-
Notifications
You must be signed in to change notification settings - Fork 358
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Initializing OPAM in a Chroot container #4120
Comments
https://lists.linuxcontainers.org/pipermail/lxc-devel/2013-October/005761.html lxc instead of chroot, but likely the same issue |
As it is a bubblewrap issue, we rely on their bugtracker for this kind of things. |
Hi @brettgilio. If you're running opam in a chroot then until an implementation for #4089 lands my recommendation would be to just disable sandboxing at |
Why? You've got another sandbox around the opam invocation, and Linux typically makes it pretty difficult to compose different sandboxes. I'll close this, as there's not much we can do much from within opam, but if there's a good reason to try to make nested sandboxing work, please do reopen. |
FYI, I hit the same problem running |
Hey all, I am trying to initialize OPAM inside of chroot using an unprivileged user. The chroot is running debian testing with opam
2.0.5
and bubblewrap0.4.0
.When I try to initialize opam it fails with:
Fair enough. I will just mount my host system /proc to my chroot environment. But this returns a slightly different.
Any ideas what the problem here is?
Edit: I am aware I can just
--disable-sandboxing
but I am explicitly trying to avoid that configuration.The text was updated successfully, but these errors were encountered: