
Selinux blocks the following: - gosu execution labeling (no selinux policy). - permission is denied to the container's user on the tree source binding under /src. Using a different location doesn't solve the issue. The workaround consists in disabling selinux labeling when running the container.
1.2 KiB
1.2 KiB
Building Redox using Docker images with the toolchain
All you need is git, make, qemu, fuse and docker. The method requires a non-privileged user able to run the docker
command, which is usually achieved by adding the user to the docker
group.
git clone https://github.com/redox-os/redox.git ; cd redox #1
make pull #2
docker build -t redox docker/ #3
docker run --cap-add MKNOD --cap-add SYS_ADMIN \
--device /dev/fuse -e LOCAL_USER_ID="$(id -u)" \
-v "$(pwd):/src" --rm redox make all #4
make qemu #5
To unpack:
- Creates a local copy of the repository.
- Updates all the submodules in the repository.
- Creates a new image in the local image repository named
redox
with Redox toolchain installed. You only need to rebuild the image if you want to update the toolchain. - Builds Redox using the
redox
image. The arguments allow the container to usefuse
and ensure the resulting files are owned by the current user. - Runs Redox.
On selinux systems, replace #4 with:
docker run --cap-add MKNOD --cap-add SYS_ADMIN \
--device /dev/fuse -e LOCAL_USER_ID="$(id -u)" \
-v "$(pwd):/src" --security-opt label=disable \
--rm redox make all