Branch: refs/heads/master
  Home:   https://github.com/lxc/lxc
  Commit: cf3ef16dc479c102433a82b8ddbb4265d3818cce
      https://github.com/lxc/lxc/commit/cf3ef16dc479c102433a82b8ddbb4265d3818cce
  Author: Serge Hallyn <serge.hal...@ubuntu.com>
  Date:   2013-10-24 (Thu, 24 Oct 2013)

  Changed paths:
    M src/lxc/conf.c
    M src/lxc/conf.h
    M src/lxc/lxccontainer.c

  Log Message:
  -----------
  container creation: support unpriv container creation in user namespaces

1. lxcapi_create: don't try to unshare and mount for dir backed containers

It's unnecessary, and breaks unprivileged lxc-create (since unpriv users
cannot yet unshare(CLONE_NEWNS)).

2. api_create: chown rootfs

chown rootfs to the host uid to which container root will be mapped

3. create: run template in a mapped user ns

4. use (setuid-root) newxidmap to set id_map if we are not root

This is needed to be able to set userns mappings as an unprivileged
user, for unprivileged lxc-start.

Signed-off-by: Serge Hallyn <serge.hal...@ubuntu.com>
Acked-by: Stéphane Graber <stgra...@ubuntu.com>


  Commit: c4d10a05c309dcf8b8577c36d641f8943f66cde2
      https://github.com/lxc/lxc/commit/c4d10a05c309dcf8b8577c36d641f8943f66cde2
  Author: Serge Hallyn <serge.hal...@ubuntu.com>
  Date:   2013-10-24 (Thu, 24 Oct 2013)

  Changed paths:
    M src/lxc/conf.c
    M src/lxc/conf.h
    M src/lxc/lxccontainer.c
    M src/lxc/start.c

  Log Message:
  -----------
  fix chowning of tty and console uids

It needs to be done from the handler, not the container, since
the container may not have the rights.

Signed-off-by: Serge Hallyn <serge.hal...@ubuntu.com>
Acked-by: Stéphane Graber <stgra...@ubuntu.com>

Changelog:
    Jul 22: remove hardcoded path for /bin/chown
    Jul 22: use new lxc-usernsexec

Conflicts:
        src/lxc/lxccontainer.c


  Commit: 9e214906db8b351be775901dc4e8fc070bfacf1b
      https://github.com/lxc/lxc/commit/9e214906db8b351be775901dc4e8fc070bfacf1b
  Author: Serge Hallyn <serge.hal...@ubuntu.com>
  Date:   2013-10-24 (Thu, 24 Oct 2013)

  Changed paths:
    M templates/lxc-busybox.in

  Log Message:
  -----------
  lxc-busybox: if in userns, don't try to mknod

Signed-off-by: Serge Hallyn <serge.hal...@ubuntu.com>
Acked-by: Stéphane Graber <stgra...@ubuntu.com>


  Commit: cbef6c52bea93130abd8920c4b4dd1780548ac7b
      https://github.com/lxc/lxc/commit/cbef6c52bea93130abd8920c4b4dd1780548ac7b
  Author: Serge Hallyn <serge.hal...@ubuntu.com>
  Date:   2013-10-24 (Thu, 24 Oct 2013)

  Changed paths:
    M src/lxc/conf.c

  Log Message:
  -----------
  start: use lxc-user-nic if we are not root

Note this results in nics named things like 'lxcuser-0p'.  We'll
likely want to pass the requested name to lxc-user-nic, but let's
do that in a separate patch.

If we're not root, we can't create new network itnerfaces to pass
into the container.  Instead wait until the container is started,
and call lxc-user-nic to create and assign the nics.

Signed-off-by: Serge Hallyn <serge.hal...@ubuntu.com>
Acked-by: Stéphane Graber <stgra...@ubuntu.com>


Compare: https://github.com/lxc/lxc/compare/09bbd74578af...cbef6c52bea9
------------------------------------------------------------------------------
October Webinars: Code for Performance
Free Intel webinars can help you accelerate application performance.
Explore tips for MPI, OpenMP, advanced profiling, and more. Get the most from 
the latest Intel processors and coprocessors. See abstracts and register >
http://pubads.g.doubleclick.net/gampad/clk?id=60135991&iu=/4140/ostg.clktrk
_______________________________________________
Lxc-devel mailing list
Lxc-devel@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/lxc-devel

Reply via email to