- 16 Jul, 2017 40 commits
-
-
Long Wang authored
commit bdb3f441 says that we may undo the change in august 2014. I think that it is time to do that. Signed-off-by:
Long Wang <w@laoqinren.net>
-
Long Wang authored
Signed-off-by:Long Wang <w@laoqinren.net>
-
Long Wang authored
It is not necessary to unlink the abstract socket pathname when we have finished using the socket. The abstract name is automatically removed when the socket is closed. Signed-off-by:Long Wang <w@laoqinren.net>
-
Frédéric Dalleau authored
This patch allows users to start containers in AppArmor namespaces. Users can define their own profiles for their containers, but lxc-start must be allowed to change to a namespace. A container configuration file can wrap a container in an AppArmor profile using lxc.aa_profile. A process in an AppArmor namespace is restricted to view or manage only the profiles belonging to this namespace, as if no other profiles existed. A namespace can be created as follow: sudo mkdir /sys/kernel/security/apparmor/policy/namespaces/$NAMESPACE AppArmor can stack profiles so that the contained process is bound by the intersection of all profiles of the stack. This is achieved using the '//&' operator as follow: lxc.aa_profile = $PROFILE//&:$NAMESPACE://unconfined In this case, even the guest process appears unconfined in the namespace, it is still confined by $PROFILE. A guest allowed to access "/sys/kernel/security/apparmor/** rwklix," will be able to manage its own profile set, while still being enclosed in the topmost profile $PROFILE: Different guests can be assigned the same namespace or different namespaces. In the first case, they will share their profiles. In the second case, they will have distinct sets of profiles. This is validated on privileged containers. Signed-off-by:Frédéric Dalleau <frederic.dalleau@collabora.com>
-
Long Wang authored
Signed-off-by:Long Wang <w@laoqinren.net>
-
Long Wang authored
Signed-off-by:Long Wang <w@laoqinren.net>
-
Long Wang authored
Signed-off-by:Long Wang <w@laoqinren.net>
-
Long Wang authored
* Use `#include <lxc/lxccontaienr.h>` style for exported haeders. * remove used header `caps.h` Signed-off-by:Long Wang <w@laoqinren.net>
-
Long Wang authored
This patch mainly update the message format to: * upper the first letter * end without a dot all changes are relate to `lxc-init` Signed-off-by:Long Wang <w@laoqinren.net>
-
Long Wang authored
Signed-off-by:Long Wang <w@laoqinren.net>
-
Long Wang authored
Signed-off-by:Long Wang <w@laoqinren.net>
-
Christian Brauner authored
Signed-off-by:Christian Brauner <christian.brauner@ubuntu.com>
-
Christian Brauner authored
Signed-off-by:Christian Brauner <christian.brauner@ubuntu.com>
-
Long Wang authored
This patch mainly updates comments based on the current code. Signed-off-by:Long Wang <w@laoqinren.net>
-
Long Wang authored
Signed-off-by:Long Wang <w@laoqinren.net>
-
0x0916 authored
Signed-off-by:Long Wang <w@laoqinren.net>
-
0x0916 authored
This pr https://github.com/lxc/lxc/pull/1618 kill lxc-monitord, for backwards compatibility, we also send state to legacy lxc-monitord state server in function `lxc_set_state`. we should also send state if there is no state clients registered, otherwise `lxc-monitor` client will not get state change event if container changed state to `STARTING` or `RUNNING`. Signed-off-by:
0x0916 <w@laoqinren.net>
-
0x0916 authored
lxc-monitor has an option to tell lxc-monitord to quit. ``` ~/lxc (master) # lxc-monitor --help lxc-monitor monitors the state of the NAME container Options : -n, --name=NAME NAME of the container NAME may be a regular expression -Q, --quit tell lxc-monitord to quit ``` But it does not work. This patch fix that. Signed-off-by:0x0916 <w@laoqinren.net>
-
0x0916 authored
Our logging function will always spew out the function name. Signed-off-by:0x0916 <w@laoqinren.net>
-
0x0916 authored
Fix issue: https://github.com/lxc/lxc/issues/505Signed-off-by:
0x0916 <w@laoqinren.net>
-
Evgeni Golov authored
CentOS only has i386 and x86_64 listed in mirrorlist.centos.org, use http://mirror.centos.org/altarch/ for all other arches instead See: https://bugs.centos.org/view.php?id=11250Signed-off-by:
Evgeni Golov <evgeni@debian.org>
-
Evgeni Golov authored
uname -m reports aarch64, but Debian calls the arch arm64 Signed-off-by:Evgeni Golov <evgeni@debian.org>
-
0x0916 authored
Signed-off-by:0x0916 <w@laoqinren.net>
-
0x0916 authored
Signed-off-by:0x0916 <w@laoqinren.net>
-
0x0916 authored
Signed-off-by:0x0916 <w@laoqinren.net>
-
0x0916 authored
This reverts commit 758243d8. Signed-off-by:
0x0916 <w@laoqinren.net>
-
Christian Brauner authored
Signed-off-by:Christian Brauner <christian.brauner@ubuntu.com>
-
Li Feng authored
Signed-off-by:Li Feng <lifeng68@huawei.com>
-
KATOH Yasufumi authored
Add description of new network configuration, and tweak. Update for commit b9986e43Signed-off-by:
KATOH Yasufumi <karma@jazz.email.ne.jp>
-
Christian Brauner authored
Signed-off-by:Christian Brauner <christian.brauner@ubuntu.com>
-
Yifeng Tan authored
Signed-off-by:Yifeng Tan <tanyifeng1@huawei.com>
-
Christian Brauner authored
Signed-off-by:Christian Brauner <christian.brauner@ubuntu.com>
-
Christian Brauner authored
This logs the configured networks on the trace level to support debugging. Signed-off-by:Christian Brauner <christian.brauner@ubuntu.com>
-
Christian Brauner authored
Some of the checks were previously performed when parsing the network config. But since we allow for a little more flexibility now it doesn't work anymore. Instead, let's validate the network at creation time. Signed-off-by:Christian Brauner <christian.brauner@ubuntu.com>
-
Christian Brauner authored
lxc_get_netdev_by_idx() takes care of checking whether a given netdev struct for a given index is already allocated. If so it returns a pointer to it to the caller. If it doesn't find it it will allocate a new netdev struct and insert it into the network list at the right position. For example, let's say you have the following networks defined in your config file: lxc.network.0.type=veth lxc.network.0.link=lxcbr0 lxc.network.0.name=eth0 lxc.network.0.flags=up lxc.network.3.type=veth lxc.network.3.link=lxcbr0 lxc.network.3.name=eth1 lxc.network.3.flags=up lxc.network.3.hwaddr = 00:16:3e:5d:7d:65 lxc.network.1.type=veth lxc.network.1.link=lxcbr0 lxc.network.1.name=eth0 lxc.network.1.flags=up lxc_get_netdev_by_idx() will take care that the internal network list appears in the order: 0 1 3 The ordering of the keys themselves can also be random, meaning you could do: lxc.network.3.type=veth lxc.network.0.link=lxcbr0 lxc.network.0.name=eth0 lxc.network.3.hwaddr = 00:16:3e:5d:7d:65 lxc.network.0.flags=up lxc.network.3.flags=up lxc.network.0.type=veth lxc.network.3.link=lxcbr0 lxc.network.3.name=eth1 and lxc_get_netdev_by_idx() would still figure out the correct ordering since it keeps track of the index. Signed-off-by:Christian Brauner <christian.brauner@ubuntu.com>
-
Christian Brauner authored
Signed-off-by:Christian Brauner <christian.brauner@ubuntu.com>
-
Christian Brauner authored
Signed-off-by:Christian Brauner <christian.brauner@ubuntu.com>
-
Christian Brauner authored
and rename it to lxc_config_value_empty() Signed-off-by:Christian Brauner <christian.brauner@ubuntu.com>
-
Christian Brauner authored
When we merged the new logging function for the api we exposed the log level argument in the struct as "priority" which we actually requested to be changed to "level" which somehow didn't happen and we missed it. Given the fact there has been no new liblxc release let's fix it right now before it hits users. Also, take the chance to change the terminology in the log from "priority" to "level" globally. This is to prevent confusion with syslog's "priority" argument which we also support. Signed-off-by:Christian Brauner <christian.brauner@ubuntu.com>
-
Christian Brauner authored
Since we kicked lxc-monitord there will very likely be no user processes around anymore after all container's have been stopped. Which is a very very very good thing. So let's not error out when pkill doesn't find any processes. Signed-off-by:Christian Brauner <christian.brauner@ubuntu.com>
-