{"payload":{"feedbackUrl":"https://github.com/orgs/community/discussions/53140","repo":{"id":206128709,"defaultBranch":"master","name":"avocado-vt","ownerLogin":"smitterl","currentUserCanPush":false,"isFork":true,"isEmpty":false,"createdAt":"2019-09-03T17:00:45.000Z","ownerAvatar":"https://avatars.githubusercontent.com/u/54858857?v=4","public":true,"private":false,"isOrgOwned":false},"refInfo":{"name":"","listCacheKey":"v0:1724167809.0","currentOid":""},"activityList":{"items":[{"before":"90049fa4a2b362a65c7e2c30c4bdb928ad5adac3","after":"b28ac07cacd34c85d358f07997a06a52de35e4c8","ref":"refs/heads/add_zfcp","pushedAt":"2024-08-20T16:06:21.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"smitterl","name":"Sebastian Mitterle","path":"/smitterl","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/54858857?s=80&v=4"},"commit":{"message":"libvirt_xml/devices/address: add optional zpci subelement\n\nOn s390x, there can be a zpci subelement which is used to\ndetermine properties inside the guest: uid corresponds to the domain\nand fid corresponds to the slot number.\n\nSigned-off-by: Sebastian Mitterle ","shortMessageHtmlLink":"libvirt_xml/devices/address: add optional zpci subelement"}},{"before":"640bf3c853b69868edfeac1563e08b0553b41433","after":"90049fa4a2b362a65c7e2c30c4bdb928ad5adac3","ref":"refs/heads/add_zfcp","pushedAt":"2024-08-20T15:34:26.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"smitterl","name":"Sebastian Mitterle","path":"/smitterl","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/54858857?s=80&v=4"},"commit":{"message":"libvirt_xml/devices/address: add optional zfcp subelement\n\nOn s390x, there can be a zfcp subelement which is used to\ndetermine properties inside the guest: uid corresponds to the domain\nand fid corresponds to the slot number.\n\nSigned-off-by: Sebastian Mitterle ","shortMessageHtmlLink":"libvirt_xml/devices/address: add optional zfcp subelement"}},{"before":null,"after":"640bf3c853b69868edfeac1563e08b0553b41433","ref":"refs/heads/add_zfcp","pushedAt":"2024-08-20T15:30:09.000Z","pushType":"branch_creation","commitsCount":0,"pusher":{"login":"smitterl","name":"Sebastian Mitterle","path":"/smitterl","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/54858857?s=80&v=4"},"commit":{"message":"libvirt_xml/devices/address: add optional zfcp subelement\n\nOn s390x, there can be a zfcp subelement which is used to\ndetermine properties inside the guest: uid corresponds to the domain\nand fid corresponds to the slot number.\n\nSigned-off-by: Sebastian Mitterle ","shortMessageHtmlLink":"libvirt_xml/devices/address: add optional zfcp subelement"}},{"before":null,"after":"0203291df75e89616b89e33980d2f4d8a4c8fd09","ref":"refs/heads/hotfix_other","pushedAt":"2024-05-31T08:15:09.000Z","pushType":"branch_creation","commitsCount":0,"pusher":{"login":"smitterl","name":"Sebastian Mitterle","path":"/smitterl","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/54858857?s=80&v=4"},"commit":{"message":"libvirt_xml/other: add empty __init__.py file\n\nFixes module setup errors with avocado 104 python 3.9.\n\nSigned-off-by: Sebastian Mitterle ","shortMessageHtmlLink":"libvirt_xml/other: add empty __init__.py file"}},{"before":"05fbf4c73d6294cab98efcb2f3940849c8175d61","after":null,"ref":"refs/heads/add_guid_uid_map_checks","pushedAt":"2024-05-31T08:05:14.000Z","pushType":"branch_deletion","commitsCount":0,"pusher":{"login":"smitterl","name":"Sebastian Mitterle","path":"/smitterl","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/54858857?s=80&v=4"}},{"before":"b8cc2ff4272dd39a1693dddb5465a2352835de23","after":"05fbf4c73d6294cab98efcb2f3940849c8175d61","ref":"refs/heads/add_guid_uid_map_checks","pushedAt":"2024-05-16T11:53:15.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"smitterl","name":"Sebastian Mitterle","path":"/smitterl","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/54858857?s=80&v=4"},"commit":{"message":"virttest: changes to support testing non-root virtiofs\n\nutils_ids: add new module to retrieve Linux user ids\n\nThe module contains functions to retrieve uid, gid, subuid, subgid\ninfo for a given username.\n\nsubuid, subgid are used by libvirt to run virtiofs with idmap\nenabling unprivileged user access to filesystem passthrough.\n\nAdd a function to check if a given fileystem xml contains the\nidmap element as expected based on user info that's retrieved\nby the beforementioned functions in this module.\n\nlibvirt_xml/base:\nlibvirt_xml/vm_xml:\nlibvirt_xml/devices/filesystem_device:\n\nAdd to the filesystem device.\n\n can be under /domain directly but also under //filesystem\ntherefore it doesn't fit below devices.\n\nCreate another folder for other elements that don't fit into\n* libvirt_xml: on this level we have the different XML types like\n domain xml (vm_xml), network_xml and so on\n* libvirt_xml/devices: here we have all elements that are below the\n /domain/devices node\n\nAdd properties 'gids' and 'uids' because there will be more than one.\nThe old properties 'gid' and 'uid' are left untouched.\n\nAdd sandbox mode to the binary subtag because it's used when running\nVMs with virtiofs as non-root users.\n\nUpdate some property settings functions on vm_xml to use the passed\nvirsh_instance when sync'ing the xml, otherwise the XML won't be sync'd\nwhen run with an unprivileged virsh instance.\n\nUpdate some property settings functions on vml_xml to use the passed\nthrough vmxml and not sync. This will allow to chain several XML updates\nand only call sync at the end externally and this way reduce the number\nof virsh calls and I/O interactions improving the test performance.\n\nAlso, remove sysinfo_xml: It is more extensively defined already in\n vm_xml where it belongs due to its local use only\n below /domain. Move the get_all_processors there.\n\nSigned-off-by: Sebastian Mitterle ","shortMessageHtmlLink":"virttest: changes to support testing non-root virtiofs"}},{"before":"3b23c8b47cc8565918ccbd1cb9704b2442d011cc","after":"b8cc2ff4272dd39a1693dddb5465a2352835de23","ref":"refs/heads/add_guid_uid_map_checks","pushedAt":"2024-05-14T09:43:58.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"smitterl","name":"Sebastian Mitterle","path":"/smitterl","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/54858857?s=80&v=4"},"commit":{"message":"virttest: changes to support testing non-root virtiofs\n\nutils_ids: add new module to retrieve Linux user ids\n\nThe module contains functions to retrieve uid, gid, subuid, subgid\ninfo for a given username.\n\nsubuid, subgid are used by libvirt to run virtiofs with idmap\nenabling unprivileged user access to filesystem passthrough.\n\nAdd a function to check if a given fileystem xml contains the\nidmap element as expected based on user info that's retrieved\nby the beforementioned functions in this module.\n\nlibvirt_xml/base:\nlibvirt_xml/vm_xml:\nlibvirt_xml/devices/filesystem_device:\n\nAdd to the filesystem device.\n\n can be under /domain directly but also under //filesystem\ntherefore it doesn't fit below devices.\n\nCreate another folder for other elements that don't fit into\n* libvirt_xml: on this level we have the different XML types like\n domain xml (vm_xml), network_xml and so on\n* libvirt_xml/devices: here we have all elements that are below the\n /domain/devices node\n\nAdd properties 'gids' and 'uids' because there will be more than one.\nThe old properties 'gid' and 'uid' are left untouched.\n\nAdd sandbox mode to the binary subtag because it's used when running\nVMs with virtiofs as non-root users.\n\nUpdate some property settings functions on vm_xml to use the passed\nvirsh_instance when sync'ing the xml, otherwise the XML won't be sync'd\nwhen run with an unprivileged virsh instance.\n\nUpdate some property settings functions on vml_xml to use the passed\nthrough vmxml and not sync. This will allow to chain several XML updates\nand only call sync at the end externally and this way reduce the number\nof virsh calls and I/O interactions improving the test performance.\n\nAlso, remove sysinfo_xml: It is more extensively defined already in\n vm_xml where it belongs due to its local use only\n below /domain. Move the get_all_processors there.\n\nSigned-off-by: Sebastian Mitterle ","shortMessageHtmlLink":"virttest: changes to support testing non-root virtiofs"}},{"before":"bfb12fd92ca8873cdfda8699790dd6cd3a75cfa2","after":"3b23c8b47cc8565918ccbd1cb9704b2442d011cc","ref":"refs/heads/add_guid_uid_map_checks","pushedAt":"2024-05-14T09:42:07.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"smitterl","name":"Sebastian Mitterle","path":"/smitterl","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/54858857?s=80&v=4"},"commit":{"message":"virttest: changes to support testing non-root virtiofs\n\nutils_ids: add new module to retrieve Linux user ids\n\nThe module contains functions to retrieve uid, gid, subuid, subgid\ninfo for a given username.\n\nsubuid, subgid are used by libvirt to run virtiofs with idmap\nenabling unprivileged user access to filesystem passthrough.\n\nAdd a function to check if a given fileystem xml contains the\nidmap element as expected based on user info that's retrieved\nby the beforementioned functions in this module.\n\nlibvirt_xml/base:\nlibvirt_xml/vm_xml:\nlibvirt_xml/devices/filesystem_device:\n\nAdd to the filesystem device.\n\n can be under /domain directly but also under //filesystem\ntherefore it doesn't fit below devices.\n\nCreate another folder for other elements that don't fit into\n* libvirt_xml: on this level we have the different XML types like\n domain xml (vm_xml), network_xml and so on\n* libvirt_xml/devices: here we have all elements that are below the\n /domain/devices node\n\nAdd properties 'gids' and 'uids' because there will be more than one.\nThe old properties 'gid' and 'uid' are left untouched.\n\nAdd sandbox mode to the binary subtag because it's used when running\nVMs with virtiofs as non-root users.\n\nUpdate some property settings functions on vm_xml to use the passed\nvirsh_instance when sync'ing the xml, otherwise the XML won't be sync'd\nwhen run with an unprivileged virsh instance.\n\nUpdate some property settings functions on vml_xml to use the passed\nthrough vmxml and not sync. This will allow to chain several XML updates\nand only call sync at the end externally and this way reduce the number\nof virsh calls and I/O interactions improving the test performance.\n\nAlso, remove sysinfo_xml: It is more extensively defined already in\n vm_xml where it belongs due to its local use only\n below /domain. Move the get_all_processors there.\n\nSigned-off-by: Sebastian Mitterle ","shortMessageHtmlLink":"virttest: changes to support testing non-root virtiofs"}},{"before":"381643ba0a33ff097f3950b13355c32c7b0a05d8","after":"bfb12fd92ca8873cdfda8699790dd6cd3a75cfa2","ref":"refs/heads/add_guid_uid_map_checks","pushedAt":"2024-05-14T09:30:37.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"smitterl","name":"Sebastian Mitterle","path":"/smitterl","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/54858857?s=80&v=4"},"commit":{"message":"virttest: changes to support testing non-root virtiofs\n\nutils_ids: add new module to retrieve Linux user ids\n\nThe module contains functions to retrieve uid, gid, subuid, subgid\ninfo for a given username.\n\nsubuid, subgid are used by libvirt to run virtiofs with idmap\nenabling unprivileged user access to filesystem passthrough.\n\nAdd a function to check if a given fileystem xml contains the\nidmap element as expected based on user info that's retrieved\nby the beforementioned functions in this module.\n\nlibvirt_xml/base:\nlibvirt_xml/vm_xml:\nlibvirt_xml/devices/filesystem_device:\n\nAdd to the filesystem device.\n\n can be under /domain directly but also under //filesystem\ntherefore it doesn't fit below devices.\n\nCreate another folder for other elements that don't fit into\n* libvirt_xml: on this level we have the different XML types like\n domain xml (vm_xml), network_xml and so on\n* libvirt_xml/devices: here we have all elements that are below the\n /domain/devices node\n\nAdd properties 'gids' and 'uids' because there will be more than one.\nThe old properties 'gid' and 'uid' are left untouched.\n\nAdd sandbox mode to the binary subtag because it's used when running\nVMs with virtiofs as non-root users.\n\nUpdate some property settings functions on vm_xml to use the passed\nvirsh_instance when sync'ing the xml, otherwise the XML won't be sync'd\nwhen run with an unprivileged virsh instance.\n\nUpdate some property settings functions on vml_xml to use the passed\nthrough vmxml and not sync. This will allow to chain several XML updates\nand only call sync at the end externally and this way reduce the number\nof virsh calls and I/O interactions improving the test performance.\n\nAlso, remove sysinfo_xml: It is more extensively defined already in\n vm_xml where it belongs due to its local use only\n below /domain. Move the get_all_processors there.\n\nSigned-off-by: Sebastian Mitterle ","shortMessageHtmlLink":"virttest: changes to support testing non-root virtiofs"}},{"before":"b993a7796973ab1938974b7f20222b3801737c27","after":"381643ba0a33ff097f3950b13355c32c7b0a05d8","ref":"refs/heads/add_guid_uid_map_checks","pushedAt":"2024-05-14T09:22:07.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"smitterl","name":"Sebastian Mitterle","path":"/smitterl","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/54858857?s=80&v=4"},"commit":{"message":"virttest: changes to support testing non-root virtiofs\n\nutils_ids: add new module to retrieve Linux user ids\n\nThe module contains functions to retrieve uid, gid, subuid, subgid\ninfo for a given username.\n\nsubuid, subgid are used by libvirt to run virtiofs with idmap\nenabling unprivileged user access to filesystem passthrough.\n\nAdd a function to check if a given fileystem xml contains the\nidmap element as expected based on user info that's retrieved\nby the beforementioned functions in this module.\n\nlibvirt_xml/base:\nlibvirt_xml/vm_xml:\nlibvirt_xml/devices/filesystem_device:\n\nAdd to the filesystem device.\n\n can be under /domain directly but also under //filesystem\ntherefore it doesn't fit below devices.\n\nCreate another folder for other elements that don't fit into\n* libvirt_xml: on this level we have the different XML types like\n domain xml (vm_xml), network_xml and so on\n* libvirt_xml/devices: here we have all elements that are below the\n /domain/devices node\n\nAdd properties 'gids' and 'uids' because there will be more than one.\nThe old properties 'gid' and 'uid' are left untouched.\n\nAdd sandbox mode to the binary subtag because it's used when running\nVMs with virtiofs as non-root users.\n\nUpdate some property settings functions on vm_xml to use the passed\nvirsh_instance when sync'ing the xml, otherwise the XML won't be sync'd\nwhen run with an unprivileged virsh instance.\n\nUpdate some property settings functions on vml_xml to use the passed\nthrough vmxml and not sync. This will allow to chain several XML updates\nand only call sync at the end externally and this way reduce the number\nof virsh calls and I/O interactions improving the test performance.\n\nAlso, remove sysinfo_xml: It is more extensively defined already in\n vm_xml where it belongs due to its local use only\n below /domain. Move the get_all_processors there.\n\nSigned-off-by: Sebastian Mitterle ","shortMessageHtmlLink":"virttest: changes to support testing non-root virtiofs"}},{"before":"927c933cd371418d1c4deb3380998b45d6a95791","after":"b993a7796973ab1938974b7f20222b3801737c27","ref":"refs/heads/add_guid_uid_map_checks","pushedAt":"2024-05-14T09:15:03.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"smitterl","name":"Sebastian Mitterle","path":"/smitterl","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/54858857?s=80&v=4"},"commit":{"message":"virttest: changes to support testing non-root virtiofs\n\nutils_ids: add new module to retrieve Linux user ids\n\nThe module contains functions to retrieve uid, gid, subuid, subgid\ninfo for a given username.\n\nsubuid, subgid are used by libvirt to run virtiofs with idmap\nenabling unprivileged user access to filesystem passthrough.\n\nAdd a function to check if a given fileystem xml contains the\nidmap element as expected based on user info that's retrieved\nby the beforementioned functions in this module.\n\nlibvirt_xml/base:\nlibvirt_xml/vm_xml:\nlibvirt_xml/devices/filesystem_device:\n\nAdd to the filesystem device.\n\n can be under /domain directly but also under //filesystem\ntherefore it doesn't fit below devices.\n\nCreate another folder for other elements that don't fit into\n* libvirt_xml: on this level we have the different XML types like\n domain xml (vm_xml), network_xml and so on\n* libvirt_xml/devices: here we have all elements that are below the\n /domain/devices node\n\nAdd properties 'gids' and 'uids' because there will be more than one.\nThe old properties 'gid' and 'uid' are left untouched.\n\nAdd sandbox mode to the binary subtag because it's used when running\nVMs with virtiofs as non-root users.\n\nUpdate some property settings functions on vm_xml to use the passed\nvirsh_instance when sync'ing the xml, otherwise the XML won't be sync'd\nwhen run with an unprivileged virsh instance.\n\nUpdate some property settings functions on vml_xml to use the passed\nthrough vmxml and not sync. This will allow to chain several XML updates\nand only call sync at the end externally and this way reduce the number\nof virsh calls and I/O interactions improving the test performance.\n\nAlso, remove sysinfo_xml: It is more extensively defined already in\n vm_xml where it belongs due to its local use only\n below /domain. Move the get_all_processors there.\n\nSigned-off-by: Sebastian Mitterle ","shortMessageHtmlLink":"virttest: changes to support testing non-root virtiofs"}},{"before":"da6ae54aaaca10f2bc707838c138bdeabba10372","after":"927c933cd371418d1c4deb3380998b45d6a95791","ref":"refs/heads/add_guid_uid_map_checks","pushedAt":"2024-05-14T09:05:15.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"smitterl","name":"Sebastian Mitterle","path":"/smitterl","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/54858857?s=80&v=4"},"commit":{"message":"virttest: changes to support testing non-root virtiofs\n\nutils_ids: add new module to retrieve Linux user ids\n\nThe module contains functions to retrieve uid, gid, subuid, subgid\ninfo for a given username.\n\nsubuid, subgid are used by libvirt to run virtiofs with idmap\nenabling unprivileged user access to filesystem passthrough.\n\nAdd a function to check if a given fileystem xml contains the\nidmap element as expected based on user info that's retrieved\nby the beforementioned functions in this module.\n\nlibvirt_xml/base:\nlibvirt_xml/vm_xml:\nlibvirt_xml/devices/filesystem_device:\n\nAdd to the filesystem device.\n\n can be under /domain directly but also under //filesystem\ntherefore it doesn't fit below devices.\n\nCreate another folder for other elements that don't fit into\n* libvirt_xml: on this level we have the different XML types like\n domain xml (vm_xml), network_xml and so on\n* libvirt_xml/devices: here we have all elements that are below the\n /domain/devices node\n\nAdd properties 'gids' and 'uids' because there will be more than one.\nThe old properties 'gid' and 'uid' are left untouched.\n\nAdd sandbox mode to the binary subtag because it's used when running\nVMs with virtiofs as non-root users.\n\nUpdate some property settings functions on vm_xml to use the passed\nvirsh_instance when sync'ing the xml, otherwise the XML won't be sync'd\nwhen run with an unprivileged virsh instance.\n\nUpdate some property settings functions on vml_xml to use the passed\nthrough vmxml and not sync. This will allow to chain several XML updates\nand only call sync at the end externally and this way reduce the number\nof virsh calls and I/O interactions improving the test performance.\n\nAlso, remove sysinfo_xml: It is more extensively defined already in\n vm_xml where it belows due to its local use only\n below /domain\n\nSigned-off-by: Sebastian Mitterle ","shortMessageHtmlLink":"virttest: changes to support testing non-root virtiofs"}},{"before":"a4639f4574551021df5f98540732de6cec40af2e","after":"da6ae54aaaca10f2bc707838c138bdeabba10372","ref":"refs/heads/add_guid_uid_map_checks","pushedAt":"2024-05-13T11:02:38.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"smitterl","name":"Sebastian Mitterle","path":"/smitterl","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/54858857?s=80&v=4"},"commit":{"message":"virttest: changes to support testing non-root virtiofs\n\nutils_ids: add new module to retrieve Linux user ids\n\nThe module contains functions to retrieve uid, gid, subuid, subgid\ninfo for a given username.\n\nsubuid, subgid are used by libvirt to run virtiofs with idmap\nenabling unprivileged user access to filesystem passthrough.\n\nAdd a function to check if a given fileystem xml contains the\nidmap element as expected based on user info that's retrieved\nby the beforementioned functions in this module.\n\nlibvirt_xml/base:\nlibvirt_xml/vm_xml:\nlibvirt_xml/devices/filesystem_device:\n\nAdd to the filesystem device.\n\n can be under /domain directly but also under //filesystem\ntherefore it doesn't fit below devices.\n\nCreate another folder for other elements that don't fit into\n* libvirt_xml: on this level we have the different XML types like\n domain xml (vm_xml), network_xml and so on\n* libvirt_xml/devices: here we have all elements that are below the\n /domain/devices node\n\nAdd properties 'gids' and 'uids' because there will be more than one.\nThe old properties 'gid' and 'uid' are left untouched.\n\nAdd sandbox mode to the binary subtag because it's used when running\nVMs with virtiofs as non-root users.\n\nUpdate some property settings functions on vm_xml to use the passed\nvirsh_instance when sync'ing the xml, otherwise the XML won't be sync'd\nwhen run with an unprivileged virsh instance.\n\nUpdate some property settings functions on vml_xml to use the passed\nthrough vmxml and not sync. This will allow to chain several XML updates\nand only call sync at the end externally and this way reduce the number\nof virsh calls and I/O interactions improving the test performance.\n\nAlso, remove sysinfo_xml: It is more extensively defined already in\n vm_xml where it belows due to its local use only\n below /domain\n\nSigned-off-by: Sebastian Mitterle ","shortMessageHtmlLink":"virttest: changes to support testing non-root virtiofs"}},{"before":"316de918cef46df5210d7be3bf3ea57aa5ff6e5a","after":"a4639f4574551021df5f98540732de6cec40af2e","ref":"refs/heads/add_guid_uid_map_checks","pushedAt":"2024-05-13T11:00:14.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"smitterl","name":"Sebastian Mitterle","path":"/smitterl","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/54858857?s=80&v=4"},"commit":{"message":"virttest: changes to support testing non-root virtiofs\n\nutils_ids: add new module to retrieve Linux user ids\n\nThe module contains functions to retrieve uid, gid, subuid, subgid\ninfo for a given username.\n\nsubuid, subgid are used by libvirt to run virtiofs with idmap\nenabling unprivileged user access to filesystem passthrough.\n\nAdd a function to check if a given fileystem xml contains the\nidmap element as expected based on user info that's retrieved\nby the beforementioned functions in this module.\n\nlibvirt_xml/base:\nlibvirt_xml/vm_xml:\nlibvirt_xml/devices/filesystem_device:\n\nAdd to the filesystem device.\n\n can be under /domain directly but also under //filesystem\ntherefore it doesn't fit below devices.\n\nCreate another folder for other elements that don't fit into\n* libvirt_xml: on this level we have the different XML types like\n domain xml (vm_xml), network_xml and so on\n* libvirt_xml/devices: here we have all elements that are below the\n /domain/devices node\n\nAdd properties 'gids' and 'uids' because there will be more than one.\nThe old properties 'gid' and 'uid' are left untouched.\n\nAdd sandbox mode to the binary subtag because it's used when running\nVMs with virtiofs as non-root users.\n\nUpdate some property settings functions on vm_xml to use the passed\nvirsh_instance when sync'ing the xml, otherwise the XML won't be sync'd\nwhen run with an unprivileged virsh instance.\n\nUpdate some property settings functions on vml_xml to use the passed\nthrough vmxml and not sync. This will allow to chain several XML updates\nand only call sync at the end externally and this way reduce the number\nof virsh calls and I/O interactions improving the test performance.\n\nAlso, remove sysinfo_xml: It is more extensively defined already in\n vm_xml where it belows due to its local use only\n below /domain\n\nSigned-off-by: Sebastian Mitterle ","shortMessageHtmlLink":"virttest: changes to support testing non-root virtiofs"}},{"before":"9de6bc6c6725b16a54052a4dac8817c63987f6fa","after":"316de918cef46df5210d7be3bf3ea57aa5ff6e5a","ref":"refs/heads/add_guid_uid_map_checks","pushedAt":"2024-04-26T16:01:53.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"smitterl","name":"Sebastian Mitterle","path":"/smitterl","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/54858857?s=80&v=4"},"commit":{"message":"virttest: changes to support testing non-root virtiofs\n\nutils_ids: add new module to retrieve Linux user ids\n\nThe module contains functions to retrieve uid, gid, subuid, subgid\ninfo for a given username.\n\nsubuid, subgid are used by libvirt to run virtiofs with idmap\nenabling unprivileged user access to filesystem passthrough.\n\nAdd a function to check if a given fileystem xml contains the\nidmap element as expected based on user info that's retrieved\nby the beforementioned functions in this module.\n\nlibvirt_xml/base:\nlibvirt_xml/vm_xml:\nlibvirt_xml/devices/filesystem_device:\n\nAdd to the filesystem device.\n\nMove VMIDMapXML to common base module to be reused in filesystem device\nXML.\nAdd properties 'gids' and 'uids' because there will be more than one.\nThe old properties 'gid' and 'uid' are left untouched.\n\nAdd sandbox mode to the binary subtag because it's used when running\nVMs with virtiofs as non-root users.\n\nUpdate some property settings functions on vm_xml to use the passed\nvirsh_instance when sync'ing the xml, otherwise the XML won't be sync'd\nwhen run with an unprivileged virsh instance.\n\nUpdate some property settings functions on vml_xml to use the passed\nthrough vmxml and not sync. This will allow to chain several XML updates\nand only call sync at the end externally and this way reduce the number\nof virsh calls and I/O interactions improving the test performance.\n\nSigned-off-by: Sebastian Mitterle ","shortMessageHtmlLink":"virttest: changes to support testing non-root virtiofs"}},{"before":"f7498f7177b9b642ed7e57810007dd808df62ee8","after":"9de6bc6c6725b16a54052a4dac8817c63987f6fa","ref":"refs/heads/add_guid_uid_map_checks","pushedAt":"2024-04-26T15:57:39.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"smitterl","name":"Sebastian Mitterle","path":"/smitterl","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/54858857?s=80&v=4"},"commit":{"message":"virttest: changes to support testing non-root virtiofs\n\nutils_ids: add new module to retrieve Linux user ids\n\nThe module contains functions to retrieve uid, gid, subuid, subgid\ninfo for a given username.\n\nsubuid, subgid are used by libvirt to run virtiofs with idmap\nenabling unprivileged user access to filesystem passthrough.\n\nAdd a function to check if a given fileystem xml contains the\nidmap element as expected based on user info that's retrieved\nby the beforementioned functions in this module.\n\nlibvirt_xml/base:\nlibvirt_xml/vm_xml:\nlibvirt_xml/devices/filesystem_device:\n\nAdd to the filesystem device.\n\nMove VMIDMapXML to common base module to be reused in filesystem device\nXML.\nAdd properties 'gids' and 'uids' because there will be more than one.\nThe old properties 'gid' and 'uid' are left untouched.\n\nAdd sandbox mode to the binary subtag because it's used when running\nVMs with virtiofs as non-root users.\n\nUpdate some property settings functions on vm_xml to use the passed\nvirsh_instance when sync'ing the xml, otherwise the XML won't be sync'd\nwhen run with an unprivileged virsh instance.\n\nSigned-off-by: Sebastian Mitterle ","shortMessageHtmlLink":"virttest: changes to support testing non-root virtiofs"}},{"before":"220d84ff0b6a7f6dc367133b57c3d4efbf3451d8","after":"f7498f7177b9b642ed7e57810007dd808df62ee8","ref":"refs/heads/add_guid_uid_map_checks","pushedAt":"2024-04-25T12:37:26.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"smitterl","name":"Sebastian Mitterle","path":"/smitterl","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/54858857?s=80&v=4"},"commit":{"message":"virttest: changes to support testing non-root virtiofs\n\nutils_ids: add new module to retrieve Linux user ids\n\nThe module contains functions to retrieve uid, gid, subuid, subgid\ninfo for a given username.\n\nsubuid, subgid are used by libvirt to run virtiofs with idmap\nenabling unprivileged user access to filesystem passthrough.\n\nAdd a function to check if a given fileystem xml contains the\nidmap element as expected based on user info that's retrieved\nby the beforementioned functions in this module.\n\nlibvirt_xml/base:\nlibvirt_xml/vm_xml:\nlibvirt_xml/devices/filesystem_device:\n\nAdd to the filesystem device.\n\nMove VMIDMapXML to common base module to be reused in filesystem device\nXML.\nAdd properties 'gids' and 'uids' because there will be more than one.\nThe old properties 'gid' and 'uid' are left untouched.\n\nAdd sandbox mode to the binary subtag because it's used when running\nVMs with virtiofs as non-root users.\n\nUpdate some property settings functions on vm_xml to use the passed\nvirsh_instance when sync'ing the xml, otherwise the XML won't be sync'd\nwhen run with an unprivileged virsh instance.\n\nSigned-off-by: Sebastian Mitterle ","shortMessageHtmlLink":"virttest: changes to support testing non-root virtiofs"}},{"before":"b5f1c6b60fcee3e9e833a998772139b280dd8fee","after":"220d84ff0b6a7f6dc367133b57c3d4efbf3451d8","ref":"refs/heads/add_guid_uid_map_checks","pushedAt":"2024-04-24T13:24:15.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"smitterl","name":"Sebastian Mitterle","path":"/smitterl","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/54858857?s=80&v=4"},"commit":{"message":"virttest: changes to support testing non-root virtiofs\n\nutils_ids: add new module to retrieve Linux user ids\n\nThe module contains functions to retrieve uid, gid, subuid, subgid\ninfo for a given username.\n\nsubuid, subgid are used by libvirt to run virtiofs with idmap\nenabling unprivileged user access to filesystem passthrough.\n\nAdd a function to check if a given fileystem xml contains the\nidmap element as expected based on user info that's retrieved\nby the beforementioned functions in this module.\n\nlibvirt_xml/base:\nlibvirt_xml/vm_xml:\nlibvirt_xml/devices/filesystem_device:\n\nAdd to the filesystem device.\n\nMove VMIDMapXML to common base module to be reused in filesystem device\nXML.\nAdd properties 'gids' and 'uids' because there will be more than one.\nThe old properties 'gid' and 'uid' are left untouched.\n\nAdd sandbox mode to the binary subtag because it's used when running\nVMs with virtiofs as non-root users.\n\nUpdate some property settings functions on vm_xml to use the passed\nvirsh_instance when sync'ing the xml, otherwise the XML won't be sync'd\nwhen run with an unprivileged virsh instance.\n\nSigned-off-by: Sebastian Mitterle ","shortMessageHtmlLink":"virttest: changes to support testing non-root virtiofs"}},{"before":"561de77b9b74d17229ac41b50d47cea656fa7ad8","after":"b5f1c6b60fcee3e9e833a998772139b280dd8fee","ref":"refs/heads/add_guid_uid_map_checks","pushedAt":"2024-04-24T12:04:05.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"smitterl","name":"Sebastian Mitterle","path":"/smitterl","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/54858857?s=80&v=4"},"commit":{"message":"virttest: changes to support testing non-root virtiofs\n\nutils_ids: add new module to retrieve Linux user ids\n\nThe module contains functions to retrieve uid, gid, subuid, subgid\ninfo for a given username.\n\nsubuid, subgid are used by libvirt to run virtiofs with idmap\nenabling unprivileged user access to filesystem passthrough.\n\nAdd a function to check if a given fileystem xml contains the\nidmap element as expected based on user info that's retrieved\nby the beforementioned functions in this module.\n\nlibvirt_xml/base:\nlibvirt_xml/vm_xml:\nlibvirt_xml/devices/filesystem_device:\n\nAdd to the filesystem device.\n\nMove VMIDMapXML to common base module to be reused in filesystem device\nXML.\nAdd properties 'gids' and 'uids' because there will be more than one.\nThe old properties 'gid' and 'uid' are left untouched.\n\nAdd sandbox mode to the binary subtag because it's used when running\nVMs with virtiofs as non-root users.\n\nvirsh:\n\nUpdate some property settings functions on vm_xml to use the passed\nvirsh_instance when sync'ing the xml, otherwise the XML won't be sync'd\nwhen run with an unprivileged virsh instance.\n\nAdd support for 'safe' cmd execution in VirshSession. Sometimes the\nserial console sessions can 'hang'; use the existing 'safe' command\nexecution, it will send a carriage return after a command execution.\n\nSigned-off-by: Sebastian Mitterle ","shortMessageHtmlLink":"virttest: changes to support testing non-root virtiofs"}},{"before":"1a0dc5eb396822f120955f8468d468fc8e1a119b","after":"561de77b9b74d17229ac41b50d47cea656fa7ad8","ref":"refs/heads/add_guid_uid_map_checks","pushedAt":"2024-04-22T12:50:09.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"smitterl","name":"Sebastian Mitterle","path":"/smitterl","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/54858857?s=80&v=4"},"commit":{"message":"utils_ids: add functions to check idmaps on filesystem devices\n\nutils_ids: add new module to retrieve Linux user ids\n\nThe module contains functions to retrieve uid, gid, subuid, subgid\ninfo for a given username.\n\nsubuid, subgid are used by libvirt to run virtiofs with idmap\nenabling unprivileged user access to filesystem passthrough.\n\nAdd a function to check if a given fileystem xml contains the\nidmap element as expected based on user info that's retrieved\nby the beforementioned functions in this module.\n\nlibvirt_xml/base:\nlibvirt_xml/vm_xml:\nlibvirt_xml/devices/filesystem_device:\n\nAdd to the filesystem device.\n\nMove VMIDMapXML to common base module to be reused in filesystem device\nXML.\nAdd properties 'gids' and 'uids' because there will be more than one.\nThe old properties 'gid' and 'uid' are left untouched.\n\nAdd sandbox mode to the binary subtag because it's used when running\nVMs with virtiofs as non-root users.\n\nUpdate some property settings functions on vm_xml to use the passed\nvirsh_instance when sync'ing the xml, otherwise the XML won't be sync'd\nwhen run with an unprivileged virsh instance.\n\nSigned-off-by: Sebastian Mitterle ","shortMessageHtmlLink":"utils_ids: add functions to check idmaps on filesystem devices"}},{"before":"6f485e5de66a20e8065137c649ac5e3912e09030","after":"1a0dc5eb396822f120955f8468d468fc8e1a119b","ref":"refs/heads/add_guid_uid_map_checks","pushedAt":"2024-04-19T10:47:32.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"smitterl","name":"Sebastian Mitterle","path":"/smitterl","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/54858857?s=80&v=4"},"commit":{"message":"utils_ids: add functions to check idmaps on filesystem devices\n\nutils_ids: add new module to retrieve Linux user ids\n\nThe module contains functions to retrieve uid, gid, subuid, subgid\ninfo for a given username.\n\nsubuid, subgid are used by libvirt to run virtiofs with idmap\nenabling unprivileged user access to filesystem passthrough.\n\nAdd a function to check if a given fileystem xml contains the\nidmap element as expected based on user info that's retrieved\nby the beforementioned functions in this module.\n\nlibvirt_xml/base:\nlibvirt_xml/vm_xml:\nlibvirt_xml/devices/filesystem_device:\n\nAdd to the filesystem device.\n\nMove VMIDMapXML to common base module to be reused in filesystem device\nXML.\nAdd properties 'gids' and 'uids' because there will be more than one.\nThe old properties 'gid' and 'uid' are left untouched.\n\nAdd sandbox mode to the binary subtag because it's used when running\nVMs with virtiofs as non-root users.\n\nSigned-off-by: Sebastian Mitterle ","shortMessageHtmlLink":"utils_ids: add functions to check idmaps on filesystem devices"}},{"before":"b00d296b82fbc6a41c00e12797407eb216eb4aa3","after":"6f485e5de66a20e8065137c649ac5e3912e09030","ref":"refs/heads/add_guid_uid_map_checks","pushedAt":"2024-04-19T09:32:15.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"smitterl","name":"Sebastian Mitterle","path":"/smitterl","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/54858857?s=80&v=4"},"commit":{"message":"utils_ids: add functions to check idmaps on filesystem devices\n\nutils_ids: add new module to retrieve Linux user ids\n\nThe module contains functions to retrieve uid, gid, subuid, subgid\ninfo for a given username.\n\nsubuid, subgid are used by libvirt to run virtiofs with idmap\nenabling unprivileged user access to filesystem passthrough.\n\nAdd a function to check if a given fileystem xml contains the\nidmap element as expected based on user info that's retrieved\nby the beforementioned functions in this module.\n\nlibvirt_xml/base:\nlibvirt_xml/vm_xml:\nlibvirt_xml/devices/filesystem_device:\n\nAdd to the filesystem device.\n\nMove VMIDMapXML to common base module to be reused in filesystem device\nXML.\nAdd properties 'gids' and 'uids' because there will be more than one.\nThe old properties 'gid' and 'uid' are left untouched.\n\nAdd sandbox mode to the binary subtag because it's used when running\nVMs with virtiofs as non-root users.\n\nSigned-off-by: Sebastian Mitterle ","shortMessageHtmlLink":"utils_ids: add functions to check idmaps on filesystem devices"}},{"before":"0a494fb083dd581ca08760a8aaac28baacbb1270","after":"b00d296b82fbc6a41c00e12797407eb216eb4aa3","ref":"refs/heads/add_guid_uid_map_checks","pushedAt":"2024-04-19T09:08:12.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"smitterl","name":"Sebastian Mitterle","path":"/smitterl","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/54858857?s=80&v=4"},"commit":{"message":"utils_ids: add functions to check idmaps on filesystem devices\n\nutils_ids: add new module to retrieve Linux user ids\n\nThe module contains functions to retrieve uid, gid, subuid, subgid\ninfo for a given username.\n\nsubuid, subgid are used by libvirt to run virtiofs with idmap\nenabling unprivileged user access to filesystem passthrough.\n\nAdd a function to check if a given fileystem xml contains the\nidmap element as expected based on user info that's retrieved\nby the beforementioned functions in this module.\n\nlibvirt_xml/base:\nlibvirt_xml/vm_xml:\nlibvirt_xml/devices/filesystem_device:\n\nAdd to the filesystem device.\n\nMove VMIDMapXML to common base module to be reused in filesystem device\nXML.\nAdd properties 'gids' and 'uids' because there will be more than one.\nThe old properties 'gid' and 'uid' are left untouched.\n\nAdd sandbox mode to the binary subtag because it's used when running\nVMs with virtiofs as non-root users.\n\nSigned-off-by: Sebastian Mitterle ","shortMessageHtmlLink":"utils_ids: add functions to check idmaps on filesystem devices"}},{"before":"d995f3c65db5396b2c07c93489862fe11f1d5ef3","after":"0a494fb083dd581ca08760a8aaac28baacbb1270","ref":"refs/heads/add_guid_uid_map_checks","pushedAt":"2024-04-19T09:04:56.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"smitterl","name":"Sebastian Mitterle","path":"/smitterl","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/54858857?s=80&v=4"},"commit":{"message":"utils_ids: add functions to check idmaps on filesystem devices\n\nutils_ids: add new module to retrieve Linux user ids\n\nThe module contains functions to retrieve uid, gid, subuid, subgid\ninfo for a given username.\n\nsubuid, subgid are used by libvirt to run virtiofs with idmap\nenabling unprivileged user access to filesystem passthrough.\n\nAdd a function to check if a given fileystem xml contains the\nidmap element as expected based on user info that's retrieved\nby the beforementioned functions in this module.\n\nlibvirt_xml/base:\nlibvirt_xml/vm_xml:\nlibvirt_xml/devices/filesystem_device:\n\nAdd to the filesystem device.\n\nMove VMIDMapXML to common base module to be reused in filesystem device\nXML.\nAdd properties 'gids' and 'uids' because there will be more than one.\nThe old properties 'gid' and 'uid' are left untouched.\n\nAdd sandbox mode to the binary subtag because it's used when running\nVMs with virtiofs as non-root users.\n\nSigned-off-by: Sebastian Mitterle ","shortMessageHtmlLink":"utils_ids: add functions to check idmaps on filesystem devices"}},{"before":"cd38e834caf95ae045932e0057d3916a08a17108","after":"d995f3c65db5396b2c07c93489862fe11f1d5ef3","ref":"refs/heads/add_guid_uid_map_checks","pushedAt":"2024-04-18T16:38:08.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"smitterl","name":"Sebastian Mitterle","path":"/smitterl","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/54858857?s=80&v=4"},"commit":{"message":"utils_ids: add functions to check idmaps on filesystem devices\n\nutils_ids: add new module to retrieve Linux user ids\n\nThe module contains functions to retrieve uid, gid, subuid, subgid\ninfo for a given username.\n\nsubuid, subgid are used by libvirt to run virtiofs with idmap\nenabling unprivileged user access to filesystem passthrough.\n\nAdd a function to check if a given fileystem xml contains the\nidmap element as expected based on user info that's retrieved\nby the beforementioned functions in this module.\n\nlibvirt_xml/base:\nlibvirt_xml/vm_xml:\nlibvirt_xml/devices/filesystem_device:\n\nAdd to the filesystem device.\n\nMove VMIDMapXML to common base module to be reused in filesystem device\nXML.\nAdd properties 'gids' and 'uids' because there will be more than one.\nThe old properties 'gid' and 'uid' are left untouched.\n\nSigned-off-by: Sebastian Mitterle ","shortMessageHtmlLink":"utils_ids: add functions to check idmaps on filesystem devices"}},{"before":"3db56b00d67357d5d82cff3210ee045352398a03","after":"cd38e834caf95ae045932e0057d3916a08a17108","ref":"refs/heads/add_guid_uid_map_checks","pushedAt":"2024-04-18T16:31:58.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"smitterl","name":"Sebastian Mitterle","path":"/smitterl","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/54858857?s=80&v=4"},"commit":{"message":"utils_ids: add functions to check idmaps on filesystem devices\n\nutils_ids: add new module to retrieve Linux user ids\n\nThe module contains functions to retrieve uid, gid, subuid, subgid\ninfo for a given username.\n\nsubuid, subgid are used by libvirt to run virtiofs with idmap\nenabling unprivileged user access to filesystem passthrough.\n\nAdd a function to check if a given fileystem xml contains the\nidmap element as expected based on user info that's retrieved\nby the beforementioned functions in this module.\n\nlibvirt_xml/base:\nlibvirt_xml/vm_xml:\nlibvirt_xml/devices/filesystem_device:\n\nAdd to the filesystem device.\n\nMove VMIDMapXML to common base module to be reused in filesystem device\nXML.\nAdd properties 'gids' and 'uids' because there will be more than one.\nThe old properties 'gid' and 'uid' are left untouched.\n\nSigned-off-by: Sebastian Mitterle ","shortMessageHtmlLink":"utils_ids: add functions to check idmaps on filesystem devices"}},{"before":"0a97f39d7a26f8987a61c87d0f71ce2c811ca7ba","after":"3db56b00d67357d5d82cff3210ee045352398a03","ref":"refs/heads/add_guid_uid_map_checks","pushedAt":"2024-04-18T16:07:04.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"smitterl","name":"Sebastian Mitterle","path":"/smitterl","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/54858857?s=80&v=4"},"commit":{"message":"utils_ids: add functions to check idmaps on filesystem devices\n\nutils_ids: add new module to retrieve Linux user ids\n\nThe module contains functions to retrieve uid, gid, subuid, subgid\ninfo for a given username.\n\nsubuid, subgid are used by libvirt to run virtiofs with idmap\nenabling unprivileged user access to filesystem passthrough.\n\nAdd a function to check if a given fileystem xml contains the\nidmap element as expected based on user info that's retrieved\nby the beforementioned functions in this module.\n\nlibvirt_xml/base:\nlibvirt_xml/vm_xml:\nlibvirt_xml/devices/filesystem_device:\n\nAdd to the filesystem device.\n\nMove VMIDMapXML to common base module to be reused in filesystem device\nXML.\nAdd properties 'gids' and 'uids' because there will be more than one.\nThe old properties 'gid' and 'uid' are left untouched.\n\nSigned-off-by: Sebastian Mitterle ","shortMessageHtmlLink":"utils_ids: add functions to check idmaps on filesystem devices"}},{"before":"ebc0b97d3f60c7ccf222f13fa8dac6864a98531c","after":"0a97f39d7a26f8987a61c87d0f71ce2c811ca7ba","ref":"refs/heads/add_guid_uid_map_checks","pushedAt":"2024-04-18T16:03:30.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"smitterl","name":"Sebastian Mitterle","path":"/smitterl","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/54858857?s=80&v=4"},"commit":{"message":"utils_ids: add functions to check idmaps on filesystem devices\n\nutils_ids: add new module to retrieve Linux user ids\n\nThe module contains functions to retrieve uid, gid, subuid, subgid\ninfo for a given username.\n\nsubuid, subgid are used by libvirt to run virtiofs with idmap\nenabling unprivileged user access to filesystem passthrough.\n\nAdd a function to check if a given fileystem xml contains the\nidmap element as expected based on user info that's retrieved\nby the beforementioned functions in this module.\n\nlibvirt_xml/base:\nlibvirt_xml/vm_xml:\nlibvirt_xml/devices/filesystem_device:\n\nAdd to the filesystem device.\n\nMove VMIDMapXML to common base module to be reused in filesystem device\nXML.\nAdd properties 'gids' and 'uids' because there will be more than one.\nThe old properties 'gid' and 'uid' are left untouched.\n\nSigned-off-by: Sebastian Mitterle ","shortMessageHtmlLink":"utils_ids: add functions to check idmaps on filesystem devices"}},{"before":"44513262f6e6d88b99ae46cad6ca2b8460bd65c5","after":"ebc0b97d3f60c7ccf222f13fa8dac6864a98531c","ref":"refs/heads/add_guid_uid_map_checks","pushedAt":"2024-04-18T15:53:56.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"smitterl","name":"Sebastian Mitterle","path":"/smitterl","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/54858857?s=80&v=4"},"commit":{"message":"utils_ids: add functions to check idmaps on filesystem devices\n\nutils_ids: add new module to retrieve Linux user ids\n\nThe module contains functions to retrieve uid, gid, subuid, subgid\ninfo for a given username.\n\nsubuid, subgid are used by libvirt to run virtiofs with idmap\nenabling unprivileged user access to filesystem passthrough.\n\nAdd a function to check if a given fileystem xml contains the\nidmap element as expected based on user info that's retrieved\nby the beforementioned functions in this module.\n\nlibvirt_xml/base:\nlibvirt_xml/vm_xml:\nlibvirt_xml/devices/filesystem_device:\n\nAdd to the filesystem device.\n\nMove VMIDMapXML to common base module to be reused in filesystem device\nXML.\nAdd properties 'gids' and 'uids' because there will be more than one.\nThe old properties 'gid' and 'uid' are left untouched.\n\nSigned-off-by: Sebastian Mitterle ","shortMessageHtmlLink":"utils_ids: add functions to check idmaps on filesystem devices"}},{"before":null,"after":"44513262f6e6d88b99ae46cad6ca2b8460bd65c5","ref":"refs/heads/add_guid_uid_map_checks","pushedAt":"2024-04-18T07:43:10.000Z","pushType":"branch_creation","commitsCount":0,"pusher":{"login":"smitterl","name":"Sebastian Mitterle","path":"/smitterl","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/54858857?s=80&v=4"},"commit":{"message":"utils_ids: add new module to retrieve Linux user ids\n\nThe module contains functions to retrieve uid, gid, subuid, subgid\ninfo for a given username.\n\nsubuid, subgid are used by libvirt to run virtiofs with idmap\nenabling unprivileged user access to filesystem passthrough.\n\nSigned-off-by: Sebastian Mitterle ","shortMessageHtmlLink":"utils_ids: add new module to retrieve Linux user ids"}}],"hasNextPage":true,"hasPreviousPage":false,"activityType":"all","actor":null,"timePeriod":"all","sort":"DESC","perPage":30,"cursor":"Y3Vyc29yOnYyOpK7MjAyNC0wOC0yMFQxNjowNjoyMS4wMDAwMDBazwAAAASfTWdf","startCursor":"Y3Vyc29yOnYyOpK7MjAyNC0wOC0yMFQxNjowNjoyMS4wMDAwMDBazwAAAASfTWdf","endCursor":"Y3Vyc29yOnYyOpK7MjAyNC0wNC0xOFQwNzo0MzoxMC4wMDAwMDBazwAAAAQz29dT"}},"title":"Activity ยท smitterl/avocado-vt"}