Skip to content

Use dedicated halpid group for socket access control#98

Merged
mairas merged 2 commits intomainfrom
feat/halpid-socket-group
Feb 15, 2026
Merged

Use dedicated halpid group for socket access control#98
mairas merged 2 commits intomainfrom
feat/halpid-socket-group

Conversation

@mairas
Copy link
Contributor

@mairas mairas commented Feb 15, 2026

Summary

  • Replace the adm group with a dedicated halpid system group (GID 960) for socket permission control
  • The postinst creates the group idempotently and adds the default user (UID 1000) for CLI access
  • Using a fixed GID allows the Signal K container to reference it via group_add in docker-compose

Companion PR: halos-org/halos-marine-containers#132 (adds group_add: ["960"] to Signal K container)

Closes hatlabs/signalk-halpi#2

Test plan

  • Install updated halpid package on a HALPI2 device
  • Verify getent group halpid shows GID 960
  • Verify socket is root:halpid 0660 at /run/halpid/halpid.sock
  • Verify halpi CLI tool still works (default user in halpid group)
  • Verify Signal K plugin can connect to socket (with companion marine-containers change)

🤖 Generated with Claude Code

mairas and others added 2 commits February 15, 2026 22:28
Replace the overly broad `adm` group with a dedicated `halpid` system
group (GID 960) for socket permission control. The postinst now creates
the group and adds the default user (UID 1000) to it for CLI access.

Co-Authored-By: Claude Opus 4.6 <noreply@anthropic.com>
@mairas mairas merged commit 8bf4807 into main Feb 15, 2026
4 checks passed
@mairas mairas deleted the feat/halpid-socket-group branch February 15, 2026 20:43
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

Signal K container needs adm group for halpid socket access

1 participant