focal (5) schroot.conf.5.gz

Provided by: schroot_1.6.10-9ubuntu0.1_amd64 bug

NAME

       schroot.conf - chroot definition file for schroot

DESCRIPTION

       schroot.conf is a plain UTF-8 text file, describing the chroots available for use with schroot.

       Comments  are  introduced following a ‘#’ (“hash”) character at the beginning of a line, or following any
       other text.  All text right of the ‘#’ is treated as a comment.

       The configuration format is an INI-style format, split  into  groups  of  key-value  pairs  separated  by
       section names in square brackets.

   General options
       A  chroot  is  defined  as a group of key-value pairs, which is started by a name in square brackets on a
       line by itself.  The file may contain multiple groups which therefore define multiple chroots.

       A chroot definition is started by the name of the chroot in square brackets.  For example,

              [sid]

       The name is subject to certain naming restrictions.  For further details, see the section “Chroot  Names”
       below.

       This is then followed by several key-value pairs, one per line:

       type=type
              The type of the chroot.  Valid types are ‘plain’, ‘directory’, ‘file’, ‘loopback’, ‘block-device’,
              ‘btrfs-snapshot’, ‘zfs-snapshot’ and ‘lvm-snapshot’.  If empty or omitted,  the  default  type  is
              ‘plain’.  Note that ‘plain’ chroots do not run setup scripts and mount filesystems; ‘directory’ is
              recommended for normal use (see “Plain and directory chroots”, below).

       description=description
              A short description of the chroot.  This may be localised for different languages; see the section
              “Localisation” below.

       priority=number
              Set  the  priority of a chroot.  number is a positive integer indicating whether a distribution is
              older than another.  For  example,  “oldstable”  and  “oldstable-security”  might  be  ‘0’,  while
              “stable”  and  “stable-security”  are ‘1’, “testing” is ‘2’ and “unstable” is ‘3’.  The values are
              not important, but the difference between them is.  This option is deprecated and no  longer  used
              by  schroot,  but  is  still  permitted  to  be used; it will be obsoleted and removed in a future
              release.

       message-verbosity=verbosity
              Set the verbosity of messages printed by schroot when setting up, running commands and cleaning up
              the  chroot.   Valid  settings  are  ‘quiet’  (suppress most messages), ‘normal’ (the default) and
              ‘verbose’ (show all messages).  This setting is overridden by the options --quiet and --verbose.

       users=user1,user2,...
              A comma-separated list of users which are allowed access to the chroot.  If empty or  omitted,  no
              users will be allowed access (unless a group they belong to is also specified in groups).

       groups=group1,group2,...
              A  comma-separated list of groups which are allowed access to the chroot.  If empty or omitted, no
              groups of users will be allowed access.

       root-users=user1,user2,...
              A comma-separated list of users which are allowed password-less root access  to  the  chroot.   If
              empty  or  omitted,  no  users  will be allowed root access without a password (but if a user or a
              group they belong to is in users or groups, respectively, they may gain access with  a  password).
              See the section “Security” below.

       root-groups=group1,group2,...
              A  comma-separated  list  of groups which are allowed password-less root access to the chroot.  If
              empty or omitted, no users will be allowed root access without a password (but  if  a  user  or  a
              group  they  belong to is in users or groups, respectively, they may gain access with a password).
              See the section “Security” below.

       aliases=alias1,alias2,...
              A comma-separated list of aliases (alternate names) for this chroot.  For example, a chroot  named
              “sid”  might  have  an  ‘unstable’  alias for convenience.  Aliases are subject to the same naming
              restrictions as the chroot name itself.

       profile=directory

       script-config=filename
              The behaviour of the chroot setup scripts may be customised on a per-chroot  basis  by  setting  a
              specific  configuration  profile.   The  directory  is  relative  to /etc/schroot.  The default is
              ‘default’.  The files in this directory are sourced by the setup scripts, and so  their  behaviour
              may  be  customised  by  selecting  the  appropriate profile.  Alternatives are ‘minimal’ (minimal
              configuration),  ‘desktop’  (for  running  desktop  applications  in  the  chroot,   making   more
              functionality from the host system available in the chroot) and ‘sbuild’ (for using the chroot for
              Debian package building).  Other packages may provide additional profiles.  The default values  of
              the  keys setup.config, setup.copyfiles, setup.fstab and setup.nssdatabases are set based upon the
              profile setting.

              Note that the profile key replaces the older script-config key.  The script-config key is  exactly
              the  same as profile, but has “/config” appended to it.  The default filename is ‘default/config’.
              Either of these keys may be used.  If both are present, then script-config  will  take  precedence
              (profile  will  be  unset).   script-config is deprecated and will be removed in a future release.
              Note that profile is equivalent to  script-config  if  the  file  sourced  by  script-config  only
              contains  the  standard variables provided by schroot; if any additional variables or shell script
              fragments have been added, please also set setup.config, which will continue to allow this file to
              be  sourced.   It  is  recommended  to replace the use of the sourced file with additional keys in
              schroot.conf where possible, but  it  will  continue  to  be  possible  to  source  an  additional
              configuration file using setup.config.

              Desktop  users  should  note  that the fstab file desktop/fstab will need editing if you use gdm3;
              please see the comments in this file  for  further  instructions.   The  preserve-environment  key
              should also be set to ‘true’ so that the environment is preserved inside the chroot.

              If  none  of the configuration profiles provided above meet your needs, then they may be edited to
              further customise them, and/or copied and used as a template for entirely new profiles.

              Note that the different profiles have different security implications; see the section  “Security”
              below for further details.

       setup.config=filename
              This key specifies a file which the setup scripts will source when they are run.  This defaults to
              the same value as set by script-config.  The file is a Bourne shell script, and in consequence may
              contain any valid shell code, in addition to simple variable assignments.  This will, for example,
              allow behaviour to be customised according to the specific chroot type or  name.   Note  that  the
              script will be sourced once for each and every script invocation, and must be idempotent.

              All  the  default settings in this file are now settable using configuration keys in schroot.conf,
              as detailed below.  Existing configurations should be modified to use these keys in place of  this
              file.   See schroot-script-config(5) for further details.  This type of setup script configuration
              file is no longer provided as part of the standard profiles, but will continue to  be  sourced  if
              present and this key is set.

       setup.copyfiles=filename
              A file containing a list of files to copy into the chroot (one file per line).  The file will have
              the same absolute location inside the chroot.

       setup.fstab=filename
              The filesystem table file to be used to mount filesystems within the chroot.  The format  of  this
              file  is  the  same  as  for  /etc/fstab, documented in fstab(5).  The only difference is that the
              mountpoint path fs_dir is  relative  to  the  chroot,  rather  than  the  root.   Also  note  that
              mountpoints  are  canonicalised on the host, which will ensure that absolute symlinks point inside
              the chroot, but complex paths containing multiple symlinks may  be  resolved  incorrectly;  it  is
              inadvisable to use nested symlinks as mountpoints.

       setup.nssdatabases=filename
              A  file listing the system databases to copy into the chroot.  The default databases are ‘passwd’,
              ‘shadow’, ‘group’  and  ‘gshadow’.   Other  potential  databases  which  could  be  added  include
              ‘services’, ‘protocols’, ‘networks’, and ‘hosts’.  The databases are copied using getent(1) so all
              database sources listed in /etc/nsswitch.conf will be used for each database.

       setup.services=service1,service2,...
              A comma-separated list of services to run in the chroot.  These will be started when  the  session
              is started, and stopped when the session is ended.

       command-prefix=command,option1,option2,...
              A comma-separated list of a command and the options for the command.  This command and its options
              will be prefixed to all commands run inside the chroot.  This is useful for adding  commands  such
              as  nice, ionice or eatmydata for all commands run inside the chroot.  nice and ionice will affect
              CPU and I/O scheduling.   eatmydata  ingores  filesystem  fsync  operations,  and  is  useful  for
              throwaway snapshot chroots where you don't care about dataloss, but do care about high speed.

       personality=persona
              Set  the personality (process execution domain) to use.  This option is useful when using a 32-bit
              chroot on 64-bit system, for example.   Valid  options  on  Linux  are  ‘bsd’,  ‘hpux’,  ‘irix32’,
              ‘irix64’,  ‘irixn32’,  ‘iscr4’,  ‘linux’,  ‘linux32’,  ‘linux_32bit’,  ‘osf4’,  ‘osr5’,  ‘riscos’,
              ‘scorvr3’, ‘solaris’, ‘sunos’, ‘svr4’, ‘uw7’, ‘wysev386’,  and  ‘xenix’.   The  default  value  is
              ‘linux’.  There is also the special option ‘undefined’ (personality not set).  For a 32-bit chroot
              on a 64-bit system, ‘linux32’ is the option required.  The only valid option for non-Linux systems
              is ‘undefined’.  The default value for non-Linux systems is ‘undefined’.

       preserve-environment=true|false
              By default, the environment will not be preserved inside the chroot, instead a minimal environment
              will be used.  Set to true to always preserve the environment.  This is useful  for  example  when
              running  X  applications inside the chroot, which need the environment to function correctly.  The
              environment may also be preserved using the --preserve-environment option.

       shell=shell
              When running a login shell a number of potential shells will be considered,  in  this  order:  the
              command   in   the   SHELL   environment   variable   (if   --preserve-environment   is  used,  or
              preserve-environment is enabled), the user's shell in the ‘passwd’ database, /bin/bash and finally
              /bin/sh.   This  setting  overrides  this  list,  and  will  use  the  shell specified.  It may be
              overridden using the --shell option.

       environment-filter=regex
              The environment to be set in the chroot will be filtered in order to remove environment  variables
              which  may  pose  a security risk.  Any environment variable matching the specified POSIX extended
              regular expression will be removed prior to executing any command in the chroot.

              Potentially dangerous environment variables are removed for safety by default using the  following
              regular expression: “^(BASH_ENV|CDPATH|ENV|HOSTALIASES|IFS|KRB5_CONFIG|KRBCONFDIR|KRBTKFILE
              |KRB_CONF|LD_.*|LOCALDOMAIN|NLSPATH|PATH_LOCALE|RES_OPTIONS|TERMINFO|TERMINFO_DIRS|TERMPATH)$”.

   Plain and directory chroots
       Chroots of type ‘plain’ or ‘directory’ are directories accessible in the filesystem.  The two  types  are
       equivalent  except  for  the fact that directory chroots run setup scripts, whereas plain chroots do not.
       In consequence, filesystems such as /proc are not mounted in plain chroots; it is the  responsibility  of
       the  system  administrator to configure such chroots by hand, whereas directory chroots are automatically
       configured.   Additionally,  directory  chroots  implement  the  filesystem  union  chroot  options  (see
       “Filesystem Union chroot options”, below).

       These chroot types have an additional (mandatory) configuration option:

       directory=directory
              The  directory  containing the chroot environment.  This is where the root will be changed to when
              executing a login shell or a command.   The  directory  must  exist  and  have  read  and  execute
              permissions  to  allow  users  access  to  it.  Note that on Linux systems it will be bind-mounted
              elsewhere for use as a chroot; the directory for ‘plain’  chroots  is  mounted  with  the  --rbind
              option  to  mount(8),  while for ‘directory’ chroots --bind is used instead so that sub-mounts are
              not preserved (they should be set in the fstab file just like in /etc/fstab on the host).

   File chroots
       Chroots of type ‘file’ are files on the current filesystem containing an archive  of  the  chroot  files.
       They implement the source chroot options (see “Source chroot options”, below).  Note that a corresponding
       source chroot (of type ‘file’) will be created for each chroot of  this  type;  this  is  for  convenient
       access  to  the  source  archive,  e.g.  for  the  purpose of updating. These additional options are also
       implemented:

       file=filename
              The file containing the archived chroot  environment  (mandatory).   This  must  be  a  tar  (tape
              archive),  optionally  compressed  with gzip, bzip2, xz, lzop or lz4.  The file extensions used to
              determine the type are .tar, .tar.gz, .tar.bz2, .tar.xz, .tar.lzop, .tar.lz4,  .tgz,  .tbz,  .txz,
              .tzo  and  .tlz4.   This  file must be owned by the root user, and not be writable by other.  Note
              that zip archives are no longer supported; zip was not able to  archive  named  pipes  and  device
              nodes, so was not suitable for archiving chroots.

       location=path
              This  is the path to the chroot inside the archive.  For example, if the archive contains a chroot
              in /squeeze, you would specify “/squeeze” here.  If the chroot is the only thing in  the  archive,
              i.e.  /  is  the  root  filesystem  for  the  chroot, this option should be left blank, or omitted
              entirely.

   Loopback chroots
       Chroots of type ‘loopback’ are a filesystem available as a file on disk, accessed via a  loopback  mount.
       The  file  will  be  loopback  mounted and unmounted on demand.  Loopback chroots implement the mountable
       chroot and filesystem union chroot options (see “Mountable chroot options” and “Filesystem  Union  chroot
       options”, below), plus an additional option:

       file=filename
              This  is  the  filename  of  the file containing the filesystem, including the absolute path.  For
              example “/srv/chroot/sid”.

   Block device chroots
       Chroots of type ‘block-device’ are a filesystem available on an unmounted block device.  The device  will
       be  mounted  and unmounted on demand.  Block device chroots implement the mountable chroot and filesystem
       union chroot options (see “Mountable chroot options” and “Filesystem Union chroot options”, below),  plus
       an additional option:

       device=device
              This  is  the  device  name  of  the  block  device,  including  the  absolute path.  For example,
              “/dev/sda5”.

   Btrfs snapshot chroots
       Chroots of type ‘btrfs-snapshot’ are a Btrfs snapshot created from  an  existing  Btrfs  subvolume  on  a
       mounted  Btrfs  filesystem.  A snapshot will be created from this source subvolume on demand at the start
       of a session, and then the snapshot will be mounted.  At the end of the session,  the  snapshot  will  be
       unmounted  and  deleted.   This  chroot  type  implements  the  source chroot options (see “Source chroot
       options”, below).  Note that a corresponding source chroot (of type ‘directory’) will be created for each
       chroot  of  this  type;  this is for convenient access to the source volume. These additional options are
       also implemented:

       btrfs-source-subvolume=directory
              The directory containing the source subvolume.

       btrfs-snapshot-directory=directory
              The directory in which to store the snapshots of the above source subvolume.

   ZFS snapshot chroots
       Chroots of type ‘zfs-snapshot’ are a ZFS clone created from an existing  ZFS  dataset.   A  snapshot  and
       clone  will be created from this source subvolume on demand at the start of a session, and then the clone
       will be mounted.  At the end of the session, the clone will be unmounted and the clone and snapshot  will
       be  deleted.  This chroot type implements the source chroot options (see “Source chroot options”, below).
       Note that a corresponding source chroot (of type ‘directory’) will be created for  each  chroot  of  this
       type; this is for convenient access to the source volume. These additional options are also implemented:

       zfs-dataset=dataset_name
              Name of the ZFS source dataset to use.

       zfs-snapshot-options=snapshot_options
              Snapshot options.  These are additional options to pass to zfs snapshot.

   LVM snapshot chroots
       Chroots  of  type ‘lvm-snapshot’ are a filesystem available on an LVM logical volume (LV).  A snapshot LV
       will be created from this LV on demand, and then the snapshot  will  be  mounted.   At  the  end  of  the
       session, the snapshot LV will be unmounted and removed.

       LVM  snapshot  chroots  implement the source chroot options (see “Source chroot options”, below), and all
       the options for ‘block-device’.  Note that a corresponding source chroot (of type ‘block-device’) will be
       created for each chroot of this type; this is for convenient access to the source device. This additional
       option is also implemented:

       lvm-snapshot-options=snapshot_options
              Snapshot options.  These are additional options to pass to lvcreate(8).  For example, “-L  2g”  to
              create  a  snapshot  2  GiB  in  size.   Note:  the LV name (-n), the snapshot option (-s) and the
              original LV path may not be specfied here; they are set automatically by schroot.

   Custom chroots
       Chroots of type ‘custom’ are a special type of chroot, used for implementing  new  types  of  chroot  not
       supported by any of the above chroot types.  This may be useful for implementing and testing a new chroot
       type without needing to write any C++ code.  However, you will need to write your own setup script to  do
       the setup work, since by itself this chroot type does very little.  You will also need to add custom keys
       to your chroot definition for use in the setup script; unlike the  configuration  for  the  above  chroot
       types,  no  validation  of  the  options  will  take place unless you do it yourself in your custom setup
       script.  These additional options are also implemented:

       custom-session-cloneable=true|false
              Set whether or not sessions may be cloned using this chroot (enabled by default).

       custom-session-purgeable=true|false
              Set whether or not sessions may be cloned using this chroot (disabled by default).

       custom-source-cloneable=true|false
              Set whether or not source chroots may be cloned using this chroot (disabled by default).

   Source chroot options
       The ‘btrfs-snapshot’, ‘file’ and ‘lvm-snapshot’ chroot types  implement  source  chroots.   Additionally,
       chroot  types with union support enabled implement source chroots (see “Filesystem Union chroot options”,
       below).  These are chroots which automatically create a copy of themselves before use,  and  are  usually
       session  managed.   These chroots additionally provide an extra chroot in the source: namespace, to allow
       convenient access to the original (non-snapshotted) data, and to aid in chroot maintenance.  I.e.  for  a
       chroot  named  wheezy  (chroot:wheezy),  a  corresponding  source:wheezy  chroot  will  be  created.  For
       compatibility with older versions of schroot which did not support namespaces, a chroot  with  a  -source
       suffix  appended  to  the  chroot  name  will  be created in addition (i.e. wheezy-source using the above
       example).  Note that these compatibility names will be removed in  schroot  1.5.0,  so  the  use  of  the
       source:  namespace  is  preferred  over  the  use of the -source suffix form.  See schroot(1) for further
       details.

       These chroots provide the following additional options:

       source-clone=true|false
              Set whether the source chroot should be automatically  cloned  (created)  for  this  chroot.   The
              default  is  true  to automatically clone, but if desired may be disabled by setting to false.  If
              disabled, the source chroot will be inaccessible.

       source-users=user1,user2,...
              A comma-separated list of users which are allowed access  to  the  source  chroot.   If  empty  or
              omitted, no users will be allowed access.  This will become the users option in the source chroot.

       source-groups=group1,group2,...
              A  comma-separated  list  of  groups  which  are allowed access to the source chroot.  If empty or
              omitted, no users will be allowed access.  This will  become  the  groups  option  in  the  source
              chroot.

       source-root-users=user1,user2,...
              A  comma-separated list of users which are allowed password-less root access to the source chroot.
              If empty or omitted, no users will be allowed root access without a password (but if a user is  in
              users,  they  may  gain  access  with  a password).  This will become the root-users option in the
              source chroot.  See the section “Security” below.

       source-root-groups=group1,group2,...
              A comma-separated list of groups which are allowed password-less root access to the source chroot.
              If  empty  or  omitted,  no  users will be allowed root access without a password (but if a user's
              group is in groups, they may gain access with a  password).   This  will  become  the  root-groups
              option in the source chroot.  See the section “Security” below.

   Mountable chroot options
       The  ‘block-device’,  ‘loopback’  and  ‘lvm-snapshot’  chroot types implement device mounting.  These are
       chroots which require the mounting of a device in order to access the chroot.  These chroots provide  the
       following additional options:

       mount-options=options
              Mount  options  for  the  block  device.   These  are additional options to pass to mount(8).  For
              example, “-o atime,sync,user_xattr”.

       location=path
              This is the path to the chroot  inside  the  filesystem  on  the  device.   For  example,  if  the
              filesystem  contains a chroot in /chroot/sid, you would specify “/chroot/sid” here.  If the chroot
              is the only thing on the filesystem, i.e. / is the root filesystem for  the  chroot,  this  option
              should be left blank, or omitted entirely.

   Filesystem Union chroot options
       The  ‘block-device’,  ‘directory’  and  ‘loopback’ chroot types allow for the creation of a session using
       filesystem unions to overlay the original filesystem with a separate writable  directory.   The  original
       filesystem  is  read-only,  with  any modifications made to the filesystem made in the overlying writable
       directory, leaving the original filesystem unchanged.  A union permits multiple sessions  to  access  and
       make  changes  to  a single chroot simultaneously, while keeping the changes private to each session.  To
       enable this feature, set union-type to any supported value.  If enabled, the chroot will also be a source
       chroot,  which  will  provide  additional  options (see “Source chroot options”, above).  All entries are
       optional.

       union-type=type
              Set the union filesystem type.  Currently supported filesystems are ‘aufs’, ‘overlayfs’, ‘overlay’
              (as of Linux 4.0+) and ‘unionfs’.  The default is ‘none’, which disables this feature.

       union-mount-options=options
              Union  filesystem  mount  options  (branch  configuration), used for mounting the union filesystem
              specified with union-type.  This replaces the complete “-o” string for mount and  allows  for  the
              creation  of  complex  filesystem  unions.   Note that ‘aufs’, ‘overlayfs’ and ‘unionfs’ each have
              different    supported    mount    options.     Note:    One     can     use     the     variables
              “${CHROOT_UNION_OVERLAY_DIRECTORY}”  and  “${CHROOT_UNION_UNDERLAY_DIRECTORY}”  to  refer  to  the
              writable overlay session directory and read-only underlying directory which are to form the union.
              See schroot-setup(5) for a complete variable list.

       union-overlay-directory=directory
              Specify  the  directory  where  the  writeable  overlay  session directories will be created.  The
              default is ‘/var/lib/schroot/union/overlay’.

       union-underlay-directory=directory
              Specify the directory where the read-only underlying directories will be created.  The default  is
              ‘/var/lib/schroot/union/underlay’.

   Customisation
       In  addition  to the configuration keys listed above, it is possible to add custom keys.  These keys will
       be used to add additional environment variables to the setup script environment when  setup  scripts  are
       run.   The  only  restriction  is that the key name consists only of alphanumeric characters and hyphens,
       begins with an alphabet character and contains at least one period.  That is to say, that it matches  the
       extended regular expression “^([a-z][a-z0-9]*\.)+[a-z][a-z0-9-]*$”.

       For example:
              debian.apt-update=true
              debian.distribution=unstable

       would set the following environment:
              DEBIAN_APT_UPDATE=true
              DEBIAN_DISTRIBUTION=unstable

       Note  that  it  is  an  error to use different key names which would set the same environment variable by
       mixing periods and hyphens.

       Custom configuration keys may also be modified at  runtime  using  the  --option  option.   However,  for
       security, only selected keys may be modified.  These keys are specified using the following options:

       user-modifiable-keys=key1,key2,..
              Set the keys which users may modify using --option.

       root-modifiable-keys=key1,key2,.. Set the keys which the
              root  user  may  modify  using  --option.   Note  that the root user may use the keys specified in
              user-modifiable-keys in addition to those specified here.

   Localisation
       Some keys may be localised in multiple languages.  This is achieved by adding the locale name  in  square
       brackets after the key name.  For example:
              description[en_GB]=British English translation

       This will localise the description key for the en_GB locale.
              description[fr]=French translation

       This will localise the description key for all French locales.

CHROOT NAMES

       A  number  of  characters  or  words  are  not  permitted in a chroot name, session name or configuration
       filename.  The name must begin with a lowercase or an  uppercase  letter,  or  a  digit.   The  remaining
       characters may additionally be dash (‘-’), period (‘.’), or underscore (‘_’).

       The rationale for these restrictions is as follows:

       Generic
              Unfortunately,  not  all the places that deal with chroot names can handle non-printable and other
              characters properly, and it's hard to update all of them.  This is mostly about the various  shell
              scripts where it's also unwise to assume authors always create safe code.

       ‘dpkg-old’
       ‘dpkg-dist’
       ‘dpkg-new’
       ‘dpkg-tmp’
              These  names may not appear at the end of a name.  These are saved copies of conffiles used by the
              dpkg package manager, and will be ignored.

SECURITY

   Untrusted users
       Note that giving untrusted users root access to  chroots  is  a  serious  security  risk!   Although  the
       untrusted  user will only have root access to files inside the chroot, in practice there are many obvious
       ways of breaking out of the chroot and of disrupting services on the host system.  As always, this  boils
       down to trust.

       Do not give chroot root access to users you would not trust with root access to the host system.

   Profiles
       Depending  upon  which  profile  you have configured with the script-config option, different filesystems
       will be mounted inside the chroot, and different files will be copied into  the  chroot  from  the  host.
       Some  profiles  will  mount  the  host's  /dev,  while  others  will  not.  Some profiles also bind mount
       additional parts of the host filesystem in order to allow use of certain features, including user's  home
       directories  and  specific  parts  of /var.  Check the profile's fstab file to be certain of what will be
       mounted, and the other profile files to see which files and system databases  will  be  copied  into  the
       chroot.   Choose  a different profile or edit the files to further restrict what is made available inside
       the chroot.

       There is a tradeoff between security (keeping the chroot as minimal as  possible)  and  usability  (which
       sometimes  requires  access  to  parts  of  the  host filesystem).  The different profiles make different
       tradeoffs, and it is important that you assess which meets the security/usability tradeoff you require.

EXAMPLE

       # Sample configuration

       [sid]
       type=plain
       description=Debian unstable
       description[fr_FR]=Debian instable
       directory=/srv/chroot/sid
       priority=3
       users=jim
       groups=sbuild
       root-users=rleigh
       aliases=unstable,default

       [etch]
       type=block-device
       description=Debian testing (32-bit)
       priority=2
       groups=users
       #groups=sbuild-security
       aliases=testing
       device=/dev/hda_vg/etch_chroot
       mount-options=-o atime
       personality=linux32

       [sid-file]
       type=file
       description=Debian sid file-based chroot
       priority=3
       groups=sbuild
       file=/srv/chroots/sid.tar.gz

       [sid-snapshot]
       type=lvm-snapshot
       description=Debian unstable LVM snapshot
       priority=3
       groups=sbuild
       users=rleigh
       source-root-users=rleigh
       source-root-groups=admin
       device=/dev/hda_vg/sid_chroot
       mount-options=-o atime,sync,user_xattr
       lvm-snapshot-options=--size 2G

FILES

   Chroot definitions
       /etc/schroot/schroot.conf
              The system-wide chroot definition file.  This file must be owned by the  root  user,  and  not  be
              writable by other.

       /etc/schroot/chroot.d
              Additional  chroot  definitions  may be placed in files under this directory.  They are treated in
              exactly that same manner as /etc/schroot/schroot.conf.  Each file may contain one or  more  chroot
              definitions.

   Setup script configuration
       The directory /etc/schroot/default contains the default settings used by setup scripts.

       config Main  configuration  file  read  by  setup  scripts.   The  format  of  this  file is described in
              schroot-script-config(5).  This is the default value for the script-config key.   Note  that  this
              was formerly named /etc/schroot/script-defaults.  The following files are referenced by default:

       copyfiles
              A  list  of files to copy into the chroot from the host system.  Note that this was formerly named
              /etc/schroot/copyfiles-defaults.

       fstab  A file in the format decribed in fstab(5), used to mount filesystems inside the chroot.  The mount
              location   is   relative  to  the  root  of  the  chroot.   Note  that  this  was  formerly  named
              /etc/schroot/mount-defaults.

       nssdatabases
              System databases (as described in /etc/nsswitch.conf on GNU/Linux systems) to copy into the chroot
              from the host.  Note that this was formerly named /etc/schroot/nssdatabases-defaults.

AUTHORS

       Roger Leigh.

       Copyright © 2005-2012  Roger Leigh <rleigh@debian.org>

       schroot  is  free  software:  you can redistribute it and/or modify it under the terms of the GNU General
       Public License as published by the Free Software Foundation, either version 3 of the License, or (at your
       option) any later version.

SEE ALSO

       sbuild(1), schroot(1), schroot-script-config(5), schroot-faq(7), mount(8).