<div dir="ltr"><div class="gmail_default" style="font-size:large">This is fascinating. I will try and report if it does work.<br></div><div class="gmail_default" style="font-size:large">Now, suppose the container is a mount that at the same time it is exported an NFS share. Will the computers that are remotely mounting that share, be able to use the socket for querying mysql? That opens a realm of possibilities for my current business. Believe or not my client sells access to mysql databases, in real time. <br><br></div></div><div class="gmail_extra"><br><div class="gmail_quote">On Tue, Nov 11, 2014 at 2:52 PM, Serge Hallyn <span dir="ltr"><<a href="mailto:serge.hallyn@ubuntu.com" target="_blank">serge.hallyn@ubuntu.com</a>></span> wrote:<br><blockquote class="gmail_quote" style="margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex"><span class="">Quoting Michael H. Warfield (mhw@WittsEnd.com):<br>
> On Tue, 2014-11-11 at 20:20 +0100, Hans Feldt wrote:<br>
> > With a dir potentially you get a bunch of other sockets available in the container, how can such<br>
> > security issue be handled?<br>
><br>
> Use tailored application specific directories for the sockets? That's<br>
> no different than using application specific subdirectories for temp<br>
> files. Even if it's just one socket in one directory, creating that<br>
> additional directory provides the isolation from other sockets you<br>
> desire while supporting socket recreation as Serge points out.<br>
<br>
</span>Right, I was thinking like how cgmanager does it.<br>
<span class="HOEnZb"><font color="#888888"><br>
-serge<br>
</font></span><div class="HOEnZb"><div class="h5">_______________________________________________<br>
lxc-users mailing list<br>
<a href="mailto:lxc-users@lists.linuxcontainers.org">lxc-users@lists.linuxcontainers.org</a><br>
<a href="http://lists.linuxcontainers.org/listinfo/lxc-users" target="_blank">http://lists.linuxcontainers.org/listinfo/lxc-users</a></div></div></blockquote></div><br></div>