da9af7a383
- CVE-2019-3886: disallow virDomainGetHostname and virDomainGetTime for read-only connections and users CVE-2019-3886-api.patch, CVE-2019-3886-remote.patch bsc#1131595 - spec: BuildRequires rpcgen since CVE-2019-3886-remote.patch touches remote_protocol.x - Update to libvirt 5.2.0 - Many incremental improvements and bug fixes, see http://libvirt.org/news.html - Dropped patches: 4ec3cf9a-apparmor-rules.patch, f38ef0fa-no-RDMA-check.patch, 411cdaf8-apparmor-check-profile-name.patch, 696239ba-qemu-fix-query-cpus-fast.patch, 09eb1ae0-conf-add-xenbus-controller.patch, fb059757-libxl-add-xenbus-controller.patch, ec5a1191-libxl-support-max-grant-frames.patch, 5a64c202-xenconfig-support-max-grant-frames.patch - Added patches: ff376c62-tests-fix-mocking-stat-lstat.patch, mprivozn-test-fix-proposal.patch OBS-URL: https://build.opensuse.org/request/show/692393 OBS-URL: https://build.opensuse.org/package/show/Virtualization/libvirt?expand=0&rev=745
23 lines
826 B
Diff
23 lines
826 B
Diff
Add support for Xen in libvirtd service file
|
|
|
|
libvirtd should be started after the xencommons service.
|
|
|
|
libvirtd should also conflict with the xendomains service.
|
|
On SUSE distros, we promote libvirt and all the libvirt-based
|
|
tools. If a user installs libvirt on their SUSE Xen host, then
|
|
libvirt should be king and override xendomains. See bsc#1015348
|
|
|
|
Index: libvirt-5.2.0/src/remote/libvirtd.service.in
|
|
===================================================================
|
|
--- libvirt-5.2.0.orig/src/remote/libvirtd.service.in
|
|
+++ libvirt-5.2.0/src/remote/libvirtd.service.in
|
|
@@ -17,6 +17,8 @@ After=local-fs.target
|
|
After=remote-fs.target
|
|
After=systemd-logind.service
|
|
After=systemd-machined.service
|
|
+After=xencommons.service
|
|
+Conflicts=xendomains.service
|
|
Documentation=man:libvirtd(8)
|
|
Documentation=https://libvirt.org
|
|
|