- Add AmbientCapabilities=CAP_NET_RAW CAP_NET_ADMIN to systemd service files - Add sensorpajen user to bluetooth group in postinst - Improve setcap error handling in postinst with clearer messaging - Add comprehensive troubleshooting section for Bluetooth permission errors This fixes the 'Operation not permitted' error when the service tries to access Bluetooth hardware. The fix uses two layers of protection: 1. systemd AmbientCapabilities (modern, robust) 2. File capabilities via setcap (traditional, wider compatibility)
34 lines
813 B
Desktop File
34 lines
813 B
Desktop File
[Unit]
|
|
Description=Sensorpajen - Bluetooth Temperature Sensor Monitor
|
|
Documentation=https://github.com/yourusername/sensorpajen
|
|
After=network.target bluetooth.target
|
|
Wants=bluetooth.target
|
|
|
|
[Service]
|
|
Type=simple
|
|
User=sensorpajen
|
|
Group=sensorpajen
|
|
WorkingDirectory=/opt/sensorpajen
|
|
EnvironmentFile=/etc/sensorpajen/sensorpajen.env
|
|
ExecStart=/opt/sensorpajen/venv/bin/python -m sensorpajen.main
|
|
Restart=always
|
|
RestartSec=10
|
|
|
|
# Bluetooth capabilities
|
|
AmbientCapabilities=CAP_NET_RAW CAP_NET_ADMIN
|
|
NoNewPrivileges=false
|
|
|
|
# Logging
|
|
StandardOutput=journal
|
|
StandardError=journal
|
|
SyslogIdentifier=sensorpajen
|
|
|
|
# Security hardening (where possible with Bluetooth requirements)
|
|
PrivateTmp=true
|
|
ProtectSystem=strict
|
|
ProtectHome=true
|
|
ReadWritePaths=/etc/sensorpajen /var/lib/sensorpajen
|
|
|
|
[Install]
|
|
WantedBy=multi-user.target
|