- 08 Aug, 2014 19 commits
-
-
Serge Hallyn authored
They don't work right now, so until we fix that, don't allow it. (This patch is for stable-1.0) Signed-off-by:
Serge Hallyn <serge.hallyn@ubuntu.com> Acked-by:
Stéphane Graber <stgraber@ubuntu.com>
-
Jean-Tiare LE BIGOT authored
When `lxc.autodev = 0` and empty tmpfs is mounted on /dev and private pts are requested, we need to ensure '/dev/pts' exists before attempting to mount devpts on it. Signed-off-by:
Jean-Tiare LE BIGOT <jean-tiare.le-bigot@ovh.net> Acked-by:
Stéphane Graber <stgraber@ubuntu.com>
-
Vincent Giersch authored
Signed-off-by:
Vincent Giersch <vincent.giersch@ovh.net> Acked-by:
Stéphane Graber <stgraber@ubuntu.com>
-
Vincent Giersch authored
Especially when using the Python API, the child process inherits of the file descriptiors of the script. Signed-off-by:
Vincent Giersch <vincent.giersch@ovh.net> Acked-by:
Stéphane Graber <stgraber@ubuntu.com>
-
Jean-Tiare LE BIGOT authored
Signed-off-by:
Jean-Tiare LE BIGOT <jean-tiare.le-bigot@ovh.net> Acked-by:
Stéphane Graber <stgraber@ubuntu.com>
-
rabisg authored
Signed-off-by:
Rabi Shanker Guha <guha.rabishankar@gmail.com> Acked-by:
Stéphane Graber <stgraber@ubuntu.com>
-
Kalman Olah authored
With the current old CentOS template, dnsmasq was not able to resolve the hostname of an lxc container after it had been created. This minor change rectifies that. Signed-off-by:
Kalman Olah <hello@kalmanolah.net> Acked-by:
Stéphane Graber <stgraber@ubuntu.com>
-
Nikolay Martynov authored
Send container's hostname to dhcp server when getting ip address. Signed-off-by:
Nikolay Martynov <mar.kolya@gmail.com> Acked-by:
Stéphane Graber <stgraber@ubuntu.com>
-
Michael Werner authored
Signed-off-by:
Michael Werner <xaseron@googlemail.com> Acked-by:
Stéphane Graber <stgraber@ubuntu.com>
-
Serge Hallyn authored
/dev/shm must be turned from a directory into a symlink to /run/shm. The templates do this only if they find -d $rootfs/run/shm. Since /run will be a tmpfs, checking for it in the rootfs is silly. It also is currently broken as ubuntu cloud images have an empty /run. (this should fix https://bugs.launchpad.net/ubuntu/+source/lxc/+bug/1353734) Signed-off-by:
Serge Hallyn <serge.hallyn@ubuntu.com> Acked-by:
Stéphane Graber <stgraber@ubuntu.com>
-
Serge Hallyn authored
Pull the #defines and struct definitions for btrfs into a separate .h file to not clutter bdev.c Implement btrfs recursive delete support A non-root user isn't allow to do the ioctls needed for searching (as you can verify with 'btrfs subvolume list'). So for an unprivileged user, if the rootfs has subvolumes under it, deletion will fail. Otherwise, it will succeed. Changelog: Aug 1: . Fix wrong objid passing when determining directory paths . In do_remove_btrfs_children, avoid dereferencing NULL dirid . Fix memleak in error case. Signed-off-by:
Serge Hallyn <serge.hallyn@ubuntu.com> Acked-by:
Stéphane Graber <stgraber@ubuntu.com>
-
KATOH Yasufumi authored
Signed-off-by:
KATOH Yasufumi <karma@jazz.email.ne.jp> Acked-by:
Stéphane Graber <stgraber@ubuntu.com>
-
KATOH Yasufumi authored
Update for commit 719fae07Signed-off-by:
KATOH Yasufumi <karma@jazz.email.ne.jp> Acked-by:
Stéphane Graber <stgraber@ubuntu.com>
-
KATOH Yasufumi authored
Update for commit 476d302cSigned-off-by:
KATOH Yasufumi <karma@jazz.email.ne.jp> Acked-by:
Stéphane Graber <stgraber@ubuntu.com>
-
Serge Hallyn authored
We only call it (so far) after doing a fork(), so this is fine. If we ever need such a thing from threaded context, we'll simply need to write our own version for android. Signed-off-by:
Serge Hallyn <serge.hallyn@ubuntu.com> Acked-by:
Stéphane Graber <stgraber@ubuntu.com>
-
Serge Hallyn authored
This gives me: ubuntu@c-t1:~$ lxc-create -t download -n u1 lxc_container: No mapping for container root lxc_container: Error chowning /home/ubuntu/.local/share/lxc/u1/rootfs to container root lxc_container: You must either run as root, or define uid mappings lxc_container: To pass uid mappings to lxc-create, you could create lxc_container: ~/.config/lxc/default.conf: lxc_container: lxc.include = /etc/lxc/default.conf lxc_container: lxc.id_map = u 0 100000 65536 lxc_container: lxc.id_map = g 0 100000 65536 lxc_container: Error creating backing store type (none) for u1 lxc_container: Error creating container u1 when I create a container without having an id mapping defined. Signed-off-by:Serge Hallyn <serge.hallyn@ubuntu.com>
-
Dwight Engen authored
The virtd_lxc_t type provided by the default RHEL/CentOS/Oracle 6.5 policy is an unconfined_domain(), so it doesn't really enforce anything. This change will provide a link in the documentation to an example policy that does confine containers. On more recent distributions with new enough policy, it is recommended not to use this sample policy, but to use the types already available on the system from /etc/selinux/targeted/contexts/lxc_contexts, ie: process = "system_u:system_r:svirt_lxc_net_t:s0" file = "system_u:object_r:svirt_sandbox_file_t:s0" Signed-off-by:
Dwight Engen <dwight.engen@oracle.com> Acked-by:
Serge E. Hallyn <serge.hallyn@ubuntu.com>
-
Stéphane Graber authored
This forces wget to retry if it gets a network error. Signed-off-by:
Stéphane Graber <stgraber@ubuntu.com> Acked-by:
Serge E. Hallyn <serge.hallyn@ubuntu.com>
-
Stéphane Graber authored
Introduce a new -F option (no-op for now) as an opposite of -d. Signed-off-by:
Stéphane Graber <stgraber@ubuntu.com> Acked-by:
Serge E. Hallyn <serge.hallyn@ubuntu.com>
-
- 31 Jul, 2014 6 commits
-
-
Martin Pitt authored
Without this, if the system uses shared subtrees by default (like systemd), you get a large stream of lxc-start: Permission denied - Failed to make /<mountpoint> rslave lxc-start: Continuing... with apparmor="DENIED" operation="mount" info="failed flags match" error=-13 profile="/usr/bin/lxc-start" name="/" pid=17284 comm="lxc-start" flags="rw, slave" and eventual failure plus a lot of leftover mounts in the host. https://launchpad.net/bugs/1325468
-
Trần Ngọc Quân authored
Signed-off-by:
Trần Ngọc Quân <vnwildman@gmail.com> Signed-off-by:
Serge Hallyn <serge.hallyn@ubuntu.com>
-
Serge Hallyn authored
Signed-off-by:Serge Hallyn <serge.hallyn@ubuntu.com>
-
Serge Hallyn authored
Rather than always using eth0. Otherwise unpriv containers cannot have multiple lxc.network.type = veth's without manually setting lxc.network.name =. Signed-off-by:Serge Hallyn <serge.hallyn@ubuntu.com>
-
Ansa89 authored
Signed-off-by:
Stefano Ansaloni <ansalonistefano@gmail.com> Acked-by:
Stéphane Graber <stgraber@ubuntu.com>
-
Nikolay Martynov authored
This patch adds SIGPWR support to lxc_init. This helps to properly shutdown lxc_init based containers. Signed-off-by:
Nikolay Martynov <mar.kolya@gmail.com> Acked-by:
Stéphane Graber <stgraber@ubuntu.com>
-
- 18 Jul, 2014 3 commits
-
-
Serge Hallyn authored
Also fix the comment in lxc-cirros template (which I overlooked last time). Signed-off-by:
Serge Hallyn <serge.hallyn@ubuntu.com> Acked-by:
Stéphane Graber <stgraber@ubuntu.com>
-
Serge Hallyn authored
That mount hook predates the lxc.mount.auto = cgroup option. So mention that instead. Perhaps we should simply drop the mountcgroup hook from the tree, but I'm not doing that in this patch. Signed-off-by:Serge Hallyn <serge.hallyn@ubuntu.com>
-
Serge Hallyn authored
These tests are failing on new kernels because the container root is not privileged over the directories, since privilege no requires the group being mapped into the container. Signed-off-by:Serge Hallyn <serge.hallyn@ubuntu.com>
-
- 16 Jul, 2014 2 commits
-
-
KATOH Yasufumi authored
Update Japanese lxc.container.conf(5) for commit 8982c0fdSigned-off-by:
KATOH Yasufumi <karma@jazz.email.ne.jp> Acked-by:
Stéphane Graber <stgraber@ubuntu.com>
-
Stéphane Graber authored
veth.pair is ignore for unprivileged containers as allowing an unprivileged user to set a specific device name would allow them to trigger actions in tools like NetworkManager or other uevent based handlers that may react based on specific names or prefixes being used. Signed-off-by:Stéphane Graber <stgraber@ubuntu.com>
-
- 15 Jul, 2014 4 commits
-
-
Claudio Alarcon-Reyes authored
When using unprivileged containers, tty fails because of vhangup. Adding --nohangup to nimgetty, it fixes the issue. This is the same problem occurred for oracle template, commit 2e83f720 Signed-off-by: Claudio Alarcon clalarco@gmail.com
-
Stéphane Graber authored
Signed-off-by:Stéphane Graber <stgraber@ubuntu.com>
-
Serge Hallyn authored
The netdev->priv is shared for the netdev types. A bad config file could mix configuration for different types, resulting in a bad netdev->priv when starting or even destroying a container. So sanity check the netdev->type before setting a netdev->priv element. This should fix https://github.com/lxc/lxc/issues/254Signed-off-by:
Serge Hallyn <serge.hallyn@ubuntu.com> Acked-by:
Stéphane Graber <stgraber@ubuntu.com>
-
Serge Hallyn authored
Signed-off-by:Serge Hallyn <serge.hallyn@ubuntu.com>
-
- 14 Jul, 2014 1 commit
-
-
Stéphane Graber authored
Signed-off-by:Stéphane Graber <stgraber@ubuntu.com>
-
- 13 Jul, 2014 4 commits
-
-
Stéphane Graber authored
Signed-off-by:Stéphane Graber <stgraber@ubuntu.com>
-
Stéphane Graber authored
Reported-by: Michael J. Evans Signed-off-by:Stéphane Graber <stgraber@ubuntu.com>
-
Alexander Dreweke authored
Signed-off-by:
Alexander Dreweke <alexander@dreweke.net> Acked-by:
Stéphane Graber <stgraber@ubuntu.com>
-
Alexander Dreweke authored
added space ">/" -> "> /" Signed-off-by:
Alexander Dreweke <alexander@dreweke.net> Acked-by:
Stéphane Graber <stgraber@ubuntu.com>
-
- 07 Jul, 2014 1 commit
-
-
Stéphane Graber authored
Signed-off-by:Stéphane Graber <stgraber@ubuntu.com>
-