moby/libnetwork
Alessandro Boch a5aeffcb59 Fix when connecting/disconnecting to/from default gw network
- Restoring original behavior where on disconnect
  from overlay network (only connected network), it also
  disconnects from default gw network.
- On sandbox delete, the leave and delete of each
  endpoint is performed, regardless of whether the endpoint
  is the gw network endpoint. This endpoint is already
  automatically removed in endpoint.sbLeave()
- Also do not let internal network dictate container does
  not need external connectivity. Before this fix, if a container
  was connected to an overlay and an internal network, it may not
  get attached to the default gw network.

Signed-off-by: Alessandro Boch <aboch@docker.com>
2016-04-06 09:29:41 -07:00
..
api Move exposed ports from Endpoint to Sandbox 2016-03-06 09:31:26 -08:00
bitseq Fix some typos in comments and strings 2016-03-01 16:45:14 +01:00
client Move exposed ports from Endpoint to Sandbox 2016-03-06 09:31:26 -08:00
cmd Use gofmt with -s instead of goimports 2016-02-12 14:07:00 +01:00
config Allow to pass global datastore config 2016-02-17 13:13:58 -08:00
datastore Fix some typos. 2016-02-29 19:20:50 +08:00
discoverapi Fix some typos. 2016-02-29 19:20:50 +08:00
docs Fix IPAM driver documentation 2016-03-02 15:56:46 -08:00
driverapi Move exposed ports from Endpoint to Sandbox 2016-03-06 09:31:26 -08:00
drivers Bridge driver needs to store the network config internal flag 2016-04-05 17:07:49 -07:00
etchosts Fix out of bound slice access in Delete() 2016-03-06 10:03:03 -08:00
Godeps Fixing support for static mac and updating dependencies 2016-03-16 11:07:20 -07:00
hostdiscovery Use gofmt with -s instead of goimports 2016-02-12 14:07:00 +01:00
idm Fix some typos. 2016-02-29 19:20:50 +08:00
ipam Remove pre-defined networks from package init 2016-04-04 15:25:29 -04:00
ipamapi Add nil ipam driver 2016-03-02 10:55:38 +07:00
ipams Remove pre-defined networks from package init 2016-04-04 15:25:29 -04:00
ipamutils Remove pre-defined networks from package init 2016-04-04 15:25:29 -04:00
iptables modprobe when needed 2016-03-21 16:35:28 -07:00
netlabel Handle datastore update in Ipam and overlay drivers 2016-02-16 13:49:49 -08:00
netutils Retain V6 DNS server in resolv.conf; use only V4 servers for fallback 2016-01-19 00:06:19 -08:00
ns Move test specific functions to a testutils package. 2015-09-07 13:33:28 -04:00
options Move test specific functions to a testutils package. 2015-09-07 13:33:28 -04:00
osl Format network address using %v instead of %p 2016-03-16 17:23:13 -04:00
portallocator Move test specific functions to a testutils package. 2015-09-07 13:33:28 -04:00
portmapper Use gofmt with -s instead of goimports 2016-02-12 14:07:00 +01:00
resolvconf Retain V6 DNS server in resolv.conf; use only V4 servers for fallback 2016-01-19 00:06:19 -08:00
test/integration Fix when connecting/disconnecting to/from default gw network 2016-04-06 09:29:41 -07:00
testutils Fixed build tags for linux files 2016-02-17 11:45:51 -08:00
types Fix some typos. 2016-02-29 19:20:50 +08:00
.dockerignore Multi-Arch Support 2015-11-25 22:47:41 +00:00
.gitignore IPAM to run consistency check over its bitmasks 2016-01-14 08:26:14 -08:00
CHANGELOG.md Changelog for v0.7.0-dev.10 2016-03-19 07:05:45 -07:00
circle.yml Multi-Arch Support 2015-11-25 22:47:41 +00:00
controller.go Reload config should initialize only the appropriate datastore 2016-03-25 01:10:03 -07:00
default_gateway.go Fix when connecting/disconnecting to/from default gw network 2016-04-06 09:29:41 -07:00
default_gateway_freebsd.go Made use of map[string]string for nw options in default-gateway impl 2015-10-12 15:28:28 -07:00
default_gateway_linux.go Don't allow passing EnableIPv6 as a driver option (a label) 2016-01-30 16:01:29 +00:00
default_gateway_windows.go Made use of map[string]string for nw options in default-gateway impl 2015-10-12 15:28:28 -07:00
Dockerfile.build Fix CI 2016-03-18 14:49:57 -07:00
drivers.go Add nil ipam driver 2016-03-02 10:55:38 +07:00
drivers_experimental_linux.go Make macvlan and ipvlan drivers as experimental 2016-03-09 19:43:20 -05:00
drivers_freebsd.go Push driver config during Init 2015-09-19 08:43:34 -07:00
drivers_linux.go Make macvlan and ipvlan drivers as experimental 2016-03-09 19:43:20 -05:00
drivers_stub_linux.go Make macvlan and ipvlan drivers as experimental 2016-03-09 19:43:20 -05:00
drivers_windows.go Renaming driver name to lower case for usability and allowing portmapping to surface 2016-02-25 15:53:08 -08:00
endpoint.go Fix when connecting/disconnecting to/from default gw network 2016-04-06 09:29:41 -07:00
endpoint_cnt.go Fixing a possible endpoint_cnt state inconsistency issue 2016-03-15 21:07:42 -07:00
endpoint_info.go Force delete sandbox during sandboxCleanup 2016-01-17 14:47:49 -08:00
error.go Fixed a couple of error messages to address UX related comments 2015-10-09 01:45:24 -07:00
errors_test.go Provide interface to categorize errors 2015-05-20 22:29:29 -07:00
libnetwork_internal_test.go Move exposed ports from Endpoint to Sandbox 2016-03-06 09:31:26 -08:00
libnetwork_test.go Avoid V6 queries in docker domain going to external nameservers 2016-03-19 03:07:08 -07:00
LICENSE Initial commit 2015-02-19 17:20:15 -08:00
machines Use Docker Machine for Test Environments 2015-11-10 21:47:59 +00:00
MAINTAINERS Chen Chun as libnetwork maintainer 2016-02-22 09:26:08 -08:00
Makefile Make macvlan and ipvlan drivers as experimental 2016-03-09 19:43:20 -05:00
network.go Merge pull request #870 from sanimej/bugs 2016-03-20 10:20:53 -07:00
README.md Fix up example code 2015-12-23 11:47:14 -08:00
resolver.go Fix the handling for concurrent queries over UDP 2016-04-01 10:45:24 -07:00
ROADMAP.md Update ROADMAP.md 2015-06-09 15:06:02 -07:00
sandbox.go Fix when connecting/disconnecting to/from default gw network 2016-04-06 09:29:41 -07:00
sandbox_dns_unix.go Windows HNS integration 2016-02-12 15:01:37 -08:00
sandbox_dns_windows.go Windows HNS integration 2016-02-12 15:01:37 -08:00
sandbox_externalkey.go sandbox_externalkey.go: split for cross compilation 2015-11-26 00:18:27 +01:00
sandbox_externalkey_unix.go Fix netns path setting from hook 2016-03-16 07:57:27 -07:00
sandbox_externalkey_windows.go Fix netns path setting from hook 2016-03-16 07:57:27 -07:00
sandbox_store.go Log stale resource cleanup 2016-03-16 11:57:19 -07:00
sandbox_test.go expose Endpoints API for a Sandbox 2016-01-25 16:23:00 -08:00
store.go Reload config should initialize only the appropriate datastore 2016-03-25 01:10:03 -07:00
store_test.go Add customer_prefix to the store URL for integration test 2015-10-26 17:48:52 +08:00
Vagrantfile Fixed Vagrantfile to use systemd script 2015-10-16 05:03:47 -07:00
wrapmake.sh Allow tests to be interrupted 2015-09-01 21:48:09 -07:00

libnetwork - networking for containers

Circle CI Coverage Status GoDoc

Libnetwork provides a native Go implementation for connecting containers

The goal of libnetwork is to deliver a robust Container Network Model that provides a consistent programming interface and the required network abstractions for applications.

Design

Please refer to the design for more information.

Using libnetwork

There are many networking solutions available to suit a broad range of use-cases. libnetwork uses a driver / plugin model to support all of these solutions while abstracting the complexity of the driver implementations by exposing a simple and consistent Network Model to users.

func main() {
	if reexec.Init() {
		return
	}

	// Select and configure the network driver
	networkType := "bridge"

	// Create a new controller instance
	driverOptions := options.Generic{}
	genericOption := make(map[string]interface{})
	genericOption[netlabel.GenericData] = driverOptions
	controller, err := libnetwork.New(config.OptionDriverConfig(networkType, genericOption))
	if err != nil {
		log.Fatalf("libnetwork.New: %s", err)
	}

	// Create a network for containers to join.
	// NewNetwork accepts Variadic optional arguments that libnetwork and Drivers can use.
	network, err := controller.NewNetwork(networkType, "network1")
	if err != nil {
		log.Fatalf("controller.NewNetwork: %s", err)
	}

	// For each new container: allocate IP and interfaces. The returned network
	// settings will be used for container infos (inspect and such), as well as
	// iptables rules for port publishing. This info is contained or accessible
	// from the returned endpoint.
	ep, err := network.CreateEndpoint("Endpoint1")
	if err != nil {
		log.Fatalf("network.CreateEndpoint: %s", err)
	}

	// Create the sandbox for the container.
	// NewSandbox accepts Variadic optional arguments which libnetwork can use.
	sbx, err := controller.NewSandbox("container1",
		libnetwork.OptionHostname("test"),
		libnetwork.OptionDomainname("docker.io"))
	if err != nil {
		log.Fatalf("controller.NewSandbox: %s", err)
	}

	// A sandbox can join the endpoint via the join api.
	err = ep.Join(sbx)
	if err != nil {
		log.Fatalf("ep.Join: %s", err)
	}

	// libnetwork client can check the endpoint's operational data via the Info() API
	epInfo, err := ep.DriverInfo()
	if err != nil {
		log.Fatalf("ep.DriverInfo: %s", err)
	}

	macAddress, ok := epInfo[netlabel.MacAddress]
	if !ok {
		log.Fatalf("failed to get mac address from endpoint info")
	}

	fmt.Printf("Joined endpoint %s (%s) to sandbox %s (%s)\n", ep.Name(), macAddress, sbx.ContainerID(), sbx.Key())
}

Future

Please refer to roadmap for more information.

Contributing

Want to hack on libnetwork? Docker's contributions guidelines apply.

Code and documentation copyright 2015 Docker, inc. Code released under the Apache 2.0 license. Docs released under Creative commons.