mirror of https://github.com/docker/docs.git
Merge pull request #6452 from mheon/selinux_btrfs_fix
Error if Docker daemon starts with BTRFS graph driver and SELinux enabled
This commit is contained in:
commit
219a3345de
|
@ -778,6 +778,11 @@ func NewDaemonFromDirectory(config *daemonconfig.Config, eng *engine.Engine) (*D
|
||||||
}
|
}
|
||||||
utils.Debugf("Using graph driver %s", driver)
|
utils.Debugf("Using graph driver %s", driver)
|
||||||
|
|
||||||
|
// As Docker on btrfs and SELinux are incompatible at present, error on both being enabled
|
||||||
|
if config.EnableSelinuxSupport && driver.String() == "btrfs" {
|
||||||
|
return nil, fmt.Errorf("SELinux is not supported with the BTRFS graph driver!")
|
||||||
|
}
|
||||||
|
|
||||||
daemonRepo := path.Join(config.Root, "containers")
|
daemonRepo := path.Join(config.Root, "containers")
|
||||||
|
|
||||||
if err := os.MkdirAll(daemonRepo, 0700); err != nil && !os.IsExist(err) {
|
if err := os.MkdirAll(daemonRepo, 0700); err != nil && !os.IsExist(err) {
|
||||||
|
|
|
@ -66,7 +66,7 @@ func main() {
|
||||||
flCa = flag.String([]string{"-tlscacert"}, dockerConfDir+defaultCaFile, "Trust only remotes providing a certificate signed by the CA given here")
|
flCa = flag.String([]string{"-tlscacert"}, dockerConfDir+defaultCaFile, "Trust only remotes providing a certificate signed by the CA given here")
|
||||||
flCert = flag.String([]string{"-tlscert"}, dockerConfDir+defaultCertFile, "Path to TLS certificate file")
|
flCert = flag.String([]string{"-tlscert"}, dockerConfDir+defaultCertFile, "Path to TLS certificate file")
|
||||||
flKey = flag.String([]string{"-tlskey"}, dockerConfDir+defaultKeyFile, "Path to TLS key file")
|
flKey = flag.String([]string{"-tlskey"}, dockerConfDir+defaultKeyFile, "Path to TLS key file")
|
||||||
flSelinuxEnabled = flag.Bool([]string{"-selinux-enabled"}, false, "Enable selinux support")
|
flSelinuxEnabled = flag.Bool([]string{"-selinux-enabled"}, false, "Enable selinux support. SELinux does not presently support the BTRFS storage driver")
|
||||||
)
|
)
|
||||||
flag.Var(&flDns, []string{"#dns", "-dns"}, "Force Docker to use specific DNS servers")
|
flag.Var(&flDns, []string{"#dns", "-dns"}, "Force Docker to use specific DNS servers")
|
||||||
flag.Var(&flDnsSearch, []string{"-dns-search"}, "Force Docker to use specific DNS search domains")
|
flag.Var(&flDnsSearch, []string{"-dns-search"}, "Force Docker to use specific DNS search domains")
|
||||||
|
|
|
@ -74,7 +74,7 @@ unix://[/path/to/socket] to use.
|
||||||
Print version information and quit. Default is false.
|
Print version information and quit. Default is false.
|
||||||
|
|
||||||
**--selinux-enabled**=*true*|*false*
|
**--selinux-enabled**=*true*|*false*
|
||||||
Enable selinux support. Default is false.
|
Enable selinux support. Default is false. SELinux does not presently support the BTRFS storage driver.
|
||||||
|
|
||||||
# COMMANDS
|
# COMMANDS
|
||||||
**docker-attach(1)**
|
**docker-attach(1)**
|
||||||
|
|
|
@ -73,7 +73,7 @@ expect an integer, and they can only be specified once.
|
||||||
-p, --pidfile="/var/run/docker.pid" Path to use for daemon PID file
|
-p, --pidfile="/var/run/docker.pid" Path to use for daemon PID file
|
||||||
-r, --restart=true Restart previously running containers
|
-r, --restart=true Restart previously running containers
|
||||||
-s, --storage-driver="" Force the Docker runtime to use a specific storage driver
|
-s, --storage-driver="" Force the Docker runtime to use a specific storage driver
|
||||||
--selinux-enabled=false Enable selinux support
|
--selinux-enabled=false Enable selinux support. SELinux does not presently support the BTRFS storage driver
|
||||||
--storage-opt=[] Set storage driver options
|
--storage-opt=[] Set storage driver options
|
||||||
--tls=false Use TLS; implied by tls-verify flags
|
--tls=false Use TLS; implied by tls-verify flags
|
||||||
--tlscacert="/home/sven/.docker/ca.pem" Trust only remotes providing a certificate signed by the CA given here
|
--tlscacert="/home/sven/.docker/ca.pem" Trust only remotes providing a certificate signed by the CA given here
|
||||||
|
|
Loading…
Reference in New Issue