1. 19 Nov, 2008 2 commits
  2. 18 Nov, 2008 4 commits
  3. 17 Nov, 2008 7 commits
  4. 14 Nov, 2008 3 commits
    • Change at compilation time the destruction of the network devices · b7c9b199
      dlezcano authored
      From: Daniel Lezcano <dlezcano@fr.ibm.com>
      
      The future kernel version will automatically autodestroy the network devices
      when the network namespace exits. This is not the case for the current version.
      In order to handle the both cases, I added a configuration option to disable
      the network destruction when the container exits:
      	--disable-network-destroy
      Signed-off-by: 's avatarDaniel Lezcano <dlezcano@fr.ibm.com>
    • Fix cgroup configuration format · 6f4a3756
      dlezcano authored
      From: Daniel Lezcano <dlezcano@fr.ibm.com>
      
      This modification change the configuration format. Instead of creating
      a 'cgroup' directory with a file per controller, a single file is used
      to store the different value for the control groups. That allows to assign
      several values to the same controller like "devices.allow" and keep the same
      assignation order as defined in the configuration.
      
      In order to keep compatibility, when the old cgroup format is detected, it
      is automatically converted to the new format.
      Signed-off-by: 's avatarDaniel Lezcano <dlezcano@fr.ibm.com>
    • Default command is "/sbin/init" for lxc-start · b2b6c597
      dlezcano authored
      From: Daniel Lezcano <dlezcano@fr.ibm.com>
      
      When no command is specified is specified for lxc-start, the "/sbin/init"
      is automatically used.
      Signed-off-by: 's avatarDaniel Lezcano <dlezcano@fr.ibm.com>
  5. 13 Nov, 2008 3 commits
    • Add setpcap capabilty to be able to drop the sys_boot capabilty. · 0780e343
      dlezcano authored
      From: Daniel Lezcano <dlezcano@fr.ibm.com>
      
      Previously, we dropped the CAP_SYS_BOOT capabilty. Unfortunatly if we are
      non root user, we are not able to do that. So I had the CAP_SETPCAP to
      lxc-execute and lxc-start command line to remove this capabilty.
      Signed-off-by: 's avatarDaniel Lezcano <dlezcano@fr.ibm.com>
    • Fix function prototype · 06526975
      dlezcano authored
      From: Daniel Lezcano <dlezcano@fr.ibm.com>
      
      The lxc_start function prototype has been changed.
      Signed-off-by: 's avatarDaniel Lezcano <dlezcano@fr.ibm.com>
    • Replace lxc_execute by an intermediate lxc_init · 05f05512
      dlezcano authored
      From: Daniel Lezcano <dlezcano@fr.ibm.com>
      
      The main difference between lxc_start and lxc_execute is the latter creates
      an intermediate process to wait for all the childs. That allows to support
      daemons or orphan process group for the pid namespace.
      
      Having such difference makes the code to be duplicate between the two
      functions. So instead of doing this, I create an intermediate <init> program
      which is in charge to launch the specified command. This command is the
      lxc-init program taking different options:
       --mount-procfs : mount the proc filesystem before exec'ing the command
       --mount-sysfs : mount the sys filesystem before exec'ing the command
      
      A double dash indicates the end of the options of lxc-init and the beginning
      of the command to be launched.
      
      To summarize:
       * lxc_execute function is no more.
       * lxc-execute command uses the lxc_start function and launch the specified
      command via lxc-init
      Signed-off-by: 's avatarDaniel Lezcano <dlezcano@fr.ibm.com>
  6. 05 Nov, 2008 2 commits
  7. 04 Nov, 2008 3 commits
  8. 28 Oct, 2008 3 commits
  9. 26 Oct, 2008 1 commit
  10. 24 Oct, 2008 7 commits
  11. 23 Oct, 2008 2 commits
  12. 20 Oct, 2008 1 commit
    • This new command is a helper to check if the needed functionalities are · 22e761af
      dlezcano authored
      compiled the kernel. It relies on /proc/config.gz, if it is not compiled,
      the command will simply fail.
      If a feature is missing but not mandatory, "disabled" keyword will appear
      in yellow, if it is mandatory, it will appear in "red", otherwise the key
      word "enabled" will appear in green.
  13. 18 Oct, 2008 1 commit
    • These modifications improve the monitoring support of the container. Now · 80f41298
      dlezcano authored
      several readers can attend the events from one or several containers.
      The syntax of the command has been enhanced to interpret regular expressions.
      If you want to monitor foo, lxc-monitor -n foo is the right command. If you
      want to monitor foo and bar, you should specify lxc-monitor -n "foo|bar",
      if you want to monitor all containers with the name beginning with 'foo',
      you have to specify lxc-monitor -n "foo.*". More complex regexp can be specified
      in accordance with the POSIX definitions, man regex (7).
  14. 15 Oct, 2008 1 commit