| Commit message (Collapse) | Author | Age | Files | Lines |
|
|
|
|
|
| |
machine.slice
https://plus.google.com/112206451048767236518/posts/SYAueyXHeEX
|
|
|
|
|
|
|
|
| |
This way we know that any bridges and other user-created network devices
are in place, and can be properly added to the container.
In the long run this should be dropped, and replaced by direct calls
inside nspawn that cause the devices to be created when necessary.
|
|
|
|
| |
on the command line
|
|
|
|
|
| |
Given the recent improvements in networkd, it's probably the better
default now.
|
|
|
|
|
|
|
|
|
|
|
| |
- Unescape instance name so that we can take almost anything as instance
name.
- Introduce "machines.target" which consists of all enabled nspawns and
can be used to start/stop them altogether
- Look for container directory using -M instead of harcoding the path in
/var/lib/container
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
--link-journal={host,guest} fail if the host does not have persistent
journalling enabled and /var/log/journal/ does not exist. Even worse, as there
is no stdout/err any more, there is no error message to point that out.
Introduce two new modes "try-host" and "try-guest" which don't fail in this
case, and instead just silently skip the guest journal setup.
Change -j to mean "try-guest" instead of "guest", and fix the wrong --help
output for it (it said "host" before).
Change systemd-nspawn@.service.in to use "try-guest" so that this unit works
with both persistent and non-persistent journals on the host without failing.
https://bugs.debian.org/770275
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
subhierarchies
For priviliged units this resource control property ensures that the
processes have all controllers systemd manages enabled.
For unpriviliged services (those with User= set) this ensures that
access rights to the service cgroup is granted to the user in question,
to create further subgroups. Note that this only applies to the
name=systemd hierarchy though, as access to other controllers is not
safe for unpriviliged processes.
Delegate=yes should be set for container scopes where a systemd instance
inside the container shall manage the hierarchies below its own cgroup
and have access to all controllers.
Delegate=yes should also be set for user@.service, so that systemd
--user can run, controlling its own cgroup tree.
This commit changes machined, systemd-nspawn@.service and user@.service
to set this boolean, in order to ensure that container management will
just work, and the user systemd instance can run fine.
|
|
|
|
|
| |
THis way we can remove cgroup priviliges after setup, but get them back
for the next restart, as we need it.
|
|
|
|
|
| |
This causes the container to shut down cleanly when the service is
stopped.
|
| |
|
| |
|
|
|
|
|
| |
ControlGroup= is obsolete, so let's drop it from the default nspawn unit
file.
|
|
running containers as system services
|