[lxc-devel] [PATCH 5/6] lxc-opensuse: extend base

2013-03-05 Thread Jiri Slaby
Base no longer provides bash, sed and tar, but we need those. So add them. --- templates/lxc-opensuse.in | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/templates/lxc-opensuse.in b/templates/lxc-opensuse.in index 32ff4ec..820368e 100644 --- a/templates/lxc-opensuse.in +++ b/tem

[lxc-devel] [PATCH 1/6] various fixes for openSUSE template for lxc-clone usage

2013-03-05 Thread Jiri Slaby
From: Frederic Crozat - create /etc/hostname as symlink to /etc/HOSTNAME - fix inadequate space in lxc.mount config, preventing lxc-clone to work Jiri Slaby: some cleanups --- templates/lxc-opensuse.in | 9 +++-- 1 file changed, 7 insertions(+), 2 deletions(-) diff --git a/templates/lxc-op

[lxc-devel] [PATCH 3/6] give a hint if old cgroup can't be moved

2013-03-05 Thread Jiri Slaby
From: Frederic Crozat When cgroup can't be moved, it might be a hint container is already running. --- src/lxc/cgroup.c | 3 +++ 1 file changed, 3 insertions(+) diff --git a/src/lxc/cgroup.c b/src/lxc/cgroup.c index 28f3474..6630d6c 100644 --- a/src/lxc/cgroup.c +++ b/src/lxc/cgroup.c @@ -560,6

[lxc-devel] procfs and unnamed pipes

2013-03-05 Thread Timofey.Kirillov
Hi, I have a question about using unnamed pipes with procfs. Suppose a chrooted environment with proc mounted as procfs. I am trying to use bash process substitution feature and get this: $ cat <(echo hello) cat: /dev/fd/63: No such file or directory While on the normal system: $ cat <(echo he

[lxc-devel] [PATCH 2/6] shutdown fixes for openSUSE container

2013-03-05 Thread Jiri Slaby
From: Frederic Crozat - mount /run on tmpfs outside container - replace /var/run bind mount on /run by a symlink --- templates/lxc-opensuse.in | 5 + 1 file changed, 5 insertions(+) diff --git a/templates/lxc-opensuse.in b/templates/lxc-opensuse.in index f69eae1..56e93d7 100644 --- a/templa

[lxc-devel] [PATCH 4/6] lxc-opensuse: update for 12.2

2013-03-05 Thread Jiri Slaby
From: Frederic Crozat This adaptation of systemd. We also add network configuration support. Jiri Slaby: cleanups, rebase --- templates/lxc-opensuse.in | 121 +++--- 1 file changed, 61 insertions(+), 60 deletions(-) diff --git a/templates/lxc-opensuse.in

Re: [lxc-devel] [PATCH] Add man page for lxc-clone

2013-03-05 Thread Stéphane Graber
On 02/08/2013 05:58 PM, Serge Hallyn wrote: > And doing so pointed out a bug in lxc-clone itself - it claims > default fssize is 2G. It's not. > > Signed-off-by: Serge Hallyn Acked-by: Stéphane Graber > --- > configure.ac | 1 + > doc/Makefile.am | 1 + > doc/lxc-clone.sgm

[lxc-devel] [PATCH 6/6] lxc-opensuse: proper failure

2013-03-05 Thread Jiri Slaby
Fail if something goes wrong. We used to continue and show one failure after another. --- templates/lxc-opensuse.in | 14 +++--- 1 file changed, 7 insertions(+), 7 deletions(-) diff --git a/templates/lxc-opensuse.in b/templates/lxc-opensuse.in index 820368e..1829ddf 100644 --- a/templates

[lxc-devel] [ lxc-Bugs-3605123 ] Failed to umount 'dev/pts' when running lxc-execute

2013-03-05 Thread SourceForge . net
Bugs item #3605123, was opened at 2013-02-17 14:56 Message generated for change (Tracker Item Submitted) made by rjmccabe3701 You can respond by visiting: https://sourceforge.net/tracker/?func=detail&atid=826303&aid=3605123&group_id=163076 Please note that this message will contain a full copy of

[lxc-devel] [PATCH 7/7] lxc-opensuse: print \n from one echo

2013-03-05 Thread Jiri Slaby
Otherwise the output looks like: Copying rootfs to /var/lib/lxc/tomcat/rootfs ...Please change root-password ! --- templates/lxc-opensuse.in | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/templates/lxc-opensuse.in b/templates/lxc-opensuse.in index 1829ddf..d8aa2a1 100644 --- a

Re: [lxc-devel] [PATCH 4/6] lxc-opensuse: update for 12.2

2013-03-05 Thread Jiri Slaby
On 02/19/2013 08:51 PM, Serge Hallyn wrote: > Quoting Jiri Slaby (jsl...@suse.cz): >> From: Frederic Crozat >> >> This adaptation of systemd. We also add network configuration support. > > Is there any point in worrying about support for older versions? > > (If not, that's fine) No, as we do no

Re: [lxc-devel] [PATCH 2/6] shutdown fixes for openSUSE container

2013-03-05 Thread Jiri Slaby
On 02/19/2013 08:44 PM, Serge Hallyn wrote: > Quoting Jiri Slaby (jsl...@suse.cz): >> From: Frederic Crozat >> >> - mount /run on tmpfs outside container >> - replace /var/run bind mount on /run by a symlink >> --- > > Formality, but could you please sign off your patches? You can stick my: Sign

Re: [lxc-devel] [PATCH] Link against pthread when not on bionic.

2013-03-05 Thread Stéphane Graber
On 02/19/2013 09:19 AM, Serge Hallyn wrote: > Quoting Natanael Copa (nc...@alpinelinux.org): >> On Mon, 18 Feb 2013 21:40:42 +0100 >> Daniel Lezcano wrote: >> >>> On 02/18/2013 06:23 PM, Stéphane Graber wrote: dpkg spotted that we're not explicitly linking against pthread even though we

[lxc-devel] mount table information pertaining to each container

2013-03-05 Thread hamilton peter
Hi, Would like to understand how the mount table information pertaining to each container is being maintained. As this data would be required by most of the file system calls. Example: mount, umount, bdf, df when executed inside a container. As these commands would use mntent set of Library calls

[lxc-devel] [PATCH 0/3] lxc-attach improvements

2013-03-05 Thread Christian Seiler
Hi Serge, here are my patches as emails to the lxc-devel list. The first patch implements the getent(1) logic for trying much harder to determine the correct login shell of the requested user (but only if getpwuid(3) fails), the second patch uses /bin/sh as a fallback if even that fails and the th

[lxc-devel] [PATCH 3/3] lxc-attach: User namespaces: Use init's user & group id when attaching

2013-03-05 Thread Christian Seiler
When attaching to a container with a user namespace, try to detect the user and group ids of init via /proc and attach as that same user. Only if that is unsuccessful, fall back to (0, 0). --- src/lxc/attach.c | 53 ++ src/lxc/attach.h |

[lxc-devel] [PATCH 1/3] lxc-attach: Try really hard to determine login shell

2013-03-05 Thread Christian Seiler
If no command is specified, and using getpwuid() to determine the login shell fails, try to spawn a process that executes the utility 'getent'. getpwuid() may fail because of incompatibilities between the NSS implementations on the host and in the container. Signed-off-by: Christian Seiler --- s

[lxc-devel] [PATCH 2/3] lxc-attach: Default to /bin/sh if shell cannot be determined or exec'd

2013-03-05 Thread Christian Seiler
If getpwuid() fails and also the fallback of spawning of a 'getent' process, and the user specified no command to execute, default to /bin/sh and only fail if even that is not available. This should ensure that unless the container is *really* weird, no matter what, the user should always end up wi

Re: [lxc-devel] Fwd: Re: lxc-attach: NSS handling

2013-03-05 Thread Serge Hallyn
Quoting Christian Seiler (christ...@iwakd.de): > Sorry, I forgot to post to the list... > > Original-Nachricht > Betreff: Re: [lxc-devel] lxc-attach: NSS handling > Datum: Tue, 05 Mar 2013 00:01:55 +0100 > Von: Christian Seiler > An: Serge Hallyn > > Hi Serge, > > > So if you