summaryrefslogtreecommitdiffstats
path: root/units/systemd-journald-audit.socket (follow)
Commit message (Collapse)AuthorAgeFilesLines
* journal: give the ability to enable/disable systemd-journald-audit.socketFranck Bui2023-01-111-0/+4
| | | | | | | | | | Before this patch the only way to prevent journald from reading the audit messages was to mask systemd-journald-audit.socket. However this had main drawback that downstream couldn't ship the socket disabled by default (beside the fact that masking units is not supposed to be the usual way to disable them). Fixes #15777
* license: LGPL-2.1+ -> LGPL-2.1-or-laterYu Watanabe2020-11-091-1/+1
|
* Add SPDX license headers to unit filesZbigniew Jędrzejewski-Szmek2017-11-191-0/+2
|
* Revert "units: set ConditionVirtualization=!private-users on journald audit ↵Lennart Poettering2017-08-021-1/+0
| | | | | | | | | | | | socket" (#6513) * Revert "modprobe.d: ship drop-in to set bonding max_bonds to 0 (#6448)" This reverts commit 582faeb461aa0dd01b55bf6c9b1433532fc927d3. * Revert "units: set ConditionVirtualization=!private-users on journald audit socket (#6508)" This reverts commit d2a1ba103b4ea22764953d795c36db3d492d50c9.
* units: set ConditionVirtualization=!private-users on journald audit socket ↵Dimitri John Ledkov2017-08-021-0/+1
| | | | | (#6508) It fails to start in an unprivileged container as audit is not namespace aware.
* units: conditionalize audit multicast socket on CAP_AUDIT_READLennart Poettering2015-05-201-0/+1
| | | | | The multicast logic can only work if the capability is available, hence require it.
* core: introduce ConditionSecurity=auditLennart Poettering2014-11-031-0/+1
| | | | And conditionalize journald audit support with it
* journald: if available pull audit messages from the kernel into journal logsLennart Poettering2014-11-031-0/+18