I pleased to announce the a new public release of libvirt-sandbox,
version 0.6.0, is now available for download
ftp://libvirt.org/libvirt/sandbox/
The packages are GPG signed with
Key fingerprint: DAF3 A6FD B26B 6291 2D0E 8E3F BE86 EBB4 1510 4FDF (4096R)
The libvirt-sandbox package provides an API layer on top of libvirt-gobject
which facilitates the cration of application sandboxes using virtualization
technology. An application sandbox is a virtual machine or container that
runs a single application binary, directly from the host OS filesystem.
In other words there is no separate guest operating system install to build
or manager.
At this point in time libvirt-sandbox can create sandboxes using either LXC
or KVM, and should in theory be extendable to any libvirt driver.
This release contains a mixture of new features and bug fixes
- API/ABI in-compatible change, soname increased
- Prevent use of virt-sandbox-service as non-root upfront
- Fix misc memory leaks
- Block SIGHUP from the dhclient binary to prevent
accidental death if the controlling terminal is
closed & reopened
- Add support for re-creating libvirt XML from sandbox
config to facilitate upgrades
- Switch to standard gobject introspection autoconf macros
- Add ability to set filters on network interfaces
- Search /usr/lib instead of /lib for systemd unit
files, as the former is the canonical location even
when / and /usr are merged
- Only set SELinux labels on hosts that support SELinux
- Explicitly link to selinux, instead of relying on
indirect linkage
- Update compiler warning flags
- Fix misc docs comments
- Don't assume use of SELinux in virt-sandbox-service
- Fix path checks for SUSUE in virt-sandbox-service
- Add support for AppArmour profiles
- Mount /var after other FS to ensure host image is
available
- Ensure state/config dirs can be accessed when QEMU
is running non-root for qemu:///system
- Fix mounting of host images in QEMU sandboxes
- Mount images as ext4 instead of ext3
- Allow use of non-raw disk images as filesystem
mounts
- Check if required static libs are available at configure
time to prevent silent fallback to shared linking
- Require libvirt-glib >= 0.2.1
- Add support for loading lzma and gzip compressed kmods
- Check for support libvirt URIs when starting guests
to ensure clear error message upfront
- Add LIBVIRT_SANDBOX_INIT_DEBUG env variable to allow
debugging of kernel boot messages and sandbox init
process setup
- Add support for exposing block devices to sandboxes
with a predictable name under /dev/disk/by-tag/TAGNAME
- Use devtmpfs instead of tmpfs for auto-populating
/dev in QEMU sandboxes
- Allow setup of sandbox with custom root filesystem
instead of inheriting from host's root.
- Allow execution of apps from non-matched ld-linux.so
/ libc.so, eg executing F19 binaries on F22 host
- Use passthrough mode for all QEMU filesystems
Thanks to everyone who contributed to this release
Regards,
Daniel
--
|:
http://berrange.com -o-
http://www.flickr.com/photos/dberrange/ :|
|:
http://libvirt.org -o-
http://virt-manager.org :|
|:
http://autobuild.org -o-
http://search.cpan.org/~danberr/ :|
|:
http://entangle-photo.org -o-
http://live.gnome.org/gtk-vnc :|