summaryrefslogtreecommitdiff
path: root/units/systemd-journald-audit.socket
Commit message (Collapse)AuthorAgeFilesLines
* Add SPDX license headers to unit filesZbigniew Jędrzejewski-Szmek2017-11-191-0/+2
|
* Revert "units: set ConditionVirtualization=!private-users on journald audit ↵Lennart Poettering2017-08-021-1/+0
| | | | | | | | | | | | socket" (#6513) * Revert "modprobe.d: ship drop-in to set bonding max_bonds to 0 (#6448)" This reverts commit 582faeb461aa0dd01b55bf6c9b1433532fc927d3. * Revert "units: set ConditionVirtualization=!private-users on journald audit socket (#6508)" This reverts commit d2a1ba103b4ea22764953d795c36db3d492d50c9.
* units: set ConditionVirtualization=!private-users on journald audit socket ↵Dimitri John Ledkov2017-08-021-0/+1
| | | | | (#6508) It fails to start in an unprivileged container as audit is not namespace aware.
* units: conditionalize audit multicast socket on CAP_AUDIT_READLennart Poettering2015-05-201-0/+1
| | | | | The multicast logic can only work if the capability is available, hence require it.
* core: introduce ConditionSecurity=auditLennart Poettering2014-11-031-0/+1
| | | | And conditionalize journald audit support with it
* journald: if available pull audit messages from the kernel into journal logsLennart Poettering2014-11-031-0/+18