[neutron] Mend rootwrap privsep indentation
Change-Id: I09c8ae14947898b7e63dab9516a4899106e91cf2
This commit is contained in:
parent
c8d2efdb39
commit
67ede00551
@ -1475,46 +1475,46 @@ conf:
|
|||||||
|
|
||||||
# needed for FDB extension
|
# needed for FDB extension
|
||||||
bridge: CommandFilter, bridge, root
|
bridge: CommandFilter, bridge, root
|
||||||
privsep:
|
privsep:
|
||||||
pods:
|
pods:
|
||||||
- dhcp_agent
|
- dhcp_agent
|
||||||
- l3_agent
|
- l3_agent
|
||||||
- lb_agent
|
- lb_agent
|
||||||
- metadata_agent
|
- metadata_agent
|
||||||
- ovs_agent
|
- ovs_agent
|
||||||
- sriov_agent
|
- sriov_agent
|
||||||
content: |
|
content: |
|
||||||
# Command filters to allow privsep daemon to be started via rootwrap.
|
# Command filters to allow privsep daemon to be started via rootwrap.
|
||||||
#
|
#
|
||||||
# This file should be owned by (and only-writeable by) the root user
|
# This file should be owned by (and only-writeable by) the root user
|
||||||
|
|
||||||
[Filters]
|
[Filters]
|
||||||
|
|
||||||
# By installing the following, the local admin is asserting that:
|
# By installing the following, the local admin is asserting that:
|
||||||
#
|
#
|
||||||
# 1. The python module load path used by privsep-helper
|
# 1. The python module load path used by privsep-helper
|
||||||
# command as root (as started by sudo/rootwrap) is trusted.
|
# command as root (as started by sudo/rootwrap) is trusted.
|
||||||
# 2. Any oslo.config files matching the --config-file
|
# 2. Any oslo.config files matching the --config-file
|
||||||
# arguments below are trusted.
|
# arguments below are trusted.
|
||||||
# 3. Users allowed to run sudo/rootwrap with this configuration(*) are
|
# 3. Users allowed to run sudo/rootwrap with this configuration(*) are
|
||||||
# also allowed to invoke python "entrypoint" functions from
|
# also allowed to invoke python "entrypoint" functions from
|
||||||
# --privsep_context with the additional (possibly root) privileges
|
# --privsep_context with the additional (possibly root) privileges
|
||||||
# configured for that context.
|
# configured for that context.
|
||||||
#
|
#
|
||||||
# (*) ie: the user is allowed by /etc/sudoers to run rootwrap as root
|
# (*) ie: the user is allowed by /etc/sudoers to run rootwrap as root
|
||||||
#
|
#
|
||||||
# In particular, the oslo.config and python module path must not
|
# In particular, the oslo.config and python module path must not
|
||||||
# be writeable by the unprivileged user.
|
# be writeable by the unprivileged user.
|
||||||
|
|
||||||
# oslo.privsep default neutron context
|
# oslo.privsep default neutron context
|
||||||
privsep: PathFilter, privsep-helper, root,
|
privsep: PathFilter, privsep-helper, root,
|
||||||
--config-file, /etc,
|
--config-file, /etc,
|
||||||
--privsep_context, neutron.privileged.default,
|
--privsep_context, neutron.privileged.default,
|
||||||
--privsep_sock_path, /
|
--privsep_sock_path, /
|
||||||
|
|
||||||
# NOTE: A second `--config-file` arg can also be added above. Since
|
# NOTE: A second `--config-file` arg can also be added above. Since
|
||||||
# many neutron components are installed like that (eg: by devstack).
|
# many neutron components are installed like that (eg: by devstack).
|
||||||
# Adjust to suit local requirements.
|
# Adjust to suit local requirements.
|
||||||
taas:
|
taas:
|
||||||
pods:
|
pods:
|
||||||
- ovs_agent
|
- ovs_agent
|
||||||
|
Loading…
x
Reference in New Issue
Block a user