[Blueprint servercloud-q-lxc] Lxc work for Q
Serge Hallyn
serge.hallyn at ubuntu.com
Thu Jun 7 20:36:14 UTC 2012
Blueprint changed by Serge Hallyn:
Whiteboard changed:
User Stories:
[nested lxc - cgroup premount and apparmor policy]
Sallie would like to run juju with lxc on her laptop, but is afraid it
may meddle with her laptop's networking setup. So she runs juju inside
an lxc container.
[lxc-attach]
Joe finds one of his containers is not responding to the ssh port, and
its consoles are not working. He suspects a problem with its devpts. He
uses lxc-attach to run a diagnostics tool inside the container.
[user namespace - unprivileged startup]
Annie wants to test a root fs tarball sitting on her usb stick. She'd
like to start at least a chroot or a whole container in it. But she
doesn't have privileges on this machine. She creates a container with
private user namespace and boots the rootfs there.
[seccomp]
Zoe wants to run a flash movie inside a container, but is afraid there
may be a kernel system call exploit. She uses seccomp to filter out
the most dangerous system calls.
[hooks, /var/lib/c1/root, and #includes, openvz migration]
Munro supports a large number of containers. Most of the container
configuration is shared from a common #included file. When he needs
to make a change to all containers, he can change the common included
configuration file, have a loop mount new filesystems under each
container's root, and add lines to the pre-start hook which the common
configuration file defines.
[encrypted root]
Rupert wants to run an application on an instance in the cloud,
but would like for the next cloud user to re-use his instance's
disk to not be able to read the application data. He therefore
uses an encrypted root for the container.
[python api]
Yngwie would like to write a script to perform a particular update
in each container. He can use the python api to find all containers,
then attach to running or execute in non-running containers to
perform the update.
Assumptions:
seccomp gets upstream
user namespaces get upstream
setns patches get upstream
Release Notes:
unprivileged startup
secure nested containers
openvz migration
+
+ WI notes:
+
+ 1. seccomp work in lxc is blocked until seccomp is packaged.
+ 2. pivot_root is not possible into a MS_SHARED directory, making our original goal of accessing the container mounts tree through /var/lib/lxc/container/root not possible.
--
Lxc work for Q
https://blueprints.launchpad.net/ubuntu/+spec/servercloud-q-lxc
More information about the Ubuntu-server-bugs
mailing list