Launchpad has imported 5 comments from the remote bug at
https://bugzilla.redhat.com/show_bug.cgi?id=568935.

If you reply to an imported comment from within Launchpad, your comment
will be sent to the remote bug automatically. Read more about
Launchpad's inter-bugtracker facilities at
https://help.launchpad.net/InterBugTracking.

------------------------------------------------------------------------
On 2010-02-27T00:33:18+00:00 Cristian wrote:

Description of problem:
When I use an install ISO image labeled public_content_t, virt-manager will 
relabel it as virt_content_t without any warnings. It will also change its 
owner and group to qemu. It should allow virtual machines to read those files 
(which might also be shared via http, samba or nfs).

Version-Release number of selected component (if applicable):
virt-manager-0.8.2-1.fc12.noarch.rpm

How reproducible:
Every time.

Steps to Reproduce:
1. Create a new VM.
2. Select an ISO image labeled public_content_t.
3. Continue all the steps until the machine is started.
  
Actual results:
The ISO image will be labeled virt_content_t and its owner and group will be 
changed to qemu.

Expected results:
A warning should be displayed if the permissions of the file need to be changed 
or even better allow the virtual machine to read public_content_t files.

Additional info:
I'm also using the following packages:
libvirt-0.7.1-15.fc12.x86_64.rpm
selinux-policy-targeted-3.6.32-89.fc12.noarch.rpm

A related RFE is bug #568933.

Reply at:
https://bugs.launchpad.net/ubuntu/+source/libvirt/+bug/691590/comments/0

------------------------------------------------------------------------
On 2010-02-27T01:42:34+00:00 Cole wrote:

Libvirt is doing the relabeling here. Reassigning.

Reply at:
https://bugs.launchpad.net/ubuntu/+source/libvirt/+bug/691590/comments/1

------------------------------------------------------------------------
On 2010-06-05T16:28:07+00:00 Cristian wrote:

It's still present in libvirt-0.7.7-4.fc13.x86_64.rpm.

Reply at:
https://bugs.launchpad.net/ubuntu/+source/libvirt/+bug/691590/comments/2

------------------------------------------------------------------------
On 2010-08-24T16:59:57+00:00 Cristian wrote:

It's still present in libvirt-0.8.2-1.fc13.x86_64.rpm.

Reply at:
https://bugs.launchpad.net/ubuntu/+source/libvirt/+bug/691590/comments/3

------------------------------------------------------------------------
On 2012-04-18T19:44:06+00:00 Eric wrote:

Done with this commit in 0.9.9:
commit b43432931aef92325920953ff92beabfbe5224c8
Author: Eric Blake <[email protected]>
Date:   Thu Dec 22 17:47:50 2011 -0700

    seclabel: allow a seclabel override on a disk src
    
    Implement the parsing and formatting of the XML addition of
    the previous commit.  The new XML doesn't affect qemu command
    line, so we can now test round-trip XML->memory->XML handling.
    
    I chose to reuse the existing structure, even though per-device
    override doesn't use all of those fields, rather than create a
    new structure, in order to reuse more code.
    
    * src/conf/domain_conf.h (_virDomainDiskDef): Add seclabel member.
    * src/conf/domain_conf.c (virDomainDiskDefFree): Free it.
    (virSecurityLabelDefFree): New function.
    (virDomainDiskDefFormat): Print it.
    (virSecurityLabelDefFormat): Reduce output if model not present.
    (virDomainDiskDefParseXML): Alter signature, and parse seclabel.
    (virSecurityLabelDefParseXML): Split...
    (virSecurityLabelDefParseXMLHelper): ...into new helper.
    (virDomainDeviceDefParse, virDomainDefParseXML): Update callers.
    * tests/qemuxml2argvdata/qemuxml2argv-seclabel-dynamic-override.args:
    New file.
    * tests/qemuxml2xmltest.c (mymain): Enhance test.
    * tests/qemuxml2argvtest.c (mymain): Likewise.

Reply at:
https://bugs.launchpad.net/ubuntu/+source/libvirt/+bug/691590/comments/21


** Changed in: libvirt
       Status: Unknown => Fix Released

** Changed in: libvirt
   Importance: Unknown => Medium

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/691590

Title:
  libvirt should not take ownership of ISO images

To manage notifications about this bug go to:
https://bugs.launchpad.net/libvirt/+bug/691590/+subscriptions

-- 
ubuntu-bugs mailing list
[email protected]
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to