Sophie

Sophie

distrib > Fedora > 13 > i386 > media > os > by-pkgid > 3b1c70357ba64c093a73a994f980ca3c > files > 30

schroot-1.2.3-5.fc13.i686.rpm

NEWS                                                            -*- outline -*-
----

Welcome to schroot 1.2.3.  Please read these release notes carefully.

Full installation instructions are provided in the INSTALL file.  The
README file also contains more specific notes regarding building and
configuration.

* Major changes in 1.2.3:

  None.

* Major changes in 1.2.2:

  None.

* Major changes in 1.2.1:

  1) A new chroot type, "loopback", has been added.  This is similar
     to the "block-device" type, but allows for loopback mounting of
     filesystems contained within regular files.

  2) "lvm-snapshot" chroot types now clean up correctly in the case of
     failures during setup.

* Major changes in 1.2.0:

  1) In addition to /etc/schroot/schroot.conf, chroot definitions may
     be placed in separate files under /etc/schroot/chroot.d to enable
     packages and system administrators to easily make new chroots
     available to schroot.

  2) Configuration files may now be symlinks as well as regular files.

  3) schroot now builds with GCC 4.3.

  4) All setup and exec scripts source and use the script
     configuration file specified with the script-config configuration
     key.

* Major changes in 1.1.6:

  1) Relicence under the GNU General Public License, version 3 or
     later.

  2) Per-chroot custom mountpoints are now possible through the use of
     an fstab file.  This may be used to mount or bind mount any
     filesystem within the chroot with the assistance of a helper
     utility, schroot-mount.  Set FSTAB=fstab in the script-config
     file to specify which file to use.

  3) Per-chroot custom file copying is now supported.  Set
     COPYFILES=file in the script-config file to specify a file
     containing a list of files to copy from the host system into the
     chroot.  This change merged the 20network and 30passwd setup
     scripts into a single script, 20copyfiles.  If you previously
     customised either of these scripts, the changes will need to be
     copied over to the new files.

  4) If invalid options are used in schroot.conf, warnings will be
     printed, rather than simply ignoring them.

* Major changes in 1.1.5:

  1) A "script-config" option has been added to allow customisation of
     the chroot setup and execution scripts on a per-chroot basis.
     See schroot.conf(5) for further details.

  2) A --session-name has been added to allow naming sessions when
     using --begin-session.  This replaces the automatically-generated
     chroot-UUID session name.

* Major changes in 1.1.4:

  1) When ending a session, processes still running in the chroot are
     terminated.

* Major changes in 1.1.3:

  Bugfixes and translation updates only.

* Major changes in 1.1.2:

  Bugfixes and translation updates only.

* Major changes in 1.1.1:

  1) For dchroot and dchroot-dsa, the syslog logging of the command or
     shell being run in the chroot now only occurs when running as
     root or switching to another user.  If the user is the same
     inside and outside the chroot, and not root, the command or shell
     being run will not be logged.

  2) Using symbolic links in the mount path (SCHROOT_MOUNT_DIR) will
     no longer result in severe dataloss.

  3) User-defined filtering of the chroot environment is now permitted
     using the environment-filter key in the configuration file, which
     uses a regular expression to identify environment variables for
     removal.

  4) The environment variables SCHROOT_COMMAND, SCHROOT_USER,
     SCHROOT_GROUP, SCHROOT_UID and SCHROOT_GID are set inside the
     chroot specifying the command being run, the user name, group
     name, user ID and group ID, respectively.

* Major changes in 1.1.0:

  1) Authentication now uses the Controlling TTY (/dev/tty) for
     communication with the user.  This means PAM interaction with the
     user will work even if stdin, stdout and stderr are all
     redirected.  If authentication is required and no CTTY is
     available, it will fail (due to authentication being an
     interactive process).

  2) The syslog logging of the command or shell being run in the
     chroot now only occurs when running as root or switching to
     another user.  If the user is the same inside and outside the
     chroot, and not root, the command or shell being run will not be
     logged.

  3) A --directory option has been added to schroot, dchroot and
     dchroot-dsa.  This option allows the user to explictly specify
     the working directory inside the chroot.

* Major changes in 1.0.6:

  Bugfixes only.

* Major changes in 1.0.5:

  Bugfixes only.

* Major changes in 1.0.4:

  1) Using symbolic links in the mount path (SCHROOT_MOUNT_DIR) will
     no longer result in severe dataloss.

  2) LSB init script functions are now used.

* Major changes in 1.0.3:

  1) For dchroot and dchroot-dsa, the syslog logging of the command or
     shell being run in the chroot now only occurs when running as
     root or switching to another user.  If the user is the same
     inside and outside the chroot, and not root, the command or shell
     being run will not be logged.

* Major changes in 1.0.2:

  1) The syslog logging of the command or shell being run in the
     chroot now only occurs when running as root or switching to
     another user.  If the user is the same inside and outside the
     chroot, and not root, the command or shell being run will not be
     logged.

  2) A --directory option has been added to schroot, dchroot and
     dchroot-dsa.  This option allows the user to explictly specify
     the working directory inside the chroot.

* Major changes in 1.0.1:

  Bugfixes and translation updates only.

* Major changes in 1.0.0:

  Bugfixes and translation updates only.

* Major changes in 0.99.4:

  1) All errors in the configuration file now show the full details of
     the problem, including the exact line number, group and key.

  2) Duplicate groups and keys with groups are now treated as errors.

  3) The terminal state is only saved and restored when running a
     login shell.  It is no longer saved and restored when running
     commands.  This is to correct the problem of schroot being
     stopped when running in the background while restoring the
     terminal settings.

  4) Child processes are now terminated when SIGTERM is received, in
     addition to SIGHUP.

* Major changes in 0.99.3:

  1) A new chroot type, "directory", has been added.  This is the same
     as the "plain" type, but additionally allows filesystem mounting
     when setup scripts are enabled.

  2) A further dchroot compatibility issue has been corrected.
     Multiple command options specified on the command line are
     concatenated into a single command, separated by spaces.

* Major changes in 0.99.2:

  1) A --debug option has been added to all programs.  Its use is
     documented in the manual pages.

  2) When errors are found in the chroot configuration, the line
     number in the configuration file is now reported.

  3) The use of run-parts(8) is no longer needed.  This should make
     the package portable to non-Debian systems.

* Major changes in 0.99.1:

  1) A dchroot-dsa compatibility mode has been implemented.  This
     behaves in the same manner as the DSA dchroot program, and is
     useful for backward compatibility with DSA dchroot, as well as
     migrating from DSA dchroot.

  2) The dchroot program is now compatible with the command-line
     syntax of older versions, and also matches the older behaviour of
     which directory is used inside the chroot.  The behaviour is
     documented in the manual page.

  3) In addition to "groups" and "root-groups" options for controlling
     chroot access, "users" and "root-users" have been added for finer
     control over access.  Corresponding "source-users" and
     "source-root-users" options have been added for source chroots.

  4) Files, Devices and Locations in schroot.conf must be absolute
     pathnames.  Relative names are a security risk, because the
     behaviour may vary depending on the current working directory.
     It was previously the sysadmin's responsibility to set these
     correctly, but this rule is now strictly enforced.

* Major changes in 0.99.0:

  1) In order to support running 32-bit chroots on 64-bit systems, a
     "personality" option has been added.  This may be set to
     "linux32" to run a 32-bit Linux chroot on an amd64 system, for
     example.

  2) dchroot has an additional personality field in dchroot.conf.
     This may also be set to linux32 to achieve the same effect as the
     personality setting in schroot.conf.

  3) The root user can access all chroots, even when the root group is
     omitted from the groups or root_groups lists.  Authentication is
     still required, but by default is skipped due to using
     pam_rootok.so in the PAM configuration.

  4) Session recovery is only performed at system startup, not on
     upgrades.  This prevents upgrades interfering with active
     sessions.

* Major changes in 0.2.11:

  1) The 10mount script, used to unmount filesystem in a chroot, will
     exit with an error if unmounting fails (for safety).  It also
     uses /proc/mounts (via a new program, schroot-listmounts) to
     ensure all filesystems in the chroot are unmounted.

  2) The 05file script, used to unpack and repack chroot archives,
     will use schroot-listmounts to check if any filesystems are
     mounted before purging the chroot.  This is in order to avoid
     dataloss.

  3) Setup scripts can now abort on failure during cleanup (exec-stop
     and setup-stop phases).  Previously the scripts continued in the
     face of failure, and broken sessions were removed.  Broken
     sessions which failed to clean up must now be removed by the
     system administrator (which was required previously; it just
     wasn't apparent), or the session can be ended again once the
     problem has been rectified.

* Major changes in 0.2.10:

  Bugfixes only.

* Major changes in 0.2.9:

  1) The package now compiles with older compilers, such as GCC 3.3
     and 3.4.

  2) If the current working directory does not exist inside the
     chroot, the user's home directory ($HOME, home directory in
     passwd, or /) will be used when running a login shell.  If
     running a command and the directory does not exist, schroot will
     exit with an error.

* Major changes in 0.2.8:

  Bugfixes only.

* Major changes in 0.2.7:

  Bugfixes only.

* Major changes in 0.2.6:

  1) For all chroot types, a "command-prefix" option has been added.
     This is a command to prefix to all commands run inside the
     chroot.

  2) The scripts run before and after executing a command or shell in
     the chroot have been moved from /etc/schroot/run.d to
     /etc/schroot/exec.d.  The corresponding configuration option in
     schroot.conf has been renamed from "run-session-scripts" to
     "run-exec-scripts".  This change was to reduce ambiguity in the
     naming, to make it easier to understand and configure.

  3) The session operations "--recover-session", "--run-session", and
     "--end-session" now allow multiple chroots to be specified with
     "--chroot", rather than just one.

  4) The "file" and "lvm-snapshot" chroot types both implement "source
     chroots", to provide access to the source block device and
     archive file, respectively.  The "source-groups" and
     "source-root-groups" options have been added to set the "groups"
     and "root-groups" options for the source chroot.

  5) The "file" chroot, when accessed as a source chroot using the
     "-source" suffix, will now automatically repack itself into a new
     archive file on ending a session.

* Major changes in 0.2.5:

  1) The output of "--info" now displays a "Path" line if available.
     This is the location of the chroot in the filesystem.

* Major changes in 0.2.4:

  1) For "block-device" and "lvm-snapshot" type chroots, it is now
     possible to add a "location" configuration option to specify the
     location of the chroot within the device filesystem, rather than
     assuming the location is always the root.  This allows multiple
     chroots to be stored on a single LVM LV, for example.

  2) For "plain" chroots, if setup scripts (run-setup-scripts) is
     enabled, session management is also enabled.  This is not true
     session management, because it uses bind mounts rather than a
     copy of the chroot, so should be used with caution, but will make
     concurrent access to the chroot with session scripts enabled
     rather more useful.

* Major changes in 0.2.3:

  1) A dchroot compatibility mode has been implemented.  This behaves
     in the same manner as the dchroot program, and is useful for
     backward compatibility with dchroot, as well as migrating from
     dchroot.

  2) Access to the source device of an "lvm-snapshot" type chroot is
     simplified.  For a chroot named "snap", a "block-device" type
     chroot named "snap-source" is created for easy access to the
     source device.

  3) The output of "--info" now includes a "Session Managed" line,
     which is true if full session management is available, or false
     otherwise.

* Major changes in 0.2.2:

  1) Session metadata is now correctly saved and restored.

  2) New option "--config" to dump chroot configuration, in the same
     manner as "--info".  This is useful to test if the configuration
     you put in schroot.conf is what schroot is actually parsing.

  3) Session-managed chroot types ("file" and "lvm-snapshot") now run
     setup and session scripts by default.  It was previously disabled
     for all chroot types for safety reasons.  It's considered safe
     for these types due to their ephemeral nature.

* Major changes in 0.2.1:

  1) Creating a session now returns a zero exit status on success.

* Major changes in 0.2.0:

  1) A new chroot type, "file", has been added, to allow chroots to be
     created by unpacking a file archive, such as a tar or zip file.

  2) The source has been rewritten in C++, and documented with
     Doxygen.

  3) A testsuite has been added to unit test as much functionality as
     is reasonably possible.

* Major changes in 0.1.7:

  1) The chroots now implement locking to restrict access to chroots
     which are already in use.

  2) The "current-users" and "max-users" configuration options have
     been removed.  These have been obsoleted by chroot locking.

  3) The command-line options "--all-chroots" and "--all-sessions"
     have been added, which have similar behaviour to "--all", but
     selects all chroots and all active sessions, respectively.

  4) Session creation, use and removal is now available for LVM
     snapshot chroots, using the options documented in schroot(1).

  5) The session commands also work with non-session-based chroot
     types (plain and block-device), but is equivalent to using the
     chroot normally.

  6) An init script is used to recover (restore) session chroots at
     system startup.

  7) If no chroot is specified, schroot will fall back to using the
     "default" chroot.  Adding a "default" alias to an existing chroot
     will make this chroot the default.

* Major changes in 0.1.6:

  1) Setup scripts may be run on startup and shutdown and before and
     after a command in order to perform setup tasks such as
     configuring the chroot and mounting filesystems.  These are
     stored in /etc/schroot/setup.d and /etc/schroot/run.d, and run
     using run-parts(8).  New scripts may easily be added by the
     system administrator.  See schroot-setup(5).

  2) Different types of chroots are now supported.  The current types
     are "plain" (the default, which is the type supported by previous
     releases), "block-device" (a block device mounted on the fly) and
     "lvm-snapshot" (and LVM snapshot of an LV made on the fly).

* Major changes in 0.1.5:

  1) The authentication system has been extended to remove the
     dependency upon libpam_misc.  There are no user-visible changes.

  2) The root user (uid 0) no longer has special priveleges during
     authentication.  If the root user should have special priveleges
     (such as not requiring authentication to change to any other
     user), do the following:

     - uncomment the pam_rootok.so line in pam.d/schroot.  This will
       disable the requirement for root authentication.
     - add root to groups (root_groups membership is redundant), so
       that root is allowed access.

  3) The configuration file, /etc/schroot.conf has been moved to
     /etc/schroot/schroot.conf.  This should be moved automatically
     when upgrading the Debian package.

  4) A new directory, /etc/schroot/setup.d has been added.  This
     contains scripts to perform setup and cleanup tasks in the
     chroot, which are run with run-parts(8).  This provides an
     easy was to configure and customise chroots.

* Major changes in 0.1.4:

  1) A new chroot configuration option, "priority", has been added.
     This is intended for use with sbuild, to indicate whether the
     distribution in a chroot is older than the distribution in
     another chroot.
  2) The printed messages displaying the command or shell being run
     now correctly inform the user if the shell is a login shell or
     not.

* Major changes in 0.1.3:

  1) HOME, LOGNAME and USER are set in the environment if the old
     environment is not being preserved.
  2) schroot now aborts earlier if no chroots are defined in
     schroot.conf, rather than failing with a confusing failed
     assertion error.
  3) An option parsing bug which could sometimes cause a crash has
     been fixed.

* Major changes in 0.1.2:

  1) Support for gettext has been added, to allow localisation into
     any language.
  2) If a command is specified, it will be searched for in $PATH.
     Previously, an absolute path was always required.

* Major changes in 0.1.1:

  1) Add a large number of pointer checks.

* Major changes in 0.1.0:

  1) Initial release.
  2) Debian packaging created.