summaryrefslogtreecommitdiff
path: root/daemon/volumes_linux.go
Commit message (Collapse)AuthorAgeFilesLines
* Fix the several typos detected by github.com/client9/misspellKazuhiro Sera2018-08-091-1/+1
| | | | Signed-off-by: Kazuhiro Sera <seratch@gmail.com>
* Use rslave propagation for mounts from daemon rootBrian Goff2018-02-071-0/+36
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | By default, if a user requests a bind mount it uses private propagation. When the source path is a path within the daemon root this, along with some other propagation values that the user can use, causes issues when the daemon tries to remove a mountpoint because a container will then have a private reference to that mount which prevents removal. Unmouting with MNT_DETATCH can help this scenario on newer kernels, but ultimately this is just covering up the problem and doesn't actually free up the underlying resources until all references are destroyed. This change does essentially 2 things: 1. Change the default propagation when unspecified to `rslave` when the source path is within the daemon root path or a parent of the daemon root (because everything is using rbinds). 2. Creates a validation error on create when the user tries to specify an unacceptable propagation mode for these paths... basically the only two acceptable modes are `rslave` and `rshared`. In cases where we have used the new default propagation but the underlying filesystem is not setup to handle it (fs must hvae at least rshared propagation) instead of erroring out like we normally would, this falls back to the old default mode of `private`, which preserves backwards compatibility. Signed-off-by: Brian Goff <cpuguy83@gmail.com>
* make docker compile on freebsdAlexey Guskov2015-07-291-400/+0
| | | | Signed-off-by: Alexey Guskov <lexag@mail.ru>
* Windows: Factoring out unused fieldsJohn Howard2015-07-271-0/+280
| | | | Signed-off-by: John Howard <jhoward@microsoft.com>
* Do not hide user provided network mounts [v2]Stefan Berger2015-07-221-6/+7
| | | | | | | | | | Prevent the docker daemon from mounting the created network files over those provided by the user via -v command line option. This would otherwise hide the one provide by the user. The benefit of this is that a user can provide these network files using the -v command line option and place them in a size-limited filesystem. Signed-off-by: Stefan Berger <stefanb@us.ibm.com>
* Allow to downgrade local volumes from > 1.7 to 1.6.David Calavera2015-06-091-22/+39
| | | | Signed-off-by: David Calavera <david.calavera@gmail.com>
* Windows: Fix PR13278 compile breakJohn Howard2015-06-081-0/+32
| | | | Signed-off-by: John Howard <jhoward@microsoft.com>
* Volumes refactor and external plugin implementation.David Calavera2015-05-211-25/+36
| | | | | | | | | | | | Signed by all authors: Signed-off-by: Michael Crosby <crosbymichael@gmail.com> Signed-off-by: Arnaud Porterie <arnaud.porterie@docker.com> Signed-off-by: David Calavera <david.calavera@gmail.com> Signed-off-by: Jeff Lindsay <progrium@gmail.com> Signed-off-by: Alexander Morozov <lk4d4@docker.com> Signed-off-by: Luke Marsden <luke@clusterhq.com> Signed-off-by: David Calavera <david.calavera@gmail.com>
* Windows: Refactor containerJohn Howard2015-05-161-0/+35
| | | | Signed-off-by: John Howard <jhoward@microsoft.com>
* Windows: Refactor volumesJohn Howard2015-04-271-0/+24
Signed-off-by: John Howard <jhoward@microsoft.com>