If the user defined a mount targeting / don't add the host / as mount
to /.
---
.../libvirt-sandbox-builder-container.c | 22 ++++++++++++----------
1 file changed, 12 insertions(+), 10 deletions(-)
diff --git a/libvirt-sandbox/libvirt-sandbox-builder-container.c
b/libvirt-sandbox/libvirt-sandbox-builder-container.c
index d226d35..66e1fc6 100644
--- a/libvirt-sandbox/libvirt-sandbox-builder-container.c
+++ b/libvirt-sandbox/libvirt-sandbox-builder-container.c
@@ -256,17 +256,19 @@ static gboolean
gvir_sandbox_builder_container_construct_devices(GVirSandboxBuil
g_list_free(disks);
- fs = gvir_config_domain_filesys_new();
- gvir_config_domain_filesys_set_type(fs, GVIR_CONFIG_DOMAIN_FILESYS_MOUNT);
- gvir_config_domain_filesys_set_access_type(fs,
GVIR_CONFIG_DOMAIN_FILESYS_ACCESS_PASSTHROUGH);
- gvir_config_domain_filesys_set_source(fs,
- gvir_sandbox_config_get_root(config));
- gvir_config_domain_filesys_set_target(fs, "/");
- gvir_config_domain_filesys_set_readonly(fs, TRUE);
+ if (!gvir_sandbox_config_has_root_mount(config)) {
+ fs = gvir_config_domain_filesys_new();
+ gvir_config_domain_filesys_set_type(fs, GVIR_CONFIG_DOMAIN_FILESYS_MOUNT);
+ gvir_config_domain_filesys_set_access_type(fs,
GVIR_CONFIG_DOMAIN_FILESYS_ACCESS_PASSTHROUGH);
+ gvir_config_domain_filesys_set_source(fs,
+ gvir_sandbox_config_get_root(config));
+ gvir_config_domain_filesys_set_target(fs, "/");
+ gvir_config_domain_filesys_set_readonly(fs, TRUE);
- gvir_config_domain_add_device(domain,
- GVIR_CONFIG_DOMAIN_DEVICE(fs));
- g_object_unref(fs);
+ gvir_config_domain_add_device(domain,
+ GVIR_CONFIG_DOMAIN_DEVICE(fs));
+ g_object_unref(fs);
+ }
--
2.1.4