]>
Commit | Line | Data |
---|---|---|
875b1e77 KM |
1 | --- libvirt-6.6.0/src/remote/libvirtd.conf.in~ 2020-07-21 13:34:45.000000000 +0000 |
2 | +++ libvirt-6.6.0/src/remote/libvirtd.conf.in 2021-07-08 18:11:11.683914079 +0000 | |
1c850183 | 3 | @@ -134,7 +134,7 @@ |
72b1baa0 JR |
4 | # the network providing auth (eg, TLS/x509 certificates) |
5 | # | |
6 | # - sasl: use SASL infrastructure. The actual auth scheme is then | |
1c850183 JB |
7 | -# controlled from @sysconfdir@/sasl2/libvirt.conf. For the TCP |
8 | +# controlled from @sysconfdir@/sasl/libvirt.conf. For the TCP | |
72b1baa0 | 9 | # socket only GSSAPI & DIGEST-MD5 mechanisms will be used. |
be8dc440 | 10 | # For non-TCP or TLS sockets, any scheme is allowed. |
72b1baa0 | 11 | # |
1c850183 | 12 | @@ -166,7 +166,7 @@ |
72b1baa0 JR |
13 | # If you don't enable SASL, then all TCP traffic is cleartext. |
14 | # Don't do this outside of a dev/test scenario. For real world | |
15 | # use, always enable SASL and use the GSSAPI or DIGEST-MD5 | |
1c850183 JB |
16 | -# mechanism in @sysconfdir@/sasl2/libvirt.conf |
17 | +# mechanism in @sysconfdir@/sasl/libvirt.conf | |
72b1baa0 JR |
18 | #auth_tcp = "sasl" |
19 | ||
20 | # Change the authentication scheme for TLS sockets. | |
875b1e77 KM |
21 | 278c278 |
22 | < editting <code>/etc/sasl2/libvirt.conf</code> to set the <code>mech_list</code> | |
23 | --- | |
24 | > editting <code>/etc/sasl/libvirt.conf</code> to set the <code>mech_list</code> | |
25 | --- libvirt-6.6.0/src/qemu/qemu.conf~ 2020-07-21 13:34:45.000000000 +0000 | |
26 | +++ libvirt-6.6.0/src/qemu/qemu.conf 2021-07-08 18:19:09.316683971 +0000 | |
27 | @@ -135,18 +135,18 @@ | |
72b1baa0 JR |
28 | # Examples include vinagre, virt-viewer and virt-manager |
29 | # itself. UltraVNC, RealVNC, TightVNC do not support this | |
30 | # | |
31 | -# It is necessary to configure /etc/sasl2/qemu.conf to choose | |
32 | +# It is necessary to configure /etc/sasl/qemu.conf to choose | |
33 | # the desired SASL plugin (eg, GSSPI for Kerberos) | |
34 | # | |
bf3e9ac8 | 35 | #vnc_sasl = 1 |
72b1baa0 JR |
36 | |
37 | ||
38 | -# The default SASL configuration file is located in /etc/sasl2/ | |
39 | +# The default SASL configuration file is located in /etc/sasl/ | |
40 | # When running libvirtd unprivileged, it may be desirable to | |
41 | # override the configs in this location. Set this parameter to | |
42 | # point to the directory, and create a qemu.conf in that location | |
43 | # | |
bf3e9ac8 JB |
44 | -#vnc_sasl_dir = "/some/directory/sasl2" |
45 | +#vnc_sasl_dir = "/some/directory/sasl" | |
72b1baa0 JR |
46 | |
47 | ||
bf3e9ac8 | 48 | # QEMU implements an extension for providing audio over a VNC connection, |
875b1e77 KM |
49 | @@ -211,17 +211,17 @@ |
50 | # Enable use of SASL encryption on the SPICE server. This requires | |
51 | # a SPICE client which supports the SASL protocol extension. | |
52 | # | |
53 | -# It is necessary to configure /etc/sasl2/qemu.conf to choose | |
54 | +# It is necessary to configure /etc/sasl/qemu.conf to choose | |
55 | # the desired SASL plugin (eg, GSSPI for Kerberos) | |
56 | # | |
57 | #spice_sasl = 1 | |
58 | ||
59 | -# The default SASL configuration file is located in /etc/sasl2/ | |
60 | +# The default SASL configuration file is located in /etc/sasl/ | |
61 | # When running libvirtd unprivileged, it may be desirable to | |
62 | # override the configs in this location. Set this parameter to | |
63 | # point to the directory, and create a qemu.conf in that location | |
64 | # | |
65 | -#spice_sasl_dir = "/some/directory/sasl2" | |
66 | +#spice_sasl_dir = "/some/directory/sasl" | |
67 | ||
68 | # Enable use of TLS encryption on the chardev TCP transports. | |
69 | # | |
70 | --- libvirt-6.6.0//tests/qemuxml2argvdata/graphics-vnc-sasl.args~ 2020-07-21 13:34:45.000000000 +0000 | |
71 | +++ libvirt-6.6.0//tests/qemuxml2argvdata/graphics-vnc-sasl.args 2021-07-08 18:21:11.219952616 +0000 | |
72 | @@ -6,7 +6,7 @@ | |
549ba196 JP |
73 | XDG_DATA_HOME=/tmp/lib/domain--1-QEMUGuest1/.local/share \ |
74 | XDG_CACHE_HOME=/tmp/lib/domain--1-QEMUGuest1/.cache \ | |
75 | XDG_CONFIG_HOME=/tmp/lib/domain--1-QEMUGuest1/.config \ | |
be8dc440 JK |
76 | -SASL_CONF_PATH=/root/.sasl2 \ |
77 | +SASL_CONF_PATH=/root/.sasl \ | |
78 | QEMU_AUDIO_DRV=none \ | |
875b1e77 | 79 | /usr/bin/qemu-system-i386 \ |
be8dc440 | 80 | -name QEMUGuest1 \ |
875b1e77 KM |
81 | --- libvirt-6.6.0/tests/qemuxml2argvdata/graphics-vnc-tls.args~ 2020-07-21 13:34:45.000000000 +0000 |
82 | +++ libvirt-6.6.0/tests/qemuxml2argvdata/graphics-vnc-tls.args 2021-07-08 18:22:00.471277949 +0000 | |
83 | @@ -6,7 +6,7 @@ | |
549ba196 JP |
84 | XDG_DATA_HOME=/tmp/lib/domain--1-QEMUGuest1/.local/share \ |
85 | XDG_CACHE_HOME=/tmp/lib/domain--1-QEMUGuest1/.cache \ | |
86 | XDG_CONFIG_HOME=/tmp/lib/domain--1-QEMUGuest1/.config \ | |
be8dc440 JK |
87 | -SASL_CONF_PATH=/root/.sasl2 \ |
88 | +SASL_CONF_PATH=/root/.sasl \ | |
89 | QEMU_AUDIO_DRV=none \ | |
875b1e77 | 90 | /usr/bin/qemu-system-i386 \ |
be8dc440 | 91 | -name QEMUGuest1 \ |
875b1e77 KM |
92 | --- libvirt-6.6.0/tests/virconfdata/libvirtd.conf~ 2020-07-21 13:34:45.000000000 +0000 |
93 | +++ libvirt-6.6.0/tests/virconfdata/libvirtd.conf 2021-07-08 18:27:52.110787287 +0000 | |
94 | @@ -91,7 +91,7 @@ | |
72b1baa0 JR |
95 | # the network providing auth (eg, TLS/x509 certificates) |
96 | # | |
97 | # - sasl: use SASL infrastructure. The actual auth scheme is then | |
98 | -# controlled from /etc/sasl2/libvirt.conf. For the TCP | |
99 | +# controlled from /etc/sasl/libvirt.conf. For the TCP | |
100 | # socket only GSSAPI & DIGEST-MD5 mechanisms will be used. | |
101 | # For non-TCP or TLS sockets, any scheme is allowed. | |
102 | # | |
875b1e77 | 103 | @@ -122,7 +122,7 @@ |
72b1baa0 JR |
104 | # If you don't enable SASL, then all TCP traffic is cleartext. |
105 | # Don't do this outside of a dev/test scenario. For real world | |
106 | # use, always enable SASL and use the GSSAPI or DIGEST-MD5 | |
107 | -# mechanism in /etc/sasl2/libvirt.conf | |
108 | +# mechanism in /etc/sasl/libvirt.conf | |
109 | auth_tcp = "sasl" | |
110 | ||
111 | # Change the authentication scheme for TLS sockets. | |
875b1e77 KM |
112 | --- libvirt-6.6.0/tests/virconfdata/libvirtd.out~ 2020-07-21 13:34:45.000000000 +0000 |
113 | +++ libvirt-6.6.0/tests/virconfdata/libvirtd.out 2021-07-08 18:28:48.448975223 +0000 | |
114 | @@ -73,7 +73,7 @@ | |
72b1baa0 JR |
115 | # the network providing auth (eg, TLS/x509 certificates) |
116 | # | |
117 | # - sasl: use SASL infrastructure. The actual auth scheme is then | |
118 | -# controlled from /etc/sasl2/libvirt.conf. For the TCP | |
119 | +# controlled from /etc/sasl/libvirt.conf. For the TCP | |
120 | # socket only GSSAPI & DIGEST-MD5 mechanisms will be used. | |
121 | # For non-TCP or TLS sockets, any scheme is allowed. | |
122 | # | |
875b1e77 | 123 | @@ -102,7 +102,7 @@ |
72b1baa0 JR |
124 | # If you don't enable SASL, then all TCP traffic is cleartext. |
125 | # Don't do this outside of a dev/test scenario. For real world | |
126 | # use, always enable SASL and use the GSSAPI or DIGEST-MD5 | |
127 | -# mechanism in /etc/sasl2/libvirt.conf | |
128 | +# mechanism in /etc/sasl/libvirt.conf | |
129 | auth_tcp = "sasl" | |
130 | # Change the authentication scheme for TLS sockets. | |
131 | # |