Accepting request 291048 from Virtualization
1 OBS-URL: https://build.opensuse.org/request/show/291048 OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/libvirt?expand=0&rev=172
This commit is contained in:
commit
805aacfe40
33
apparmor-fixes.patch
Normal file
33
apparmor-fixes.patch
Normal file
@ -0,0 +1,33 @@
|
|||||||
|
Index: libvirt-1.2.13/examples/apparmor/libvirt-qemu
|
||||||
|
===================================================================
|
||||||
|
--- libvirt-1.2.13.orig/examples/apparmor/libvirt-qemu
|
||||||
|
+++ libvirt-1.2.13/examples/apparmor/libvirt-qemu
|
||||||
|
@@ -59,6 +59,7 @@
|
||||||
|
# access to firmware's etc
|
||||||
|
/usr/share/kvm/** r,
|
||||||
|
/usr/share/qemu/** r,
|
||||||
|
+ /usr/share/qemu-kvm/** r,
|
||||||
|
/usr/share/bochs/** r,
|
||||||
|
/usr/share/openbios/** r,
|
||||||
|
/usr/share/openhackware/** r,
|
||||||
|
@@ -73,6 +74,7 @@
|
||||||
|
# the various binaries
|
||||||
|
/usr/bin/kvm rmix,
|
||||||
|
/usr/bin/qemu rmix,
|
||||||
|
+ /usr/bin/qemu-kvm rmix,
|
||||||
|
/usr/bin/qemu-system-arm rmix,
|
||||||
|
/usr/bin/qemu-system-cris rmix,
|
||||||
|
/usr/bin/qemu-system-i386 rmix,
|
||||||
|
@@ -118,6 +120,12 @@
|
||||||
|
/bin/dd rmix,
|
||||||
|
/bin/cat rmix,
|
||||||
|
|
||||||
|
+ # for restore
|
||||||
|
+ /bin/bash rmix,
|
||||||
|
+
|
||||||
|
+ /run/nscd/passwd r,
|
||||||
|
+ /run/nscd/group r,
|
||||||
|
+
|
||||||
|
# for usb access
|
||||||
|
/dev/bus/usb/ r,
|
||||||
|
/etc/udev/udev.conf r,
|
@ -1,3 +1,26 @@
|
|||||||
|
-------------------------------------------------------------------
|
||||||
|
Thu Mar 12 07:48:35 UTC 2015 - fcastelli@suse.com
|
||||||
|
|
||||||
|
- Instruct polkit to allow memebers of the 'libvirt' group to connect
|
||||||
|
to libvirt without providing any password (bnc#920804)
|
||||||
|
- Added polkit-10-virt.rules to fix bnc#920804
|
||||||
|
|
||||||
|
-------------------------------------------------------------------
|
||||||
|
Wed Mar 11 09:29:29 MDT 2015 - jfehlig@suse.com
|
||||||
|
|
||||||
|
- Change default setting of security_default_confined in
|
||||||
|
/etc/libvirt/qemu.conf instead of in code. Making the change in
|
||||||
|
code changes the default behavior for all users, even those that
|
||||||
|
have a custom security setup in their /etc/libvirt/qemu.conf.
|
||||||
|
Modified suse-qemu-conf.patch
|
||||||
|
bsc#921586
|
||||||
|
|
||||||
|
-------------------------------------------------------------------
|
||||||
|
Mon Mar 9 16:51:08 UTC 2015 - cbosdonnat@suse.com
|
||||||
|
|
||||||
|
- Fixed a number of QEMU apparmor abstraction problems. bsc#921355
|
||||||
|
apparmor-fixes.patch
|
||||||
|
|
||||||
-------------------------------------------------------------------
|
-------------------------------------------------------------------
|
||||||
Mon Mar 2 12:05:43 MST 2015 - jfehlig@suse.com
|
Mon Mar 2 12:05:43 MST 2015 - jfehlig@suse.com
|
||||||
|
|
||||||
|
11
libvirt.spec
11
libvirt.spec
@ -363,6 +363,7 @@ BuildRequires: cyrus-sasl-devel
|
|||||||
%endif
|
%endif
|
||||||
%if %{with_polkit}
|
%if %{with_polkit}
|
||||||
%if 0%{?suse_version} > 1110
|
%if 0%{?suse_version} > 1110
|
||||||
|
BuildRequires: polkit >= 0.9
|
||||||
BuildRequires: polkit-devel >= 0.9
|
BuildRequires: polkit-devel >= 0.9
|
||||||
%else
|
%else
|
||||||
BuildRequires: PolicyKit-devel >= 0.6
|
BuildRequires: PolicyKit-devel >= 0.6
|
||||||
@ -432,6 +433,7 @@ Source1: %{name}-%{version}.tar.gz.asc
|
|||||||
Source2: %{name}.keyring
|
Source2: %{name}.keyring
|
||||||
Source3: libvirtd.init
|
Source3: libvirtd.init
|
||||||
Source4: libvirtd-relocation-server.fw
|
Source4: libvirtd-relocation-server.fw
|
||||||
|
Source5: polkit-10-virt.rules
|
||||||
Source99: baselibs.conf
|
Source99: baselibs.conf
|
||||||
# Upstream patches
|
# Upstream patches
|
||||||
# Patches pending upstream review
|
# Patches pending upstream review
|
||||||
@ -441,6 +443,7 @@ Patch151: xen-pv-cdrom.patch
|
|||||||
Patch152: blockcopy-check-dst-identical-device.patch
|
Patch152: blockcopy-check-dst-identical-device.patch
|
||||||
Patch153: libvirt-power8-models.patch
|
Patch153: libvirt-power8-models.patch
|
||||||
Patch154: ppc64le-canonical-name.patch
|
Patch154: ppc64le-canonical-name.patch
|
||||||
|
Patch155: apparmor-fixes.patch
|
||||||
# Our patches
|
# Our patches
|
||||||
Patch200: libvirtd-defaults.patch
|
Patch200: libvirtd-defaults.patch
|
||||||
Patch201: libvirtd-init-script.patch
|
Patch201: libvirtd-init-script.patch
|
||||||
@ -973,6 +976,7 @@ Provides a dissector for the libvirt RPC protocol to help debugging it.
|
|||||||
%patch152 -p1
|
%patch152 -p1
|
||||||
%patch153 -p1
|
%patch153 -p1
|
||||||
%patch154 -p1
|
%patch154 -p1
|
||||||
|
%patch155 -p1
|
||||||
%patch200 -p1
|
%patch200 -p1
|
||||||
%patch201 -p1
|
%patch201 -p1
|
||||||
%patch202 -p1
|
%patch202 -p1
|
||||||
@ -1336,6 +1340,12 @@ mkdir -p $RPM_BUILD_ROOT%{_sbindir}
|
|||||||
ln -s %{_sysconfdir}/init.d/libvirt-guests $RPM_BUILD_ROOT%{_sbindir}/rclibvirt-guests
|
ln -s %{_sysconfdir}/init.d/libvirt-guests $RPM_BUILD_ROOT%{_sbindir}/rclibvirt-guests
|
||||||
%endif
|
%endif
|
||||||
mv $RPM_BUILD_ROOT%{_sysconfdir}/sysconfig/libvirt-guests $RPM_BUILD_ROOT%{_localstatedir}/adm/fillup-templates/sysconfig.libvirt-guests
|
mv $RPM_BUILD_ROOT%{_sysconfdir}/sysconfig/libvirt-guests $RPM_BUILD_ROOT%{_localstatedir}/adm/fillup-templates/sysconfig.libvirt-guests
|
||||||
|
%if %{with_polkit}
|
||||||
|
%if 0%{?suse_version} > 1110
|
||||||
|
install -d $RPM_BUILD_ROOT%{_sysconfdir}/polkit-1/rules.d/
|
||||||
|
install %SOURCE5 $RPM_BUILD_ROOT%{_sysconfdir}/polkit-1/rules.d/10-virt.rules
|
||||||
|
%endif
|
||||||
|
%endif
|
||||||
%fdupes -s $RPM_BUILD_ROOT
|
%fdupes -s $RPM_BUILD_ROOT
|
||||||
|
|
||||||
%clean
|
%clean
|
||||||
@ -1502,6 +1512,7 @@ fi
|
|||||||
%if %{with_polkit}
|
%if %{with_polkit}
|
||||||
%if 0%{?suse_version} > 1110
|
%if 0%{?suse_version} > 1110
|
||||||
%{_datadir}/polkit-1/actions/org.libvirt.unix.policy
|
%{_datadir}/polkit-1/actions/org.libvirt.unix.policy
|
||||||
|
%{_sysconfdir}/polkit-1/rules.d/10-virt.rules
|
||||||
%else
|
%else
|
||||||
%{_datadir}/PolicyKit/policy/org.libvirt.unix.policy
|
%{_datadir}/PolicyKit/policy/org.libvirt.unix.policy
|
||||||
%endif
|
%endif
|
||||||
|
8
polkit-10-virt.rules
Normal file
8
polkit-10-virt.rules
Normal file
@ -0,0 +1,8 @@
|
|||||||
|
polkit.addRule(function(action, subject) {
|
||||||
|
if (action.id == "org.libvirt.unix.manage"
|
||||||
|
&& subject.local
|
||||||
|
&& subject.active
|
||||||
|
&& subject.isInGroup("libvirt")) {
|
||||||
|
return polkit.Result.YES;
|
||||||
|
}
|
||||||
|
});
|
@ -2,7 +2,7 @@ Index: libvirt-1.2.13/examples/apparmor/libvirt-qemu
|
|||||||
===================================================================
|
===================================================================
|
||||||
--- libvirt-1.2.13.orig/examples/apparmor/libvirt-qemu
|
--- libvirt-1.2.13.orig/examples/apparmor/libvirt-qemu
|
||||||
+++ libvirt-1.2.13/examples/apparmor/libvirt-qemu
|
+++ libvirt-1.2.13/examples/apparmor/libvirt-qemu
|
||||||
@@ -124,6 +124,9 @@
|
@@ -132,6 +132,9 @@
|
||||||
/sys/bus/ r,
|
/sys/bus/ r,
|
||||||
/sys/class/ r,
|
/sys/class/ r,
|
||||||
|
|
||||||
|
@ -2,16 +2,30 @@ Index: libvirt-1.2.13/src/qemu/qemu.conf
|
|||||||
===================================================================
|
===================================================================
|
||||||
--- libvirt-1.2.13.orig/src/qemu/qemu.conf
|
--- libvirt-1.2.13.orig/src/qemu/qemu.conf
|
||||||
+++ libvirt-1.2.13/src/qemu/qemu.conf
|
+++ libvirt-1.2.13/src/qemu/qemu.conf
|
||||||
@@ -204,7 +204,7 @@
|
@@ -201,11 +201,20 @@
|
||||||
|
# isolation, but it cannot appear in a list of drivers.
|
||||||
|
#
|
||||||
|
#security_driver = "selinux"
|
||||||
|
+#security_driver = "apparmor"
|
||||||
|
|
||||||
# If set to non-zero, then the default security labeling
|
# If set to non-zero, then the default security labeling
|
||||||
# will make guests confined. If set to zero, then guests
|
# will make guests confined. If set to zero, then guests
|
||||||
-# will be unconfined by default. Defaults to 1.
|
-# will be unconfined by default. Defaults to 1.
|
||||||
|
-#security_default_confined = 1
|
||||||
+# will be unconfined by default. Defaults to 0.
|
+# will be unconfined by default. Defaults to 0.
|
||||||
#security_default_confined = 1
|
+#
|
||||||
|
+# SUSE Note:
|
||||||
|
+# Currently, Apparmor is the default security framework in SUSE
|
||||||
|
+# distros. If Apparmor is enabled on the host, libvirtd is
|
||||||
|
+# generously confined but users must opt-in to confine qemu
|
||||||
|
+# instances. Change this to a non-zero value to enable default
|
||||||
|
+# Apparmor confinement of qemu instances.
|
||||||
|
+#
|
||||||
|
+security_default_confined = 0
|
||||||
|
|
||||||
# If set to non-zero, then attempts to create unconfined
|
# If set to non-zero, then attempts to create unconfined
|
||||||
@@ -417,11 +417,22 @@
|
# guests will be blocked. Defaults to 0.
|
||||||
|
@@ -417,11 +426,22 @@
|
||||||
#allow_disk_format_probing = 1
|
#allow_disk_format_probing = 1
|
||||||
|
|
||||||
|
|
||||||
@ -39,16 +53,3 @@ Index: libvirt-1.2.13/src/qemu/qemu.conf
|
|||||||
#
|
#
|
||||||
#lock_manager = "lockd"
|
#lock_manager = "lockd"
|
||||||
|
|
||||||
Index: libvirt-1.2.13/src/qemu/qemu_conf.c
|
|
||||||
===================================================================
|
|
||||||
--- libvirt-1.2.13.orig/src/qemu/qemu_conf.c
|
|
||||||
+++ libvirt-1.2.13/src/qemu/qemu_conf.c
|
|
||||||
@@ -293,7 +293,7 @@ virQEMUDriverConfigPtr virQEMUDriverConf
|
|
||||||
|
|
||||||
cfg->clearEmulatorCapabilities = true;
|
|
||||||
|
|
||||||
- cfg->securityDefaultConfined = true;
|
|
||||||
+ cfg->securityDefaultConfined = false;
|
|
||||||
cfg->securityRequireConfined = false;
|
|
||||||
|
|
||||||
cfg->keepAliveInterval = 5;
|
|
||||||
|
Loading…
Reference in New Issue
Block a user