updated on Thu Jan 26 16:09:46 UTC 2012
[aur-mirror.git] / libvirt-git / unixperms.patch
blobb3fb86cf59df0d8b134d17ff9ec584a20b4e9fe3
1 diff -ur libvirt-0.7.4-orig/daemon/libvirtd.conf libvirt-0.7.4-patched/daemon/libvirtd.conf
2 --- libvirt-0.7.4-orig/daemon/libvirtd.conf 2009-11-23 03:10:33.398655655 -0800
3 +++ libvirt-0.7.4-patched/daemon/libvirtd.conf 2009-11-23 03:09:37.831189671 -0800
4 @@ -78,14 +78,14 @@
5 # without becoming root.
7 # This is restricted to 'root' by default.
8 -#unix_sock_group = "libvirt"
9 +unix_sock_group = "libvirt"
11 # Set the UNIX socket permissions for the R/O socket. This is used
12 # for monitoring VM status only
14 # Default allows any user. If setting group ownership may want to
15 # restrict this to:
16 -#unix_sock_ro_perms = "0777"
17 +unix_sock_ro_perms = "0770"
19 # Set the UNIX socket permissions for the R/W socket. This is used
20 # for full management of VMs
21 @@ -95,7 +95,7 @@
23 # If not using PolicyKit and setting group ownership for access
24 # control then you may want to relax this to:
25 -#unix_sock_rw_perms = "0770"
26 +unix_sock_rw_perms = "0770"
28 # Set the name of the directory in which sockets will be found/created.
29 #unix_sock_dir = "/var/run/libvirt"
30 @@ -126,7 +126,7 @@
32 # To restrict monitoring of domains you may wish to enable
33 # an authentication mechanism here
34 -#auth_unix_ro = "none"
35 +auth_unix_ro = "none"
37 # Set an authentication scheme for UNIX read-write sockets
38 # By default socket permissions only allow root. If PolicyKit
39 @@ -135,7 +135,7 @@
41 # If the unix_sock_rw_perms are changed you may wish to enable
42 # an authentication mechanism here
43 -#auth_unix_rw = "none"
44 +auth_unix_rw = "none"
46 # Change the authentication scheme for TCP sockets.