Commit Graph

165 Commits

Author SHA1 Message Date
Mrunal Patel 26b9be27a9 Merge pull request #150 from vbatts/code-of-conduct
*: adding a code of conduct
2015-09-08 11:50:12 -07:00
Mrunal Patel 9d59c53bbf Merge pull request #154 from vbatts/golint
runtime_config: comments for golint
2015-09-04 14:16:52 -07:00
Michael Crosby 0bb0ff7656 Merge pull request #152 from cloudfoundry-incubator/namespace-names
Make namespace names match runc
2015-09-04 12:51:20 -07:00
Vincent Batts 752f35c86f runtime_config: comments for golint
Signed-off-by: Vincent Batts <vbatts@hashbangbash.com>
2015-09-04 15:47:17 -04:00
Vincent Batts 58f6675696 Merge pull request #153 from cloudfoundry-incubator/namespace-enums
Define constants for Linux Namespace names
2015-09-04 14:35:42 -04:00
Julian Friedman 47282257b8 Define constants for Linux Namespace names
Signed-off-by: Julian Friedman <julz.friedman@uk.ibm.com>
2015-09-04 19:27:14 +01:00
Julian Friedman 3fd2530794 Make namespaces match runc
"mount" rather than "mnt", "network" rather than "net"

Signed-off-by: Julian Friedman <julz.friedman@uk.ibm.com>
2015-09-04 19:12:38 +01:00
Vincent Batts 1cdec7c066 *: adding a code of conduct
Signed-off-by: Vincent Batts <vbatts@hashbangbash.com>
2015-09-04 13:15:17 -04:00
Alexander Morozov 527a3eec38 Merge pull request #64 from cyphar/add-pids-cgroup
spec: linux: add support for the PIDs cgroup
2015-09-03 21:09:55 -07:00
Mrunal Patel 34cd33b8ee Merge pull request #148 from philips/change-prefix-to-oc
runtime: use opencontainer vs oci
2015-09-03 19:41:27 -07:00
Brandon Philips 1ebe348f97 runtime: use opencontainer vs oci
In an effort to be more discoverable and self-describing change out the
term "oci" for "opencontainer". We should consider using this as the
prefix for global namespaces going forward as oc has conflicts with
existing tools and oci is the name of the initiative not the specs.
2015-09-03 18:31:38 -07:00
Mrunal Patel bf52e72391 Merge pull request #139 from cloudfoundry-incubator/master
Fix links to go files in config.md
2015-09-03 15:04:48 -07:00
Mrunal Patel f9a853ce31 Merge pull request #128 from laijs/header-cleanup
Header cleanup
2015-09-03 15:01:48 -07:00
Vincent Batts 3b330ad85f Merge pull request #87 from crosbymichael/state
Add runtime state configuration and structs
2015-09-03 15:21:03 -04:00
Alexander Morozov 8874000583 Merge pull request #136 from LK4D4/fix_mounts
Change layout of mountpoints and mounts
2015-09-03 09:27:31 -07:00
Will Pragnell d67689f0e2 config: fix links to go files 2015-09-03 10:18:35 +01:00
Aleksa Sarai 834fb5db52 spec: linux: add support for the PIDs cgroup
Add support for the PIDs cgroup as a cgroup resource constraint in the
Linux container specification. Since PIDs are a real resource, we need
to support the ability to limit them.

The PIDs cgroup subsystem is available in Linux 4.3+.

Signed-off-by: Aleksa Sarai <cyphar@cyphar.com>
2015-09-03 17:32:35 +10:00
Alexander Morozov c18c283a17 Change layout of mountpoints and mounts
Added info about MountPoints to config.md.

Signed-off-by: Alexander Morozov <lk4d4@docker.com>

Signed-off-by: W. Trevor King <wking@tremily.us>
2015-09-02 21:04:44 -07:00
Lai Jiangshan 004ec5525a Rename the header "Access to devices" to "Devices" to fit with the config
And also fix the header size

Signed-off-by: Lai Jiangshan <jiangshanlai@gmail.com>
2015-09-03 07:12:23 +08:00
Michael Crosby 180df9dd8f Add runtime state configuration and structs
This adds runtime state information for oci container's so that it can
be persisted and used by external tools.

Signed-off-by: Michael Crosby <crosbymichael@gmail.com>
2015-09-02 11:15:23 -07:00
Alexander Morozov 138deee141 Merge pull request #130 from LK4D4/fix_linux_runtime
Fix LinuxRuntime field
2015-09-01 06:59:49 -07:00
Mrunal Patel 4d18a5287f Merge pull request #132 from LK4D4/fix_uid_map_naming
Return golint-compliant naming for mappings
2015-08-31 19:42:59 -07:00
Alexander Morozov 31485faecb Return golang compliant names for UID and GID in User
Signed-off-by: Alexander Morozov <lk4d4@docker.com>
2015-08-31 16:56:08 -07:00
Alexander Morozov c83c65ccd5 Return golint-compliant naming for mappings
It was lost in pull request about runtime config

Signed-off-by: Alexander Morozov <lk4d4@docker.com>
2015-08-31 16:55:45 -07:00
Brandon Philips 4459fb5ed6 Merge pull request #131 from crosbymichael/maintainers
Add MAINTAINERS file
2015-08-31 14:25:20 -07:00
Alexander Morozov cc8a99757d Fix LinuxRuntime field
Signed-off-by: Alexander Morozov <lk4d4@docker.com>
2015-08-31 14:06:28 -07:00
Michael Crosby c74da17e61 Add MAINTAINERS file
Signed-off-by: Michael Crosby <crosbymichael@gmail.com>
2015-08-31 13:51:55 -07:00
Mrunal Patel e9cb5644fa Merge pull request #124 from wking/example-additional-gids
config: Add example additionalGids
2015-08-29 13:14:52 -07:00
Brandon Philips d9a5bf2d0d Merge pull request #125 from wking/example-cwd
config: Add example cwd
2015-08-29 09:33:47 -07:00
Brandon Philips 4e4f34ab96 Merge pull request #122 from wking/trailing-blank-lines
runtime-config: Remove blank lines from the end of files
2015-08-29 09:32:00 -07:00
Brandon Philips e3ee431f39 Merge branch 'linux_fds' 2015-08-29 08:34:38 -07:00
Mrunal Patel bd792ea559 Add fd section for linux container process
Signed-off-by: Mrunal Patel <mrunalp@gmail.com>
2015-08-29 08:33:46 -07:00
Brandon Philips 7c5c02ad48 Merge pull request #121 from wking/linux-runtime-spec-comment-typo
runtime_config_linux: Fix 'LinuxSpec' -> 'LinuxRuntimeSpec' in comment
2015-08-29 08:31:42 -07:00
W. Trevor King 10aa5f20c5 config: Add example cwd
The field is optional, but it's nice to have at least one example of
it in use.

Signed-off-by: W. Trevor King <wking@tremily.us>
2015-08-28 22:19:26 -07:00
W. Trevor King 3f4125c3de config: Add example additionalGids
The field is optional, but it's nice to have at least one example of
it in use.  The GIDs I've chosen are currently "tty" and "disk" on
Gentoo (1 is "bin"), which may be remotely reasonable choices, but the
values we're using don't really matter without an example filesystem
to provide context.

Signed-off-by: W. Trevor King <wking@tremily.us>
2015-08-28 22:17:36 -07:00
W. Trevor King 284f914909 runtime-config: Remove blank lines from the end of files
These snuck in with 7232e4b1 (specs: introduce the concept of a
runtime.json, 2015-07-30, #88) and 73bf1ba8 (JSON objects are easier
to parse/manipulate, 2015-08-27, #120).

Signed-off-by: W. Trevor King <wking@tremily.us>
2015-08-28 22:07:58 -07:00
W. Trevor King d9f623da6d runtime_config_linux: Fix 'LinuxSpec' -> 'LinuxRuntimeSpec' in comment
Fix a copy-paste error from 7232e4b1 (specs: introduce the concept of
a runtime.json, #88).

Signed-off-by: W. Trevor King <wking@tremily.us>
2015-08-28 21:26:49 -07:00
Michael Crosby 6a5a445465 Merge pull request #116 from wking/bluejeans-meetings
README: Document BlueJeans for meetings
2015-08-28 11:06:35 -07:00
Vincent Batts b4af7801d8 Merge pull request #120 from timthelion/patch-1
JSON objects are easier to parse/manipulate
2015-08-28 14:00:08 -04:00
Brandon Philips 6278334b91 Merge pull request #119 from wking/trailing-whitespace
Remove trailing whitespace
2015-08-27 13:48:56 -07:00
Timothy Hobbs 73bf1ba833
JSON objects are easier to parse/manipulate
Don't use strings when you can use dictionaries/objects. JSON objects are trivial to parse and manipulate, unlike strings. String parsing is the #1 cause of security bugs, so if it can be trivially avoided, then why not ;)
2015-08-27 22:19:27 +02:00
Alexander Morozov d5812139b3 Merge pull request #117 from wking/runtime-headings
runtime-config-linux: Minor header cleanups after #88
2015-08-26 18:01:28 -07:00
W. Trevor King 4cc06a6a8b README: Document BlueJeans and wiki archive for meetings
In #opencontainers after today's meeting, here's the source for the
change from Google Hangouts to BlueJeans:

12:01 < wking> Is the BlueJeans approach going to be our standard
  procedure?  If so, I can file a PR updating our weekly-meeting docs
  (which still talk about YouTube and Google Hangouts)
12:03 < mrunalp> wking: Yeah, I think so.
12:04 < wking> ok.  And it's just going to "push the BlueJeans link to
  IRC and the list before the meeting"?  Or does BlueJeans have stable
  channel URLs or similar?
12:05 < mrunalp> wking: The URL that we used today is stable.

Signed-off-by: W. Trevor King <wking@tremily.us>
2015-08-26 15:22:32 -07:00
W. Trevor King 9f758db92f runtime-config-linux: One sentence per line for opening two paragraphs
I touched these paragraphs while removing trailing whitespace in the
previous commit.  Since I was touching them in this branch, it seemed
better to rewrap them using the "Markdown style" suggestions in the
README.

I also added a missing period after the namespaces(7) link.

Signed-off-by: W. Trevor King <wking@tremily.us>
2015-08-26 15:17:46 -07:00
W. Trevor King a48397b9eb Remove trailing whitespace
With:

  $ sed -i 's/  *$//' *.md *.go

Signed-off-by: W. Trevor King <wking@tremily.us>
2015-08-26 15:14:19 -07:00
W. Trevor King 3ed95897c3 runtime-config-linux: Drop 'Linux' from headers
The fact that these are Linux-specific entities should be obvious from
the context (this whole file is only about Linux-specific entities).

Signed-off-by: W. Trevor King <wking@tremily.us>
2015-08-26 13:32:27 -07:00
W. Trevor King 2854504cf7 bundle: Move 'Linux sysctl' header to its own line
This fixes a copy/paste issue with 7232e4b1 (specs: introduce the
concept of a runtime.json, 2015-07-30, #88).

Signed-off-by: W. Trevor King <wking@tremily.us>
2015-08-26 13:31:29 -07:00
Mrunal Patel 94c18037fb Merge pull request #88 from philips/runtime-vs-app-config
specs: introduce the concept of a runtime.json
2015-08-26 10:55:22 -07:00
Brandon Philips 7232e4b137 specs: introduce the concept of a runtime.json
Based on our discussion in-person yesterday it seems necessary to
separate the concept of runtime configuration from application
configuration. There are a few motivators:

- To support runtime updates of things like cgroups, rlimits, etc we
  should separate things that are inherently runtime specific from
  things that are static to the application running in the container.

- To support the goal of being able to move a bundle between hosts we
  should make it clear what parts of the spec are and are not portable
  between hosts so that upon landing on a new host the non-portable
  options may be rewritten or removed.

- In order to attach a cryptographic identity to a bundle we must not
  include details in the bundle that are host specific.
2015-08-26 09:44:09 -07:00
Vincent Batts 9ad789fa16 Merge pull request #112 from ChengTiesheng/patch-1
Fix typos in the "Namespace types" section
2015-08-20 20:22:51 -07:00