[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Re: [ezjail] /usr/ports
- To: ezjail AT erdgeist DOT org
- Subject: Re: [ezjail] /usr/ports
- From: Glen Barber <glen.j.barber AT gmail DOT com>
- Date: Wed, 22 Feb 2012 20:43:35 -0500
- Authentication-results: mr.google.com; spf=pass (google.com: domain of glen.j.barber AT gmail DOT com designates 10.229.77.141 as permitted sender) smtp.mail=glen.j.barber AT gmail DOT com; dkim=pass header.i=glen.j.barber AT gmail DOT com
- Delivered-to: mailing list ezjail AT erdgeist DOT org
- Dkim-signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=gamma; h=date:from:to:subject:message-id:references:mime-version :content-type:content-disposition:in-reply-to:x-operating-system :user-agent; bh=Q8E3fm2mfdRtKxDtAxHxooq2bVK12YxZhuZuZBgnvQ8=; b=GIzvyo/cnNkrkTsnz4IcRU22loy9qMwxqIJ/4Y/QzPp8dsoe0mtVG28dOuD7WJXrdr nlmhMqP5xbyMym9UzEe5JlZWNuz8hQPLz0OqS+dJOI1ZJISSU6ApbFMA+burAAxYtStW lpL2xtQuFvY+99qkMfVYq7LQ2AJta6qYgdVFw=
- In-reply-to: <CAJxePNLage+ZUpKq75gd3SD=2QLcDCvgZfYmt2ypmjNi9N+N7Q AT mail.gmail DOT com>
- Mailing-list: contact ezjail-help AT erdgeist DOT org; run by ezmlm
- References: <CAJxePNLage+ZUpKq75gd3SD=2QLcDCvgZfYmt2ypmjNi9N+N7Q AT mail.gmail DOT com>
- User-agent: Mutt/1.5.21 (2010-09-15)
On Wed, Feb 22, 2012 at 08:25:14PM -0500, alexus wrote:
> does it make sense to share /usr/ports between system (host) and jails?
> to say save on space? not that i'm running out of space but still
> or there are some concerns which makes it a bad idea?
In theory, no. The ezjail jails have their own WKRDIRPREFIX by default
(by custom-installed /etc/make.conf).
So, sharing the host port tree should be fine as long as you don't
If space is a concern (I know you said it isn't), you should note that
each jail has its own DISTDIR set (again, in /etc/make.conf), so jails
with similar ports (perl, for example), will all download an independent
version of said port. For the truly paranoid, sharing DISTDIRs could be
a security concern if $someport has a security vulnverability, or has
been compromised upstream.