dom0+vm/qfile-copy: use setuid instead of policy setting to allow chroot

This will allow to not hardcode "root" username in policy, which can be useful
for non-Linux systems.
This commit is contained in:
Marek Marczykowski 2012-08-18 21:17:07 +02:00
parent 7c64f909be
commit 0ea16ef21b
2 changed files with 2 additions and 2 deletions

View File

@ -3,4 +3,4 @@
## Please use a single # to start your custom comments
$anyvm $anyvm ask,user=root
$anyvm $anyvm ask

View File

@ -398,7 +398,7 @@ rm -rf $RPM_BUILD_ROOT
/usr/lib/qubes/meminfo-writer
/usr/lib/qubes/network-manager-prepare-conf-dir
/usr/lib/qubes/qfile-agent
/usr/lib/qubes/qfile-unpacker
%attr(4755,root,root) /usr/lib/qubes/qfile-unpacker
/usr/lib/qubes/qopen-in-vm
/usr/lib/qubes/qrexec_agent
/usr/lib/qubes/qrexec_client_vm