summaryrefslogtreecommitdiff
path: root/units/systemd-bus-proxyd@.service.in
Commit message (Collapse)AuthorAge
* bus-proxy: read the right policy when running in user modeLennart Poettering2014-06-10
|
* core: rename ReadOnlySystem= to ProtectSystem= and add a third value for ↵Lennart Poettering2014-06-04
| | | | | | | | | | also mounting /etc read-only Also, rename ProtectedHome= to ProtectHome=, to simplify things a bit. With this in place we now have two neat options ProtectSystem= and ProtectHome= for protecting the OS itself (and optionally its configuration), and for protecting the user's data.
* bus-proxy: drop priviliges if we canLennart Poettering2014-06-04
| | | | | | Either become uid/gid of the client we have been forked for, or become the "systemd-bus-proxy" user if the client was root. We retain CAP_IPC_OWNER so that we can tell kdbus we are actually our own client.
* core: enable PrivateNetwork= for a number of our long running services where ↵Lennart Poettering2014-03-19
| | | | this is useful
* units: make use of PrivateTmp=yes and PrivateDevices=yes for all our ↵Lennart Poettering2014-03-19
| | | | long-running daemons
* units: limit caps for bus proxyd and driverd servicesLennart Poettering2013-12-23
|
* bus: send status message from proxyd to systemd about client we are working forLennart Poettering2013-12-21
|
* bus: fix typo in systemd-bus-proxydKay Sievers2013-12-16
|
* bus: install systemd-bus-proxyd unit files for compatibility with dbus1Lennart Poettering2013-12-13