Absolutely! I've not actually started working on that. (I hadn't noticed
that the docker PR was merged) Maxim (cc:d) is the one who is working on
this at Odin - I think it'd be best if we can all work together.
-serge
Quoting Akshay Karle (akshay.a.ka...@gmail.com):
> Hey Serge,
>
> This is
Ok, great! So how can I get started? I've been playing around with
unprivileged lxc and docker for the last 2 months so I have experience
using them but little experience developing them. But, I would like to
start doing some development work and happy to help.
To begin with, I will try to build
On 08/31/2015 03:59 PM, Serge Hallyn wrote:
Quoting Tamas Papp (tom...@martos.bme.hu):
On 08/28/2015 03:48 PM, Serge Hallyn wrote:
Quoting Tamas Papp (tom...@martos.bme.hu):
hi,
I would like to achieve, what is in subject.
However, I cannot get over on this apparmor issue:
On Fri, Oct 16, 2015 at 1:16 PM, Dirk Geschke wrote:
>> > That works fine with 1.1.2, but not with 1.1.4...
>>
>> su (and sudo) by default does not assign a new tty. So your user ends
>> up with a tty owned by root, thus the tty-related errors.
>
> yes and this works with
Hi Fajar,
> > not lxd, it's plain lxc from linuxcontainers.org and compiled the
> > same way as 1.1.2. To start I use as part of init-script, started
> > by root:
> >
> > /usr/local/bin/cgm create all ${CONTAINER}
> > /usr/local/bin/cgm chown all ${CONTAINER} `id -u $user` `id -g $user`
>
Please keep the list in to/cc
On Fri, Oct 16, 2015 at 3:17 PM, Dirk Geschke wrote:
> Hi Fajar,
>
>> > I'm a little bit irritated, shouldn't it be something like
>> >
>> > /home/${USER}/.local/share/lxc/${CONTAINER}/rootfs
>> >
>> > for an unprivileged user?
>>
>> What is
On Fri, Oct 16, 2015 at 4:10 PM, Dirk Geschke wrote:
>> Does /usr/local/lib/lxc/rootfs/ exist? It should be the path used to
>> temporary mount rootfs (/usr/lib/x86_64-linux-gnu/lxc in ubuntu
>> package)
>
> Yes, it exists. But I think it is only used, if the containers are
>
Hi Fador,
> Please keep the list in to/cc
oops, I thought the list was included...
> > oh, it even does not run if I login as this unprivileged user
> > via ssh, still the same error:
> >
>
> You should've mentioned this earlier :)
I thought, I mentioned it. I was just suprised, that it works
Hey Serge,
This is something I'm interested in as well. Anyway I could help with the
implementation of the graphdriver proxy?
On Fri, Oct 16, 2015 at 12:10 PM Serge Hallyn
wrote:
> Quoting Tamas Papp (tom...@martos.bme.hu):
> >
> >
> > On 08/31/2015 03:59 PM, Serge
I use raw socket to send an ip packet and fill the source ip 5.5.5.5. I use
tcpdump to capture it:
15:01:29.385061 IP 5.5.5.5 > 224.0.0.18: VRRPv4, unknown type (9)
It works well.
But when I setns to a lxc and also send the packet:
15:03:41.724126 IP 10.28.50.198 > 224.0.0.18: VRRPv4, unknown
Hi,
On 10/16/2015 02:48 PM, Akshay Karle wrote:
Ok, great! So how can I get started? I've been playing around with
unprivileged lxc and docker for the last 2 months so I have experience
using them but little experience developing them. But, I would like to
start doing some development work
Regression
---
It is no longer possible to bind-mount a file into an ephemeral
container, using the version of lxc in the lxc-daily ppa. This used
to work; the regression was introduced some time after September 15.
Details
-
If the following entry is added to the config file
On Mon, Oct 12, 2015 at 11:17 PM, Christian Brauner
wrote:
> Hm, both work without a problem when I try it.
That's good to hear! I'll create a fresh copy of lxc in a vm and see
whether it resolves the problem.
> safe_mount() is a function that has been added
Thanks Fajar,
yes, Debian installed from a template correctly starts on runlevel 2, the
default for Debian.
Since mine starts on "S" instead, a simple workaround could be to symlink
/etc/rcS.d to /etc/rc2.d or, better, just issue "init 2" from an hypothetical
rcS.d script. However, I prefer
Hello,
my container starts (lxc-start) on runlevel "S"; I need it to start on "2", but
I cant figure out how.
This container is a Debian 7 root tree taken from an existing OpenVZ in a
porting attempt. The container root folder has been replaced with the existing
OpenVZ VE tree, as-is. All
15 matches
Mail list logo