Commit message (Collapse) | Author | Age | Files | Lines | |
---|---|---|---|---|---|
* | Add SPDX license headers to unit files | Zbigniew Jędrzejewski-Szmek | 2017-11-19 | 1 | -0/+2 |
| | |||||
* | Revert "units: set ConditionVirtualization=!private-users on journald audit ↵ | Lennart Poettering | 2017-08-02 | 1 | -1/+0 |
| | | | | | | | | | | | | socket" (#6513) * Revert "modprobe.d: ship drop-in to set bonding max_bonds to 0 (#6448)" This reverts commit 582faeb461aa0dd01b55bf6c9b1433532fc927d3. * Revert "units: set ConditionVirtualization=!private-users on journald audit socket (#6508)" This reverts commit d2a1ba103b4ea22764953d795c36db3d492d50c9. | ||||
* | units: set ConditionVirtualization=!private-users on journald audit socket ↵ | Dimitri John Ledkov | 2017-08-02 | 1 | -0/+1 |
| | | | | | (#6508) It fails to start in an unprivileged container as audit is not namespace aware. | ||||
* | units: conditionalize audit multicast socket on CAP_AUDIT_READ | Lennart Poettering | 2015-05-20 | 1 | -0/+1 |
| | | | | | The multicast logic can only work if the capability is available, hence require it. | ||||
* | core: introduce ConditionSecurity=audit | Lennart Poettering | 2014-11-03 | 1 | -0/+1 |
| | | | | And conditionalize journald audit support with it | ||||
* | journald: if available pull audit messages from the kernel into journal logs | Lennart Poettering | 2014-11-03 | 1 | -0/+18 |