Ok...  Here's the patch again.  Since Serge is removing the loglevel
structure member, this patch no longer references that element.

Signed-off-by: Michael H. Warfield <m...@wittsend.com>

Regards,
Mike
-- 
Michael H. Warfield (AI4NB) | (770) 985-6132 |  m...@wittsend.com
   /\/\|=mhw=|\/\/          | (678) 463-0932 |  http://www.wittsend.com/mhw/
   NIC whois: MHW9          | An optimist believes we live in the best of all
 PGP Key: 0x674627FF        | possible worlds.  A pessimist is sure of it!

-- 

diff --git a/doc/lxc.conf.sgml.in b/doc/lxc.conf.sgml.in
index 96dea89..1298143 100644
--- a/doc/lxc.conf.sgml.in
+++ b/doc/lxc.conf.sgml.in
@@ -510,6 +510,10 @@ Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 
02111-1307 USA
        rootfs.  If lxc.autodev is set to 1, then after mounting the container's
        rootfs LXC will mount a fresh tmpfs under <filename>/dev</filename>
        (limited to 100k) and fill in a minimal set of initial devices.
+        This is generally required when starting a container containing
+        a "systemd" based "init" but may be optional at other times.  Addional
+        devices in the containers /dev directory may be created through the
+        use of the <option>lxc.hook.autodev</option> hook.
       </para>
       <variablelist>
        <varlistentry>
@@ -737,6 +741,27 @@ Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 
02111-1307 USA
       <variablelist>
        <varlistentry>
          <term>
+           <option>lxc.hook.autodev</option>
+         </term>
+         <listitem>
+           <para>
+             A hook to be run in the container's namespace after
+             mounting has been done and after any mount hooks have
+             run, but before the pivot_root, if
+             <option>lxc.autodev</option> == 1.
+             The purpose of this hook is to assist in populating the
+             /dev directory of the container when using the autodev
+             option for systemd based containers.  The container's /dev
+             directory is relative to the
+             ${<option>LXC_ROOTFS_MOUNT</option>} environment
+             variable available when the hook is run.
+           </para>
+         </listitem>
+       </varlistentry>
+      </variablelist>
+      <variablelist>
+       <varlistentry>
+         <term>
            <option>lxc.hook.start</option>
          </term>
          <listitem>
@@ -763,6 +788,103 @@ Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 
02111-1307 USA
       </variablelist>
     </refsect2>
 
+    <refsect2>
+      <title>Startup hooks Environment Variables</title>
+      <para>
+        A number of environment variables are made available to the startup
+        hooks to provide configuration information and assist in the
+        functioning of the hooks.  Not all variables are valid in all
+        contexts.  In particular, all paths are relative to the host system
+        and, as such, not valid during the <option>lxc.hook.start</option> 
hook.
+      </para>
+      <variablelist>
+       <varlistentry>
+         <term>
+           <option>LXC_NAME</option>
+         </term>
+         <listitem>
+           <para>
+             The LXC name of the container.  Useful for logging messages
+             in commmon log environments.  [<option>-n</option>]
+           </para>
+         </listitem>
+       </varlistentry>
+      </variablelist>
+      <variablelist>
+       <varlistentry>
+         <term>
+           <option>LXC_CONFIG_FILE</option>
+         </term>
+         <listitem>
+           <para>
+             Host relative path to the container configuration file.  This
+             gives the container to reference the original, top level,
+             configuration file for the container in order to locate any
+             addotional configuration information not otherwise made
+             available.  [<option>-f</option>]
+           </para>
+         </listitem>
+       </varlistentry>
+      </variablelist>
+      <variablelist>
+       <varlistentry>
+         <term>
+           <option>LXC_CONSOLE</option>
+         </term>
+         <listitem>
+           <para>
+             The path to the console output of the container if not NULL.
+             [<option>-c</option>] [<option>lxc.console</option>]
+           </para>
+         </listitem>
+       </varlistentry>
+      </variablelist>
+      <variablelist>
+       <varlistentry>
+         <term>
+           <option>LXC_CONSOLE_LOGPATH</option>
+         </term>
+         <listitem>
+           <para>
+             The path to the console log output of the container if not NULL.
+             [<option>-L</option>]
+           </para>
+         </listitem>
+       </varlistentry>
+      </variablelist>
+      <variablelist>
+       <varlistentry>
+         <term>
+           <option>LXC_ROOTFS_MOUNT</option>
+         </term>
+         <listitem>
+           <para>
+             The mount location to which the container is initially bound.
+             This will be the host relative path to the container rootfs
+             for the container instance being started and is where changes
+             should be made for that instance.
+             [<option>lxc.rootfs.mount</option>]
+           </para>
+         </listitem>
+       </varlistentry>
+      </variablelist>
+      <variablelist>
+       <varlistentry>
+         <term>
+           <option>LXC_ROOTFS_PATH</option>
+         </term>
+         <listitem>
+           <para>
+             The host relative path to the container root which has been
+             mounted to the rootfs.mount location.
+             [<option>lxc.rootfs</option>]
+           </para>
+         </listitem>
+       </varlistentry>
+      </variablelist>
+
+    </refsect2>
+
   </refsect1>
 
   <refsect1>
diff --git a/src/lxc/conf.c b/src/lxc/conf.c
index 1c02850..699011a 100644
--- a/src/lxc/conf.c
+++ b/src/lxc/conf.c
@@ -116,7 +116,7 @@ lxc_log_define(lxc_conf, lxc);
 #endif
 
 char *lxchook_names[NUM_LXC_HOOKS] = {
-       "pre-start", "pre-mount", "mount", "start", "post-stop" };
+       "pre-start", "pre-mount", "mount", "autodev", "start", "post-stop" };
 
 extern int pivot_root(const char * new_root, const char * put_old);
 
@@ -913,33 +913,6 @@ static int mount_autodev(char *root)
        return 0;
 }
 
-/*
- * Try to run MAKEDEV console in the container.  If something fails,
- * continue anyway as it should not be detrimental to the container.
- * This makes sure that things like /dev/vcs* exist.
- * (Pass devpath in to reduce stack usage)
- */
-static void run_makedev(char *devpath)
-{
-       int curd;
-       int ret;
-
-       curd = open(".", O_RDONLY);
-       if (curd < 0)
-               return;
-       ret = chdir(devpath);
-       if (ret) {
-               close(curd);
-               return;
-       }
-       if (run_buffer("/sbin/MAKEDEV console"))
-               INFO("Error running MAKEDEV console in %s", devpath);
-       ret = fchdir(curd);
-       if (ret)
-               INFO("Error returning to original directory: expect breakage");
-       close(curd);
-}
-
 struct lxc_devs {
        char *name;
        mode_t mode;
@@ -971,8 +944,7 @@ static int setup_autodev(char *root)
        if (ret < 0 || ret >= MAXPATHLEN) {
                ERROR("Error calculating container /dev location");
                return -1;
-       } else
-               run_makedev(path);
+       }
 
        INFO("Populating /dev under %s\n", root);
        cmask = umask(S_IXUSR | S_IXGRP | S_IXOTH);
@@ -2553,6 +2525,10 @@ int lxc_setup(const char *name, struct lxc_conf 
*lxc_conf)
        }
 
        if (lxc_conf->autodev) {
+               if (run_lxc_hooks(name, "autodev", lxc_conf)) {
+                       ERROR("failed to run autodev hooks for container 
'%s'.", name);
+                       return -1;
+               }
                if (setup_autodev(lxc_conf->rootfs.mount)) {
                        ERROR("failed to populate /dev in the container");
                        return -1;
@@ -2628,6 +2604,8 @@ int run_lxc_hooks(const char *name, char *hook, struct 
lxc_conf *conf)
                which = LXCHOOK_PREMOUNT;
        else if (strcmp(hook, "mount") == 0)
                which = LXCHOOK_MOUNT;
+       else if (strcmp(hook, "autodev") == 0)
+               which = LXCHOOK_AUTODEV;
        else if (strcmp(hook, "start") == 0)
                which = LXCHOOK_START;
        else if (strcmp(hook, "post-stop") == 0)
diff --git a/src/lxc/conf.h b/src/lxc/conf.h
index b576893..45161e1 100644
--- a/src/lxc/conf.h
+++ b/src/lxc/conf.h
@@ -213,8 +213,8 @@ struct lxc_rootfs {
 #endif
  */
 enum lxchooks {
-       LXCHOOK_PRESTART, LXCHOOK_PREMOUNT, LXCHOOK_MOUNT, LXCHOOK_START,
-       LXCHOOK_POSTSTOP, NUM_LXC_HOOKS};
+       LXCHOOK_PRESTART, LXCHOOK_PREMOUNT, LXCHOOK_MOUNT, LXCHOOK_AUTODEV,
+       LXCHOOK_START, LXCHOOK_POSTSTOP, NUM_LXC_HOOKS};
 extern char *lxchook_names[NUM_LXC_HOOKS];
 
 struct saved_nic {
@@ -257,6 +257,7 @@ struct lxc_conf {
 #endif
        int maincmd_fd;
        int autodev;  // if 1, mount and fill a /dev at start
+       char *rcfile;   // Copy of the top level rcfile we read
 };
 
 int run_lxc_hooks(const char *name, char *hook, struct lxc_conf *conf);
diff --git a/src/lxc/confile.c b/src/lxc/confile.c
index 1d87227..8cef8be 100644
--- a/src/lxc/confile.c
+++ b/src/lxc/confile.c
@@ -104,6 +104,7 @@ static struct lxc_config_t config[] = {
        { "lxc.hook.pre-start",       config_hook                 },
        { "lxc.hook.pre-mount",       config_hook                 },
        { "lxc.hook.mount",           config_hook                 },
+       { "lxc.hook.autodev",         config_hook                 },
        { "lxc.hook.start",           config_hook                 },
        { "lxc.hook.post-stop",       config_hook                 },
        { "lxc.network.type",         config_network_type         },
@@ -821,6 +822,8 @@ static int config_hook(const char *key, const char *value,
                return add_hook(lxc_conf, LXCHOOK_PRESTART, copy);
        else if (strcmp(key, "lxc.hook.pre-mount") == 0)
                return add_hook(lxc_conf, LXCHOOK_PREMOUNT, copy);
+       else if (strcmp(key, "lxc.hook.autodev") == 0)
+               return add_hook(lxc_conf, LXCHOOK_AUTODEV, copy);
        else if (strcmp(key, "lxc.hook.mount") == 0)
                return add_hook(lxc_conf, LXCHOOK_MOUNT, copy);
        else if (strcmp(key, "lxc.hook.start") == 0)
@@ -1265,6 +1268,10 @@ int lxc_config_readline(char *buffer, struct lxc_conf 
*conf)
 
 int lxc_config_read(const char *file, struct lxc_conf *conf)
 {
+       /* Catch only the top level config file name in the structure */
+       if( ! conf->rcfile ) {
+               conf->rcfile = strdup( file );
+       }
        return lxc_file_for_each_line(file, parse_line, conf);
 }
 
diff --git a/src/lxc/lxc_start.c b/src/lxc/lxc_start.c
index 184fb04..a97dcca 100644
--- a/src/lxc/lxc_start.c
+++ b/src/lxc/lxc_start.c
@@ -168,15 +168,6 @@ int main(int argc, char *argv[])
                         my_args.progname, my_args.quiet))
                return err;
 
-       if (clearenv()) {
-               SYSERROR("failed to clear environment");
-               /* don't error out though */
-       }
-       if (putenv("container=lxc")) {
-               SYSERROR("failed to set environment variable");
-               return err;
-       }
-
        /* rcfile is specified in the cli option */
        if (my_args.rcfile)
                rcfile = (char *)my_args.rcfile;
diff --git a/src/lxc/start.c b/src/lxc/start.c
index 82a74d8..e5b3638 100644
--- a/src/lxc/start.c
+++ b/src/lxc/start.c
@@ -391,6 +391,27 @@ struct lxc_handler *lxc_init(const char *name, struct 
lxc_conf *conf)
                goto out_free_name;
        }
 
+       /* Start of environment variable setup for hooks */
+       if (setenv("LXC_NAME", name, 1)) {
+               SYSERROR("failed to set environment variable for container 
name");
+       }
+       if (setenv("LXC_CONFIG_FILE", conf->rcfile, 1)) {
+               SYSERROR("failed to set environment variable for config path");
+       }
+       if (setenv("LXC_ROOTFS_MOUNT", conf->rootfs.mount, 1)) {
+               SYSERROR("failed to set environment variable for rootfs mount");
+       }
+       if (setenv("LXC_ROOTFS_PATH", conf->rootfs.path, 1)) {
+               SYSERROR("failed to set environment variable for rootfs mount");
+       }
+       if (conf->console.path && setenv("LXC_CONSOLE", conf->console.path, 1)) 
{
+               SYSERROR("failed to set environment variable for console path");
+       }
+       if (conf->console.log_path && setenv("LXC_CONSOLE_LOGPATH", 
conf->console.log_path, 1)) {
+               SYSERROR("failed to set environment variable for console log");
+       }
+       /* End of environment variable setup for hooks */
+
        if (run_lxc_hooks(name, "pre-start", conf)) {
                ERROR("failed to run pre-start hooks for container '%s'.", 
name);
                goto out_aborting;
@@ -575,6 +596,21 @@ static int do_start(void *data)
                goto out_warn_father;
        }
 
+       /* The clearenv() and putenv() calls have been moved here
+        * to allow us to use enviroment variables passed to the various
+        * hooks, such as the start hook above.  Not all of the
+        * variables like CONFIG_PATH or ROOTFS are valid in this
+        * context but others are. */
+       if (clearenv()) {
+               SYSERROR("failed to clear environment");
+               /* don't error out though */
+       }
+
+       if (putenv("container=lxc")) {
+               SYSERROR("failed to set environment variable");
+               return -1;
+       }
+
        close(handler->sigfd);
 
        /* after this call, we are in error because this

Attachment: signature.asc
Description: This is a digitally signed message part

------------------------------------------------------------------------------
Master Visual Studio, SharePoint, SQL, ASP.NET, C# 2012, HTML5, CSS,
MVC, Windows 8 Apps, JavaScript and much more. Keep your skills current
with LearnDevNow - 3,200 step-by-step video tutorials by Microsoft
MVPs and experts. SALE $99.99 this month only -- learn more at:
http://p.sf.net/sfu/learnmore_122412
_______________________________________________
Lxc-devel mailing list
Lxc-devel@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/lxc-devel

Reply via email to