-
Bug
-
Resolution: Unresolved
-
Undefined
-
None
-
rhel-9.4.z
-
None
-
No
-
Important
-
rhel-sst-cockpit
-
ssg_front_door
-
None
-
False
-
-
None
-
None
-
None
-
None
-
None
The implementation of domainDetachHostDevice uses DBus, but domainAttachHostDevices uses virt-xml. This situation prevents the use of DBus policies for Access Control (for example, preventing unprivileged users from adding devices using cockpit).
Restricting access when virt-xml is used requires polkit, which in turn is incompatible with libvirt-dbus.
This conflicts with what we advise customers to do in our documentation:
Troubleshooting Currently, configuring libvirt to use polkit makes it impossible to connect to VMs using the RHEL 9 web console, due to an incompatibility with the libvirt-dbus service. If you require fine-grained access control of VMs in the web console, create a custom D-Bus policy. For instructions, see How to configure fine-grained control of Virtual Machines in Cockpit in the Red Hat Knowledgebase.
Package version: cockpit-machines-308.3-1.el9_4