Commit graph

55 commits

Author SHA1 Message Date
Peter Dave Hello
9e12199468 apt clean after package install in clean-build.sh 2017-04-17 17:53:34 +08:00
Simon Fels
9e517f1f1d Merge pull request #56 from morphis/f/check-for-apparmor
Check for AppArmor support before using aa-exec
2017-04-12 21:39:49 +02:00
Simon Fels
d7ccae072e Check for AppArmor support before using aa-exec 2017-04-12 21:34:06 +02:00
Thomas Voß
74330e4efa Add cmake-extras to clean-build 2017-04-12 14:14:25 +02:00
Simon Fels
7ce6b0d765 Use subdirectory in SNAP_USER_COMMON for our application data 2017-03-14 08:06:38 +01:00
Simon Fels
68768d10fe Use SNAP_USER_COMMON to place our desktop files 2017-03-12 16:04:15 +01:00
Simon Fels
b5f3240400 Set XDG_DATA_HOME to SNAP_COMMON to have a common place for our app launchers 2017-03-12 14:32:04 +01:00
Simon Fels
7cdc186947 scripts: also install libproperties-cpp-dev during the build setup 2017-02-21 07:39:20 +01:00
Simon Fels
5881a514de scripts: container-mgr: get rid of a few things (kmods, base uid, umount) 2017-02-19 11:39:36 +01:00
Simon Fels
6ce026bad4 Setup Android rootfs mount on container manager startup 2017-02-10 23:10:03 +01:00
Simon Fels
e0091c764b Allow using a different data path for container setup 2017-02-07 12:12:23 +01:00
Simon Fels
f51669d17b Drop classic scripts used for kernel module building 2017-02-07 12:12:23 +01:00
Simon Fels
2e3a82c429 Remove kernel module building inside the snap 2017-02-07 12:12:23 +01:00
Simon Fels
d12aad5c01 Merge pull request #34 from morphis/feature/minor-fixes
A few minor fixes to clean things up a bit
2017-02-03 08:04:09 +01:00
Simon Fels
b7937afc3c Only warn when FUSE support for user namespaces couldn't be enabled 2017-01-31 08:46:07 +01:00
Simon Fels
e4682cab34 Drop armhf from the chroot setup script 2017-01-27 07:17:21 +01:00
Simon Fels
4219f40ac3 Add missing copyright header for the cross-build scripts 2017-01-27 07:16:49 +01:00
Simon Fels
423e325527 Fetch packages from updates and security pockets for cross-builds too 2017-01-27 07:12:19 +01:00
Marius Gripsgard
d13c29c3fe Add simple script to mount android rootfs on non snap env 2017-01-26 08:36:46 +01:00
Simon Fels
383511b397 Disable module building and loading on non xenial systems 2017-01-20 16:49:41 +01:00
Simon Fels
d7d3ecaf1a Add initial travis build configuration
We need to use docker here as travis only provides Ubuntu 14.04 based
images which are not enough for us to build everything.
2017-01-20 10:34:18 +01:00
Simon Fels
51c41dfd88 Remove unneeded setup code for the snap application 2017-01-15 14:13:45 +01:00
Simon Fels
3e60d9f8ae Don't set XDG_DATA_HOME to read-only location 2017-01-15 14:13:10 +01:00
Simon Fels
2e964bd132 Create android image file with correct ownership 2017-01-09 07:04:48 +01:00
Simon Fels
8d2e3853d4 scripts: respect new unprivileged container model 2017-01-05 10:15:21 +01:00
Simon Fels
7f564c55eb Build and load binder/ashmem kernel modules on service start
As both kernel modules are not part of the standard Ubuntu kernel we
need to build and load them at runtime. We bundle this together with
the container manager start and reuse the classic snap scripts to do
the actual build in a proper environment.
2016-12-13 13:51:40 +01:00
Simon Fels
cbb4beaac2 Restructure container manager startup script
Mount /cache and /data properly and stop bridge correctly.
2016-12-08 17:08:18 +01:00
Simon Fels
87da2f3744 Bind mount cache/data on startup from writable space 2016-12-08 07:12:09 +01:00
Simon Fels
6860338c4b Use disk images instead of a rootfs tarball 2016-12-05 10:06:48 +01:00
Simon Fels
637523b8cf Drop scripts we don't need anymore 2016-12-04 17:20:21 +01:00
Simon Fels
457bd794ff Don't load kernel modules anymore 2016-12-04 17:17:33 +01:00
Simon Fels
a86a5847f8 Start bridge as part of the container manager 2016-12-04 17:16:55 +01:00
Simon Fels
a8704556da Unload AppArmor profile for container management process
If we run the management process with the AppArmor profile loaded
from snap-confine various ashmem/binder operations are failing with
permission denied errors. To workaround this until this problem
is fixed we simply unload the AppArmor profile and continue to
execute completely without any profile loaded.
2016-12-04 17:07:44 +01:00
Simon Fels
32a5eaca69 Fix permissions of extracted rootfs content 2016-12-03 14:14:33 +01:00
Simon Fels
b10382d2d8 Reformat all code and use the Google cpp code style 2016-12-02 17:38:43 +01:00
Simon Fels
089e2daf22 Add simple script to build and load relevant kernel modules 2016-11-28 07:34:26 +01:00
Simon Fels
ba82e516f6 Add copyright header for bridge script 2016-11-27 16:02:53 +01:00
Simon Fels
06b529e0a0 Implement simple network bridge 2016-11-26 13:38:38 +01:00
Simon Fels
5619662b0b Add simple sync script for Android builds 2016-11-11 09:57:44 +01:00
Simon Fels
89fa39bd01 Specify android root path for container 2016-10-21 19:55:22 +02:00
Simon Fels
4a0927c718 Load kernel modules for binder and ashmem on startup 2016-09-17 10:48:24 +02:00
Simon Fels
cd52c87639 Create rootfs version indicator 2016-09-17 10:48:24 +02:00
Simon Fels
18fd3734c0 Correct wrapper script name 2016-09-17 10:48:24 +02:00
Simon Fels
3ba9028844 Extra rootfs as part of the container manager startup 2016-09-17 10:48:24 +02:00
Simon Fels
6f6fc5c49c Fix name of the android rootfs tarball 2016-09-17 10:48:24 +02:00
Simon Fels
117111ce20 Extend snap packaging with further details 2016-09-17 10:48:07 +02:00
Simon Fels
4e7d48ea4f Simplify rootfs creation script by using existing env variable 2016-08-14 15:53:01 +02:00
Simon Fels
2b25f6f5bb Rework container management
* based on liblxc now
* container is managed by a management process which needs to run as
  root. LXC will take care of strict confinement of this container.
  We still don't allow any direct hardware access.
* `anbox shell` command is gone. Same functionality can be archive
  with the lxc-attach command.
2016-08-14 15:50:16 +02:00
Simon Fels
f6eb889b9e scripts: fine tune create rootfs package script 2016-07-13 12:14:44 +02:00
Simon Fels
709807984f Make sure Android package is constructed from top build dir 2016-07-11 18:33:42 +02:00