Merge pull request #17700 from calavera/remove_lxc
Remove LXC support. Upstream-commit: 2519f465501657c24ecd13b8e53964b6c2f1a78d Component: engine
This commit is contained in:
@ -175,7 +175,6 @@ Create a container
|
||||
"HostConfig": {
|
||||
"Binds": ["/tmp:/tmp"],
|
||||
"Links": ["redis3:redis"],
|
||||
"LxcConf": {"lxc.utsname":"docker"},
|
||||
"Memory": 0,
|
||||
"MemorySwap": 0,
|
||||
"MemoryReservation": 0,
|
||||
@ -271,8 +270,6 @@ Json Parameters:
|
||||
+ `volume_name:container_path:ro` to make the bind mount read-only inside the container.
|
||||
- **Links** - A list of links for the container. Each link entry should be
|
||||
in the form of `container_name:alias`.
|
||||
- **LxcConf** - LXC specific configurations. These configurations only
|
||||
work when using the `lxc` execution driver.
|
||||
- **PortBindings** - A map of exposed container ports and the host port they
|
||||
should map to. A JSON object in the form
|
||||
`{ <port>/<protocol>: [{ "HostPort": "<port>" }] }`
|
||||
@ -676,8 +673,6 @@ Status Codes:
|
||||
|
||||
This endpoint returns a live stream of a container's resource usage statistics.
|
||||
|
||||
> **Note**: this functionality currently only works when using the *libcontainer* exec-driver.
|
||||
|
||||
**Example request**:
|
||||
|
||||
GET /containers/redis1/stats HTTP/1.1
|
||||
|
||||
@ -48,7 +48,6 @@ Creates a new container.
|
||||
--link=[] Add link to another container
|
||||
--log-driver="" Logging driver for container
|
||||
--log-opt=[] Log driver specific options
|
||||
--lxc-conf=[] Add custom lxc options
|
||||
-m, --memory="" Memory limit
|
||||
--mac-address="" Container MAC address (e.g. 92:d0:c6:0a:29:33)
|
||||
--memory-reservation="" Memory soft limit
|
||||
|
||||
@ -29,7 +29,6 @@ weight = -1
|
||||
--dns-opt=[] DNS options to use
|
||||
--dns-search=[] DNS search domains to use
|
||||
--default-ulimit=[] Set default ulimit settings for containers
|
||||
-e, --exec-driver="native" Exec driver to use
|
||||
--exec-opt=[] Set exec driver options
|
||||
--exec-root="/var/run/docker" Root of the Docker execdriver
|
||||
--fixed-cidr="" IPv4 subnet for fixed IPs
|
||||
@ -439,11 +438,6 @@ Currently supported options of `zfs`:
|
||||
The Docker daemon uses a specifically built `libcontainer` execution driver as
|
||||
its interface to the Linux kernel `namespaces`, `cgroups`, and `SELinux`.
|
||||
|
||||
There is still legacy support for the original [LXC userspace tools](
|
||||
https://linuxcontainers.org/) via the `lxc` execution driver, however, this is
|
||||
not where the primary development of new functionality is taking place.
|
||||
Add `-e lxc` to the daemon flags to use the `lxc` execution driver.
|
||||
|
||||
## Options for the native execdriver
|
||||
|
||||
You can configure the `native` (libcontainer) execdriver using options specified
|
||||
|
||||
@ -47,7 +47,6 @@ parent = "smn_cli"
|
||||
--link=[] Add link to another container
|
||||
--log-driver="" Logging driver for container
|
||||
--log-opt=[] Log driver specific options
|
||||
--lxc-conf=[] Add custom lxc options
|
||||
-m, --memory="" Memory limit
|
||||
--mac-address="" Container MAC address (e.g. 92:d0:c6:0a:29:33)
|
||||
--memory-reservation="" Memory soft limit
|
||||
|
||||
@ -39,7 +39,6 @@ defaults related to:
|
||||
* container identification
|
||||
* network settings
|
||||
* runtime constraints on CPU and memory
|
||||
* privileges and LXC configuration
|
||||
|
||||
With the `docker run [OPTIONS]` an operator can add to or override the
|
||||
image defaults set by a developer. And, additionally, operators can
|
||||
@ -75,7 +74,7 @@ following options.
|
||||
- [Restart policies (--restart)](#restart-policies-restart)
|
||||
- [Clean up (--rm)](#clean-up-rm)
|
||||
- [Runtime constraints on resources](#runtime-constraints-on-resources)
|
||||
- [Runtime privilege, Linux capabilities, and LXC configuration](#runtime-privilege-linux-capabilities-and-lxc-configuration)
|
||||
- [Runtime privilege and Linux capabilities](#runtime-privilege-and-linux-capabilities)
|
||||
|
||||
## Detached vs foreground
|
||||
|
||||
@ -965,21 +964,18 @@ one can use this flag:
|
||||
$ docker run -ti --rm --group-add audio --group-add dbus --group-add 777 busybox id
|
||||
uid=0(root) gid=0(root) groups=10(wheel),29(audio),81(dbus),777
|
||||
|
||||
## Runtime privilege, Linux capabilities, and LXC configuration
|
||||
## Runtime privilege and Linux capabilities
|
||||
|
||||
--cap-add: Add Linux capabilities
|
||||
--cap-drop: Drop Linux capabilities
|
||||
--privileged=false: Give extended privileges to this container
|
||||
--device=[]: Allows you to run devices inside the container without the --privileged flag.
|
||||
--lxc-conf=[]: Add custom lxc options
|
||||
|
||||
By default, Docker containers are "unprivileged" and cannot, for
|
||||
example, run a Docker daemon inside a Docker container. This is because
|
||||
by default a container is not allowed to access any devices, but a
|
||||
"privileged" container is given access to all devices (see [lxc-template.go](
|
||||
https://github.com/docker/docker/blob/master/daemon/execdriver/lxc/lxc_template.go)
|
||||
and documentation on [cgroups devices](
|
||||
https://www.kernel.org/doc/Documentation/cgroups/devices.txt)).
|
||||
"privileged" container is given access to all devices (see
|
||||
the documentation on [cgroups devices](https://www.kernel.org/doc/Documentation/cgroups/devices.txt)).
|
||||
|
||||
When the operator executes `docker run --privileged`, Docker will enable
|
||||
to access to all devices on the host as well as set some configuration
|
||||
@ -1093,22 +1089,6 @@ To mount a FUSE based filesystem, you need to combine both `--cap-add` and
|
||||
....
|
||||
|
||||
|
||||
If the Docker daemon was started using the `lxc` exec-driver
|
||||
(`docker daemon --exec-driver=lxc`) then the operator can also specify LXC options
|
||||
using one or more `--lxc-conf` parameters. These can be new parameters or
|
||||
override existing parameters from the [lxc-template.go](
|
||||
https://github.com/docker/docker/blob/master/daemon/execdriver/lxc/lxc_template.go).
|
||||
Note that in the future, a given host's docker daemon may not use LXC, so this
|
||||
is an implementation-specific configuration meant for operators already
|
||||
familiar with using LXC directly.
|
||||
|
||||
> **Note:**
|
||||
> If you use `--lxc-conf` to modify a container's configuration which is also
|
||||
> managed by the Docker daemon, then the Docker daemon will not know about this
|
||||
> modification, and you will need to manage any conflicts yourself. For example,
|
||||
> you can use `--lxc-conf` to set a container's IP address, but this will not be
|
||||
> reflected in the `/etc/hosts` file.
|
||||
|
||||
## Logging drivers (--log-driver)
|
||||
|
||||
The container can have a different logging driver than the Docker daemon. Use
|
||||
@ -1290,7 +1270,6 @@ above, or already defined by the developer with a Dockerfile `ENV`:
|
||||
declare -x PATH="/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin"
|
||||
declare -x PWD="/"
|
||||
declare -x SHLVL="1"
|
||||
declare -x container="lxc"
|
||||
declare -x deep="purple"
|
||||
|
||||
Similarly the operator can set the **hostname** with `-h`.
|
||||
|
||||
Reference in New Issue
Block a user