On Tue, Jun 07, 2016 at 04:16:46PM +0100, Daniel P. Berrange wrote:
On Tue, Jun 07, 2016 at 05:15:54PM +0200, Peter Krempa wrote:
> On Tue, Jun 07, 2016 at 15:50:38 +0100, Daniel Berrange wrote:
> > On Tue, Jun 07, 2016 at 08:24:14AM +0200, Peter Krempa wrote:
> > > On Mon, Jun 06, 2016 at 14:25:23 -0500, Roy Keene wrote:
> > > > Patch to libvirt master to avoid failing when a user ID is specified,
> > > > e.g. for <seclabel type='dac'>, that does not map to a
user name.
> > > >
> > > > This is useful if you want to run each VM as a separate user and not
> > > > bother creating an /etc/passwd entry for each UID.
> > >
> > > For this use case you shall prefix the name with a +. Please refer to
> > > the documentation on seclabels.
> >
> > Empirically that does not currently work:
> >
> > # virsh dumpxml serial | grep --after 2 '<seclabel'
> > <seclabel type='static' model='dac'
relabel='no'>
> > <label>+21421:+12421421</label>
> > </seclabel>
> >
> > # virsh start serial
> > error: Failed to start domain serial
> > error: Cannot access storage file '/var/lib/libvirt/images/demo.qcow2'
(as uid:21421, gid:12421421): Success
> >
> > # ls -al /var/lib/libvirt/images/demo.qcow2
> > -rw-r--r--. 1 21421 12421421 197120 Apr 30 2015
/var/lib/libvirt/images/demo.qcow2
> >
> >
> > Looking at the libvirtd logs we see
> >
> > 2016-06-07 14:49:13.724+0000: 13490: debug : qemuDomainCheckDiskPresence:3954 :
Checking for disk presence
> > 2016-06-07 14:49:16.551+0000: 13490: error : virGetUserEnt:801 : Failed to find
user record for uid '21421'
> > 2016-06-07 14:49:16.551+0000: 13490: error :
virStorageFileGetMetadataRecurse:3114 : Cannot access storage file
'/var/lib/libvirt/images/demo.qcow2' (as uid:21421, gid:12421421): Success
> >
> >
> > So even though the QEMU driver has honoured the '+' syntax, some of
the
> > things QEMU is calling appears to be trying to resolve the UID back into
> > a user password record and failing.
>
> Indeed. This is caused by calling virFileAccessibleAs which calls
> virGetGroupList so that it can add all groups for the given UID which is
> very strange. The group list is then set after forking at attempting to
> check file presence. I hate root squashed NFS.
>
> I guess we could just skip reporting the error if we can't get the
> group list in that case and just set the provided numerical UID/GID and
> try it that way.
Yep, if all we're doing is trying to get supplementary groups, then
lack of an /etc/passwd or /etc/group entry really just semantically
means zero supplementary groups are needed.
Roy, perhaps test if the following change makes it work for you:
diff --git a/src/util/virutil.c b/src/util/virutil.c
index d80d994..20a426d 100644
--- a/src/util/virutil.c
+++ b/src/util/virutil.c
@@ -1109,8 +1109,11 @@ virGetGroupList(uid_t uid, gid_t gid, gid_t **list)
if (uid == (uid_t)-1)
return 0;
- if (virGetUserEnt(uid, &user, &primary, NULL) < 0)
- return -1;
+ if (virGetUserEnt(uid, &user, &primary, NULL) < 0) {
+ VIR_INFO("No passwd entry for uid %llu, setting empty group list"
+ (unsigned long long)uid);
+ return 0;
+ }
ret = mgetgroups(user, primary, list);
if (ret < 0) {
Regards,
Daniel
--
|:
http://berrange.com -o-
http://www.flickr.com/photos/dberrange/ :|
|:
http://libvirt.org -o-
http://virt-manager.org :|
|:
http://autobuild.org -o-
http://search.cpan.org/~danberr/ :|
|:
http://entangle-photo.org -o-
http://live.gnome.org/gtk-vnc :|