I come from an embedded background so I ask why everything is actually needed.  
Currently I'm setting up an openvz test environment and the first chroot I 
tried to use was a uClibc+busybox one I had lying around, and building lxc 
natively in that environment wanted me to install libcap (which is so obscure 
that googling for it thinks you mean libpcap), and which required I first build 
and install perl as one of its build prerequisites.

I've since moved on to a debootstrap sid, but my question still stands because 
containers have their own PID 1 and their own UID namespace, which means they 
have local root.  Tangling in capabilities is like tangling in selinux, it 
seems to me that the more heavyweight the solution is from an administrative 
standpoint the less likely casual users are to pick it up and use it.  Do you 
really want to limit the entire potential audience of containers to a subset of 
the people who think capabilities are a good idea?  Is there a strong reason to 
_exclude_ them?  What is this extra complexity actually needed for?

 Rob
________________________________________
From: Michael Tokarev [...@tls.msk.ru]
Sent: Friday, December 17, 2010 3:12 AM
To: Rob Landley
Cc: lxc-devel@lists.sourceforge.net
Subject: Re: [lxc-devel] Building without libcap2?

17.12.2010 05:48, Rob Landley wrote:
> Is there any way to tell lxc that I'll run it as root if I want root access, 
> and not to fiddle with capabilities?  (If there's a ./configure option for 
> this, I haven't found it...)

What problem you're trying to solve?

/mjt

------------------------------------------------------------------------------
Lotusphere 2011
Register now for Lotusphere 2011 and learn how
to connect the dots, take your collaborative environment
to the next level, and enter the era of Social Business.
http://p.sf.net/sfu/lotusphere-d2d
_______________________________________________
Lxc-devel mailing list
Lxc-devel@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/lxc-devel

Reply via email to