-
Notifications
You must be signed in to change notification settings - Fork 8
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Debian 12 AppArmor #14
Comments
Hello @elcign, |
If you mean that you'd rather attempt to secure chrony's daemon with another role and simply configure chrony on this one, I'd agree. Or maybe you could have a variable that allows us to run the current role without securing the daemon in case a future Debian upgrade breaks it again? I don't know enough about how this all works to know if that's possible. In any case I otherwise really like the role, so I appreciate the work. |
I noticed this issue as well, the following changes in templates/systemd_override.conf.j2 fixed it for us:
After redeploying, executing systemctl daemon-reload and restarting chrony everything works fine. Maybe you could write a check to ensure the presence of the user _chrony in /etc/passwd and then apply an adjusted systemd_override. @Frzk The apparmor issues occurs because the dynamic user id created by the systemd service doesn't match the user id for the chrony user in /etc/passwd |
I had to disable AppArmor for chrony to get this working on Debian 12. Can you please verify and fix if you agree? I may be out of my depth.
Here's what I had to run:
aa-complain /etc/apparmor.d/usr.sbin.chronyd
The text was updated successfully, but these errors were encountered: