> "Create and work with loopback mounted, luks encrypted, file based chroot
> guests."

OK, I finally determined why schroot was not doing as I wanted, and
why zchroot does:

On reading schroot's /etc/schroot/setup.d/05file, I determine:
 - schroot's "file" chroot type means "a temporarily zipped file hierarchy"
 - this chroot..tgz file is unpacked, into a directory, like a normal chroot,
   to actually chroot into it to do anything
 - after the job is done, this directory is zipped back up,
   (unless a "session" is in play)

 - _in contrast_, zchroot's chroot files:
 - are loopback mounted sparse files
    - the file is never 'unzipped' into a directory
 - are luks-encrypted (may use empty pw for throwaway chroot's)
 - are installed into an fs which is formatted into the luks/lo sparse file
 - are not zipped (although that could be added, either externally,
   or perhaps as an fs/ dm option when formatting the fs in the lo file??)

Now, zchroot option/ type appeals to me. There's no repetitive
unzipping and rezipping each time you mount/umount the chroot, instead
an lo mount + luks mount.

Work TODO: port zchroot as a patch against schroot, providing this new
type of chroot. It really is a different option than those currently
provided by schroot (it has a few types currently supported).

loopback, luks encrypted, sparse file is ideally just another chroot
type option provided by schroot.

I don't have time to do this right now; I should have in about 2-3 years.

cheers
zen

PS: mount --make-rshared /  can be quite useful before mounting chroots...
-- 
SLUG - Sydney Linux User's Group Mailing List - http://slug.org.au/
Subscription info and FAQs: http://slug.org.au/faq/mailinglists.html

Reply via email to