X-Git-Url: http://git.annexia.org/?a=blobdiff_plain;f=febootstrap.pod;h=e208603bc9fd670857df1b7419fffd1d2986c024;hb=c6c690b5afca968fb2e87343646f51a13f0c2337;hp=b2d7470aa56062880637f4f8484cf5599d3906f7;hpb=9cf3beefb865ea3e1a4bbe570d632649540788cc;p=febootstrap.git diff --git a/febootstrap.pod b/febootstrap.pod index b2d7470..e208603 100644 --- a/febootstrap.pod +++ b/febootstrap.pod @@ -64,6 +64,36 @@ RPMs and metadata. However if you give the C<--no-clean> option, then the yum repository is left. This is useful if you want to run further yum commands inside the filesystem by hand. +=item B<-p "proxyurl"> + +=item B<--proxy="proxyurl"> + +URL to the proxy server that yum should use. + +=item B<-u source> + +=item B<--updates=source> + +Pull in updates from an additional updates repository. The possible +sources are: + +=over 4 + +=item -u C (a URL) + +Get updates from the specific URL. + +=item -u C (an updates repository name) + +Get updates from the public mirrors of the named repository +(eg. C). See REPOSITORIES below. + +=item -u C (default) + +Don't add an updates repository. This is the default. + +=back + =back =head1 REPOSITORIES @@ -99,13 +129,24 @@ so that yum thinks it is running as root. Fakeroot keeps track of directory as C/fakeroot.log>. This logfile is indexed by inode number, which makes certain -operations safe and other operations unsafe. For example, deleting -files is usually safe. Files should be replaced only by doing: +operations safe and other operations unsafe. +Files should be replaced only by doing: echo updated-content > old-file -(since that preserves the original inode). In most cases it's usually -safest to use C. +(since that preserves the original inode). + +Deleting files and then creating new ones (even with a different name) +is usually unsafe, because the new files might reuse inodes claimed by +the old files, and so appear with peculiar permissions +(eg. unreadable, or as a symbolic link). + +Deleting files is also usually unsafe, although the reasons are more +subtle. If you just use C then the inode number is not deleted +from C which means it can be reused by another file +later on. + +In most cases it's usually safest to use C. You can use the fakeroot logfile in a number of ways: @@ -118,6 +159,11 @@ permissions. =item * +Use L to install a file with permissions +in the root filesystem. + +=item * + Generate an initramfs (compressed cpio) file containing the correct permissions using the tool C. @@ -148,22 +194,24 @@ C<--foreign> installs - see previous point). =head1 OTHER RESTRICTIONS AND BUGS -Some C<%post> scripts do not run correctly. The most common case is -C. Since this binary is statically linked, fakeroot -and fakechroot's LD_PRELOAD hack does not work, so effectively -ldconfig tries to update the system cache. You will see the following -error: +The following programs are not run during C<%post> scriptlets (because +they are all statically linked, and fakechroot cannot run statically +linked programs). + +=over 4 + +=item C (from many packages) - /sbin/ldconfig: Can't create temporary cache file /etc/ld.so.cache~: Permission denied +=item C (from C) -This error is mostly harmless. Just run C the first -time you boot into the newly created Fedora system. +=item C (from C) + +=item C (from C) + +=back -Another error you will see is with C -which is caused for the same reason - this binary is statically -linked. We have examined what this binary does, and it is not really -necessary for installs. If it makes you happier, you can run it the -first time you boot the new system. +If you wish, you can run them the first time you boot into the new +machine. febootstrap recreates the repository anew each time, and this causes yum to download all the RPMs every time. This is very wasteful, and @@ -178,6 +226,7 @@ L L, L, L, +L, L, L, L,