-
Notifications
You must be signed in to change notification settings - Fork 468
Description
I created a Tumbleweed distrobox ("essentials") on my Aeon system, and installed bolt-utils
in there, since Aeon does not come with boltctl
:
distrobox-enter essentials -- sudo zypper install bolt-tools
.
I then exported the boltctl
binary, and attempted to start the bolt.service
service (sudo systemctl enable bolt.service --now
), and, while the service did start, the system complained that the bolt.service
file is incomplete:
dad@localhost:~> sudo systemctl enable bolt --now
The unit files have no installation config (WantedBy=, RequiredBy=, UpheldBy=,
Also=, or Alias= settings in the [Install] section, and DefaultInstance= for
template units). This means they are not meant to be enabled or disabled using systemctl.
Possible reasons for having these kinds of units are:
• A unit may be statically enabled by being symlinked from another unit's
.wants/, .requires/, or .upholds/ directory.
• A unit's purpose may be to act as a helper for some other unit which has
a requirement dependency on it.
• A unit may be started when needed via activation (socket, path, timer,
D-Bus, udev, scripted systemctl call, ...).
• In case of template units, the unit is meant to be enabled with some
instance name specified.
Indeed I checked the corresponding file, and here below is what that service looks like. Like I said, while the service seems to be running, it does not do anything--in particular, boltctl list
does not reflect any changes in the Thunderbolt configuration of the system. My guess is, again, that this is due to the incompleteness of the bolt.service file. Can anyone help me add the missing sections to the bolt.service
?
📦[dad@essentials2 ~]$ cat /usr/lib/systemd/system/bolt.service
[Unit]
Description=Thunderbolt system service
After=polkit.service
Documentation=man:boltd(8)
[Service]
Type=dbus
BusName=org.freedesktop.bolt
ExecStart=/usr/libexec/boltd
#Environment="G_MESSAGES_DEBUG=all"
Restart=on-failure
NotifyAccess=main
WatchdogSec=3min
MemoryDenyWriteExecute=yes
PrivateTmp=yes
ProtectControlGroups=yes
ProtectHome=yes
ProtectKernelModules=yes
ProtectSystem=full
RestrictAddressFamilies=AF_NETLINK AF_UNIX
RestrictRealtime=yes
SystemCallFilter=~@mount
CapabilityBoundingSet=CAP_NET_ADMIN
#directory management
RuntimeDirectory=boltd
RuntimeDirectoryPreserve=yes
StateDirectory=boltd