| package daemon |
| |
| import ( |
| "net" |
| |
| "github.com/docker/docker/daemon/networkdriver" |
| "github.com/docker/docker/opts" |
| flag "github.com/docker/docker/pkg/mflag" |
| ) |
| |
| const ( |
| defaultNetworkMtu = 1500 |
| disableNetworkBridge = "none" |
| ) |
| |
| // Config define the configuration of a docker daemon |
| // These are the configuration settings that you pass |
| // to the docker daemon when you launch it with say: `docker -d -e lxc` |
| // FIXME: separate runtime configuration from http api configuration |
| type Config struct { |
| Pidfile string |
| Root string |
| AutoRestart bool |
| Dns []string |
| DnsSearch []string |
| Mirrors []string |
| EnableIptables bool |
| EnableIpForward bool |
| EnableIpMasq bool |
| DefaultIp net.IP |
| BridgeIface string |
| BridgeIP string |
| FixedCIDR string |
| InsecureRegistries []string |
| InterContainerCommunication bool |
| GraphDriver string |
| GraphOptions []string |
| ExecDriver string |
| Mtu int |
| DisableNetwork bool |
| EnableSelinuxSupport bool |
| Context map[string][]string |
| } |
| |
| // InstallFlags adds command-line options to the top-level flag parser for |
| // the current process. |
| // Subsequent calls to `flag.Parse` will populate config with values parsed |
| // from the command-line. |
| func (config *Config) InstallFlags() { |
| flag.StringVar(&config.Pidfile, []string{"p", "-pidfile"}, "/var/run/docker.pid", "Path to use for daemon PID file") |
| flag.StringVar(&config.Root, []string{"g", "-graph"}, "/var/lib/docker", "Path to use as the root of the Docker runtime") |
| flag.BoolVar(&config.AutoRestart, []string{"#r", "#-restart"}, true, "--restart on the daemon has been deprecated in favor of --restart policies on docker run") |
| flag.BoolVar(&config.EnableIptables, []string{"#iptables", "-iptables"}, true, "Enable Docker's addition of iptables rules") |
| flag.BoolVar(&config.EnableIpForward, []string{"#ip-forward", "-ip-forward"}, true, "Enable net.ipv4.ip_forward") |
| flag.BoolVar(&config.EnableIpMasq, []string{"-ip-masq"}, true, "Enable IP masquerading for bridge's IP range") |
| flag.StringVar(&config.BridgeIP, []string{"#bip", "-bip"}, "", "Use this CIDR notation address for the network bridge's IP, not compatible with -b") |
| flag.StringVar(&config.BridgeIface, []string{"b", "-bridge"}, "", "Attach containers to a pre-existing network bridge\nuse 'none' to disable container networking") |
| flag.StringVar(&config.FixedCIDR, []string{"-fixed-cidr"}, "", "IPv4 subnet for fixed IPs (ex: 10.20.0.0/16)\nthis subnet must be nested in the bridge subnet (which is defined by -b or --bip)") |
| opts.ListVar(&config.InsecureRegistries, []string{"-insecure-registry"}, "Enable insecure communication with specified registries (no certificate verification for HTTPS and enable HTTP fallback) (e.g., localhost:5000 or 10.20.0.0/16)") |
| flag.BoolVar(&config.InterContainerCommunication, []string{"#icc", "-icc"}, true, "Enable inter-container communication") |
| flag.StringVar(&config.GraphDriver, []string{"s", "-storage-driver"}, "", "Force the Docker runtime to use a specific storage driver") |
| flag.StringVar(&config.ExecDriver, []string{"e", "-exec-driver"}, "native", "Force the Docker runtime to use a specific exec driver") |
| flag.BoolVar(&config.EnableSelinuxSupport, []string{"-selinux-enabled"}, false, "Enable selinux support. SELinux does not presently support the BTRFS storage driver") |
| flag.IntVar(&config.Mtu, []string{"#mtu", "-mtu"}, 0, "Set the containers network MTU\nif no value is provided: default to the default route MTU or 1500 if no default route is available") |
| opts.IPVar(&config.DefaultIp, []string{"#ip", "-ip"}, "0.0.0.0", "Default IP address to use when binding container ports") |
| opts.ListVar(&config.GraphOptions, []string{"-storage-opt"}, "Set storage driver options") |
| // FIXME: why the inconsistency between "hosts" and "sockets"? |
| opts.IPListVar(&config.Dns, []string{"#dns", "-dns"}, "Force Docker to use specific DNS servers") |
| opts.DnsSearchListVar(&config.DnsSearch, []string{"-dns-search"}, "Force Docker to use specific DNS search domains") |
| opts.MirrorListVar(&config.Mirrors, []string{"-registry-mirror"}, "Specify a preferred Docker registry mirror") |
| |
| // Localhost is by default considered as an insecure registry |
| // This is a stop-gap for people who are running a private registry on localhost (especially on Boot2docker). |
| // |
| // TODO: should we deprecate this once it is easier for people to set up a TLS registry or change |
| // daemon flags on boot2docker? |
| // If so, do not forget to check the TODO in TestIsSecure |
| config.InsecureRegistries = append(config.InsecureRegistries, "127.0.0.0/8") |
| } |
| |
| func GetDefaultNetworkMtu() int { |
| if iface, err := networkdriver.GetDefaultRouteIface(); err == nil { |
| return iface.MTU |
| } |
| return defaultNetworkMtu |
| } |