1. 25 Jan, 2015 4 commits
  2. 24 Jan, 2015 6 commits
  3. 22 Jan, 2015 2 commits
  4. 21 Jan, 2015 6 commits
    • add "--mask-tmp" to lxc-fedora, plus some template script fixes] · c2af3084
      Michael Adam authored
      Hi Michael,
      
      do you have any concerns with the attached patch to
      the fedora template that adds an option --mask-tmp
      that prevents fedora/systemd from over-mounting
      /tmp with tmpfs, which is useful in some cases?
      
      Thanks - Michael
      
      ----- Forwarded message from Michael Adam <obnox@samba.org> -----
      
      Date: Sat, 10 Jan 2015 13:12:06 +0100
      From: Michael Adam <obnox@samba.org>
      To: LXC development mailing-list <lxc-devel@lists.linuxcontainers.org>
      Subject: Re: [lxc-devel] [PATCHES] add "--mask-tmp" to lxc-fedora, plus some
      	template script fixes
      User-Agent: Mutt/1.5.23 (2014-03-12)
      
      On 2015-01-10 at 13:08 +0100, Michael Adam wrote:
      > On 2015-01-10 at 04:05 +0000, Serge Hallyn wrote:
      >
      > > The less controversial one is adding mask-tmp to the fedora template.
      > > It looks fine to me, but that should go separately to mwarfield, our
      > > fedora template maintainer :)
      >
      > I had notified mhw of my patches on irc, but apparently he is
      > currently very busy.
      >
      > For a start, following is an update of the uncontroversial fix
      > patches, i.e. the fix patche without the path ones, and without
      > the mask-tmp patch.
      
      And here comes the mask-tmp patch.
      It needs to be applied onto the previous fix-patchset.
      
      From 9589dca113535ed2f4faad89db2fab33bb8a9d7e Mon Sep 17 00:00:00 2001
      From: Michael Adam <obnox@samba.org>
      Date: Thu, 8 Jan 2015 10:25:24 +0100
      Subject: [PATCH] lxc-fedora: add a new option --mask-tmp
      
      This will configure the container to prevent the standard
      behaviour of over-mounting /tmp with tmpfs, which can be
      undesirable in some cases.
      
      My personal use case is vagrant-lxc in combination with
      vagrant-cachier.
      Signed-off-by: 's avatarMichael Adam <obnox@samba.org>
      Acked-by: 's avatarSerge E. Hallyn <serge.hallyn@ubuntu.com>
    • Merge pull request #397 from axn/master · 6b1aa947
      hallyn authored
      Fix instantiation of multiple vlan interfaces with same id
    • Add common.conf.d · 4662c6de
      Stéphane Graber authored
      Signed-off-by: 's avatarStéphane Graber <stgraber@ubuntu.com>
      Acked-by: 's avatarSerge Hallyn <serge.hallyn@ubuntu.com>
    • Set kmsg to 0 by default · d89de239
      Stéphane Graber authored
      It's now been proven over and over again that the symlink from /dev/kmsg
      to /dev/console is harmful for everything but upstart systems. As Ubuntu
      is now switching over to systemd too, lets switch the default.
      
      Upstart users wishing to see boot messages can always set lxc.kmsg = 1
      manually in their config (so long as they don't expect to then
      dist-upgrade the container to systemd succesfuly).
      Signed-off-by: 's avatarStéphane Graber <stgraber@ubuntu.com>
      Acked-by: 's avatarSerge E. Hallyn <serge.hallyn@ubuntu.com>
    • Turn autodev on by default · 124fa0a8
      Stéphane Graber authored
      Now that autodev works fine with unprivileged containers and shouldn't
      come with any side effect, lets turn it on by default.
      Signed-off-by: 's avatarStéphane Graber <stgraber@ubuntu.com>
      Acked-by: 's avatarSerge E. Hallyn <serge.hallyn@ubuntu.com>
  5. 20 Jan, 2015 3 commits
  6. 19 Jan, 2015 1 commit
  7. 16 Jan, 2015 8 commits
  8. 15 Jan, 2015 3 commits
    • close-all-fds: fix behavior · d2cf4c37
      Serge Hallyn authored
      We want to close all inherited fds in three cases - one, if a container
      is daemonized.  Two, if the user specifies -C on the lxc-start command
      line.  Three, in src/lxc/monitor.c.  The presence of -C is passed in the
      lxc_conf may not always exist.
      
      One call to lxc_check_inherited was being done from lxc_start(), which
      doesn't know whether we are daemonized.  Move that call to its caller,
      lxcapi_start(), which does know.
      
      Pass an explicit closeall boolean as second argument to lxc_check_inherited.
      If it is true, then all fds are closed.  If it is false, then we check
      the lxc_conf->close_all_fds.
      
      With this, all tests pass, and the logic appears correct.
      
      Note that when -C is not true, then we only warn about inherited fds,
      but we do not abort the container start.  This appears to have ben the case
      since commit 92c7f629 in 2011.  Unfortunately the referenced URL with
      the justification is no longer valid.  We may want to consider becoming
      stricter about this again.  (Note that the commit did say "for now")
      Signed-off-by: 's avatarSerge Hallyn <serge.hallyn@ubuntu.com>
      Acked-by: 's avatarStéphane Graber <stgraber@ubuntu.com>
    • lxc-start-ephemeral: handle the overlayfs workdir option (v2) · 4799a1e7
      Serge Hallyn authored
      We fixed this some time ago for basic lxc-start, but never did
      lxc-start-ephemeral.
      
      Since the lxc-start patches were pushed, Miklos has given us a
      way to detect whether we need the workdir= option.  So the
      bdev.c code could be simplified to check for "overlay\n" in
      /proc/filesystems just as lxc-start-ephemeral does.  This
      patch doesn't do that.
      
      Changelog (v2):
      	1. use 'overlay' fstype for new overlay upstream module
      	2. avoid using unneeded readlines().
      Signed-off-by: 's avatarSerge Hallyn <serge.hallyn@ubuntu.com>
      Acked-by: 's avatarStéphane Graber <stgraber@ubuntu.com>
  9. 13 Jan, 2015 4 commits
  10. 12 Jan, 2015 2 commits
  11. 10 Jan, 2015 1 commit