-
Notifications
You must be signed in to change notification settings - Fork 270
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Manage the lifecycle of an (internal-only) bridge #2267
Comments
Hi
:) But I'd be down to review a PR for it, especially considering the safe guards around not trying to remove the bridge if it existed before the deploy command |
Checking and setup of the bridge should be simple via implementing the PreDeploy() func on the bridge node. |
What if we had a clean up stage that is called after the nodes destroy? Setup With a list of commands to run using teardown.commands and setup.commands |
I recently started using the
bridge
node kind to connect multiple nodes to the same access domain. In other words, I use the bridge to connect multiple containerlab nodes defined in the same topology, and not connect the bridge to any external or other interfaces on the host. The documentation states you're supposed to bring up the bridge yourself. This makes perfect sense when the bridge is connected to interfaces outside of control of containerlab - the user will need to set up those anyway. But for the use case where the bridge only connects to containerlab nodes (like in the br01 example), I feel it would make for a better user experience if containerlab attempts to take ownership of the entire lifecycle for the bridge.For instance, if a bridge node exists the topology, for the deploy and destroy commands:
WDYT? I am not super familiar with containerlab internals, but I am guessing these operations would need to be serialized before and after concurrently processing nodes?
The text was updated successfully, but these errors were encountered: