- 12 Jul, 2017 2 commits
-
-
Long Wang authored
Signed-off-by:Long Wang <w@laoqinren.net>
-
Long Wang authored
Signed-off-by:Long Wang <w@laoqinren.net>
-
- 11 Jul, 2017 7 commits
-
-
Christian Brauner authored
cgfsng: only output debug info when we set cgroup data
-
Christian Brauner authored
Update Japanese man pages
-
KATOH Yasufumi authored
add "--defined" option Signed-off-by:KATOH Yasufumi <karma@jazz.email.ne.jp>
-
KATOH Yasufumi authored
Follow updates of configuration keys: * Delete lxc.kmsg (commit 26a38fb6) * lxc.console -> lxc.console.path (commit 3aed4934) * lxc.mount -> lxc.mount.fstab (commit 47148e96) * lxc.net.ipv{4,6} -> lxc.net.ipv{4,6}.address (commit 9ff60df2, 2e44ae28) * lxc.tty -> lxc.tty.max, lxc.devttydir -> lxc.tty.dir (commit fe1c5887) * lxc.pts -> lxc.pty.max (commit 232763) Signed-off-by:
KATOH Yasufumi <karma@jazz.email.ne.jp>
-
Long Wang authored
Only output debug info `cgroup 'xxxx' set to 'yyyy'` when we set cgroup data. Signed-off-by:Long Wang <w@laoqinren.net>
-
Stéphane Graber authored
Signed-off-by:Stéphane Graber <stgraber@ubuntu.com>
-
William Gathoye authored
Fix potential CVE when using spaces in LXC names Signed-off-by:William Gathoye <william@gathoye.be>
-
- 10 Jul, 2017 3 commits
-
-
Christian Brauner authored
start: dup std{in,out,err} to pty slave -
Christian Brauner authored
non-functional changes Signed-off-by:Christian Brauner <christian.brauner@ubuntu.com>
-
Li Feng authored
In the case the container has a console with a valid slave pty file descriptor we duplicate std{in,out,err} to the slave file descriptor so console logging works correctly. When the container does not have a valid slave pty file descriptor for its console and is started daemonized we should dup to /dev/null. Closes #1646. Signed-off-by:Li Feng <lifeng68@huawei.com> Signed-off-by:
Christian Brauner <christian.brauner@ubuntu.com>
-
- 09 Jul, 2017 5 commits
-
-
Christian Brauner authored
delete comments
-
Serge Hallyn authored
utils: use access instead of stat
-
Long Wang authored
we shoud test whether the file exists and grants execute permissions. Signed-off-by:Long Wang <w@laoqinren.net>
-
Long Wang authored
Signed-off-by:Long Wang <w@laoqinren.net>
-
Long Wang authored
Signed-off-by:Long Wang <w@laoqinren.net>
-
- 08 Jul, 2017 23 commits
-
-
Serge Hallyn authored
start: use separate socket on daemonized start
-
Christian Brauner authored
Signed-off-by:Christian Brauner <christian.brauner@ubuntu.com>
-
Christian Brauner authored
Signed-off-by:Christian Brauner <christian.brauner@ubuntu.com>
-
Christian Brauner authored
Signed-off-by:Christian Brauner <christian.brauner@ubuntu.com>
-
Christian Brauner authored
Signed-off-by:Christian Brauner <christian.brauner@ubuntu.com>
-
Christian Brauner authored
This adds a little more flexibility to the state server. The idea is to have a command socket function "lxc_cmd_add_state_client()" whose only task is to add a new state client to the container's in-memory handler. This function returns either the state of the container if it is already in the requested state or it will return the newly registered client's fd in one of its arguments to the caller. We then provide a separate helper function "lxc_cmd_sock_rcv_state()" which can be passed the returned client fd and listens on the fd for the requested state. This is useful when we want to first register a client, then send a signal to the container and wait for a state. This ensure that the client fd is registered before the signal can have any effect and can e.g. be used to catch something like the "STOPPING" state that is very ephemeral. Additionally we provide a convenience function "lxc_cmd_sock_get_state()" which combines both tasks and is used in e.g. "lxc_wait()". Signed-off-by:Christian Brauner <christian.brauner@ubuntu.com>
-
Christian Brauner authored
The new wait commands API is not yet stable so this change is ok. Signed-off-by:Christian Brauner <christian.brauner@ubuntu.com>
-
Christian Brauner authored
Signed-off-by:Christian Brauner <christian.brauner@ubuntu.com>
-
Christian Brauner authored
Add a test to see if we can start daemonized containers that have a very short-lived init process. The point of this is to see whether we can correctly retrieve the state. Signed-off-by:Christian Brauner <christian.brauner@ubuntu.com>
-
Christian Brauner authored
Signed-off-by:Christian Brauner <christian.brauner@ubuntu.com>
-
Christian Brauner authored
Signed-off-by:Christian Brauner <christian.brauner@ubuntu.com>
-
Christian Brauner authored
Since we killed lxc-monitord we rely on the container's command socket to wait for the container. This doesn't work nicely on daemonized startup since a container's init process might be something that is so short-lived that we won't even be able to add a state client before the mainloop closes. But the container might still have been RUNNING and executed the init binary correctly. In this case we would erroneously report that the container failed to start when it actually started just fine. This commit ensures that we really all cases where the container successfully ran by switching to a short-lived per-container anonymous unix socket pair that uses credentials to pass container states around. It is immediately closed once the container has started successfully. This should also make daemonized container start way more robust since we don't rely on the command socket handler to be running. For the experienced developer: Yes, I did think about utilizing the command socket directly for this. The problem is that when the mainloop starts it may end up end accept()ing the connection that we want do_wait_on_daemonized_start() to accept() so this won't work and might cause us to hang indefinitely. The same problem arises when the container fails to start before the mainloop is created. In this case we would hang indefinitely as well. Signed-off-by:Christian Brauner <christian.brauner@ubuntu.com>
-
Christian Brauner authored
Signed-off-by:Christian Brauner <christian.brauner@ubuntu.com>
-
Christian Brauner authored
Signed-off-by:Christian Brauner <christian.brauner@ubuntu.com>
-
Serge Hallyn authored
prepare for LXC 2.1
-
Christian Brauner authored
af_unix: remove unlink operation
-
Christian Brauner authored
state: remove lxc_rmstate declaration
-
Christian Brauner authored
lxc_abstract_unix_connect: remove the workaround-code
-
Christian Brauner authored
utils: close parent end in child process after fork
-
Long Wang authored
Signed-off-by:Long Wang <w@laoqinren.net>
-
Long Wang authored
commit bdb3f441 says that we may undo the change in august 2014. I think that it is time to do that. Signed-off-by:
Long Wang <w@laoqinren.net>
-
Long Wang authored
Signed-off-by:Long Wang <w@laoqinren.net>
-
Long Wang authored
It is not necessary to unlink the abstract socket pathname when we have finished using the socket. The abstract name is automatically removed when the socket is closed. Signed-off-by:Long Wang <w@laoqinren.net>
-