From: Christian Brauner Date: Mon, 24 Sep 2018 20:07:34 +0000 (+0200) Subject: doc: tweak documentation a little X-Git-Tag: lxc-3.1.0~89 X-Git-Url: http://git.ipfire.org/cgi-bin/gitweb.cgi?a=commitdiff_plain;h=0840104;p=thirdparty%2Flxc.git doc: tweak documentation a little Signed-off-by: Christian Brauner --- diff --git a/doc/ja/lxc-attach.sgml.in b/doc/ja/lxc-attach.sgml.in index 19ccfb8aa..8e001a457 100644 --- a/doc/ja/lxc-attach.sgml.in +++ b/doc/ja/lxc-attach.sgml.in @@ -102,8 +102,8 @@ by KATOH Yasufumi input faking via a TIOCSTI ioctl call after switching between userspace execution contexts with different privilege levels. Newer versions of lxc-attach will try to allocate a pseudo - terminal master/slave pair on the host and attach any standard file - descriptors which refer to a terminal to the slave side of the pseudo + terminal file descriptor pair on the host and attach any standard file + descriptors which refer to a terminal to the container side of the pseudo terminal before executing a shell or command. Note, that if none of the standard file descriptors refer to a terminal lxc-attach will not try to allocate a pseudo terminal. Instead it will simply attach diff --git a/doc/ja/lxc-unshare.sgml.in b/doc/ja/lxc-unshare.sgml.in index fd4c817e1..164020153 100644 --- a/doc/ja/lxc-unshare.sgml.in +++ b/doc/ja/lxc-unshare.sgml.in @@ -246,22 +246,22 @@ by KATOH Yasufumi To spawn a shell in a new network, pid, mount, and hostname namespace. - lxc-unshare -s "NETWORK|PID|MOUNT|UTSNAME" -M -H slave -i veth1 /bin/bash + lxc-unshare -s "NETWORK|PID|MOUNT|UTSNAME" -M -H myhostname -i veth1 /bin/bash --> 新しいネットワーク、PID、マウント、ホスト名 (UTS) 名前空間でシェルを起動するには、 - lxc-unshare -s "NETWORK|PID|MOUNT|UTSNAME" -M -H slave -i veth1 /bin/bash + lxc-unshare -s "NETWORK|PID|MOUNT|UTSNAME" -M -H myhostname -i veth1 /bin/bash 起動したシェルは PID 1 を持ち、2 つのネットワークインターフェース (lo と veth1) を持ちます。 - ホスト名は "slave" となり、/proc は再マウントされます。ps コマンドは、名前空間内には他のプロセスがない状態を表示するでしょう。 + ホスト名は "myhostname" となり、/proc は再マウントされます。ps コマンドは、名前空間内には他のプロセスがない状態を表示するでしょう。 diff --git a/doc/ko/lxc-attach.sgml.in b/doc/ko/lxc-attach.sgml.in index 7a7dfa525..9a739e69e 100644 --- a/doc/ko/lxc-attach.sgml.in +++ b/doc/ko/lxc-attach.sgml.in @@ -103,8 +103,8 @@ by Sungbae Yoo input faking via a TIOCSTI ioctl call after switching between userspace execution contexts with different privilege levels. Newer versions of lxc-attach will try to allocate a pseudo - terminal master/slave pair on the host and attach any standard file - descriptors which refer to a terminal to the slave side of the pseudo + terminal file descriptor pair on the host and attach any standard file + descriptors which refer to a terminal to the container side of the pseudo terminal before executing a shell or command. Note, that if none of the standard file descriptors refer to a terminal lxc-attach will not try to allocate a pseudo terminal. Instead it will simply attach diff --git a/doc/ko/lxc-unshare.sgml.in b/doc/ko/lxc-unshare.sgml.in index 480f20050..edcdbf0a8 100644 --- a/doc/ko/lxc-unshare.sgml.in +++ b/doc/ko/lxc-unshare.sgml.in @@ -242,21 +242,21 @@ by Sungbae Yoo To spawn a shell in a new network, pid, mount, and hostname namespace. - lxc-unshare -s "NETWORK|PID|MOUNT|UTSNAME" -M -H slave -i veth1 /bin/bash + lxc-unshare -s "NETWORK|PID|MOUNT|UTSNAME" -M -H myhostname -i veth1 /bin/bash --> 새로운 네트워크, PID, 마운트 그리고 호스트 이름(UTS) 네임스페이스 내에 쉘을 실행하려면, 아래처럼 하면 된다. - lxc-unshare -s "NETWORK|PID|MOUNT|UTSNAME" -M -H slave -i veth1 /bin/bash + lxc-unshare -s "NETWORK|PID|MOUNT|UTSNAME" -M -H myhostname -i veth1 /bin/bash - 그 결과 생긴 쉘은 1번 pid를 갖는다. 그리고 2개의 네트워크 인터페이스(lo와 veth1)를 갖는다. 호스트 이름은 "slave"이고, /proc은 다시 마운트 된다. + 그 결과 생긴 쉘은 1번 pid를 갖는다. 그리고 2개의 네트워크 인터페이스(lo와 veth1)를 갖는다. 호스트 이름은 "myhostname"이고, /proc은 다시 마운트 된다. ps 명령어를 입력하면, 네임스페이스 내에서 다른 프로세스들은 보이지 않을 것이다. diff --git a/doc/lxc-attach.sgml.in b/doc/lxc-attach.sgml.in index 14fa77d79..12aecd39b 100644 --- a/doc/lxc-attach.sgml.in +++ b/doc/lxc-attach.sgml.in @@ -90,8 +90,8 @@ Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA input faking via a TIOCSTI ioctl call after switching between userspace execution contexts with different privilege levels. Newer versions of lxc-attach will try to allocate a pseudo - terminal master/slave pair on the host and attach any standard file - descriptors which refer to a terminal to the slave side of the pseudo + terminal file descriptor pair on the host and attach any standard file + descriptors which refer to a terminal to the container side of the pseudo terminal before executing a shell or command. Note, that if none of the standard file descriptors refer to a terminal lxc-attach will not try to allocate a pseudo terminal. Instead it will simply attach diff --git a/doc/lxc-unshare.sgml.in b/doc/lxc-unshare.sgml.in index b0cb1eab1..2a508bef2 100644 --- a/doc/lxc-unshare.sgml.in +++ b/doc/lxc-unshare.sgml.in @@ -190,11 +190,11 @@ Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA To spawn a shell in a new network, pid, mount, and hostname namespace. - lxc-unshare -s "NETWORK|PID|MOUNT|UTSNAME" -M -H slave -i veth1 /bin/bash + lxc-unshare -s "NETWORK|PID|MOUNT|UTSNAME" -M -H myhostname -i veth1 /bin/bash The resulting shell will have pid 1 and will see two network - interfaces (lo and veth1). The hostname will be "slave" and + interfaces (lo and veth1). The hostname will be "myhostname" and /proc will have been remounted. ps output will show there are no other processes in the namespace.