update go import path and libcontainer

Docker-DCO-1.1-Signed-off-by: Victor Vieux <vieux@docker.com> (github: vieux)
This commit is contained in:
Victor Vieux 2014-07-24 22:19:50 +00:00 коммит произвёл Tibor Vass
Родитель a5b9d338c1
Коммит 4fc06d1790
4 изменённых файлов: 11 добавлений и 11 удалений

Просмотреть файл

@ -5,7 +5,7 @@ Markdown, as implemented by [MkDocs](http://mkdocs.org).
The HTML files are built and hosted on `https://docs.docker.com`, and update The HTML files are built and hosted on `https://docs.docker.com`, and update
automatically after each change to the master or release branch of [Docker on automatically after each change to the master or release branch of [Docker on
GitHub](https://github.com/dotcloud/docker) thanks to post-commit hooks. The GitHub](https://github.com/docker/docker) thanks to post-commit hooks. The
`docs` branch maps to the "latest" documentation and the `master` (unreleased `docs` branch maps to the "latest" documentation and the `master` (unreleased
development) branch maps to the "master" documentation. development) branch maps to the "master" documentation.

Просмотреть файл

@ -175,7 +175,7 @@ The cache for `RUN` instructions can be invalidated by `ADD` instructions. See
### Known Issues (RUN) ### Known Issues (RUN)
- [Issue 783](https://github.com/dotcloud/docker/issues/783) is about file - [Issue 783](https://github.com/docker/docker/issues/783) is about file
permissions problems that can occur when using the AUFS file system. You permissions problems that can occur when using the AUFS file system. You
might notice it during an attempt to `rm` a file, for example. The issue might notice it during an attempt to `rm` a file, for example. The issue
describes a workaround. describes a workaround.

Просмотреть файл

@ -117,7 +117,7 @@ you can also specify individual sockets too `docker -d -H fd://3`. If the
specified socket activated files aren't found then docker will exit. You specified socket activated files aren't found then docker will exit. You
can find examples of using systemd socket activation with docker and can find examples of using systemd socket activation with docker and
systemd in the [docker source tree]( systemd in the [docker source tree](
https://github.com/dotcloud/docker/blob/master/contrib/init/systemd/socket-activation/). https://github.com/docker/docker/blob/master/contrib/init/systemd/socket-activation/).
Docker supports softlinks for the Docker data directory Docker supports softlinks for the Docker data directory
(`/var/lib/docker`) and for `/tmp`. TMPDIR and the data directory can be set (`/var/lib/docker`) and for `/tmp`. TMPDIR and the data directory can be set
@ -396,9 +396,9 @@ For example:
A /go A /go
A /go/src A /go/src
A /go/src/github.com A /go/src/github.com
A /go/src/github.com/dotcloud A /go/src/github.com/docker
A /go/src/github.com/dotcloud/docker A /go/src/github.com/docker/docker
A /go/src/github.com/dotcloud/docker/.git A /go/src/github.com/docker/docker/.git
.... ....
## events ## events
@ -871,7 +871,7 @@ registry or to a self-hosted one.
### Known Issues (rm) ### Known Issues (rm)
- [Issue 197](https://github.com/dotcloud/docker/issues/197) indicates - [Issue 197](https://github.com/docker/docker/issues/197) indicates
that `docker kill` may leave directories behind that `docker kill` may leave directories behind
and make it difficult to remove the container. and make it difficult to remove the container.
@ -1008,7 +1008,7 @@ and linking containers.
### Known Issues (run –volumes-from) ### Known Issues (run –volumes-from)
- [Issue 2702](https://github.com/dotcloud/docker/issues/2702): - [Issue 2702](https://github.com/docker/docker/issues/2702):
"lxc-start: Permission denied - failed to mount" could indicate a "lxc-start: Permission denied - failed to mount" could indicate a
permissions problem with AppArmor. Please see the issue for a permissions problem with AppArmor. Please see the issue for a
workaround. workaround.

Просмотреть файл

@ -86,7 +86,7 @@ and pass along signals. All of that is configurable:
-i=false : Keep STDIN open even if not attached -i=false : Keep STDIN open even if not attached
If you do not specify `-a` then Docker will [attach all standard If you do not specify `-a` then Docker will [attach all standard
streams]( https://github.com/dotcloud/docker/blob/ streams]( https://github.com/docker/docker/blob/
75a7f4d90cde0295bcfb7213004abce8d4779b75/commands.go#L1797). You can 75a7f4d90cde0295bcfb7213004abce8d4779b75/commands.go#L1797). You can
specify to which of the three standard streams (`STDIN`, `STDOUT`, specify to which of the three standard streams (`STDIN`, `STDOUT`,
`STDERR`) you'd like to connect instead, as in: `STDERR`) you'd like to connect instead, as in:
@ -237,7 +237,7 @@ By default, Docker containers are "unprivileged" and cannot, for
example, run a Docker daemon inside a Docker container. This is because example, run a Docker daemon inside a Docker container. This is because
by default a container is not allowed to access any devices, but a by default a container is not allowed to access any devices, but a
"privileged" container is given access to all devices (see [lxc-template.go]( "privileged" container is given access to all devices (see [lxc-template.go](
https://github.com/dotcloud/docker/blob/master/daemon/execdriver/lxc/lxc_template.go) https://github.com/docker/docker/blob/master/daemon/execdriver/lxc/lxc_template.go)
and documentation on [cgroups devices]( and documentation on [cgroups devices](
https://www.kernel.org/doc/Documentation/cgroups/devices.txt)). https://www.kernel.org/doc/Documentation/cgroups/devices.txt)).
@ -262,7 +262,7 @@ If the Docker daemon was started using the `lxc` exec-driver
(`docker -d --exec-driver=lxc`) then the operator can also specify LXC options (`docker -d --exec-driver=lxc`) then the operator can also specify LXC options
using one or more `--lxc-conf` parameters. These can be new parameters or using one or more `--lxc-conf` parameters. These can be new parameters or
override existing parameters from the [lxc-template.go]( override existing parameters from the [lxc-template.go](
https://github.com/dotcloud/docker/blob/master/daemon/execdriver/lxc/lxc_template.go). https://github.com/docker/docker/blob/master/daemon/execdriver/lxc/lxc_template.go).
Note that in the future, a given host's docker daemon may not use LXC, so this Note that in the future, a given host's docker daemon may not use LXC, so this
is an implementation-specific configuration meant for operators already is an implementation-specific configuration meant for operators already
familiar with using LXC directly. familiar with using LXC directly.