## ## fresh vivid instance , recreating the fun I'm having in bug 1427264 ## http://pad.lv/1427264 ## ssh in as ubuntu with your ssh keys sudo apt-get install ubuntu-dev-tools sbuild schroot debootstrap haveged ecryptfs-utils # add sbuild group, as it is used, and this way we can add ebar to it before running mk-sbuild # see bug LP: #1328689 for why 'keyctl' sudo addgroup sbuild sudo keyctl link @u @s sudo adduser --encrypt-home ebar sudo keyctl unlink @u @s ## follow the prompts here. I suggest a password of 'cubswin:)' sudo adduser ebar sudo sudo adduser ebar sbuild ## enable ssh password auth sudo sed -i 'm/PasswordAuthentication no/s,no,yes,' /etc/ssh/sshd_config sudo service ssh restart # now come in as 'ebar' using password. rel=trusty ; arch=amd64; mk-sbuild --eatmydata --arch=$arch $rel 2>&1 | tee /tmp/schroot-$rel-$arch.log $ cd /tmp $ name=$(schroot --chroot=chroot:trusty-amd64 --begin-session) $ schroot --chroot=$name --run-session cat /proc/mounts trusty-amd64 / overlayfs rw,relatime,lowerdir=/var/lib/schroot/union/underlay/trusty-amd64-f267f6d3-7b0e-4b54-b262-3e0519ffdad1,upperdir=/var/lib/schroot/union/overlay/trusty-amd64-f267f6d3-7b0e-4b54-b262-3e0519ffdad1,workdir=/var/lib/schroot/union/overlay/trusty-amd64-f267f6d3-7b0e-4b54-b262-3e0519ffdad1_work 0 0 proc /proc proc rw,nosuid,nodev,noexec,relatime 0 0 sysfs /sys sysfs rw,nosuid,nodev,noexec,relatime 0 0 devpts /dev/pts devpts rw,nosuid,noexec,relatime,gid=5,mode=620,ptmxmode=000 0 0 /dev/disk/by-uuid/a5b58c9e-b67a-4a12-8c89-7a87bb80ad49 /build ext4 rw,relatime,data=ordered 0 0 $ df Filesystem 1K-blocks Used Available Use% Mounted on udev 1010012 0 1010012 0% /dev tmpfs 204920 4616 200304 3% /run /dev/vda1 20342140 1907228 18418528 10% / tmpfs 1024584 4 1024580 1% /dev/shm tmpfs 5120 0 5120 0% /run/lock tmpfs 1024584 0 1024584 0% /sys/fs/cgroup /dev/vdb 41153856 49164 39007540 1% /mnt tmpfs 204920 0 204920 0% /run/user/1001 trusty-amd64 20342140 1907228 18418528 10% /var/lib/schroot/mount/trusty-amd64-f267f6d3-7b0e-4b54-b262-3e0519ffdad1 $ ls /home/ebar/ Access-Your-Private-Data.desktop README.txt ## clean up just for fun schroot --chroot=$name --end-session