diff --git a/daemon/container_operations.go b/daemon/container_operations.go index 4c3d37468a..2e912cff6e 100644 --- a/daemon/container_operations.go +++ b/daemon/container_operations.go @@ -26,12 +26,9 @@ import ( "github.com/sirupsen/logrus" ) -var ( - // ErrRootFSReadOnly is returned when a container - // rootfs is marked readonly. - ErrRootFSReadOnly = errors.New("container rootfs is marked read-only") - getPortMapInfo = getSandboxPortMapInfo -) +// ErrRootFSReadOnly is returned when a container +// rootfs is marked readonly. +var ErrRootFSReadOnly = errors.New("container rootfs is marked read-only") func (daemon *Daemon) getDNSSearchSettings(container *container.Container) []string { if len(container.HostConfig.DNSSearch) > 0 { diff --git a/daemon/network.go b/daemon/network.go index 438d13d71a..3b4786bc3d 100644 --- a/daemon/network.go +++ b/daemon/network.go @@ -886,7 +886,7 @@ func buildCreateEndpointOptions(c *container.Container, n libnetwork.Network, ep } // Port-mapping rules belong to the container & applicable only to non-internal networks - portmaps := getSandboxPortMapInfo(sb) + portmaps := getPortMapInfo(sb) if n.Info().Internal() || len(portmaps) > 0 { return createOptions, nil } @@ -960,8 +960,8 @@ func buildCreateEndpointOptions(c *container.Container, n libnetwork.Network, ep return createOptions, nil } -// getSandboxPortMapInfo retrieves the current port-mapping programmed for the given sandbox -func getSandboxPortMapInfo(sb libnetwork.Sandbox) nat.PortMap { +// getPortMapInfo retrieves the current port-mapping programmed for the given sandbox +func getPortMapInfo(sb libnetwork.Sandbox) nat.PortMap { pm := nat.PortMap{} if sb == nil { return pm