From 1db8c66f2e500272cb5582f9087b8e2a123aee10 Mon Sep 17 00:00:00 2001 From: Ronny Chevalier Date: Sun, 12 Oct 2014 00:37:23 +0200 Subject: [PATCH] man: use instead of multiple for examples --- man/systemd-activate.xml | 19 +++++----- man/systemd-nspawn.xml | 75 ++++++++++++++++++++-------------------- 2 files changed, 47 insertions(+), 47 deletions(-) diff --git a/man/systemd-activate.xml b/man/systemd-activate.xml index 717f5c0c2..cde4263c3 100644 --- a/man/systemd-activate.xml +++ b/man/systemd-activate.xml @@ -144,20 +144,19 @@ along with systemd; If not, see . - Example 1 + Examples - $ /usr/lib/systemd/systemd-activate -l 2000 -a cat + + Run an echo server on port 2000 - This runs an echo server on port 2000. - - - - Example 2 + $ /usr/lib/systemd/systemd-activate -l 2000 -a cat + - $ /usr/lib/systemd/systemd-activate -l 19531 /usr/lib/systemd/systemd-journal-gatewayd + + Run a socket activated instance of <citerefentry><refentrytitle>systemd-journal-gatewayd</refentrytitle><manvolnum>8</manvolnum></citerefentry> - This runs a socket activated instance of - systemd-journal-gatewayd8. + $ /usr/lib/systemd/systemd-activate -l 19531 /usr/lib/systemd/systemd-journal-gatewayd + diff --git a/man/systemd-nspawn.xml b/man/systemd-nspawn.xml index 820a79bc2..22f2df472 100644 --- a/man/systemd-nspawn.xml +++ b/man/systemd-nspawn.xml @@ -694,69 +694,70 @@ - Example 1 + Examples + + Boot a minimal Fedora distribution in a container - # yum -y --releasever=19 --nogpg --installroot=/srv/mycontainer --disablerepo='*' --enablerepo=fedora install systemd passwd yum fedora-release vim-minimal + # yum -y --releasever=19 --nogpg --installroot=/srv/mycontainer --disablerepo='*' --enablerepo=fedora install systemd passwd yum fedora-release vim-minimal # systemd-nspawn -bD /srv/mycontainer - This installs a minimal Fedora distribution into - the directory /srv/mycontainer/ and - then boots an OS in a namespace container in - it. - + This installs a minimal Fedora distribution into + the directory /srv/mycontainer/ and + then boots an OS in a namespace container in + it. + - - Example 2 + + Spawn a shell in a container of a minimal Debian unstable distribution - # debootstrap --arch=amd64 unstable ~/debian-tree/ + # debootstrap --arch=amd64 unstable ~/debian-tree/ # systemd-nspawn -D ~/debian-tree/ - This installs a minimal Debian unstable - distribution into the directory - ~/debian-tree/ and then spawns a - shell in a namespace container in it. - + This installs a minimal Debian unstable + distribution into the directory + ~/debian-tree/ and then spawns a + shell in a namespace container in it. + - - Example 3 + + Boot a minimal Arch Linux distribution in a container - # pacstrap -c -d ~/arch-tree/ base + # pacstrap -c -d ~/arch-tree/ base # systemd-nspawn -bD ~/arch-tree/ - This installs a mimimal Arch Linux distribution into - the directory ~/arch-tree/ and then - boots an OS in a namespace container in it. - + This installs a mimimal Arch Linux distribution into + the directory ~/arch-tree/ and then + boots an OS in a namespace container in it. + - - Example 4 + + Enable Arch Linux container on boot - # mv ~/arch-tree /var/lib/container/arch + # mv ~/arch-tree /var/lib/container/arch # systemctl enable systemd-nspawn@arch.service # systemctl start systemd-nspawn@arch.service - This makes the Arch Linux container part of the - multi-user.target on the host. - - + This makes the Arch Linux container part of the + multi-user.target on the host. + + - - Example 5 + + Boot into a btrfs snapshot of the host system - # btrfs subvolume snapshot / /.tmp + # btrfs subvolume snapshot / /.tmp # systemd-nspawn --private-network -D /.tmp -b - This runs a copy of the host system in a - btrfs snapshot. + This runs a copy of the host system in a + btrfs snapshot. + - Example 6 + Run a container with SELinux sandbox security contexts # chcon system_u:object_r:svirt_sandbox_file_t:s0:c0,c1 -R /srv/container # systemd-nspawn -L system_u:object_r:svirt_sandbox_file_t:s0:c0,c1 -Z system_u:system_r:svirt_lxc_net_t:s0:c0,c1 -D /srv/container /bin/sh - - This runs a container with SELinux sandbox security contexts. -- 2.30.2