daemon_solaris.go 19 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533
  1. // +build solaris,cgo
  2. package daemon
  3. import (
  4. "fmt"
  5. "net"
  6. "strconv"
  7. "github.com/Sirupsen/logrus"
  8. "github.com/docker/docker/api/types"
  9. containertypes "github.com/docker/docker/api/types/container"
  10. "github.com/docker/docker/container"
  11. "github.com/docker/docker/image"
  12. "github.com/docker/docker/layer"
  13. "github.com/docker/docker/pkg/idtools"
  14. "github.com/docker/docker/pkg/parsers/kernel"
  15. "github.com/docker/docker/pkg/sysinfo"
  16. "github.com/docker/docker/reference"
  17. "github.com/docker/libnetwork"
  18. nwconfig "github.com/docker/libnetwork/config"
  19. "github.com/docker/libnetwork/drivers/solaris/bridge"
  20. "github.com/docker/libnetwork/netlabel"
  21. "github.com/docker/libnetwork/netutils"
  22. lntypes "github.com/docker/libnetwork/types"
  23. "github.com/opencontainers/runc/libcontainer/label"
  24. "github.com/opencontainers/runtime-spec/specs-go"
  25. "github.com/pkg/errors"
  26. )
  27. //#include <zone.h>
  28. import "C"
  29. const (
  30. defaultVirtualSwitch = "Virtual Switch"
  31. platformSupported = true
  32. solarisMinCPUShares = 1
  33. solarisMaxCPUShares = 65535
  34. )
  35. func getMemoryResources(config containertypes.Resources) specs.CappedMemory {
  36. memory := specs.CappedMemory{}
  37. if config.Memory > 0 {
  38. memory.Physical = strconv.FormatInt(config.Memory, 10)
  39. }
  40. if config.MemorySwap != 0 {
  41. memory.Swap = strconv.FormatInt(config.MemorySwap, 10)
  42. }
  43. return memory
  44. }
  45. func getCPUResources(config containertypes.Resources) specs.CappedCPU {
  46. cpu := specs.CappedCPU{}
  47. if config.CpusetCpus != "" {
  48. cpu.Ncpus = config.CpusetCpus
  49. }
  50. return cpu
  51. }
  52. func (daemon *Daemon) cleanupMountsByID(id string) error {
  53. return nil
  54. }
  55. func parseSecurityOpt(container *container.Container, config *containertypes.HostConfig) error {
  56. //Since config.SecurityOpt is specifically defined as a "List of string values to
  57. //customize labels for MLs systems, such as SELinux"
  58. //until we figure out how to map to Trusted Extensions
  59. //this is being disabled for now on Solaris
  60. var (
  61. labelOpts []string
  62. err error
  63. )
  64. if len(config.SecurityOpt) > 0 {
  65. return errors.New("Security options are not supported on Solaris")
  66. }
  67. container.ProcessLabel, container.MountLabel, err = label.InitLabels(labelOpts)
  68. return err
  69. }
  70. func setupRemappedRoot(config *Config) ([]idtools.IDMap, []idtools.IDMap, error) {
  71. return nil, nil, nil
  72. }
  73. func setupDaemonRoot(config *Config, rootDir string, rootUID, rootGID int) error {
  74. return nil
  75. }
  76. func (daemon *Daemon) getLayerInit() func(string) error {
  77. return nil
  78. }
  79. // setupInitLayer populates a directory with mountpoints suitable
  80. // for bind-mounting dockerinit into the container. The mountpoint is simply an
  81. // empty file at /.dockerinit
  82. //
  83. // This extra layer is used by all containers as the top-most ro layer. It protects
  84. // the container from unwanted side-effects on the rw layer.
  85. func setupInitLayer(initLayer string, rootUID, rootGID int) error {
  86. return nil
  87. }
  88. func checkKernel() error {
  89. // solaris can rely upon checkSystem() below, we don't skew kernel versions
  90. return nil
  91. }
  92. func (daemon *Daemon) getCgroupDriver() string {
  93. return ""
  94. }
  95. func (daemon *Daemon) adaptContainerSettings(hostConfig *containertypes.HostConfig, adjustCPUShares bool) error {
  96. if hostConfig.CPUShares < 0 {
  97. logrus.Warnf("Changing requested CPUShares of %d to minimum allowed of %d", hostConfig.CPUShares, solarisMinCPUShares)
  98. hostConfig.CPUShares = solarisMinCPUShares
  99. } else if hostConfig.CPUShares > solarisMaxCPUShares {
  100. logrus.Warnf("Changing requested CPUShares of %d to maximum allowed of %d", hostConfig.CPUShares, solarisMaxCPUShares)
  101. hostConfig.CPUShares = solarisMaxCPUShares
  102. }
  103. if hostConfig.Memory > 0 && hostConfig.MemorySwap == 0 {
  104. // By default, MemorySwap is set to twice the size of Memory.
  105. hostConfig.MemorySwap = hostConfig.Memory * 2
  106. }
  107. if hostConfig.ShmSize != 0 {
  108. hostConfig.ShmSize = container.DefaultSHMSize
  109. }
  110. if hostConfig.OomKillDisable == nil {
  111. defaultOomKillDisable := false
  112. hostConfig.OomKillDisable = &defaultOomKillDisable
  113. }
  114. return nil
  115. }
  116. // UsingSystemd returns true if cli option includes native.cgroupdriver=systemd
  117. func UsingSystemd(config *Config) bool {
  118. return false
  119. }
  120. // verifyPlatformContainerSettings performs platform-specific validation of the
  121. // hostconfig and config structures.
  122. func verifyPlatformContainerSettings(daemon *Daemon, hostConfig *containertypes.HostConfig, config *containertypes.Config, update bool) ([]string, error) {
  123. warnings := []string{}
  124. sysInfo := sysinfo.New(true)
  125. // NOTE: We do not enforce a minimum value for swap limits for zones on Solaris and
  126. // therefore we will not do that for Docker container either.
  127. if hostConfig.Memory > 0 && !sysInfo.MemoryLimit {
  128. warnings = append(warnings, "Your kernel does not support memory limit capabilities. Limitation discarded.")
  129. logrus.Warnf("Your kernel does not support memory limit capabilities. Limitation discarded.")
  130. hostConfig.Memory = 0
  131. hostConfig.MemorySwap = -1
  132. }
  133. if hostConfig.Memory > 0 && hostConfig.MemorySwap != -1 && !sysInfo.SwapLimit {
  134. warnings = append(warnings, "Your kernel does not support swap limit capabilities, memory limited without swap.")
  135. logrus.Warnf("Your kernel does not support swap limit capabilities, memory limited without swap.")
  136. hostConfig.MemorySwap = -1
  137. }
  138. if hostConfig.Memory > 0 && hostConfig.MemorySwap > 0 && hostConfig.MemorySwap < hostConfig.Memory {
  139. return warnings, fmt.Errorf("Minimum memoryswap limit should be larger than memory limit, see usage.")
  140. }
  141. // Solaris NOTE: We allow and encourage setting the swap without setting the memory limit.
  142. if hostConfig.MemorySwappiness != nil && *hostConfig.MemorySwappiness != -1 && !sysInfo.MemorySwappiness {
  143. warnings = append(warnings, "Your kernel does not support memory swappiness capabilities, memory swappiness discarded.")
  144. logrus.Warnf("Your kernel does not support memory swappiness capabilities, memory swappiness discarded.")
  145. hostConfig.MemorySwappiness = nil
  146. }
  147. if hostConfig.MemoryReservation > 0 && !sysInfo.MemoryReservation {
  148. warnings = append(warnings, "Your kernel does not support memory soft limit capabilities. Limitation discarded.")
  149. logrus.Warnf("Your kernel does not support memory soft limit capabilities. Limitation discarded.")
  150. hostConfig.MemoryReservation = 0
  151. }
  152. if hostConfig.Memory > 0 && hostConfig.MemoryReservation > 0 && hostConfig.Memory < hostConfig.MemoryReservation {
  153. return warnings, fmt.Errorf("Minimum memory limit should be larger than memory reservation limit, see usage.")
  154. }
  155. if hostConfig.KernelMemory > 0 && !sysInfo.KernelMemory {
  156. warnings = append(warnings, "Your kernel does not support kernel memory limit capabilities. Limitation discarded.")
  157. logrus.Warnf("Your kernel does not support kernel memory limit capabilities. Limitation discarded.")
  158. hostConfig.KernelMemory = 0
  159. }
  160. if hostConfig.CPUShares != 0 && !sysInfo.CPUShares {
  161. warnings = append(warnings, "Your kernel does not support CPU shares. Shares discarded.")
  162. logrus.Warnf("Your kernel does not support CPU shares. Shares discarded.")
  163. hostConfig.CPUShares = 0
  164. }
  165. if hostConfig.CPUShares < 0 {
  166. warnings = append(warnings, "Invalid CPUShares value. Must be positive. Discarding.")
  167. logrus.Warnf("Invalid CPUShares value. Must be positive. Discarding.")
  168. hostConfig.CPUQuota = 0
  169. }
  170. if hostConfig.CPUShares > 0 && !sysinfo.IsCPUSharesAvailable() {
  171. warnings = append(warnings, "Global zone default scheduling class not FSS. Discarding shares.")
  172. logrus.Warnf("Global zone default scheduling class not FSS. Discarding shares.")
  173. hostConfig.CPUShares = 0
  174. }
  175. // Solaris NOTE: Linux does not do negative checking for CPUShares and Quota here. But it makes sense to.
  176. if hostConfig.CPUPeriod > 0 && !sysInfo.CPUCfsPeriod {
  177. warnings = append(warnings, "Your kernel does not support CPU cfs period. Period discarded.")
  178. logrus.Warnf("Your kernel does not support CPU cfs period. Period discarded.")
  179. if hostConfig.CPUQuota > 0 {
  180. warnings = append(warnings, "Quota will be applied on default period, not period specified.")
  181. logrus.Warnf("Quota will be applied on default period, not period specified.")
  182. }
  183. hostConfig.CPUPeriod = 0
  184. }
  185. if hostConfig.CPUQuota != 0 && !sysInfo.CPUCfsQuota {
  186. warnings = append(warnings, "Your kernel does not support CPU cfs quota. Quota discarded.")
  187. logrus.Warnf("Your kernel does not support CPU cfs quota. Quota discarded.")
  188. hostConfig.CPUQuota = 0
  189. }
  190. if hostConfig.CPUQuota < 0 {
  191. warnings = append(warnings, "Invalid CPUQuota value. Must be positive. Discarding.")
  192. logrus.Warnf("Invalid CPUQuota value. Must be positive. Discarding.")
  193. hostConfig.CPUQuota = 0
  194. }
  195. if (hostConfig.CpusetCpus != "" || hostConfig.CpusetMems != "") && !sysInfo.Cpuset {
  196. warnings = append(warnings, "Your kernel does not support cpuset. Cpuset discarded.")
  197. logrus.Warnf("Your kernel does not support cpuset. Cpuset discarded.")
  198. hostConfig.CpusetCpus = ""
  199. hostConfig.CpusetMems = ""
  200. }
  201. cpusAvailable, err := sysInfo.IsCpusetCpusAvailable(hostConfig.CpusetCpus)
  202. if err != nil {
  203. return warnings, fmt.Errorf("Invalid value %s for cpuset cpus.", hostConfig.CpusetCpus)
  204. }
  205. if !cpusAvailable {
  206. return warnings, fmt.Errorf("Requested CPUs are not available - requested %s, available: %s.", hostConfig.CpusetCpus, sysInfo.Cpus)
  207. }
  208. memsAvailable, err := sysInfo.IsCpusetMemsAvailable(hostConfig.CpusetMems)
  209. if err != nil {
  210. return warnings, fmt.Errorf("Invalid value %s for cpuset mems.", hostConfig.CpusetMems)
  211. }
  212. if !memsAvailable {
  213. return warnings, fmt.Errorf("Requested memory nodes are not available - requested %s, available: %s.", hostConfig.CpusetMems, sysInfo.Mems)
  214. }
  215. if hostConfig.BlkioWeight > 0 && !sysInfo.BlkioWeight {
  216. warnings = append(warnings, "Your kernel does not support Block I/O weight. Weight discarded.")
  217. logrus.Warnf("Your kernel does not support Block I/O weight. Weight discarded.")
  218. hostConfig.BlkioWeight = 0
  219. }
  220. if hostConfig.OomKillDisable != nil && !sysInfo.OomKillDisable {
  221. *hostConfig.OomKillDisable = false
  222. // Don't warn; this is the default setting but only applicable to Linux
  223. }
  224. if sysInfo.IPv4ForwardingDisabled {
  225. warnings = append(warnings, "IPv4 forwarding is disabled. Networking will not work.")
  226. logrus.Warnf("IPv4 forwarding is disabled. Networking will not work")
  227. }
  228. // Solaris NOTE: We do not allow setting Linux specific options, so check and warn for all of them.
  229. if hostConfig.CapAdd != nil || hostConfig.CapDrop != nil {
  230. warnings = append(warnings, "Adding or dropping kernel capabilities unsupported on Solaris.Discarding capabilities lists.")
  231. logrus.Warnf("Adding or dropping kernel capabilities unsupported on Solaris.Discarding capabilities lists.")
  232. hostConfig.CapAdd = nil
  233. hostConfig.CapDrop = nil
  234. }
  235. if hostConfig.GroupAdd != nil {
  236. warnings = append(warnings, "Additional groups unsupported on Solaris.Discarding groups lists.")
  237. logrus.Warnf("Additional groups unsupported on Solaris.Discarding groups lists.")
  238. hostConfig.GroupAdd = nil
  239. }
  240. if hostConfig.IpcMode != "" {
  241. warnings = append(warnings, "IPC namespace assignment unsupported on Solaris.Discarding IPC setting.")
  242. logrus.Warnf("IPC namespace assignment unsupported on Solaris.Discarding IPC setting.")
  243. hostConfig.IpcMode = ""
  244. }
  245. if hostConfig.PidMode != "" {
  246. warnings = append(warnings, "PID namespace setting unsupported on Solaris. Running container in host PID namespace.")
  247. logrus.Warnf("PID namespace setting unsupported on Solaris. Running container in host PID namespace.")
  248. hostConfig.PidMode = ""
  249. }
  250. if hostConfig.Privileged {
  251. warnings = append(warnings, "Privileged mode unsupported on Solaris. Discarding privileged mode setting.")
  252. logrus.Warnf("Privileged mode unsupported on Solaris. Discarding privileged mode setting.")
  253. hostConfig.Privileged = false
  254. }
  255. if hostConfig.UTSMode != "" {
  256. warnings = append(warnings, "UTS namespace assignment unsupported on Solaris.Discarding UTS setting.")
  257. logrus.Warnf("UTS namespace assignment unsupported on Solaris.Discarding UTS setting.")
  258. hostConfig.UTSMode = ""
  259. }
  260. if hostConfig.CgroupParent != "" {
  261. warnings = append(warnings, "Specifying Cgroup parent unsupported on Solaris. Discarding cgroup parent setting.")
  262. logrus.Warnf("Specifying Cgroup parent unsupported on Solaris. Discarding cgroup parent setting.")
  263. hostConfig.CgroupParent = ""
  264. }
  265. if hostConfig.Ulimits != nil {
  266. warnings = append(warnings, "Specifying ulimits unsupported on Solaris. Discarding ulimits setting.")
  267. logrus.Warnf("Specifying ulimits unsupported on Solaris. Discarding ulimits setting.")
  268. hostConfig.Ulimits = nil
  269. }
  270. return warnings, nil
  271. }
  272. // platformReload update configuration with platform specific options
  273. func (daemon *Daemon) platformReload(config *Config) map[string]string {
  274. return map[string]string{}
  275. }
  276. // verifyDaemonSettings performs validation of daemon config struct
  277. func verifyDaemonSettings(config *Config) error {
  278. if config.DefaultRuntime == "" {
  279. config.DefaultRuntime = stockRuntimeName
  280. }
  281. if config.Runtimes == nil {
  282. config.Runtimes = make(map[string]types.Runtime)
  283. }
  284. stockRuntimeOpts := []string{}
  285. config.Runtimes[stockRuntimeName] = types.Runtime{Path: DefaultRuntimeBinary, Args: stockRuntimeOpts}
  286. // checkSystem validates platform-specific requirements
  287. return nil
  288. }
  289. func checkSystem() error {
  290. // check OS version for compatibility, ensure running in global zone
  291. var err error
  292. var id C.zoneid_t
  293. if id, err = C.getzoneid(); err != nil {
  294. return fmt.Errorf("Exiting. Error getting zone id: %+v", err)
  295. }
  296. if int(id) != 0 {
  297. return fmt.Errorf("Exiting because the Docker daemon is not running in the global zone")
  298. }
  299. v, err := kernel.GetKernelVersion()
  300. if kernel.CompareKernelVersion(*v, kernel.VersionInfo{Kernel: 5, Major: 12, Minor: 0}) < 0 {
  301. return fmt.Errorf("Your Solaris kernel version: %s doesn't support Docker. Please upgrade to 5.12.0", v.String())
  302. }
  303. return err
  304. }
  305. // configureMaxThreads sets the Go runtime max threads threshold
  306. // which is 90% of the kernel setting from /proc/sys/kernel/threads-max
  307. func configureMaxThreads(config *Config) error {
  308. return nil
  309. }
  310. // configureKernelSecuritySupport configures and validate security support for the kernel
  311. func configureKernelSecuritySupport(config *Config, driverName string) error {
  312. return nil
  313. }
  314. func (daemon *Daemon) initNetworkController(config *Config, activeSandboxes map[string]interface{}) (libnetwork.NetworkController, error) {
  315. netOptions, err := daemon.networkOptions(config, daemon.PluginStore, activeSandboxes)
  316. if err != nil {
  317. return nil, err
  318. }
  319. controller, err := libnetwork.New(netOptions...)
  320. if err != nil {
  321. return nil, fmt.Errorf("error obtaining controller instance: %v", err)
  322. }
  323. // Initialize default network on "null"
  324. if _, err := controller.NewNetwork("null", "none", "", libnetwork.NetworkOptionPersist(false)); err != nil {
  325. return nil, fmt.Errorf("Error creating default 'null' network: %v", err)
  326. }
  327. if !config.DisableBridge {
  328. // Initialize default driver "bridge"
  329. if err := initBridgeDriver(controller, config); err != nil {
  330. return nil, err
  331. }
  332. }
  333. return controller, nil
  334. }
  335. func initBridgeDriver(controller libnetwork.NetworkController, config *Config) error {
  336. if n, err := controller.NetworkByName("bridge"); err == nil {
  337. if err = n.Delete(); err != nil {
  338. return fmt.Errorf("could not delete the default bridge network: %v", err)
  339. }
  340. }
  341. bridgeName := bridge.DefaultBridgeName
  342. if config.bridgeConfig.Iface != "" {
  343. bridgeName = config.bridgeConfig.Iface
  344. }
  345. netOption := map[string]string{
  346. bridge.BridgeName: bridgeName,
  347. bridge.DefaultBridge: strconv.FormatBool(true),
  348. netlabel.DriverMTU: strconv.Itoa(config.Mtu),
  349. bridge.EnableICC: strconv.FormatBool(config.bridgeConfig.InterContainerCommunication),
  350. }
  351. // --ip processing
  352. if config.bridgeConfig.DefaultIP != nil {
  353. netOption[bridge.DefaultBindingIP] = config.bridgeConfig.DefaultIP.String()
  354. }
  355. var ipamV4Conf *libnetwork.IpamConf
  356. ipamV4Conf = &libnetwork.IpamConf{AuxAddresses: make(map[string]string)}
  357. nwList, _, err := netutils.ElectInterfaceAddresses(bridgeName)
  358. if err != nil {
  359. return errors.Wrap(err, "list bridge addresses failed")
  360. }
  361. nw := nwList[0]
  362. if len(nwList) > 1 && config.bridgeConfig.FixedCIDR != "" {
  363. _, fCIDR, err := net.ParseCIDR(config.bridgeConfig.FixedCIDR)
  364. if err != nil {
  365. return errors.Wrap(err, "parse CIDR failed")
  366. }
  367. // Iterate through in case there are multiple addresses for the bridge
  368. for _, entry := range nwList {
  369. if fCIDR.Contains(entry.IP) {
  370. nw = entry
  371. break
  372. }
  373. }
  374. }
  375. ipamV4Conf.PreferredPool = lntypes.GetIPNetCanonical(nw).String()
  376. hip, _ := lntypes.GetHostPartIP(nw.IP, nw.Mask)
  377. if hip.IsGlobalUnicast() {
  378. ipamV4Conf.Gateway = nw.IP.String()
  379. }
  380. if config.bridgeConfig.IP != "" {
  381. ipamV4Conf.PreferredPool = config.bridgeConfig.IP
  382. ip, _, err := net.ParseCIDR(config.bridgeConfig.IP)
  383. if err != nil {
  384. return err
  385. }
  386. ipamV4Conf.Gateway = ip.String()
  387. } else if bridgeName == bridge.DefaultBridgeName && ipamV4Conf.PreferredPool != "" {
  388. logrus.Infof("Default bridge (%s) is assigned with an IP address %s. Daemon option --bip can be used to set a preferred IP address", bridgeName, ipamV4Conf.PreferredPool)
  389. }
  390. if config.bridgeConfig.FixedCIDR != "" {
  391. _, fCIDR, err := net.ParseCIDR(config.bridgeConfig.FixedCIDR)
  392. if err != nil {
  393. return err
  394. }
  395. ipamV4Conf.SubPool = fCIDR.String()
  396. }
  397. if config.bridgeConfig.DefaultGatewayIPv4 != nil {
  398. ipamV4Conf.AuxAddresses["DefaultGatewayIPv4"] = config.bridgeConfig.DefaultGatewayIPv4.String()
  399. }
  400. v4Conf := []*libnetwork.IpamConf{ipamV4Conf}
  401. v6Conf := []*libnetwork.IpamConf{}
  402. // Initialize default network on "bridge" with the same name
  403. _, err = controller.NewNetwork("bridge", "bridge", "",
  404. libnetwork.NetworkOptionDriverOpts(netOption),
  405. libnetwork.NetworkOptionIpam("default", "", v4Conf, v6Conf, nil),
  406. libnetwork.NetworkOptionDeferIPv6Alloc(false))
  407. if err != nil {
  408. return fmt.Errorf("Error creating default 'bridge' network: %v", err)
  409. }
  410. return nil
  411. }
  412. // registerLinks sets up links between containers and writes the
  413. // configuration out for persistence.
  414. func (daemon *Daemon) registerLinks(container *container.Container, hostConfig *containertypes.HostConfig) error {
  415. return nil
  416. }
  417. func (daemon *Daemon) cleanupMounts() error {
  418. return nil
  419. }
  420. // conditionalMountOnStart is a platform specific helper function during the
  421. // container start to call mount.
  422. func (daemon *Daemon) conditionalMountOnStart(container *container.Container) error {
  423. return daemon.Mount(container)
  424. }
  425. // conditionalUnmountOnCleanup is a platform specific helper function called
  426. // during the cleanup of a container to unmount.
  427. func (daemon *Daemon) conditionalUnmountOnCleanup(container *container.Container) error {
  428. return daemon.Unmount(container)
  429. }
  430. func restoreCustomImage(is image.Store, ls layer.Store, rs reference.Store) error {
  431. // Solaris has no custom images to register
  432. return nil
  433. }
  434. func driverOptions(config *Config) []nwconfig.Option {
  435. return []nwconfig.Option{}
  436. }
  437. func (daemon *Daemon) stats(c *container.Container) (*types.StatsJSON, error) {
  438. return nil, nil
  439. }
  440. // setDefaultIsolation determine the default isolation mode for the
  441. // daemon to run in. This is only applicable on Windows
  442. func (daemon *Daemon) setDefaultIsolation() error {
  443. return nil
  444. }
  445. func rootFSToAPIType(rootfs *image.RootFS) types.RootFS {
  446. return types.RootFS{}
  447. }
  448. func setupDaemonProcess(config *Config) error {
  449. return nil
  450. }
  451. func (daemon *Daemon) setupSeccompProfile() error {
  452. return nil
  453. }