Commit Graph

8686 Commits

Author SHA1 Message Date
tomponline
b670016ac9 network: Adds ipvlan static routes for l2proxy mode
Signed-off-by: tomponline <thomas.parrott@canonical.com>
2019-05-03 19:59:24 +01:00
Christian Brauner
ad9429e529
tree-wide: make socket SOCK_CLOEXEC
Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com>
2019-05-03 20:35:02 +02:00
tomponline
a2f9a6706d network: Adds gateway device route mode
Adds ability to specify "dev" as the gateway value, which will cause a device route to be set as default gateway.

Signed-off-by: tomponline <thomas.parrott@canonical.com>
2019-05-03 15:08:49 +01:00
Christian Brauner
5b94d538dd
Merge pull request #2964 from tomponline/tp-l2proxy
network: Adds layer 2 (ARP/NDP) proxy mode
2019-05-03 12:36:00 +02:00
Stéphane Graber
9e1accb9d2
Merge pull request #2972 from brauner/2019-05-02/seccomp_notify_mem_fd
seccomp: send process memory fd
2019-05-02 16:56:10 -04:00
Christian Brauner
99b68bdb48
Merge pull request #2971 from hallyn/2019-05-01/nsshare.2
namespaces: allow a pathname to a nsfd for namespace to share
2019-05-02 22:55:51 +02:00
Christian Brauner
5ed06d3ad6
seccomp: send process memory fd
There's an inherent race when reading a process's memory. The easiest way is to
have liblxc get an fd and check that the race was one, send it to the caller
(They are free to ignore it if they don't use recvmsg()).

Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com>
2019-05-02 17:06:00 +02:00
Serge Hallyn
39e6fd369d namespaces: allow a pathname to a nsfd for namespace to share
Signed-off-by: Serge Hallyn <shallyn@cisco.com>
2019-05-02 06:10:15 -07:00
tomponline
6509154de1 network: Adds layer 2 (ARP/NDP) proxy mode
Adds the lxc.net.[i].l2proxy flag that can be either 0 or 1.

Defaults to 0.

This, when used with lxc.net.[i].link, will add IP neighbour proxy entries on the linked device
for any IPv4 and IPv6 addresses on the container's network device.

Additionally, for IPv6 addresses it will check the following sysctl values and fail with an error if not set:

	net.ipv6.conf.[link].proxy_ndp=1
	net.ipv6.conf.[link].forwarding=1

Signed-off-by: tomponline <thomas.parrott@canonical.com>
2019-05-02 14:07:28 +01:00
Stéphane Graber
0b5afd323e
Merge pull request #2969 from brauner/2019-05-01/seccomp_fixes
seccomp: ensure fields are set to 0
2019-05-01 12:44:48 -04:00
Christian Brauner
370460664f
seccomp: ensure fields are set to 0
Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com>
2019-05-01 18:35:58 +02:00
Christian Brauner
ea84ddf9e2
Merge pull request #2950 from tomponline/tp-ipvlan
network: Adds IPVLAN support
2019-05-01 18:24:56 +02:00
tomponline
c9f5238291 network: Adds IPVLAN support
Example usage:

	lxc.net[i].type=ipvlan
	lxc.net[i].ipvlan.mode=[l3|l3s|l2] (defaults to l3)
	lxc.net[i].ipvlan.flags=[bridge|private|vepa] (defaults to bridge)
	lxc.net[i].link=eth0
	lxc.net[i].flags=up

Signed-off-by: tomponline <thomas.parrott@canonical.com>
2019-05-01 10:10:44 +01:00
Stéphane Graber
28805eb0e7
Merge pull request #2967 from brauner/2019-05-01/seccomp_notifier_api_removal
seccomp: remove alignment requirements
2019-04-30 23:16:46 -04:00
Christian Brauner
2a621ecedd
seccomp: remove alignment requirements
since apparently there are insane programming languages out there that just
silently remove packed members in structs.

Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com>
2019-05-01 02:04:02 +02:00
Stéphane Graber
2bad947676
Merge pull request #2966 from brauner/2019-05-01/seccomp_notifier_api_removal
seccomp: don't commit to an api just yet
2019-04-30 19:42:33 -04:00
Christian Brauner
ebc1c319f6
seccomp: don't commit to an api just yet
I'm not sure that I want to be married (to this layout) just yet.

Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com>
2019-05-01 01:29:06 +02:00
Stéphane Graber
0b8bb8db54
Merge pull request #2965 from brauner/2019-05-01/seccomp_notifier_fixes
seccomp: notifier fixes
2019-04-30 18:53:21 -04:00
Christian Brauner
2ac0f627f5
seccomp: notifier fixes
Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com>
2019-05-01 00:36:41 +02:00
Christian Brauner
8d539bc9a8
Merge pull request #2961 from tomponline/tp-static-net-funcs
network: Makes some routing functions static
2019-04-30 11:46:24 +02:00
tomponline
8f82874c8c network: Makes some routing functions static
The following functions can be made static for consistency:

	lxc_ipv4_dest_add
	lxc_ipv6_dest_add
	lxc_ip_route_dest_add (renamed)

Signed-off-by: tomponline <thomas.parrott@canonical.com>
2019-04-30 10:33:29 +01:00
Christian Brauner
75614e8e52
Merge pull request #2960 from tomponline/tp-seccomp-apiext-docs
docs: Adds missing doc entries for seccomp related API extensions
2019-04-30 11:17:40 +02:00
tomponline
7b766ddc3a docs: Adds missing doc entries for seccomp related API extensions
Signed-off-by: tomponline <thomas.parrott@canonical.com>
2019-04-30 10:14:55 +01:00
Christian Brauner
5efab6bf45
Merge pull request #2949 from tomponline/tp-veth-routes
network: Adds veth static routes feature
2019-04-29 17:15:38 +02:00
Christian Brauner
7815c73372
Merge pull request #2957 from tomponline/tp-macvlan-mode
network: Fixes bug in macvlan mode selection
2019-04-29 16:17:42 +02:00
tomponline
b56680fd74 network: Fixes bug in macvlan mode selection
Signed-off-by: tomponline <thomas.parrott@canonical.com>
2019-04-29 15:11:17 +01:00
Stéphane Graber
978dfc7ec4
Merge pull request #2956 from brauner/2019-04-29/seccomp_trap_cleanup
seccomp: cleanup
2019-04-29 09:47:29 -04:00
Christian Brauner
c3e3c21a10
seccomp: cleanup
Simplify and cleanup some of the seccomp code. This mainly focuses on removing
the open coding of various seccomp settings all over the code place in favor of
centralized helpers.

Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com>
2019-04-29 15:17:31 +02:00
Stéphane Graber
27b737093d
Merge pull request #2955 from tomponline/tp-ignore-test-build
tests: Updates .gitignore to ignore test build artefacts
2019-04-29 08:59:32 -04:00
Stéphane Graber
c62784df38
Merge pull request #2954 from tomponline/tp-vlan-hook
network: Fixes vlan hook script
2019-04-29 08:59:20 -04:00
tomponline
9574a3780a tests: Updates .gitignore to ignore test build artefacts
Signed-off-by: tomponline <thomas.parrott@canonical.com>
2019-04-29 09:50:06 +01:00
tomponline
19abca58e2 network: Fixes vlan hook script
Signed-off-by: tomponline <thomas.parrott@canonical.com>
2019-04-29 09:44:57 +01:00
tomponline
d4a7da4632 network: Adds support host side veth device static routes
Adds the following new config keys:

	lxc.net.[i].veth.ipv4.route
	lxc.net.[i].veth.ipv6.route
E.g.

	lxc.net.0.veth.ipv4.route = 192.0.2.1/32
	lxc.net.0.veth.ipv4.route = 192.0.3.0/24
	lxc.net.0.veth.ipv6.route = 2001:db8::1/128
	lxc.net.0.veth.ipv6.route = 2001:db8:2::/64

Signed-off-by: tomponline <thomas.parrott@canonical.com>
2019-04-29 08:38:33 +01:00
Stéphane Graber
41cd8a8d8c
Merge pull request #2951 from tomponline/tp-typo
network: Fixes a little typo in an error message
2019-04-26 14:45:10 -04:00
Stéphane Graber
6af0bd7bbf
Merge pull request #2952 from tomponline/tp-vlan-upscript
network: Adds hook handling for vlan network type
2019-04-26 14:44:55 -04:00
tomponline
3a73d9f109 network: Adds upscript handling for vlan network type
Signed-off-by: tomponline <thomas.parrott@canonical.com>
2019-04-26 18:01:53 +01:00
tomponline
eb0628a701 network: Fixes a little typo in an error message
Signed-off-by: tomponline <thomas.parrott@canonical.com>
2019-04-26 17:51:44 +01:00
Stéphane Graber
a82463a071
Merge pull request #2947 from brauner/2019-04-18/seccomp_trap
seccomp: SECCOMP_RET_USER_NOTIF support
2019-04-25 18:44:37 -04:00
Christian Brauner
eab649dc41
start: silence clang
Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com>
2019-04-25 21:35:52 +02:00
Christian Brauner
6cc93f0ed6
api_extensions: add seccomp_notify
Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com>
2019-04-25 21:35:52 +02:00
Christian Brauner
8a6437599c
doc: add lxc.seccomp.notify.proxy
Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com>
2019-04-25 21:35:52 +02:00
Christian Brauner
e35b7bf81c
seccomp: send default answer and try to reconnect
Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com>
2019-04-25 21:35:28 +02:00
Christian Brauner
86ce1da153
confile: add lxc.seccomp.notify.proxy
Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com>
2019-04-25 21:35:28 +02:00
Christian Brauner
cdb2a47f9b
seccomp: SECCOMP_RET_USER_NOTIF support
Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com>
2019-04-25 21:35:28 +02:00
Christian Brauner
05bbce37b0
Merge pull request #2948 from pgauret/patch-1
Fix 'zfs get' command order
2019-04-24 18:30:43 +02:00
pgauret
69b6aa3056
Fix 'zfs get' command order
Another case of calling 'zfs get' which requires reordering arguments to work with latest zfs.

Signed-off-by: Paul Gauret <pgauret@yahoo.com>
2019-04-24 18:29:21 +02:00
Christian Brauner
a24d015daf
Merge pull request #2946 from tych0/remove-bad-doc
lxc-start: remove bad doc
2019-04-23 17:08:13 +02:00
Tycho Andersen
bd65f5ce50 lxc-start: remove bad doc
We don't in fact exit(1) if this is not specified, and it wouldn't make
sense to, since most people probably don't specify this.

Signed-off-by: Tycho Andersen <tycho@tycho.ws>
2019-04-23 08:48:29 -06:00
Stéphane Graber
60c20c6e0e
Merge pull request #2945 from brauner/2019-04-19/netns_getifaddrs_adapt_to_kernel_changes
netns_getifaddrs: adapt to kernel changes
2019-04-19 13:58:23 -04:00
Christian Brauner
c8ca5a435c
netns_getifaddrs: adapt to kernel changes
s/NETLINK_DUMP_STRICT_CHK/NETLINK_GET_STRICT_CHK/g

Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com>
2019-04-19 15:24:51 +02:00