Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

vmnet: support detecting Homebrew's socket_vmnet path #1220

Merged
merged 1 commit into from
Dec 12, 2022

Conversation

AkihiroSuda
Copy link
Member

@AkihiroSuda AkihiroSuda commented Dec 1, 2022

On Homebrew environments, socket_vmnet is installed on:

  • /usr/local/opt/socket_vmnet/Cellar/<VERSION>/bin/socket_vmnet (Intel)
  • /opt/homebrew/opt/socket_vmnet/Cellar/<VERSION>/bin/socket_vmnet (ARM)

The binary is usually owned by a non-root admin user. (i.e., the homebrew user).
The group is typically set to "admin".

Homebrew/homebrew-core@636ac07

@AkihiroSuda AkihiroSuda added this to the v0.14 milestone Dec 1, 2022
@AkihiroSuda AkihiroSuda requested a review from jandubois December 1, 2022 11:44
@AkihiroSuda AkihiroSuda force-pushed the socket_vmnet_path branch 2 times, most recently from ff5bc81 to 732eb4c Compare December 1, 2022 11:46
@chancez
Copy link
Contributor

chancez commented Dec 1, 2022

Shouldn't these already be in a users PATH, if so, why does Lima need to look for them itself?

@AkihiroSuda
Copy link
Member Author

Shouldn't these already be in a users PATH

No, purposely
https://github.com/Homebrew/homebrew-core/blob/636ac0700e011b23c3e41cc4176b30e01a3af5ae/Formula/socket_vmnet.rb#L18

@AkihiroSuda
Copy link
Member Author

I'm planning to merge this on Monday

@AkihiroSuda AkihiroSuda marked this pull request as draft December 12, 2022 06:55
On Homebrew environments, socket_vmnet is installed on:
- /usr/local/opt/socket_vmnet/Cellar/<VERSION>/bin/socket_vmnet (Intel)
- /opt/homebrew/opt/socket_vmnet/Cellar/<VERSION>/bin/socket_vmnet (ARM)

The binary is usually owned by a non-root admin user. (i.e., the homebrew user)
The group is typically set to "admin".

Homebrew/homebrew-core@636ac07

Signed-off-by: Akihiro Suda <[email protected]>
@AkihiroSuda AkihiroSuda marked this pull request as ready for review December 12, 2022 08:19
@AkihiroSuda AkihiroSuda merged commit 57beb9f into lima-vm:master Dec 12, 2022
jandubois added a commit to jandubois/lima that referenced this pull request Oct 15, 2024
This restriction was weakened by lima-vm#1220
to only require the file and directories to be owned by the admin user, but
that configuration is not secure.

If users are willing to run an insecure configuration, then they can always
enable password-less sudo, which does not need a sudoers file at all.

Signed-off-by: Jan Dubois <[email protected]>
jandubois added a commit to jandubois/lima that referenced this pull request Oct 15, 2024
This restriction was weakened by lima-vm#1220
to only require the file and directories to be owned by the admin user, but
that configuration is not secure.

If users are willing to run an insecure configuration, then they can always
enable password-less sudo, which does not need a sudoers file at all.

Signed-off-by: Jan Dubois <[email protected]>
jandubois added a commit to jandubois/lima that referenced this pull request Oct 15, 2024
This restriction was weakened by lima-vm#1220
to only require the file and directories to be owned by the admin user, but
that configuration is not secure.

If users are willing to run an insecure configuration, then they can always
enable password-less sudo, which does not need a sudoers file at all.

Signed-off-by: Jan Dubois <[email protected]>
jandubois added a commit to jandubois/lima that referenced this pull request Oct 15, 2024
This restriction was weakened by lima-vm#1220
to only require the file and directories to be owned by the admin user, but
that configuration is not secure.

If users are willing to run an insecure configuration, then they can always
enable password-less sudo, which does not need a sudoers file at all.

Signed-off-by: Jan Dubois <[email protected]>
jandubois added a commit to jandubois/lima that referenced this pull request Oct 15, 2024
This restriction was weakened by lima-vm#1220
to only require the file and directories to be owned by the admin user, but
that configuration is not secure.

If users are willing to run an insecure configuration, then they can always
enable password-less sudo, which does not need a sudoers file at all.

Signed-off-by: Jan Dubois <[email protected]>
jandubois added a commit to jandubois/lima that referenced this pull request Oct 15, 2024
This restriction was weakened by lima-vm#1220
to only require the file and directories to be owned by the admin user, but
that configuration is not secure.

If users are willing to run an insecure configuration, then they can always
enable password-less sudo, which does not need a sudoers file at all.

Signed-off-by: Jan Dubois <[email protected]>
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants