ANNOUNCE: libvirt-sandbox "Dashti Margo" release 0.6.0

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



I pleased to announce the a new public release of libvirt-sandbox,
version 0.6.0, is now available for download

  ftp://libvirt.org/libvirt/sandbox/

The packages are GPG signed with

  Key fingerprint: DAF3 A6FD B26B 6291 2D0E  8E3F BE86 EBB4 1510 4FDF (4096R)

The libvirt-sandbox package provides an API layer on top of libvirt-gobject
which facilitates the cration of application sandboxes using virtualization
technology. An application sandbox is a virtual machine or container that
runs a single application binary, directly from the host OS filesystem.
In other words there is no separate guest operating system install to build
or manager.

At this point in time libvirt-sandbox can create sandboxes using either LXC
or KVM, and should in theory be extendable to any libvirt driver.

This release contains a mixture of new features and bug fixes

 - API/ABI in-compatible change, soname increased
 - Prevent use of virt-sandbox-service as non-root upfront
 - Fix misc memory leaks
 - Block SIGHUP from the dhclient binary to prevent
   accidental death if the controlling terminal is
   closed & reopened
 - Add support for re-creating libvirt XML from sandbox
   config to facilitate upgrades
 - Switch to standard gobject introspection autoconf macros
 - Add ability to set filters on network interfaces
 - Search /usr/lib instead of /lib for systemd unit
   files, as the former is the canonical location even
   when / and /usr are merged
 - Only set SELinux labels on hosts that support SELinux
 - Explicitly link to selinux, instead of relying on
   indirect linkage
 - Update compiler warning flags
 - Fix misc docs comments
 - Don't assume use of SELinux in virt-sandbox-service
 - Fix path checks for SUSUE in virt-sandbox-service
 - Add support for AppArmour profiles
 - Mount /var after other FS to ensure host image is
   available
 - Ensure state/config dirs can be accessed when QEMU
   is running non-root for qemu:///system
 - Fix mounting of host images in QEMU sandboxes
 - Mount images as ext4 instead of ext3
 - Allow use of non-raw disk images as filesystem
   mounts
 - Check if required static libs are available at configure
   time to prevent silent fallback to shared linking
 - Require libvirt-glib >= 0.2.1
 - Add support for loading lzma and gzip compressed kmods
 - Check for support libvirt URIs when starting guests
   to ensure clear error message upfront
 - Add LIBVIRT_SANDBOX_INIT_DEBUG env variable to allow
   debugging of kernel boot messages and sandbox init
   process setup
 - Add support for exposing block devices to sandboxes
   with a predictable name under /dev/disk/by-tag/TAGNAME
 - Use devtmpfs instead of tmpfs for auto-populating
   /dev in QEMU sandboxes
 - Allow setup of sandbox with custom root filesystem
   instead of inheriting from host's root.
 - Allow execution of apps from non-matched ld-linux.so
   / libc.so, eg executing F19 binaries on F22 host
 - Use passthrough mode for all QEMU filesystems

Thanks to everyone who contributed to this release

Regards,
Daniel
-- 
|: http://berrange.com      -o-    http://www.flickr.com/photos/dberrange/ :|
|: http://libvirt.org              -o-             http://virt-manager.org :|
|: http://autobuild.org       -o-         http://search.cpan.org/~danberr/ :|
|: http://entangle-photo.org       -o-       http://live.gnome.org/gtk-vnc :|

--
libvir-list mailing list
libvir-list@xxxxxxxxxx
https://www.redhat.com/mailman/listinfo/libvir-list



[Index of Archives]     [Virt Tools]     [Libvirt Users]     [Lib OS Info]     [Fedora Users]     [Fedora Desktop]     [Fedora SELinux]     [Big List of Linux Books]     [Yosemite News]     [KDE Users]     [Fedora Tools]