The INSTALL documentation asks users to invoke ovsdb-server with SSL support without explaining how to create the required keys and install them. This confuses new users who just want to play around with the switch. For simplicity, this patch suggests users start ovsdb-server without SSL.
Signed-off-by: Ethan Jackson <[email protected]> --- INSTALL | 9 +-------- 1 file changed, 1 insertion(+), 8 deletions(-) diff --git a/INSTALL b/INSTALL index 4d94c52..7164a11 100644 --- a/INSTALL +++ b/INSTALL @@ -279,19 +279,12 @@ configuration database, ovsdb-server. Each machine on which Open vSwitch is installed should run its own copy of ovsdb-server. Configure it to use the database you created during step 7 of installation, above, to listen on a Unix domain socket, to connect to -any managers specified in the database itself, and to use the SSL -configuration in the database: +any managers specified in the database itself. % ovsdb-server --remote=punix:/usr/local/var/run/openvswitch/db.sock \ --remote=db:Open_vSwitch,manager_options \ - --private-key=db:SSL,private_key \ - --certificate=db:SSL,certificate \ - --bootstrap-ca-cert=db:SSL,ca_cert \ --pidfile --detach -(If you built Open vSwitch without SSL support, then omit ---private-key, --certificate, and --bootstrap-ca-cert.) - Then initialize the database using ovs-vsctl. This is only necessary the first time after you create the database with ovsdb-tool (but running it at any time is harmless): -- 1.7.9.5 _______________________________________________ dev mailing list [email protected] http://openvswitch.org/mailman/listinfo/dev
