The RUST suite is a toolkit for creating
RPM packages to distribute software.
RUST is both a drag & drop RPM creation GUI and a "sandboxing" toolkit
that allows you to do software installations within a chrooted environment
and automatically generate RPMs from arbitrary source code, without ever
seeing a spec file.
The sandbox is also practical for testing
software installations or verifying the actions of untrusted program installations.
With RUST you can:
- Create your own RPM packages
with a few mouse clicks, without having to create
SPEC files.
- Create RPM packages for
arbitrary source code, simply by doing a 'make install' in
the sandbox and clicking 'makeRPM'
in the GUI. This is quite pratical when you wish to distribute software
on multiple machines or want the ability to easily remove software
in the future.
- Use cRUST
and the sandbox (a chrooted
environment), to test installations or to analyze
the installation of untrusted software in a secure manner.
Rust is free and open sourced, released under the terms of
the GPL. See
the about page for details.
Requirements
To run RUST, you need GNOME, GTK+ and the rpm and rpm-build packages
(all of which are usually included in a typical rpm based linux install). If you want
to compile the source, you will need GNOME, GTK and
automake and autoconf
Installation
RPM
Download RUST rpm and install it as root:
# rpm -Uvh rust-X.X.X.rpm
SOURCE
If there are no RPMs available for your target platform, you may download the source.
To install the program, the usual
$ ./configure
$ make
# make install
sequence should do the trick. If you are having problems: check the
INSTALL file for tips or, if you've got automake/autoconf installed, you can
run
$ ./autogen.sh
$ make
# make install
To run, just select Development->Rust
from the Gnome menu
or Applications->Rust if you are running
KDE.
Using RUST:
You may want to take a look at more detailed instructions on using
the rust GUI or on using the command line backend,
crust. There is also a specific section that
deals with creating the sandbox and using
the chrooted shell.
|