aboutsummaryrefslogtreecommitdiffstats
path: root/releasenotes/notes/nf_conntrack_proto_sctp-a64300a3fc7b4e55.yaml
diff options
context:
space:
mode:
authorOliver Walsh <owalsh@redhat.com>2017-07-25 21:05:35 +0100
committerEmilien Macchi <emilien@redhat.com>2017-08-02 18:08:38 +0000
commit1b82fe40fe53572703854fcdbeda72cdf148e9c1 (patch)
tree31f48df7fe85839725406de81b4e1d2bd11a846b /releasenotes/notes/nf_conntrack_proto_sctp-a64300a3fc7b4e55.yaml
parent85f5cc23d41e0e0939425ffce3083d42d6d4187d (diff)
Use normal socket file permissions instead of polkit
The default (on RHEL/CentOS) is to use polkit but this is only useful for GUI support or for fine grained API access control. As we don't require either we can achieve identical control using plain old unix filesystem permissions. I've merged Sven's changes from https://review.openstack.org/484979 and https://review.openstack.org/487150. As we need to be careful with the libvirtd option quoting I think it's best to do this in puppet-tripleo instead of t-h-t yaml. The option to override the settings from t-h-t remains. Co-Authored-By: Sven Anderson <sven@redhat.com> Reverts I91be1f1eacf8eed9017bbfef393ee2d66771e8d6 Closes-bug: 1696504 Change-Id: I507bdd8e3a461091562177403a2a55fcaf6694d2 Depends-On: I17f6c9b5a6e2120a53bae296042ece492210597a
Diffstat (limited to 'releasenotes/notes/nf_conntrack_proto_sctp-a64300a3fc7b4e55.yaml')
0 files changed, 0 insertions, 0 deletions