And of course, this is where I came to my wits' end: I can compile the
new elpi successfully... but I have no way to install this new elpi
binary packages in the schroot to test it against different coq-elpi!
dd-cross-schroot-cmd -s $sessionid -a $targetarch apt-get install ./*foo*_3.14-159_$targetarch.deb
And of course, this is where I came to my wits' end: I can compile the
new elpi successfully... but I have no way to install this new elpi
binary packages in the schroot to test it against different coq-elpi!
I'm quite fond of the single-page just-follow-the-steps tutorial:
https://dsa.debian.org/doc/schroot/
hence my dream is to be able to do something like the following to get
not only a cross-compilation but also cross-running through whatever
virtual system (say provided by a dd-cross-schroot package) :
[...]
Of course, that wouldn't be as good as an actual box of the right architecture, but it would definitely help getting many problems
solved. As you may have noticed from the above I'm quite clueless on
how schroot and cross-compilation work - and to be honest, I'd like to
stay so as I have other itches to scratch and hopefully other areas of expertise - but I'm hopeful others have the competence and the will to provide solutions.
And of course, this is where I came to my wits' end: I can compile
the
new elpi successfully... but I have no way to install this new elpi binary packages in the schroot to test it against different coq-
elpi!
Yes, the usual recommendations are "unpack and try pointing to it via
stuff like LD_LIBRARY_PATH, hopefully such stuff exists for your
case".
It doesn't: it's a mix of languages. C, OCaml, elpi and Coq I would
say.
Consider using local qemu chroots instead.
I'd like a one-page easy-to-use tutorial on this.
dd-cross-schroot-cmd -s $sessionid -a $targetarch apt-get install ./*foo*_3.14-159_$targetarch.deb
This still runs random code as root.
I don't think running random code as root in a virtual environment I'm
going to delete before the end of the day is a security issue.
BTW, IIUC, it is be possible with namespaces to give root privileges (or enough to install packages) to anybody inside a container. [1] could be a way, but it needs unprivileged user namespaces.
But I understood that DSA
was reluctant to enable unprivileged user namespaces on Debian machines because of security concerns... Couldn't an exception be made for porterboxes? After all, these are dedicated to porting and nothing sensitive should be done there.
Sysop: | Keyop |
---|---|
Location: | Huddersfield, West Yorkshire, UK |
Users: | 546 |
Nodes: | 16 (0 / 16) |
Uptime: | 161:50:54 |
Calls: | 10,385 |
Calls today: | 2 |
Files: | 14,057 |
Messages: | 6,416,500 |