On Mon, 24 Nov 2003 14:34:03 -0500, Bert De Vuyst wrote
> 
> Hello,
> 
> After looking at the code of tool vrpm (part of vserver and util-vserver), I 
> have some questions.
> 
> 1. The location of /vservers is hardcoded in this tool.
> I think it's at better idea use the option VSERVERS_ROOT=/vservers in this 
> script and to use $VSERVERS_ROOT inside the script.
> In case of the vserver package by Jacques, the next lines
>   if [ -f /etc/vservers.conf ] ; then
>         source /etc/vservers.conf
>   fi
> would be a usefull idea to set the $VSERVERS_ROOT.

I will fix that

> 2. In case the vserver is not running, the script starts a new security 
> context. Correct me if I'm wrong, but I think it's not a good idea.
> Why? Some people have a backup of there vservers on a spare machine in case 
> there serverhardware fails. If they run vrpm on the spare machine, vrpm will 
> startup the vservers to update the packages. This can cause a problem as the 
> IP-address of the vserver is in use by the vserver running on the master 
> server, and you end up running 2 vservers using the same IP-address.
> I think it would be beter to use chroot to run rpm in case the vserver is 
> down.

Starting a new security context does not assign IPs. So it has no impact on
other copies of the vserver running elsewhere.

The idea of using a security context is to make sure that scripts executed
during the RPM update can't access or break the root server.
 
---------------------------------------------------------
Jacques Gelinas <[EMAIL PROTECTED]>
vserver: run general purpose virtual servers on one box, full speed!
http://www.solucorp.qc.ca/miscprj/s_context.hc
_______________________________________________
Vserver mailing list
[EMAIL PROTECTED]
http://list.linux-vserver.org/mailman/listinfo/vserver

Reply via email to