dom0+vm/qfile-copy: use setuid instead of policy setting to allow chroot
This will allow to not hardcode "root" username in policy, which can be useful for non-Linux systems.
This commit is contained in:
		
							parent
							
								
									b05d035ff2
								
							
						
					
					
						commit
						a98020eca7
					
				| @ -3,4 +3,4 @@ | ||||
| 
 | ||||
| ## Please use a single # to start your custom comments | ||||
| 
 | ||||
| $anyvm	$anyvm	ask,user=root | ||||
| $anyvm	$anyvm	ask | ||||
|  | ||||
| @ -398,7 +398,7 @@ rm -rf $RPM_BUILD_ROOT | ||||
| /usr/lib/qubes/meminfo-writer | ||||
| /usr/lib/qubes/network-manager-prepare-conf-dir | ||||
| /usr/lib/qubes/qfile-agent | ||||
| /usr/lib/qubes/qfile-unpacker | ||||
| %attr(4755,root,root) /usr/lib/qubes/qfile-unpacker | ||||
| /usr/lib/qubes/qopen-in-vm | ||||
| /usr/lib/qubes/qrexec_agent | ||||
| /usr/lib/qubes/qrexec_client_vm | ||||
|  | ||||
		Loading…
	
		Reference in New Issue
	
	Block a user
	 Marek Marczykowski
						Marek Marczykowski