1. 29 Nov, 2017 4 commits
  2. 16 Nov, 2017 9 commits
  3. 19 Oct, 2017 1 commit
  4. 18 Oct, 2017 1 commit
  5. 04 Oct, 2017 8 commits
  6. 10 Sep, 2017 1 commit
  7. 29 Aug, 2017 3 commits
  8. 22 Aug, 2017 1 commit
  9. 17 Aug, 2017 8 commits
  10. 15 Aug, 2017 4 commits
    • utils: close parent end in child process after fork · dcc6437d
      Long Wang authored
      Signed-off-by: 's avatarLong Wang <w@laoqinren.net>
    • state: remove lxc_rmstate declaration · 4de8c04f
      Long Wang authored
      Signed-off-by: 's avatarLong Wang <w@laoqinren.net>
    • af_unix: remove unlink operation · a22f697e
      Long Wang authored
      It is not necessary to unlink the abstract socket pathname when
      we have finished using the socket. The abstract name is automatically
      removed when the socket is closed.
      Signed-off-by: 's avatarLong Wang <w@laoqinren.net>
    • Allow containers to start in AppArmor namespaces · e0b469aa
      Frédéric Dalleau authored
      This patch allows users to start containers in AppArmor namespaces.
      Users can define their own profiles for their containers, but
      lxc-start must be allowed to change to a namespace.
      
      A container configuration file can wrap a container in an AppArmor
      profile using lxc.aa_profile.
      
      A process in an AppArmor namespace is restricted to view
      or manage only the profiles belonging to this namespace, as if no
      other profiles existed. A namespace can be created as follow:
      sudo mkdir /sys/kernel/security/apparmor/policy/namespaces/$NAMESPACE
      
      AppArmor can stack profiles so that the contained process is bound
      by the intersection of all profiles of the stack. This is achieved
      using the '//&' operator as follow:
      
      lxc.aa_profile = $PROFILE//&:$NAMESPACE://unconfined
      
      In this case, even the guest process appears unconfined in the
      namespace, it is still confined by $PROFILE.
      
      A guest allowed to access "/sys/kernel/security/apparmor/** rwklix,"
      will be able to manage its own profile set, while still being
      enclosed in the topmost profile $PROFILE:
      
      Different guests can be assigned the same namespace or different
      namespaces. In the first case, they will share their profiles.
      In the second case, they will have distinct sets of profiles.
      
      This is validated on privileged containers.
      Signed-off-by: 's avatarFrédéric Dalleau <frederic.dalleau@collabora.com>