|
@@ -1,36 +1,39 @@
|
|
|
-package runtime
|
|
|
+package daemon
|
|
|
|
|
|
import (
|
|
|
"container/list"
|
|
|
"fmt"
|
|
|
+ "io"
|
|
|
+ "io/ioutil"
|
|
|
+ "log"
|
|
|
+ "os"
|
|
|
+ "path"
|
|
|
+ "regexp"
|
|
|
+ "strings"
|
|
|
+ "sync"
|
|
|
+ "time"
|
|
|
+
|
|
|
"github.com/dotcloud/docker/archive"
|
|
|
+ "github.com/dotcloud/docker/daemon/execdriver"
|
|
|
+ "github.com/dotcloud/docker/daemon/execdriver/execdrivers"
|
|
|
+ "github.com/dotcloud/docker/daemon/execdriver/lxc"
|
|
|
+ "github.com/dotcloud/docker/daemon/graphdriver"
|
|
|
+ _ "github.com/dotcloud/docker/daemon/graphdriver/vfs"
|
|
|
+ _ "github.com/dotcloud/docker/daemon/networkdriver/bridge"
|
|
|
+ "github.com/dotcloud/docker/daemon/networkdriver/portallocator"
|
|
|
"github.com/dotcloud/docker/daemonconfig"
|
|
|
"github.com/dotcloud/docker/dockerversion"
|
|
|
"github.com/dotcloud/docker/engine"
|
|
|
"github.com/dotcloud/docker/graph"
|
|
|
"github.com/dotcloud/docker/image"
|
|
|
"github.com/dotcloud/docker/pkg/graphdb"
|
|
|
+ "github.com/dotcloud/docker/pkg/label"
|
|
|
"github.com/dotcloud/docker/pkg/mount"
|
|
|
+ "github.com/dotcloud/docker/pkg/networkfs/resolvconf"
|
|
|
"github.com/dotcloud/docker/pkg/selinux"
|
|
|
"github.com/dotcloud/docker/pkg/sysinfo"
|
|
|
"github.com/dotcloud/docker/runconfig"
|
|
|
- "github.com/dotcloud/docker/runtime/execdriver"
|
|
|
- "github.com/dotcloud/docker/runtime/execdriver/execdrivers"
|
|
|
- "github.com/dotcloud/docker/runtime/execdriver/lxc"
|
|
|
- "github.com/dotcloud/docker/runtime/graphdriver"
|
|
|
- _ "github.com/dotcloud/docker/runtime/graphdriver/vfs"
|
|
|
- _ "github.com/dotcloud/docker/runtime/networkdriver/bridge"
|
|
|
- "github.com/dotcloud/docker/runtime/networkdriver/portallocator"
|
|
|
"github.com/dotcloud/docker/utils"
|
|
|
- "io"
|
|
|
- "io/ioutil"
|
|
|
- "log"
|
|
|
- "os"
|
|
|
- "path"
|
|
|
- "regexp"
|
|
|
- "strings"
|
|
|
- "sync"
|
|
|
- "time"
|
|
|
)
|
|
|
|
|
|
// Set the max depth to the aufs default that most
|
|
@@ -44,7 +47,7 @@ var (
|
|
|
validContainerNamePattern = regexp.MustCompile(`^/?` + validContainerNameChars + `+$`)
|
|
|
)
|
|
|
|
|
|
-type Runtime struct {
|
|
|
+type Daemon struct {
|
|
|
repository string
|
|
|
sysInitPath string
|
|
|
containers *list.List
|
|
@@ -76,17 +79,17 @@ func remountPrivate(mountPoint string) error {
|
|
|
return mount.ForceMount("", mountPoint, "none", "private")
|
|
|
}
|
|
|
|
|
|
-// List returns an array of all containers registered in the runtime.
|
|
|
-func (runtime *Runtime) List() []*Container {
|
|
|
+// List returns an array of all containers registered in the daemon.
|
|
|
+func (daemon *Daemon) List() []*Container {
|
|
|
containers := new(History)
|
|
|
- for e := runtime.containers.Front(); e != nil; e = e.Next() {
|
|
|
+ for e := daemon.containers.Front(); e != nil; e = e.Next() {
|
|
|
containers.Add(e.Value.(*Container))
|
|
|
}
|
|
|
return *containers
|
|
|
}
|
|
|
|
|
|
-func (runtime *Runtime) getContainerElement(id string) *list.Element {
|
|
|
- for e := runtime.containers.Front(); e != nil; e = e.Next() {
|
|
|
+func (daemon *Daemon) getContainerElement(id string) *list.Element {
|
|
|
+ for e := daemon.containers.Front(); e != nil; e = e.Next() {
|
|
|
container := e.Value.(*Container)
|
|
|
if container.ID == id {
|
|
|
return e
|
|
@@ -97,17 +100,17 @@ func (runtime *Runtime) getContainerElement(id string) *list.Element {
|
|
|
|
|
|
// Get looks for a container by the specified ID or name, and returns it.
|
|
|
// If the container is not found, or if an error occurs, nil is returned.
|
|
|
-func (runtime *Runtime) Get(name string) *Container {
|
|
|
- if c, _ := runtime.GetByName(name); c != nil {
|
|
|
+func (daemon *Daemon) Get(name string) *Container {
|
|
|
+ if c, _ := daemon.GetByName(name); c != nil {
|
|
|
return c
|
|
|
}
|
|
|
|
|
|
- id, err := runtime.idIndex.Get(name)
|
|
|
+ id, err := daemon.idIndex.Get(name)
|
|
|
if err != nil {
|
|
|
return nil
|
|
|
}
|
|
|
|
|
|
- e := runtime.getContainerElement(id)
|
|
|
+ e := daemon.getContainerElement(id)
|
|
|
if e == nil {
|
|
|
return nil
|
|
|
}
|
|
@@ -116,43 +119,40 @@ func (runtime *Runtime) Get(name string) *Container {
|
|
|
|
|
|
// Exists returns a true if a container of the specified ID or name exists,
|
|
|
// false otherwise.
|
|
|
-func (runtime *Runtime) Exists(id string) bool {
|
|
|
- return runtime.Get(id) != nil
|
|
|
+func (daemon *Daemon) Exists(id string) bool {
|
|
|
+ return daemon.Get(id) != nil
|
|
|
}
|
|
|
|
|
|
-func (runtime *Runtime) containerRoot(id string) string {
|
|
|
- return path.Join(runtime.repository, id)
|
|
|
+func (daemon *Daemon) containerRoot(id string) string {
|
|
|
+ return path.Join(daemon.repository, id)
|
|
|
}
|
|
|
|
|
|
// Load reads the contents of a container from disk
|
|
|
// This is typically done at startup.
|
|
|
-func (runtime *Runtime) load(id string) (*Container, error) {
|
|
|
- container := &Container{root: runtime.containerRoot(id)}
|
|
|
+func (daemon *Daemon) load(id string) (*Container, error) {
|
|
|
+ container := &Container{root: daemon.containerRoot(id)}
|
|
|
if err := container.FromDisk(); err != nil {
|
|
|
return nil, err
|
|
|
}
|
|
|
if container.ID != id {
|
|
|
return container, fmt.Errorf("Container %s is stored at %s", container.ID, id)
|
|
|
}
|
|
|
- if container.State.IsRunning() {
|
|
|
- container.State.SetGhost(true)
|
|
|
- }
|
|
|
return container, nil
|
|
|
}
|
|
|
|
|
|
-// Register makes a container object usable by the runtime as <container.ID>
|
|
|
-func (runtime *Runtime) Register(container *Container) error {
|
|
|
- if container.runtime != nil || runtime.Exists(container.ID) {
|
|
|
+// Register makes a container object usable by the daemon as <container.ID>
|
|
|
+func (daemon *Daemon) Register(container *Container) error {
|
|
|
+ if container.daemon != nil || daemon.Exists(container.ID) {
|
|
|
return fmt.Errorf("Container is already loaded")
|
|
|
}
|
|
|
if err := validateID(container.ID); err != nil {
|
|
|
return err
|
|
|
}
|
|
|
- if err := runtime.ensureName(container); err != nil {
|
|
|
+ if err := daemon.ensureName(container); err != nil {
|
|
|
return err
|
|
|
}
|
|
|
|
|
|
- container.runtime = runtime
|
|
|
+ container.daemon = daemon
|
|
|
|
|
|
// Attach to stdout and stderr
|
|
|
container.stderr = utils.NewWriteBroadcaster()
|
|
@@ -164,55 +164,50 @@ func (runtime *Runtime) Register(container *Container) error {
|
|
|
container.stdinPipe = utils.NopWriteCloser(ioutil.Discard) // Silently drop stdin
|
|
|
}
|
|
|
// done
|
|
|
- runtime.containers.PushBack(container)
|
|
|
- runtime.idIndex.Add(container.ID)
|
|
|
+ daemon.containers.PushBack(container)
|
|
|
+ daemon.idIndex.Add(container.ID)
|
|
|
|
|
|
// FIXME: if the container is supposed to be running but is not, auto restart it?
|
|
|
// if so, then we need to restart monitor and init a new lock
|
|
|
// If the container is supposed to be running, make sure of it
|
|
|
if container.State.IsRunning() {
|
|
|
- if container.State.IsGhost() {
|
|
|
- utils.Debugf("killing ghost %s", container.ID)
|
|
|
+ utils.Debugf("killing old running container %s", container.ID)
|
|
|
|
|
|
- existingPid := container.State.Pid
|
|
|
- container.State.SetGhost(false)
|
|
|
- container.State.SetStopped(0)
|
|
|
+ existingPid := container.State.Pid
|
|
|
+ container.State.SetStopped(0)
|
|
|
|
|
|
- // We only have to handle this for lxc because the other drivers will ensure that
|
|
|
- // no ghost processes are left when docker dies
|
|
|
- if container.ExecDriver == "" || strings.Contains(container.ExecDriver, "lxc") {
|
|
|
- lxc.KillLxc(container.ID, 9)
|
|
|
- } else {
|
|
|
- // use the current driver and ensure that the container is dead x.x
|
|
|
- cmd := &execdriver.Command{
|
|
|
- ID: container.ID,
|
|
|
- }
|
|
|
- var err error
|
|
|
- cmd.Process, err = os.FindProcess(existingPid)
|
|
|
- if err != nil {
|
|
|
- utils.Debugf("cannot find existing process for %d", existingPid)
|
|
|
- }
|
|
|
- runtime.execDriver.Terminate(cmd)
|
|
|
- }
|
|
|
- if err := container.Unmount(); err != nil {
|
|
|
- utils.Debugf("ghost unmount error %s", err)
|
|
|
+ // We only have to handle this for lxc because the other drivers will ensure that
|
|
|
+ // no processes are left when docker dies
|
|
|
+ if container.ExecDriver == "" || strings.Contains(container.ExecDriver, "lxc") {
|
|
|
+ lxc.KillLxc(container.ID, 9)
|
|
|
+ } else {
|
|
|
+ // use the current driver and ensure that the container is dead x.x
|
|
|
+ cmd := &execdriver.Command{
|
|
|
+ ID: container.ID,
|
|
|
}
|
|
|
- if err := container.ToDisk(); err != nil {
|
|
|
- utils.Debugf("saving ghost state to disk %s", err)
|
|
|
+ var err error
|
|
|
+ cmd.Process, err = os.FindProcess(existingPid)
|
|
|
+ if err != nil {
|
|
|
+ utils.Debugf("cannot find existing process for %d", existingPid)
|
|
|
}
|
|
|
+ daemon.execDriver.Terminate(cmd)
|
|
|
+ }
|
|
|
+ if err := container.Unmount(); err != nil {
|
|
|
+ utils.Debugf("unmount error %s", err)
|
|
|
+ }
|
|
|
+ if err := container.ToDisk(); err != nil {
|
|
|
+ utils.Debugf("saving stopped state to disk %s", err)
|
|
|
}
|
|
|
|
|
|
- info := runtime.execDriver.Info(container.ID)
|
|
|
+ info := daemon.execDriver.Info(container.ID)
|
|
|
if !info.IsRunning() {
|
|
|
utils.Debugf("Container %s was supposed to be running but is not.", container.ID)
|
|
|
- if runtime.config.AutoRestart {
|
|
|
+ if daemon.config.AutoRestart {
|
|
|
utils.Debugf("Restarting")
|
|
|
if err := container.Unmount(); err != nil {
|
|
|
utils.Debugf("restart unmount error %s", err)
|
|
|
}
|
|
|
|
|
|
- container.State.SetGhost(false)
|
|
|
- container.State.SetStopped(0)
|
|
|
if err := container.Start(); err != nil {
|
|
|
return err
|
|
|
}
|
|
@@ -234,9 +229,9 @@ func (runtime *Runtime) Register(container *Container) error {
|
|
|
return nil
|
|
|
}
|
|
|
|
|
|
-func (runtime *Runtime) ensureName(container *Container) error {
|
|
|
+func (daemon *Daemon) ensureName(container *Container) error {
|
|
|
if container.Name == "" {
|
|
|
- name, err := generateRandomName(runtime)
|
|
|
+ name, err := generateRandomName(daemon)
|
|
|
if err != nil {
|
|
|
name = utils.TruncateID(container.ID)
|
|
|
}
|
|
@@ -245,8 +240,8 @@ func (runtime *Runtime) ensureName(container *Container) error {
|
|
|
if err := container.ToDisk(); err != nil {
|
|
|
utils.Debugf("Error saving container name %s", err)
|
|
|
}
|
|
|
- if !runtime.containerGraph.Exists(name) {
|
|
|
- if _, err := runtime.containerGraph.Set(name, container.ID); err != nil {
|
|
|
+ if !daemon.containerGraph.Exists(name) {
|
|
|
+ if _, err := daemon.containerGraph.Set(name, container.ID); err != nil {
|
|
|
utils.Debugf("Setting default id - %s", err)
|
|
|
}
|
|
|
}
|
|
@@ -254,7 +249,7 @@ func (runtime *Runtime) ensureName(container *Container) error {
|
|
|
return nil
|
|
|
}
|
|
|
|
|
|
-func (runtime *Runtime) LogToDisk(src *utils.WriteBroadcaster, dst, stream string) error {
|
|
|
+func (daemon *Daemon) LogToDisk(src *utils.WriteBroadcaster, dst, stream string) error {
|
|
|
log, err := os.OpenFile(dst, os.O_RDWR|os.O_APPEND|os.O_CREATE, 0600)
|
|
|
if err != nil {
|
|
|
return err
|
|
@@ -263,13 +258,13 @@ func (runtime *Runtime) LogToDisk(src *utils.WriteBroadcaster, dst, stream strin
|
|
|
return nil
|
|
|
}
|
|
|
|
|
|
-// Destroy unregisters a container from the runtime and cleanly removes its contents from the filesystem.
|
|
|
-func (runtime *Runtime) Destroy(container *Container) error {
|
|
|
+// Destroy unregisters a container from the daemon and cleanly removes its contents from the filesystem.
|
|
|
+func (daemon *Daemon) Destroy(container *Container) error {
|
|
|
if container == nil {
|
|
|
return fmt.Errorf("The given container is <nil>")
|
|
|
}
|
|
|
|
|
|
- element := runtime.getContainerElement(container.ID)
|
|
|
+ element := daemon.getContainerElement(container.ID)
|
|
|
if element == nil {
|
|
|
return fmt.Errorf("Container %v not found - maybe it was already destroyed?", container.ID)
|
|
|
}
|
|
@@ -278,42 +273,45 @@ func (runtime *Runtime) Destroy(container *Container) error {
|
|
|
return err
|
|
|
}
|
|
|
|
|
|
- if err := runtime.driver.Remove(container.ID); err != nil {
|
|
|
- return fmt.Errorf("Driver %s failed to remove root filesystem %s: %s", runtime.driver, container.ID, err)
|
|
|
+ // Deregister the container before removing its directory, to avoid race conditions
|
|
|
+ daemon.idIndex.Delete(container.ID)
|
|
|
+ daemon.containers.Remove(element)
|
|
|
+
|
|
|
+ if err := daemon.driver.Remove(container.ID); err != nil {
|
|
|
+ return fmt.Errorf("Driver %s failed to remove root filesystem %s: %s", daemon.driver, container.ID, err)
|
|
|
}
|
|
|
|
|
|
initID := fmt.Sprintf("%s-init", container.ID)
|
|
|
- if err := runtime.driver.Remove(initID); err != nil {
|
|
|
- return fmt.Errorf("Driver %s failed to remove init filesystem %s: %s", runtime.driver, initID, err)
|
|
|
+ if err := daemon.driver.Remove(initID); err != nil {
|
|
|
+ return fmt.Errorf("Driver %s failed to remove init filesystem %s: %s", daemon.driver, initID, err)
|
|
|
}
|
|
|
|
|
|
- if _, err := runtime.containerGraph.Purge(container.ID); err != nil {
|
|
|
+ if _, err := daemon.containerGraph.Purge(container.ID); err != nil {
|
|
|
utils.Debugf("Unable to remove container from link graph: %s", err)
|
|
|
}
|
|
|
|
|
|
- // Deregister the container before removing its directory, to avoid race conditions
|
|
|
- runtime.idIndex.Delete(container.ID)
|
|
|
- runtime.containers.Remove(element)
|
|
|
if err := os.RemoveAll(container.root); err != nil {
|
|
|
return fmt.Errorf("Unable to remove filesystem for %v: %v", container.ID, err)
|
|
|
}
|
|
|
+ selinux.FreeLxcContexts(container.ProcessLabel)
|
|
|
+
|
|
|
return nil
|
|
|
}
|
|
|
|
|
|
-func (runtime *Runtime) restore() error {
|
|
|
+func (daemon *Daemon) restore() error {
|
|
|
if os.Getenv("DEBUG") == "" && os.Getenv("TEST") == "" {
|
|
|
fmt.Printf("Loading containers: ")
|
|
|
}
|
|
|
- dir, err := ioutil.ReadDir(runtime.repository)
|
|
|
+ dir, err := ioutil.ReadDir(daemon.repository)
|
|
|
if err != nil {
|
|
|
return err
|
|
|
}
|
|
|
containers := make(map[string]*Container)
|
|
|
- currentDriver := runtime.driver.String()
|
|
|
+ currentDriver := daemon.driver.String()
|
|
|
|
|
|
for _, v := range dir {
|
|
|
id := v.Name()
|
|
|
- container, err := runtime.load(id)
|
|
|
+ container, err := daemon.load(id)
|
|
|
if os.Getenv("DEBUG") == "" && os.Getenv("TEST") == "" {
|
|
|
fmt.Print(".")
|
|
|
}
|
|
@@ -332,12 +330,12 @@ func (runtime *Runtime) restore() error {
|
|
|
}
|
|
|
|
|
|
register := func(container *Container) {
|
|
|
- if err := runtime.Register(container); err != nil {
|
|
|
+ if err := daemon.Register(container); err != nil {
|
|
|
utils.Debugf("Failed to register container %s: %s", container.ID, err)
|
|
|
}
|
|
|
}
|
|
|
|
|
|
- if entities := runtime.containerGraph.List("/", -1); entities != nil {
|
|
|
+ if entities := daemon.containerGraph.List("/", -1); entities != nil {
|
|
|
for _, p := range entities.Paths() {
|
|
|
if os.Getenv("DEBUG") == "" && os.Getenv("TEST") == "" {
|
|
|
fmt.Print(".")
|
|
@@ -353,12 +351,12 @@ func (runtime *Runtime) restore() error {
|
|
|
// Any containers that are left over do not exist in the graph
|
|
|
for _, container := range containers {
|
|
|
// Try to set the default name for a container if it exists prior to links
|
|
|
- container.Name, err = generateRandomName(runtime)
|
|
|
+ container.Name, err = generateRandomName(daemon)
|
|
|
if err != nil {
|
|
|
container.Name = utils.TruncateID(container.ID)
|
|
|
}
|
|
|
|
|
|
- if _, err := runtime.containerGraph.Set(container.Name, container.ID); err != nil {
|
|
|
+ if _, err := daemon.containerGraph.Set(container.Name, container.ID); err != nil {
|
|
|
utils.Debugf("Setting default id - %s", err)
|
|
|
}
|
|
|
register(container)
|
|
@@ -372,38 +370,38 @@ func (runtime *Runtime) restore() error {
|
|
|
}
|
|
|
|
|
|
// Create creates a new container from the given configuration with a given name.
|
|
|
-func (runtime *Runtime) Create(config *runconfig.Config, name string) (*Container, []string, error) {
|
|
|
+func (daemon *Daemon) Create(config *runconfig.Config, name string) (*Container, []string, error) {
|
|
|
var (
|
|
|
container *Container
|
|
|
warnings []string
|
|
|
)
|
|
|
|
|
|
- img, err := runtime.repositories.LookupImage(config.Image)
|
|
|
+ img, err := daemon.repositories.LookupImage(config.Image)
|
|
|
if err != nil {
|
|
|
return nil, nil, err
|
|
|
}
|
|
|
- if err := runtime.checkImageDepth(img); err != nil {
|
|
|
+ if err := daemon.checkImageDepth(img); err != nil {
|
|
|
return nil, nil, err
|
|
|
}
|
|
|
- if warnings, err = runtime.mergeAndVerifyConfig(config, img); err != nil {
|
|
|
+ if warnings, err = daemon.mergeAndVerifyConfig(config, img); err != nil {
|
|
|
return nil, nil, err
|
|
|
}
|
|
|
- if container, err = runtime.newContainer(name, config, img); err != nil {
|
|
|
+ if container, err = daemon.newContainer(name, config, img); err != nil {
|
|
|
return nil, nil, err
|
|
|
}
|
|
|
- if err := runtime.createRootfs(container, img); err != nil {
|
|
|
+ if err := daemon.createRootfs(container, img); err != nil {
|
|
|
return nil, nil, err
|
|
|
}
|
|
|
if err := container.ToDisk(); err != nil {
|
|
|
return nil, nil, err
|
|
|
}
|
|
|
- if err := runtime.Register(container); err != nil {
|
|
|
+ if err := daemon.Register(container); err != nil {
|
|
|
return nil, nil, err
|
|
|
}
|
|
|
return container, warnings, nil
|
|
|
}
|
|
|
|
|
|
-func (runtime *Runtime) checkImageDepth(img *image.Image) error {
|
|
|
+func (daemon *Daemon) checkImageDepth(img *image.Image) error {
|
|
|
// We add 2 layers to the depth because the container's rw and
|
|
|
// init layer add to the restriction
|
|
|
depth, err := img.Depth()
|
|
@@ -416,7 +414,7 @@ func (runtime *Runtime) checkImageDepth(img *image.Image) error {
|
|
|
return nil
|
|
|
}
|
|
|
|
|
|
-func (runtime *Runtime) checkDeprecatedExpose(config *runconfig.Config) bool {
|
|
|
+func (daemon *Daemon) checkDeprecatedExpose(config *runconfig.Config) bool {
|
|
|
if config != nil {
|
|
|
if config.PortSpecs != nil {
|
|
|
for _, p := range config.PortSpecs {
|
|
@@ -429,9 +427,9 @@ func (runtime *Runtime) checkDeprecatedExpose(config *runconfig.Config) bool {
|
|
|
return false
|
|
|
}
|
|
|
|
|
|
-func (runtime *Runtime) mergeAndVerifyConfig(config *runconfig.Config, img *image.Image) ([]string, error) {
|
|
|
+func (daemon *Daemon) mergeAndVerifyConfig(config *runconfig.Config, img *image.Image) ([]string, error) {
|
|
|
warnings := []string{}
|
|
|
- if runtime.checkDeprecatedExpose(img.Config) || runtime.checkDeprecatedExpose(config) {
|
|
|
+ if daemon.checkDeprecatedExpose(img.Config) || daemon.checkDeprecatedExpose(config) {
|
|
|
warnings = append(warnings, "The mapping to public ports on your host via Dockerfile EXPOSE (host:port:port) has been deprecated. Use -p to publish the ports.")
|
|
|
}
|
|
|
if img.Config != nil {
|
|
@@ -445,14 +443,14 @@ func (runtime *Runtime) mergeAndVerifyConfig(config *runconfig.Config, img *imag
|
|
|
return warnings, nil
|
|
|
}
|
|
|
|
|
|
-func (runtime *Runtime) generateIdAndName(name string) (string, string, error) {
|
|
|
+func (daemon *Daemon) generateIdAndName(name string) (string, string, error) {
|
|
|
var (
|
|
|
err error
|
|
|
id = utils.GenerateRandomID()
|
|
|
)
|
|
|
|
|
|
if name == "" {
|
|
|
- name, err = generateRandomName(runtime)
|
|
|
+ name, err = generateRandomName(daemon)
|
|
|
if err != nil {
|
|
|
name = utils.TruncateID(id)
|
|
|
}
|
|
@@ -465,19 +463,19 @@ func (runtime *Runtime) generateIdAndName(name string) (string, string, error) {
|
|
|
name = "/" + name
|
|
|
}
|
|
|
// Set the enitity in the graph using the default name specified
|
|
|
- if _, err := runtime.containerGraph.Set(name, id); err != nil {
|
|
|
+ if _, err := daemon.containerGraph.Set(name, id); err != nil {
|
|
|
if !graphdb.IsNonUniqueNameError(err) {
|
|
|
return "", "", err
|
|
|
}
|
|
|
|
|
|
- conflictingContainer, err := runtime.GetByName(name)
|
|
|
+ conflictingContainer, err := daemon.GetByName(name)
|
|
|
if err != nil {
|
|
|
if strings.Contains(err.Error(), "Could not find entity") {
|
|
|
return "", "", err
|
|
|
}
|
|
|
|
|
|
// Remove name and continue starting the container
|
|
|
- if err := runtime.containerGraph.Delete(name); err != nil {
|
|
|
+ if err := daemon.containerGraph.Delete(name); err != nil {
|
|
|
return "", "", err
|
|
|
}
|
|
|
} else {
|
|
@@ -490,7 +488,7 @@ func (runtime *Runtime) generateIdAndName(name string) (string, string, error) {
|
|
|
return id, name, nil
|
|
|
}
|
|
|
|
|
|
-func (runtime *Runtime) generateHostname(id string, config *runconfig.Config) {
|
|
|
+func (daemon *Daemon) generateHostname(id string, config *runconfig.Config) {
|
|
|
// Generate default hostname
|
|
|
// FIXME: the lxc template no longer needs to set a default hostname
|
|
|
if config.Hostname == "" {
|
|
@@ -498,7 +496,7 @@ func (runtime *Runtime) generateHostname(id string, config *runconfig.Config) {
|
|
|
}
|
|
|
}
|
|
|
|
|
|
-func (runtime *Runtime) getEntrypointAndArgs(config *runconfig.Config) (string, []string) {
|
|
|
+func (daemon *Daemon) getEntrypointAndArgs(config *runconfig.Config) (string, []string) {
|
|
|
var (
|
|
|
entrypoint string
|
|
|
args []string
|
|
@@ -513,18 +511,18 @@ func (runtime *Runtime) getEntrypointAndArgs(config *runconfig.Config) (string,
|
|
|
return entrypoint, args
|
|
|
}
|
|
|
|
|
|
-func (runtime *Runtime) newContainer(name string, config *runconfig.Config, img *image.Image) (*Container, error) {
|
|
|
+func (daemon *Daemon) newContainer(name string, config *runconfig.Config, img *image.Image) (*Container, error) {
|
|
|
var (
|
|
|
id string
|
|
|
err error
|
|
|
)
|
|
|
- id, name, err = runtime.generateIdAndName(name)
|
|
|
+ id, name, err = daemon.generateIdAndName(name)
|
|
|
if err != nil {
|
|
|
return nil, err
|
|
|
}
|
|
|
|
|
|
- runtime.generateHostname(id, config)
|
|
|
- entrypoint, args := runtime.getEntrypointAndArgs(config)
|
|
|
+ daemon.generateHostname(id, config)
|
|
|
+ entrypoint, args := daemon.getEntrypointAndArgs(config)
|
|
|
|
|
|
container := &Container{
|
|
|
// FIXME: we should generate the ID here instead of receiving it as an argument
|
|
@@ -537,34 +535,38 @@ func (runtime *Runtime) newContainer(name string, config *runconfig.Config, img
|
|
|
Image: img.ID, // Always use the resolved image id
|
|
|
NetworkSettings: &NetworkSettings{},
|
|
|
Name: name,
|
|
|
- Driver: runtime.driver.String(),
|
|
|
- ExecDriver: runtime.execDriver.Name(),
|
|
|
+ Driver: daemon.driver.String(),
|
|
|
+ ExecDriver: daemon.execDriver.Name(),
|
|
|
+ }
|
|
|
+ container.root = daemon.containerRoot(container.ID)
|
|
|
+
|
|
|
+ if container.ProcessLabel, container.MountLabel, err = label.GenLabels(""); err != nil {
|
|
|
+ return nil, err
|
|
|
}
|
|
|
- container.root = runtime.containerRoot(container.ID)
|
|
|
return container, nil
|
|
|
}
|
|
|
|
|
|
-func (runtime *Runtime) createRootfs(container *Container, img *image.Image) error {
|
|
|
+func (daemon *Daemon) createRootfs(container *Container, img *image.Image) error {
|
|
|
// Step 1: create the container directory.
|
|
|
// This doubles as a barrier to avoid race conditions.
|
|
|
if err := os.Mkdir(container.root, 0700); err != nil {
|
|
|
return err
|
|
|
}
|
|
|
initID := fmt.Sprintf("%s-init", container.ID)
|
|
|
- if err := runtime.driver.Create(initID, img.ID, ""); err != nil {
|
|
|
+ if err := daemon.driver.Create(initID, img.ID); err != nil {
|
|
|
return err
|
|
|
}
|
|
|
- initPath, err := runtime.driver.Get(initID)
|
|
|
+ initPath, err := daemon.driver.Get(initID, "")
|
|
|
if err != nil {
|
|
|
return err
|
|
|
}
|
|
|
- defer runtime.driver.Put(initID)
|
|
|
+ defer daemon.driver.Put(initID)
|
|
|
|
|
|
if err := graph.SetupInitLayer(initPath); err != nil {
|
|
|
return err
|
|
|
}
|
|
|
|
|
|
- if err := runtime.driver.Create(container.ID, initID, ""); err != nil {
|
|
|
+ if err := daemon.driver.Create(container.ID, initID); err != nil {
|
|
|
return err
|
|
|
}
|
|
|
return nil
|
|
@@ -572,7 +574,7 @@ func (runtime *Runtime) createRootfs(container *Container, img *image.Image) err
|
|
|
|
|
|
// Commit creates a new filesystem image from the current state of a container.
|
|
|
// The image can optionally be tagged into a repository
|
|
|
-func (runtime *Runtime) Commit(container *Container, repository, tag, comment, author string, config *runconfig.Config) (*image.Image, error) {
|
|
|
+func (daemon *Daemon) Commit(container *Container, repository, tag, comment, author string, config *runconfig.Config) (*image.Image, error) {
|
|
|
// FIXME: freeze the container before copying it to avoid data corruption?
|
|
|
if err := container.Mount(); err != nil {
|
|
|
return nil, err
|
|
@@ -595,13 +597,13 @@ func (runtime *Runtime) Commit(container *Container, repository, tag, comment, a
|
|
|
containerImage = container.Image
|
|
|
containerConfig = container.Config
|
|
|
}
|
|
|
- img, err := runtime.graph.Create(rwTar, containerID, containerImage, comment, author, containerConfig, config)
|
|
|
+ img, err := daemon.graph.Create(rwTar, containerID, containerImage, comment, author, containerConfig, config)
|
|
|
if err != nil {
|
|
|
return nil, err
|
|
|
}
|
|
|
// Register the image if needed
|
|
|
if repository != "" {
|
|
|
- if err := runtime.repositories.Set(repository, tag, img.ID, true); err != nil {
|
|
|
+ if err := daemon.repositories.Set(repository, tag, img.ID, true); err != nil {
|
|
|
return img, err
|
|
|
}
|
|
|
}
|
|
@@ -618,31 +620,31 @@ func GetFullContainerName(name string) (string, error) {
|
|
|
return name, nil
|
|
|
}
|
|
|
|
|
|
-func (runtime *Runtime) GetByName(name string) (*Container, error) {
|
|
|
+func (daemon *Daemon) GetByName(name string) (*Container, error) {
|
|
|
fullName, err := GetFullContainerName(name)
|
|
|
if err != nil {
|
|
|
return nil, err
|
|
|
}
|
|
|
- entity := runtime.containerGraph.Get(fullName)
|
|
|
+ entity := daemon.containerGraph.Get(fullName)
|
|
|
if entity == nil {
|
|
|
return nil, fmt.Errorf("Could not find entity for %s", name)
|
|
|
}
|
|
|
- e := runtime.getContainerElement(entity.ID())
|
|
|
+ e := daemon.getContainerElement(entity.ID())
|
|
|
if e == nil {
|
|
|
return nil, fmt.Errorf("Could not find container for entity id %s", entity.ID())
|
|
|
}
|
|
|
return e.Value.(*Container), nil
|
|
|
}
|
|
|
|
|
|
-func (runtime *Runtime) Children(name string) (map[string]*Container, error) {
|
|
|
+func (daemon *Daemon) Children(name string) (map[string]*Container, error) {
|
|
|
name, err := GetFullContainerName(name)
|
|
|
if err != nil {
|
|
|
return nil, err
|
|
|
}
|
|
|
children := make(map[string]*Container)
|
|
|
|
|
|
- err = runtime.containerGraph.Walk(name, func(p string, e *graphdb.Entity) error {
|
|
|
- c := runtime.Get(e.ID())
|
|
|
+ err = daemon.containerGraph.Walk(name, func(p string, e *graphdb.Entity) error {
|
|
|
+ c := daemon.Get(e.ID())
|
|
|
if c == nil {
|
|
|
return fmt.Errorf("Could not get container for name %s and id %s", e.ID(), p)
|
|
|
}
|
|
@@ -656,29 +658,28 @@ func (runtime *Runtime) Children(name string) (map[string]*Container, error) {
|
|
|
return children, nil
|
|
|
}
|
|
|
|
|
|
-func (runtime *Runtime) RegisterLink(parent, child *Container, alias string) error {
|
|
|
+func (daemon *Daemon) RegisterLink(parent, child *Container, alias string) error {
|
|
|
fullName := path.Join(parent.Name, alias)
|
|
|
- if !runtime.containerGraph.Exists(fullName) {
|
|
|
- _, err := runtime.containerGraph.Set(fullName, child.ID)
|
|
|
+ if !daemon.containerGraph.Exists(fullName) {
|
|
|
+ _, err := daemon.containerGraph.Set(fullName, child.ID)
|
|
|
return err
|
|
|
}
|
|
|
return nil
|
|
|
}
|
|
|
|
|
|
// FIXME: harmonize with NewGraph()
|
|
|
-func NewRuntime(config *daemonconfig.Config, eng *engine.Engine) (*Runtime, error) {
|
|
|
- runtime, err := NewRuntimeFromDirectory(config, eng)
|
|
|
+func NewDaemon(config *daemonconfig.Config, eng *engine.Engine) (*Daemon, error) {
|
|
|
+ daemon, err := NewDaemonFromDirectory(config, eng)
|
|
|
if err != nil {
|
|
|
return nil, err
|
|
|
}
|
|
|
- return runtime, nil
|
|
|
+ return daemon, nil
|
|
|
}
|
|
|
|
|
|
-func NewRuntimeFromDirectory(config *daemonconfig.Config, eng *engine.Engine) (*Runtime, error) {
|
|
|
+func NewDaemonFromDirectory(config *daemonconfig.Config, eng *engine.Engine) (*Daemon, error) {
|
|
|
if !config.EnableSelinuxSupport {
|
|
|
selinux.SetDisabled()
|
|
|
}
|
|
|
-
|
|
|
// Set the default driver
|
|
|
graphdriver.DefaultDriver = config.GraphDriver
|
|
|
|
|
@@ -693,9 +694,9 @@ func NewRuntimeFromDirectory(config *daemonconfig.Config, eng *engine.Engine) (*
|
|
|
return nil, err
|
|
|
}
|
|
|
|
|
|
- runtimeRepo := path.Join(config.Root, "containers")
|
|
|
+ daemonRepo := path.Join(config.Root, "containers")
|
|
|
|
|
|
- if err := os.MkdirAll(runtimeRepo, 0700); err != nil && !os.IsExist(err) {
|
|
|
+ if err := os.MkdirAll(daemonRepo, 0700); err != nil && !os.IsExist(err) {
|
|
|
return nil, err
|
|
|
}
|
|
|
|
|
@@ -774,12 +775,12 @@ func NewRuntimeFromDirectory(config *daemonconfig.Config, eng *engine.Engine) (*
|
|
|
return nil, err
|
|
|
}
|
|
|
|
|
|
- runtime := &Runtime{
|
|
|
- repository: runtimeRepo,
|
|
|
+ daemon := &Daemon{
|
|
|
+ repository: daemonRepo,
|
|
|
containers: list.New(),
|
|
|
graph: g,
|
|
|
repositories: repositories,
|
|
|
- idIndex: utils.NewTruncIndex(),
|
|
|
+ idIndex: utils.NewTruncIndex([]string{}),
|
|
|
sysInfo: sysInfo,
|
|
|
volumes: volumes,
|
|
|
config: config,
|
|
@@ -790,19 +791,19 @@ func NewRuntimeFromDirectory(config *daemonconfig.Config, eng *engine.Engine) (*
|
|
|
eng: eng,
|
|
|
}
|
|
|
|
|
|
- if err := runtime.checkLocaldns(); err != nil {
|
|
|
+ if err := daemon.checkLocaldns(); err != nil {
|
|
|
return nil, err
|
|
|
}
|
|
|
- if err := runtime.restore(); err != nil {
|
|
|
+ if err := daemon.restore(); err != nil {
|
|
|
return nil, err
|
|
|
}
|
|
|
- return runtime, nil
|
|
|
+ return daemon, nil
|
|
|
}
|
|
|
|
|
|
-func (runtime *Runtime) shutdown() error {
|
|
|
+func (daemon *Daemon) shutdown() error {
|
|
|
group := sync.WaitGroup{}
|
|
|
utils.Debugf("starting clean shutdown of all containers...")
|
|
|
- for _, container := range runtime.List() {
|
|
|
+ for _, container := range daemon.List() {
|
|
|
c := container
|
|
|
if c.State.IsRunning() {
|
|
|
utils.Debugf("stopping %s", c.ID)
|
|
@@ -823,22 +824,22 @@ func (runtime *Runtime) shutdown() error {
|
|
|
return nil
|
|
|
}
|
|
|
|
|
|
-func (runtime *Runtime) Close() error {
|
|
|
+func (daemon *Daemon) Close() error {
|
|
|
errorsStrings := []string{}
|
|
|
- if err := runtime.shutdown(); err != nil {
|
|
|
- utils.Errorf("runtime.shutdown(): %s", err)
|
|
|
+ if err := daemon.shutdown(); err != nil {
|
|
|
+ utils.Errorf("daemon.shutdown(): %s", err)
|
|
|
errorsStrings = append(errorsStrings, err.Error())
|
|
|
}
|
|
|
if err := portallocator.ReleaseAll(); err != nil {
|
|
|
utils.Errorf("portallocator.ReleaseAll(): %s", err)
|
|
|
errorsStrings = append(errorsStrings, err.Error())
|
|
|
}
|
|
|
- if err := runtime.driver.Cleanup(); err != nil {
|
|
|
- utils.Errorf("runtime.driver.Cleanup(): %s", err.Error())
|
|
|
+ if err := daemon.driver.Cleanup(); err != nil {
|
|
|
+ utils.Errorf("daemon.driver.Cleanup(): %s", err.Error())
|
|
|
errorsStrings = append(errorsStrings, err.Error())
|
|
|
}
|
|
|
- if err := runtime.containerGraph.Close(); err != nil {
|
|
|
- utils.Errorf("runtime.containerGraph.Close(): %s", err.Error())
|
|
|
+ if err := daemon.containerGraph.Close(); err != nil {
|
|
|
+ utils.Errorf("daemon.containerGraph.Close(): %s", err.Error())
|
|
|
errorsStrings = append(errorsStrings, err.Error())
|
|
|
}
|
|
|
if len(errorsStrings) > 0 {
|
|
@@ -847,55 +848,55 @@ func (runtime *Runtime) Close() error {
|
|
|
return nil
|
|
|
}
|
|
|
|
|
|
-func (runtime *Runtime) Mount(container *Container) error {
|
|
|
- dir, err := runtime.driver.Get(container.ID)
|
|
|
+func (daemon *Daemon) Mount(container *Container) error {
|
|
|
+ dir, err := daemon.driver.Get(container.ID, container.GetMountLabel())
|
|
|
if err != nil {
|
|
|
- return fmt.Errorf("Error getting container %s from driver %s: %s", container.ID, runtime.driver, err)
|
|
|
+ return fmt.Errorf("Error getting container %s from driver %s: %s", container.ID, daemon.driver, err)
|
|
|
}
|
|
|
if container.basefs == "" {
|
|
|
container.basefs = dir
|
|
|
} else if container.basefs != dir {
|
|
|
return fmt.Errorf("Error: driver %s is returning inconsistent paths for container %s ('%s' then '%s')",
|
|
|
- runtime.driver, container.ID, container.basefs, dir)
|
|
|
+ daemon.driver, container.ID, container.basefs, dir)
|
|
|
}
|
|
|
return nil
|
|
|
}
|
|
|
|
|
|
-func (runtime *Runtime) Unmount(container *Container) error {
|
|
|
- runtime.driver.Put(container.ID)
|
|
|
+func (daemon *Daemon) Unmount(container *Container) error {
|
|
|
+ daemon.driver.Put(container.ID)
|
|
|
return nil
|
|
|
}
|
|
|
|
|
|
-func (runtime *Runtime) Changes(container *Container) ([]archive.Change, error) {
|
|
|
- if differ, ok := runtime.driver.(graphdriver.Differ); ok {
|
|
|
+func (daemon *Daemon) Changes(container *Container) ([]archive.Change, error) {
|
|
|
+ if differ, ok := daemon.driver.(graphdriver.Differ); ok {
|
|
|
return differ.Changes(container.ID)
|
|
|
}
|
|
|
- cDir, err := runtime.driver.Get(container.ID)
|
|
|
+ cDir, err := daemon.driver.Get(container.ID, "")
|
|
|
if err != nil {
|
|
|
- return nil, fmt.Errorf("Error getting container rootfs %s from driver %s: %s", container.ID, container.runtime.driver, err)
|
|
|
+ return nil, fmt.Errorf("Error getting container rootfs %s from driver %s: %s", container.ID, container.daemon.driver, err)
|
|
|
}
|
|
|
- defer runtime.driver.Put(container.ID)
|
|
|
- initDir, err := runtime.driver.Get(container.ID + "-init")
|
|
|
+ defer daemon.driver.Put(container.ID)
|
|
|
+ initDir, err := daemon.driver.Get(container.ID+"-init", "")
|
|
|
if err != nil {
|
|
|
- return nil, fmt.Errorf("Error getting container init rootfs %s from driver %s: %s", container.ID, container.runtime.driver, err)
|
|
|
+ return nil, fmt.Errorf("Error getting container init rootfs %s from driver %s: %s", container.ID, container.daemon.driver, err)
|
|
|
}
|
|
|
- defer runtime.driver.Put(container.ID + "-init")
|
|
|
+ defer daemon.driver.Put(container.ID + "-init")
|
|
|
return archive.ChangesDirs(cDir, initDir)
|
|
|
}
|
|
|
|
|
|
-func (runtime *Runtime) Diff(container *Container) (archive.Archive, error) {
|
|
|
- if differ, ok := runtime.driver.(graphdriver.Differ); ok {
|
|
|
+func (daemon *Daemon) Diff(container *Container) (archive.Archive, error) {
|
|
|
+ if differ, ok := daemon.driver.(graphdriver.Differ); ok {
|
|
|
return differ.Diff(container.ID)
|
|
|
}
|
|
|
|
|
|
- changes, err := runtime.Changes(container)
|
|
|
+ changes, err := daemon.Changes(container)
|
|
|
if err != nil {
|
|
|
return nil, err
|
|
|
}
|
|
|
|
|
|
- cDir, err := runtime.driver.Get(container.ID)
|
|
|
+ cDir, err := daemon.driver.Get(container.ID, "")
|
|
|
if err != nil {
|
|
|
- return nil, fmt.Errorf("Error getting container rootfs %s from driver %s: %s", container.ID, container.runtime.driver, err)
|
|
|
+ return nil, fmt.Errorf("Error getting container rootfs %s from driver %s: %s", container.ID, container.daemon.driver, err)
|
|
|
}
|
|
|
|
|
|
archive, err := archive.ExportChanges(cDir, changes)
|
|
@@ -904,26 +905,26 @@ func (runtime *Runtime) Diff(container *Container) (archive.Archive, error) {
|
|
|
}
|
|
|
return utils.NewReadCloserWrapper(archive, func() error {
|
|
|
err := archive.Close()
|
|
|
- runtime.driver.Put(container.ID)
|
|
|
+ daemon.driver.Put(container.ID)
|
|
|
return err
|
|
|
}), nil
|
|
|
}
|
|
|
|
|
|
-func (runtime *Runtime) Run(c *Container, pipes *execdriver.Pipes, startCallback execdriver.StartCallback) (int, error) {
|
|
|
- return runtime.execDriver.Run(c.command, pipes, startCallback)
|
|
|
+func (daemon *Daemon) Run(c *Container, pipes *execdriver.Pipes, startCallback execdriver.StartCallback) (int, error) {
|
|
|
+ return daemon.execDriver.Run(c.command, pipes, startCallback)
|
|
|
}
|
|
|
|
|
|
-func (runtime *Runtime) Kill(c *Container, sig int) error {
|
|
|
- return runtime.execDriver.Kill(c.command, sig)
|
|
|
+func (daemon *Daemon) Kill(c *Container, sig int) error {
|
|
|
+ return daemon.execDriver.Kill(c.command, sig)
|
|
|
}
|
|
|
|
|
|
// Nuke kills all containers then removes all content
|
|
|
// from the content root, including images, volumes and
|
|
|
// container filesystems.
|
|
|
-// Again: this will remove your entire docker runtime!
|
|
|
-func (runtime *Runtime) Nuke() error {
|
|
|
+// Again: this will remove your entire docker daemon!
|
|
|
+func (daemon *Daemon) Nuke() error {
|
|
|
var wg sync.WaitGroup
|
|
|
- for _, container := range runtime.List() {
|
|
|
+ for _, container := range daemon.List() {
|
|
|
wg.Add(1)
|
|
|
go func(c *Container) {
|
|
|
c.Kill()
|
|
@@ -931,63 +932,63 @@ func (runtime *Runtime) Nuke() error {
|
|
|
}(container)
|
|
|
}
|
|
|
wg.Wait()
|
|
|
- runtime.Close()
|
|
|
+ daemon.Close()
|
|
|
|
|
|
- return os.RemoveAll(runtime.config.Root)
|
|
|
+ return os.RemoveAll(daemon.config.Root)
|
|
|
}
|
|
|
|
|
|
// FIXME: this is a convenience function for integration tests
|
|
|
-// which need direct access to runtime.graph.
|
|
|
+// which need direct access to daemon.graph.
|
|
|
// Once the tests switch to using engine and jobs, this method
|
|
|
// can go away.
|
|
|
-func (runtime *Runtime) Graph() *graph.Graph {
|
|
|
- return runtime.graph
|
|
|
+func (daemon *Daemon) Graph() *graph.Graph {
|
|
|
+ return daemon.graph
|
|
|
}
|
|
|
|
|
|
-func (runtime *Runtime) Repositories() *graph.TagStore {
|
|
|
- return runtime.repositories
|
|
|
+func (daemon *Daemon) Repositories() *graph.TagStore {
|
|
|
+ return daemon.repositories
|
|
|
}
|
|
|
|
|
|
-func (runtime *Runtime) Config() *daemonconfig.Config {
|
|
|
- return runtime.config
|
|
|
+func (daemon *Daemon) Config() *daemonconfig.Config {
|
|
|
+ return daemon.config
|
|
|
}
|
|
|
|
|
|
-func (runtime *Runtime) SystemConfig() *sysinfo.SysInfo {
|
|
|
- return runtime.sysInfo
|
|
|
+func (daemon *Daemon) SystemConfig() *sysinfo.SysInfo {
|
|
|
+ return daemon.sysInfo
|
|
|
}
|
|
|
|
|
|
-func (runtime *Runtime) SystemInitPath() string {
|
|
|
- return runtime.sysInitPath
|
|
|
+func (daemon *Daemon) SystemInitPath() string {
|
|
|
+ return daemon.sysInitPath
|
|
|
}
|
|
|
|
|
|
-func (runtime *Runtime) GraphDriver() graphdriver.Driver {
|
|
|
- return runtime.driver
|
|
|
+func (daemon *Daemon) GraphDriver() graphdriver.Driver {
|
|
|
+ return daemon.driver
|
|
|
}
|
|
|
|
|
|
-func (runtime *Runtime) ExecutionDriver() execdriver.Driver {
|
|
|
- return runtime.execDriver
|
|
|
+func (daemon *Daemon) ExecutionDriver() execdriver.Driver {
|
|
|
+ return daemon.execDriver
|
|
|
}
|
|
|
|
|
|
-func (runtime *Runtime) Volumes() *graph.Graph {
|
|
|
- return runtime.volumes
|
|
|
+func (daemon *Daemon) Volumes() *graph.Graph {
|
|
|
+ return daemon.volumes
|
|
|
}
|
|
|
|
|
|
-func (runtime *Runtime) ContainerGraph() *graphdb.Database {
|
|
|
- return runtime.containerGraph
|
|
|
+func (daemon *Daemon) ContainerGraph() *graphdb.Database {
|
|
|
+ return daemon.containerGraph
|
|
|
}
|
|
|
|
|
|
-func (runtime *Runtime) SetServer(server Server) {
|
|
|
- runtime.srv = server
|
|
|
+func (daemon *Daemon) SetServer(server Server) {
|
|
|
+ daemon.srv = server
|
|
|
}
|
|
|
|
|
|
-func (runtime *Runtime) checkLocaldns() error {
|
|
|
- resolvConf, err := utils.GetResolvConf()
|
|
|
+func (daemon *Daemon) checkLocaldns() error {
|
|
|
+ resolvConf, err := resolvconf.Get()
|
|
|
if err != nil {
|
|
|
return err
|
|
|
}
|
|
|
- if len(runtime.config.Dns) == 0 && utils.CheckLocalDns(resolvConf) {
|
|
|
+ if len(daemon.config.Dns) == 0 && utils.CheckLocalDns(resolvConf) {
|
|
|
log.Printf("Local (127.0.0.1) DNS resolver found in resolv.conf and containers can't use it. Using default external servers : %v\n", DefaultDns)
|
|
|
- runtime.config.Dns = DefaultDns
|
|
|
+ daemon.config.Dns = DefaultDns
|
|
|
}
|
|
|
return nil
|
|
|
}
|