summaryrefslogtreecommitdiff
path: root/pkgs/development/python-modules/python-openstackclient
diff options
context:
space:
mode:
authorGrimmauld <Grimmauld@grimmauld.de>2025-07-25 23:49:59 +0200
committerGrimmauld <Grimmauld@grimmauld.de>2025-07-25 23:49:59 +0200
commitfb51cc802dcdda33133146b6630492409e9b472d (patch)
tree11e3b2ce6553ef7000f6e76e0432efdf7a120955 /pkgs/development/python-modules/python-openstackclient
parent1fd9a57cf1082a99c36aa337bb83f6fc3d2892a5 (diff)
nixos/systemd: run0: enable setLoginUid, disable pamMount
This brings our `run0` in line with the upstream defaults: https://github.com/systemd/systemd/blob/bcc73cafdbd9c3947c53e4cff3498f8a73e56d9d/src/run/systemd-run0.in While working on `auditd`, i noticed differences in how `run0` behaves in regard to `/proc/$pid/sessionid` and `/proc/$pid/loginuid`. Particularly, both files were set to `4294967295`, the magic value denoting `unset`. While the manual page says elevators such as sudo should not set the loginuid, run0 is a bit of a special case: The unit spawned by it is not child of the running user session, and as such there is no id to inherit. `systemd` upstream uses `pam_loginuid`, and for consistency we should too. Especially because it prevents a whole lot of pain when working with `auditd`. As to pam mounts: On nixos we enable those if they are globally enabled. Upstream does not. Considering the password entered into polkit is usually not the user password of the account which will own the unit, pam mount will fail for any partition which requires a password. Thus it makes sense to also disable pam mounts for our run0, it prevents unnecessary unexpected pain.
Diffstat (limited to 'pkgs/development/python-modules/python-openstackclient')
0 files changed, 0 insertions, 0 deletions