[Buildd-tools-devel] Bug#329403: marked as done (schroot: Clobbers files in the chroot without warning)

Debian Bug Tracking System owner at bugs.debian.org
Thu Oct 13 00:03:09 UTC 2005


Your message dated Wed, 12 Oct 2005 16:47:08 -0700
with message-id <E1EPqJQ-0007Kl-00 at spohr.debian.org>
and subject line Bug#329403: fixed in schroot 0.1.6-1
has caused the attached Bug report to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what I am
talking about this indicates a serious mail system misconfiguration
somewhere.  Please contact me immediately.)

Debian bug tracking system administrator
(administrator, Debian Bugs database)

--------------------------------------
Received: (at submit) by bugs.debian.org; 21 Sep 2005 15:28:30 +0000
>From dan at debian.org Wed Sep 21 08:28:30 2005
Return-path: <dan at debian.org>
Received: from dsl093-172-095.pit1.dsl.speakeasy.net (caradoc.them.org) [66.93.172.95] 
	by spohr.debian.org with esmtp (Exim 3.36 1 (Debian))
	id 1EI6WM-0003Zv-00; Wed, 21 Sep 2005 08:28:30 -0700
Received: from drow by caradoc.them.org with local (Exim 4.52)
	id 1EI6WL-0001ng-2I; Wed, 21 Sep 2005 11:28:29 -0400
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
From: Daniel Jacobowitz <dan at debian.org>
To: Debian Bug Tracking System <submit at bugs.debian.org>
Subject: schroot: Clobbers files in the chroot without warning
X-Mailer: reportbug 3.17
Date: Wed, 21 Sep 2005 11:28:28 -0400
Message-Id: <E1EI6WL-0001ng-2I at caradoc.them.org>
Delivered-To: submit at bugs.debian.org
X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02 
	(1.212-2003-09-23-exp) on spohr.debian.org
X-Spam-Level: 
X-Spam-Status: No, hits=-8.0 required=4.0 tests=BAYES_00,HAS_PACKAGE 
	autolearn=no version=2.60-bugs.debian.org_2005_01_02

Package: schroot
Version: 0.1.5-1
Severity: important

When I upgraded to this version of schroot, it suddenly started modifying
files inside the chroot without saying so.  The man page documents the new
run-parts mechanism, but doesn't say anything about the new scripts which
modify /etc/passwd et cetera.

I was already taking care of this on my own, using FUSE to simulate bind
mounts.  As a result, writes to /chroot/etc/passwd also write to the system
/etc/passwd.  So the first time I ran schroot after upgrading, it created
/etc/debian_chroot in my host, and clobbered
passwd/group/shadow/resolv.conf.  I had to reboot to single user mode to
restore them from backup.

This is extremely rude behavior, and I'm not real happy that it came in
without any warning.  Meanwhile, I am rearranging my setup to make the
cloned copy read-only...

-- System Information:
Debian Release: testing/unstable
  APT prefers unstable
  APT policy: (500, 'unstable'), (500, 'stable')
Architecture: amd64 (x86_64)
Shell:  /bin/sh linked to /bin/bash
Kernel: Linux 2.6.13-rc6
Locale: LANG=en_US, LC_CTYPE=en_US (charmap=ISO-8859-1)

Versions of packages schroot depends on:
ii  libc6                         2.3.5-6    GNU C Library: Shared libraries an
ii  libglib2.0-0                  2.8.0-1    The GLib library of C routines
ii  libpam0g                      0.76-23    Pluggable Authentication Modules l

schroot recommends no packages.

-- no debconf information

---------------------------------------
Received: (at 329403-close) by bugs.debian.org; 12 Oct 2005 23:47:53 +0000
>From katie at spohr.debian.org Wed Oct 12 16:47:53 2005
Return-path: <katie at spohr.debian.org>
Received: from katie by spohr.debian.org with local (Exim 3.36 1 (Debian))
	id 1EPqJQ-0007Kl-00; Wed, 12 Oct 2005 16:47:08 -0700
From: Roger Leigh <rleigh at debian.org>
To: 329403-close at bugs.debian.org
X-Katie: $Revision: 1.56 $
Subject: Bug#329403: fixed in schroot 0.1.6-1
Message-Id: <E1EPqJQ-0007Kl-00 at spohr.debian.org>
Sender: Archive Administrator <katie at spohr.debian.org>
Date: Wed, 12 Oct 2005 16:47:08 -0700
Delivered-To: 329403-close at bugs.debian.org
X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02 
	(1.212-2003-09-23-exp) on spohr.debian.org
X-Spam-Level: 
X-Spam-Status: No, hits=-6.0 required=4.0 tests=BAYES_00,HAS_BUG_NUMBER 
	autolearn=no version=2.60-bugs.debian.org_2005_01_02

Source: schroot
Source-Version: 0.1.6-1

We believe that the bug you reported is fixed in the latest version of
schroot, which is due to be installed in the Debian FTP archive:

schroot_0.1.6-1.diff.gz
  to pool/main/s/schroot/schroot_0.1.6-1.diff.gz
schroot_0.1.6-1.dsc
  to pool/main/s/schroot/schroot_0.1.6-1.dsc
schroot_0.1.6-1_powerpc.deb
  to pool/main/s/schroot/schroot_0.1.6-1_powerpc.deb
schroot_0.1.6.orig.tar.gz
  to pool/main/s/schroot/schroot_0.1.6.orig.tar.gz



A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 329403 at bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Roger Leigh <rleigh at debian.org> (supplier of updated schroot package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmaster at debian.org)


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Format: 1.7
Date: Thu, 13 Oct 2005 00:16:06 +0100
Source: schroot
Binary: schroot
Architecture: source powerpc
Version: 0.1.6-1
Distribution: unstable
Urgency: low
Maintainer: Debian buildd-tools Developers <buildd-tools-devel at lists.alioth.debian.org>
Changed-By: Roger Leigh <rleigh at debian.org>
Description: 
 schroot    - Execute commands in a chroot environment
Closes: 329403 331550
Changes: 
 schroot (0.1.6-1) unstable; urgency=low
 .
   * New upstream release.
   * Don't run setup scripts by default, because this can cause
     data loss with custom chroot setups.  A "run-setup" chroot
     option has been added to configure the running of setup
     scripts, which are disabled by default for safety
     (Closes: #329403).
   * Manual pages say "schroot" rather than "sbuild" (Closes: #331550).
   * Preserve schroot.conf changes correctly when moving to
     /etc/schroot/schroot.conf, by checking the md5sum to
     detect local modifictions.  If not modified, delete and
     replace with the package version.
   * debian/rules: Set $localstatedir when running configure.
Files: 
 4d89296960fc8711922ed0c9661d211e 791 admin optional schroot_0.1.6-1.dsc
 1a7dd757998f2d4561b60b28379393f0 535480 admin optional schroot_0.1.6.orig.tar.gz
 73674bd9b7d604bc564922e3141e2572 20 admin optional schroot_0.1.6-1.diff.gz
 8af010097c039f4b016daeb9676b3a64 68446 admin optional schroot_0.1.6-1_powerpc.deb

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.2 (GNU/Linux)

iD8DBQFDTZ2fVcFcaSW/uEgRAoQwAJ4hBNgTuRQ6fZI6wH/DYqjjkNhPFACg01xr
Go0FuwSwkBEY4OK3/faWGuQ=
=3xjR
-----END PGP SIGNATURE-----




More information about the Buildd-tools-devel mailing list