6ec03d6745
The "Capability" type defines DataScope and ConnectivityScope fields, but their value was set from consts in the datastore package, which required importing that package and its dependencies for the consts only. This patch: - Moves the consts to a separate "scope" package - Adds aliases for the consts in the datastore package. Signed-off-by: Sebastiaan van Stijn <github@gone.nl>
600 lines
19 KiB
Go
600 lines
19 KiB
Go
package daemon // import "github.com/docker/docker/daemon"
|
|
|
|
import (
|
|
"context"
|
|
"fmt"
|
|
"math"
|
|
"path/filepath"
|
|
"runtime"
|
|
"strings"
|
|
|
|
"github.com/Microsoft/hcsshim"
|
|
"github.com/Microsoft/hcsshim/osversion"
|
|
"github.com/containerd/containerd/log"
|
|
containertypes "github.com/docker/docker/api/types/container"
|
|
"github.com/docker/docker/container"
|
|
"github.com/docker/docker/daemon/config"
|
|
"github.com/docker/docker/libcontainerd/local"
|
|
"github.com/docker/docker/libcontainerd/remote"
|
|
"github.com/docker/docker/libnetwork"
|
|
nwconfig "github.com/docker/docker/libnetwork/config"
|
|
winlibnetwork "github.com/docker/docker/libnetwork/drivers/windows"
|
|
"github.com/docker/docker/libnetwork/netlabel"
|
|
"github.com/docker/docker/libnetwork/options"
|
|
"github.com/docker/docker/libnetwork/scope"
|
|
"github.com/docker/docker/pkg/idtools"
|
|
"github.com/docker/docker/pkg/parsers"
|
|
"github.com/docker/docker/pkg/parsers/operatingsystem"
|
|
"github.com/docker/docker/pkg/sysinfo"
|
|
"github.com/docker/docker/pkg/system"
|
|
"github.com/docker/docker/runconfig"
|
|
"github.com/pkg/errors"
|
|
"golang.org/x/sys/windows"
|
|
"golang.org/x/sys/windows/svc/mgr"
|
|
)
|
|
|
|
const (
|
|
isWindows = true
|
|
windowsMinCPUShares = 1
|
|
windowsMaxCPUShares = 10000
|
|
windowsMinCPUPercent = 1
|
|
windowsMaxCPUPercent = 100
|
|
|
|
windowsV1RuntimeName = "com.docker.hcsshim.v1"
|
|
windowsV2RuntimeName = "io.containerd.runhcs.v1"
|
|
)
|
|
|
|
// Windows containers are much larger than Linux containers and each of them
|
|
// have > 20 system processes which why we use much smaller parallelism value.
|
|
func adjustParallelLimit(n int, limit int) int {
|
|
return int(math.Max(1, math.Floor(float64(runtime.NumCPU())*.8)))
|
|
}
|
|
|
|
// Windows has no concept of an execution state directory. So use config.Root here.
|
|
func getPluginExecRoot(cfg *config.Config) string {
|
|
return filepath.Join(cfg.Root, "plugins")
|
|
}
|
|
|
|
func (daemon *Daemon) parseSecurityOpt(daemonCfg *config.Config, securityOptions *container.SecurityOptions, hostConfig *containertypes.HostConfig) error {
|
|
return nil
|
|
}
|
|
|
|
func setupInitLayer(idMapping idtools.IdentityMapping) func(string) error {
|
|
return nil
|
|
}
|
|
|
|
// adaptContainerSettings is called during container creation to modify any
|
|
// settings necessary in the HostConfig structure.
|
|
func (daemon *Daemon) adaptContainerSettings(daemonCfg *config.Config, hostConfig *containertypes.HostConfig, adjustCPUShares bool) error {
|
|
return nil
|
|
}
|
|
|
|
// verifyPlatformContainerResources performs platform-specific validation of the container's resource-configuration
|
|
func verifyPlatformContainerResources(resources *containertypes.Resources, isHyperv bool) (warnings []string, err error) {
|
|
fixMemorySwappiness(resources)
|
|
if !isHyperv {
|
|
// The processor resource controls are mutually exclusive on
|
|
// Windows Server Containers, the order of precedence is
|
|
// CPUCount first, then CPUShares, and CPUPercent last.
|
|
if resources.CPUCount > 0 {
|
|
if resources.CPUShares > 0 {
|
|
warnings = append(warnings, "Conflicting options: CPU count takes priority over CPU shares on Windows Server Containers. CPU shares discarded")
|
|
resources.CPUShares = 0
|
|
}
|
|
if resources.CPUPercent > 0 {
|
|
warnings = append(warnings, "Conflicting options: CPU count takes priority over CPU percent on Windows Server Containers. CPU percent discarded")
|
|
resources.CPUPercent = 0
|
|
}
|
|
} else if resources.CPUShares > 0 {
|
|
if resources.CPUPercent > 0 {
|
|
warnings = append(warnings, "Conflicting options: CPU shares takes priority over CPU percent on Windows Server Containers. CPU percent discarded")
|
|
resources.CPUPercent = 0
|
|
}
|
|
}
|
|
}
|
|
|
|
if resources.CPUShares < 0 || resources.CPUShares > windowsMaxCPUShares {
|
|
return warnings, fmt.Errorf("range of CPUShares is from %d to %d", windowsMinCPUShares, windowsMaxCPUShares)
|
|
}
|
|
if resources.CPUPercent < 0 || resources.CPUPercent > windowsMaxCPUPercent {
|
|
return warnings, fmt.Errorf("range of CPUPercent is from %d to %d", windowsMinCPUPercent, windowsMaxCPUPercent)
|
|
}
|
|
if resources.CPUCount < 0 {
|
|
return warnings, fmt.Errorf("invalid CPUCount: CPUCount cannot be negative")
|
|
}
|
|
|
|
if resources.NanoCPUs > 0 && resources.CPUPercent > 0 {
|
|
return warnings, fmt.Errorf("conflicting options: Nano CPUs and CPU Percent cannot both be set")
|
|
}
|
|
if resources.NanoCPUs > 0 && resources.CPUShares > 0 {
|
|
return warnings, fmt.Errorf("conflicting options: Nano CPUs and CPU Shares cannot both be set")
|
|
}
|
|
// The precision we could get is 0.01, because on Windows we have to convert to CPUPercent.
|
|
// We don't set the lower limit here and it is up to the underlying platform (e.g., Windows) to return an error.
|
|
if resources.NanoCPUs < 0 || resources.NanoCPUs > int64(sysinfo.NumCPU())*1e9 {
|
|
return warnings, fmt.Errorf("range of CPUs is from 0.01 to %d.00, as there are only %d CPUs available", sysinfo.NumCPU(), sysinfo.NumCPU())
|
|
}
|
|
|
|
if len(resources.BlkioDeviceReadBps) > 0 {
|
|
return warnings, fmt.Errorf("invalid option: Windows does not support BlkioDeviceReadBps")
|
|
}
|
|
if len(resources.BlkioDeviceReadIOps) > 0 {
|
|
return warnings, fmt.Errorf("invalid option: Windows does not support BlkioDeviceReadIOps")
|
|
}
|
|
if len(resources.BlkioDeviceWriteBps) > 0 {
|
|
return warnings, fmt.Errorf("invalid option: Windows does not support BlkioDeviceWriteBps")
|
|
}
|
|
if len(resources.BlkioDeviceWriteIOps) > 0 {
|
|
return warnings, fmt.Errorf("invalid option: Windows does not support BlkioDeviceWriteIOps")
|
|
}
|
|
if resources.BlkioWeight > 0 {
|
|
return warnings, fmt.Errorf("invalid option: Windows does not support BlkioWeight")
|
|
}
|
|
if len(resources.BlkioWeightDevice) > 0 {
|
|
return warnings, fmt.Errorf("invalid option: Windows does not support BlkioWeightDevice")
|
|
}
|
|
if resources.CgroupParent != "" {
|
|
return warnings, fmt.Errorf("invalid option: Windows does not support CgroupParent")
|
|
}
|
|
if resources.CPUPeriod != 0 {
|
|
return warnings, fmt.Errorf("invalid option: Windows does not support CPUPeriod")
|
|
}
|
|
if resources.CpusetCpus != "" {
|
|
return warnings, fmt.Errorf("invalid option: Windows does not support CpusetCpus")
|
|
}
|
|
if resources.CpusetMems != "" {
|
|
return warnings, fmt.Errorf("invalid option: Windows does not support CpusetMems")
|
|
}
|
|
if resources.KernelMemory != 0 {
|
|
return warnings, fmt.Errorf("invalid option: Windows does not support KernelMemory")
|
|
}
|
|
if resources.MemoryReservation != 0 {
|
|
return warnings, fmt.Errorf("invalid option: Windows does not support MemoryReservation")
|
|
}
|
|
if resources.MemorySwap != 0 {
|
|
return warnings, fmt.Errorf("invalid option: Windows does not support MemorySwap")
|
|
}
|
|
if resources.MemorySwappiness != nil {
|
|
return warnings, fmt.Errorf("invalid option: Windows does not support MemorySwappiness")
|
|
}
|
|
if resources.OomKillDisable != nil && *resources.OomKillDisable {
|
|
return warnings, fmt.Errorf("invalid option: Windows does not support OomKillDisable")
|
|
}
|
|
if resources.PidsLimit != nil && *resources.PidsLimit != 0 {
|
|
return warnings, fmt.Errorf("invalid option: Windows does not support PidsLimit")
|
|
}
|
|
if len(resources.Ulimits) != 0 {
|
|
return warnings, fmt.Errorf("invalid option: Windows does not support Ulimits")
|
|
}
|
|
return warnings, nil
|
|
}
|
|
|
|
// verifyPlatformContainerSettings performs platform-specific validation of the
|
|
// hostconfig and config structures.
|
|
func verifyPlatformContainerSettings(daemon *Daemon, daemonCfg *configStore, hostConfig *containertypes.HostConfig, update bool) (warnings []string, err error) {
|
|
if hostConfig == nil {
|
|
return nil, nil
|
|
}
|
|
return verifyPlatformContainerResources(&hostConfig.Resources, daemon.runAsHyperVContainer(hostConfig))
|
|
}
|
|
|
|
// verifyDaemonSettings performs validation of daemon config struct
|
|
func verifyDaemonSettings(config *config.Config) error {
|
|
return nil
|
|
}
|
|
|
|
// checkSystem validates platform-specific requirements
|
|
func checkSystem() error {
|
|
// Validate the OS version. Note that dockerd.exe must be manifested for this
|
|
// call to return the correct version.
|
|
if osversion.Get().MajorVersion < 10 || osversion.Build() < osversion.RS5 {
|
|
return fmt.Errorf("this version of Windows does not support the docker daemon (Windows build %d or higher is required)", osversion.RS5)
|
|
}
|
|
|
|
vmcompute := windows.NewLazySystemDLL("vmcompute.dll")
|
|
if vmcompute.Load() != nil {
|
|
return fmt.Errorf("failed to load vmcompute.dll, ensure that the Containers feature is installed")
|
|
}
|
|
|
|
// Ensure that the required Host Network Service and vmcompute services
|
|
// are running. Docker will fail in unexpected ways if this is not present.
|
|
requiredServices := []string{"hns", "vmcompute"}
|
|
if err := ensureServicesInstalled(requiredServices); err != nil {
|
|
return errors.Wrap(err, "a required service is not installed, ensure the Containers feature is installed")
|
|
}
|
|
|
|
return nil
|
|
}
|
|
|
|
func ensureServicesInstalled(services []string) error {
|
|
m, err := mgr.Connect()
|
|
if err != nil {
|
|
return err
|
|
}
|
|
defer m.Disconnect()
|
|
for _, service := range services {
|
|
s, err := m.OpenService(service)
|
|
if err != nil {
|
|
return errors.Wrapf(err, "failed to open service %s", service)
|
|
}
|
|
s.Close()
|
|
}
|
|
return nil
|
|
}
|
|
|
|
// configureKernelSecuritySupport configures and validate security support for the kernel
|
|
func configureKernelSecuritySupport(config *config.Config, driverName string) error {
|
|
return nil
|
|
}
|
|
|
|
// configureMaxThreads sets the Go runtime max threads threshold
|
|
func configureMaxThreads(config *config.Config) error {
|
|
return nil
|
|
}
|
|
|
|
func (daemon *Daemon) initNetworkController(daemonCfg *config.Config, activeSandboxes map[string]interface{}) error {
|
|
netOptions, err := daemon.networkOptions(daemonCfg, nil, nil)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
daemon.netController, err = libnetwork.New(netOptions...)
|
|
if err != nil {
|
|
return errors.Wrap(err, "error obtaining controller instance")
|
|
}
|
|
|
|
hnsresponse, err := hcsshim.HNSListNetworkRequest("GET", "", "")
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
// Remove networks not present in HNS
|
|
for _, v := range daemon.netController.Networks() {
|
|
hnsid := v.Info().DriverOptions()[winlibnetwork.HNSID]
|
|
found := false
|
|
|
|
for _, v := range hnsresponse {
|
|
if v.Id == hnsid {
|
|
found = true
|
|
break
|
|
}
|
|
}
|
|
|
|
if !found {
|
|
// non-default nat networks should be re-created if missing from HNS
|
|
if v.Type() == "nat" && v.Name() != "nat" {
|
|
_, _, v4Conf, v6Conf := v.Info().IpamConfig()
|
|
netOption := map[string]string{}
|
|
for k, v := range v.Info().DriverOptions() {
|
|
if k != winlibnetwork.NetworkName && k != winlibnetwork.HNSID {
|
|
netOption[k] = v
|
|
}
|
|
}
|
|
name := v.Name()
|
|
id := v.ID()
|
|
|
|
err = v.Delete()
|
|
if err != nil {
|
|
log.G(context.TODO()).Errorf("Error occurred when removing network %v", err)
|
|
}
|
|
|
|
_, err := daemon.netController.NewNetwork("nat", name, id,
|
|
libnetwork.NetworkOptionGeneric(options.Generic{
|
|
netlabel.GenericData: netOption,
|
|
}),
|
|
libnetwork.NetworkOptionIpam("default", "", v4Conf, v6Conf, nil),
|
|
)
|
|
if err != nil {
|
|
log.G(context.TODO()).Errorf("Error occurred when creating network %v", err)
|
|
}
|
|
continue
|
|
}
|
|
|
|
// global networks should not be deleted by local HNS
|
|
if v.Info().Scope() != scope.Global {
|
|
err = v.Delete()
|
|
if err != nil {
|
|
log.G(context.TODO()).Errorf("Error occurred when removing network %v", err)
|
|
}
|
|
}
|
|
}
|
|
}
|
|
|
|
_, err = daemon.netController.NewNetwork("null", "none", "", libnetwork.NetworkOptionPersist(false))
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
defaultNetworkExists := false
|
|
|
|
if network, err := daemon.netController.NetworkByName(runconfig.DefaultDaemonNetworkMode().NetworkName()); err == nil {
|
|
hnsid := network.Info().DriverOptions()[winlibnetwork.HNSID]
|
|
for _, v := range hnsresponse {
|
|
if hnsid == v.Id {
|
|
defaultNetworkExists = true
|
|
break
|
|
}
|
|
}
|
|
}
|
|
|
|
// discover and add HNS networks to windows
|
|
// network that exist are removed and added again
|
|
for _, v := range hnsresponse {
|
|
networkTypeNorm := strings.ToLower(v.Type)
|
|
if networkTypeNorm == "private" || networkTypeNorm == "internal" {
|
|
continue // workaround for HNS reporting unsupported networks
|
|
}
|
|
var n *libnetwork.Network
|
|
s := func(current *libnetwork.Network) bool {
|
|
hnsid := current.Info().DriverOptions()[winlibnetwork.HNSID]
|
|
if hnsid == v.Id {
|
|
n = current
|
|
return true
|
|
}
|
|
return false
|
|
}
|
|
|
|
daemon.netController.WalkNetworks(s)
|
|
|
|
drvOptions := make(map[string]string)
|
|
nid := ""
|
|
if n != nil {
|
|
nid = n.ID()
|
|
|
|
// global networks should not be deleted by local HNS
|
|
if n.Info().Scope() == scope.Global {
|
|
continue
|
|
}
|
|
v.Name = n.Name()
|
|
// This will not cause network delete from HNS as the network
|
|
// is not yet populated in the libnetwork windows driver
|
|
|
|
// restore option if it existed before
|
|
drvOptions = n.Info().DriverOptions()
|
|
n.Delete()
|
|
}
|
|
netOption := map[string]string{
|
|
winlibnetwork.NetworkName: v.Name,
|
|
winlibnetwork.HNSID: v.Id,
|
|
}
|
|
|
|
// add persisted driver options
|
|
for k, v := range drvOptions {
|
|
if k != winlibnetwork.NetworkName && k != winlibnetwork.HNSID {
|
|
netOption[k] = v
|
|
}
|
|
}
|
|
|
|
v4Conf := []*libnetwork.IpamConf{}
|
|
for _, subnet := range v.Subnets {
|
|
ipamV4Conf := libnetwork.IpamConf{}
|
|
ipamV4Conf.PreferredPool = subnet.AddressPrefix
|
|
ipamV4Conf.Gateway = subnet.GatewayAddress
|
|
v4Conf = append(v4Conf, &ipamV4Conf)
|
|
}
|
|
|
|
name := v.Name
|
|
|
|
// If there is no nat network create one from the first NAT network
|
|
// encountered if it doesn't already exist
|
|
if !defaultNetworkExists &&
|
|
runconfig.DefaultDaemonNetworkMode() == containertypes.NetworkMode(strings.ToLower(v.Type)) &&
|
|
n == nil {
|
|
name = runconfig.DefaultDaemonNetworkMode().NetworkName()
|
|
defaultNetworkExists = true
|
|
}
|
|
|
|
v6Conf := []*libnetwork.IpamConf{}
|
|
_, err := daemon.netController.NewNetwork(strings.ToLower(v.Type), name, nid,
|
|
libnetwork.NetworkOptionGeneric(options.Generic{
|
|
netlabel.GenericData: netOption,
|
|
}),
|
|
libnetwork.NetworkOptionIpam("default", "", v4Conf, v6Conf, nil),
|
|
)
|
|
if err != nil {
|
|
log.G(context.TODO()).Errorf("Error occurred when creating network %v", err)
|
|
}
|
|
}
|
|
|
|
if !daemonCfg.DisableBridge {
|
|
// Initialize default driver "bridge"
|
|
if err := initBridgeDriver(daemon.netController, daemonCfg.BridgeConfig); err != nil {
|
|
return err
|
|
}
|
|
}
|
|
|
|
return nil
|
|
}
|
|
|
|
func initBridgeDriver(controller *libnetwork.Controller, config config.BridgeConfig) error {
|
|
if _, err := controller.NetworkByName(runconfig.DefaultDaemonNetworkMode().NetworkName()); err == nil {
|
|
return nil
|
|
}
|
|
|
|
netOption := map[string]string{
|
|
winlibnetwork.NetworkName: runconfig.DefaultDaemonNetworkMode().NetworkName(),
|
|
}
|
|
|
|
var ipamOption libnetwork.NetworkOption
|
|
var subnetPrefix string
|
|
|
|
if config.FixedCIDR != "" {
|
|
subnetPrefix = config.FixedCIDR
|
|
}
|
|
|
|
if subnetPrefix != "" {
|
|
ipamV4Conf := libnetwork.IpamConf{PreferredPool: subnetPrefix}
|
|
v4Conf := []*libnetwork.IpamConf{&ipamV4Conf}
|
|
v6Conf := []*libnetwork.IpamConf{}
|
|
ipamOption = libnetwork.NetworkOptionIpam("default", "", v4Conf, v6Conf, nil)
|
|
}
|
|
|
|
_, err := controller.NewNetwork(string(runconfig.DefaultDaemonNetworkMode()), runconfig.DefaultDaemonNetworkMode().NetworkName(), "",
|
|
libnetwork.NetworkOptionGeneric(options.Generic{
|
|
netlabel.GenericData: netOption,
|
|
}),
|
|
ipamOption,
|
|
)
|
|
if err != nil {
|
|
return errors.Wrap(err, "error creating default network")
|
|
}
|
|
|
|
return nil
|
|
}
|
|
|
|
// registerLinks sets up links between containers and writes the
|
|
// configuration out for persistence. As of Windows TP4, links are not supported.
|
|
func (daemon *Daemon) registerLinks(container *container.Container, hostConfig *containertypes.HostConfig) error {
|
|
return nil
|
|
}
|
|
|
|
func (daemon *Daemon) cleanupMountsByID(in string) error {
|
|
return nil
|
|
}
|
|
|
|
func (daemon *Daemon) cleanupMounts(*config.Config) error {
|
|
return nil
|
|
}
|
|
|
|
func recursiveUnmount(_ string) error {
|
|
return nil
|
|
}
|
|
|
|
func setupRemappedRoot(config *config.Config) (idtools.IdentityMapping, error) {
|
|
return idtools.IdentityMapping{}, nil
|
|
}
|
|
|
|
func setupDaemonRoot(config *config.Config, rootDir string, rootIdentity idtools.Identity) error {
|
|
config.Root = rootDir
|
|
// Create the root directory if it doesn't exists
|
|
if err := system.MkdirAllWithACL(config.Root, 0, system.SddlAdministratorsLocalSystem); err != nil {
|
|
return err
|
|
}
|
|
return nil
|
|
}
|
|
|
|
// runasHyperVContainer returns true if we are going to run as a Hyper-V container
|
|
func (daemon *Daemon) runAsHyperVContainer(hostConfig *containertypes.HostConfig) bool {
|
|
if hostConfig.Isolation.IsDefault() {
|
|
// Container is set to use the default, so take the default from the daemon configuration
|
|
return daemon.defaultIsolation.IsHyperV()
|
|
}
|
|
|
|
// Container is requesting an isolation mode. Honour it.
|
|
return hostConfig.Isolation.IsHyperV()
|
|
}
|
|
|
|
// conditionalMountOnStart is a platform specific helper function during the
|
|
// container start to call mount.
|
|
func (daemon *Daemon) conditionalMountOnStart(container *container.Container) error {
|
|
if daemon.runAsHyperVContainer(container.HostConfig) {
|
|
// We do not mount if a Hyper-V container as it needs to be mounted inside the
|
|
// utility VM, not the host.
|
|
return nil
|
|
}
|
|
return daemon.Mount(container)
|
|
}
|
|
|
|
// conditionalUnmountOnCleanup is a platform specific helper function called
|
|
// during the cleanup of a container to unmount.
|
|
func (daemon *Daemon) conditionalUnmountOnCleanup(container *container.Container) error {
|
|
if daemon.runAsHyperVContainer(container.HostConfig) {
|
|
// We do not unmount if a Hyper-V container
|
|
return nil
|
|
}
|
|
return daemon.Unmount(container)
|
|
}
|
|
|
|
func driverOptions(_ *config.Config) nwconfig.Option {
|
|
return nil
|
|
}
|
|
|
|
// setDefaultIsolation determine the default isolation mode for the
|
|
// daemon to run in. This is only applicable on Windows
|
|
func (daemon *Daemon) setDefaultIsolation(config *config.Config) error {
|
|
// On client SKUs, default to Hyper-V. @engine maintainers. This
|
|
// should not be removed. Ping Microsoft folks is there are PRs to
|
|
// to change this.
|
|
if operatingsystem.IsWindowsClient() {
|
|
daemon.defaultIsolation = containertypes.IsolationHyperV
|
|
} else {
|
|
daemon.defaultIsolation = containertypes.IsolationProcess
|
|
}
|
|
for _, option := range config.ExecOptions {
|
|
key, val, err := parsers.ParseKeyValueOpt(option)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
key = strings.ToLower(key)
|
|
switch key {
|
|
|
|
case "isolation":
|
|
if !containertypes.Isolation(val).IsValid() {
|
|
return fmt.Errorf("Invalid exec-opt value for 'isolation':'%s'", val)
|
|
}
|
|
if containertypes.Isolation(val).IsHyperV() {
|
|
daemon.defaultIsolation = containertypes.IsolationHyperV
|
|
}
|
|
if containertypes.Isolation(val).IsProcess() {
|
|
daemon.defaultIsolation = containertypes.IsolationProcess
|
|
}
|
|
default:
|
|
return fmt.Errorf("Unrecognised exec-opt '%s'\n", key)
|
|
}
|
|
}
|
|
|
|
log.G(context.TODO()).Infof("Windows default isolation mode: %s", daemon.defaultIsolation)
|
|
return nil
|
|
}
|
|
|
|
func setMayDetachMounts() error {
|
|
return nil
|
|
}
|
|
|
|
func (daemon *Daemon) setupSeccompProfile(*config.Config) error {
|
|
return nil
|
|
}
|
|
|
|
func setupResolvConf(config *config.Config) {}
|
|
|
|
func getSysInfo(*config.Config) *sysinfo.SysInfo {
|
|
return sysinfo.New()
|
|
}
|
|
|
|
func (daemon *Daemon) initLibcontainerd(ctx context.Context, cfg *config.Config) error {
|
|
var err error
|
|
|
|
rt := cfg.DefaultRuntime
|
|
if rt == "" {
|
|
if cfg.ContainerdAddr == "" {
|
|
rt = windowsV1RuntimeName
|
|
} else {
|
|
rt = windowsV2RuntimeName
|
|
}
|
|
}
|
|
|
|
switch rt {
|
|
case windowsV1RuntimeName:
|
|
daemon.containerd, err = local.NewClient(
|
|
ctx,
|
|
daemon.containerdClient,
|
|
filepath.Join(cfg.ExecRoot, "containerd"),
|
|
cfg.ContainerdNamespace,
|
|
daemon,
|
|
)
|
|
case windowsV2RuntimeName:
|
|
if cfg.ContainerdAddr == "" {
|
|
return fmt.Errorf("cannot use the specified runtime %q without containerd", rt)
|
|
}
|
|
daemon.containerd, err = remote.NewClient(
|
|
ctx,
|
|
daemon.containerdClient,
|
|
filepath.Join(cfg.ExecRoot, "containerd"),
|
|
cfg.ContainerdNamespace,
|
|
daemon,
|
|
)
|
|
default:
|
|
return fmt.Errorf("unknown windows runtime %s", rt)
|
|
}
|
|
|
|
return err
|
|
}
|