Skip to content

Conversation

gronke
Copy link
Member

@gronke gronke commented Jan 10, 2019

implements #604
blocked by #644

  • allow.vmm jail parameter

Copy link
Collaborator

@igalic igalic left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

👀

ioc/Jail.py Outdated
)
devfs_ruleset.append("add path vmm unhide")
devfs_ruleset.append("add path vmm/* unhide")
devfs_ruleset.append("add path nmdm* unhide")
Copy link
Collaborator

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

this is also missing from iocage/iocage#767

@gronke gronke force-pushed the feature/bhyve branch 3 times, most recently from bd2e62f to 7f4f461 Compare January 10, 2019 21:27
Copy link
Collaborator

@igalic igalic left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

we should make this more restricted

ioc/Jail.py Outdated
@@ -1602,6 +1602,11 @@ def devfs_ruleset(self) -> ioc.DevfsRules.DevfsRuleset:
if self._allow_mount_zfs == "1":
devfs_ruleset.append("add path zfs unhide")

if self.config["allow_vmm"] is True:
devfs_ruleset.append("add path vmm unhide")
devfs_ruleset.append("add path vmm/* unhide")
Copy link
Collaborator

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

as discussed elsewhere, it would be good to create a concrete rule per vmm container, rather than exposing all these devices to each jail

@gronke gronke merged commit 00a2024 into master Feb 8, 2019
@gronke gronke deleted the feature/bhyve branch February 8, 2019 17:14
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants