[Kimchi-devel] [RFC][PATCH V3 0/3] Issue #322
Crístian Viana
vianac at linux.vnet.ibm.com
Mon Mar 10 18:14:07 UTC 2014
Reviewed-by: Crístian Viana <vianac at linux.vnet.ibm.com>
Am 10-03-2014 12:01, schrieb shaohef at linux.vnet.ibm.com:
> From: ShaoHe Feng <shaohef at linux.vnet.ibm.com>
>
> V2 -> V2
> sort the import.
>
> V1 -> V2
> use debug to log the open exception trace stack.
>
> It is complex to check the permission for qemu user.
> There are too many access controlling mechanisms in
> Linux, such as ACL, traditional ugo+-rwx, SELinux and AppArmor. It's not
> possible to enumerate and check every access mechanisms if it allows
> QEMU to access a file.
> So now I'm simply trying to access the file with qemu user and see if it's OK
>
> It is simple and avoid handling corner case.
>
> Also I can try to start a simple guest with the given iso.
>
> ShaoHe Feng (3):
> add a method to probe the permission as qemu user
> qemu user tests: probe the username of qemu process started by libvirt
> Don't allow templates to be created with ISOs that won't be usable.
>
> Makefile.am | 1 +
> src/kimchi/i18n.py | 5 ++++
> src/kimchi/kvmusertests.py | 64 +++++++++++++++++++++++++++++++++++++++++++
> src/kimchi/model/templates.py | 13 ++++++++-
> src/kimchi/utils.py | 26 ++++++++++++++++++
> 5 files changed, 108 insertions(+), 1 deletion(-)
> create mode 100644 src/kimchi/kvmusertests.py
>
More information about the Kimchi-devel
mailing list