dom0+vm/qfile-copy: use setuid instead of policy setting to allow chroot
This will allow to not hardcode "root" username in policy, which can be useful for non-Linux systems.
This commit is contained in:
		
							parent
							
								
									b05d035ff2
								
							
						
					
					
						commit
						a98020eca7
					
				| @ -3,4 +3,4 @@ | |||||||
| 
 | 
 | ||||||
| ## Please use a single # to start your custom comments | ## Please use a single # to start your custom comments | ||||||
| 
 | 
 | ||||||
| $anyvm	$anyvm	ask,user=root | $anyvm	$anyvm	ask | ||||||
|  | |||||||
| @ -398,7 +398,7 @@ rm -rf $RPM_BUILD_ROOT | |||||||
| /usr/lib/qubes/meminfo-writer | /usr/lib/qubes/meminfo-writer | ||||||
| /usr/lib/qubes/network-manager-prepare-conf-dir | /usr/lib/qubes/network-manager-prepare-conf-dir | ||||||
| /usr/lib/qubes/qfile-agent | /usr/lib/qubes/qfile-agent | ||||||
| /usr/lib/qubes/qfile-unpacker | %attr(4755,root,root) /usr/lib/qubes/qfile-unpacker | ||||||
| /usr/lib/qubes/qopen-in-vm | /usr/lib/qubes/qopen-in-vm | ||||||
| /usr/lib/qubes/qrexec_agent | /usr/lib/qubes/qrexec_agent | ||||||
| /usr/lib/qubes/qrexec_client_vm | /usr/lib/qubes/qrexec_client_vm | ||||||
|  | |||||||
		Loading…
	
		Reference in New Issue
	
	Block a user
	 Marek Marczykowski
						Marek Marczykowski