Index: docs/FAQ.html =================================================================== RCS file: /data/cvs/libvirt/docs/FAQ.html,v retrieving revision 1.42 diff -u -r1.42 FAQ.html --- docs/FAQ.html 17 Mar 2008 10:27:31 -0000 1.42 +++ docs/FAQ.html 4 Apr 2008 06:29:35 -0000 @@ -34,7 +34,7 @@
make rpm
Large parts of the API may only be accessible with root priviledges, +
Large parts of the API may only be accessible with root privileges, however the read only access to the xenstore data doesnot have to be forbidden to user, at least for monitoring purposes. If "virsh dominfo" fails to run as an user, change the mode of the xenstore read-only socket Index: docs/architecture.html =================================================================== RCS file: /data/cvs/libvirt/docs/architecture.html,v retrieving revision 1.43 diff -u -r1.43 architecture.html --- docs/architecture.html 17 Mar 2008 10:27:31 -0000 1.43 +++ docs/architecture.html 4 Apr 2008 06:29:35 -0000 @@ -14,7 +14,7 @@ drivers, kernels and daemons communicate though a shared system bus implemented in the hypervisor. The figure below tries to provide a view of this environment:
The library can be initialized in 2 ways depending on the level of -priviledge of the embedding program. If it runs with root access, +privilege of the embedding program. If it runs with root access, virConnectOpen() can be used, it will use three different ways to connect to the Xen infrastructure:
If it runs without root access virConnectOpenReadOnly() should be used to +privilege access).
If it runs without root access virConnectOpenReadOnly() should be used to connect to initialize the library. It will then fork a libvirt_proxy program running as root and providing read_only access to the API, this is then only useful for reporting and monitoring.
The model for QEmu and KVM is completely similar, basically KVM is based @@ -36,14 +36,14 @@ protocol to the library, and connects to the console of the QEmu process in order to control and report on its status. Libvirt tries to expose all the emulations models of QEmu, the selection is done when creating the new -domain, by specifying the architecture and machine type targetted.
The code controlling the QEmu process is available in the +domain, by specifying the architecture and machine type targeted.
The code controlling the QEmu process is available in the
qemud/
directory.
As the previous section explains, libvirt can communicate using different channels with the current hypervisor, and should also be able to use different kind of hypervisor. To simplify the internal design, code, ease maintenance and simplify the support of other virtualization engine the internals have been structured as one core component, the libvirt.c module acting as a front-end for the library API and a set of hypervisor drivers -defining a common set of routines. That way the Xen Daemon accces, the Xen +defining a common set of routines. That way the Xen Daemon access, the Xen Store one, the Hypervisor hypercall are all isolated in separate C modules implementing at least a subset of the common operations defined by the drivers present in driver.h:
When connecting to libvirt, some connections may require client authentication before allowing use of the APIs. The set of possible -authentication mechanisms is administrator controlled, independant +authentication mechanisms is administrator controlled, independent of applications using libvirt.
-The default policy can be overriden by the administrator using the PolicyKit
+The default policy can be overridden by the administrator using the PolicyKit
master configuration file in /etc/PolicyKit/PolicyKit.conf
. The
PolicyKit.conf(5)
manual page provides details on the syntax
available. The two libvirt daemon actions available are named org.libvirt.unix.monitor
@@ -111,7 +111,7 @@
security flags: NO_ANONYMOUS|NO_PLAINTEXT|NO_ACTIVE|PASS_CREDENTIALS|MUTUAL_AUTH
features: WANT_CLIENT_FIRST|PROXY_AUTHENTICATION|NEED_SERVER_FQDN
-Next is is necessary for the adminsitrator of the Kerberos realm to issue a principle
+Next is is necessary for the administrator of the Kerberos realm to issue a principle
for the libvirt server. There needs to be one principle per host running the libvirt
daemon. The principle should be named libvirt/full.hostname@KERBEROS.REALM
.
This is typically done by running the kadmin.local
command on the Kerberos
Index: docs/bugs.html
===================================================================
RCS file: /data/cvs/libvirt/docs/bugs.html,v
retrieving revision 1.43
diff -u -r1.43 bugs.html
--- docs/bugs.html 20 Feb 2008 15:58:06 -0000 1.43
+++ docs/bugs.html 4 Apr 2008 06:29:36 -0000
@@ -9,7 +9,7 @@
If you want to report a bug or ask for a feature, please check the existing open bugs, then if yours isn't a duplicate of
an existing bug, log a new bug and attach any patch or extra data that you may have available. It is always a good idea to also
to post to the mailing-list
-too, so that everybody working on the project can see it, thanks !
Some of the libvirt developpers may be found on IRC on the OFTC +too, so that everybody working on the project can see it, thanks !
Some of the libvirt developers may be found on IRC on the OFTC network. Use the settings:
cvs -d :pserver:anoncvs@libvirt.org:2401/data/cvs co
libvirt
Use ./autogen.sh to configure the local checkout, then make
and make install
, as usual. All normal cvs commands are now
-available except commiting to the base.
Graphics and design by Diana Fong
Graphics and design by Diana Fong