Skip to content
Projects
Groups
Snippets
Help
This project
Loading...
Sign in / Register
Toggle navigation
L
lxc
Project
Overview
Details
Activity
Cycle Analytics
Repository
Repository
Files
Commits
Branches
Tags
Contributors
Graph
Compare
Charts
Issues
0
Issues
0
List
Board
Labels
Milestones
Merge Requests
0
Merge Requests
0
CI / CD
CI / CD
Pipelines
Jobs
Schedules
Charts
Wiki
Wiki
Snippets
Snippets
Members
Members
Collapse sidebar
Close sidebar
Activity
Graph
Charts
Create a new issue
Jobs
Commits
Issue Boards
Open sidebar
Chen Yisong
lxc
Commits
08401048
Unverified
Commit
08401048
authored
Sep 24, 2018
by
Christian Brauner
Browse files
Options
Browse Files
Download
Email Patches
Plain Diff
doc: tweak documentation a little
Signed-off-by:
Christian Brauner
<
christian.brauner@ubuntu.com
>
parent
f3672cf1
Hide whitespace changes
Inline
Side-by-side
Showing
6 changed files
with
16 additions
and
16 deletions
+16
-16
lxc-attach.sgml.in
doc/ja/lxc-attach.sgml.in
+2
-2
lxc-unshare.sgml.in
doc/ja/lxc-unshare.sgml.in
+4
-4
lxc-attach.sgml.in
doc/ko/lxc-attach.sgml.in
+2
-2
lxc-unshare.sgml.in
doc/ko/lxc-unshare.sgml.in
+4
-4
lxc-attach.sgml.in
doc/lxc-attach.sgml.in
+2
-2
lxc-unshare.sgml.in
doc/lxc-unshare.sgml.in
+2
-2
No files found.
doc/ja/lxc-attach.sgml.in
View file @
08401048
...
@@ -102,8 +102,8 @@ by KATOH Yasufumi <karma at jazz.email.ne.jp>
...
@@ -102,8 +102,8 @@ by KATOH Yasufumi <karma at jazz.email.ne.jp>
input faking via a TIOCSTI <command>ioctl</command> call after switching
input faking via a TIOCSTI <command>ioctl</command> call after switching
between userspace execution contexts with different privilege levels. Newer
between userspace execution contexts with different privilege levels. Newer
versions of <command>lxc-attach</command> will try to allocate a pseudo
versions of <command>lxc-attach</command> will try to allocate a pseudo
terminal
master/slave
pair on the host and attach any standard file
terminal
file descriptor
pair on the host and attach any standard file
descriptors which refer to a terminal to the
slave
side of the pseudo
descriptors which refer to a terminal to the
container
side of the pseudo
terminal before executing a shell or command. Note, that if none of the
terminal before executing a shell or command. Note, that if none of the
standard file descriptors refer to a terminal <command>lxc-attach</command>
standard file descriptors refer to a terminal <command>lxc-attach</command>
will not try to allocate a pseudo terminal. Instead it will simply attach
will not try to allocate a pseudo terminal. Instead it will simply attach
...
...
doc/ja/lxc-unshare.sgml.in
View file @
08401048
...
@@ -246,22 +246,22 @@ by KATOH Yasufumi <karma at jazz.email.ne.jp>
...
@@ -246,22 +246,22 @@ by KATOH Yasufumi <karma at jazz.email.ne.jp>
To spawn a shell in a new network, pid, mount, and hostname
To spawn a shell in a new network, pid, mount, and hostname
namespace.
namespace.
<programlisting>
<programlisting>
lxc-unshare -s "NETWORK|PID|MOUNT|UTSNAME" -M -H
slav
e -i veth1 /bin/bash
lxc-unshare -s "NETWORK|PID|MOUNT|UTSNAME" -M -H
myhostnam
e -i veth1 /bin/bash
</programlisting>
</programlisting>
-->
-->
新しいネットワーク、PID、マウント、ホスト名 (UTS) 名前空間でシェルを起動するには、
新しいネットワーク、PID、マウント、ホスト名 (UTS) 名前空間でシェルを起動するには、
<programlisting>
<programlisting>
lxc-unshare -s "NETWORK|PID|MOUNT|UTSNAME" -M -H
slav
e -i veth1 /bin/bash
lxc-unshare -s "NETWORK|PID|MOUNT|UTSNAME" -M -H
myhostnam
e -i veth1 /bin/bash
</programlisting>
</programlisting>
<!--
<!--
The resulting shell will have pid 1 and will see two network
The resulting shell will have pid 1 and will see two network
interfaces (lo and veth1). The hostname will be "
slav
e" and
interfaces (lo and veth1). The hostname will be "
myhostnam
e" and
/proc will have been remounted. ps output will show there are
/proc will have been remounted. ps output will show there are
no other processes in the namespace.
no other processes in the namespace.
-->
-->
起動したシェルは PID 1 を持ち、2 つのネットワークインターフェース (lo と veth1) を持ちます。
起動したシェルは PID 1 を持ち、2 つのネットワークインターフェース (lo と veth1) を持ちます。
ホスト名は "
slav
e" となり、/proc は再マウントされます。ps コマンドは、名前空間内には他のプロセスがない状態を表示するでしょう。
ホスト名は "
myhostnam
e" となり、/proc は再マウントされます。ps コマンドは、名前空間内には他のプロセスがない状態を表示するでしょう。
</para>
</para>
</refsect1>
</refsect1>
...
...
doc/ko/lxc-attach.sgml.in
View file @
08401048
...
@@ -103,8 +103,8 @@ by Sungbae Yoo <sungbae.yoo at samsung.com>
...
@@ -103,8 +103,8 @@ by Sungbae Yoo <sungbae.yoo at samsung.com>
input faking via a TIOCSTI <command>ioctl</command> call after switching
input faking via a TIOCSTI <command>ioctl</command> call after switching
between userspace execution contexts with different privilege levels. Newer
between userspace execution contexts with different privilege levels. Newer
versions of <command>lxc-attach</command> will try to allocate a pseudo
versions of <command>lxc-attach</command> will try to allocate a pseudo
terminal
master/slave
pair on the host and attach any standard file
terminal
file descriptor
pair on the host and attach any standard file
descriptors which refer to a terminal to the
slave
side of the pseudo
descriptors which refer to a terminal to the
container
side of the pseudo
terminal before executing a shell or command. Note, that if none of the
terminal before executing a shell or command. Note, that if none of the
standard file descriptors refer to a terminal <command>lxc-attach</command>
standard file descriptors refer to a terminal <command>lxc-attach</command>
will not try to allocate a pseudo terminal. Instead it will simply attach
will not try to allocate a pseudo terminal. Instead it will simply attach
...
...
doc/ko/lxc-unshare.sgml.in
View file @
08401048
...
@@ -242,21 +242,21 @@ by Sungbae Yoo <sungbae.yoo at samsung.com>
...
@@ -242,21 +242,21 @@ by Sungbae Yoo <sungbae.yoo at samsung.com>
To spawn a shell in a new network, pid, mount, and hostname
To spawn a shell in a new network, pid, mount, and hostname
namespace.
namespace.
<programlisting>
<programlisting>
lxc-unshare -s "NETWORK|PID|MOUNT|UTSNAME" -M -H
slav
e -i veth1 /bin/bash
lxc-unshare -s "NETWORK|PID|MOUNT|UTSNAME" -M -H
myhostnam
e -i veth1 /bin/bash
</programlisting>
</programlisting>
-->
-->
새로운 네트워크, PID, 마운트 그리고 호스트 이름(UTS) 네임스페이스 내에 쉘을 실행하려면, 아래처럼 하면 된다.
새로운 네트워크, PID, 마운트 그리고 호스트 이름(UTS) 네임스페이스 내에 쉘을 실행하려면, 아래처럼 하면 된다.
<programlisting>
<programlisting>
lxc-unshare -s "NETWORK|PID|MOUNT|UTSNAME" -M -H
slav
e -i veth1 /bin/bash
lxc-unshare -s "NETWORK|PID|MOUNT|UTSNAME" -M -H
myhostnam
e -i veth1 /bin/bash
</programlisting>
</programlisting>
<!--
<!--
The resulting shell will have pid 1 and will see two network
The resulting shell will have pid 1 and will see two network
interfaces (lo and veth1). The hostname will be "
slav
e" and
interfaces (lo and veth1). The hostname will be "
myhostnam
e" and
/proc will have been remounted. ps output will show there are
/proc will have been remounted. ps output will show there are
no other processes in the namespace.
no other processes in the namespace.
-->
-->
그 결과 생긴 쉘은 1번 pid를 갖는다. 그리고 2개의 네트워크 인터페이스(lo와 veth1)를 갖는다. 호스트 이름은 "
slav
e"이고, /proc은 다시 마운트 된다.
그 결과 생긴 쉘은 1번 pid를 갖는다. 그리고 2개의 네트워크 인터페이스(lo와 veth1)를 갖는다. 호스트 이름은 "
myhostnam
e"이고, /proc은 다시 마운트 된다.
ps 명령어를 입력하면, 네임스페이스 내에서 다른 프로세스들은 보이지 않을 것이다.
ps 명령어를 입력하면, 네임스페이스 내에서 다른 프로세스들은 보이지 않을 것이다.
</para>
</para>
</refsect1>
</refsect1>
...
...
doc/lxc-attach.sgml.in
View file @
08401048
...
@@ -90,8 +90,8 @@ Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA
...
@@ -90,8 +90,8 @@ Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA
input faking via a TIOCSTI <command>ioctl</command> call after switching
input faking via a TIOCSTI <command>ioctl</command> call after switching
between userspace execution contexts with different privilege levels. Newer
between userspace execution contexts with different privilege levels. Newer
versions of <command>lxc-attach</command> will try to allocate a pseudo
versions of <command>lxc-attach</command> will try to allocate a pseudo
terminal
master/slave
pair on the host and attach any standard file
terminal
file descriptor
pair on the host and attach any standard file
descriptors which refer to a terminal to the
slave
side of the pseudo
descriptors which refer to a terminal to the
container
side of the pseudo
terminal before executing a shell or command. Note, that if none of the
terminal before executing a shell or command. Note, that if none of the
standard file descriptors refer to a terminal <command>lxc-attach</command>
standard file descriptors refer to a terminal <command>lxc-attach</command>
will not try to allocate a pseudo terminal. Instead it will simply attach
will not try to allocate a pseudo terminal. Instead it will simply attach
...
...
doc/lxc-unshare.sgml.in
View file @
08401048
...
@@ -190,11 +190,11 @@ Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA
...
@@ -190,11 +190,11 @@ Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA
To spawn a shell in a new network, pid, mount, and hostname
To spawn a shell in a new network, pid, mount, and hostname
namespace.
namespace.
<programlisting>
<programlisting>
lxc-unshare -s "NETWORK|PID|MOUNT|UTSNAME" -M -H
slav
e -i veth1 /bin/bash
lxc-unshare -s "NETWORK|PID|MOUNT|UTSNAME" -M -H
myhostnam
e -i veth1 /bin/bash
</programlisting>
</programlisting>
The resulting shell will have pid 1 and will see two network
The resulting shell will have pid 1 and will see two network
interfaces (lo and veth1). The hostname will be "
slav
e" and
interfaces (lo and veth1). The hostname will be "
myhostnam
e" and
/proc will have been remounted. ps output will show there are
/proc will have been remounted. ps output will show there are
no other processes in the namespace.
no other processes in the namespace.
</para>
</para>
...
...
Write
Preview
Markdown
is supported
0%
Try again
or
attach a new file
Attach a file
Cancel
You are about to add
0
people
to the discussion. Proceed with caution.
Finish editing this message first!
Cancel
Please
register
or
sign in
to comment