In some deployments, the "neutron" user does not have the permissions
to modify the kernel interfaces. In those cases the radvd user should
be defined. This patch introduces a new config option: "radvd_user".
This config option is the username passed to radvd, used to drop root
privileges and change user ID to username and group ID to the primary
group of username. If no user specified (by default is an empty string),
the user executing the L3 agent will be passed. If "root" specified,
because radvd is spawned as root, no "username" parameter will be
passed.
Reviewed: https:/ /review. opendev. org/691257 /git.openstack. org/cgit/ openstack/ neutron/ commit/ ?id=0b13f70f57e 2d567aeb8017ad2 a2c81c495dc3dd
Committed: https:/
Submitter: Zuul
Branch: stable/rocky
commit 0b13f70f57e2d56 7aeb8017ad2a2c8 1c495dc3dd
Author: Rodolfo Alonso Hernandez <email address hidden>
Date: Thu Sep 19 17:12:59 2019 +0000
Add radvd_user config option
In some deployments, the "neutron" user does not have the permissions
to modify the kernel interfaces. In those cases the radvd user should
be defined. This patch introduces a new config option: "radvd_user".
This config option is the username passed to radvd, used to drop root
privileges and change user ID to username and group ID to the primary
group of username. If no user specified (by default is an empty string),
the user executing the L3 agent will be passed. If "root" specified,
because radvd is spawned as root, no "username" parameter will be
passed.
Conflicts:
neutron/ tests/unit/ agent/l3/ test_agent. py
Change-Id: Ie9a6fbf04d453a 3c1c0bddf9ecaa3 d4d6467e8ff 8310774cef1b091 d2ce2551d4) d41f136748f8740 40d453357f) b804d48b0f6a46f 7ed18fc629)
Closes-Bug: #1844688
(cherry picked from commit 6a5a75d5a6d4af0
(cherry picked from commit 5b6b040d0795959
(cherry picked from commit 9921c962180e641