Age | Commit message (Expand) | Author |
2019-01-18 | Start a sandbox process in a new userns only if CAP_SETUID is set | Andrei Vagin |
2019-01-18 | runsc: create a new proc mount if the sandbox process is running in a new pidns | Andrei Vagin |
2019-01-14 | runsc: set up a minimal chroot from the sandbox process | Andrei Vagin |
2019-01-11 | runsc: Collect zombies of sandbox and gofer processes | Andrei Vagin |
2019-01-09 | Restore to original cgroup after sandbox and gofer processes are created | Fabricio Voznika |
2019-01-03 | Apply chroot for --network=host too | Fabricio Voznika |
2018-12-28 | Simplify synchronization between runsc and sandbox process | Fabricio Voznika |
2018-12-06 | A sandbox process should wait until it has not been moved into cgroups | Andrei Vagin |
2018-11-15 | Allow sandbox.Wait to be called after the sandbox has exited. | Nicolas Lacasse |
2018-11-05 | Fix race between start and destroy | Fabricio Voznika |
2018-11-01 | Make error messages a bit more user friendly. | Ian Lewis |
2018-10-21 | Updated cleanup code to be more explicit about ignoring errors. | Ian Lewis |
2018-10-19 | Use correct company name in copyright header | Ian Gudger |
2018-10-18 | Resolve mount paths while setting up root fs mount | Fabricio Voznika |
2018-10-17 | runsc: Support job control signals for the root container. | Nicolas Lacasse |
2018-10-16 | Bump sandbox start and stop timeouts. | Nicolas Lacasse |
2018-10-15 | Never send boot process stdio to application stdio. | Nicolas Lacasse |
2018-10-11 | Make the gofer process enter namespaces | Fabricio Voznika |
2018-10-11 | Make Wait() return the sandbox exit status if the sandbox has exited. | Nicolas Lacasse |
2018-10-11 | Make debug log file name configurable | Fabricio Voznika |
2018-10-11 | Add bare bones unsupported syscall logging | Fabricio Voznika |
2018-10-10 | runsc: Pass controlling TTY by FD in the *new* process, not current process. | Nicolas Lacasse |
2018-10-10 | Add sandbox to cgroup | Fabricio Voznika |
2018-10-03 | Fix sandbox chroot | Fabricio Voznika |
2018-10-03 | runsc: Pass root container's stdio via FD. | Nicolas Lacasse |
2018-10-01 | runsc: Support job control signals in "exec -it". | Nicolas Lacasse |
2018-09-28 | Make runsc kill and delete more conformant to the "spec" | Fabricio Voznika |
2018-09-28 | Switch to root in userns when CAP_SYS_CHROOT is also missing | Fabricio Voznika |
2018-09-27 | Implement 'runsc kill --all' | Fabricio Voznika |
2018-09-27 | Refactor 'runsc boot' to take container ID as argument | Fabricio Voznika |
2018-09-20 | Set Sandbox.Chroot so it gets cleaned up upon destruction | Fabricio Voznika |
2018-09-19 | runsc: Fix stdin/stdout/stderr in multi-container mode. | Kevin Krakauer |
2018-09-19 | Add container.Destroy urpc method. | Nicolas Lacasse |
2018-09-18 | Handle children processes better in tests | Fabricio Voznika |
2018-09-18 | Automated rollback of changelist 213307171 | Kevin Krakauer |
2018-09-17 | runsc: Enable waiting on exited processes. | Kevin Krakauer |
2018-09-17 | runsc: Fix stdin/out/err in multi-container mode. | Kevin Krakauer |
2018-09-13 | runsc: Support container signal/wait. | Lantao Liu |
2018-09-12 | runsc: Add exec flag that specifies where to save the sandbox-internal pid. | Kevin Krakauer |
2018-09-11 | platform: Pass device fd into platform constructor. | Nicolas Lacasse |
2018-09-07 | runsc: Support multi-container exec. | Nicolas Lacasse |
2018-09-07 | Remove '--file-access=direct' option | Fabricio Voznika |
2018-09-07 | runsc: Run sandbox process inside minimal chroot. | Nicolas Lacasse |
2018-09-04 | runsc: Run sandbox as user nobody. | Nicolas Lacasse |
2018-09-04 | runsc: Pass log and config files to sandbox process by FD. | Nicolas Lacasse |
2018-08-31 | Automated rollback of changelist 210995199 | Fabricio Voznika |
2018-08-30 | runsc: Pass log and config files to sandbox process by FD. | Nicolas Lacasse |
2018-08-27 | Put fsgofer inside chroot | Fabricio Voznika |
2018-08-24 | runsc: Terminal support for "docker exec -ti". | Nicolas Lacasse |
2018-08-24 | Add option to panic gofer if writes are attempted over RO mounts | Fabricio Voznika |