1
0
Fork 0
mirror of https://github.com/moby/moby.git synced 2022-11-09 12:21:53 -05:00
Moby Project - a collaborative project for the container ecosystem to assemble container-based systems
Find a file
Tianon Gravi 929af4c38d Fix daemon start/stop logic in hack/make/* scripts
From the Bash manual's `set -e` description:
(https://www.gnu.org/software/bash/manual/bashref.html#index-set)

> Exit immediately if a pipeline (see Pipelines), which may consist of a
> single simple command (see Simple Commands), a list (see Lists), or a
> compound command (see Compound Commands) returns a non-zero status.
> The shell does not exit if the command that fails is part of the
> command list immediately following a while or until keyword, part of
> the test in an if statement, part of any command executed in a && or
> || list except the command following the final && or ||, any command
> in a pipeline but the last, or if the command’s return status is being
> inverted with !. If a compound command other than a subshell returns a
> non-zero status because a command failed while -e was being ignored,
> the shell does not exit.

Additionally, further down:

> If a compound command or shell function executes in a context where -e
> is being ignored, none of the commands executed within the compound
> command or function body will be affected by the -e setting, even if
> -e is set and a command returns a failure status. If a compound
> command or shell function sets -e while executing in a context where
> -e is ignored, that setting will not have any effect until the
> compound command or the command containing the function call
> completes.

Thus, the only way to have our `.integration-daemon-stop` script
actually run appropriately to clean up our daemon on test/script failure
is to use `trap ... EXIT`, which we traditionally avoid because it does
not have any stacking capabilities, but in this case is a reasonable
compromise because it's going to be the only script using it (for now,
at least; we can evaluate more complex solutions in the future if they
actually become necessary).

The alternatives were much less reasonable.  One is to have the entire
complex chains in any script wanting to use `.integration-daemon-start`
/ `.integration-daemon-stop` be chained together with `&&` in an `if`
block, which is untenable.  The other I could think of was taking the
body of these scripts out into separate scripts, essentially meaning
we'd need two files for each of these, which further complicates the
maintenance.

Add to that the fact that our `trap ... EXIT` is scoped to the enclosing
subshell (`( ... )`) and we're in even more reasonable territory with
this pattern.

Signed-off-by: Andrew "Tianon" Page <admwiggin@gmail.com>
2015-04-23 11:31:16 -06:00
api Merge pull request #12505 from ZJU-SEL/remove_job_from_push 2015-04-23 09:57:17 -07:00
builder Remove chain of engine passing from builder to loadManifest 2015-04-21 14:55:23 -07:00
contrib Add support cpu cfs quota 2015-04-20 08:16:47 -07:00
daemon Move setHostConfig to daemon file 2015-04-23 10:23:02 +08:00
docker Remove job from container_inspect 2015-04-23 00:58:13 +02:00
dockerinit pkg/reexec: move reexec code to a new package 2014-10-30 14:48:30 +02:00
docs Fix typo in builder reference 2015-04-23 12:10:47 +02:00
engine Refactor utils/utils, fixes #11923 2015-04-14 01:37:36 +02:00
graph remove job from push 2015-04-23 21:21:56 +08:00
hack Fix daemon start/stop logic in hack/make/* scripts 2015-04-23 11:31:16 -06:00
image Refactor utils/utils, fixes #11923 2015-04-14 01:37:36 +02:00
integration Merge pull request #12611 from LK4D4/remove_eng_chain_pull 2015-04-21 19:19:56 -04:00
integration-cli Remove deleteAllContainers call in test 2015-04-23 16:32:50 +02:00
links Remove engine from links 2015-04-12 16:25:10 +02:00
nat Remove jobs from daemon/networkdriver/bridge 2015-04-08 18:50:29 -04:00
opts Remove job from container_inspect 2015-04-23 00:58:13 +02:00
pkg Merge pull request #12543 from vdemeester/11584-pkg-stdcopy-test-coverage 2015-04-22 22:03:15 -04:00
project Merge pull request #12566 from fntlnz/remove-go1.3.3-support 2015-04-20 17:01:57 -07:00
registry Make .docker dir have 0700 perms not 0600 2015-04-20 14:16:50 -07:00
runconfig remove execCreate & execStart from job 2015-04-22 13:51:57 -07:00
trust Remove engine from trust 2015-04-20 12:48:33 -07:00
utils Remove job from container_inspect 2015-04-23 00:58:13 +02:00
vendor/src Add gocheck to vendored deps 2015-04-21 10:28:52 -07:00
volumes Merge pull request #10992 from cpuguy83/add_volume_mounting_for_cp 2015-04-22 15:59:28 -07:00
.dockerignore Add .dockerignore support 2014-06-26 22:49:08 +00:00
.gitignore Sort .gitignore content 2015-03-24 09:40:07 -07:00
.mailmap Move scripts back to hack/, leave docs in project/ 2015-03-13 14:04:08 -06:00
AUTHORS Move scripts back to hack/, leave docs in project/ 2015-03-13 14:04:08 -06:00
CHANGELOG.md Improve build cancelation description in CHANGELOG 2015-04-17 09:44:12 +01:00
CONTRIBUTING.md Link to HTTPS URLs 2015-04-11 13:18:57 -04:00
Dockerfile Removed go1.3.3 support 2015-04-20 23:09:08 +02:00
Dockerfile.simple Fail explicitly if curl is missing in contrib/download-frozen-image.sh 2015-03-17 23:10:02 -06:00
LICENSE Link to HTTPS URLs 2015-04-11 13:18:57 -04:00
MAINTAINERS Fix @moxiegirl's handler to be consistent with other maintainers. 2015-04-14 16:53:28 -07:00
Makefile Adds validate-vet script 2015-04-13 12:48:05 -07:00
NOTICE Link to HTTPS URLs 2015-04-11 13:18:57 -04:00
README.md Use svg instead of png to get better image quality 2015-04-22 18:45:29 +08:00
VERSION bump version to 1.6.0-dev 2015-04-16 12:56:02 -07:00

Docker: the Linux container engine

Docker is an open source project to pack, ship and run any application as a lightweight container.

Docker containers are both hardware-agnostic and platform-agnostic. This means they can run anywhere, from your laptop to the largest EC2 compute instance and everything in between - and they don't require you to use a particular language, framework or packaging system. That makes them great building blocks for deploying and scaling web apps, databases, and backend services without depending on a particular stack or provider.

Docker began as an open-source implementation of the deployment engine which powers dotCloud, a popular Platform-as-a-Service. It benefits directly from the experience accumulated over several years of large-scale operation and support of hundreds of thousands of applications and databases.

Docker L

Security Disclosure

Security is very important to us. If you have any issue regarding security, please disclose the information responsibly by sending an email to security@docker.com and not by creating a github issue.

Better than VMs

A common method for distributing applications and sandboxing their execution is to use virtual machines, or VMs. Typical VM formats are VMWare's vmdk, Oracle Virtualbox's vdi, and Amazon EC2's ami. In theory these formats should allow every developer to automatically package their application into a "machine" for easy distribution and deployment. In practice, that almost never happens, for a few reasons:

  • Size: VMs are very large which makes them impractical to store and transfer.
  • Performance: running VMs consumes significant CPU and memory, which makes them impractical in many scenarios, for example local development of multi-tier applications, and large-scale deployment of cpu and memory-intensive applications on large numbers of machines.
  • Portability: competing VM environments don't play well with each other. Although conversion tools do exist, they are limited and add even more overhead.
  • Hardware-centric: VMs were designed with machine operators in mind, not software developers. As a result, they offer very limited tooling for what developers need most: building, testing and running their software. For example, VMs offer no facilities for application versioning, monitoring, configuration, logging or service discovery.

By contrast, Docker relies on a different sandboxing method known as containerization. Unlike traditional virtualization, containerization takes place at the kernel level. Most modern operating system kernels now support the primitives necessary for containerization, including Linux with openvz, vserver and more recently lxc, Solaris with zones, and FreeBSD with Jails.

Docker builds on top of these low-level primitives to offer developers a portable format and runtime environment that solves all four problems. Docker containers are small (and their transfer can be optimized with layers), they have basically zero memory and cpu overhead, they are completely portable, and are designed from the ground up with an application-centric design.

Perhaps best of all, because Docker operates at the OS level, it can still be run inside a VM!

Plays well with others

Docker does not require you to buy into a particular programming language, framework, packaging system, or configuration language.

Is your application a Unix process? Does it use files, tcp connections, environment variables, standard Unix streams and command-line arguments as inputs and outputs? Then Docker can run it.

Can your application's build be expressed as a sequence of such commands? Then Docker can build it.

Escape dependency hell

A common problem for developers is the difficulty of managing all their application's dependencies in a simple and automated way.

This is usually difficult for several reasons:

  • Cross-platform dependencies. Modern applications often depend on a combination of system libraries and binaries, language-specific packages, framework-specific modules, internal components developed for another project, etc. These dependencies live in different "worlds" and require different tools - these tools typically don't work well with each other, requiring awkward custom integrations.

  • Conflicting dependencies. Different applications may depend on different versions of the same dependency. Packaging tools handle these situations with various degrees of ease - but they all handle them in different and incompatible ways, which again forces the developer to do extra work.

  • Custom dependencies. A developer may need to prepare a custom version of their application's dependency. Some packaging systems can handle custom versions of a dependency, others can't - and all of them handle it differently.

Docker solves the problem of dependency hell by giving the developer a simple way to express all their application's dependencies in one place, while streamlining the process of assembling them. If this makes you think of XKCD 927, don't worry. Docker doesn't replace your favorite packaging systems. It simply orchestrates their use in a simple and repeatable way. How does it do that? With layers.

Docker defines a build as running a sequence of Unix commands, one after the other, in the same container. Build commands modify the contents of the container (usually by installing new files on the filesystem), the next command modifies it some more, etc. Since each build command inherits the result of the previous commands, the order in which the commands are executed expresses dependencies.

Here's a typical Docker build process:

FROM ubuntu:12.04
RUN apt-get update && apt-get install -y python python-pip curl
RUN curl -sSL https://github.com/shykes/helloflask/archive/master.tar.gz | tar -xzv
RUN cd helloflask-master && pip install -r requirements.txt

Note that Docker doesn't care how dependencies are built - as long as they can be built by running a Unix command in a container.

Getting started

Docker can be installed on your local machine as well as servers - both bare metal and virtualized. It is available as a binary on most modern Linux systems, or as a VM on Windows, Mac and other systems.

We also offer an interactive tutorial for quickly learning the basics of using Docker.

For up-to-date install instructions, see the Docs.

Usage examples

Docker can be used to run short-lived commands, long-running daemons (app servers, databases, etc.), interactive shell sessions, etc.

You can find a list of real-world examples in the documentation.

Under the hood

Under the hood, Docker is built on the following components:

Contributing to Docker

GoDoc Jenkins Build Status

Want to hack on Docker? Awesome! We have instructions to help you get started contributing code or documentation..

These instructions are probably not perfect, please let us know if anything feels wrong or incomplete. Better yet, submit a PR and improve them yourself.

Getting the development builds

Want to run Docker from a master build? You can download master builds at master.dockerproject.com. They are updated with each commit merged into the master branch.

Don't know how to use that super cool new feature in the master build? Check out the master docs at docs.master.dockerproject.com.

How the project is run

Docker is a very, very active project. If you want to learn more about how it is run, or want to get more involved, the best place to start is the project directory.

We are always open to suggestions on process improvements, and are always looking for more maintainers.

Brought to you courtesy of our legal counsel. For more context, please see the NOTICE document in this repo.

Use and transfer of Docker may be subject to certain restrictions by the United States and other governments.

It is your responsibility to ensure that your use and/or transfer does not violate applicable laws.

For more information, please see https://www.bis.doc.gov

Licensing

Docker is licensed under the Apache License, Version 2.0. See LICENSE for the full license text.

Other Docker Related Projects

There are a number of projects under development that are based on Docker's core technology. These projects expand the tooling built around the Docker platform to broaden its application and utility.

  • Docker Registry: Registry server for Docker (hosting/delivery of repositories and images)
  • Docker Machine: Machine management for a container-centric world
  • Docker Swarm: A Docker-native clustering system
  • Docker Compose (formerly Fig): Define and run multi-container apps
  • Kitematic: The easiest way to use Docker on a Mac

If you know of another project underway that should be listed here, please help us keep this list up-to-date by submitting a PR.