Step 2: Prep chroot for yum Usage

Installing the release package (e.g., centos-release, redhat-release) into the chroot will let yum work:

# rpm -Uvh --nodeps --root=/chroot/ centos-release-5-1.0.el5.centos.1.x86_64.rpm

Step 3: Install into the chroot

The RPM also installs the software into the chroot, but yum will handle dependencies and make things much simpler:

# yum --installroot=/chroot/install bash yum vim-minimal

At a minimum, I recommend a shell (bash), yum to install software, and the vim editor to modify files in the chroot.

Step 4: Network Configuration Files

If you want to access the network from within the chroot, you need a resolv.conf file (lets applications know where your DNS servers are to be found) and:

# mkdir /chroot/etc/
# mkdir /chroot/etc/sysconfig
# cp /etc/resolv.conf /chroot/etc/
# cp /etc/sysconfig/network /chroot/etc/sysconfig/

Buy this article as PDF

Express-Checkout as PDF
Price $2.95
(incl. VAT)

Buy Linux Magazine

Get it on Google Play

US / Canada

Get it on Google Play

UK / Australia

Related content

  • Command Line: Debootstrap

    We provide basic instructions for using Debian's debootstrap to create a schroot jail for building and testing packages.

  • UCK

    We’ll show you how to create a custom Ubuntu ISO with the Ubuntu Customization Kit.

  • Free Software Projects

    Free software covers such a diverse range of applications that it can be hard to find the perfect tool. In this column,we pick the best of the bunch.This month you’ll learn about XFce 4.2, the PC in the PC,QBuildkde,and the latest news on the Sarge Release.

  • Linux From Scratch

    Linux From Scratch helps you create a custom Linux system with everything you need and nothing more. And as you build your system, you’ll get an insider’s look at how Linux really works.

  • Linux Intrusion Detection System

    If you're ready for mandatory access control and you're looking for an alternative to SELinux and AppArmor, try locking down your system with Linux Intrusion Detection System.

comments powered by Disqus

Direct Download

Read full article as PDF:

Sandboxing.pdf (812.63 kB)