From 420ebcfe01a934e5cf1ffe78dfd19bd79988953d Mon Sep 17 00:00:00 2001
From: "Daniel P. Berrange"
Date: Tue, 10 Sep 2013 10:00:15 +0100
Subject: [PATCH] Update docs about user namespace for LXC
Mention that user namespace can be enabled using the UID/GID
mapping schema.
Fix typo in link anchor for container args in domain XML docs.
Signed-off-by: Daniel P. Berrange
---
docs/drvlxc.html.in | 14 +++++---------
docs/formatdomain.html.in | 2 +-
2 files changed, 6 insertions(+), 10 deletions(-)
diff --git a/docs/drvlxc.html.in b/docs/drvlxc.html.in
index 640968f359..1e6aa1d7f7 100644
--- a/docs/drvlxc.html.in
+++ b/docs/drvlxc.html.in
@@ -40,15 +40,11 @@ primary "host" OS environment, the libvirt LXC driver requires that
certain kernel namespaces are compiled in. Libvirt currently requires
the 'mount', 'ipc', 'pid', and 'uts' namespaces to be available. If
separate network interfaces are desired, then the 'net' namespace is
-required. In the near future, the 'user' namespace will optionally be
-supported.
-
-
-
-NOTE: In the absence of support for the 'user' namespace,
-processes inside containers cannot be securely isolated from host
-process without the use of a mandatory access control technology
-such as SELinux or AppArmor.
+required. If the guest configuration declares a
+UID or GID mapping,
+the 'user' namespace will be enabled to apply these. A suitably
+configured UID/GID mapping is a pre-requisite to making containers
+secure, in the absence of sVirt confinement.
diff --git a/docs/formatdomain.html.in b/docs/formatdomain.html.in
index d656836a33..f5a36d903d 100644
--- a/docs/formatdomain.html.in
+++ b/docs/formatdomain.html.in
@@ -263,7 +263,7 @@
Since 1.0.4
-
+
When booting a domain using container based virtualization, instead