Signed-off-by: Christophe Vidal <kriss@krizalys.com>
| ... | ... |
@@ -2284,7 +2284,7 @@ by another client (#15489) |
| 2284 | 2284 |
- Use mock for search tests. |
| 2285 | 2285 |
- Update to double-dash everywhere. |
| 2286 | 2286 |
- Move .dockerenv parsing to lxc driver. |
| 2287 |
-- Move all bind-mounts in the container inside the namespace. |
|
| 2287 |
+- Move all bind mounts in the container inside the namespace. |
|
| 2288 | 2288 |
- Don't use separate bind mount for container. |
| 2289 | 2289 |
- Always symlink /dev/ptmx for libcontainer. |
| 2290 | 2290 |
- Don't kill by pid for other drivers. |
| ... | ... |
@@ -2719,7 +2719,7 @@ With the ongoing changes to the networking and execution subsystems of docker te |
| 2719 | 2719 |
+ Implement `docker log -f` to stream logs |
| 2720 | 2720 |
+ Add env variable to disable kernel version warning |
| 2721 | 2721 |
+ Add -format to `docker inspect` |
| 2722 |
-+ Support bind-mount for files |
|
| 2722 |
++ Support bind mount for files |
|
| 2723 | 2723 |
- Fix bridge creation on RHEL |
| 2724 | 2724 |
- Fix image size calculation |
| 2725 | 2725 |
- Make sure iptables are called even if the bridge already exists |
| ... | ... |
@@ -132,8 +132,8 @@ |
| 132 | 132 |
# Important notes: |
| 133 | 133 |
# --------------- |
| 134 | 134 |
# |
| 135 |
-# Don't attempt to use a bind-mount to pass a local directory as the bundles target |
|
| 136 |
-# directory. It does not work (golang attempts for follow a mapped folder incorrectly). |
|
| 135 |
+# Don't attempt to use a bind mount to pass a local directory as the bundles target |
|
| 136 |
+# directory. It does not work (golang attempts for follow a mapped folder incorrectly). |
|
| 137 | 137 |
# Instead, use docker cp as per the example. |
| 138 | 138 |
# |
| 139 | 139 |
# go.zip is not removed from the image as it is used by the Windows CI servers |
| ... | ... |
@@ -577,7 +577,7 @@ definitions: |
| 577 | 577 |
A list of volume bindings for this container. Each volume binding is a string in one of these forms: |
| 578 | 578 |
|
| 579 | 579 |
- `host-src:container-dest` to bind-mount a host path into the container. Both `host-src`, and `container-dest` must be an _absolute_ path. |
| 580 |
- - `host-src:container-dest:ro` to make the bind-mount read-only inside the container. Both `host-src`, and `container-dest` must be an _absolute_ path. |
|
| 580 |
+ - `host-src:container-dest:ro` to make the bind mount read-only inside the container. Both `host-src`, and `container-dest` must be an _absolute_ path. |
|
| 581 | 581 |
- `volume-name:container-dest` to bind-mount a volume managed by a volume driver into the container. `container-dest` must be an _absolute_ path. |
| 582 | 582 |
- `volume-name:container-dest:ro` to mount the volume read-only inside the container. `container-dest` must be an _absolute_ path. |
| 583 | 583 |
items: |
| ... | ... |
@@ -67,7 +67,7 @@ var Propagations = []Propagation{
|
| 67 | 67 |
type Consistency string |
| 68 | 68 |
|
| 69 | 69 |
const ( |
| 70 |
- // ConsistencyFull guarantees bind-mount-like consistency |
|
| 70 |
+ // ConsistencyFull guarantees bind mount-like consistency |
|
| 71 | 71 |
ConsistencyFull Consistency = "consistent" |
| 72 | 72 |
// ConsistencyCached mounts can cache read data and FS structure |
| 73 | 73 |
ConsistencyCached Consistency = "cached" |
| ... | ... |
@@ -232,11 +232,11 @@ Create a container |
| 232 | 232 |
- **ExposedPorts** - An object mapping ports to an empty object in the form of: |
| 233 | 233 |
`"ExposedPorts": { "<port>/<tcp|udp>: {}" }`
|
| 234 | 234 |
- **HostConfig** |
| 235 |
- - **Binds** – A list of bind-mounts for this container. Each item is a string in one of these forms: |
|
| 235 |
+ - **Binds** – A list of bind mounts for this container. Each item is a string in one of these forms: |
|
| 236 | 236 |
+ `host-src:container-dest` to bind-mount a host path into the |
| 237 | 237 |
container. Both `host-src`, and `container-dest` must be an |
| 238 | 238 |
_absolute_ path. |
| 239 |
- + `host-src:container-dest:ro` to make the bind-mount read-only |
|
| 239 |
+ + `host-src:container-dest:ro` to make the bind mount read-only |
|
| 240 | 240 |
inside the container. Both `host-src`, and `container-dest` must be |
| 241 | 241 |
an _absolute_ path. |
| 242 | 242 |
- **Links** - A list of links for the container. Each link entry should be |
| ... | ... |
@@ -239,11 +239,11 @@ Create a container |
| 239 | 239 |
- **ExposedPorts** - An object mapping ports to an empty object in the form of: |
| 240 | 240 |
`"ExposedPorts": { "<port>/<tcp|udp>: {}" }`
|
| 241 | 241 |
- **HostConfig** |
| 242 |
- - **Binds** – A list of bind-mounts for this container. Each item is a string in one of these forms: |
|
| 242 |
+ - **Binds** – A list of bind mounts for this container. Each item is a string in one of these forms: |
|
| 243 | 243 |
+ `host-src:container-dest` to bind-mount a host path into the |
| 244 | 244 |
container. Both `host-src`, and `container-dest` must be an |
| 245 | 245 |
_absolute_ path. |
| 246 |
- + `host-src:container-dest:ro` to make the bind-mount read-only |
|
| 246 |
+ + `host-src:container-dest:ro` to make the bind mount read-only |
|
| 247 | 247 |
inside the container. Both `host-src`, and `container-dest` must be |
| 248 | 248 |
an _absolute_ path. |
| 249 | 249 |
- **Links** - A list of links for the container. Each link entry should be |
| ... | ... |
@@ -239,11 +239,11 @@ Create a container |
| 239 | 239 |
- **ExposedPorts** - An object mapping ports to an empty object in the form of: |
| 240 | 240 |
`"ExposedPorts": { "<port>/<tcp|udp>: {}" }`
|
| 241 | 241 |
- **HostConfig** |
| 242 |
- - **Binds** – A list of bind-mounts for this container. Each item is a string in one of these forms: |
|
| 242 |
+ - **Binds** – A list of bind mounts for this container. Each item is a string in one of these forms: |
|
| 243 | 243 |
+ `host-src:container-dest` to bind-mount a host path into the |
| 244 | 244 |
container. Both `host-src`, and `container-dest` must be an |
| 245 | 245 |
_absolute_ path. |
| 246 |
- + `host-src:container-dest:ro` to make the bind-mount read-only |
|
| 246 |
+ + `host-src:container-dest:ro` to make the bind mount read-only |
|
| 247 | 247 |
inside the container. Both `host-src`, and `container-dest` must be |
| 248 | 248 |
an _absolute_ path. |
| 249 | 249 |
- **Links** - A list of links for the container. Each link entry should be |
| ... | ... |
@@ -255,7 +255,7 @@ Create a container |
| 255 | 255 |
+ `host-src:container-dest` to bind-mount a host path into the |
| 256 | 256 |
container. Both `host-src`, and `container-dest` must be an |
| 257 | 257 |
_absolute_ path. |
| 258 |
- + `host-src:container-dest:ro` to make the bind-mount read-only |
|
| 258 |
+ + `host-src:container-dest:ro` to make the bind mount read-only |
|
| 259 | 259 |
inside the container. Both `host-src`, and `container-dest` must be |
| 260 | 260 |
an _absolute_ path. |
| 261 | 261 |
+ `volume-name:container-dest` to bind-mount a volume managed by a |
| ... | ... |
@@ -357,7 +357,7 @@ Create a container |
| 357 | 357 |
+ `host-src:container-dest` to bind-mount a host path into the |
| 358 | 358 |
container. Both `host-src`, and `container-dest` must be an |
| 359 | 359 |
_absolute_ path. |
| 360 |
- + `host-src:container-dest:ro` to make the bind-mount read-only |
|
| 360 |
+ + `host-src:container-dest:ro` to make the bind mount read-only |
|
| 361 | 361 |
inside the container. Both `host-src`, and `container-dest` must be |
| 362 | 362 |
an _absolute_ path. |
| 363 | 363 |
+ `volume-name:container-dest` to bind-mount a volume managed by a |
| ... | ... |
@@ -382,7 +382,7 @@ Create a container |
| 382 | 382 |
+ `host-src:container-dest` to bind-mount a host path into the |
| 383 | 383 |
container. Both `host-src`, and `container-dest` must be an |
| 384 | 384 |
_absolute_ path. |
| 385 |
- + `host-src:container-dest:ro` to make the bind-mount read-only |
|
| 385 |
+ + `host-src:container-dest:ro` to make the bind mount read-only |
|
| 386 | 386 |
inside the container. Both `host-src`, and `container-dest` must be |
| 387 | 387 |
an _absolute_ path. |
| 388 | 388 |
+ `volume-name:container-dest` to bind-mount a volume managed by a |
| ... | ... |
@@ -414,7 +414,7 @@ Create a container |
| 414 | 414 |
+ `host-src:container-dest` to bind-mount a host path into the |
| 415 | 415 |
container. Both `host-src`, and `container-dest` must be an |
| 416 | 416 |
_absolute_ path. |
| 417 |
- + `host-src:container-dest:ro` to make the bind-mount read-only |
|
| 417 |
+ + `host-src:container-dest:ro` to make the bind mount read-only |
|
| 418 | 418 |
inside the container. Both `host-src`, and `container-dest` must be |
| 419 | 419 |
an _absolute_ path. |
| 420 | 420 |
+ `volume-name:container-dest` to bind-mount a volume managed by a |
| ... | ... |
@@ -2185,7 +2185,7 @@ func (s *DockerSuite) TestVolumesNoCopyData(c *check.C) {
|
| 2185 | 2185 |
|
| 2186 | 2186 |
tmpDir := testutil.RandomTmpDirPath("docker_test_bind_mount_copy_data", testEnv.DaemonPlatform())
|
| 2187 | 2187 |
if out, _, err := dockerCmdWithError("run", "-v", tmpDir+":/foo", "dataimage", "ls", "-lh", "/foo/bar"); err == nil || !strings.Contains(out, "No such file or directory") {
|
| 2188 |
- c.Fatalf("Data was copied on bind-mount but shouldn't be:\n%q", out)
|
|
| 2188 |
+ c.Fatalf("Data was copied on bind mount but shouldn't be:\n%q", out)
|
|
| 2189 | 2189 |
} |
| 2190 | 2190 |
} |
| 2191 | 2191 |
|
| ... | ... |
@@ -156,7 +156,7 @@ func DefaultLinuxSpec() specs.Spec {
|
| 156 | 156 |
}, |
| 157 | 157 |
// Devices implicitly contains the following devices: |
| 158 | 158 |
// null, zero, full, random, urandom, tty, console, and ptmx. |
| 159 |
- // ptmx is a bind-mount or symlink of the container's ptmx. |
|
| 159 |
+ // ptmx is a bind mount or symlink of the container's ptmx. |
|
| 160 | 160 |
// See also: https://github.com/opencontainers/runtime-spec/blob/master/config-linux.md#default-devices |
| 161 | 161 |
Devices: []specs.LinuxDevice{},
|
| 162 | 162 |
Resources: &specs.LinuxResources{
|