2
0
mirror of https://gitlab.isc.org/isc-projects/kea synced 2025-08-29 21:18:02 +00:00

[#3833] Add table in the security section

This commit is contained in:
Andrei Pavel 2025-05-20 13:03:17 +03:00
parent 853f7093f5
commit a7477f6ee2
No known key found for this signature in database
GPG Key ID: D4E804481939CB21

View File

@ -403,6 +403,30 @@ stdout/stderr and files. Syslog may export the logs over the network, exposing t
running, log an unrecoverable error. For ease of use simply omit the ``path``
parameter.
Summary of Path Restrictions
----------------------------
Path restrictions mentioned through this section can be summarized according to
the following table:
+-------------------------------------+---------------------------------------+----------------------------------+
| Restricted Element | Default Value | Environment Variable Override |
+=====================================+=======================================+==================================+
| Config Files (``config-write``) | Same Directory as Initial Config File | N/A |
+-------------------------------------+---------------------------------------+----------------------------------+
| Host Cache Files (``cache-write``) | ``var/lib/kea`` | ``KEA_DHCP_DATA_DIRECTORY`` |
+-------------------------------------+---------------------------------------+----------------------------------+
| Lease Files | ``var/lib/kea`` | ``KEA_DHCP_DATA_DIRECTORY`` |
+-------------------------------------+---------------------------------------+----------------------------------+
| Log Files | ``var/log/kea`` | ``KEA_LOG_FILE_DIR`` |
+-------------------------------------+---------------------------------------+----------------------------------+
| Forensic Log Files | ``var/log/kea`` | ``KEA_LEGAL_LOG_DIR`` |
+-------------------------------------+---------------------------------------+----------------------------------+
| Unix Sockets | ``var/run/kea`` | ``KEA_CONTROL_SOCKET_DIR`` |
+-------------------------------------+---------------------------------------+----------------------------------+
Cryptography Components
-----------------------