[Bug 509647] Re: [MIR] lxc

2013-09-18 Thread Stéphane Graber
** Changed in: lxc (Ubuntu)
   Status: New = Fix Released

-- 
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to lxc in Ubuntu.
https://bugs.launchpad.net/bugs/509647

Title:
  [MIR] lxc

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/lxc/+bug/509647/+subscriptions

-- 
Ubuntu-server-bugs mailing list
Ubuntu-server-bugs@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs


[Bug 509647] Re: [MIR] lxc

2013-08-09 Thread Stéphane Graber
That's because we can't use PIE for the library, now to figure out how
to have it ignored there...

-- 
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to lxc in Ubuntu.
https://bugs.launchpad.net/bugs/509647

Title:
  [MIR] lxc

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/lxc/+bug/509647/+subscriptions

-- 
Ubuntu-server-bugs mailing list
Ubuntu-server-bugs@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs


[Bug 509647] Re: [MIR] lxc

2013-08-09 Thread Stéphane Graber
I can build with:
export DEB_BUILD_MAINT_OPTIONS = 
hardening=+stackprotector,+fortify,+format,+relro,+bindnow

But adding +pie causes a FTBFS:
http://lxc.dev.stgraber.org/stgraber/20130809-1020/ubuntu-saucy-
amd64/lxc_0.9.0.0~stgraber~20130809-1020-0ubuntu1~ppa1~saucy1_amd64-20130809-1021.build

-- 
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to lxc in Ubuntu.
https://bugs.launchpad.net/bugs/509647

Title:
  [MIR] lxc

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/lxc/+bug/509647/+subscriptions

-- 
Ubuntu-server-bugs mailing list
Ubuntu-server-bugs@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs


[Bug 509647] Re: [MIR] lxc

2013-08-09 Thread Stéphane Graber
Ok, so dpkg-buildflags is too much of a pain to get right, so I'll just
go the lazy way and use hardening-wrapper.

Here's the result going this way:
stgraber@castiana:~# hardening-check /usr/bin/lxc-monitor
/usr/bin/lxc-monitor:
 Position Independent Executable: yes
 Stack protected: yes
 Fortify Source functions: yes
 Read-only relocations: yes
 Immediate binding: yes

stgraber@castiana:~# hardening-check /usr/lib/x86_64-linux-gnu/liblxc.so.0
/usr/lib/x86_64-linux-gnu/liblxc.so.0:
 Position Independent Executable: no, regular shared library (ignored)
 Stack protected: yes
 Fortify Source functions: yes (some protected functions found)
 Read-only relocations: yes
 Immediate binding: yes

-- 
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to lxc in Ubuntu.
https://bugs.launchpad.net/bugs/509647

Title:
  [MIR] lxc

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/lxc/+bug/509647/+subscriptions

-- 
Ubuntu-server-bugs mailing list
Ubuntu-server-bugs@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs


[Bug 509647] Re: [MIR] lxc

2013-08-09 Thread Seth Arnold
Stéphane, thanks for fixing this.

Security team ACK for main.

-- 
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to lxc in Ubuntu.
https://bugs.launchpad.net/bugs/509647

Title:
  [MIR] lxc

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/lxc/+bug/509647/+subscriptions

-- 
Ubuntu-server-bugs mailing list
Ubuntu-server-bugs@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs


[Bug 509647] Re: [MIR] lxc

2013-08-06 Thread Seth Arnold
I reviewed lxc 0.9.0-0ubuntu18 as checked into saucy. This is not
a complete security audit but only a quick gauge of code cleanliness.

I previously reviewed lxc (0.9.0~rc1-0ubuntu3), details here:
https://bugs.launchpad.net/ubuntu/+source/lxc/+bug/509647/comments/4

The code quality of the Python bindings has improved drastically.
The lock ordering with lxc_container_free() has been addressed.

Well done on both counts.

Many of the less-important problems I found are still available to
be fixed (an opportunity for someone who is looking to get started in
contributing to Ubuntu, perhaps) but one issue remains that is still a
blocker for main: most binaries are lacking one or more of the security
hardening tools offered by the toolchain.

So: Please enable PIE, stack protection, and immediate binding for all
binaries. This is the final hurdle. :)

Thanks


** Changed in: lxc (Ubuntu)
 Assignee: Seth Arnold (seth-arnold) = (unassigned)

-- 
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to lxc in Ubuntu.
https://bugs.launchpad.net/bugs/509647

Title:
  [MIR] lxc

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/lxc/+bug/509647/+subscriptions

-- 
Ubuntu-server-bugs mailing list
Ubuntu-server-bugs@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs


[Bug 509647] Re: [MIR] lxc

2013-07-15 Thread Jamie Strandboge
Seth, Stephane says the bindings have been updated. Can you take another
look?

** Changed in: lxc (Ubuntu)
 Assignee: MIR approval team (ubuntu-mir) = Seth Arnold (seth-arnold)

-- 
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to lxc in Ubuntu.
https://bugs.launchpad.net/bugs/509647

Title:
  [MIR] lxc

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/lxc/+bug/509647/+subscriptions

-- 
Ubuntu-server-bugs mailing list
Ubuntu-server-bugs@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs


[Bug 509647] Re: [MIR] lxc

2013-05-07 Thread Stéphane Graber
I just pushed the remaining python C extension fixes to saucy now and
will SRU to raring.

Seth, would it be possible for you to recheck the binding as it stands in saucy?
https://github.com/lxc/lxc/blob/staging/src/python-lxc/lxc.c is the current 
version of the file

I think this was the last issue that you noted, so once we get that one
re-checked, I'll start poking people to get LXC promoted in saucy.

-- 
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to lxc in Ubuntu.
https://bugs.launchpad.net/bugs/509647

Title:
  [MIR] lxc

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/lxc/+bug/509647/+subscriptions

-- 
Ubuntu-server-bugs mailing list
Ubuntu-server-bugs@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs


Re: [Bug 509647] Re: [MIR] lxc

2013-04-11 Thread Serge Hallyn
Quoting Seth Arnold (509...@bugs.launchpad.net):
 Urgh. sorry for losing track of this bug. I forgot to subscribe after
 submitting my comment.
 
 I believe your proposed additional check would be sufficient. I _think_
 better might be to destroy the lock pointer in the shared structure when
 freeing the object but before unlocking -- preventing other threads from
 acquiring the lock once the free path has started.

Just to help myself think through this,

freer  |   racing get()er
lxc_container_put()
\ lxclock(c-privlock)lxc_container_get()
\ c-numthreads = 0   \ lxclock(c-privlock) - waits
\ lxcunlock   \ 
\ lxc_container_free  \ lxclock() returns
  \ c-numthreads  1 - return
\ \ (free stuff)
\ \ sem_destroy(privlock)

So lxclock() needs to check that sem is not NULL as you said before;
Setting c-privlock = NULL before calling sem_destroy on (a copy of :)
it will help another race - I think that is what you are suggesting
here.

I'm trying to figure out if there is still a possible race with that,
where the get()er dereferences c-privlock, then put()er sets
c-privlock = NULL and sem_destroy()s it, then get()er calls
sem_wait(), resulting in 'undefined behavior' per the man page.

-- 
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to lxc in Ubuntu.
https://bugs.launchpad.net/bugs/509647

Title:
  [MIR] lxc

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/lxc/+bug/509647/+subscriptions

-- 
Ubuntu-server-bugs mailing list
Ubuntu-server-bugs@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs


Re: [Bug 509647] Re: [MIR] lxc

2013-04-11 Thread Serge Hallyn
Oh but I'm being silly - once the use count goes to 0 it
cannot go back up, so we can check for that before trying
to take the lock.

-- 
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to lxc in Ubuntu.
https://bugs.launchpad.net/bugs/509647

Title:
  [MIR] lxc

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/lxc/+bug/509647/+subscriptions

-- 
Ubuntu-server-bugs mailing list
Ubuntu-server-bugs@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs


[Bug 509647] Re: [MIR] lxc

2013-04-10 Thread Stéphane Graber
Hi Seth,

I just wanted to comment on the python side of things.

I'm the author of the binding and sadly it's now used by some of the
very well used bits of LXC (lxc-ls and lxc-start-ephemeral to list the
most populars), so I don't think building without this is really an
option for us.

However I'm very very interested in having those issues resolved. To be
clear, this binding is probably the first bit of C code that I actually
wrote from scratch and released and so I certainly expected the memory
management to be mostly crap. We've fixed a bunch of issues already but
your comments are really useful to fix the rest of those.

I'll try to set aside some time tomorrow to poke at those and will
provide a patch here for Serge and you (if you're interested) to review.

The trick with those bindings and the way LXC work is that it's almost
impossible to run those through valgrind to detect leaks so we almost
entirely depend on the eyes of our reviewers and even though we're
pretty strict on code reviews nowadays, there's only so much you can
find on thousands of line long diffs ;)

-- 
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to lxc in Ubuntu.
https://bugs.launchpad.net/bugs/509647

Title:
  [MIR] lxc

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/lxc/+bug/509647/+subscriptions

-- 
Ubuntu-server-bugs mailing list
Ubuntu-server-bugs@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs


[Bug 509647] Re: [MIR] lxc

2013-04-09 Thread Seth Arnold
Urgh. sorry for losing track of this bug. I forgot to subscribe after
submitting my comment.

I believe your proposed additional check would be sufficient. I _think_
better might be to destroy the lock pointer in the shared structure when
freeing the object but before unlocking -- preventing other threads from
acquiring the lock once the free path has started.

-- 
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to lxc in Ubuntu.
https://bugs.launchpad.net/bugs/509647

Title:
  [MIR] lxc

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/lxc/+bug/509647/+subscriptions

-- 
Ubuntu-server-bugs mailing list
Ubuntu-server-bugs@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs


[Bug 509647] Re: [MIR] lxc

2013-04-05 Thread Seth Arnold
I audited lxc version 0.9.0~rc1-0ubuntu3 as checked into Raring.

This should not be considered a complete security audit, but rather
a quick gauge of maintainability.

- lxc provides userspace convenience wrappers around the Linux kernel's
  containers implementation to make using containers convenient
- There's no cryptography
- No traditional networking, though extensive control of network
  interfaces, bridges, and routing
- Some Unix domain sockets and Netlink domain sockets
- Uses libapparmor, libcap, libc, liblxc, libpthread, libseccomp, libutil
- Can start containers and dnsmasq at boot
- dnsmasq runs as specific lxc-dnsmasq user
- Carefully daemonizes, with nice mechanism to report errors to
  grandparent for good human-based interaction
- postrm does not remove user created during postinst
- No DBus services
- No setuid
- No sudo fragments
- No cron jobs
- Many failed to load external entity errors in build logs, probably
  just an incorrect docbook option
- No PIE, no immediate binding
- Variable stack protection (likely false negatives, small binary)
- Variable Foritify (likely false negatives, small binary)
- Consistent read-only bindings

Code quality varied; the Python bindings seem least mature, though the
average quality was otherwise good.


Python bindings:

- convert_tuple_to_char_pointer_array() appears to write to unallocated memory
- convert_tuple_to_char_pointer_array() error-case memory leak
- Container_get_cgroup_item() error-case memory leak
- Container_get_config_item() error-case memory leak
- Container_get_keys() error-case memory leak

convert_tuple_to_char_pointer_array() is serious, if I've properly
understood the function. This must be reviewed by someone else (or
valgrind) before the Python bindings can reasonably be promoted to main.
The presence of this problem in the Python bindings makes me wonder if
they can be split apart and left in universe for the time being.


Everything else:

- Calling lxc_container_free() _after_ releasing the privlock feels wrong
   - lxc_container_get() may follow stale pointers while locking
   - lxc_container_put() could be freeing an object that was acquired

Probably lxc_container_free() should be called with the privlock still
held, and the lock destroyed after the object no longer exists. If
any existing multiprocess or multithreaded code relies upon shared
lxc_container objects, this must be addressed before being promoted
to main. If no current code relies upon shared lxc_container objects,
this can be handled as a simple bug report.

- run_script() shouldn't build string for popen(3) from argv array; this
  should do the difficult pipe2(2) and dup2(2) itself and use execve(2), 
  execv(3), or execl(3) directly
- run_script() shouldn't check length against INT_MAX, the argument size
  limit should be roughly two megabytes (see xargs --show-limits for
  size..) -- ideally, this would be removed entirely when replaced with
  an execve(2) version

I didn't follow the callers all the way to the configuration variables
that were used in building these strings; if they can only be set by root,
then this can be handled as a simple bug. If they can be set by a user
account or from within a container, this should be fixed before promoting
to main.

- lxc_newlock() does not use O_EXCL
- lxc_container_free() closes but doesn't unlink named semaphores 

These two function appear designed to work together this way intentionally.
But it would be nice to check ownership of the semaphore after creation,
to ensure an untrusted user account didn't create the semaphore.

- lxclock_name() does not restrict length of semaphore name
- run_buffer() could use stack-allocated rather than malloc(3)
- config_network_ipv4() several error-case memory leaks
- config_network_ipv4_gateway() several error-case memory leaks
- config_network_ipv6() several error-case memory leaks
- config_network_ipv6_gateway() several error-case memory leaks
- Several config_*() functions use atoi(3), which cannot report errors
- config_mount() error-case memory leak
- caps.c appears to have three different ways of finding valid caps,
  it feels like this code hasn't been cleaned up in a while
- ifa_get_local_ip() has an unchecked malloc(3)


Just assorted minor annoyances. Please address in whatever manner seems
appropriate, in whatever time frame is convenient.


I believe the increased exposure to lxc due to 13.04 main inclusion would
help polish lxc enough that a full five-year support promise in 14.04 LTS
would be viable. So, despite the issues raised here, lxc gets a
provisional ACK, conditional upon:

- Either a review of Convert_tuple_to_char_pointer_array() to prove
  correctness _or_ provide a solution that does not write to unallocated
  memory
- Either a review that no currently shipping code relies upon the
  concurrent use of lxc_container objects _or_ a review to prove
  correctness of the locking code _or_ a solution for the locking code.
- Either a review that no 

Re: [Bug 509647] Re: [MIR] lxc

2013-04-05 Thread Serge Hallyn
Hi Seth, thanks very much for the review.

 Everything else:
 
 - Calling lxc_container_free() _after_ releasing the privlock feels wrong
- lxc_container_get() may follow stale pointers while locking
- lxc_container_put() could be freeing an object that was acquired

I think this was an unintented bug.  Note that

1. lxc_container_free() sets c-privlock to NULL
2. lxcunlock() returns an error -2 if c-privlock is NULL
3. lxclock() doesn't do so - I probably accidentally dropped
   or forgot to add in that check.

since lxc_container_get() and _put() both return false if lxclock
fails, I adding the needed check in lxclock()  this should suffice.

Does that sound ok to you for this item?

If you're up for it, I also wouldn't mind chatting sometime about
the goals and design of the locking.  (The comment at top of
lxccontainer.c pretty accurately sums up my goals.  It doesn't
mention that running containers are already mutexed by the
monitor UNIX socket in $lxc_path.)

-serge

-- 
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to lxc in Ubuntu.
https://bugs.launchpad.net/bugs/509647

Title:
  [MIR] lxc

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/lxc/+bug/509647/+subscriptions

-- 
Ubuntu-server-bugs mailing list
Ubuntu-server-bugs@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs


[Bug 509647] Re: [MIR] lxc

2013-03-14 Thread Jamie Strandboge
** Changed in: lxc (Ubuntu)
 Assignee: Jamie Strandboge (jdstrand) = Seth Arnold (seth-arnold)

-- 
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to lxc in Ubuntu.
https://bugs.launchpad.net/bugs/509647

Title:
  [MIR] lxc

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/lxc/+bug/509647/+subscriptions

-- 
Ubuntu-server-bugs mailing list
Ubuntu-server-bugs@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs


[Bug 509647] Re: [MIR] lxc

2013-01-23 Thread Stéphane Graber
Just a quick update here that I updated libseccomp in Ubuntu to address the few 
issues raised in its MIR (bug 1082431).
I think that was the only blocking bits for lxc's MIR, so it'd be nice if an 
MIR team member could now review LXC.

-- 
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to lxc in Ubuntu.
https://bugs.launchpad.net/bugs/509647

Title:
  [MIR] lxc

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/lxc/+bug/509647/+subscriptions

-- 
Ubuntu-server-bugs mailing list
Ubuntu-server-bugs@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs


[Bug 509647] Re: [MIR] lxc

2012-12-14 Thread Yolanda Robla
** Changed in: lxc (Ubuntu)
   Status: New = Confirmed

** Changed in: lxc (Ubuntu)
   Status: Confirmed = Triaged

** Changed in: lxc (Ubuntu)
   Importance: Undecided = Wishlist

-- 
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to lxc in Ubuntu.
https://bugs.launchpad.net/bugs/509647

Title:
  [MIR] lxc

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/lxc/+bug/509647/+subscriptions

-- 
Ubuntu-server-bugs mailing list
Ubuntu-server-bugs@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs


[Bug 509647] Re: [MIR] lxc

2012-12-14 Thread Dave Walker
** Changed in: lxc (Ubuntu)
   Status: Triaged = New

-- 
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to lxc in Ubuntu.
https://bugs.launchpad.net/bugs/509647

Title:
  [MIR] lxc

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/lxc/+bug/509647/+subscriptions

-- 
Ubuntu-server-bugs mailing list
Ubuntu-server-bugs@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs


[Bug 509647] Re: [MIR] lxc

2012-12-04 Thread Stéphane Graber
** Changed in: lxc (Ubuntu)
 Assignee: (unassigned) = Jamie Strandboge (jdstrand)

-- 
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to lxc in Ubuntu.
https://bugs.launchpad.net/bugs/509647

Title:
  [MIR] lxc

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/lxc/+bug/509647/+subscriptions

-- 
Ubuntu-server-bugs mailing list
Ubuntu-server-bugs@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs


[Bug 509647] Re: [MIR] lxc

2012-11-23 Thread Stéphane Graber
** Changed in: lxc (Ubuntu)
   Status: Won't Fix = New

-- 
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to lxc in Ubuntu.
https://bugs.launchpad.net/bugs/509647

Title:
  [MIR] lxc

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/lxc/+bug/509647/+subscriptions

-- 
Ubuntu-server-bugs mailing list
Ubuntu-server-bugs@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs


[Bug 509647] Re: [MIR] lxc

2012-11-23 Thread Stéphane Graber
** Description changed:

  Binary package hint: lxc
  
- Hello,
+ The LXC team would like the MIR team to reconsider promotion of LXC to
+ main.
  
- I'd like lxc (userspace tools for the Linux Containers) to be moved to
- main as was discussed in the specification and the session at the last
- UDS: https://blueprints.launchpad.net/ubuntu/+spec/server-lucid-
- contextualization
+ The reason is that since the last request back in Lucid, the kernel has had a 
lot of time to stabilize and improve for the various calls used by lxc.
+ We also added apparmor confinement by default a few cycles ago.
  
- The package is currently in universe, was recently updated (0.6.3 to
- 0.6.4), Debian relationship is good and the Debian maintainer is active.
- Upstream is also very responsive (received answers to some question, a
- few hours after I sent them), the project itself is mainly developed by
- IBM France.
+ LXC is used by quite a lot of people and is the default backend for JuJu
+ charms development.
  
- The reason for inclusion is that LXC is supported in the current Lucid
- kernel, is considered a good alternative to the OpenVZ patch we used to
- have in the previous LTS and Lucid's libvirt will support it. The lxc
- tools aren't required if one wants to use libvirt, though it was
- considered useful to have them in main nevertheless as some users don't
- necessarily want to use libvirt to manage their containers.
+ Serge Hallyn and myself are active upstream contributors and maintainers of 
the staging branch, so issues tend to be resolved very quickly.
+ We've also been maintaining LXC in precise and quantal very actively, by 
SRUing every fix that lands in the development release and offering backports 
for more complex features.
  
- There's currently no real bugs (outside wishlist) open on Launchpad,
- Debian has two bug reports open that seem to be packaging related. There
- is no known security issues (checked for CVE and secunia).
+ The staging LXC git tree is automatically imported on Launchpad and
+ daily builds for precise, quantal and raring are triggered
+ automatically.
  
- Binary package only depends on the libc6, build-deps are cdbs,
- debhelper (= 7), autotools-dev, libcap-dev, linux-libc-dev, so nothing
- fancy or outside main here.
+ Upstream itself only contains a limited set of test, mostly around the
+ newly introduced liblxc API, however, Serge maintains a separate
+ integration testing branch which we run before upload and will be
+ integrated into autopkgtest and into the upstream dailies once we have
+ some time to do so.
  
- I went through https://wiki.ubuntu.com/UbuntuMainInclusionRequirements
- and everything seems to be ok with that package being moved to Main.
+ For build-depends: The only build-deps not currently in main is
+ libseccomp for which I'll be filing a separate MIR. LXC itself doesn't
+ strictly require this library but the feature is rather nice to have, so
+ I think we should get it promoted too.
  
- Please feel free to ask for any additional information you may need.
+ I believe all the dependencies are already in main (outside of
+ libseccomp and lxc itself).
+ 
+ LXC doesn't ship any daemon or setuid binary by default, some people
+ choose to mark some of the binaries as setuid or grant extra
+ capabilities, but we don't recommend doing so and don't do it by
+ default.
+ 
+ The LXC package provides two upstart jobs, one to automatically start
+ containers at boot time (if marked as auto-started) and another to setup
+ a lxcbr0 bridge with a dnsmasq DHCP server running on it, similar to
+ libvirt's virbr0.

-- 
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to lxc in Ubuntu.
https://bugs.launchpad.net/bugs/509647

Title:
  [MIR] lxc

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/lxc/+bug/509647/+subscriptions

-- 
Ubuntu-server-bugs mailing list
Ubuntu-server-bugs@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs


[Bug 509647] Re: [MIR] lxc

2012-11-23 Thread Stéphane Graber
** Description changed:

  Binary package hint: lxc
  
  The LXC team would like the MIR team to reconsider promotion of LXC to
  main.
  
  The reason is that since the last request back in Lucid, the kernel has had a 
lot of time to stabilize and improve for the various calls used by lxc.
  We also added apparmor confinement by default a few cycles ago.
  
  LXC is used by quite a lot of people and is the default backend for JuJu
  charms development.
  
  Serge Hallyn and myself are active upstream contributors and maintainers of 
the staging branch, so issues tend to be resolved very quickly.
  We've also been maintaining LXC in precise and quantal very actively, by 
SRUing every fix that lands in the development release and offering backports 
for more complex features.
  
  The staging LXC git tree is automatically imported on Launchpad and
  daily builds for precise, quantal and raring are triggered
  automatically.
  
  Upstream itself only contains a limited set of test, mostly around the
  newly introduced liblxc API, however, Serge maintains a separate
  integration testing branch which we run before upload and will be
  integrated into autopkgtest and into the upstream dailies once we have
  some time to do so.
  
  For build-depends: The only build-deps not currently in main is
- libseccomp for which I'll be filing a separate MIR. LXC itself doesn't
- strictly require this library but the feature is rather nice to have, so
- I think we should get it promoted too.
+ libseccomp for which I'll be filing a separate MIR (bug 1082431) . LXC
+ itself doesn't strictly require this library but the feature is rather
+ nice to have, so I think we should get it promoted too.
  
  I believe all the dependencies are already in main (outside of
  libseccomp and lxc itself).
  
  LXC doesn't ship any daemon or setuid binary by default, some people
  choose to mark some of the binaries as setuid or grant extra
  capabilities, but we don't recommend doing so and don't do it by
  default.
  
  The LXC package provides two upstart jobs, one to automatically start
  containers at boot time (if marked as auto-started) and another to setup
  a lxcbr0 bridge with a dnsmasq DHCP server running on it, similar to
  libvirt's virbr0.
+ 
+ Our package isn't usually in sync or even merged with Debian because of 
disagreements with the Debian maintainer. Our package tends to be much closer 
to upstream and the upstream staging branch.
+ We currently carry a lot of patches in our package, but all of them are 
direct cherry-picks from the staging branch. As a result, as soon as upstream 
tags 0.9~alpha1, we are expecting to be down to just 4-5 patches remaining.

-- 
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to lxc in Ubuntu.
https://bugs.launchpad.net/bugs/509647

Title:
  [MIR] lxc

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/lxc/+bug/509647/+subscriptions

-- 
Ubuntu-server-bugs mailing list
Ubuntu-server-bugs@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs