mirror of
https://github.com/kanidm/kanidm.git
synced 2025-02-23 20:47:01 +01:00
* feat: Rebuild the deb packaging flow fix: Add more sudo, GHA likes sudo fix: Give build_debs.sh only the triplet argument fix: Work around more GHA weirdness in apt sources Drop crossbuild as it was only used by debian packaging docs: Update book and other docs for packaging flow feat: package kanidm_tools aka kanidm cli docs: Update packaging docs for latest process and clarity fix: use full triple in sdynlib variants fix: Correct kanidm.pam asset placement fix: Give pam & nss modules a description so the debs get it fix: Work around wonky libssl3 naming in Ubuntu 24.04 fix: Place kanidm bin correctly :3 feat: Pin all blame on @yaleman :3 WIP: Swap out the submodule reference. Still not the final one though. refactor: Switch kanidm-pam & kanidm-nss to mandatory deps While in theory unixd will start and run without them, it also won't do anything useful. fix: explicit depends for nss & pam libs without versions We build the debs on the ubuntu24.04 GHA runner so automatic pins versions that are too new for 22.04. Ideally we'd run cargo-deb also on the target images but that'll have to be a future improvement. * refactor: Switch nss_kanidm & pam_kanidm package naming closer to debian guidance * feat: Attempt enabling unixd by default with secure defaults * fix: Relax config permissions so the kanidm user can read Also, update postinst config instructions
50 lines
1.4 KiB
Desktop File
50 lines
1.4 KiB
Desktop File
# You should not need to edit this file. Instead, use a drop-in file by running:
|
|
# systemctl edit kanidm-unixd.service
|
|
|
|
[Unit]
|
|
Description=Kanidm Local Client Resolver
|
|
After=chronyd.service nscd.service ntpd.service network-online.target
|
|
Before=systemd-user-sessions.service sshd.service nss-user-lookup.target
|
|
Wants=nss-user-lookup.target
|
|
# While it seems confusing, we need to be after nscd.service so that the
|
|
# Conflicts will triger and then automatically stop it.
|
|
Conflicts=nscd.service
|
|
|
|
[Service]
|
|
DynamicUser=yes
|
|
SupplementaryGroups=tss
|
|
UMask=0027
|
|
CacheDirectory=kanidm-unixd
|
|
RuntimeDirectory=kanidm-unixd
|
|
StateDirectory=kanidm-unixd
|
|
|
|
|
|
Type=notify
|
|
ExecStart=/usr/sbin/kanidm_unixd
|
|
# auth going down is bad, but infinite speedlooping is worse
|
|
Restart=always
|
|
RestartSec=30
|
|
|
|
# Implied by dynamic user.
|
|
# ProtectHome=
|
|
# ProtectSystem=strict
|
|
# ReadWritePaths=/var/run/kanidm-unixd /var/cache/kanidm-unixd
|
|
|
|
# SystemCallFilter=@aio @basic-io @chown @file-system @io-event @network-io @sync
|
|
NoNewPrivileges=true
|
|
PrivateTmp=true
|
|
# We have to disable this to allow tpmrm0 access for tpm binding.
|
|
PrivateDevices=false
|
|
# Older versions of systemd require this to be explicitly allowed.
|
|
DeviceAllow=/dev/tpmrm0 rw
|
|
ProtectHostname=true
|
|
ProtectClock=true
|
|
ProtectKernelTunables=true
|
|
ProtectKernelModules=true
|
|
ProtectKernelLogs=true
|
|
ProtectControlGroups=true
|
|
MemoryDenyWriteExecute=true
|
|
|
|
[Install]
|
|
WantedBy=multi-user.target
|