Russell Bryant writes:
> On Tue, Mar 27, 2018 at 9:26 AM, Aaron Conole wrote:
>> Aaron Conole writes:
>>
>>> Currently, regardless of which user is being set as the running user,
>>> Open vSwitch daemons on RHEL systems drop capabilities. This means the
>>> very powerful CAP_SYS_ADMIN is dropp
On Tue, Mar 27, 2018 at 9:26 AM, Aaron Conole wrote:
> Aaron Conole writes:
>
>> Currently, regardless of which user is being set as the running user,
>> Open vSwitch daemons on RHEL systems drop capabilities. This means the
>> very powerful CAP_SYS_ADMIN is dropped, even when the user is 'root'
Aaron Conole writes:
> Currently, regardless of which user is being set as the running user,
> Open vSwitch daemons on RHEL systems drop capabilities. This means the
> very powerful CAP_SYS_ADMIN is dropped, even when the user is 'root'.
>
> For the majority of use cases this behavior works, as
On Tue, 13 Feb 2018 16:42:16 -0500
Aaron Conole wrote:
> Currently, regardless of which user is being set as the running user,
> Open vSwitch daemons on RHEL systems drop capabilities. This means
> the very powerful CAP_SYS_ADMIN is dropped, even when the user is
> 'root'.
>
> For the majority
Currently, regardless of which user is being set as the running user,
Open vSwitch daemons on RHEL systems drop capabilities. This means the
very powerful CAP_SYS_ADMIN is dropped, even when the user is 'root'.
For the majority of use cases this behavior works, as the user can
enable or disable v