diff options
author | Richard Jones <rjones@redhat.com> | 2009-05-11 14:51:22 +0100 |
---|---|---|
committer | Richard Jones <rjones@redhat.com> | 2009-05-11 15:41:41 +0100 |
commit | d52fcf7521b8f9b1ec7bbeaaf93840af37d363cf (patch) | |
tree | 2e40039898704b34c73c42fa02b27a043ec0fe60 /febootstrap.pod | |
parent | e8d2809e31c5f4c937dc98239118855b2d1d006e (diff) | |
download | febootstrap-d52fcf7521b8f9b1ec7bbeaaf93840af37d363cf.tar.gz febootstrap-d52fcf7521b8f9b1ec7bbeaaf93840af37d363cf.tar.xz febootstrap-d52fcf7521b8f9b1ec7bbeaaf93840af37d363cf.zip |
Be more careful about removing files in fakeroot during minimization.
Added febootstrap-install program.
Diffstat (limited to 'febootstrap.pod')
-rw-r--r-- | febootstrap.pod | 19 |
1 files changed, 14 insertions, 5 deletions
diff --git a/febootstrap.pod b/febootstrap.pod index 109f6a2..e208603 100644 --- a/febootstrap.pod +++ b/febootstrap.pod @@ -129,8 +129,8 @@ so that yum thinks it is running as root. Fakeroot keeps track of directory as C<I<TARGET>/fakeroot.log>. This logfile is indexed by inode number, which makes certain -operations safe and other operations unsafe. For example, deleting -files is usually safe. Files should be replaced only by doing: +operations safe and other operations unsafe. +Files should be replaced only by doing: echo updated-content > old-file @@ -139,9 +139,12 @@ files is usually safe. Files should be replaced only by doing: Deleting files and then creating new ones (even with a different name) is usually unsafe, because the new files might reuse inodes claimed by the old files, and so appear with peculiar permissions -(eg. unreadable, or as a symbolic link). (XXX We need an -C<febootstrap-install> utility to automate installing new files safely -into a filesystem). +(eg. unreadable, or as a symbolic link). + +Deleting files is also usually unsafe, although the reasons are more +subtle. If you just use C<rm> then the inode number is not deleted +from C<fakeroot.log> which means it can be reused by another file +later on. In most cases it's usually safest to use C<febootstrap-run>. @@ -156,6 +159,11 @@ permissions. =item * +Use L<febootstrap-install(8)> to install a file with permissions +in the root filesystem. + +=item * + Generate an initramfs (compressed cpio) file containing the correct permissions using the tool C<febootstrap-to-initramfs>. @@ -218,6 +226,7 @@ L<http://et.redhat.com/~rjones/febootstrap> L<febootstrap-to-initramfs(8)>, L<febootstrap-minimize(8)>, L<febootstrap-run(8)>, +L<febootstrap-install(8)>, L<fakeroot(1)>, L<fakechroot(1)>, L<yum(8)>, |