From nobody Mon Jul 15 16:51:50 2024 X-Original-To: jail@mlmmj.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mlmmj.nyi.freebsd.org (Postfix) with ESMTP id 4WN7XR48bzz5RHFj for ; Mon, 15 Jul 2024 16:52:07 +0000 (UTC) (envelope-from marko.cupac@mimar.rs) Received: from j1.mimar.rs (j1.mimar.rs [193.53.106.128]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id 4WN7XP59Y6z4DB7 for ; Mon, 15 Jul 2024 16:52:05 +0000 (UTC) (envelope-from marko.cupac@mimar.rs) Authentication-Results: mx1.freebsd.org; dkim=pass header.d=mimar.rs header.s=20211119 header.b=IbM4BeSN; dmarc=pass (policy=reject) header.from=mimar.rs; spf=pass (mx1.freebsd.org: domain of marko.cupac@mimar.rs designates 193.53.106.128 as permitted sender) smtp.mailfrom=marko.cupac@mimar.rs Received: from j1.mimar.rs (localhost [127.0.2.128]) by j1.mimar.rs (Postfix) with ESMTP id 32E70C17E37 for ; Mon, 15 Jul 2024 18:51:58 +0200 (CEST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=mimar.rs; h= content-transfer-encoding:content-type:content-type:mime-version :x-mailer:organization:message-id:subject:subject:from:from:date :date:received:received; s=20211119; t=1721062313; x=1722876714; bh=bDtCqwh9vS/OgZCDDtZ64vl5A6pcSeFeXMZiHdOGKnY=; b=IbM4BeSNT8X0 kEpHyrpit3qSDPJ/yGhFYmORnZXizhYvPI1vS/rfn1rNfdPHvWw9h8WgccSlDuYh iH7EjMJ5Iahm7LmpVPFZWtHXG9a3qizelgyA3pQxIpsuvoFGvrl/o6Ty8Ex9tC6M 2oFhqzaEvvQHkZnesG0MdQbK55Jd34E= X-Virus-Scanned: amavisd-new at mimar.rs Received: from j1.mimar.rs ([127.0.2.128]) by j1.mimar.rs (amavis.mimar.rs [127.0.2.128]) (amavisd-new, port 10026) with LMTP id xF4QlWkSnr4o for ; Mon, 15 Jul 2024 18:51:53 +0200 (CEST) Received: from sanri (cable-178-148-110-217.dynamic.sbb.rs [178.148.110.217]) by j1.mimar.rs (Postfix) with ESMTPSA id 407C0C17D4D for ; Mon, 15 Jul 2024 18:51:52 +0200 (CEST) Date: Mon, 15 Jul 2024 18:51:50 +0200 From: Marko =?UTF-8?B?Q3VwYcSH?= To: jail@freebsd.org Subject: fakeroot in nested jail Message-ID: <20240715185150.64156708@sanri> Organization: Mimar X-Mailer: Claws Mail 4.0.0 (GTK+ 3.24.33; x86_64-pc-linux-gnu) List-Id: Discussion about FreeBSD jail(8) List-Archive: https://lists.freebsd.org/archives/freebsd-jail List-Help: List-Post: List-Subscribe: List-Unsubscribe: Sender: owner-freebsd-jail@FreeBSD.org MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: quoted-printable X-Spamd-Bar: -- X-Spamd-Result: default: False [-2.78 / 15.00]; NEURAL_HAM_LONG(-1.00)[-1.000]; NEURAL_HAM_MEDIUM(-1.00)[-1.000]; NEURAL_HAM_SHORT(-1.00)[-0.998]; R_MIXED_CHARSET(0.71)[subject]; DMARC_POLICY_ALLOW(-0.50)[mimar.rs,reject]; MID_RHS_NOT_FQDN(0.50)[]; R_DKIM_ALLOW(-0.20)[mimar.rs:s=20211119]; R_SPF_ALLOW(-0.20)[+mx]; MIME_GOOD(-0.10)[text/plain]; HAS_ORG_HEADER(0.00)[]; MIME_TRACE(0.00)[0:+]; RCPT_COUNT_ONE(0.00)[1]; RCVD_VIA_SMTP_AUTH(0.00)[]; ASN(0.00)[asn:12823, ipnet:193.53.106.0/24, country:RS]; RCVD_COUNT_THREE(0.00)[3]; ARC_NA(0.00)[]; FROM_EQ_ENVFROM(0.00)[]; FROM_HAS_DN(0.00)[]; MLMMJ_DEST(0.00)[jail@freebsd.org]; TO_DN_NONE(0.00)[]; PREVIOUSLY_DELIVERED(0.00)[jail@freebsd.org]; TO_MATCH_ENVRCPT_ALL(0.00)[]; RCVD_TLS_LAST(0.00)[]; DKIM_TRACE(0.00)[mimar.rs:+] X-Rspamd-Queue-Id: 4WN7XP59Y6z4DB7 Hi, I get the following errors when trying to build mail/sympa in poudriere running inside a jail, but not when poudriere runs directly on host: fakeroot daemon: socket (Protocol not supported) fakeroot: error while starting the `faked' daemon. All three of the host, top-level jail which runs poudriere, as well as nested poudriere jail which builds ports run 14.1-RELEASE. ~1700 other ports build just fine. I filed PR in bugzilla, but port maintainer can't reproduce the problem (doesn't have jailed poudriere setup): https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=3D279572 Is there some allow.something, or other jail config directive which would provide for fakeroot in a nested jail? Here's complete jail.conf: path =3D "/home/jail/${host.hostname}"; exec.start =3D "/bin/sh /etc/rc"; exec.stop =3D "/bin/sh /etc/rc.shutdown"; exec.clean; mount.devfs; pkg2_example_org { host.hostname =3D pkg2.example.org; host.domainname =3D example.com; ip4.addr =3D 'lo1|127.0.1.55/32'; ip4.addr +=3D 'em0|192.0.2.55/32'; ip6.addr +=3D 'lo1|::55/128'; children.max =3D 200; enforce_statfs =3D 1; sysvmsg =3D new; sysvsem =3D new; sysvshm =3D new; persist; allow.chflags; allow.mlock; allow.mount; allow.mount.devfs; allow.mount.fdescfs; allow.mount.nullfs; allow.mount.procfs; allow.mount.tmpfs; allow.mount.zfs; allow.raw_sockets; allow.socket_af; exec.created +=3D "zfs jail $name home/poudriere"; exec.created +=3D "zfs set jailed=3Don home/poudriere"; } --=20 Before enlightenment - chop wood, draw water. After enlightenment - chop wood, draw water. Marko Cupa=C4=87 https://www.mimar.rs/