Re: [lxc-users] docker in lxc

2015-10-16 Thread Serge Hallyn
Absolutely! I've not actually started working on that. (I hadn't noticed that the docker PR was merged) Maxim (cc:d) is the one who is working on this at Odin - I think it'd be best if we can all work together. -serge Quoting Akshay Karle (akshay.a.ka...@gmail.com): > Hey Serge, > > This is

Re: [lxc-users] docker in lxc

2015-10-16 Thread Akshay Karle
Ok, great! So how can I get started? I've been playing around with unprivileged lxc and docker for the last 2 months so I have experience using them but little experience developing them. But, I would like to start doing some development work and happy to help. To begin with, I will try to build

Re: [lxc-users] docker in lxc

2015-10-16 Thread Tamas Papp
On 08/31/2015 03:59 PM, Serge Hallyn wrote: Quoting Tamas Papp (tom...@martos.bme.hu): On 08/28/2015 03:48 PM, Serge Hallyn wrote: Quoting Tamas Papp (tom...@martos.bme.hu): hi, I would like to achieve, what is in subject. However, I cannot get over on this apparmor issue:

Re: [lxc-users] Something changed between 1.1.2 and 1.1.4 for unprivileged containers?

2015-10-16 Thread Fajar A. Nugraha
On Fri, Oct 16, 2015 at 1:16 PM, Dirk Geschke wrote: >> > That works fine with 1.1.2, but not with 1.1.4... >> >> su (and sudo) by default does not assign a new tty. So your user ends >> up with a tty owned by root, thus the tty-related errors. > > yes and this works with

Re: [lxc-users] Something changed between 1.1.2 and 1.1.4 for unprivileged containers?

2015-10-16 Thread Dirk Geschke
Hi Fajar, > > not lxd, it's plain lxc from linuxcontainers.org and compiled the > > same way as 1.1.2. To start I use as part of init-script, started > > by root: > > > > /usr/local/bin/cgm create all ${CONTAINER} > > /usr/local/bin/cgm chown all ${CONTAINER} `id -u $user` `id -g $user` >

Re: [lxc-users] Something changed between 1.1.2 and 1.1.4 for unprivileged containers?

2015-10-16 Thread Fajar A. Nugraha
Please keep the list in to/cc On Fri, Oct 16, 2015 at 3:17 PM, Dirk Geschke wrote: > Hi Fajar, > >> > I'm a little bit irritated, shouldn't it be something like >> > >> > /home/${USER}/.local/share/lxc/${CONTAINER}/rootfs >> > >> > for an unprivileged user? >> >> What is

Re: [lxc-users] Something changed between 1.1.2 and 1.1.4 for unprivileged containers?

2015-10-16 Thread Fajar A. Nugraha
On Fri, Oct 16, 2015 at 4:10 PM, Dirk Geschke wrote: >> Does /usr/local/lib/lxc/rootfs/ exist? It should be the path used to >> temporary mount rootfs (/usr/lib/x86_64-linux-gnu/lxc in ubuntu >> package) > > Yes, it exists. But I think it is only used, if the containers are >

Re: [lxc-users] Something changed between 1.1.2 and 1.1.4 for unprivileged containers?

2015-10-16 Thread Dirk Geschke
Hi Fador, > Please keep the list in to/cc oops, I thought the list was included... > > oh, it even does not run if I login as this unprivileged user > > via ssh, still the same error: > > > > You should've mentioned this earlier :) I thought, I mentioned it. I was just suprised, that it works

Re: [lxc-users] docker in lxc

2015-10-16 Thread Akshay Karle
Hey Serge, This is something I'm interested in as well. Anyway I could help with the implementation of the graphdriver proxy? On Fri, Oct 16, 2015 at 12:10 PM Serge Hallyn wrote: > Quoting Tamas Papp (tom...@martos.bme.hu): > > > > > > On 08/31/2015 03:59 PM, Serge

[lxc-users] Raw socket works not right in lxc

2015-10-16 Thread sanyechong12
I use raw socket to send an ip packet and fill the source ip 5.5.5.5. I use tcpdump to capture it: 15:01:29.385061 IP 5.5.5.5 > 224.0.0.18: VRRPv4, unknown type (9) It works well. But when I setns to a lxc and also send the packet: 15:03:41.724126 IP 10.28.50.198 > 224.0.0.18: VRRPv4, unknown

Re: [lxc-users] docker in lxc

2015-10-16 Thread Maxim Patlasov
Hi, On 10/16/2015 02:48 PM, Akshay Karle wrote: Ok, great! So how can I get started? I've been playing around with unprivileged lxc and docker for the last 2 months so I have experience using them but little experience developing them. But, I would like to start doing some development work

[lxc-users] Regression in ephemeral containers

2015-10-16 Thread overlay fs
Regression --- It is no longer possible to bind-mount a file into an ephemeral container, using the version of lxc in the lxc-daily ppa. This used to work; the regression was introduced some time after September 15. Details - If the following entry is added to the config file

Re: [lxc-users] Regression in ephemeral containers

2015-10-16 Thread overlay fs
On Mon, Oct 12, 2015 at 11:17 PM, Christian Brauner wrote: > Hm, both work without a problem when I try it. That's good to hear! I'll create a fresh copy of lxc in a vm and see whether it resolves the problem. > safe_mount() is a function that has been added

Re: [lxc-users] Container starts on incorrect runlevel

2015-10-16 Thread Davide Baldini
Thanks Fajar, yes, Debian installed from a template correctly starts on runlevel 2, the default for Debian. Since mine starts on "S" instead, a simple workaround could be to symlink /etc/rcS.d to /etc/rc2.d or, better, just issue "init 2" from an hypothetical rcS.d script. However, I prefer

[lxc-users] Container starts on incorrect runlevel

2015-10-16 Thread Davide Baldini
Hello, my container starts (lxc-start) on runlevel "S"; I need it to start on "2", but I cant figure out how. This container is a Debian 7 root tree taken from an existing OpenVZ in a porting attempt. The container root folder has been replaced with the existing OpenVZ VE tree, as-is. All