#!/bin/bash -e # Copyright (c) 2012 The Chromium Authors. All rights reserved. # Use of this source code is governed by a BSD-style license that can be # found in the LICENSE file. # This script installs Debian-derived distributions in a chroot environment. # It can for example be used to have an accurate 32bit build and test # environment when otherwise working on a 64bit machine. # N. B. it is unlikely that this script will ever work on anything other than a # Debian-derived system. # Older Debian based systems had both "admin" and "adm" groups, with "admin" # apparently being used in more places. Newer distributions have standardized # on just the "adm" group. Check /etc/group for the prefered name of the # administrator group. admin=$(grep '^admin:' /etc/group >&/dev/null && echo admin || echo adm) usage() { echo "usage: ${0##*/} [-m mirror] [-g group,...] [-s] [-c]" echo "-b dir additional directories that should be bind mounted," echo ' or "NONE".' echo " Default: if local filesystems present, ask user for help" echo "-g group,... groups that can use the chroot unauthenticated" echo " Default: '${admin}' and current user's group ('$(id -gn)')" echo "-l List all installed chroot environments" echo "-m mirror an alternate repository mirror for package downloads" echo "-s configure default deb-srcs" echo "-c always copy 64bit helper binaries to 32bit chroot" echo "-h this help message" } process_opts() { local OPTNAME OPTIND OPTERR OPTARG while getopts ":b:g:lm:sch" OPTNAME; do case "$OPTNAME" in b) if [ "${OPTARG}" = "NONE" -a -z "${bind_mounts}" ]; then bind_mounts="${OPTARG}" else if [ "${bind_mounts}" = "NONE" -o "${OPTARG}" = "${OPTARG#/}" -o \ ! -d "${OPTARG}" ]; then echo "Invalid -b option(s)" usage exit 1 fi bind_mounts="${bind_mounts} ${OPTARG} ${OPTARG} none rw,bind 0 0" fi ;; g) [ -n "${OPTARG}" ] && chroot_groups="${chroot_groups}${chroot_groups:+,}${OPTARG}" ;; l) list_all_chroots exit ;; m) if [ -n "${mirror}" ]; then echo "You can only specify exactly one mirror location" usage exit 1 fi mirror="$OPTARG" ;; s) add_srcs="y" ;; c) copy_64="y" ;; h) usage exit 0 ;; \:) echo "'-$OPTARG' needs an argument." usage exit 1 ;; *) echo "invalid command-line option: $OPTARG" usage exit 1 ;; esac done if [ $# -ge ${OPTIND} ]; then eval echo "Unexpected command line argument: \${${OPTIND}}" usage exit 1 fi } list_all_chroots() { for i in /var/lib/chroot/*; do i="${i##*/}" [ "${i}" = "*" ] && continue [ -x "/usr/local/bin/${i%bit}" ] || continue grep -qs "^\[${i%bit}\]\$" /etc/schroot/schroot.conf || continue [ -r "/etc/schroot/script-${i}" -a \ -r "/etc/schroot/mount-${i}" ] || continue echo "${i%bit}" done } getkey() { ( trap 'stty echo -iuclc icanon 2>/dev/null' EXIT INT TERM QUIT HUP stty -echo iuclc -icanon 2>/dev/null dd count=1 bs=1 2>/dev/null ) } chr() { printf "\\$(printf '%03o' "$1")" } ord() { printf '%d' $(printf '%c' "$1" | od -tu1 -An) } is_network_drive() { stat -c %T -f "$1/" 2>/dev/null | egrep -qs '^nfs|cifs|smbfs' } # Check that we are running as a regular user [ "$(id -nu)" = root ] && { echo "Run this script as a regular user and provide your \"sudo\"" \ "password if requested" >&2 exit 1 } process_opts "$@" echo "This script will help you through the process of installing a" echo "Debian or Ubuntu distribution in a chroot environment. You will" echo "have to provide your \"sudo\" password when requested." echo # Error handler trap 'exit 1' INT TERM QUIT HUP trap 'sudo apt-get clean; tput bel; echo; echo Failed' EXIT # Install any missing applications that this script relies on. If these packages # are already installed, don't force another "apt-get install". That would # prevent them from being auto-removed, if they ever become eligible for that. # And as this script only needs the packages once, there is no good reason to # introduce a hard dependency on things such as dchroot and debootstrap. dep= for i in dchroot debootstrap libwww-perl; do [ -d /usr/share/doc/"$i" ] || dep="$dep $i" done [ -n "$dep" ] && sudo apt-get -y install $dep sudo apt-get -y install schroot # Create directory for chroot sudo mkdir -p /var/lib/chroot # Find chroot environments that can be installed with debootstrap targets="$(cd /usr/share/debootstrap/scripts ls | grep '^[a-z]*$')" # Ask user to pick one of the available targets echo "The following targets are available to be installed in a chroot:" j=1; for i in $targets; do printf '%4d: %s\n' "$j" "$i" j=$(($j+1)) done while :; do printf "Which target would you like to install: " read n [ "$n" -gt 0 -a "$n" -lt "$j" ] >&/dev/null && break done j=1; for i in $targets; do [ "$j" -eq "$n" ] && { distname="$i"; break; } j=$(($j+1)) done echo # On x86-64, ask whether the user wants to install x86-32 or x86-64 archflag= arch= if [ "$(uname -m)" = x86_64 ]; then while :; do echo "You are running a 64bit kernel. This allows you to install either a" printf "32bit or a 64bit chroot environment. %s" \ "Which one do you want (32, 64) " read arch [ "${arch}" == 32 -o "${arch}" == 64 ] && break done [ "${arch}" == 32 ] && archflag="--arch i386" || archflag="--arch amd64" arch="${arch}bit" echo fi target="${distname}${arch}" # Don't accidentally overwrite an existing installation [ -d /var/lib/chroot/"${target}" ] && { while :; do echo "This chroot already exists on your machine." if schroot -l --all-sessions 2>&1 | sed 's/^session://' | grep -qs "^${target%bit}-"; then echo "And it appears to be in active use. Terminate all programs that" echo "are currently using the chroot environment and then re-run this" echo "script." echo "If you still get an error message, you might have stale mounts" echo "that you forgot to delete. You can always clean up mounts by" echo "executing \"${target%bit} -c\"." exit 1 fi echo "I can abort installation, I can overwrite the existing chroot," echo "or I can delete the old one and then exit. What would you like to" printf "do (a/o/d)? " read choice case "${choice}" in a|A) exit 1;; o|O) sudo rm -rf "/var/lib/chroot/${target}"; break;; d|D) sudo rm -rf "/var/lib/chroot/${target}" \ "/usr/local/bin/${target%bit}" \ "/etc/schroot/mount-${target}" \ "/etc/schroot/script-${target}" sudo sed -ni '/^[[]'"${target%bit}"']$/,${ :1;n;/^[[]/b2;b1;:2;p;n;b2};p' \ "/etc/schroot/schroot.conf" trap '' INT TERM QUIT HUP trap '' EXIT echo "Deleted!" exit 0;; esac done echo } sudo mkdir -p /var/lib/chroot/"${target}" # Offer to include additional standard repositories for Ubuntu-based chroots. alt_repos= grep -qs ubuntu.com /usr/share/debootstrap/scripts/"${distname}" && { while :; do echo "Would you like to add ${distname}-updates and ${distname}-security " printf "to the chroot's sources.list (y/n)? " read alt_repos case "${alt_repos}" in y|Y) alt_repos="y" break ;; n|N) break ;; esac done echo } # Check for non-standard file system mount points and ask the user whether # they should be imported into the chroot environment # We limit to the first 26 mount points that much some basic heuristics, # because a) that allows us to enumerate choices with a single character, # and b) if we find more than 26 mount points, then these are probably # false-positives and something is very unusual about the system's # configuration. No need to spam the user with even more information that # is likely completely irrelevant. if [ -z "${bind_mounts}" ]; then mounts="$(awk '$2 != "/" && $2 !~ "^/boot" && $2 !~ "^/home" && $2 !~ "^/media" && $2 !~ "^/run" && ($3 ~ "ext[2-4]" || $3 == "reiserfs" || $3 == "btrfs" || $3 == "xfs" || $3 == "jfs" || $3 == "u?msdos" || $3 == "v?fat" || $3 == "hfs" || $3 == "ntfs" || $3 ~ "nfs[4-9]?" || $3 == "smbfs" || $3 == "cifs") { print $2 }' /proc/mounts | head -n26)" if [ -n "${mounts}" ]; then echo "You appear to have non-standard mount points that you" echo "might want to import into the chroot environment:" echo sel= while :; do # Print a menu, listing all non-default mounts of local or network # file systems. j=1; for m in ${mounts}; do c="$(printf $(printf '\\%03o' $((64+$j))))" echo "$sel" | grep -qs $c && state="mounted in chroot" || state="$(tput el)" printf " $c) %-40s${state}\n" "$m" j=$(($j+1)) done # Allow user to interactively (de-)select any of the entries echo printf "Select mount points that you want to be included or press %s" \ "SPACE to continue" c="$(getkey | tr a-z A-Z)" [ "$c" == " " ] && { echo; echo; break; } if [ -z "$c" ] || [ "$c" '<' 'A' -o $(ord "$c") -gt $((64 + $(ord "$j"))) ]; then # Invalid input, ring the console bell tput bel else # Toggle the selection for the given entry if echo "$sel" | grep -qs $c; then sel="$(printf "$sel" | sed "s/$c//")" else sel="$sel$c" fi fi # Reposition cursor to the top of the list of entries tput cuu $(($j + 1)) echo done fi j=1; for m in ${mounts}; do c="$(chr $(($j + 64)))" if echo "$sel" | grep -qs $c; then bind_mounts="${bind_mounts}$m $m none rw,bind 0 0 " fi j=$(($j+1)) done fi # Remove stale entry from /etc/schroot/schroot.conf. Entries start # with the target name in square brackets, followed by an arbitrary # number of lines. The entry stops when either the end of file has # been reached, or when the beginning of a new target is encountered. # This means, we cannot easily match for a range of lines in # "sed". Instead, we actually have to iterate over each line and check # whether it is the beginning of a new entry. sudo sed -ni '/^[[]'"${target%bit}"']$/,${:1;n;/^[[]/b2;b1;:2;p;n;b2};p' \ /etc/schroot/schroot.conf # Download base system. This takes some time if [ -z "${mirror}" ]; then grep -qs ubuntu.com /usr/share/debootstrap/scripts/"${distname}" && mirror="http://archive.ubuntu.com/ubuntu" || mirror="http://ftp.us.debian.org/debian" fi sudo ${http_proxy:+http_proxy="${http_proxy}"} debootstrap ${archflag} \ "${distname}" "/var/lib/chroot/${target}" "$mirror" # Add new entry to /etc/schroot/schroot.conf grep -qs ubuntu.com /usr/share/debootstrap/scripts/"${distname}" && brand="Ubuntu" || brand="Debian" if [ -z "${chroot_groups}" ]; then chroot_groups="${admin},$(id -gn)" fi # Older versions of schroot wanted a "priority=" line, whereas recent # versions deprecate "priority=" and warn if they see it. We don't have # a good feature test, but scanning for the string "priority=" in the # existing "schroot.conf" file is a good indication of what to do. priority=$(grep -qs 'priority=' /etc/schroot/schroot.conf && echo 'priority=3' || :) sudo sh -c 'cat >>/etc/schroot/schroot.conf' <<EOF [${target%bit}] description=${brand} ${distname} ${arch} type=directory directory=/var/lib/chroot/${target} users=root groups=${chroot_groups} root-groups=${chroot_groups} personality=linux$([ "${arch}" != 64bit ] && echo 32) script-config=script-${target} ${priority} EOF # Set up a list of mount points that is specific to this # chroot environment. sed '/^FSTAB=/s,"[^"]*","/etc/schroot/mount-'"${target}"'",' \ /etc/schroot/script-defaults | sudo sh -c 'cat >/etc/schroot/script-'"${target}" sed '\,^/home[/[:space:]],s/\([,[:space:]]\)bind[[:space:]]/\1rbind /' \ /etc/schroot/mount-defaults | sudo sh -c 'cat > /etc/schroot/mount-'"${target}" # Add the extra mount points that the user told us about [ -n "${bind_mounts}" -a "${bind_mounts}" != "NONE" ] && printf "${bind_mounts}" | sudo sh -c 'cat >>/etc/schroot/mount-'"${target}" # If this system has a "/media" mountpoint, import it into the chroot # environment. Most modern distributions use this mount point to # automatically mount devices such as CDROMs, USB sticks, etc... if [ -d /media ] && ! grep -qs '^/media' /etc/schroot/mount-"${target}"; then echo '/media /media none rw,rbind 0 0' | sudo sh -c 'cat >>/etc/schroot/mount-'"${target}" fi # Share /dev/shm, /run and /run/shm. grep -qs '^/dev/shm' /etc/schroot/mount-"${target}" || echo '/dev/shm /dev/shm none rw,bind 0 0' | sudo sh -c 'cat >>/etc/schroot/mount-'"${target}" if [ ! -d "/var/lib/chroot/${target}/run" ] && ! grep -qs '^/run' /etc/schroot/mount-"${target}"; then echo '/run /run none rw,bind 0 0' | sudo sh -c 'cat >>/etc/schroot/mount-'"${target}" fi if ! grep -qs '^/run/shm' /etc/schroot/mount-"${target}"; then { [ -d /run ] && echo '/run/shm /run/shm none rw,bind 0 0' || echo '/dev/shm /run/shm none rw,bind 0 0'; } | sudo sh -c 'cat >>/etc/schroot/mount-'"${target}" fi # Set up a special directory that changes contents depending on the target # that is executing. d="$(readlink -f "${HOME}/chroot" 2>/dev/null || echo "${HOME}/chroot")" s="${d}/.${target}" echo "${s} ${d} none rw,bind 0 0" | sudo sh -c 'cat >>/etc/schroot/mount-'"${target}" mkdir -p "${s}" # Install a helper script to launch commands in the chroot sudo sh -c 'cat >/usr/local/bin/'"${target%bit}" <<'EOF' #!/bin/bash chroot="${0##*/}" wrap() { # Word-wrap the text passed-in on stdin. Optionally, on continuation lines # insert the same number of spaces as the number of characters in the # parameter(s) passed to this function. # If the "fold" program cannot be found, or if the actual width of the # terminal cannot be determined, this function doesn't attempt to do any # wrapping. local f="$(type -P fold)" [ -z "${f}" ] && { cat; return; } local c="$(stty -a </dev/tty 2>/dev/null | sed 's/.*columns[[:space:]]*\([0-9]*\).*/\1/;t;d')" [ -z "${c}" ] && { cat; return; } local i="$(echo "$*"|sed 's/./ /g')" local j="$(printf %s "${i}"|wc -c)" if [ "${c}" -gt "${j}" ]; then dd bs=1 count="${j}" 2>/dev/null "${f}" -sw "$((${c}-${j}))" | sed '2,$s/^/'"${i}"'/' else "${f}" -sw "${c}" fi } help() { echo "Usage ${0##*/} [-h|--help] [-c|--clean] [-C|--clean-all] [-l|--list] [--] args" | wrap "Usage ${0##*/} " echo " help: print this message" | wrap " " echo " list: list all known chroot environments" | wrap " " echo " clean: remove all old chroot sessions for \"${chroot}\"" | wrap " " echo " clean-all: remove all old chroot sessions for all environments" | wrap " " exit 0 } clean() { local s t rc rc=0 for s in $(schroot -l --all-sessions); do if [ -n "$1" ]; then t="${s#session:}" [ "${t#${chroot}-}" == "${t}" ] && continue fi if ls -l /proc/*/{cwd,fd} 2>/dev/null | fgrep -qs "/var/lib/schroot/mount/${t}"; then echo "Session \"${t}\" still has active users, not cleaning up" | wrap rc=1 continue fi sudo schroot -c "${s}" -e || rc=1 done exit ${rc} } list() { for e in $(schroot -l); do e="${e#chroot:}" [ -x "/usr/local/bin/${e}" ] || continue if schroot -l --all-sessions 2>/dev/null | sed 's/^session://' | grep -qs "^${e}-"; then echo "${e} is currently active" else echo "${e}" fi done exit 0 } while [ "$#" -ne 0 ]; do case "$1" in --) shift; break;; -h|--help) shift; help;; -l|--list) shift; list;; -c|--clean) shift; clean "${chroot}";; -C|--clean-all) shift; clean;; *) break;; esac done # Start a new chroot session and keep track of the session id. We inject this # id into all processes that run inside the chroot. Unless they go out of their # way to clear their environment, we can then later identify our child and # grand-child processes by scanning their environment. session="$(schroot -c "${chroot}" -b)" export CHROOT_SESSION_ID="${session}" if [ $# -eq 0 ]; then # Run an interactive shell session schroot -c "${session}" -r -p else # Run a command inside of the chroot environment p="$1"; shift schroot -c "${session}" -r -p "$p" -- "$@" fi rc=$? # Compute the inode of the root directory inside of the chroot environment. i=$(schroot -c "${session}" -r -p ls -- -id /proc/self/root/. | awk '{ print $1 }') 2>/dev/null other_pids= while [ -n "$i" ]; do # Identify processes by the inode number of their root directory. Then # remove all processes that we know belong to other sessions. We use # "sort | uniq -u" to do what amounts to a "set substraction operation". pids=$({ ls -id1 /proc/*/root/. 2>/dev/null | sed -e 's,^[^0-9]*'$i'.*/\([1-9][0-9]*\)/.*$,\1, t d'; echo "${other_pids}"; echo "${other_pids}"; } | sort | uniq -u) >/dev/null 2>&1 # Kill all processes that are still left running in the session. This is # typically an assortment of daemon processes that were started # automatically. They result in us being unable to tear down the session # cleanly. [ -z "${pids}" ] && break for j in $pids; do # Unfortunately, the way that schroot sets up sessions has the # side-effect of being unable to tell one session apart from another. # This can result in us attempting to kill processes in other sessions. # We make a best-effort to avoid doing so. k="$( ( xargs -0 -n1 </proc/$j/environ ) 2>/dev/null | sed 's/^CHROOT_SESSION_ID=/x/;t1;d;:1;q')" if [ -n "${k}" -a "${k#x}" != "${session}" ]; then other_pids="${other_pids} ${j}" continue fi kill -9 $pids done done # End the chroot session. This should clean up all temporary files. But if we # earlier failed to terminate all (daemon) processes inside of the session, # deleting the session could fail. When that happens, the user has to manually # clean up the stale files by invoking us with "--clean" after having killed # all running processes. schroot -c "${session}" -e exit $rc EOF sudo chown root:root /usr/local/bin/"${target%bit}" sudo chmod 755 /usr/local/bin/"${target%bit}" # Add the standard Ubuntu update repositories if requested. [ "${alt_repos}" = "y" -a \ -r "/var/lib/chroot/${target}/etc/apt/sources.list" ] && sudo sed -i '/^deb .* [^ -]\+ main$/p s/^\(deb .* [^ -]\+\) main/\1-security main/ p t1 d :1;s/-security main/-updates main/ t d' "/var/lib/chroot/${target}/etc/apt/sources.list" # Add a few more repositories to the chroot [ -r "/var/lib/chroot/${target}/etc/apt/sources.list" ] && sudo sed -i 's/ main$/ main restricted universe multiverse/' \ "/var/lib/chroot/${target}/etc/apt/sources.list" # Add the Ubuntu "partner" repository, if available if [ -r "/var/lib/chroot/${target}/etc/apt/sources.list" ] && HEAD "http://archive.canonical.com/ubuntu/dists/${distname}/partner" \ >&/dev/null; then sudo sh -c ' echo "deb http://archive.canonical.com/ubuntu" \ "'"${distname}"' partner" \ >>"/var/lib/chroot/'"${target}"'/etc/apt/sources.list"' fi # Add source repositories, if the user requested we do so [ "${add_srcs}" = "y" -a \ -r "/var/lib/chroot/${target}/etc/apt/sources.list" ] && sudo sed -i '/^deb[^-]/p s/^deb\([^-]\)/deb-src\1/' \ "/var/lib/chroot/${target}/etc/apt/sources.list" # Set apt proxy if host has set http_proxy if [ -n "${http_proxy}" ]; then sudo sh -c ' echo "Acquire::http::proxy \"'"${http_proxy}"'\";" \ >>"/var/lib/chroot/'"${target}"'/etc/apt/apt.conf"' fi # Update packages sudo "/usr/local/bin/${target%bit}" /bin/sh -c ' apt-get update; apt-get -y dist-upgrade' || : # Install a couple of missing packages for i in debian-keyring ubuntu-keyring locales sudo; do [ -d "/var/lib/chroot/${target}/usr/share/doc/$i" ] || sudo "/usr/local/bin/${target%bit}" apt-get -y install "$i" || : done # Configure locales sudo "/usr/local/bin/${target%bit}" /bin/sh -c ' l='"${LANG:-en_US}"'; l="${l%%.*}" [ -r /etc/locale.gen ] && sed -i "s/^# \($l\)/\1/" /etc/locale.gen locale-gen $LANG en_US en_US.UTF-8' || : # Enable multi-arch support, if available sudo "/usr/local/bin/${target%bit}" dpkg --assert-multi-arch >&/dev/null && [ -r "/var/lib/chroot/${target}/etc/apt/sources.list" ] && { sudo sed -i 's/ / [arch=amd64,i386] /' \ "/var/lib/chroot/${target}/etc/apt/sources.list" [ -d /var/lib/chroot/${target}/etc/dpkg/dpkg.cfg.d/ ] && sudo "/usr/local/bin/${target%bit}" dpkg --add-architecture \ $([ "${arch}" = "32bit" ] && echo amd64 || echo i386) >&/dev/null || echo foreign-architecture \ $([ "${arch}" = "32bit" ] && echo amd64 || echo i386) | sudo sh -c \ "cat >'/var/lib/chroot/${target}/etc/dpkg/dpkg.cfg.d/multiarch'" } # Configure "sudo" package sudo "/usr/local/bin/${target%bit}" /bin/sh -c ' egrep -qs '"'^$(id -nu) '"' /etc/sudoers || echo '"'$(id -nu) ALL=(ALL) ALL'"' >>/etc/sudoers' # Install a few more commonly used packages sudo "/usr/local/bin/${target%bit}" apt-get -y install \ autoconf automake1.9 dpkg-dev g++-multilib gcc-multilib gdb less libtool \ strace # If running a 32bit environment on a 64bit machine, install a few binaries # as 64bit. This is only done automatically if the chroot distro is the same as # the host, otherwise there might be incompatibilities in build settings or # runtime dependencies. The user can force it with the '-c' flag. host_distro=$(grep -s DISTRIB_CODENAME /etc/lsb-release | \ cut -d "=" -f 2) if [ "${copy_64}" = "y" -o \ "${host_distro}" = "${distname}" -a "${arch}" = 32bit ] && \ file /bin/bash 2>/dev/null | grep -q x86-64; then readlinepkg=$(sudo "/usr/local/bin/${target%bit}" sh -c \ 'apt-cache search "lib64readline.\$" | sort | tail -n 1 | cut -d " " -f 1') sudo "/usr/local/bin/${target%bit}" apt-get -y install \ lib64expat1 lib64ncurses5 ${readlinepkg} lib64z1 dep= for i in binutils gdb; do [ -d /usr/share/doc/"$i" ] || dep="$dep $i" done [ -n "$dep" ] && sudo apt-get -y install $dep sudo mkdir -p "/var/lib/chroot/${target}/usr/local/lib/amd64" for i in libbfd libpython; do lib="$({ ldd /usr/bin/ld; ldd /usr/bin/gdb; } | grep -s "$i" | awk '{ print $3 }')" if [ -n "$lib" -a -r "$lib" ]; then sudo cp "$lib" "/var/lib/chroot/${target}/usr/local/lib/amd64" fi done for lib in libssl libcrypt; do for path in /usr/lib /usr/lib/x86_64-linux-gnu; do sudo cp $path/$lib* \ "/var/lib/chroot/${target}/usr/local/lib/amd64/" >&/dev/null || : done done for i in gdb ld; do sudo cp /usr/bin/$i "/var/lib/chroot/${target}/usr/local/lib/amd64/" sudo sh -c "cat >'/var/lib/chroot/${target}/usr/local/bin/$i'" <<EOF #!/bin/sh exec /lib64/ld-linux-x86-64.so.2 --library-path /usr/local/lib/amd64 \ /usr/local/lib/amd64/$i "\$@" EOF sudo chmod 755 "/var/lib/chroot/${target}/usr/local/bin/$i" done fi # If the install-build-deps.sh script can be found, offer to run it now script="$(dirname $(readlink -f "$0"))/install-build-deps.sh" if [ -x "${script}" ]; then while :; do echo echo "If you plan on building Chrome inside of the new chroot environment," echo "you now have to install the build dependencies. Do you want me to" printf "start the script that does this for you (y/n)? " read install_deps case "${install_deps}" in y|Y) echo # We prefer running the script in-place, but this might not be # possible, if it lives on a network filesystem that denies # access to root. tmp_script= if ! sudo /usr/local/bin/"${target%bit}" \ sh -c "[ -x '${script}' ]" >&/dev/null; then tmp_script="/tmp/${script##*/}" cp "${script}" "${tmp_script}" fi # Some distributions automatically start an instance of the system- # wide dbus daemon, cron daemon or of the logging daemon, when # installing the Chrome build depencies. This prevents the chroot # session from being closed. So, we always try to shut down any running # instance of dbus and rsyslog. sudo /usr/local/bin/"${target%bit}" sh -c "${script} --no-lib32; rc=$?; /etc/init.d/cron stop >/dev/null 2>&1 || :; /etc/init.d/rsyslog stop >/dev/null 2>&1 || :; /etc/init.d/dbus stop >/dev/null 2>&1 || :; exit $rc" rc=$? [ -n "${tmp_script}" ] && rm -f "${tmp_script}" [ $rc -ne 0 ] && exit $rc break ;; n|N) break ;; esac done echo fi # Check whether ~/chroot is on a (slow) network file system and offer to # relocate it. Also offer relocation, if the user appears to have multiple # spindles (as indicated by "${bind_mount}" being non-empty). # We only offer this option, if it doesn't look as if a chroot environment # is currently active. Otherwise, relocation is unlikely to work and it # can be difficult for the user to recover from the failed attempt to relocate # the ~/chroot directory. # We don't aim to solve this problem for every configuration, # but try to help with the common cases. For more advanced configuration # options, the user can always manually adjust things. mkdir -p "${HOME}/chroot/" if [ ! -h "${HOME}/chroot" ] && ! egrep -qs '^[^[:space:]]*/chroot' /etc/fstab && { [ -n "${bind_mounts}" -a "${bind_mounts}" != "NONE" ] || is_network_drive "${HOME}/chroot"; } && ! egrep -qs '/var/lib/[^/]*chroot/.*/chroot' /proc/mounts; then echo "${HOME}/chroot is currently located on the same device as your" echo "home directory." echo "This might not be what you want. Do you want me to move it somewhere" echo "else?" # If the computer has multiple spindles, many users configure all or part of # the secondary hard disk to be writable by the primary user of this machine. # Make some reasonable effort to detect this type of configuration and # then offer a good location for where to put the ~/chroot directory. suggest= for i in $(echo "${bind_mounts}"|cut -d ' ' -f 1); do if [ -d "$i" -a -w "$i" -a \( ! -a "$i/chroot" -o -w "$i/chroot/." \) ] && ! is_network_drive "$i"; then suggest="$i" else for j in "$i/"*; do if [ -d "$j" -a -w "$j" -a \ \( ! -a "$j/chroot" -o -w "$j/chroot/." \) ] && ! is_network_drive "$j"; then suggest="$j" else for k in "$j/"*; do if [ -d "$k" -a -w "$k" -a \ \( ! -a "$k/chroot" -o -w "$k/chroot/." \) ] && ! is_network_drive "$k"; then suggest="$k" break fi done fi [ -n "${suggest}" ] && break done fi [ -n "${suggest}" ] && break done def_suggest="${HOME}" if [ -n "${suggest}" ]; then # For home directories that reside on network drives, make our suggestion # the default option. For home directories that reside on a local drive, # require that the user manually enters the new location. if is_network_drive "${HOME}"; then def_suggest="${suggest}" else echo "A good location would probably be in \"${suggest}\"" fi fi while :; do printf "Physical location [${def_suggest}]: " read dir [ -z "${dir}" ] && dir="${def_suggest}" [ "${dir%%/}" == "${HOME%%/}" ] && break if ! [ -d "${dir}" -a -w "${dir}" ] || [ -a "${dir}/chroot" -a ! -w "${dir}/chroot/." ]; then echo "Cannot write to ${dir}/chroot. Please try again" else mv "${HOME}/chroot" "${dir}/chroot" ln -s "${dir}/chroot" "${HOME}/chroot" for i in $(list_all_chroots); do sudo "$i" mkdir -p "${dir}/chroot" done sudo sed -i "s,${HOME}/chroot,${dir}/chroot,g" /etc/schroot/mount-* break fi done fi # Clean up package files sudo schroot -c "${target%bit}" -p -- apt-get clean sudo apt-get clean trap '' INT TERM QUIT HUP trap '' EXIT # Let the user know what we did cat <<EOF Successfully installed ${distname} ${arch} You can run programs inside of the chroot by invoking the "/usr/local/bin/${target%bit}" command. This command can be used with arguments, in order to just run a single program inside of the chroot environment (e.g. "${target%bit} make chrome") or without arguments, in order to run an interactive shell session inside of the chroot environment. If you need to run things as "root", you can use "sudo" (e.g. try "sudo ${target%bit} apt-get update"). Your home directory is shared between the host and the chroot. But I configured "${HOME}/chroot" to be private to the chroot environment. You can use it for files that need to differ between environments. This would be a good place to store binaries that you have built from your source files. For Chrome, this probably means you want to make your "out" directory a symbolic link that points somewhere inside of "${HOME}/chroot". You still need to run "gclient runhooks" whenever you switch from building outside of the chroot to inside of the chroot. But you will find that you don't have to repeatedly erase and then completely rebuild all your object and binary files. EOF