]>
git.ipfire.org Git - thirdparty/lxc.git/log
LiFeng [Mon, 22 Jan 2018 11:13:52 +0000 (06:13 -0500)]
Fix comments and add check in lxc_poll.
Add check whether handler->conf->console.path is 'none'
Signed-off-by: LiFeng <lifeng68@huawei.com>
LiFeng [Fri, 19 Jan 2018 16:23:35 +0000 (11:23 -0500)]
Adapt lxc_setup_console() to bind mount 'console'
Signed-off-by: LiFeng <lifeng68@huawei.com>
LiFeng [Thu, 18 Jan 2018 22:26:11 +0000 (17:26 -0500)]
Create console when the rootfs is NULL
Signed-off-by: LiFeng <lifeng68@huawei.com>
Serge Hallyn [Wed, 17 Jan 2018 23:44:24 +0000 (17:44 -0600)]
Merge pull request #2089 from brauner/2018-01-17/restore_blocking_wait
lxccontainer: restore blocking wait()
Christian Brauner [Wed, 17 Jan 2018 19:46:04 +0000 (20:46 +0100)]
commands: add LXC_CMD_SERVE_STATE_CLIENTS
Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com>
Christian Brauner [Wed, 17 Jan 2018 19:09:13 +0000 (20:09 +0100)]
freezer: non-functional changes
Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com>
Christian Brauner [Wed, 17 Jan 2018 14:22:36 +0000 (15:22 +0100)]
lxccontainer: restore blocking wait()
Closes #2027.
Closes lxc/go-lxc#98.
Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com>
Serge Hallyn [Wed, 17 Jan 2018 23:42:57 +0000 (17:42 -0600)]
Merge pull request #2061 from brauner/2017-12-23/attach_allocate_pty_in_api
attach: add LXC_ATTACH_ALLOCATE_PTY
Christian Brauner [Wed, 17 Jan 2018 11:21:09 +0000 (12:21 +0100)]
utils: check suffix length
Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com>
Christian Brauner [Wed, 17 Jan 2018 10:50:54 +0000 (11:50 +0100)]
test: log error on failure
Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com>
Christian Brauner [Wed, 17 Jan 2018 10:19:05 +0000 (11:19 +0100)]
utils: do not rely on unitialized variable
Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com>
Christian Brauner [Tue, 16 Jan 2018 14:25:43 +0000 (15:25 +0100)]
Merge pull request #2086 from kunkku/alpine-ptrace
lxc-alpine: allow retaining sys_ptrace per container
Kaarle Ritvanen [Tue, 16 Jan 2018 13:53:04 +0000 (15:53 +0200)]
lxc-alpine: allow retaining sys_ptrace per container
Signed-off-by: Kaarle Ritvanen <kaarle.ritvanen@datakunkku.fi>
Christian Brauner [Tue, 16 Jan 2018 09:50:11 +0000 (10:50 +0100)]
Merge pull request #2085 from duguhaotian/master
[console] return wrong console logsize
duguhaotian [Tue, 16 Jan 2018 07:31:14 +0000 (15:31 +0800)]
[console] return wrong console logsize
get_config_console_logsize want console.buffer_size not c->autodev
Signed-off-by: duguhaotian <duguhaotian@gmail.com>
Christian Brauner [Fri, 12 Jan 2018 17:26:40 +0000 (18:26 +0100)]
tests: do not call close() on invalid fd
Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com>
Christian Brauner [Sun, 31 Dec 2017 00:58:16 +0000 (01:58 +0100)]
console: set SFD_CLOEXEC on signal fd
Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com>
Christian Brauner [Sun, 31 Dec 2017 00:48:01 +0000 (01:48 +0100)]
start: non-functional changes
Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com>
Christian Brauner [Mon, 25 Dec 2017 00:52:33 +0000 (01:52 +0100)]
tools: honor --console and --console-log
Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com>
Christian Brauner [Sun, 24 Dec 2017 18:25:34 +0000 (19:25 +0100)]
attach: move pty allocation into api
Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com>
Christian Brauner [Tue, 9 Jan 2018 11:27:05 +0000 (12:27 +0100)]
attach_options: add log_fd argument
This will be used to log the output of attach to.
Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com>
Christian Brauner [Sun, 24 Dec 2017 18:24:35 +0000 (19:24 +0100)]
attach: minor tweaks
Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com>
Christian Brauner [Sun, 24 Dec 2017 18:13:54 +0000 (19:13 +0100)]
console: add lxc_pty_map_ids()
Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com>
Christian Brauner [Sat, 23 Dec 2017 12:25:44 +0000 (13:25 +0100)]
console: adapt lxc_console_mainloop_add()
Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com>
Christian Brauner [Sat, 23 Dec 2017 11:39:52 +0000 (12:39 +0100)]
attach: cleanup attach_child_main()
Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com>
Christian Brauner [Sat, 23 Dec 2017 11:19:51 +0000 (12:19 +0100)]
console: add some pty helpers
- int lxc_make_controlling_pty()
- int lxc_login_pty()
- void lxc_pty_conf_free()
- void lxc_pty_info_init()
- void lxc_pty_init()
Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com>
Christian Brauner [Sat, 23 Dec 2017 11:03:32 +0000 (12:03 +0100)]
start: non-functional changes
Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com>
Christian Brauner [Sat, 23 Dec 2017 11:02:45 +0000 (12:02 +0100)]
conf: move ringbuffer members to anonymous struct
Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com>
Christian Brauner [Sat, 23 Dec 2017 10:59:36 +0000 (11:59 +0100)]
console: move pty creation to separate function
Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com>
Christian Brauner [Tue, 9 Jan 2018 10:20:44 +0000 (11:20 +0100)]
confile: improve log messages
Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com>
Christian Brauner [Tue, 9 Jan 2018 10:16:29 +0000 (11:16 +0100)]
Merge pull request #2080 from tych0/add-idmap-parse-error-message
add some idmap parsing error messages
Tycho Andersen [Tue, 9 Jan 2018 00:07:50 +0000 (00:07 +0000)]
add some idmap parsing error messages
otherwise, we just get a return value of false from setting config failure,
with no indication as to what actually failed in the log.
Signed-off-by: Tycho Andersen <tycho@tycho.ws>
Christian Brauner [Mon, 8 Jan 2018 16:36:32 +0000 (17:36 +0100)]
Merge pull request #2078 from tych0/usernsexec-exit-status
fix up lxc-usernsexec's exit status
Tycho Andersen [Mon, 8 Jan 2018 16:20:24 +0000 (16:20 +0000)]
fix up lxc-usernsexec's exit status
* exit(1) when there is an option parsing error
* exit(0) when the user explicitly asks for help
* exit(1) when the user specifies an invalid option
Signed-off-by: Tycho Andersen <tycho@tycho.ws>
Christian Brauner [Mon, 8 Jan 2018 08:13:51 +0000 (09:13 +0100)]
Merge pull request #2077 from lifeng68/Fix_segment_fault
Add return check for 'lxc_cmd_get_name'
LiFeng [Mon, 8 Jan 2018 19:26:00 +0000 (14:26 -0500)]
Add return check for 'lxc_cmd_get_name'
If 'lxc_cmd_get_name' failed and return with NULL, this would cause a segment fault.
Signed-off-by: LiFeng <lifeng68@huawei.com>
Christian Brauner [Sat, 6 Jan 2018 09:25:18 +0000 (10:25 +0100)]
Merge pull request #2075 from stgraber/master
lxc_get_version() should show the "-devel" suffix
Stéphane Graber [Fri, 5 Jan 2018 20:20:55 +0000 (15:20 -0500)]
Include -devel suffix in version string
Signed-off-by: Stéphane Graber <stgraber@ubuntu.com>
Stéphane Graber [Fri, 5 Jan 2018 20:19:30 +0000 (15:19 -0500)]
Fix broken indentation
Signed-off-by: Stéphane Graber <stgraber@ubuntu.com>
Serge Hallyn [Thu, 4 Jan 2018 16:26:01 +0000 (10:26 -0600)]
Merge pull request #2067 from brauner/2018-01-03/allow_fully_unprivileged_containers
conf: write "deny" to /proc/[pid]/setgroups
Serge Hallyn [Thu, 4 Jan 2018 16:21:17 +0000 (10:21 -0600)]
Merge pull request #2068 from brauner/2018-01-03/cleanup_command_after_revert
commands: fully revert set_running_config_item()
Christian Brauner [Thu, 4 Jan 2018 14:28:12 +0000 (15:28 +0100)]
cgfsng: only establish mapping once
When we deleted cgroups for unprivileged containers we used to allocate a new
mapping and clone a new user namespace each time we delete a cgroup. This of
course meant - on a cgroup v1 system - doing this >= 10 times when all
controllers were used. Let's not to do this and only allocate and establish a
mapping once.
Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com>
Christian Brauner [Thu, 4 Jan 2018 14:01:06 +0000 (15:01 +0100)]
conf: rework userns_exec_1()
Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com>
Christian Brauner [Thu, 4 Jan 2018 13:59:42 +0000 (14:59 +0100)]
conf: non-functional changes
Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com>
Christian Brauner [Wed, 3 Jan 2018 15:28:40 +0000 (16:28 +0100)]
conf: write "deny" to /proc/[pid]/setgroups
When fully unprivileged users run a container that only maps their own {g,u}id
and they do not have access to setuid new{g,u}idmap binaries we will write the
idmapping directly. This however requires us to write "deny" to
/proc/[pid]/setgroups otherwise any write to /proc/[pid]/gid_map will be
denied.
On a sidenote, this patch enables fully unprivileged containers. If you now set
lxc.net.[i].type = empty no privilege whatsoever is required to run a container.
Enhances #2033.
Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com>
Cc: Felix Abecassis <fabecassis@nvidia.com>
Cc: Jonathan Calmels <jcalmels@nvidia.com>
Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com>
Christian Brauner [Thu, 4 Jan 2018 09:29:43 +0000 (10:29 +0100)]
Merge pull request #2069 from stgraber/master
gentoo: Add support for .xz tarballs
Christian Brauner [Thu, 4 Jan 2018 09:29:18 +0000 (10:29 +0100)]
Merge pull request #2070 from hallyn/2018-01-03/staticlibcap
configure.ac: fix the check for static libcap
Serge Hallyn [Thu, 4 Jan 2018 03:02:53 +0000 (21:02 -0600)]
configure.ac: fix the check for static libcap
The existing check doesn't work, because when you statically
link a program against libc, any functions not called are not
included. So cap_init() which we check for is not there in
the built binary.
So instead just check whether a "gcc -lcap -static" works.
If libcap.a is not available it will fail, if it is it will
succeed.
Signed-off-by: Serge Hallyn <shallyn@cisco.com>
Stéphane Graber [Wed, 3 Jan 2018 23:06:33 +0000 (18:06 -0500)]
gentoo: Add support for .xz tarballs
Signed-off-by: Stéphane Graber <stgraber@ubuntu.com>
Christian Brauner [Wed, 3 Jan 2018 17:28:58 +0000 (18:28 +0100)]
commands: fully revert set_running_config_item()
The noop implementation is pointless.
Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com>
Stéphane Graber [Wed, 3 Jan 2018 17:12:39 +0000 (12:12 -0500)]
Merge pull request #2065 from brauner/2017-01-01/revert_set_running_config_item
lxccontainer: revert set_running_config_item()
Serge Hallyn [Wed, 3 Jan 2018 03:42:06 +0000 (21:42 -0600)]
Merge pull request #2066 from brauner/2017-01-02/support_no_root_mappings
Support configurations without root mapping
Christian Brauner [Tue, 2 Jan 2018 23:11:38 +0000 (00:11 +0100)]
conf: detect if devpts can be mounted with gid=5
Closes #2033.
Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com>
Christian Brauner [Tue, 2 Jan 2018 22:41:10 +0000 (23:41 +0100)]
cgfsng: use init {g,u}id
If no id mapping for the container's root id is defined try to us the id
mappings specified via lxc.init.{g,u}id.
Closes #2033.
Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com>
Christian Brauner [Tue, 2 Jan 2018 22:27:55 +0000 (23:27 +0100)]
conf{ile}: detect ns{g,u}id mapping for root
Closes #2033.
Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com>
Christian Brauner [Tue, 2 Jan 2018 21:31:16 +0000 (22:31 +0100)]
conf: adapt userns_exec_1()
Closes #2033.
Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com>
Christian Brauner [Tue, 2 Jan 2018 21:15:17 +0000 (22:15 +0100)]
conf: adapt idmap helpers
- mapped_hostid_entry()
- idmap_add()
Closes #2033.
Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com>
Christian Brauner [Mon, 1 Jan 2018 20:56:23 +0000 (21:56 +0100)]
lxccontainer: revert set_running_config_item()
- As discussed we will have a proper API extension that will allow updating
various parts of a running container. The prior approach wasn't a good idea.
- Revert this is not a problem since we haven't released any version with the
set_running_config_item() API extension.
- I'm not simply reverting so that master users can still call into new
liblxc's without crashing the container. This is achieved by keeping the
commands callback struct member number identical.
Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com>
Serge Hallyn [Sat, 30 Dec 2017 23:27:48 +0000 (17:27 -0600)]
Merge pull request #2062 from brauner/2017-12-25/capture_output_of_short_lived_init_process
mainloop: capture output of short-lived init procs
Christian Brauner [Tue, 26 Dec 2017 19:57:12 +0000 (20:57 +0100)]
mainloop: use epoll_create1(EPOLL_CLOEXEC)
Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com>
Christian Brauner [Tue, 26 Dec 2017 17:00:08 +0000 (18:00 +0100)]
console: do not allow non-pty devices on open()
We don't allow non-pty devices anyway so don't let open() create unneeded
files.
Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com>
Christian Brauner [Tue, 26 Dec 2017 12:45:12 +0000 (13:45 +0100)]
start: properly cleanup mainloop
Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com>
Christian Brauner [Sat, 30 Dec 2017 20:05:41 +0000 (21:05 +0100)]
Merge pull request #2063 from marcosps/lxcconfig_help
lxc_config: Add -h and --help flags handler
Marcos Paulo de Souza [Sat, 30 Dec 2017 18:35:52 +0000 (16:35 -0200)]
lxc_config: Add -h and --help flags handler
As the other tools already handle, show usage message when -h or --help
are used.
Signed-off-by: Marcos Paulo de Souza <marcos.souza.org@gmail.com>
Christian Brauner [Mon, 25 Dec 2017 13:53:40 +0000 (14:53 +0100)]
mainloop: capture output of short-lived init procs
The handler for the signal fd will detect when the init process of a container
has exited and cause the mainloop to close. However, this can happen before the
console handlers - or any other events for that matter - are handled. So in the
case of init exiting we still need to allow for all buffered input to the
console to be handled before exiting. This allows us to capture output from
short-lived init processes.
This is conceptually equivalent to my implementation of ExecReaderToChannel()
https://github.com/lxc/lxd/blob/master/shared/util_linux.go#L527
Closes #1694.
Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com>
Christian Brauner [Mon, 25 Dec 2017 13:52:39 +0000 (14:52 +0100)]
mainloop: add mainloop macros
This makes it clearer why handlers return what value.
Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com>
Serge Hallyn [Fri, 22 Dec 2017 22:10:14 +0000 (16:10 -0600)]
Merge pull request #2058 from brauner/2017-12-22/bugfixes
start: fix death signal
Christian Brauner [Fri, 22 Dec 2017 21:52:42 +0000 (22:52 +0100)]
start: handle setting death signal smarter
Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com>
Christian Brauner [Fri, 22 Dec 2017 21:17:44 +0000 (22:17 +0100)]
start: fix death signal
On set{g,u}id() the kernel does:
/* dumpability changes */
if (!uid_eq(old->euid, new->euid) ||
!gid_eq(old->egid, new->egid) ||
!uid_eq(old->fsuid, new->fsuid) ||
!gid_eq(old->fsgid, new->fsgid) ||
!cred_cap_issubset(old, new)) {
if (task->mm)
set_dumpable(task->mm, suid_dumpable);
task->pdeath_signal = 0;
smp_wmb();
}
which means we need to re-enable the deat signal after the set{g,u}id().
Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com>
Serge Hallyn [Fri, 22 Dec 2017 19:50:59 +0000 (13:50 -0600)]
Merge pull request #2057 from brauner/2017-12-22/bugfixes
start: simplify cgroup namespace preservation
Christian Brauner [Fri, 22 Dec 2017 16:18:50 +0000 (17:18 +0100)]
start: simplify cgroup namespace preservation
Since we are now dumpable we can open /proc/<child-pid>/ns/cgroup so let's
avoid the overhead of sending around fds.
Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com>
Christian Brauner [Fri, 22 Dec 2017 16:11:45 +0000 (17:11 +0100)]
start: make us dumpable
When set set{u,g}id() the kernel will make us undumpable. This is unnecessary
since we can guarantee that whatever is running inside the child process at
this point this is fully trusted by the parent. Making us dumpable let's users
use debuggers on the child process before the exec as well and also allows us
to open /proc/<child-pid> files in lieu of the child.
Note, that we only need to perform the prctl(PR_SET_DUMPABLE, ...) if our
effective uid on the host is not 0. If our effective uid on the host is 0 then
we will keep all capabilities in the child user namespace across set{g,u}id().
Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com>
Serge Hallyn [Thu, 21 Dec 2017 22:30:11 +0000 (16:30 -0600)]
Merge pull request #2042 from brauner/2017-12-15/bugfixes
start: tweaks + bugfixes
Serge Hallyn [Thu, 21 Dec 2017 22:08:18 +0000 (16:08 -0600)]
Merge pull request #2052 from brauner/2017-12-19/unprivileged_btrfs_regression
btrfs: fix unprivileged snapshot creation
Christian Brauner [Sat, 16 Dec 2017 13:39:12 +0000 (14:39 +0100)]
start: log closing cmd socket and STOPPED state
Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com>
Christian Brauner [Fri, 15 Dec 2017 16:42:31 +0000 (17:42 +0100)]
start: use lxc_raw_clone_cb() where possible
This way we can rely on the kernel's copy-on-write support similar to fork().
Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com>
Christian Brauner [Fri, 15 Dec 2017 16:35:43 +0000 (17:35 +0100)]
namespace: add lxc_raw_clone_cb()
This is a copy-on-write (no stack passed) variant of lxc_clone().
Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com>
Christian Brauner [Fri, 15 Dec 2017 16:35:07 +0000 (17:35 +0100)]
namespace: comment lxc_{raw_}clone()
Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com>
Christian Brauner [Sat, 16 Dec 2017 01:07:43 +0000 (02:07 +0100)]
tree-wide: s/getpid()/lxc_raw_getpid()/g
This is to avoid bad surprises caused by older glibc's pid cache (up to 2.25)
when using clone().
Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com>
Christian Brauner [Sat, 16 Dec 2017 00:23:17 +0000 (01:23 +0100)]
namespace: add lxc_raw_getpid()
Because of older glibc's pid cache (up to 2.25) whenever clone() is called the
child must must retrieve it's own pid via lxc_raw_getpid().
Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com>
Christian Brauner [Fri, 15 Dec 2017 16:03:09 +0000 (17:03 +0100)]
tests: expand lxc_raw_clone() tests
- test CLONE_VFORK
- test CLONE_FILES
Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com>
Serge Hallyn [Thu, 21 Dec 2017 21:56:51 +0000 (15:56 -0600)]
Merge pull request #2047 from brauner/2017-12-18/attach_lsm_confinement
attach: simplify significantly
Christian Brauner [Wed, 20 Dec 2017 23:42:37 +0000 (00:42 +0100)]
attach: handle /proc with hidepid={1,2} property
Receive fd for LSM security module before we set{g,u}id(). The reason is that
on set{g,u}id() the kernel will a) make us undumpable and b) we will change our
effective uid. This means our effective uid will be different from the
effective uid of the process that created us which means that this processs no
longer has capabilities in our namespace including CAP_SYS_PTRACE. This means
we will not be able to read and /proc/<pid> files for the process anymore when
/proc is mounted with hidepid={1,2}. So let's get the lsm label fd before the
set{g,u}id().
Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com>
Christian Brauner [Wed, 20 Dec 2017 12:14:33 +0000 (13:14 +0100)]
attach: use lxc_raw_clone()
This let's us simplify the whole file a lot and makes things way clearer. It
also let's us avoid the infamous pid cache.
Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com>
Christian Brauner [Mon, 18 Dec 2017 01:46:10 +0000 (02:46 +0100)]
attach: simplify significantly
Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com>
Christian Brauner [Wed, 20 Dec 2017 13:19:57 +0000 (14:19 +0100)]
Merge pull request #2055 from marcosps/cgfsng_debug
cgfsng: Add new macro to print errors
Christian Brauner [Wed, 20 Dec 2017 01:48:04 +0000 (02:48 +0100)]
Merge pull request #2013 from 3XX0/oci-dhcp-improvements
Improve the dhclient hook for OCI compat
Marcos Paulo de Souza [Wed, 20 Dec 2017 01:43:47 +0000 (23:43 -0200)]
cgfsng: Add new macro to print errors
At this point, macros such DEBUG or ERROR does not take effect because
this code is called from cgroup_ops_init(cgroup.c), which runs with
__attribute__((constructor)), before any log level is set form any tool
like lxc-start, so these messages are lost.
For now on, use the same LXC_DEBUG_CGFSNG environment variable to
control these messages.
Signed-off-by: Marcos Paulo de Souza <marcos.souza.org@gmail.com>
Jonathan Calmels [Mon, 11 Dec 2017 21:53:15 +0000 (13:53 -0800)]
lxc-oci: add DHCP option leveraging dhclient hooks
Signed-off-by: Jonathan Calmels <jcalmels@nvidia.com>
Jonathan Calmels [Fri, 8 Dec 2017 06:24:48 +0000 (22:24 -0800)]
lxc-oci: read configuration from oci.common.conf if available
Signed-off-by: Jonathan Calmels <jcalmels@nvidia.com>
Jonathan Calmels [Fri, 8 Dec 2017 06:15:10 +0000 (22:15 -0800)]
lxc-net: add LXC_DHCP_PING boolean option
Excerpt from dnsmasq(8):
By default, the DHCP server will attempt to ensure that an address in not
in use before allocating it to a host. It does this by sending an ICMP echo
request (aka "ping") to the address in question. If it gets a reply, then the
address must already be in use, and another is tried. This flag disables this check.
This is useful if one expects all the containers to get an IP address
from the LXC authoritative DHCP server and wants to speed up the process
of getting a lease.
Signed-off-by: Jonathan Calmels <jcalmels@nvidia.com>
Jonathan Calmels [Fri, 8 Dec 2017 06:04:36 +0000 (22:04 -0800)]
hooks: dhclient hook improvements
- Merge dhclient-start and dhclient-stop into a single hook.
- Wait for a lease before returning from the hook.
- Generate a logfile when LXC log level is either DEBUG or TRACE.
- Rely on namespace file descriptors for the stop hook.
- Use settings from /<sysconf>/lxc/dhclient.conf if available.
- Attempt to cleanup if dhclient fails to shutdown properly.
Signed-off-by: Jonathan Calmels <jcalmels@nvidia.com>
Christian Brauner [Tue, 19 Dec 2017 14:09:41 +0000 (15:09 +0100)]
Merge pull request #2048 from duguhaotian/master
[monitor] wrong statement of break
Christian Brauner [Tue, 19 Dec 2017 14:06:20 +0000 (15:06 +0100)]
Merge pull request #2015 from flx42/nvidia-mount-hook
hooks: add mount hook to configure access to NVIDIA GPUs
Christian Brauner [Tue, 19 Dec 2017 13:24:40 +0000 (14:24 +0100)]
Merge pull request #2050 from tanyifeng/small_fix
conf.c: small fix for args of mount_entry
Christian Brauner [Tue, 19 Dec 2017 11:07:09 +0000 (12:07 +0100)]
Merge pull request #2053 from tenforward/japanese
Update Japanese lxc.container.conf(5)
KATOH Yasufumi [Tue, 19 Dec 2017 10:54:15 +0000 (19:54 +0900)]
doc: Add relative option for lxc.mount.entry to Japanese lxc.container.conf(5)
and:
* remove empty paragraph in English man
* untabify in Japanese man
Signed-off-by: KATOH Yasufumi <karma@jazz.email.ne.jp>
KATOH Yasufumi [Tue, 19 Dec 2017 10:36:48 +0000 (19:36 +0900)]
doc: Translate the hook of network into Japanese in lxc.container.conf(5)
Update for commit
14a7b0f
Signed-off-by: KATOH Yasufumi <karma@jazz.email.ne.jp>
KATOH Yasufumi [Tue, 19 Dec 2017 10:08:22 +0000 (19:08 +0900)]
doc: Add the description of new style hook to Japanese lxc.containers.conf(5)
Signed-off-by: KATOH Yasufumi <karma@jazz.email.ne.jp>
KATOH Yasufumi [Tue, 19 Dec 2017 06:54:23 +0000 (15:54 +0900)]
doc: Add proc section to Japanese lxc.container.conf(5)
Update for commit
61d7a73
Signed-off-by: KATOH Yasufumi <karma@jazz.email.ne.jp>