summaryrefslogtreecommitdiff
path: root/pkg/libcontainer/network/netns.go
diff options
context:
space:
mode:
Diffstat (limited to 'pkg/libcontainer/network/netns.go')
-rw-r--r--pkg/libcontainer/network/netns.go34
1 files changed, 34 insertions, 0 deletions
diff --git a/pkg/libcontainer/network/netns.go b/pkg/libcontainer/network/netns.go
new file mode 100644
index 0000000000..7e311f22d8
--- /dev/null
+++ b/pkg/libcontainer/network/netns.go
@@ -0,0 +1,34 @@
+package network
+
+import (
+ "fmt"
+ "os"
+ "syscall"
+
+ "github.com/dotcloud/docker/pkg/libcontainer"
+ "github.com/dotcloud/docker/pkg/system"
+)
+
+// crosbymichael: could make a network strategy that instead of returning veth pair names it returns a pid to an existing network namespace
+type NetNS struct {
+}
+
+func (v *NetNS) Create(n *libcontainer.Network, nspid int, context libcontainer.Context) error {
+ context["nspath"] = n.Context["nspath"]
+ return nil
+}
+
+func (v *NetNS) Initialize(config *libcontainer.Network, context libcontainer.Context) error {
+ nspath, exists := context["nspath"]
+ if !exists {
+ return fmt.Errorf("nspath does not exist in network context")
+ }
+ f, err := os.OpenFile(nspath, os.O_RDONLY, 0)
+ if err != nil {
+ return fmt.Errorf("failed get network namespace fd: %v", err)
+ }
+ if err := system.Setns(f.Fd(), syscall.CLONE_NEWNET); err != nil {
+ return fmt.Errorf("failed to setns current network namespace: %v", err)
+ }
+ return nil
+}