Home
last modified time | relevance | path

Searched refs:HostConfig (Results 1 – 25 of 1653) sorted by relevance

12345678910>>...67

/dports/net-mgmt/promscale/promscale-0.6.2/vendor/github.com/docker/docker/integration/internal/container/
H A Dops.go25 c.HostConfig.Links = links
77 c.HostConfig.Mounts = append(c.HostConfig.Mounts, m)
94 c.HostConfig.Binds = append(c.HostConfig.Binds, fmt.Sprintf("%s:%s", src, target))
101 if c.HostConfig.Tmpfs == nil {
161 if c.HostConfig == nil {
162 c.HostConfig = &containertypes.HostConfig{}
185 if c.HostConfig == nil {
186 c.HostConfig = &containertypes.HostConfig{}
195 if c.HostConfig == nil {
196 c.HostConfig = &containertypes.HostConfig{}
[all …]
/dports/net-mgmt/prometheus2/prometheus-2.30.3/vendor/github.com/docker/docker/integration/internal/container/
H A Dops.go25 c.HostConfig.Links = links
77 c.HostConfig.Mounts = append(c.HostConfig.Mounts, m)
94 c.HostConfig.Binds = append(c.HostConfig.Binds, fmt.Sprintf("%s:%s", src, target))
101 if c.HostConfig.Tmpfs == nil {
161 if c.HostConfig == nil {
162 c.HostConfig = &containertypes.HostConfig{}
185 if c.HostConfig == nil {
186 c.HostConfig = &containertypes.HostConfig{}
195 if c.HostConfig == nil {
196 c.HostConfig = &containertypes.HostConfig{}
[all …]
/dports/net-im/dendrite/dendrite-0.5.1/vendor/github.com/docker/docker/integration/internal/container/
H A Dops.go25 c.HostConfig.Links = links
77 c.HostConfig.Mounts = append(c.HostConfig.Mounts, m)
94 c.HostConfig.Binds = append(c.HostConfig.Binds, fmt.Sprintf("%s:%s", src, target))
101 if c.HostConfig.Tmpfs == nil {
161 if c.HostConfig == nil {
162 c.HostConfig = &containertypes.HostConfig{}
185 if c.HostConfig == nil {
186 c.HostConfig = &containertypes.HostConfig{}
195 if c.HostConfig == nil {
196 c.HostConfig = &containertypes.HostConfig{}
[all …]
/dports/devel/gitlab-runner/gitlab-runner-8925d9a06fd8e452e2161a768462652a2a13111f/vendor/github.com/docker/docker/moby-20.10.2/integration/internal/container/
H A Dops.go25 c.HostConfig.Links = links
77 c.HostConfig.Mounts = append(c.HostConfig.Mounts, m)
94 c.HostConfig.Binds = append(c.HostConfig.Binds, fmt.Sprintf("%s:%s", src, target))
101 if c.HostConfig.Tmpfs == nil {
161 if c.HostConfig == nil {
162 c.HostConfig = &containertypes.HostConfig{}
185 if c.HostConfig == nil {
186 c.HostConfig = &containertypes.HostConfig{}
195 if c.HostConfig == nil {
196 c.HostConfig = &containertypes.HostConfig{}
[all …]
/dports/sysutils/kubectl/kubernetes-1.22.2/pkg/kubelet/dockershim/
H A Dsecurity_context_test.go145 setPrivHC := &dockercontainer.HostConfig{
159 setCapsHC := &dockercontainer.HostConfig{
175 expected *dockercontainer.HostConfig
284 expected *dockercontainer.HostConfig
319 expected *dockercontainer.HostConfig
326 expected: &dockercontainer.HostConfig{
335 expected: &dockercontainer.HostConfig{
345 expected: &dockercontainer.HostConfig{
355 expected: &dockercontainer.HostConfig{
385 expected *dockercontainer.HostConfig
[all …]
/dports/net-mgmt/promscale/promscale-0.6.2/vendor/github.com/docker/docker/daemon/
H A Doci_linux_test.go47 if c.HostConfig == nil {
48 c.HostConfig = new(containertypes.HostConfig)
69 HostConfig: &containertypes.HostConfig{
91 HostConfig: &containertypes.HostConfig{
120 HostConfig: &containertypes.HostConfig{
142 c.HostConfig.Sysctls["kernel.domainname"] = "foobar.net"
143 assert.Assert(t, c.HostConfig.Sysctls["kernel.domainname"] != c.Config.Domainname)
144 c.HostConfig.Sysctls["net.ipv4.ip_unprivileged_port_start"] = "1024"
149 assert.Equal(t, s.Linux.Sysctl["kernel.domainname"], c.HostConfig.Sysctls["kernel.domainname"])
159 HostConfig: &containertypes.HostConfig{
[all …]
H A Doci_windows.go63 if c.HostConfig.Isolation.IsDefault() {
68 isHyperV = c.HostConfig.Isolation.IsHyperV()
134 Height: c.HostConfig.ConsoleSize[0],
135 Width: c.HostConfig.ConsoleSize[1],
275 if len(c.HostConfig.Devices) > 0 {
306 if c.HostConfig == nil || c.HostConfig.SecurityOpt == nil {
379 Readonly: c.HostConfig.ReadonlyRootfs,
393 …s.TweakCapabilities(caps.DefaultCapabilities(), c.HostConfig.CapAdd, c.HostConfig.CapDrop, c.HostC…
413 if c.HostConfig.NanoCPUs > 0 {
455 if c.HostConfig.IOMaximumBandwidth != 0 || c.HostConfig.IOMaximumIOps != 0 {
[all …]
/dports/net-mgmt/prometheus2/prometheus-2.30.3/vendor/github.com/docker/docker/daemon/
H A Doci_linux_test.go47 if c.HostConfig == nil {
48 c.HostConfig = new(containertypes.HostConfig)
69 HostConfig: &containertypes.HostConfig{
91 HostConfig: &containertypes.HostConfig{
120 HostConfig: &containertypes.HostConfig{
142 c.HostConfig.Sysctls["kernel.domainname"] = "foobar.net"
143 assert.Assert(t, c.HostConfig.Sysctls["kernel.domainname"] != c.Config.Domainname)
144 c.HostConfig.Sysctls["net.ipv4.ip_unprivileged_port_start"] = "1024"
149 assert.Equal(t, s.Linux.Sysctl["kernel.domainname"], c.HostConfig.Sysctls["kernel.domainname"])
159 HostConfig: &containertypes.HostConfig{
[all …]
H A Doci_windows.go63 if c.HostConfig.Isolation.IsDefault() {
68 isHyperV = c.HostConfig.Isolation.IsHyperV()
134 Height: c.HostConfig.ConsoleSize[0],
135 Width: c.HostConfig.ConsoleSize[1],
275 if len(c.HostConfig.Devices) > 0 {
306 if c.HostConfig == nil || c.HostConfig.SecurityOpt == nil {
379 Readonly: c.HostConfig.ReadonlyRootfs,
393 …s.TweakCapabilities(caps.DefaultCapabilities(), c.HostConfig.CapAdd, c.HostConfig.CapDrop, c.HostC…
413 if c.HostConfig.NanoCPUs > 0 {
455 if c.HostConfig.IOMaximumBandwidth != 0 || c.HostConfig.IOMaximumIOps != 0 {
[all …]
/dports/net-im/dendrite/dendrite-0.5.1/vendor/github.com/docker/docker/daemon/
H A Doci_linux_test.go47 if c.HostConfig == nil {
48 c.HostConfig = new(containertypes.HostConfig)
69 HostConfig: &containertypes.HostConfig{
91 HostConfig: &containertypes.HostConfig{
120 HostConfig: &containertypes.HostConfig{
142 c.HostConfig.Sysctls["kernel.domainname"] = "foobar.net"
143 assert.Assert(t, c.HostConfig.Sysctls["kernel.domainname"] != c.Config.Domainname)
144 c.HostConfig.Sysctls["net.ipv4.ip_unprivileged_port_start"] = "1024"
149 assert.Equal(t, s.Linux.Sysctl["kernel.domainname"], c.HostConfig.Sysctls["kernel.domainname"])
159 HostConfig: &containertypes.HostConfig{
[all …]
H A Doci_windows.go63 if c.HostConfig.Isolation.IsDefault() {
68 isHyperV = c.HostConfig.Isolation.IsHyperV()
134 Height: c.HostConfig.ConsoleSize[0],
135 Width: c.HostConfig.ConsoleSize[1],
275 if len(c.HostConfig.Devices) > 0 {
306 if c.HostConfig == nil || c.HostConfig.SecurityOpt == nil {
379 Readonly: c.HostConfig.ReadonlyRootfs,
393 …s.TweakCapabilities(caps.DefaultCapabilities(), c.HostConfig.CapAdd, c.HostConfig.CapDrop, c.HostC…
413 if c.HostConfig.NanoCPUs > 0 {
455 if c.HostConfig.IOMaximumBandwidth != 0 || c.HostConfig.IOMaximumIOps != 0 {
[all …]
/dports/devel/gitlab-runner/gitlab-runner-8925d9a06fd8e452e2161a768462652a2a13111f/vendor/github.com/docker/docker/moby-20.10.2/daemon/
H A Doci_linux_test.go47 if c.HostConfig == nil {
48 c.HostConfig = new(containertypes.HostConfig)
69 HostConfig: &containertypes.HostConfig{
91 HostConfig: &containertypes.HostConfig{
120 HostConfig: &containertypes.HostConfig{
142 c.HostConfig.Sysctls["kernel.domainname"] = "foobar.net"
143 assert.Assert(t, c.HostConfig.Sysctls["kernel.domainname"] != c.Config.Domainname)
144 c.HostConfig.Sysctls["net.ipv4.ip_unprivileged_port_start"] = "1024"
149 assert.Equal(t, s.Linux.Sysctl["kernel.domainname"], c.HostConfig.Sysctls["kernel.domainname"])
159 HostConfig: &containertypes.HostConfig{
[all …]
H A Doci_windows.go63 if c.HostConfig.Isolation.IsDefault() {
68 isHyperV = c.HostConfig.Isolation.IsHyperV()
134 Height: c.HostConfig.ConsoleSize[0],
135 Width: c.HostConfig.ConsoleSize[1],
275 if len(c.HostConfig.Devices) > 0 {
306 if c.HostConfig == nil || c.HostConfig.SecurityOpt == nil {
379 Readonly: c.HostConfig.ReadonlyRootfs,
393 …s.TweakCapabilities(caps.DefaultCapabilities(), c.HostConfig.CapAdd, c.HostConfig.CapDrop, c.HostC…
413 if c.HostConfig.NanoCPUs > 0 {
455 if c.HostConfig.IOMaximumBandwidth != 0 || c.HostConfig.IOMaximumIOps != 0 {
[all …]
/dports/security/vault/vault-1.8.2/vendor/github.com/hashicorp/vic/vendor/github.com/docker/docker/daemon/
H A Doci_windows.go63 s.Process.ConsoleSize.Height = c.HostConfig.ConsoleSize[0]
64 s.Process.ConsoleSize.Width = c.HostConfig.ConsoleSize[1]
70 if c.HostConfig.Isolation.IsDefault() {
75 isHyperV = c.HostConfig.Isolation.IsHyperV()
84 cpuShares := uint16(c.HostConfig.CPUShares)
85 cpuPercent := uint8(c.HostConfig.CPUPercent)
86 if c.HostConfig.NanoCPUs > 0 {
89 cpuCount := uint64(c.HostConfig.CPUCount)
90 memoryLimit := uint64(c.HostConfig.Memory)
105 Bps: &c.HostConfig.IOMaximumBandwidth,
[all …]
/dports/databases/timescaledb-backup/timescaledb-backup-0.1.1/vendor/github.com/docker/docker/daemon/
H A Doci_windows.go62 if c.HostConfig.Isolation.IsDefault() {
67 isHyperV = c.HostConfig.Isolation.IsHyperV()
133 Height: c.HostConfig.ConsoleSize[0],
134 Width: c.HostConfig.ConsoleSize[1],
274 if len(c.HostConfig.Devices) > 0 {
305 if c.HostConfig == nil || c.HostConfig.SecurityOpt == nil {
378 Readonly: c.HostConfig.ReadonlyRootfs,
392 …lities(oci.DefaultCapabilities(), c.HostConfig.CapAdd, c.HostConfig.CapDrop, c.HostConfig.Capabili…
412 if c.HostConfig.NanoCPUs > 0 {
454 if c.HostConfig.IOMaximumBandwidth != 0 || c.HostConfig.IOMaximumIOps != 0 {
[all …]
H A Doci_linux_test.go46 if c.HostConfig == nil {
47 c.HostConfig = new(containertypes.HostConfig)
67 HostConfig: &containertypes.HostConfig{
88 HostConfig: &containertypes.HostConfig{
116 HostConfig: &containertypes.HostConfig{
130 c.HostConfig.Sysctls["kernel.domainname"] = "foobar.net"
131 assert.Assert(t, c.HostConfig.Sysctls["kernel.domainname"] != c.Config.Domainname)
136 assert.Equal(t, s.Linux.Sysctl["kernel.domainname"], c.HostConfig.Sysctls["kernel.domainname"])
/dports/sysutils/istio/istio-1.6.7/vendor/github.com/docker/docker/daemon/
H A Doci_windows.go62 if c.HostConfig.Isolation.IsDefault() {
67 isHyperV = c.HostConfig.Isolation.IsHyperV()
133 Height: c.HostConfig.ConsoleSize[0],
134 Width: c.HostConfig.ConsoleSize[1],
274 if len(c.HostConfig.Devices) > 0 {
305 if c.HostConfig == nil || c.HostConfig.SecurityOpt == nil {
378 Readonly: c.HostConfig.ReadonlyRootfs,
392 …lities(oci.DefaultCapabilities(), c.HostConfig.CapAdd, c.HostConfig.CapDrop, c.HostConfig.Capabili…
412 if c.HostConfig.NanoCPUs > 0 {
454 if c.HostConfig.IOMaximumBandwidth != 0 || c.HostConfig.IOMaximumIOps != 0 {
[all …]
H A Doci_linux_test.go46 if c.HostConfig == nil {
47 c.HostConfig = new(containertypes.HostConfig)
67 HostConfig: &containertypes.HostConfig{
88 HostConfig: &containertypes.HostConfig{
116 HostConfig: &containertypes.HostConfig{
130 c.HostConfig.Sysctls["kernel.domainname"] = "foobar.net"
131 assert.Assert(t, c.HostConfig.Sysctls["kernel.domainname"] != c.Config.Domainname)
136 assert.Equal(t, s.Linux.Sysctl["kernel.domainname"], c.HostConfig.Sysctls["kernel.domainname"])
/dports/sysutils/istio/istio-1.6.7/vendor/github.com/docker/docker/integration/internal/container/
H A Dops.go23 c.HostConfig.Links = links
44 c.HostConfig.NetworkMode = containertypes.NetworkMode(mode)
75 c.HostConfig.Mounts = append(c.HostConfig.Mounts, m)
92 c.HostConfig.Binds = append(c.HostConfig.Binds, fmt.Sprintf("%s:%s", src, target))
131 c.HostConfig.LogConfig.Type = driver
137 c.HostConfig.AutoRemove = true
143 if c.HostConfig == nil {
144 c.HostConfig = &containertypes.HostConfig{}
146 c.HostConfig.PidsLimit = limit
153 c.HostConfig.RestartPolicy.Name = policy
/dports/databases/timescaledb-backup/timescaledb-backup-0.1.1/vendor/github.com/docker/docker/integration/internal/container/
H A Dops.go23 c.HostConfig.Links = links
44 c.HostConfig.NetworkMode = containertypes.NetworkMode(mode)
75 c.HostConfig.Mounts = append(c.HostConfig.Mounts, m)
92 c.HostConfig.Binds = append(c.HostConfig.Binds, fmt.Sprintf("%s:%s", src, target))
131 c.HostConfig.LogConfig.Type = driver
137 c.HostConfig.AutoRemove = true
143 if c.HostConfig == nil {
144 c.HostConfig = &containertypes.HostConfig{}
146 c.HostConfig.PidsLimit = limit
153 c.HostConfig.RestartPolicy.Name = policy
/dports/databases/cayley/cayley-0.7.5-2-gcf576ba/vendor/github.com/docker/docker/integration/internal/container/
H A Dops.go22 c.HostConfig.Links = links
43 c.HostConfig.NetworkMode = containertypes.NetworkMode(mode)
84 c.HostConfig.Binds = append(c.HostConfig.Binds, fmt.Sprintf("%s:%s", src, target))
123 if c.HostConfig == nil {
124 c.HostConfig = &containertypes.HostConfig{}
126 c.HostConfig.LogConfig.Type = driver
132 if c.HostConfig == nil {
133 c.HostConfig = &containertypes.HostConfig{}
135 c.HostConfig.AutoRemove = true
/dports/net-p2p/go-ethereum/go-ethereum-1.10.14/vendor/github.com/docker/docker/integration/internal/container/
H A Dops.go22 c.HostConfig.Links = links
43 c.HostConfig.NetworkMode = containertypes.NetworkMode(mode)
84 c.HostConfig.Binds = append(c.HostConfig.Binds, fmt.Sprintf("%s:%s", src, target))
123 if c.HostConfig == nil {
124 c.HostConfig = &containertypes.HostConfig{}
126 c.HostConfig.LogConfig.Type = driver
132 if c.HostConfig == nil {
133 c.HostConfig = &containertypes.HostConfig{}
135 c.HostConfig.AutoRemove = true
/dports/sysutils/docker/docker-ce-18.09.5/components/engine/integration/internal/container/
H A Dops.go22 c.HostConfig.Links = links
43 c.HostConfig.NetworkMode = containertypes.NetworkMode(mode)
84 c.HostConfig.Binds = append(c.HostConfig.Binds, fmt.Sprintf("%s:%s", src, target))
123 if c.HostConfig == nil {
124 c.HostConfig = &containertypes.HostConfig{}
126 c.HostConfig.LogConfig.Type = driver
132 if c.HostConfig == nil {
133 c.HostConfig = &containertypes.HostConfig{}
135 c.HostConfig.AutoRemove = true
/dports/databases/cayley/cayley-0.7.5-2-gcf576ba/vendor/github.com/docker/docker/daemon/
H A Doci_windows.go61 if c.HostConfig.Isolation.IsDefault() {
66 isHyperV = c.HostConfig.Isolation.IsHyperV()
136 Height: c.HostConfig.ConsoleSize[0],
137 Width: c.HostConfig.ConsoleSize[1],
187 if c.HostConfig.NetworkMode.IsContainer() {
255 cpuCount := uint64(c.HostConfig.CPUCount)
256 if c.HostConfig.NanoCPUs > 0 {
276 memoryLimit := uint64(c.HostConfig.Memory)
287 Bps: &c.HostConfig.IOMaximumBandwidth,
288 Iops: &c.HostConfig.IOMaximumIOps,
[all …]
/dports/net-p2p/go-ethereum/go-ethereum-1.10.14/vendor/github.com/docker/docker/daemon/
H A Doci_windows.go61 if c.HostConfig.Isolation.IsDefault() {
66 isHyperV = c.HostConfig.Isolation.IsHyperV()
136 Height: c.HostConfig.ConsoleSize[0],
137 Width: c.HostConfig.ConsoleSize[1],
187 if c.HostConfig.NetworkMode.IsContainer() {
255 cpuCount := uint64(c.HostConfig.CPUCount)
256 if c.HostConfig.NanoCPUs > 0 {
276 memoryLimit := uint64(c.HostConfig.Memory)
287 Bps: &c.HostConfig.IOMaximumBandwidth,
288 Iops: &c.HostConfig.IOMaximumIOps,
[all …]

12345678910>>...67