mirror of
https://gitlab.com/libvirt/libvirt.git
synced 2024-12-22 17:34:18 +03:00
qemu: let qemu group look below /var/lib/libvirt/qemu/
Vdsm needs to communicate with its guest agent via unix domain socket, which qemu creates due to the following domain xml device: <channel type='unix'> <target type='virtio' name='com.redhat.rhevm.vdsm'/> <source mode='bind' path='/var/lib/libvirt/qemu/channels/fcp-xp-1.com.redhat.rhevm.vdsm'/> </channel> The location of the socket below /var/lib/libvirt/qemu/channels makes sense, to humans and selinux policy alike. However, that socket should be accessible to vdsm, too. Due to other (storage) reasons, vdsm is to join the "qemu" group. With this patch, vdsm can look below /var/lib/libvirt/qemu and connect to the socket. The socket itself should be chmod'ed to allow qemu group read/write, but that's for another project. BZ#643407
This commit is contained in:
parent
6c4b04142b
commit
0df552cd37
@ -782,8 +782,8 @@ fi
|
||||
|
||||
%if %{with_qemu}
|
||||
%dir %attr(0700, root, root) %{_localstatedir}/run/libvirt/qemu/
|
||||
%dir %attr(0700, %{qemu_user}, %{qemu_group}) %{_localstatedir}/lib/libvirt/qemu/
|
||||
%dir %attr(0700, %{qemu_user}, %{qemu_group}) %{_localstatedir}/cache/libvirt/qemu/
|
||||
%dir %attr(0750, %{qemu_user}, %{qemu_group}) %{_localstatedir}/lib/libvirt/qemu/
|
||||
%dir %attr(0750, %{qemu_user}, %{qemu_group}) %{_localstatedir}/cache/libvirt/qemu/
|
||||
%endif
|
||||
%if %{with_lxc}
|
||||
%dir %{_localstatedir}/run/libvirt/lxc/
|
||||
|
Loading…
Reference in New Issue
Block a user