1 # These entries should be ADDED to the end of /etc/fstab to
2 # properly set up the girocco chroot jail
4 # /etc/fstab: static file system information.
6 # <file system> <mount point> <type> <options> <dump> <pass>
9 # It may be necessary to add a "late" option to these entries
10 # so that they are mounted after the filesystem they are trying
11 # to mount into (such as ZFS). On FreeBSD this can be accomplished
12 # simply by adding a "late" option. On Linux if delaying the mounts
13 # is required, it may be necessary to add a "noauto" option and then
14 # manually mount them in /etc/rc.local.
16 # mount the git repositories in the jail
17 # Note that on FreeBSD a "bind" mount is accomplished by setting the type to
18 # nullfs and the options to rw as FreeBSD does not have a mount --bind option
19 /srv/git /home/repo/j/srv/git none bind 0 0
21 # mount the proc filesystem in the jail
22 # Note that there are two possiblities here, the first is a bind mount and
23 # the second is another proc mount.
24 # The bind mount will always mirror everything in /proc whereas a second
25 # proc mount has the potential of having a separate proc namespace.
26 # Note that some systems (e.g. FreeBSD) must omit the "nodev" option.
27 # Note that some systems (e.g. FreeBSD) will need to use "procfs" for the type.
28 # Note that some systems (e.g. FreeBSD) may need to add the "rw" option.
29 # Note that mounting procfs in a FreeBSD chroot is optional and normally omitted
30 #/proc /home/repo/j/proc none bind 0 0
31 proc /home/repo/j/proc proc nodev,noexec,nosuid 0 0
33 # mount the devfs filesystem in the jail
34 # Note that this is only necessary on systems where mknod does not work
35 # except on devfs mounts (e.g. FreeBSD)
36 # Note that on FreeBSD before starting the chroot, the following commands
37 # may be executed to reduce the number of exposed devices:
38 # devfs -m /home/repo/j/dev ruleset 4
39 # devfs -m /home/repo/j/dev rule applyset
40 #devfs /home/repo/j/dev devfs rw,noexec,nosuid 0 0