{"payload":{"feedbackUrl":"https://github.com/orgs/community/discussions/53140","repo":{"id":613589350,"defaultBranch":"master","name":"go","ownerLogin":"cpuguy83","currentUserCanPush":false,"isFork":true,"isEmpty":false,"createdAt":"2023-03-13T21:45:21.000Z","ownerAvatar":"https://avatars.githubusercontent.com/u/799078?v=4","public":true,"private":false,"isOrgOwned":false},"refInfo":{"name":"","listCacheKey":"v0:1678754598.1312158","currentOid":""},"activityList":{"items":[{"before":"2d1cf7d37400b97f5bf898f69a96d85f80c766b1","after":"7fa12e8417cfdc19aa5c93b5320b1c926a56c4a1","ref":"refs/heads/setns_after_fork","pushedAt":"2024-01-12T01:26:50.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"cpuguy83","name":"Brian Goff","path":"/cpuguy83","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/799078?s=80&v=4"},"commit":{"message":"syscall: add support for setns after fork\n\nThis adds a Namespaces field to Linux's SysProcAttr type.\nWhen set, these namespaces will be entered after fork and before exec.\n\nThis allows users to exec a new process in a pre-defined set of\nnamespaces without having to resort to hacks or re-execs to bootstrap\nthese namespaces.\n\nCloses #56680","shortMessageHtmlLink":"syscall: add support for setns after fork"}},{"before":"ef86e49ab5411f5edb1f2a5a6dab3efcb44aada2","after":"2d1cf7d37400b97f5bf898f69a96d85f80c766b1","ref":"refs/heads/setns_after_fork","pushedAt":"2024-01-06T00:46:14.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"cpuguy83","name":"Brian Goff","path":"/cpuguy83","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/799078?s=80&v=4"},"commit":{"message":"syscall: add support for setns after fork\n\nThis adds a Namespaces field to Linux's SysProcAttr type.\nWhen set, these namespaces will be entered after fork and before exec.\nThe format for this is [ns name]=[path], e.g. mnt=/some/path.\n\nThis allows users to exec a new process in a pre-defined set of\nnamespaces without having to resort to hacks or re-execs to bootstrap\nthese namespaces.\n\nCloses #56680","shortMessageHtmlLink":"syscall: add support for setns after fork"}},{"before":"62b9b8d2d53ed74f81ac7d3406e68adb119321af","after":"ef86e49ab5411f5edb1f2a5a6dab3efcb44aada2","ref":"refs/heads/setns_after_fork","pushedAt":"2024-01-06T00:44:05.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"cpuguy83","name":"Brian Goff","path":"/cpuguy83","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/799078?s=80&v=4"},"commit":{"message":"syscall: add support for setns after fork\n\nThis adds a Namespaces field to Linux's SysProcAttr type.\nWhen set, these namespaces will be entered after fork and before exec.\nThe format for this is [ns name]=[path], e.g. mnt=/some/path.\n\nThis allows users to exec a new process in a pre-defined set of\nnamespaces without having to resort to hacks or re-execs to bootstrap\nthese namespaces.\n\nCloses #56680","shortMessageHtmlLink":"syscall: add support for setns after fork"}},{"before":"d2adb915adf2bc1f3224a08b3c5e3ef1ce78ebd3","after":"62b9b8d2d53ed74f81ac7d3406e68adb119321af","ref":"refs/heads/setns_after_fork","pushedAt":"2023-10-29T18:55:46.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"cpuguy83","name":"Brian Goff","path":"/cpuguy83","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/799078?s=80&v=4"},"commit":{"message":"syscall: add support for setns after fork\n\nThis adds a Namespaces field to Linux's SysProcAttr type.\nWhen set, these namespaces will be entered after fork and before exec.\nThe format for this is [ns name]=[path], e.g. mnt=/some/path.\n\nThis allows users to exec a new process in a pre-defined set of\nnamespaces without having to resort to hacks or re-execs to bootstrap\nthese namespaces.\n\nCloses #56680","shortMessageHtmlLink":"syscall: add support for setns after fork"}},{"before":"6a657e2a3791e6cea9c7633a01fa2ea721a48a9c","after":"d2adb915adf2bc1f3224a08b3c5e3ef1ce78ebd3","ref":"refs/heads/setns_after_fork","pushedAt":"2023-03-14T00:53:04.578Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"cpuguy83","name":"Brian Goff","path":"/cpuguy83","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/799078?s=80&v=4"},"commit":{"message":"syscall: add support for setns after fork\n\nThis adds a `Namespaces` field to Linux's `SysProcAttr` type.\nWhen set, these namespaces will be entered after fork and before exec.\nThe format for this is `=`, e.g. `mnt=/some/path`.\n\nThis allows users to exec a new process in a pre-defined set of\nnamespaces without having to resort to hacks or re-execs to bootstrap\nthese namespaces.","shortMessageHtmlLink":"syscall: add support for setns after fork"}},{"before":"16af696cc76fe597cd1f5e9ca7d094b39da6cb19","after":"6a657e2a3791e6cea9c7633a01fa2ea721a48a9c","ref":"refs/heads/setns_after_fork","pushedAt":"2023-03-14T00:45:31.877Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"cpuguy83","name":"Brian Goff","path":"/cpuguy83","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/799078?s=80&v=4"},"commit":{"message":"syscall: add support for setns after fork\n\nThis adds a `Namespaces` field to Linux's `SysProcAttr` type.\nWhen set, these namespaces will be entered after fork and before exec.\nThe format for this is `=`, e.g. `mnt=/some/path`.\n\nThis allows users to exec a new process in a pre-defined set of\nnamespaces without having to resort to hacks or re-execs to bootstrap\nthese namespaces.","shortMessageHtmlLink":"syscall: add support for setns after fork"}},{"before":"247741cc2ae7b0b5e519c7de6b331119f644fca9","after":"16af696cc76fe597cd1f5e9ca7d094b39da6cb19","ref":"refs/heads/setns_after_fork","pushedAt":"2023-03-14T00:44:22.330Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"cpuguy83","name":"Brian Goff","path":"/cpuguy83","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/799078?s=80&v=4"},"commit":{"message":"syscall: add support for setns after fork\n\nThis adds a `Namespaces` field to Linux's `SysProcAttr` type.\nWhen set, these namespaces will be entered after fork and before exec.\nThe format for this is `=`, e.g. `mnt=/some/path`.\n\nThis allows users to exec a new process in a pre-defined set of\nnamespaces without having to resort to hacks or re-execs to bootstrap\nthese namespaces.\n\nSigned-off-by: Brian Goff ","shortMessageHtmlLink":"syscall: add support for setns after fork"}},{"before":null,"after":"247741cc2ae7b0b5e519c7de6b331119f644fca9","ref":"refs/heads/setns_after_fork","pushedAt":"2023-03-14T00:43:18.131Z","pushType":"branch_creation","commitsCount":0,"pusher":{"login":"cpuguy83","name":"Brian Goff","path":"/cpuguy83","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/799078?s=80&v=4"},"commit":{"message":"Support setns after fork on linux\n\nThis adds a `Namespaces` field to Linux's `SysProcAttr` type.\nWhen set, these namespaces will be entered after fork and before exec.\nThe format for this is `=`, e.g. `mnt=/some/path`.\n\nThis allows users to exec a new process in a pre-defined set of\nnamespaces without having to resort to hacks or re-execs to bootstrap\nthese namespaces.\n\nSigned-off-by: Brian Goff ","shortMessageHtmlLink":"Support setns after fork on linux"}}],"hasNextPage":false,"hasPreviousPage":false,"activityType":"all","actor":null,"timePeriod":"all","sort":"DESC","perPage":30,"cursor":"djE6ks8AAAAD3cow_AA","startCursor":null,"endCursor":null}},"title":"Activity ยท cpuguy83/go"}