2008-09-04 10:44:23 +00:00
|
|
|
module Test_libvirtd_qemu =
|
|
|
|
|
|
|
|
let conf = "# Master configuration file for the QEMU driver.
|
|
|
|
# All settings described here are optional - if omitted, sensible
|
|
|
|
# defaults are used.
|
|
|
|
|
|
|
|
# VNC is configured to listen on 127.0.0.1 by default.
|
|
|
|
# To make it listen on all public interfaces, uncomment
|
|
|
|
# this next option.
|
|
|
|
#
|
|
|
|
# NB, strong recommendation to enable TLS + x509 certificate
|
|
|
|
# verification when allowing public access
|
|
|
|
#
|
|
|
|
vnc_listen = \"0.0.0.0\"
|
|
|
|
|
|
|
|
|
|
|
|
# Enable use of TLS encryption on the VNC server. This requires
|
|
|
|
# a VNC client which supports the VeNCrypt protocol extension.
|
|
|
|
# Examples include vinagre, virt-viewer, virt-manager and vencrypt
|
|
|
|
# itself. UltraVNC, RealVNC, TightVNC do not support this
|
|
|
|
#
|
|
|
|
# It is necessary to setup CA and issue a server certificate
|
|
|
|
# before enabling this.
|
|
|
|
#
|
|
|
|
vnc_tls = 1
|
|
|
|
|
|
|
|
|
|
|
|
# Use of TLS requires that x509 certificates be issued. The
|
|
|
|
# default it to keep them in /etc/pki/libvirt-vnc. This directory
|
|
|
|
# must contain
|
|
|
|
#
|
|
|
|
# ca-cert.pem - the CA master certificate
|
|
|
|
# server-cert.pem - the server certificate signed with ca-cert.pem
|
|
|
|
# server-key.pem - the server private key
|
|
|
|
#
|
|
|
|
# This option allows the certificate directory to be changed
|
|
|
|
#
|
|
|
|
vnc_tls_x509_cert_dir = \"/etc/pki/libvirt-vnc\"
|
|
|
|
|
|
|
|
|
|
|
|
# The default TLS configuration only uses certificates for the server
|
|
|
|
# allowing the client to verify the server's identity and establish
|
|
|
|
# and encrypted channel.
|
|
|
|
#
|
|
|
|
# It is possible to use x509 certificates for authentication too, by
|
|
|
|
# issuing a x509 certificate to every client who needs to connect.
|
|
|
|
#
|
|
|
|
# Enabling this option will reject any client who does not have a
|
|
|
|
# certificate signed by the CA in /etc/pki/libvirt-vnc/ca-cert.pem
|
|
|
|
#
|
|
|
|
vnc_tls_x509_verify = 1
|
2008-12-22 16:16:10 +00:00
|
|
|
|
|
|
|
|
2009-01-29 17:50:00 +00:00
|
|
|
# The default VNC password. Only 8 letters are significant for
|
|
|
|
# VNC passwords. This parameter is only used if the per-domain
|
|
|
|
# XML config does not already provide a password. To allow
|
|
|
|
# access without passwords, leave this commented out. An empty
|
|
|
|
# string will still enable passwords, but be rejected by QEMU
|
|
|
|
# effectively preventing any use of VNC. Obviously change this
|
|
|
|
# example here before you set this
|
|
|
|
#
|
|
|
|
vnc_password = \"XYZ12345\"
|
2009-03-16 13:54:26 +00:00
|
|
|
|
|
|
|
|
|
|
|
# Enable use of SASL encryption on the VNC server. This requires
|
|
|
|
# a VNC client which supports the SASL protocol extension.
|
|
|
|
# Examples include vinagre, virt-viewer and virt-manager
|
|
|
|
# itself. UltraVNC, RealVNC, TightVNC do not support this
|
|
|
|
#
|
|
|
|
# It is necessary to configure /etc/sasl2/qemu.conf to choose
|
|
|
|
# the desired SASL plugin (eg, GSSPI for Kerberos)
|
|
|
|
#
|
|
|
|
vnc_sasl = 1
|
|
|
|
|
|
|
|
|
|
|
|
# The default SASL configuration file is located in /etc/sasl2/
|
|
|
|
# When running libvirtd unprivileged, it may be desirable to
|
|
|
|
# override the configs in this location. Set this parameter to
|
|
|
|
# point to the directory, and create a qemu.conf in that location
|
|
|
|
#
|
|
|
|
vnc_sasl_dir = \"/some/directory/sasl2\"
|
2009-07-15 21:25:01 +00:00
|
|
|
|
2009-08-17 10:34:53 +00:00
|
|
|
security_driver = \"selinux\"
|
|
|
|
|
2009-07-15 21:25:01 +00:00
|
|
|
user = \"root\"
|
|
|
|
|
|
|
|
group = \"root\"
|
2009-07-22 15:08:04 +00:00
|
|
|
|
|
|
|
cgroup_controllers = [ \"cpu\", \"devices\" ]
|
|
|
|
|
|
|
|
cgroup_device_acl = [ \"/dev/null\", \"/dev/full\", \"/dev/zero\" ]
|
2009-08-17 10:34:53 +00:00
|
|
|
|
|
|
|
save_image_format = \"gzip\"
|
Support configuration of huge pages in guests
Add option to domain XML for
<memoryBacking>
<hugepages/>
</memoryBacking>
* configure.in: Add check for mntent.h
* qemud/libvirtd_qemu.aug, qemud/test_libvirtd_qemu.aug, src/qemu.conf
Add 'hugetlbfs_mount' config parameter
* src/qemu_conf.c, src/qemu_conf.h: Check for -mem-path flag in QEMU,
and pass it when hugepages are requested.
Load hugetlbfs_mount config parameter, search for mount if not given.
* src/qemu_driver.c: Free hugetlbfs_mount/path parameter in driver shutdown.
Create directory for QEMU hugepage usage, chowning if required.
* docs/formatdomain.html.in: Document memoryBacking/hugepages elements
* docs/schemas/domain.rng: Add memoryBacking/hugepages elements to schema
* src/util.c, src/util.h, src/libvirt_private.syms: Add virFileFindMountPoint
helper API
* tests/qemuhelptest.c: Add -mem-path constants
* tests/qemuxml2argvtest.c, tests/qemuxml2xmltest.c: Add tests for hugepage
handling
* tests/qemuxml2argvdata/qemuxml2argv-hugepages.xml,
tests/qemuxml2argvdata/qemuxml2argv-hugepages.args: Data files for
hugepage tests
2009-08-25 14:05:18 +00:00
|
|
|
|
|
|
|
hugetlbfs_mount = \"/dev/hugepages\"
|
2009-12-22 17:21:16 +00:00
|
|
|
|
|
|
|
relaxed_acs_check = 1
|
2008-09-04 10:44:23 +00:00
|
|
|
"
|
|
|
|
|
|
|
|
test Libvirtd_qemu.lns get conf =
|
|
|
|
{ "#comment" = "Master configuration file for the QEMU driver." }
|
|
|
|
{ "#comment" = "All settings described here are optional - if omitted, sensible" }
|
|
|
|
{ "#comment" = "defaults are used." }
|
|
|
|
{ "#empty" }
|
|
|
|
{ "#comment" = "VNC is configured to listen on 127.0.0.1 by default." }
|
|
|
|
{ "#comment" = "To make it listen on all public interfaces, uncomment" }
|
|
|
|
{ "#comment" = "this next option." }
|
|
|
|
{ "#comment" = "" }
|
|
|
|
{ "#comment" = "NB, strong recommendation to enable TLS + x509 certificate" }
|
|
|
|
{ "#comment" = "verification when allowing public access" }
|
|
|
|
{ "#comment" = "" }
|
|
|
|
{ "vnc_listen" = "0.0.0.0" }
|
|
|
|
{ "#empty" }
|
|
|
|
{ "#empty" }
|
|
|
|
{ "#comment" = "Enable use of TLS encryption on the VNC server. This requires" }
|
|
|
|
{ "#comment" = "a VNC client which supports the VeNCrypt protocol extension." }
|
|
|
|
{ "#comment" = "Examples include vinagre, virt-viewer, virt-manager and vencrypt" }
|
|
|
|
{ "#comment" = "itself. UltraVNC, RealVNC, TightVNC do not support this" }
|
|
|
|
{ "#comment" = "" }
|
|
|
|
{ "#comment" = "It is necessary to setup CA and issue a server certificate" }
|
|
|
|
{ "#comment" = "before enabling this." }
|
|
|
|
{ "#comment" = "" }
|
|
|
|
{ "vnc_tls" = "1" }
|
|
|
|
{ "#empty" }
|
|
|
|
{ "#empty" }
|
|
|
|
{ "#comment" = "Use of TLS requires that x509 certificates be issued. The" }
|
|
|
|
{ "#comment" = "default it to keep them in /etc/pki/libvirt-vnc. This directory" }
|
|
|
|
{ "#comment" = "must contain" }
|
|
|
|
{ "#comment" = "" }
|
|
|
|
{ "#comment" = "ca-cert.pem - the CA master certificate" }
|
|
|
|
{ "#comment" = "server-cert.pem - the server certificate signed with ca-cert.pem" }
|
|
|
|
{ "#comment" = "server-key.pem - the server private key" }
|
|
|
|
{ "#comment" = "" }
|
|
|
|
{ "#comment" = "This option allows the certificate directory to be changed" }
|
|
|
|
{ "#comment" = "" }
|
|
|
|
{ "vnc_tls_x509_cert_dir" = "/etc/pki/libvirt-vnc" }
|
|
|
|
{ "#empty" }
|
|
|
|
{ "#empty" }
|
|
|
|
{ "#comment" = "The default TLS configuration only uses certificates for the server" }
|
|
|
|
{ "#comment" = "allowing the client to verify the server's identity and establish" }
|
|
|
|
{ "#comment" = "and encrypted channel." }
|
|
|
|
{ "#comment" = "" }
|
|
|
|
{ "#comment" = "It is possible to use x509 certificates for authentication too, by" }
|
|
|
|
{ "#comment" = "issuing a x509 certificate to every client who needs to connect." }
|
|
|
|
{ "#comment" = "" }
|
|
|
|
{ "#comment" = "Enabling this option will reject any client who does not have a" }
|
|
|
|
{ "#comment" = "certificate signed by the CA in /etc/pki/libvirt-vnc/ca-cert.pem" }
|
|
|
|
{ "#comment" = "" }
|
|
|
|
{ "vnc_tls_x509_verify" = "1" }
|
2009-01-29 17:50:00 +00:00
|
|
|
{ "#empty" }
|
|
|
|
{ "#empty" }
|
|
|
|
{ "#comment" = "The default VNC password. Only 8 letters are significant for" }
|
|
|
|
{ "#comment" = "VNC passwords. This parameter is only used if the per-domain" }
|
|
|
|
{ "#comment" = "XML config does not already provide a password. To allow" }
|
|
|
|
{ "#comment" = "access without passwords, leave this commented out. An empty" }
|
|
|
|
{ "#comment" = "string will still enable passwords, but be rejected by QEMU" }
|
|
|
|
{ "#comment" = "effectively preventing any use of VNC. Obviously change this" }
|
|
|
|
{ "#comment" = "example here before you set this" }
|
|
|
|
{ "#comment" = "" }
|
|
|
|
{ "vnc_password" = "XYZ12345" }
|
2009-03-16 13:54:26 +00:00
|
|
|
{ "#empty" }
|
|
|
|
{ "#empty" }
|
|
|
|
{ "#comment" = "Enable use of SASL encryption on the VNC server. This requires" }
|
|
|
|
{ "#comment" = "a VNC client which supports the SASL protocol extension." }
|
|
|
|
{ "#comment" = "Examples include vinagre, virt-viewer and virt-manager" }
|
|
|
|
{ "#comment" = "itself. UltraVNC, RealVNC, TightVNC do not support this" }
|
|
|
|
{ "#comment" = "" }
|
|
|
|
{ "#comment" = "It is necessary to configure /etc/sasl2/qemu.conf to choose" }
|
|
|
|
{ "#comment" = "the desired SASL plugin (eg, GSSPI for Kerberos)" }
|
|
|
|
{ "#comment" = "" }
|
|
|
|
{ "vnc_sasl" = "1" }
|
|
|
|
{ "#empty" }
|
|
|
|
{ "#empty" }
|
|
|
|
{ "#comment" = "The default SASL configuration file is located in /etc/sasl2/" }
|
|
|
|
{ "#comment" = "When running libvirtd unprivileged, it may be desirable to" }
|
|
|
|
{ "#comment" = "override the configs in this location. Set this parameter to" }
|
|
|
|
{ "#comment" = "point to the directory, and create a qemu.conf in that location" }
|
|
|
|
{ "#comment" = "" }
|
|
|
|
{ "vnc_sasl_dir" = "/some/directory/sasl2" }
|
2009-07-22 15:08:04 +00:00
|
|
|
{ "#empty" }
|
2009-08-17 10:34:53 +00:00
|
|
|
{ "security_driver" = "selinux" }
|
|
|
|
{ "#empty" }
|
|
|
|
{ "user" = "root" }
|
2009-07-22 15:08:04 +00:00
|
|
|
{ "#empty" }
|
|
|
|
{ "group" = "root" }
|
|
|
|
{ "#empty" }
|
|
|
|
{ "cgroup_controllers"
|
|
|
|
{ "1" = "cpu" }
|
|
|
|
{ "2" = "devices" }
|
|
|
|
}
|
|
|
|
{ "#empty" }
|
|
|
|
{ "cgroup_device_acl"
|
|
|
|
{ "1" = "/dev/null" }
|
|
|
|
{ "2" = "/dev/full" }
|
|
|
|
{ "3" = "/dev/zero" }
|
|
|
|
}
|
2009-08-17 10:34:53 +00:00
|
|
|
{ "#empty" }
|
|
|
|
{ "save_image_format" = "gzip" }
|
Support configuration of huge pages in guests
Add option to domain XML for
<memoryBacking>
<hugepages/>
</memoryBacking>
* configure.in: Add check for mntent.h
* qemud/libvirtd_qemu.aug, qemud/test_libvirtd_qemu.aug, src/qemu.conf
Add 'hugetlbfs_mount' config parameter
* src/qemu_conf.c, src/qemu_conf.h: Check for -mem-path flag in QEMU,
and pass it when hugepages are requested.
Load hugetlbfs_mount config parameter, search for mount if not given.
* src/qemu_driver.c: Free hugetlbfs_mount/path parameter in driver shutdown.
Create directory for QEMU hugepage usage, chowning if required.
* docs/formatdomain.html.in: Document memoryBacking/hugepages elements
* docs/schemas/domain.rng: Add memoryBacking/hugepages elements to schema
* src/util.c, src/util.h, src/libvirt_private.syms: Add virFileFindMountPoint
helper API
* tests/qemuhelptest.c: Add -mem-path constants
* tests/qemuxml2argvtest.c, tests/qemuxml2xmltest.c: Add tests for hugepage
handling
* tests/qemuxml2argvdata/qemuxml2argv-hugepages.xml,
tests/qemuxml2argvdata/qemuxml2argv-hugepages.args: Data files for
hugepage tests
2009-08-25 14:05:18 +00:00
|
|
|
{ "#empty" }
|
2009-12-22 17:21:16 +00:00
|
|
|
{ "hugetlbfs_mount" = "/dev/hugepages" }
|
|
|
|
{ "#empty" }
|
|
|
|
{ "relaxed_acs_check" = "1" }
|