buildroot: drop unneeded DeviceAllow=
With `--keep-unit` we now run with the privileges and resources of the caller. We no longer require external services to extend our privileges. This also means we no longer have to configure our unit sandbox manually, but simply rely on kernel sandboxing to do the right thing.
This commit is contained in:
parent
ae1b5029b7
commit
975ef7ff54
1 changed files with 0 additions and 8 deletions
|
|
@ -84,13 +84,6 @@ class BuildRoot(contextlib.AbstractContextManager):
|
|||
# pylint suggests to epxlicitly pass `check` to subprocess.run()
|
||||
check = kwargs.pop("check", False)
|
||||
|
||||
# we need read-write access to loopback devices
|
||||
loopback_allow = "rw"
|
||||
if platform.machine() == "s390x":
|
||||
# on s390x, the bootloader installation program (zipl)
|
||||
# wants to be able create devices nodes, so allow that
|
||||
loopback_allow += "m"
|
||||
|
||||
# make osbuild API-calls accessible to the container
|
||||
nspawn_ro_binds.append(f"{self.api}:/run/osbuild/api")
|
||||
|
||||
|
|
@ -122,7 +115,6 @@ class BuildRoot(contextlib.AbstractContextManager):
|
|||
"--keep-unit",
|
||||
"--as-pid2",
|
||||
"--link-journal=no",
|
||||
f"--property=DeviceAllow=block-loop {loopback_allow}",
|
||||
f"--directory={self.root}",
|
||||
*[f"--bind-ro={b}" for b in nspawn_ro_binds],
|
||||
*[f"--bind={b}" for b in (binds or [])],
|
||||
|
|
|
|||
Loading…
Add table
Add a link
Reference in a new issue