allow awgtpman to run as unprivileged user
The awgtpman process is run as root only because it wants to bind to a privileged port. This is not necessary as capabilities exist to allow running it as a unprivileged user: * remove an unnecessary check in the awgtpman binary on the superuser status of the user * set CAP_NET_BIND_SERVICE in the systemd service to allow it to bind to privileged port This should allow the service to run as a non-privileged user, which we set here to be advligorts. closes #93
parent
0502a4b7
No related branches found
No related tags found
Please register or sign in to comment