dom0+vm/qfile-copy: use setuid instead of policy setting to allow chroot
This will allow to not hardcode "root" username in policy, which can be useful for non-Linux systems.
This commit is contained in:
parent
7c64f909be
commit
0ea16ef21b
@ -3,4 +3,4 @@
|
||||
|
||||
## Please use a single # to start your custom comments
|
||||
|
||||
$anyvm $anyvm ask,user=root
|
||||
$anyvm $anyvm ask
|
||||
|
@ -398,7 +398,7 @@ rm -rf $RPM_BUILD_ROOT
|
||||
/usr/lib/qubes/meminfo-writer
|
||||
/usr/lib/qubes/network-manager-prepare-conf-dir
|
||||
/usr/lib/qubes/qfile-agent
|
||||
/usr/lib/qubes/qfile-unpacker
|
||||
%attr(4755,root,root) /usr/lib/qubes/qfile-unpacker
|
||||
/usr/lib/qubes/qopen-in-vm
|
||||
/usr/lib/qubes/qrexec_agent
|
||||
/usr/lib/qubes/qrexec_client_vm
|
||||
|
Loading…
Reference in New Issue
Block a user