From: Guido Guenther Date: Thu, 26 Jun 2008 20:01:38 +0200 Subject: [PATCH] allow libvirt group to access the socket --- daemon/libvirtd.conf | 8 ++++---- 1 files changed, 4 insertions(+), 4 deletions(-) diff --git a/daemon/libvirtd.conf b/daemon/libvirtd.conf index d11c0fb..8de5c82 100644 --- a/daemon/libvirtd.conf +++ b/daemon/libvirtd.conf @@ -78,7 +78,7 @@ # without becoming root. # # This is restricted to 'root' by default. -#unix_sock_group = "libvirt" +unix_sock_group = "libvirt" # Set the UNIX socket permissions for the R/O socket. This is used # for monitoring VM status only @@ -95,7 +95,7 @@ # # If not using PolicyKit and setting group ownership for access # control then you may want to relax this to: -#unix_sock_rw_perms = "0770" +unix_sock_rw_perms = "0770" # Set the name of the directory in which sockets will be found/created. #unix_sock_dir = "/var/run/libvirt" @@ -126,7 +126,7 @@ # # To restrict monitoring of domains you may wish to enable # an authentication mechanism here -#auth_unix_ro = "none" +auth_unix_ro = "none" # Set an authentication scheme for UNIX read-write sockets # By default socket permissions only allow root. If PolicyKit @@ -135,7 +135,7 @@ # # If the unix_sock_rw_perms are changed you may wish to enable # an authentication mechanism here -#auth_unix_rw = "none" +auth_unix_rw = "none" # Change the authentication scheme for TCP sockets. # --