1. 16 Aug, 2014 10 commits
  2. 15 Aug, 2014 1 commit
  3. 08 Aug, 2014 11 commits
  4. 06 Aug, 2014 1 commit
  5. 04 Aug, 2014 14 commits
  6. 31 Jul, 2014 3 commits
    • use non-thread-safe getpwuid and getpwgid for android · a96a8e8c
      Serge Hallyn authored
      We only call it (so far) after doing a fork(), so this is fine.  If we
      ever need such a thing from threaded context, we'll simply need to write
      our own version for android.
      Signed-off-by: 's avatarSerge Hallyn <serge.hallyn@ubuntu.com>
      Acked-by: 's avatarStéphane Graber <stgraber@ubuntu.com>
    • print a helpful message if creating unpriv container with no idmap · 97e9cfa0
      Serge Hallyn authored
      This gives me:
      
      ubuntu@c-t1:~$ lxc-create -t download -n u1
      lxc_container: No mapping for container root
      lxc_container: Error chowning /home/ubuntu/.local/share/lxc/u1/rootfs to container root
      lxc_container: You must either run as root, or define uid mappings
      lxc_container: To pass uid mappings to lxc-create, you could create
      lxc_container: ~/.config/lxc/default.conf:
      lxc_container: lxc.include = /etc/lxc/default.conf
      lxc_container: lxc.id_map = u 0 100000 65536
      lxc_container: lxc.id_map = g 0 100000 65536
      lxc_container: Error creating backing store type (none) for u1
      lxc_container: Error creating container u1
      
      when I create a container without having an id mapping defined.
      Signed-off-by: 's avatarSerge Hallyn <serge.hallyn@ubuntu.com>
    • provide an example SELinux policy for older releases · 719fae07
      Dwight Engen authored
      The virtd_lxc_t type provided by the default RHEL/CentOS/Oracle 6.5
      policy is an unconfined_domain(), so it doesn't really enforce anything.
      This change will provide a link in the documentation to an example
      policy that does confine containers.
      
      On more recent distributions with new enough policy, it is recommended
      not to use this sample policy, but to use the types already available
      on the system from /etc/selinux/targeted/contexts/lxc_contexts, ie:
      
      process = "system_u:system_r:svirt_lxc_net_t:s0"
      file = "system_u:object_r:svirt_sandbox_file_t:s0"
      Signed-off-by: 's avatarDwight Engen <dwight.engen@oracle.com>
      Acked-by: 's avatarSerge E. Hallyn <serge.hallyn@ubuntu.com>