- 17 Nov, 2016 40 commits
-
-
Antonio Terceiro authored
init 1.34 is not "Essential" anymore, in order to make it not required on minimal chroots, docker containers, etc. Because of that we now need to manually include it on systems that are expected to boot. Signed-off-by:Antonio Terceiro <terceiro@debian.org>
-
Jörg Krause authored
struct in6_addr is both defined in the C library header <netinet/in.h> and the Linux kernel header <linux/in6.h>. lxc_user_nic.c includes both <netinet/in.h> and <linux/if_bridge.h>. The later one includes <linux/in6.h>. This breaks build with the musl libc: error: redefinition of ‘struct in6_addr’ As lxc_user_nic.c does not use any references from <linux/if_bridge.h> it is safe to remove this header. Signed-off-by:Jörg Krause <joerg.krause@embedded.rocks>
-
Andrey Kostin authored
Signed-off-by:Andrey Kostin <andrey@kostin.email>
-
Stéphane Graber authored
Signed-off-by:Stéphane Graber <stgraber@ubuntu.com>
-
Stewart Brodie authored
If the value starts and ends with matching quote characters, those characters are stripped automatically. Quote characters are the single quote (') or double quote ("). The quote removal is done after the whitespace trimming. This is needed particularly in order that lxc.environment values may have trailing spaces. However, the quote removal is done for all values in the parse_line function, as it has non-const access to the value. Signed-off-by:Stewart Brodie <stewart@metahusky.net>
-
Serge Hallyn authored
so that there is a root uid mapping for the /proc/net files. Signed-off-by:Serge Hallyn <serge.hallyn@ubuntu.com>
-
Hartnell Foster authored
Signed-off-by:Hartnell Foster <hartnell.foster@bbc.co.uk>
-
Christian Brauner authored
Signed-off-by:Christian Brauner <christian.brauner@mailbox.org>
-
Tycho Andersen authored
I think (?) this may be related to our hanging monitor bug. Let's do this anyway, as it's probably a good idea. Signed-off-by:Tycho Andersen <tycho.andersen@canonical.com>
-
Lisio authored
Required for proper applying dnsmasq config entries. Signed-off-by:Andrey Kostin <andrey@kostin.email>
-
Aron Podrigal authored
Signed-off-by:Aron Podrigal <aronp@guaranteedplus.com>
-
Aron Podrigal authored
When container init failed for whatever reason, previously it resulted in a `SystemError: NULL result without error in PyObject_Call` This will now result in a RuntimeError with the error message previously printed to stderr. Signed-off-by:Aron Podrigal <aronp@guaranteedplus.com>
-
walkerning authored
Let lxc-checkconfig write to non-tty stdout without color control characters Signed-off-by:walkerning <foxdoraame@gmail.com>
-
Stéphane Graber authored
Signed-off-by:Stéphane Graber <stgraber@ubuntu.com>
-
Evgeni Golov authored
the target is obsolete since systemd v38 which everybody should have. original patch by Daniel Baumann Signed-off-by:Evgeni Golov <evgeni@debian.org>
-
Evgeni Golov authored
Using $(date) for LXC_GENERATE_DATE has various flaws: * formating depends on the locale of the system we execute configure on * the output is not really a date but more a timestamp Let's use $(date --utc '+%Y-%m-%d') instead. While at it, also support SOURCE_DATE_EPOCH [1] to make the build reproducible [1] https://reproducible-builds.org/specs/source-date-epoch/Signed-off-by:
Evgeni Golov <evgeni@debian.org>
-
staticfox authored
Signed-off-by:Matt Ullman <staticfox@staticfox.net>
-
Christian Brauner authored
Signed-off-by:Christian Brauner <christian.brauner@mailbox.org>
-
Wolfgang Bumiller authored
All uses of netlink_open() assume that on error the nl_handler doesn't need to be closed, but some error cases happen after the socket was opened successfully and used to simply return -errno. Signed-off-by:Wolfgang Bumiller <w.bumiller@proxmox.com>
-
Evgeni Golov authored
Signed-off-by:Evgeni Golov <evgeni@debian.org>
-
Oleg Freedholm authored
Signed-off-by:Oleg Freedholm <overlayfs@gmail.com>
-
Oleg Freedhom authored
A change in kernel 4.2 caused btrfs_recursive_destroy to fail to delete unprivileged containers. This patch restores the pre-kernel-4.2 behaviour. Ref: Issue 935. Signed-off-by:Oleg Freedhom <overlayfs@gmail.com>
-
Evgeni Golov authored
Squeeze is EOL now, Stretch is the upcoming stable Signed-off-by:Evgeni Golov <evgeni@golov.de>
-
Stéphane Graber authored
Signed-off-by:Stéphane Graber <stgraber@ubuntu.com>
-
Evgeni Golov authored
debootstrap sometimes selects the wrong mirror due to [1] [1] https://bugs.debian.org/819300Signed-off-by:
Evgeni Golov <evgeni@debian.org>
-
Evgeni Golov authored
http.debian.net is an alias anyways and httpredir.debian.org is the official name of the service Signed-off-by:Evgeni Golov <evgeni@debian.org>
-
Aleksandr Mezin authored
Signed-off-by:Aleksandr Mezin <mezin.alexander@gmail.com>
-
Bogdan Purcareata authored
The warning has been present since commit 32b37181 (with no purpose stated). Support for dynamically linked Busybox has been added since commit bf6cc736. Haven't encountered any issues with dynamically linked Busybox in my last 2 years' testing. Signed-off-by:
Bogdan Purcareata <bogdan.purcareata@nxp.com> Acked-by:
Stéphane Graber <stgraber@ubuntu.com>
-
Aleksandr Mezin authored
This gives more meaningful error message than "invalid sequence". Signed-off-by:Aleksandr Mezin <mezin.alexander@gmail.com>
-
Aleksandr Mezin authored
Signed-off-by:Aleksandr Mezin <mezin.alexander@gmail.com>
-
Bogdan Purcareata authored
Signed-off-by:Bogdan Purcareata <bogdan.purcareata@nxp.com>
-
Christian Brauner authored
The open_without_symlink routine has been specifically created to prevent mounts with synlinks as source or destination. Keep SYSERROR'ing in that particular scenario, but leave error handling to calling functions for the other ones - e.g. optional bind mount when the source dir doesn't exist throws a nasty error. Signed-off-by:Bogdan Purcareata <bogdan.purcareata@nxp.com>
-
Sungbae Yoo authored
Explain that the pipe symbol needs to be escaped for -s. Signed-off-by:Sungbae Yoo <sungbae.yoo@samsung.com>
-
KATOH Yasufumi authored
Explain that the pipe symbol needs to be escaped for -e and -s. Update for commit 759d521bSigned-off-by:
KATOH Yasufumi <karma@jazz.email.ne.jp>
-
Serge Hallyn authored
don't always warn about unused cgroups, it's noisy and not helpful Signed-off-by:Serge Hallyn <serge.hallyn@ubuntu.com>
-
Serge Hallyn authored
If lxcfs starts before cgroup-lite, then the first cgroup mountpoints in /proc/self/mountinfo are /run/lxcfs/*. Unprivileged users cannot access these. So privileged containers are ok, and unprivileged containers are ok since they won't cache those to begin with. But unprivileged root-owned containers cache /run/lxcfs/* and then try to use them. So when doing cgroup automounting check whether the mountpoints we have stored are accessible, and if not look for a new one to use. Signed-off-by:Serge Hallyn <serge.hallyn@ubuntu.com>
-
Stéphane Graber authored
Reported-by: lintian Signed-off-by:Stéphane Graber <stgraber@ubuntu.com>
-
Ubuntu authored
When containers have lxcfs mounted instead of cgroupfs, we have to process /proc/self/mountinfo a bit differently. In particular, we should look for fuse.lxcfs fstype, we need to look elsewhere for the list of comounted controllers, and the mount_prefix is not a cgroup path which was bind mounted, so we should ignore it, and named subsystems show up without the 'name=' prefix. With this patchset I can start containers inside a privileged lxd container with lxcfs mounted (i.e. without cgroup namespaces). Closes #830 Signed-off-by:Ubuntu <ubuntu@localhost.localdomain>
-
Serge Hallyn authored
Because that's what lxcfs gives us. Signed-off-by:Serge Hallyn <serge.hallyn@ubuntu.com>
-
Serge Hallyn authored
If we're trying to allow a device which was denied to our parent container, just continue. Cgmanager does not help us to distinguish between eperm and other errors, so just always continue. We may want to consider actually computing the range of devices to which the container monitor has access, but OTOH that introduces a whole new set of complexity to compute access sets. Closes #827 Signed-off-by:Serge Hallyn <serge.hallyn@ubuntu.com>
-