (c *controller) WalkNetworks(walker NetworkWalker) {
- for _, n := range c.Networks() {
- if walker(n) {
- return
- }
- }
- }
- func (c *controller) NetworkByName(name string) (Network, error) {
- if name == "" {
- return nil, ErrInvalidName(name)
- }
- var n Network
- s := func(current Network) bool {
- if current.Name() == name {
- n = current
- return true
- }
- return false
- }
- c.WalkNetworks(s)
- if n == nil {
- return nil, ErrNoSuchNetwork(name)
- }
- return n, nil
- }
- func (c *controller) NetworkByID(id string) (Network, error) {
- if id == "" {
- return nil, ErrInvalidID(id)
- }
- c.Lock()
- defer c.Unlock()
- if n, ok := c.networks[types.UUID(id)]; ok {
- return n, nil
- }
- return nil, ErrNoSuchNetwork(id)
- }
- func (c *controller) sandboxAdd(key string, create bool) (sandbox.Sandbox, error) {
- c.Lock()
- defer c.Unlock()
- sData, ok := c.sandboxes[key]
- if !ok {
- sb, err := sandbox.NewSandbox(key, create)
- if err != nil {
- return nil, err
- }
- sData = &sandboxData{sandbox: sb, refCnt: 1}
- c.sandboxes[key] = sData
- return sData.sandbox, nil
- }
- sData.refCnt++
- return sData.sandbox, nil
- }
- func (c *controller) sandboxRm(key string) {
- c.Lock()
- defer c.Unlock()
- sData := c.sandboxes[key]
- sData.refCnt--
- if sData.refCnt == 0 {
- sData.sandbox.Destroy()
- delete(c.sandboxes, key)
- }
- }
- func (c *controller) sandboxGet(key string) sandbox.Sandbox {
- c.Lock()
- defer c.Unlock()
- sData, ok := c.sandboxes[key]
- if !ok {
- return nil
- }
- return sData.sandbox
- }
- func (c *controller) loadDriver(networkType string) (driverapi.Driver, error) {
- // Plugins pkg performs lazy loading of plugins that acts as remote drivers.
- // As per the design, this Get call will result in remote driver discovery if there is a corresponding plugin available.
- _, err := plugins.Get(networkType, driverapi.NetworkPluginEndpointType)
- if err != nil {
- if err == plugins.ErrNotFound {
- return nil, types.NotFoundErrorf(err.Error())
- }
- return nil, err
- }
- c.Lock()
- defer c.Unlock()
- d, ok := c.drivers[networkType]
- if !ok {
- return nil, ErrInvalidNetworkDriver(networkType)
- }
- return d, nil
- }
|