Eipä onnistunut
On kyllä käsittämätön ongelma. Jos kuvitellaan, että minulla olisi useampi quest-käyttäjä, jotka eri käyttöjärjestelmissä, niin voisivatko he "vaihtaa" tiedostoja keskenään? Aprikoi Raija.
Näin siinä kävi:
raija@localhost:~> l /share/
yhteensä 4
drwxrwxrwx+ 1 root root 76 16.12. 15:45 ./
drwxr-xr-x 1 root root 242 11.12. 23:23 ../
-rw------- 1 qemu qemu 74 16.12. 15:45 testataan2.txt
-rw------- 1 qemu qemu 0 16.12. 15:42 testataan.txt
drwx------ 1 qemu qemu 18 16.12. 15:42 .Trash-1000/
raija@localhost:~> cat /share/testataan2.txt
cat: /share/testataan2.txt: Lupa evätty
raija@localhost:~>
raija@localhost:~> getfacl /share
getfacl: Removing leading '/' from absolute path names
# file: share
# owner: root
# group: root
user::rwx
user:raija:rwx
group::rwx
mask::rwx
other::rwx
raija@localhost:~>
Muoks:
Listätään vielä näma tulosteet:
localhost:~ # getfacl /share/*
getfacl: Removing leading '/' from absolute path names
# file: share/testataan.txt
# owner: qemu
# group: qemu
user::rw-
group::---
other::---
# file: share/testataan2.txt
# owner: qemu
# group: qemu
user::rw-
group::---
other::---
====================================================
Löysin qemu.conf -tiedostosta ao. tiedon (jota en tietenkään oikein ymmärrä, enkä uskalla mennä paljon pätsäämäänkään. Toki kävin vaihtamassa "root" -> "raija" -ei apua:
# The default security driver is SELinux. If SELinux is disabled
# on the host, then the security driver will automatically disable
# itself. If you wish to disable QEMU SELinux security driver while
# leaving SELinux enabled for the host in general, then set this
# to 'none' instead. It's also possible to use more than one security
# driver at the same time, for this use a list of names separated by
# comma and delimited by square brackets. For example:
#
# security_driver = [ "selinux", "apparmor" ]
#
# Notes: The DAC security driver is always enabled; as a result, the
# value of security_driver cannot contain "dac". The value "none" is
# a special value; security_driver can be set to that value in
# isolation, but it cannot appear in a list of drivers.
#
#security_driver = "selinux"
#security_driver = "apparmor"
# If set to non-zero, then the default security labeling
# will make guests confined. If set to zero, then guests
# will be unconfined by default. Defaults to 0.
#
# SUSE Note:
# Currently, Apparmor is the default security framework in SUSE
# distros. If Apparmor is enabled on the host, libvirtd is
# generously confined but users must opt-in to confine qemu
# instances. Change this to a non-zero value to enable default
# Apparmor confinement of qemu instances.
#
#security_default_confined = 1
# If set to non-zero, then attempts to create unconfined
# guests will be blocked. Defaults to 0.
#security_require_confined = 1
# The user for QEMU processes run by the system instance. It can be
# specified as a user name or as a user id. The qemu driver will try to
# parse this value first as a name and then, if the name doesn't exist,
# as a user id.
#
# Since a sequence of digits is a valid user name, a leading plus sign
# can be used to ensure that a user id will not be interpreted as a user
# name.
#
# Some examples of valid values are:
#
# user = "qemu" # A user named "qemu"
# user = "+0" # Super user (uid=0)
# user = "100" # A user named "100" or a user with uid=100
#
#user = "root"