- 26 Feb, 2016 2 commits
-
-
Jakub Jirutka authored
Now it runs even on minimal Alpine system without bash, curl, openssl or rsync. Signed-off-by:Jakub Jirutka <jakub@jirutka.cz>
-
Jakub Jirutka authored
New template script is more readable and robust, uses cache and external LXC config file as other templates. Signed-off-by:Jakub Jirutka <jakub@jirutka.cz>
-
- 20 Feb, 2016 5 commits
-
-
Serge Hallyn authored
Fix typo in lxc manpage
-
Stéphane Graber authored
Reported-by: lintian Signed-off-by:Stéphane Graber <stgraber@ubuntu.com>
-
Stéphane Graber authored
2016 02 19/cgfs
-
Ubuntu authored
When containers have lxcfs mounted instead of cgroupfs, we have to process /proc/self/mountinfo a bit differently. In particular, we should look for fuse.lxcfs fstype, we need to look elsewhere for the list of comounted controllers, and the mount_prefix is not a cgroup path which was bind mounted, so we should ignore it, and named subsystems show up without the 'name=' prefix. With this patchset I can start containers inside a privileged lxd container with lxcfs mounted (i.e. without cgroup namespaces). Closes #830 Signed-off-by:Ubuntu <ubuntu@localhost.localdomain>
-
Serge Hallyn authored
Because that's what lxcfs gives us. Signed-off-by:Serge Hallyn <serge.hallyn@ubuntu.com>
-
- 19 Feb, 2016 4 commits
-
-
Stéphane Graber authored
cgroups: do not fail if setting devices cgroup fails due to EPERM
-
Serge Hallyn authored
If we're trying to allow a device which was denied to our parent container, just continue. Cgmanager does not help us to distinguish between eperm and other errors, so just always continue. We may want to consider actually computing the range of devices to which the container monitor has access, but OTOH that introduces a whole new set of complexity to compute access sets. Closes #827 Signed-off-by:Serge Hallyn <serge.hallyn@ubuntu.com>
-
Serge Hallyn authored
cast NULL pointers passed to execl*()
-
Christian Brauner authored
NULL pointers passed to execl*() functions must be cast to (char *)NULL since they are variadic functions. Signed-off-by:Christian Brauner <christian.brauner@mailbox.org>
-
- 18 Feb, 2016 1 commit
-
-
Stéphane Graber authored
Signed-off-by:Stéphane Graber <stgraber@ubuntu.com>
-
- 16 Feb, 2016 5 commits
-
-
Christian Brauner authored
Fix doc build warnings
-
Stéphane Graber authored
Signed-off-by:Stéphane Graber <stgraber@ubuntu.com>
-
Serge Hallyn authored
Couple of apparmor tweaks
-
Stéphane Graber authored
Signed-off-by:Stéphane Graber <stgraber@ubuntu.com>
-
Stéphane Graber authored
Signed-off-by:Stéphane Graber <stgraber@ubuntu.com>
-
- 15 Feb, 2016 3 commits
-
-
Christian Brauner authored
2016 02 15/lognull
-
Serge Hallyn authored
Otherwise after a shortcut on error we could end up trying to write to the closed log fd. Signed-off-by:Serge Hallyn <serge.hallyn@ubuntu.com>
-
Serge Hallyn authored
fname cannot be passed in as NULL by any of its current callers. If it could, then build_dir() would crash as it doesn't check for it. So make sure we are warned if in the future we pass in NULL. Signed-off-by:Serge Hallyn <serge.hallyn@ubuntu.com>
-
- 10 Feb, 2016 6 commits
-
-
Serge Hallyn authored
lxc-destroy: deal with ephemeral containers
-
Christian Brauner authored
- Ephemeral containers are destroyed on shutdown so we do not destroy them. - Destroy ephemeral containers with clones: first destroy all the clones, then destroy the container. - Ephemeral containers with snapshots cannot be easily handled but we can probably trust that no one will try to make snapshots of an ephemeral container. Signed-off-by:Christian Brauner <christian.brauner@mailbox.org>
-
Serge Hallyn authored
silence lxc-copy as well when asked
-
Christian Brauner authored
Signed-off-by:Christian Brauner <christian.brauner@mailbox.org>
-
Christian Brauner authored
lxc_destroy: be quiet if asked
-
Serge Hallyn authored
As per https://bugs.launchpad.net/bugs/1543016. Signed-off-by:
Serge Hallyn <serge.hallyn@ubuntu.com>
-
- 08 Feb, 2016 2 commits
-
-
Christian Brauner authored
apparmor: don't fail if current aa label is given
-
Serge Hallyn authored
Ideally a container configuration will specify 'unchanged' if it wants the container to use the current (parent) profile. But lxd passes its current label. Support that too. Note that if/when stackable profiles exist, this behavior may or may not be what we want. But the code to deal with aa stacking will need some changes anyway so this is ok. With this patch, I can create nested containers inside a lxd xenial container both using lxc launch x2 and unprivileged lxc-start -n x2 Signed-off-by:Serge Hallyn <serge.hallyn@ubuntu.com>
-
- 05 Feb, 2016 2 commits
-
-
Stéphane Graber authored
fix typo
-
Katze authored
Signed-off-by:benaryorg <binary@benary.org>
-
- 04 Feb, 2016 5 commits
-
-
Serge Hallyn authored
allow overlay lxc.mount.entry with no rootfs
-
Christian Brauner authored
Allow lxc.mount.entry entries for containers without a rootfs. Signed-off-by:Christian Brauner <christian.brauner@mailbox.org>
-
Christian Brauner authored
Comment the lxc_rootfs structure
-
Serge Hallyn authored
Comment rootfs.path and rootfs.mount so people can better figure out which to use. Remove the unused pivotdir argument from setup_rootfs_pivot_root(). Remove the unused pivot member of the lxc_rootfs struct. And just return 0 (success) when someone passes a lxc.pivotdir entry. One day we'll turn that into an error, but not yet... Signed-off-by:Serge Hallyn <serge.hallyn@ubuntu.com>
-
Stéphane Graber authored
lxc-checkconfig: warn about fuse as well
-
- 03 Feb, 2016 5 commits
-
-
Tycho Andersen authored
Since we need fuse to run lxcfs, which is required by systemd, let's warn about that as well. Signed-off-by:Tycho Andersen <tycho.andersen@canonical.com>
-
Serge Hallyn authored
no rootfs => mounts always relative to host's /
-
Christian Brauner authored
All lxc.mount.entry entries will be relative to the hosts / when a container does not specify a lxc.rootfs. Signed-off-by:Christian Brauner <christian.brauner@mailbox.org>
-
Serge Hallyn authored
move and rename mount_entry_create_aufs_dirs()
-
Christian Brauner authored
- The function mount_entry_create_aufs_dirs() moves from conf.c to lxcaufs.{c,h} where it belongs. - In accordance with the "aufs_" prefix naming scheme for functions associated with lxcaufs.{c,h} mount_entry_create_aufs_dirs() becomes aufs_mkdir(). - Add aufs_get_rootfs() which returns the rootfs for an aufs lxc.rootfs. Signed-off-by:Christian Brauner <christian.brauner@mailbox.org>
-