The INSTALL documentation asks users to invoke ovsdb-server with
SSL support without explaining how to create the required keys and
install them.  This confuses new users who just want to play around
with the switch.  For simplicity, this patch suggests users start
ovsdb-server without SSL.

Signed-off-by: Ethan Jackson <[email protected]>
---
 INSTALL |    9 +--------
 1 file changed, 1 insertion(+), 8 deletions(-)

diff --git a/INSTALL b/INSTALL
index 4d94c52..7164a11 100644
--- a/INSTALL
+++ b/INSTALL
@@ -279,19 +279,12 @@ configuration database, ovsdb-server.  Each machine on 
which Open
 vSwitch is installed should run its own copy of ovsdb-server.
 Configure it to use the database you created during step 7 of
 installation, above, to listen on a Unix domain socket, to connect to
-any managers specified in the database itself, and to use the SSL
-configuration in the database:
+any managers specified in the database itself.
 
       % ovsdb-server --remote=punix:/usr/local/var/run/openvswitch/db.sock \
                      --remote=db:Open_vSwitch,manager_options \
-                     --private-key=db:SSL,private_key \
-                     --certificate=db:SSL,certificate \
-                     --bootstrap-ca-cert=db:SSL,ca_cert \
                      --pidfile --detach
 
-(If you built Open vSwitch without SSL support, then omit
---private-key, --certificate, and --bootstrap-ca-cert.)
-
 Then initialize the database using ovs-vsctl.  This is only
 necessary the first time after you create the database with
 ovsdb-tool (but running it at any time is harmless):
-- 
1.7.9.5

_______________________________________________
dev mailing list
[email protected]
http://openvswitch.org/mailman/listinfo/dev

Reply via email to