Displaying 6 results from an estimated 6 matches for "libvirt_qemu_us".
Did you mean:
libvirt_qemu_user
2023 Jun 29
1
[v2v PATCH v2 2/3] lib/utils: make "chown_for_libvirt_rhbz_1045069" fail hard
...9,21 +149,15 @@ let backend_is_libvirt () =
>
> let rec chown_for_libvirt_rhbz_1045069 file =
> let running_as_root = Unix.geteuid () = 0 in
> - if running_as_root && backend_is_libvirt () then (
> - try
> - let user = Option.value ~default:"qemu" (libvirt_qemu_user ()) in
> - let uid =
> - if String.is_prefix user "+" then
> - int_of_string (String.sub user 1 (String.length user - 1))
> - else
> - (Unix.getpwnam user).pw_uid in
> - debug "setting owner of %s to %d:root" file uid...
2023 Jun 29
1
[v2v PATCH v2 2/3] lib/utils: make "chown_for_libvirt_rhbz_1045069" fail hard
...s.ml
+++ b/lib/utils.ml
@@ -149,21 +149,15 @@ let backend_is_libvirt () =
let rec chown_for_libvirt_rhbz_1045069 file =
let running_as_root = Unix.geteuid () = 0 in
- if running_as_root && backend_is_libvirt () then (
- try
- let user = Option.value ~default:"qemu" (libvirt_qemu_user ()) in
- let uid =
- if String.is_prefix user "+" then
- int_of_string (String.sub user 1 (String.length user - 1))
- else
- (Unix.getpwnam user).pw_uid in
- debug "setting owner of %s to %d:root" file uid;
- Unix.chown file uid 0...
2023 Jun 29
1
[v2v PATCH v2 2/3] lib/utils: make "chown_for_libvirt_rhbz_1045069" fail hard
...end_is_libvirt () =
>>
>> let rec chown_for_libvirt_rhbz_1045069 file =
>> let running_as_root = Unix.geteuid () = 0 in
>> - if running_as_root && backend_is_libvirt () then (
>> - try
>> - let user = Option.value ~default:"qemu" (libvirt_qemu_user ()) in
>> - let uid =
>> - if String.is_prefix user "+" then
>> - int_of_string (String.sub user 1 (String.length user - 1))
>> - else
>> - (Unix.getpwnam user).pw_uid in
>> - debug "setting owner of %s t...
2023 Jun 29
1
[v2v PATCH v2 2/3] lib/utils: make "chown_for_libvirt_rhbz_1045069" fail hard
...gt;
> >> let rec chown_for_libvirt_rhbz_1045069 file =
> >> let running_as_root = Unix.geteuid () = 0 in
> >> - if running_as_root && backend_is_libvirt () then (
> >> - try
> >> - let user = Option.value ~default:"qemu" (libvirt_qemu_user ()) in
> >> - let uid =
> >> - if String.is_prefix user "+" then
> >> - int_of_string (String.sub user 1 (String.length user - 1))
> >> - else
> >> - (Unix.getpwnam user).pw_uid in
> >> - deb...
2023 Jun 29
1
[v2v PATCH v2 2/3] lib/utils: make "chown_for_libvirt_rhbz_1045069" fail hard
...gt;> let rec chown_for_libvirt_rhbz_1045069 file =
>>>> let running_as_root = Unix.geteuid () = 0 in
>>>> - if running_as_root && backend_is_libvirt () then (
>>>> - try
>>>> - let user = Option.value ~default:"qemu" (libvirt_qemu_user ()) in
>>>> - let uid =
>>>> - if String.is_prefix user "+" then
>>>> - int_of_string (String.sub user 1 (String.length user - 1))
>>>> - else
>>>> - (Unix.getpwnam user).pw_uid in
>>&...
2023 Jun 29
3
[v2v PATCH v2 0/3] improve UX when running as root and we can't chown
Bugzilla: https://bugzilla.redhat.com/show_bug.cgi?id=2182024
v1 was here:
<https://listman.redhat.com/archives/libguestfs/2023-June/031910.html>.
Make any "chown_for_libvirt_rhbz_1045069" failure a hard one; that way
the user gets to see more direct and more uniform error messages (namely
that we couldn't connect to libvirt).
Document those connection problems, and a simple