forked from pool/docker
f28071cbb5
<https://docs.docker.com/engine/release-notes/24.0/#2406>. bsc#1215323 - Rebase patches: * 0001-SECRETS-daemon-allow-directory-creation-in-run-secre.patch * 0002-SECRETS-SUSE-implement-SUSE-container-secrets.patch * 0003-BUILD-SLE12-revert-graphdriver-btrfs-use-kernel-UAPI.patch * 0004-bsc1073877-apparmor-clobber-docker-default-profile-o.patch * cli-0001-docs-include-required-tools-in-source-tree.patch - Switch from disabledrun to manualrun in _service. - Add a docker.socket unit file, but with socket activation effectively disabled to ensure that Docker will always run even if you start the socket individually. Users should probably just ignore this unit file. bsc#1210141 OBS-URL: https://build.opensuse.org/package/show/Virtualization:containers/docker?expand=0&rev=395
46 lines
1.7 KiB
Desktop File
46 lines
1.7 KiB
Desktop File
[Unit]
|
|
Description=Docker Application Container Engine
|
|
Documentation=http://docs.docker.com
|
|
After=network.target lvm2-monitor.service firewalld.service
|
|
# We don't use the docker socket activation, but doing this ensures that the
|
|
# docker.socket unit is alive while Docker is (docker.socket has BindsTo, so we
|
|
# only need a weak requirement to make sure starting docker.service also
|
|
# "starts" the socket service). Forcefully stopping docker.socket will not
|
|
# cause docker to die, but there's no nice workaround for that.
|
|
Wants=docker.socket
|
|
|
|
[Service]
|
|
EnvironmentFile=/etc/sysconfig/docker
|
|
|
|
# While Docker has support for socket activation (-H fd://), this is not
|
|
# enabled by default because enabling socket activation means that on boot your
|
|
# containers won't start until someone tries to administer the Docker daemon.
|
|
Type=notify
|
|
ExecStart=/usr/bin/dockerd --add-runtime oci=/usr/sbin/docker-runc $DOCKER_NETWORK_OPTIONS $DOCKER_OPTS
|
|
ExecReload=/bin/kill -s HUP $MAINPID
|
|
|
|
# Having non-zero Limit*s causes performance problems due to accounting overhead
|
|
# in the kernel. We recommend using cgroups to do container-local accounting.
|
|
LimitNOFILE=1048576
|
|
LimitNPROC=infinity
|
|
LimitCORE=infinity
|
|
|
|
# Uncomment TasksMax if your systemd version supports it.
|
|
# Only systemd 226 and above support this property.
|
|
TasksMax=infinity
|
|
|
|
# Set delegate yes so that systemd does not reset the cgroups of docker containers
|
|
# Only systemd 218 and above support this property.
|
|
Delegate=yes
|
|
|
|
# Kill only the docker process, not all processes in the cgroup.
|
|
KillMode=process
|
|
|
|
# Restart the docker process if it exits prematurely.
|
|
Restart=on-failure
|
|
StartLimitBurst=3
|
|
StartLimitInterval=60s
|
|
|
|
[Install]
|
|
WantedBy=multi-user.target
|