Cole Robinson 4d3197c3c9 tests: python: fix test820RHBZ912499.py
This tests adding a running libvirt domain to libguestfs.
This was never really a safe real-world example AFAICT because it
creates qemu overlays on top of disks that are opened writeable
by the source guest.

Nowadays qemu uses write locks to reject this type of behavior,
and the test fails.

Adjust things so the source VM opens its storage readonly, but
we are still confirming that add_libvirt_dom doesn't mess up
selinux labels.

Signed-off-by: Cole Robinson <crobinso@redhat.com>
2025-10-23 11:22:55 +01:00
2025-05-10 18:29:40 +01:00
2025-02-16 17:00:46 +00:00
2025-02-16 17:00:46 +00:00
2025-09-09 16:29:13 +01:00
2025-02-16 17:00:46 +00:00
2025-02-16 17:00:46 +00:00
2025-02-16 16:57:43 +00:00
2025-02-16 17:00:46 +00:00
2025-10-17 10:43:32 +01:00
2025-10-17 10:43:32 +01:00
2025-02-16 17:00:46 +00:00
2025-02-16 17:00:46 +00:00
2018-02-22 15:06:13 +00:00
2021-04-08 11:36:40 +01:00
2023-11-16 10:38:59 +00:00
2013-01-24 15:00:49 +00:00
2025-03-22 12:41:39 +00:00
2020-01-14 16:21:22 +01:00
2025-10-17 10:43:32 +01:00
2019-11-13 12:49:55 +00:00
2025-02-16 17:00:46 +00:00
2025-02-16 17:00:46 +00:00

Libguestfs is tools and a library for accessing and modifying guest
disk images.  For more information see the home page:

  http://libguestfs.org/

For discussion, development, patches, etc. please use the mailing
list:

  https://lists.libguestfs.org

To find out how to build libguestfs from source, read:

  docs/guestfs-building.pod
  http://libguestfs.org/guestfs-building.1.html
  man docs/guestfs-building.1

Copyright (C) 2009-2025 Red Hat Inc.

The library is distributed under the LGPLv2+.  The programs are
distributed under the GPLv2+.  Please see the files COPYING and
COPYING.LIB for full license information.  The examples are under a
very liberal license.
Languages
C 42.7%
OCaml 35.5%
Shell 7.1%
Makefile 4%
Perl 2.6%
Other 8%