Re: virsh rights voor normal users

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 





On Thu, Oct 29, 2020 at 4:25 PM Daniel P. Berrange <dan@xxxxxxxxxxxx> wrote:
On Thu, Oct 29, 2020 at 04:13:45PM +0100, Natxo Asenjo wrote:
> if I run virsh list --all I get an empty listing.
>
> So using cockpit I can manage the system vms, but I cannot use virsh.
>
> This is in a rhel 7.8 system. The host is joined to an Idm realm, and this
> realm has a trust to an AD forest. The users are AD users mapped to an
> external Idm group.
>
> Any ideas as to what we do wrong?

There are two distinct instances of libvirt - system mode and session
mode. I suspect cockpit is using a different instance than your
virsh command

https://libvirt.org/drvqemu.html#securitydriver

virsh defaults to "session" mode if running non-root, "system" mode
if running as root. You can use "-c URI" to override the default if
running non-root.

ah, yes. I try this:

$ virsh -c qemu:///system

But it then I get a prompt:

==== AUTHENTICATING FOR org.libvirt.unix.manage =============
System policy prevents management of local virtualized systems
Authenticating as:  sudo_user_not_disclosed
Password:
Password:
polikit-agent-helper-1: pam_authenticate failed: Authentication failure

Our allowed groups in the /etc/dbus-1/system.d/org.libvirt.conf are no sudo users (this can change, but not as of now). It is a bit strange that the get the password prompt for a local sudo user we have in place for as systems have no working sssd connection to the idm realm (break glass user)

My user can use the system bus in cockpit without a password.

The dbus policy looks like this:

<policy group="groupname">
    < allow send_destination="org.libvirt"/>
</policy>
<policy group="other_groupname">
    < allow send_destination="org.libvirt"/>
</policy>

[Index of Archives]     [Virt Tools]     [Lib OS Info]     [Fedora Users]     [Fedora Desktop]     [Fedora SELinux]     [Yosemite News]     [KDE Users]

  Powered by Linux