-
Notifications
You must be signed in to change notification settings - Fork 41
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Panic on package build failure. #6
Comments
@c-edw Do you have backtrace at all, or is it just unhelpful? If you're compiling via AUR, you need to uncomment |
@c-edw yes, panicking is indeed not a nice thing to have. I need to make an iteration of cleaning them up again, probably. By the way, have you installed the dependencies?: https://github.com/vn971/rua#install-dependencies |
The first time, I followed
|
I have installed the dependencies also. |
I see that it's in |
@c-edw it actually seems as though ( If it's not, please install |
Installing |
I've encountered the panic again after installing some packages.
|
@c-edw This one is from On the other hand, people say that running bubblewrap inside docker works at least partly: containers/bubblewrap#284 |
I have tried installing with rua under an unprivileged user, which gives a different error:
This is when running with If you'd like, I can report this on bubblewrap. |
@c-edw Apparently "bubblewrap" needs some rights to prepare the jail, which docker lacks by default. This issue describes the very same problem I think: flatpak/flatpak#1326 |
I've installed docker with an Arch image, the problem is totally reproducible. |
@c-edw Apparently, the only way to run bubblewrap/rua inside docker is to use So what I am in fact going to propose, if you want to play with RUA, is to just run it from a separate user in your main OS. This way your normal Linux kernel will still keep the user in its place, while all of RUA functionality will work. Packages will be additionally build inside a (pretty restrictive) bwrap jail, which is pretty much secure. As secure as you can get with the Linux kernel, I'd personally say. Anyway, I don't think I really have any options to defeat the "bubblewrap inside docker" problem... |
Does Unfortunately I don't run Arch on my root system, and I was using the container to test various AUR helpers. |
@c-edw Automatic disabling of security properties is something that I'd rather avoid, even if program thinks it runs inside docker. An explicit argument is possible though. I'll take some time on this. |
But helpers such as |
Closing in favor of #8. Thanks for raising and all the feedback! This is not the highest-priority feature at the moment, though, unfortunately. We'll see how it goes in the future. If you want, you can provide a PR, presuming the following holds:
The last restriction can be lifted if there's a serious argument against it, but otherwise let it stay. |
For the record, Commands that do not require the jail, like |
Thanks, I will take another look at this project when I get the opportunity. |
How to use CLI override described in #6 (comment) ? |
I am trying to install some packages and am getting a panic on
src/wrapped.rs:61:2
. The backtrace is pretty unhelpful, but it looks like the command that was being executed didn't return 0.Ideally this shouldn't panic, but should just print a warning or error.
The text was updated successfully, but these errors were encountered: