Peter Dave Hello
9e12199468
apt clean after package install in clean-build.sh
2017-04-17 17:53:34 +08:00
Simon Fels
9e517f1f1d
Merge pull request #56 from morphis/f/check-for-apparmor
...
Check for AppArmor support before using aa-exec
2017-04-12 21:39:49 +02:00
Simon Fels
d7ccae072e
Check for AppArmor support before using aa-exec
2017-04-12 21:34:06 +02:00
Thomas Voß
74330e4efa
Add cmake-extras to clean-build
2017-04-12 14:14:25 +02:00
Simon Fels
7ce6b0d765
Use subdirectory in SNAP_USER_COMMON for our application data
2017-03-14 08:06:38 +01:00
Simon Fels
68768d10fe
Use SNAP_USER_COMMON to place our desktop files
2017-03-12 16:04:15 +01:00
Simon Fels
b5f3240400
Set XDG_DATA_HOME to SNAP_COMMON to have a common place for our app launchers
2017-03-12 14:32:04 +01:00
Simon Fels
7cdc186947
scripts: also install libproperties-cpp-dev during the build setup
2017-02-21 07:39:20 +01:00
Simon Fels
5881a514de
scripts: container-mgr: get rid of a few things (kmods, base uid, umount)
2017-02-19 11:39:36 +01:00
Simon Fels
6ce026bad4
Setup Android rootfs mount on container manager startup
2017-02-10 23:10:03 +01:00
Simon Fels
e0091c764b
Allow using a different data path for container setup
2017-02-07 12:12:23 +01:00
Simon Fels
f51669d17b
Drop classic scripts used for kernel module building
2017-02-07 12:12:23 +01:00
Simon Fels
2e3a82c429
Remove kernel module building inside the snap
2017-02-07 12:12:23 +01:00
Simon Fels
d12aad5c01
Merge pull request #34 from morphis/feature/minor-fixes
...
A few minor fixes to clean things up a bit
2017-02-03 08:04:09 +01:00
Simon Fels
b7937afc3c
Only warn when FUSE support for user namespaces couldn't be enabled
2017-01-31 08:46:07 +01:00
Simon Fels
e4682cab34
Drop armhf from the chroot setup script
2017-01-27 07:17:21 +01:00
Simon Fels
4219f40ac3
Add missing copyright header for the cross-build scripts
2017-01-27 07:16:49 +01:00
Simon Fels
423e325527
Fetch packages from updates and security pockets for cross-builds too
2017-01-27 07:12:19 +01:00
Marius Gripsgard
d13c29c3fe
Add simple script to mount android rootfs on non snap env
2017-01-26 08:36:46 +01:00
Simon Fels
383511b397
Disable module building and loading on non xenial systems
2017-01-20 16:49:41 +01:00
Simon Fels
d7d3ecaf1a
Add initial travis build configuration
...
We need to use docker here as travis only provides Ubuntu 14.04 based
images which are not enough for us to build everything.
2017-01-20 10:34:18 +01:00
Simon Fels
51c41dfd88
Remove unneeded setup code for the snap application
2017-01-15 14:13:45 +01:00
Simon Fels
3e60d9f8ae
Don't set XDG_DATA_HOME to read-only location
2017-01-15 14:13:10 +01:00
Simon Fels
2e964bd132
Create android image file with correct ownership
2017-01-09 07:04:48 +01:00
Simon Fels
8d2e3853d4
scripts: respect new unprivileged container model
2017-01-05 10:15:21 +01:00
Simon Fels
7f564c55eb
Build and load binder/ashmem kernel modules on service start
...
As both kernel modules are not part of the standard Ubuntu kernel we
need to build and load them at runtime. We bundle this together with
the container manager start and reuse the classic snap scripts to do
the actual build in a proper environment.
2016-12-13 13:51:40 +01:00
Simon Fels
cbb4beaac2
Restructure container manager startup script
...
Mount /cache and /data properly and stop bridge correctly.
2016-12-08 17:08:18 +01:00
Simon Fels
87da2f3744
Bind mount cache/data on startup from writable space
2016-12-08 07:12:09 +01:00
Simon Fels
6860338c4b
Use disk images instead of a rootfs tarball
2016-12-05 10:06:48 +01:00
Simon Fels
637523b8cf
Drop scripts we don't need anymore
2016-12-04 17:20:21 +01:00
Simon Fels
457bd794ff
Don't load kernel modules anymore
2016-12-04 17:17:33 +01:00
Simon Fels
a86a5847f8
Start bridge as part of the container manager
2016-12-04 17:16:55 +01:00
Simon Fels
a8704556da
Unload AppArmor profile for container management process
...
If we run the management process with the AppArmor profile loaded
from snap-confine various ashmem/binder operations are failing with
permission denied errors. To workaround this until this problem
is fixed we simply unload the AppArmor profile and continue to
execute completely without any profile loaded.
2016-12-04 17:07:44 +01:00
Simon Fels
32a5eaca69
Fix permissions of extracted rootfs content
2016-12-03 14:14:33 +01:00
Simon Fels
b10382d2d8
Reformat all code and use the Google cpp code style
2016-12-02 17:38:43 +01:00
Simon Fels
089e2daf22
Add simple script to build and load relevant kernel modules
2016-11-28 07:34:26 +01:00
Simon Fels
ba82e516f6
Add copyright header for bridge script
2016-11-27 16:02:53 +01:00
Simon Fels
06b529e0a0
Implement simple network bridge
2016-11-26 13:38:38 +01:00
Simon Fels
5619662b0b
Add simple sync script for Android builds
2016-11-11 09:57:44 +01:00
Simon Fels
89fa39bd01
Specify android root path for container
2016-10-21 19:55:22 +02:00
Simon Fels
4a0927c718
Load kernel modules for binder and ashmem on startup
2016-09-17 10:48:24 +02:00
Simon Fels
cd52c87639
Create rootfs version indicator
2016-09-17 10:48:24 +02:00
Simon Fels
18fd3734c0
Correct wrapper script name
2016-09-17 10:48:24 +02:00
Simon Fels
3ba9028844
Extra rootfs as part of the container manager startup
2016-09-17 10:48:24 +02:00
Simon Fels
6f6fc5c49c
Fix name of the android rootfs tarball
2016-09-17 10:48:24 +02:00
Simon Fels
117111ce20
Extend snap packaging with further details
2016-09-17 10:48:07 +02:00
Simon Fels
4e7d48ea4f
Simplify rootfs creation script by using existing env variable
2016-08-14 15:53:01 +02:00
Simon Fels
2b25f6f5bb
Rework container management
...
* based on liblxc now
* container is managed by a management process which needs to run as
root. LXC will take care of strict confinement of this container.
We still don't allow any direct hardware access.
* `anbox shell` command is gone. Same functionality can be archive
with the lxc-attach command.
2016-08-14 15:50:16 +02:00
Simon Fels
f6eb889b9e
scripts: fine tune create rootfs package script
2016-07-13 12:14:44 +02:00
Simon Fels
709807984f
Make sure Android package is constructed from top build dir
2016-07-11 18:33:42 +02:00