mirror of
https://github.com/moby/moby.git
synced 2022-11-09 12:21:53 -05:00
add docs
Signed-off-by: Victor Vieux <vieux@docker.com>
This commit is contained in:
parent
4b43a6df7a
commit
bbb92e1436
3 changed files with 9 additions and 1 deletions
|
@ -64,7 +64,7 @@ func (e *execStore) Delete(id string) {
|
|||
func (e *execStore) List() []string {
|
||||
var IDs []string
|
||||
e.RLock()
|
||||
for id, _ := range e.s {
|
||||
for id := range e.s {
|
||||
IDs = append(IDs, id)
|
||||
}
|
||||
e.RUnlock()
|
||||
|
|
|
@ -51,6 +51,11 @@ You can still call an old version of the API using
|
|||
**New!**
|
||||
Docker client now hints potential proxies about connection hijacking using HTTP Upgrade headers.
|
||||
|
||||
`GET /containers/(id)/json`
|
||||
|
||||
**New!**
|
||||
This endpoint now returns the list current execs associated with the container (`ExecIDs`).
|
||||
|
||||
## v1.16
|
||||
|
||||
### Full Documentation
|
||||
|
|
|
@ -310,6 +310,9 @@ Return low-level information on the container `id`
|
|||
"SysInitPath": "/home/kitty/go/src/github.com/docker/docker/bin/docker",
|
||||
"ResolvConfPath": "/etc/resolv.conf",
|
||||
"Volumes": {},
|
||||
"ExecIDs": [
|
||||
"15f211491dced6a353a2e0f37fe3f3692ee2370a4782418e9bf7052865c10fde"
|
||||
],
|
||||
"HostConfig": {
|
||||
"Binds": null,
|
||||
"ContainerIDFile": "",
|
||||
|
|
Loading…
Reference in a new issue