summaryrefslogtreecommitdiff
path: root/plugin/defs.go
Commit message (Collapse)AuthorAgeFilesLines
* plugin: use strings.Cut()Sebastiaan van Stijn2022-12-211-7/+4
| | | | Signed-off-by: Sebastiaan van Stijn <github@gone.nl>
* goimports: fix importsSebastiaan van Stijn2019-09-181-2/+2
| | | | | | | Format the source according to latest goimports. Signed-off-by: Kir Kolyshkin <kolyshkin@gmail.com> Signed-off-by: Sebastiaan van Stijn <github@gone.nl>
* Support environment vars in Swarm plugins servicesSune Keller2019-04-071-0/+27
| | | | | | | | Allow specifying environment variables when installing an engine plugin as a Swarm service. Invalid environment variable entries (without an equals (`=`) char) will be ignored. Signed-off-by: Sune Keller <absukl@almbrand.dk>
* Various code-cleanupSebastiaan van Stijn2018-05-231-1/+1
| | | | | | remove unnescessary import aliases, brackets, and so on. Signed-off-by: Sebastiaan van Stijn <github@gone.nl>
* Merge pull request #35829 from cpuguy83/no_private_mount_for_pluginsSebastiaan van Stijn2018-02-211-1/+14
|\ | | | | Perform plugin mounts in the runtime
| * Use runtime spec modifier for metrics plugin hookBrian Goff2018-02-071-1/+14
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | Currently the metrics plugin uses a really hackish host mount with propagated mounts to get the metrics socket into a plugin after the plugin is alreay running. This approach ends up leaking mounts which requires setting the plugin manager root to private, which causes some other issues. With this change, plugin subsystems can register a set of modifiers to apply to the plugin's runtime spec before the plugin is ever started. This will help to generalize some of the customization work that needs to happen for various plugin subsystems (and future ones). Specifically it lets the metrics plugin subsystem append a mount to the runtime spec to mount the metrics socket in the plugin's mount namespace rather than the host's and prevetns any leaking due to this mount. Signed-off-by: Brian Goff <cpuguy83@gmail.com>
* | Add canonical import commentDaniel Nephin2018-02-051-1/+1
|/ | | | Signed-off-by: Daniel Nephin <dnephin@docker.com>
* Make plugin emit strongly typed, consumable eventsBrian Goff2017-07-061-0/+11
| | | | | | | | | Enables other subsystems to watch actions for a plugin(s). This will be used specifically for implementing plugins on swarm where a swarm controller needs to watch the state of a plugin. Signed-off-by: Brian Goff <cpuguy83@gmail.com>
* When authz plugin is disabled, remove from authz middleware chain.Anusha Ragunathan2017-03-221-1/+1
| | | | | | | | | | | | | | | When the daemon is configured to run with an authorization-plugin and if the plugin is disabled, the daemon continues to send API requests to the plugin and expect it to respond. But the plugin has been disabled. As a result, all API requests are blocked. Fix this behavior by removing the disabled plugin from the authz middleware chain. Tested using riyaz/authz-no-volume-plugin and observed that after disabling the plugin, API request/response is functional. Fixes #31836 Signed-off-by: Anusha Ragunathan <anusha.ragunathan@docker.com>
* Implement content addressability for pluginsTonis Tiigi2016-12-231-0/+26
Move plugins to shared distribution stack with images. Create immutable plugin config that matches schema2 requirements. Ensure data being pushed is same as pulled/created. Store distribution artifacts in a blobstore. Run init layer setup for every plugin start. Fix breakouts from unsafe file accesses. Add support for `docker plugin install --alias` Uses normalized references for default names to avoid collisions when using default hosts/tags. Some refactoring of the plugin manager to support the change, like removing the singleton manager and adding manager config struct. Signed-off-by: Tonis Tiigi <tonistiigi@gmail.com> Signed-off-by: Derek McGowan <derek@mcgstyle.net>