Base no longer provides bash, sed and tar, but we need those. So add them.
---
templates/lxc-opensuse.in | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/templates/lxc-opensuse.in b/templates/lxc-opensuse.in
index 32ff4ec..820368e 100644
--- a/templates/lxc-opensuse.in
+++ b/tem
From: Frederic Crozat
- create /etc/hostname as symlink to /etc/HOSTNAME
- fix inadequate space in lxc.mount config, preventing lxc-clone to work
Jiri Slaby: some cleanups
---
templates/lxc-opensuse.in | 9 +++--
1 file changed, 7 insertions(+), 2 deletions(-)
diff --git a/templates/lxc-op
From: Frederic Crozat
When cgroup can't be moved, it might be a hint container is already
running.
---
src/lxc/cgroup.c | 3 +++
1 file changed, 3 insertions(+)
diff --git a/src/lxc/cgroup.c b/src/lxc/cgroup.c
index 28f3474..6630d6c 100644
--- a/src/lxc/cgroup.c
+++ b/src/lxc/cgroup.c
@@ -560,6
Hi,
I have a question about using unnamed pipes with procfs.
Suppose a chrooted environment with proc mounted as procfs. I am trying
to use bash process substitution feature and get this:
$ cat <(echo hello)
cat: /dev/fd/63: No such file or directory
While on the normal system:
$ cat <(echo he
From: Frederic Crozat
- mount /run on tmpfs outside container
- replace /var/run bind mount on /run by a symlink
---
templates/lxc-opensuse.in | 5 +
1 file changed, 5 insertions(+)
diff --git a/templates/lxc-opensuse.in b/templates/lxc-opensuse.in
index f69eae1..56e93d7 100644
--- a/templa
From: Frederic Crozat
This adaptation of systemd. We also add network configuration support.
Jiri Slaby: cleanups, rebase
---
templates/lxc-opensuse.in | 121 +++---
1 file changed, 61 insertions(+), 60 deletions(-)
diff --git a/templates/lxc-opensuse.in
On 02/08/2013 05:58 PM, Serge Hallyn wrote:
> And doing so pointed out a bug in lxc-clone itself - it claims
> default fssize is 2G. It's not.
>
> Signed-off-by: Serge Hallyn
Acked-by: Stéphane Graber
> ---
> configure.ac | 1 +
> doc/Makefile.am | 1 +
> doc/lxc-clone.sgm
Fail if something goes wrong. We used to continue and show one failure
after another.
---
templates/lxc-opensuse.in | 14 +++---
1 file changed, 7 insertions(+), 7 deletions(-)
diff --git a/templates/lxc-opensuse.in b/templates/lxc-opensuse.in
index 820368e..1829ddf 100644
--- a/templates
Bugs item #3605123, was opened at 2013-02-17 14:56
Message generated for change (Tracker Item Submitted) made by rjmccabe3701
You can respond by visiting:
https://sourceforge.net/tracker/?func=detail&atid=826303&aid=3605123&group_id=163076
Please note that this message will contain a full copy of
Otherwise the output looks like:
Copying rootfs to /var/lib/lxc/tomcat/rootfs ...Please change
root-password !
---
templates/lxc-opensuse.in | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/templates/lxc-opensuse.in b/templates/lxc-opensuse.in
index 1829ddf..d8aa2a1 100644
--- a
On 02/19/2013 08:51 PM, Serge Hallyn wrote:
> Quoting Jiri Slaby (jsl...@suse.cz):
>> From: Frederic Crozat
>>
>> This adaptation of systemd. We also add network configuration support.
>
> Is there any point in worrying about support for older versions?
>
> (If not, that's fine)
No, as we do no
On 02/19/2013 08:44 PM, Serge Hallyn wrote:
> Quoting Jiri Slaby (jsl...@suse.cz):
>> From: Frederic Crozat
>>
>> - mount /run on tmpfs outside container
>> - replace /var/run bind mount on /run by a symlink
>> ---
>
> Formality, but could you please sign off your patches?
You can stick my:
Sign
On 02/19/2013 09:19 AM, Serge Hallyn wrote:
> Quoting Natanael Copa (nc...@alpinelinux.org):
>> On Mon, 18 Feb 2013 21:40:42 +0100
>> Daniel Lezcano wrote:
>>
>>> On 02/18/2013 06:23 PM, Stéphane Graber wrote:
dpkg spotted that we're not explicitly linking against pthread even though
we
Hi,
Would like to understand how the mount table information pertaining to each
container is being maintained.
As this data would be required by most of the file system calls. Example:
mount, umount, bdf, df when executed inside a container.
As these commands would use mntent set of Library calls
Hi Serge,
here are my patches as emails to the lxc-devel list. The first patch
implements the getent(1) logic for trying much harder to determine the
correct login shell of the requested user (but only if getpwuid(3)
fails), the second patch uses /bin/sh as a fallback if even that fails
and the th
When attaching to a container with a user namespace, try to detect the
user and group ids of init via /proc and attach as that same user. Only
if that is unsuccessful, fall back to (0, 0).
---
src/lxc/attach.c | 53 ++
src/lxc/attach.h |
If no command is specified, and using getpwuid() to determine the login
shell fails, try to spawn a process that executes the utility 'getent'.
getpwuid() may fail because of incompatibilities between the NSS
implementations on the host and in the container.
Signed-off-by: Christian Seiler
---
s
If getpwuid() fails and also the fallback of spawning of a 'getent'
process, and the user specified no command to execute, default to
/bin/sh and only fail if even that is not available. This should ensure
that unless the container is *really* weird, no matter what, the user
should always end up wi
Quoting Christian Seiler (christ...@iwakd.de):
> Sorry, I forgot to post to the list...
>
> Original-Nachricht
> Betreff: Re: [lxc-devel] lxc-attach: NSS handling
> Datum: Tue, 05 Mar 2013 00:01:55 +0100
> Von: Christian Seiler
> An: Serge Hallyn
>
> Hi Serge,
>
> > So if you
19 matches
Mail list logo