TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

Docker 1.10.0 is out

194 pointsby raimille1over 9 years ago

19 comments

diogomonicaptover 9 years ago
Disclaimer: I work for Docker<p>For the security enthusiasts out there, Docker 1.10 comes with some really cool Security focused additions. In particular:<p>- Seccomp filtering: you can now use bpf to filter exactly what system calls the processes inside of your containers can use.<p>- Default Seccomp Profile: Using the newly added Seccomp filtering capabilities we added a default Seccomp profile that will help keep reduce the surface exposed by your kernel. For example, last month&#x27;s use-after-free vuln in join_session_keyring was blocked by our current default profile.<p>- User Namespaces: root inside of the container isn&#x27;t root outside of the container (opt-in, for now).<p>- Authorization Plugins: you can now write plugins for allowing or denying API requests to the daemon. For example, you could block anyone from using --privileged.<p>- Content Addressed Images: The new manifest format in Docker 1.10 is a full Merkle DAG, and all the downloaded content is finally content addressable.<p>- Support for TUF Delegations: Docker now has support for read&#x2F;write TUF delegations, and as soon as notary 0.2 comes out, you will be able to use delegations to provide signing capabilities to a team of developers with no shared keys.<p>These are just a few of the things we&#x27;ve been working on, and we think these are super cool.<p>Checkout more details here: <a href="http:&#x2F;&#x2F;blog.docker.com&#x2F;2016&#x2F;02&#x2F;docker-engine-1-10-security&#x2F;" rel="nofollow">http:&#x2F;&#x2F;blog.docker.com&#x2F;2016&#x2F;02&#x2F;docker-engine-1-10-security&#x2F;</a> or me know if you have any questions.
评论 #11040313 未加载
评论 #11040830 未加载
评论 #11039181 未加载
评论 #11038569 未加载
IanCalover 9 years ago
&gt; Docker 1.10 uses a new content-addressable storage for images and layers.<p>This is <i>really</i> interesting.<p>Sounds like the up&#x2F;download manager has improved too. I did some early work adding parallel stuff to that (which was then very helpfully refactored into actually decent go code :), thanks docker team) and it&#x27;s great to see it improved. I remember some people looking at adding torrenting for shunting around layers, I guess this should help along that path too.
评论 #11039544 未加载
ThePhysicistover 9 years ago
Network-scoped aliases are really handy when dealing with a multi-container setup, so I&#x27;m really happy that they implemented this!<p>In previous versions, only the name of a container would be aliased to its IP address, which can make it hard to deploy a setup with multiple containers in a given network group that should address each other using their names (e.g. &quot;api&quot; host connects to &quot;postgres&quot;) and then have multiple instances of those groups on the same server (as container names need to be unique).
the_common_manover 9 years ago
For those interested in the user namespace support, the best post I found was <a href="https:&#x2F;&#x2F;integratedcode.us&#x2F;2015&#x2F;10&#x2F;13&#x2F;user-namespaces-have-arrived-in-docker&#x2F;" rel="nofollow">https:&#x2F;&#x2F;integratedcode.us&#x2F;2015&#x2F;10&#x2F;13&#x2F;user-namespaces-have-ar...</a> (there are also some docs here <a href="https:&#x2F;&#x2F;github.com&#x2F;HewlettPackard&#x2F;docker-machine-oneview&#x2F;blob&#x2F;master&#x2F;Godeps&#x2F;_workspace&#x2F;src&#x2F;github.com&#x2F;docker&#x2F;docker&#x2F;experimental&#x2F;userns.md" rel="nofollow">https:&#x2F;&#x2F;github.com&#x2F;HewlettPackard&#x2F;docker-machine-oneview&#x2F;blo...</a>)
评论 #11037986 未加载
fidgetover 9 years ago
Wow, user namespaces! That was quick!<p>EDIT: And a default seccomp profile! Did I miss the memo about containerisation suddenly becoming a competative industry?
评论 #11037846 未加载
评论 #11038155 未加载
评论 #11040003 未加载
rodionosover 9 years ago
Items of particular interest to monitoring and diagnostics:<p>1. docker stats --all<p>Built-in alternative over &#x27;docker ps -q | xargs docker stats&#x27; which takes care of dynamic additions to the list.<p>For consistency, it would be nice to have a similar option in the API stats call to fetch statistics for all running containers.<p>2. &#x27;docker update&#x27; command, although I would have preferred &#x27;docker limit&#x27;.<p>Ability to change container limits at runtime:<p>- CPUQuota - CpusetCpus - CpusetMems - Memory - MemorySwap - MemoryReservation - KernelMemory<p>With this feature in place, there is no reason to run containers without limits, at least memory limits.<p>3. Logging driver for Splunk<p>Better approach is to enhance generic drivers to be flexible enough to send logs to any logging consumer.
评论 #11041331 未加载
评论 #11041113 未加载
CSDudeover 9 years ago
I love the ability of specifying IPs but, I just want to give static IPs to my containers from my private network, and attaching to my already existing bridge does not work, I started daemon as following but no help<p>&gt; .&#x2F;docker-1.10.0 daemon -b br0 --default-gateway 172.16.0.1<p>&gt; .&#x2F;docker-1.10.0 run --ip 172.16.0.130 -ti ubuntu bash docker: Error response from daemon: User specified IP address is supported on user defined networks only.<p>But my KVM vms work fine with that bridged network. I know I could just port forward but I don&#x27;t want to, yes It seems I am treating my containers as VMs, but it worked so fine in default LXC, we could even use Open vSwitch bridge for advanced topologies.
评论 #11037890 未加载
rcarmoover 9 years ago
Sadly, <a href="https:&#x2F;&#x2F;github.com&#x2F;docker&#x2F;docker&#x2F;issues&#x2F;3043" rel="nofollow">https:&#x2F;&#x2F;github.com&#x2F;docker&#x2F;docker&#x2F;issues&#x2F;3043</a> is still open, so no multicast support since 1.6...
评论 #11040565 未加载
评论 #11040303 未加载
bfirshover 9 years ago
For an overview of what&#x27;s new in this release, check out the blog post: <a href="https:&#x2F;&#x2F;blog.docker.com&#x2F;2016&#x2F;02&#x2F;docker-1-10&#x2F;" rel="nofollow">https:&#x2F;&#x2F;blog.docker.com&#x2F;2016&#x2F;02&#x2F;docker-1-10&#x2F;</a><p>The highlights are networks&#x2F;volumes in Compose files, a bunch of security updates, and lots of new networking features.
jmspringover 9 years ago
It&#x27;s the danger of running against &quot;latest&quot; all the time...But it&#x27;s been a day of chasing my own tail when creating a new cluster (Mesos, but that really isn&#x27;t an issue) and using some tools built against the prior version (volume manager plugin, etc.) that break with updates to Docker.<p>It seems like if one piece gets an upgrade, every moving component relying on some APIs may need to be looked at as well.<p>Did a PR on one issue.<p>Currently chasing my tail to see if a third party lib is out of whack with the new version or it&#x27;s something I did.<p>The whole area is evolving and the cross pollination of frameworks, solutions (weave, etc), make for a complicated ecosystem. Most people don&#x27;t stay &quot;Docker only&quot;. I&#x27;m curious to see the warts that pop up.
评论 #11040843 未加载
andrewguentherover 9 years ago
The --tmpfs flag is a huge win for applications that use containers as unit of work processors.<p>In these use cases, I want to start a container, have it process a unit of work, clear any state, and start over again. Previously, you could orchestrate this by (as an example, there are other ways) mounting a tmpfs file system into any runtime necessary directories, starting the container, stopping it once the work is done, clean up the tmpfs, and then start the container again.<p>Now, you can create everything once with the --tmpfs flag and simply use &quot;restart&quot; to clear any state. Super simple. Awesome!
sz4kertoover 9 years ago
I&#x27;d really-really need DNS for non-running containers, somehow. Nginx can&#x27;t start if an upstream container is down, as its name won&#x27;t be resolved.
评论 #11039028 未加载
评论 #11040406 未加载
falsedanover 9 years ago
please, I just want fewer bugs after creating&#x2F;destroying a few hundred containers on a host.
myhfover 9 years ago
Nice to see building from stdin working again.<p><a href="https:&#x2F;&#x2F;github.com&#x2F;docker&#x2F;docker&#x2F;issues&#x2F;15785" rel="nofollow">https:&#x2F;&#x2F;github.com&#x2F;docker&#x2F;docker&#x2F;issues&#x2F;15785</a>
olalondeover 9 years ago
If you&#x27;re on OS X and using docker-machine, the command to upgrade is `docker-machine upgrade default` where default is the name of your VM.
iamossrealityover 9 years ago
ossreality 5 hours ago [dead]<p>Apparently no one else has been paying an ounce of attention... And you get downvoted for it. The HN way! <a href="https:&#x2F;&#x2F;github.com&#x2F;docker&#x2F;docker&#x2F;issues&#x2F;19474" rel="nofollow">https:&#x2F;&#x2F;github.com&#x2F;docker&#x2F;docker&#x2F;issues&#x2F;19474</a> Least of all you&#x27;re forced to go through their DNS server which doesn&#x27;t support TCP. Boy, this is absolutely going to fuck people. Because I bet a bunch of people are going to run Go containers in 1.10 engine. And guess what happens when you send a Go app a DNS response, in UDP format, that is larger than 4096 bytes? You get a panic and crash! Woohoo! And yes, there are DNS servers that incorrectly throw out UDP DNS responses larger than 4096 bytes. Can&#x27;t wait for my containers to fail because of fucking Docker putting a DNS service in Engine. Unacceptable. Docker should&#x27;ve realized they needed to think about this stuff all-the-why shykes was too busy picking fights with people as Kubernetes encroached on what he saw as &quot;his&quot; territory. There&#x27;s a reason that everyone is very excited about the rkt announcement today. Particularly amongst some Kubernetes users... (In the interest of not tainting the waters, I do NOT work for Google)
评论 #11039620 未加载
评论 #11040005 未加载
didipover 9 years ago
How&#x27;s the reliability story going, nowadays? Especially around layed filesystems.
thejoshover 9 years ago
&gt;Use DNS-based discovery instead of &#x2F;etc&#x2F;hosts #19198<p>This will end well...
评论 #11037749 未加载
评论 #11037694 未加载
评论 #11038125 未加载
评论 #11037692 未加载
评论 #11038024 未加载
awinter-pyover 9 years ago
What does it mean that the LXC backend has been deprecated?
评论 #11039490 未加载
评论 #11040010 未加载