/dports/net-mgmt/promscale/promscale-0.6.2/vendor/github.com/docker/docker/integration/internal/container/ |
H A D | ops.go | 25 c.HostConfig.Links = links 77 c.HostConfig.Mounts = append(c.HostConfig.Mounts, m) 94 c.HostConfig.Binds = append(c.HostConfig.Binds, fmt.Sprintf("%s:%s", src, target)) 101 if c.HostConfig.Tmpfs == nil { 161 if c.HostConfig == nil { 162 c.HostConfig = &containertypes.HostConfig{} 185 if c.HostConfig == nil { 186 c.HostConfig = &containertypes.HostConfig{} 195 if c.HostConfig == nil { 196 c.HostConfig = &containertypes.HostConfig{} [all …]
|
/dports/net-mgmt/prometheus2/prometheus-2.30.3/vendor/github.com/docker/docker/integration/internal/container/ |
H A D | ops.go | 25 c.HostConfig.Links = links 77 c.HostConfig.Mounts = append(c.HostConfig.Mounts, m) 94 c.HostConfig.Binds = append(c.HostConfig.Binds, fmt.Sprintf("%s:%s", src, target)) 101 if c.HostConfig.Tmpfs == nil { 161 if c.HostConfig == nil { 162 c.HostConfig = &containertypes.HostConfig{} 185 if c.HostConfig == nil { 186 c.HostConfig = &containertypes.HostConfig{} 195 if c.HostConfig == nil { 196 c.HostConfig = &containertypes.HostConfig{} [all …]
|
/dports/net-im/dendrite/dendrite-0.5.1/vendor/github.com/docker/docker/integration/internal/container/ |
H A D | ops.go | 25 c.HostConfig.Links = links 77 c.HostConfig.Mounts = append(c.HostConfig.Mounts, m) 94 c.HostConfig.Binds = append(c.HostConfig.Binds, fmt.Sprintf("%s:%s", src, target)) 101 if c.HostConfig.Tmpfs == nil { 161 if c.HostConfig == nil { 162 c.HostConfig = &containertypes.HostConfig{} 185 if c.HostConfig == nil { 186 c.HostConfig = &containertypes.HostConfig{} 195 if c.HostConfig == nil { 196 c.HostConfig = &containertypes.HostConfig{} [all …]
|
/dports/devel/gitlab-runner/gitlab-runner-8925d9a06fd8e452e2161a768462652a2a13111f/vendor/github.com/docker/docker/moby-20.10.2/integration/internal/container/ |
H A D | ops.go | 25 c.HostConfig.Links = links 77 c.HostConfig.Mounts = append(c.HostConfig.Mounts, m) 94 c.HostConfig.Binds = append(c.HostConfig.Binds, fmt.Sprintf("%s:%s", src, target)) 101 if c.HostConfig.Tmpfs == nil { 161 if c.HostConfig == nil { 162 c.HostConfig = &containertypes.HostConfig{} 185 if c.HostConfig == nil { 186 c.HostConfig = &containertypes.HostConfig{} 195 if c.HostConfig == nil { 196 c.HostConfig = &containertypes.HostConfig{} [all …]
|
/dports/sysutils/kubectl/kubernetes-1.22.2/pkg/kubelet/dockershim/ |
H A D | security_context_test.go | 145 setPrivHC := &dockercontainer.HostConfig{ 159 setCapsHC := &dockercontainer.HostConfig{ 175 expected *dockercontainer.HostConfig 284 expected *dockercontainer.HostConfig 319 expected *dockercontainer.HostConfig 326 expected: &dockercontainer.HostConfig{ 335 expected: &dockercontainer.HostConfig{ 345 expected: &dockercontainer.HostConfig{ 355 expected: &dockercontainer.HostConfig{ 385 expected *dockercontainer.HostConfig [all …]
|
/dports/net-mgmt/promscale/promscale-0.6.2/vendor/github.com/docker/docker/daemon/ |
H A D | oci_linux_test.go | 47 if c.HostConfig == nil { 48 c.HostConfig = new(containertypes.HostConfig) 69 HostConfig: &containertypes.HostConfig{ 91 HostConfig: &containertypes.HostConfig{ 120 HostConfig: &containertypes.HostConfig{ 142 c.HostConfig.Sysctls["kernel.domainname"] = "foobar.net" 143 assert.Assert(t, c.HostConfig.Sysctls["kernel.domainname"] != c.Config.Domainname) 144 c.HostConfig.Sysctls["net.ipv4.ip_unprivileged_port_start"] = "1024" 149 assert.Equal(t, s.Linux.Sysctl["kernel.domainname"], c.HostConfig.Sysctls["kernel.domainname"]) 159 HostConfig: &containertypes.HostConfig{ [all …]
|
H A D | oci_windows.go | 63 if c.HostConfig.Isolation.IsDefault() { 68 isHyperV = c.HostConfig.Isolation.IsHyperV() 134 Height: c.HostConfig.ConsoleSize[0], 135 Width: c.HostConfig.ConsoleSize[1], 275 if len(c.HostConfig.Devices) > 0 { 306 if c.HostConfig == nil || c.HostConfig.SecurityOpt == nil { 379 Readonly: c.HostConfig.ReadonlyRootfs, 393 …s.TweakCapabilities(caps.DefaultCapabilities(), c.HostConfig.CapAdd, c.HostConfig.CapDrop, c.HostC… 413 if c.HostConfig.NanoCPUs > 0 { 455 if c.HostConfig.IOMaximumBandwidth != 0 || c.HostConfig.IOMaximumIOps != 0 { [all …]
|
/dports/net-mgmt/prometheus2/prometheus-2.30.3/vendor/github.com/docker/docker/daemon/ |
H A D | oci_linux_test.go | 47 if c.HostConfig == nil { 48 c.HostConfig = new(containertypes.HostConfig) 69 HostConfig: &containertypes.HostConfig{ 91 HostConfig: &containertypes.HostConfig{ 120 HostConfig: &containertypes.HostConfig{ 142 c.HostConfig.Sysctls["kernel.domainname"] = "foobar.net" 143 assert.Assert(t, c.HostConfig.Sysctls["kernel.domainname"] != c.Config.Domainname) 144 c.HostConfig.Sysctls["net.ipv4.ip_unprivileged_port_start"] = "1024" 149 assert.Equal(t, s.Linux.Sysctl["kernel.domainname"], c.HostConfig.Sysctls["kernel.domainname"]) 159 HostConfig: &containertypes.HostConfig{ [all …]
|
H A D | oci_windows.go | 63 if c.HostConfig.Isolation.IsDefault() { 68 isHyperV = c.HostConfig.Isolation.IsHyperV() 134 Height: c.HostConfig.ConsoleSize[0], 135 Width: c.HostConfig.ConsoleSize[1], 275 if len(c.HostConfig.Devices) > 0 { 306 if c.HostConfig == nil || c.HostConfig.SecurityOpt == nil { 379 Readonly: c.HostConfig.ReadonlyRootfs, 393 …s.TweakCapabilities(caps.DefaultCapabilities(), c.HostConfig.CapAdd, c.HostConfig.CapDrop, c.HostC… 413 if c.HostConfig.NanoCPUs > 0 { 455 if c.HostConfig.IOMaximumBandwidth != 0 || c.HostConfig.IOMaximumIOps != 0 { [all …]
|
/dports/net-im/dendrite/dendrite-0.5.1/vendor/github.com/docker/docker/daemon/ |
H A D | oci_linux_test.go | 47 if c.HostConfig == nil { 48 c.HostConfig = new(containertypes.HostConfig) 69 HostConfig: &containertypes.HostConfig{ 91 HostConfig: &containertypes.HostConfig{ 120 HostConfig: &containertypes.HostConfig{ 142 c.HostConfig.Sysctls["kernel.domainname"] = "foobar.net" 143 assert.Assert(t, c.HostConfig.Sysctls["kernel.domainname"] != c.Config.Domainname) 144 c.HostConfig.Sysctls["net.ipv4.ip_unprivileged_port_start"] = "1024" 149 assert.Equal(t, s.Linux.Sysctl["kernel.domainname"], c.HostConfig.Sysctls["kernel.domainname"]) 159 HostConfig: &containertypes.HostConfig{ [all …]
|
H A D | oci_windows.go | 63 if c.HostConfig.Isolation.IsDefault() { 68 isHyperV = c.HostConfig.Isolation.IsHyperV() 134 Height: c.HostConfig.ConsoleSize[0], 135 Width: c.HostConfig.ConsoleSize[1], 275 if len(c.HostConfig.Devices) > 0 { 306 if c.HostConfig == nil || c.HostConfig.SecurityOpt == nil { 379 Readonly: c.HostConfig.ReadonlyRootfs, 393 …s.TweakCapabilities(caps.DefaultCapabilities(), c.HostConfig.CapAdd, c.HostConfig.CapDrop, c.HostC… 413 if c.HostConfig.NanoCPUs > 0 { 455 if c.HostConfig.IOMaximumBandwidth != 0 || c.HostConfig.IOMaximumIOps != 0 { [all …]
|
/dports/devel/gitlab-runner/gitlab-runner-8925d9a06fd8e452e2161a768462652a2a13111f/vendor/github.com/docker/docker/moby-20.10.2/daemon/ |
H A D | oci_linux_test.go | 47 if c.HostConfig == nil { 48 c.HostConfig = new(containertypes.HostConfig) 69 HostConfig: &containertypes.HostConfig{ 91 HostConfig: &containertypes.HostConfig{ 120 HostConfig: &containertypes.HostConfig{ 142 c.HostConfig.Sysctls["kernel.domainname"] = "foobar.net" 143 assert.Assert(t, c.HostConfig.Sysctls["kernel.domainname"] != c.Config.Domainname) 144 c.HostConfig.Sysctls["net.ipv4.ip_unprivileged_port_start"] = "1024" 149 assert.Equal(t, s.Linux.Sysctl["kernel.domainname"], c.HostConfig.Sysctls["kernel.domainname"]) 159 HostConfig: &containertypes.HostConfig{ [all …]
|
H A D | oci_windows.go | 63 if c.HostConfig.Isolation.IsDefault() { 68 isHyperV = c.HostConfig.Isolation.IsHyperV() 134 Height: c.HostConfig.ConsoleSize[0], 135 Width: c.HostConfig.ConsoleSize[1], 275 if len(c.HostConfig.Devices) > 0 { 306 if c.HostConfig == nil || c.HostConfig.SecurityOpt == nil { 379 Readonly: c.HostConfig.ReadonlyRootfs, 393 …s.TweakCapabilities(caps.DefaultCapabilities(), c.HostConfig.CapAdd, c.HostConfig.CapDrop, c.HostC… 413 if c.HostConfig.NanoCPUs > 0 { 455 if c.HostConfig.IOMaximumBandwidth != 0 || c.HostConfig.IOMaximumIOps != 0 { [all …]
|
/dports/security/vault/vault-1.8.2/vendor/github.com/hashicorp/vic/vendor/github.com/docker/docker/daemon/ |
H A D | oci_windows.go | 63 s.Process.ConsoleSize.Height = c.HostConfig.ConsoleSize[0] 64 s.Process.ConsoleSize.Width = c.HostConfig.ConsoleSize[1] 70 if c.HostConfig.Isolation.IsDefault() { 75 isHyperV = c.HostConfig.Isolation.IsHyperV() 84 cpuShares := uint16(c.HostConfig.CPUShares) 85 cpuPercent := uint8(c.HostConfig.CPUPercent) 86 if c.HostConfig.NanoCPUs > 0 { 89 cpuCount := uint64(c.HostConfig.CPUCount) 90 memoryLimit := uint64(c.HostConfig.Memory) 105 Bps: &c.HostConfig.IOMaximumBandwidth, [all …]
|
/dports/databases/timescaledb-backup/timescaledb-backup-0.1.1/vendor/github.com/docker/docker/daemon/ |
H A D | oci_windows.go | 62 if c.HostConfig.Isolation.IsDefault() { 67 isHyperV = c.HostConfig.Isolation.IsHyperV() 133 Height: c.HostConfig.ConsoleSize[0], 134 Width: c.HostConfig.ConsoleSize[1], 274 if len(c.HostConfig.Devices) > 0 { 305 if c.HostConfig == nil || c.HostConfig.SecurityOpt == nil { 378 Readonly: c.HostConfig.ReadonlyRootfs, 392 …lities(oci.DefaultCapabilities(), c.HostConfig.CapAdd, c.HostConfig.CapDrop, c.HostConfig.Capabili… 412 if c.HostConfig.NanoCPUs > 0 { 454 if c.HostConfig.IOMaximumBandwidth != 0 || c.HostConfig.IOMaximumIOps != 0 { [all …]
|
H A D | oci_linux_test.go | 46 if c.HostConfig == nil { 47 c.HostConfig = new(containertypes.HostConfig) 67 HostConfig: &containertypes.HostConfig{ 88 HostConfig: &containertypes.HostConfig{ 116 HostConfig: &containertypes.HostConfig{ 130 c.HostConfig.Sysctls["kernel.domainname"] = "foobar.net" 131 assert.Assert(t, c.HostConfig.Sysctls["kernel.domainname"] != c.Config.Domainname) 136 assert.Equal(t, s.Linux.Sysctl["kernel.domainname"], c.HostConfig.Sysctls["kernel.domainname"])
|
/dports/sysutils/istio/istio-1.6.7/vendor/github.com/docker/docker/daemon/ |
H A D | oci_windows.go | 62 if c.HostConfig.Isolation.IsDefault() { 67 isHyperV = c.HostConfig.Isolation.IsHyperV() 133 Height: c.HostConfig.ConsoleSize[0], 134 Width: c.HostConfig.ConsoleSize[1], 274 if len(c.HostConfig.Devices) > 0 { 305 if c.HostConfig == nil || c.HostConfig.SecurityOpt == nil { 378 Readonly: c.HostConfig.ReadonlyRootfs, 392 …lities(oci.DefaultCapabilities(), c.HostConfig.CapAdd, c.HostConfig.CapDrop, c.HostConfig.Capabili… 412 if c.HostConfig.NanoCPUs > 0 { 454 if c.HostConfig.IOMaximumBandwidth != 0 || c.HostConfig.IOMaximumIOps != 0 { [all …]
|
H A D | oci_linux_test.go | 46 if c.HostConfig == nil { 47 c.HostConfig = new(containertypes.HostConfig) 67 HostConfig: &containertypes.HostConfig{ 88 HostConfig: &containertypes.HostConfig{ 116 HostConfig: &containertypes.HostConfig{ 130 c.HostConfig.Sysctls["kernel.domainname"] = "foobar.net" 131 assert.Assert(t, c.HostConfig.Sysctls["kernel.domainname"] != c.Config.Domainname) 136 assert.Equal(t, s.Linux.Sysctl["kernel.domainname"], c.HostConfig.Sysctls["kernel.domainname"])
|
/dports/sysutils/istio/istio-1.6.7/vendor/github.com/docker/docker/integration/internal/container/ |
H A D | ops.go | 23 c.HostConfig.Links = links 44 c.HostConfig.NetworkMode = containertypes.NetworkMode(mode) 75 c.HostConfig.Mounts = append(c.HostConfig.Mounts, m) 92 c.HostConfig.Binds = append(c.HostConfig.Binds, fmt.Sprintf("%s:%s", src, target)) 131 c.HostConfig.LogConfig.Type = driver 137 c.HostConfig.AutoRemove = true 143 if c.HostConfig == nil { 144 c.HostConfig = &containertypes.HostConfig{} 146 c.HostConfig.PidsLimit = limit 153 c.HostConfig.RestartPolicy.Name = policy
|
/dports/databases/timescaledb-backup/timescaledb-backup-0.1.1/vendor/github.com/docker/docker/integration/internal/container/ |
H A D | ops.go | 23 c.HostConfig.Links = links 44 c.HostConfig.NetworkMode = containertypes.NetworkMode(mode) 75 c.HostConfig.Mounts = append(c.HostConfig.Mounts, m) 92 c.HostConfig.Binds = append(c.HostConfig.Binds, fmt.Sprintf("%s:%s", src, target)) 131 c.HostConfig.LogConfig.Type = driver 137 c.HostConfig.AutoRemove = true 143 if c.HostConfig == nil { 144 c.HostConfig = &containertypes.HostConfig{} 146 c.HostConfig.PidsLimit = limit 153 c.HostConfig.RestartPolicy.Name = policy
|
/dports/databases/cayley/cayley-0.7.5-2-gcf576ba/vendor/github.com/docker/docker/integration/internal/container/ |
H A D | ops.go | 22 c.HostConfig.Links = links 43 c.HostConfig.NetworkMode = containertypes.NetworkMode(mode) 84 c.HostConfig.Binds = append(c.HostConfig.Binds, fmt.Sprintf("%s:%s", src, target)) 123 if c.HostConfig == nil { 124 c.HostConfig = &containertypes.HostConfig{} 126 c.HostConfig.LogConfig.Type = driver 132 if c.HostConfig == nil { 133 c.HostConfig = &containertypes.HostConfig{} 135 c.HostConfig.AutoRemove = true
|
/dports/net-p2p/go-ethereum/go-ethereum-1.10.14/vendor/github.com/docker/docker/integration/internal/container/ |
H A D | ops.go | 22 c.HostConfig.Links = links 43 c.HostConfig.NetworkMode = containertypes.NetworkMode(mode) 84 c.HostConfig.Binds = append(c.HostConfig.Binds, fmt.Sprintf("%s:%s", src, target)) 123 if c.HostConfig == nil { 124 c.HostConfig = &containertypes.HostConfig{} 126 c.HostConfig.LogConfig.Type = driver 132 if c.HostConfig == nil { 133 c.HostConfig = &containertypes.HostConfig{} 135 c.HostConfig.AutoRemove = true
|
/dports/sysutils/docker/docker-ce-18.09.5/components/engine/integration/internal/container/ |
H A D | ops.go | 22 c.HostConfig.Links = links 43 c.HostConfig.NetworkMode = containertypes.NetworkMode(mode) 84 c.HostConfig.Binds = append(c.HostConfig.Binds, fmt.Sprintf("%s:%s", src, target)) 123 if c.HostConfig == nil { 124 c.HostConfig = &containertypes.HostConfig{} 126 c.HostConfig.LogConfig.Type = driver 132 if c.HostConfig == nil { 133 c.HostConfig = &containertypes.HostConfig{} 135 c.HostConfig.AutoRemove = true
|
/dports/databases/cayley/cayley-0.7.5-2-gcf576ba/vendor/github.com/docker/docker/daemon/ |
H A D | oci_windows.go | 61 if c.HostConfig.Isolation.IsDefault() { 66 isHyperV = c.HostConfig.Isolation.IsHyperV() 136 Height: c.HostConfig.ConsoleSize[0], 137 Width: c.HostConfig.ConsoleSize[1], 187 if c.HostConfig.NetworkMode.IsContainer() { 255 cpuCount := uint64(c.HostConfig.CPUCount) 256 if c.HostConfig.NanoCPUs > 0 { 276 memoryLimit := uint64(c.HostConfig.Memory) 287 Bps: &c.HostConfig.IOMaximumBandwidth, 288 Iops: &c.HostConfig.IOMaximumIOps, [all …]
|
/dports/net-p2p/go-ethereum/go-ethereum-1.10.14/vendor/github.com/docker/docker/daemon/ |
H A D | oci_windows.go | 61 if c.HostConfig.Isolation.IsDefault() { 66 isHyperV = c.HostConfig.Isolation.IsHyperV() 136 Height: c.HostConfig.ConsoleSize[0], 137 Width: c.HostConfig.ConsoleSize[1], 187 if c.HostConfig.NetworkMode.IsContainer() { 255 cpuCount := uint64(c.HostConfig.CPUCount) 256 if c.HostConfig.NanoCPUs > 0 { 276 memoryLimit := uint64(c.HostConfig.Memory) 287 Bps: &c.HostConfig.IOMaximumBandwidth, 288 Iops: &c.HostConfig.IOMaximumIOps, [all …]
|