-
Update layer store to sync transaction files before committing
Fixes case where shutdown occurs before content is synced to disked on layer creation. This case can leave the layer store in an bad state and require manual recovery. This change ensures all files are synced to disk before a layer is committed. Any shutdown that occurs will only cause the layer to not show up but will allow it to be repulled or recreated without error. Added generic io logic to ioutils package to abstract it out of the layer store package. Signed-off-by: Derek McGowan <derek@mcgstyle.net>
Verified
This commit was signed with a verified signature.runcom Antonio Murdaca
GPG key ID: B2BEAD150DE936B9 Learn about signing commits
-
vendor: fix libnetwork sandbox_store panic
runcom committedFeb 20, 2018 Signed-off-by: Antonio Murdaca <runcom@redhat.com>
Verified
This commit was signed with a verified signature.runcom Antonio Murdaca
GPG key ID: B2BEAD150DE936B9 Learn about signing commits
-
Merge pull request #296 from nalind/docker-1.12.6-journal-invalidate
rhatdan committedFeb 8, 2018 Attempt to avoid leaking or holding open descriptors for deleted journal files
Verified
This commit was created on GitHub.com and signed with a verified signature using GitHub’s key.GPG key ID: 4AEE18F83AFDEB23 Learn about signing commits
-
Ignore `layer does not exist` error from `docker images`
Fix moby#31350 As we can see in `daemon.Images()`, there is a gap between `allImages = daemon.imageStore.Map()` and `l, err := daemon.layerStore.Get(layerID)`, so images which still exist when we hit `allImages = daemon.imageStore.Map()` may have already been deleted when we hit `l, err := daemon.layerStore.Get(layerID)`. ``` if danglingOnly { allImages = daemon.imageStore.Heads() } else { allImages = daemon.imageStore.Map() } ... for id, img := range allImages { ... layerID := img.RootFS.ChainID() var size int64 if layerID != "" { l, err := daemon.layerStore.Get(layerID) if err != nil { return nil, err } ``` Signed-off-by: Yuanhong Peng <pengyuanhong@huawei.com>
Verified
This commit was signed with a verified signature.runcom Antonio Murdaca
GPG key ID: B2BEAD150DE936B9 Learn about signing commits
-
Merge pull request #297 from nalind/sanitize-labels
rhatdan committedFeb 5, 2018 Sanitize docker labels when used as journald field names
Verified
This commit was created on GitHub.com and signed with a verified signature using GitHub’s key.GPG key ID: 4AEE18F83AFDEB23 Learn about signing commits -
Sanitize docker labels when used as journald field names
This fix tries to address the issue raised in moby#23528 where docker labels caused journald log error because journald has special requirements on field names. This fix addresses this issue by sanitize the labels per requirements of journald. Additional unit tests have been added to cover the changes. This fix fixes moby#23528. Signed-off-by: Yong Tang <yong.tang.github@outlook.com>
-
Merge pull request #295 from TomSweeneyRedHat/wip/fixaudit-1.12.6
rhatdan committedFeb 2, 2018 Adjust Audit init in 1.12.6 to match 1.13.1
Verified
This commit was created on GitHub.com and signed with a verified signature using GitHub’s key.GPG key ID: 4AEE18F83AFDEB23 Learn about signing commits
-
Check for errors from more sd_journal_previous() calls
Log an error if sd_journal_previous() returns an error code. If it returns 0, keep accepting that as an indication that we've hit the beginning of the journal, and that there's nothing to be done. Signed-off-by: Nalin Dahyabhai <nalin@redhat.com>
-
nalind committed
Jan 30, 2018 Fix a comment. Signed-off-by: Nalin Dahyabhai <nalin@redhat.com>
-
journal: don't stop reading early in non-follow mode
nalind committedJan 30, 2018 If the output channel gets stalled while reading the journal in non-follow mode, don't stop right away. Doing this correctly means that we need to detect when we've hit the end of the log, so start returning a value indicating whether or not we ran out of entries to read. Signed-off-by: Nalin Dahyabhai <nalin@redhat.com>
-
journal reading: move seeking out of the main read loop
nalind committedJan 29, 2018 When reading from the journal, handle seeking to the read location outside of the main reading loop. Signed-off-by: Nalin Dahyabhai <nalin@redhat.com>
-
nalind committed
Jan 29, 2018 Clean up a deferred function call in the journal reading logic. Signed-off-by: Nalin Dahyabhai <nalin@redhat.com>
-
Treat SD_JOURNAL_INVALIDATE like SD_JOURNAL_APPEND
nalind committedJan 29, 2018 When checking for updates to the journal, treat INVALIDATE results like we do APPEND results, because the library can't signal both, and in either case we need to figure out what's going on. Signed-off-by: Nalin Dahyabhai <nalin@redhat.com>
-
Periodically call sd_journal_process() when reading the journal
nalind committedJan 26, 2018 Periodically call sd_journal_process() when reading the journal, to skip over journal files which have been deleted since we started reading the journal, for cases where our keeping them open contributes to a shortage of disk space. Signed-off-by: Nalin Dahyabhai <nalin@redhat.com>
-
Call sd_journal_get_fd() earlier
nalind committedJan 26, 2018 The journal API opens the journal files when the journal handle is opened by sd_journal_open(), and uses an inotify descriptor to notice when files have been removed, but it doesn't set up that descriptor until the first time that sd_journal_get_fd() is called (either by a client, or as part of sd_journal_wait()). We hadn't been doing that until our initial read-through of entries was done, meaning that we've been missing file deletion events that occurred while we were reading the journal. Make that window shorter. Signed-off-by: Nalin Dahyabhai <nalin@redhat.com>
-
Try to avoid getting stuck when draining the journal
nalind committedJan 25, 2018 When draining the journal, if the output message channel is full, stop reading. In non-follow mode, keep reading until we start seeing entries that post-date the time when we started reading the journal. Otherwise, if we can't keep up with the journal, we never actually stop reading. Signed-off-by: Nalin Dahyabhai <nalin@redhat.com>
-
Fix data incompatibility in libnetwork
runcom committedJan 31, 2018 Fix https://bugzilla.redhat.com/show_bug.cgi?id=1540540 Signed-off-by: Antonio Murdaca <runcom@redhat.com>
Verified
This commit was signed with a verified signature.runcom Antonio Murdaca
GPG key ID: B2BEAD150DE936B9 Learn about signing commits
-
Adjust Audit init in 1.12.6 to match 1.13.1
Signed-off-by: TomSweeneyRedHat <tsweeney@redhat.com>
-
Merge pull request #292 from TomSweeneyRedHat/wip/fixaudit
rhatdan committedJan 12, 2018 Initialize Audit loggings cli.daemon
Verified
This commit was created on GitHub.com and signed with a verified signature using GitHub’s key.GPG key ID: 4AEE18F83AFDEB23 Learn about signing commits
-
Initialize Audit loggins cli.daemon
Signed-off-by: TomSweeneyRedHat <tsweeney@redhat.com>
-
Intialize Audit logging's cli.daemon
Signed-off-by: TomSweeneyRedHat <tsweeney@redhat.com>
-
BACKPORT: Do not reuse a http.Request after a failure in callWithRetry
Upstream reference: moby@62871ef Fix bugzilla: https://bugzilla.redhat.com/show_bug.cgi?id=1526369 Closes: moby#33412 Signed-off-by: Felix Abecassis <fabecassis@nvidia.com> Signed-off-by: Antonio Murdaca <runcom@redhat.com>
Verified
This commit was signed with a verified signature.runcom Antonio Murdaca
GPG key ID: B2BEAD150DE936B9 Learn about signing commits
-
Merge pull request #288 from rhvgoyal/devmapper-fix
runcom committedDec 13, 2017 BACKPORT: devicemapper: remove container rootfs mountPath after umount
Verified
This commit was created on GitHub.com and signed with a verified signature using GitHub’s key.GPG key ID: 4AEE18F83AFDEB23 Learn about signing commits
-
BACKPORT: devicemapper: remove container rootfs mountPath after umount
Upstream commit: 92e45b8 libdm currently has a fairly substantial DoS bug that makes certain operations fail on a libdm device if the device has active references through mountpoints. This is a significant problem with the advent of mount namespaces and MS_PRIVATE, and can cause certain --volume mounts to cause libdm to no longer be able to remove containers: % docker run -d --name testA busybox top % docker run -d --name testB -v /var/lib/docker:/docker busybox top % docker rm -f testA [fails on libdm with dm_task_run errors.] This also solves the problem of unprivileged users being able to DoS docker by using unprivileged mount namespaces to preseve mounts that Docker has dropped. Signed-off-by: Aleksa Sarai <asarai@suse.de>
-
BACKPORT: devmapper: Log fstype and mount options during mount error
runcom committedDec 7, 2017 Upstream reference: moby#35732 Signed-off-by: Antonio Murdaca <runcom@redhat.com>
Verified
This commit was signed with a verified signature.runcom Antonio Murdaca
GPG key ID: B2BEAD150DE936B9 Learn about signing commits
-
BACKPORT: Add /proc/scsi to masked paths
runcom committedNov 22, 2017 This is writeable, and can be used to remove devices. Containers do not need to know about scsi devices. Fix https://nvd.nist.gov/vuln/detail/CVE-2017-16539 Signed-off-by: Antonio Murdaca <runcom@redhat.com>
Verified
This commit was signed with a verified signature.runcom Antonio Murdaca
GPG key ID: B2BEAD150DE936B9 Learn about signing commits
-
BACKPORT: Fix the data model inconsistency that breaks daemon upgrade…
runcom committedNov 21, 2017 … to 1.14-dev Upstream reference: docker/libnetwork#1620 Fix https://bugzilla.redhat.com/show_bug.cgi?id=1464790 Signed-off-by: Antonio Murdaca <runcom@redhat.com>
Verified
This commit was signed with a verified signature.runcom Antonio Murdaca
GPG key ID: B2BEAD150DE936B9 Learn about signing commits
-
BACKPORT: use an encrypted client certificate to connect to a docker …
runcom committedNov 15, 2017 …daemon Fix https://bugzilla.redhat.com/show_bug.cgi?id=1510170 Signed-off-by: Antonio Murdaca <runcom@redhat.com>
Verified
This commit was signed with a verified signature.runcom Antonio Murdaca
GPG key ID: B2BEAD150DE936B9 Learn about signing commits
-
compile error fix in selinux vendor
runcom committedNov 9, 2017 Signed-off-by: Antonio Murdaca <runcom@redhat.com>
Verified
This commit was signed with a verified signature.runcom Antonio Murdaca
GPG key ID: B2BEAD150DE936B9 Learn about signing commits -
Reserve the MCS Level if the caller overrides the default.
runcom committedNov 9, 2017 Fix https://bugzilla.redhat.com/show_bug.cgi?id=1511442 Signed-off-by: Antonio Murdaca <runcom@redhat.com>
Verified
This commit was signed with a verified signature.runcom Antonio Murdaca
GPG key ID: B2BEAD150DE936B9 Learn about signing commits
-
Verified
This commit was signed with a verified signature.runcom Antonio Murdaca
GPG key ID: B2BEAD150DE936B9 Learn about signing commits
-
Upstream referece: moby@72df48d Fix Bugzilla: https://bugzilla.redhat.com/show_bug.cgi?id=1498553 Signed-off-by: Tonis Tiigi <tonistiigi@gmail.com> Signed-off-by: Antonio Murdaca <runcom@redhat.com>
Verified
This commit was signed with a verified signature.runcom Antonio Murdaca
GPG key ID: B2BEAD150DE936B9 Learn about signing commits -
Merge pull request #284 from rhatdan/docker-1.12.6
runcom committedNov 3, 2017 /dev should not be readonly with --readonly flag
Verified
This commit was created on GitHub.com and signed with a verified signature using GitHub’s key.GPG key ID: 4AEE18F83AFDEB23 Learn about signing commits -
/dev should not be readonly with --readonly flag
/dev is mounted on a tmpfs inside of a container. Processes inside of containers some times need to create devices nodes, or to setup a socket that listens on /dev/log Allowing these containers to run with the --readonly flag makes sense. Making a tmpfs readonly does not add any security to the container, since there is plenty of places where the container can write tmpfs content. I have no idea why /dev was excluded. Signed-off-by: Daniel J Walsh <dwalsh@redhat.com>
-
Merge pull request #280 from TomSweeneyRedHat/dev/tsweeney/reduce_spam
rhatdan committedOct 26, 2017 Put start/exec/create/remove events in debug to lower log spam