- 13 Aug, 2015 9 commits
-
-
Tycho Andersen authored
This was originally used to propagate the bridge and veth names across hosts, but now we extract both from the container's config file, and nothing reads the files that dump_net_info() writes, so let's just get rid of them. Signed-off-by:
Tycho Andersen <tycho.andersen@canonical.com> Acked-by:
Serge E. Hallyn <serge.hallyn@ubuntu.com>
-
Tycho Andersen authored
Empty networks don't have anything (besides lo) for us to dump and restore, so we should allow these as well. Reported-by:
Dietmar Maurer <dietmar@proxmox.com> Signed-off-by:
Tycho Andersen <tycho.andersen@canonical.com> Acked-by:
Serge E. Hallyn <serge.hallyn@ubuntu.com>
-
Tycho Andersen authored
Somehow our `make tags` target generates TAGS and not tags, so let's ignore that too. Signed-off-by:
Tycho Andersen <tycho.andersen@canonical.com> Acked-by:
Serge E. Hallyn <serge.hallyn@ubuntu.com>
-
Arjun Sreedharan authored
reuse label cleanup since free(NULL) is a no-op Signed-off-by:
Arjun Sreedharan <arjun024@gmail.com> Acked-by:
Serge E. Hallyn <serge.hallyn@ubuntu.com>
-
Wolfgang Bumiller authored
When setting lxc.network.veth.pair to get a fixed interface name the recreation of it after a reboot caused an EEXIST. -) The reboot flag is now a three-state value. It's set to 1 to request a reboot, and 2 during a reboot until after lxc_spawn where it is reset to 0. -) If the reboot is set (!= 0) within instantiate_veth and a fixed name is used, the interface is now deleted before being recreated. Signed-off-by:
Wolfgang Bumiller <w.bumiller@proxmox.com> Acked-by:
Serge E. Hallyn <serge.hallyn@ubuntu.com>
-
Przemek Rudy authored
Signed-off-by:
Przemek Rudy <prudy1@o2.pl> Acked-by:
Serge E. Hallyn <serge.hallyn@ubuntu.com>
-
Stéphane Graber authored
Bind mount at different location
-
Stéphane Graber authored
Fresh CONTRIBUTING
-
Stéphane Graber authored
Add instanced systemd service
-
- 07 Aug, 2015 1 commit
-
-
Christiaan Baartse authored
Binding a directory at a different location in a ephemeral container is currently not possible. Using a regular container it however is possible. Signed-off-by:Christiaan Baartse <anotherhero@gmail.com>
-
- 05 Aug, 2015 5 commits
-
-
Nicolas Cornu authored
Signed-off-by:Nicolas Cornu <nicolac76@yahoo.fr>
-
Stéphane Graber authored
templates: lxc-opensuse, use rpm to determine build version
-
Stéphane Graber authored
Fix error message when cannot find an lxc-init
-
Jiri Slaby authored
zypper info's output is not usable for several reasons: * it is localized -- there is no "Version: " in my output * it shows results both from the repo and local system So use plain rpm to determine whether build is installed and if proper version is in place. Signed-off-by:Jiri Slaby <jslaby@suse.cz>
-
Nicolas Cornu authored
lxc-init has been renamed init.lxc so adapt error message Signed-off-by:Nicolas Cornu <ncornu@aldebaran.com>
-
- 04 Aug, 2015 6 commits
-
-
Natanael Copa authored
We need specify which hashing algorithm was used to create the signature we check. Fixes #609 Signed-off-by:
Natanael Copa <ncopa@alpinelinux.org> Acked-by:
Stéphane Graber <stgraber@ubuntu.com>
-
Stéphane Graber authored
Add option to rename container to lxc-clone
-
Stéphane Graber authored
Update Korean manuals
-
Sungbae Yoo authored
Update for commit 7cab33b1Signed-off-by:
Sungbae Yoo <sungbae.yoo@samsung.com>
-
Sungbae Yoo authored
Update for commit 2cf7c05aSigned-off-by:
Sungbae Yoo <sungbae.yoo@samsung.com>
-
Sungbae Yoo authored
Update for commit 1940bff4Signed-off-by:
Sungbae Yoo <sungbae.yoo@samsung.com>
-
- 03 Aug, 2015 6 commits
-
-
Christian Brauner authored
This commit adds an -R, --rename option to lxc-clone to rename a container. As c->rename calls do_lxcapi_rename() which in turn calls do_lxcapi_clone() it seemed best to implement it in lxc-clone rather than lxc-snapshot which also calls do_lxcapi_clone(). Some additional unification regarding the usage of return vs exit() in main() was done. Signed-off-by:Christian Brauner <christianvanbrauner@gmail.com>
-
Stéphane Graber authored
Update man pages
-
KATOH Yasufumi authored
lxc-user-nic command cannot use common options. Signed-off-by:KATOH Yasufumi <karma@jazz.email.ne.jp>
-
KATOH Yasufumi authored
Signed-off-by:KATOH Yasufumi <karma@jazz.email.ne.jp>
-
KATOH Yasufumi authored
Signed-off-by:KATOH Yasufumi <karma@jazz.email.ne.jp>
-
Stéphane Graber authored
Add -P lxcpath and --version to lxc-ls manpage
-
- 01 Aug, 2015 1 commit
-
-
Christian Brauner authored
lxc-ls takes -P lxcpath and --version as arguments but it did not specify these options on the manpages. Signed-off-by:Christian Brauner <christianvanbrauner@gmail.com>
-
- 29 Jul, 2015 1 commit
-
-
Serge Hallyn authored
seccomp: simplify and fix rule parsing
-
- 23 Jul, 2015 1 commit
-
-
Wolfgang Bumiller authored
1) Two checks on amd64 for whether compat_ctx has already been generated were redundant, as compat_ctx is generally generated before entering the parsing loop. 2) With introduction of reject_force_umount the check for whether the syscall has the same id on both native and compat archs results in false behavior as this is an internal keyword and thus produces a -1 on seccomp_syscall_resolve_name_arch(). The result was that it was added to the native architecture twice and never to the 32 bit architecture, causing it to have no effect on 32 bit containers on 64 bit hosts. 3) I do not see a reason to care about whether the syscalls have the same number on the two architectures. On the one hand this check was there to avoid adding it to two archs (and effectively leaving one arch unprotected), while on the other hand it seemed to be okay to add it to the same arch *twice*. The entire architecture checking branches are now reduced to three simple cases: 'native', 'non-native' and 'all'. With 'all' adding to both architectures regardless of the syscall ID. Also note that libseccomp had a bug in its architecture checking, so architecture related filters weren't working as expected before version 2.2.2, which may have contributed to the confusion in the original architecture-related code. Signed-off-by:Wolfgang Bumiller <w.bumiller@proxmox.com>
-
- 22 Jul, 2015 3 commits
-
-
Stéphane Graber authored
Signed-off-by:Stéphane Graber <stgraber@ubuntu.com>
-
Stéphane Graber authored
A user could otherwise over-mount /proc and prevent the apparmor profile or selinux label from being written which combined with a modified /bin/sh or other commonly used binary would lead to unconfined code execution. Reported-by: Roman Fiedler Signed-off-by:Stéphane Graber <stgraber@ubuntu.com>
-
Serge Hallyn authored
This prevents an unprivileged user to use LXC to create arbitrary file on the filesystem. Signed-off-by:
Serge Hallyn <serge.hallyn@ubuntu.com> Signed-off-by:
Tyler Hicks <tyhicks@canonical.com> Acked-by:
Stéphane Graber <stgraber@ubuntu.com>
-
- 21 Jul, 2015 2 commits
-
-
Stéphane Graber authored
lxc-ubuntu-cloud: support passing vendor-data
-
Scott Moser authored
vendor-data is supported in Ubuntu cloud images in trusty and later. This allows the user to pass it in on create or clone. Signed-off-by:Scott Moser <smoser@ubuntu.com>
-
- 20 Jul, 2015 1 commit
-
-
Stéphane Graber authored
Use /dev/loop-control if it exists
-
- 19 Jul, 2015 4 commits
-
-
Stéphane Graber authored
The Fedora 22 squashfs doesn't appear to work, the Fedora 21 isn't available, so lets use the fedora archive mirror and pull the good old Fedora 20 squashfs. Signed-off-by:Stéphane Graber <stgraber@ubuntu.com>
-
Stéphane Graber authored
Signed-off-by:Stéphane Graber <stgraber@ubuntu.com>
-
Stéphane Graber authored
Apparently the paths have changed on the rsync server. Signed-off-by:Stéphane Graber <stgraber@ubuntu.com>
-
Stéphane Graber authored
Switch to Fedora 22 for now. Signed-off-by:Stéphane Graber <stgraber@ubuntu.com>
-