On Thu, 09.10.14 23:53, James Lott (ja...@lottspot.com) wrote:

> I am using a setup which retains the CAP_NET_ADMIN capability inside the 
> container and allows openvpn to setup the device. No persistent devices are 
> involved. Below, I have included a snippet from a shell session which shows 
> the command used to invoke nspawn and then the openvpn command executed 
> within 
> the container which fails. 

The "devices" cgroup controller is used by nspawn to ensure code
running inside the container cannot freely create arbitrary device
nodes and then open them. What was missing here is to actually update
the policy for it to allow access to /dev/net/tun. I made that change
now, please check with the git version for nspawn if everything works
now.

Lennart

-- 
Lennart Poettering, Red Hat
_______________________________________________
systemd-devel mailing list
systemd-devel@lists.freedesktop.org
http://lists.freedesktop.org/mailman/listinfo/systemd-devel

Reply via email to