summaryrefslogtreecommitdiff
Commit message (Collapse)AuthorAge
* CONST_MAX breaks gcc on fedora 20 with optimiztationLennart Poettering2014-08-20
|
* build: include more optional modules in build stringLennart Poettering2014-08-20
|
* update hwdbLennart Poettering2014-08-20
|
* indentation/spurious whitespace fixesLennart Poettering2014-08-20
|
* journal-upload: allow the tool to startLennart Poettering2014-08-20
|
* cmdline: for new tools avoid introduce new negative switches, and properly ↵Lennart Poettering2014-08-20
| | | | | | | | | | | | | | | | | | | | | | | | | | align --help texts Negative switches are a bad un-normalized thing. We alerady have some, but we should try harder to avoid intrdoucing new ones. Hence, instead of adding two switches: --foobar --no-foobar Let's instead use the syntax --foobar --foobar=yes --foobar=no Where the first two are equivalent. The boolean argument is parsed following the usual rules. Change all new negative switches this way. This patch also properly aligns the --help table, so that single char switches always get a column separate of the long switches.
* README: mention the new optional libidn dependencyLennart Poettering2014-08-20
|
* update NEWSLennart Poettering2014-08-20
|
* man: fix typosRonny Chevalier2014-08-20
|
* NEWSTom Gundersen2014-08-19
|
* sysusers: initialize rThomas Hindoe Paaboel Andersen2014-08-19
| | | | | Needed for the stdin case where it could otherwise end up being used uninitialized.
* NEWS: typo fixesThomas Hindoe Paaboel Andersen2014-08-19
|
* remove unused variablesThomas Hindoe Paaboel Andersen2014-08-19
|
* build-sys: update versions for upcoming releaseLennart Poettering2014-08-19
|
* memfd: escape the comm field we get from PR_GET_NAME, but assume everything ↵Lennart Poettering2014-08-19
| | | | else is proper UTF8
* NEWS: fix minor nitsDaniel Mack2014-08-19
|
* memfd: skip utf-8 escaping if we use a name that was passed inDaniel Mack2014-08-19
| | | | | | If a name was passed in as function argument, trust it, and don't do utf-8 encoding for them. Callers are obliged to check the names themselves, and escape them in case they use anything they got from the outside world.
* socket: suffix newly added TCP sockopt time properties with "Sec"Lennart Poettering2014-08-19
| | | | | | This is what we have done so far for all other time values, and hence we should do this here. This indicates the default unit of time values specified here, if they don't contain a unit.
* README: document what to do with the NSS modulesLennart Poettering2014-08-19
|
* prepare NEWS for next releaseLennart Poettering2014-08-19
|
* memfd: reduce name escaping logic to utf-8 checksDaniel Mack2014-08-19
| | | | | | | | | | | As memfds are now created by proper kernel API, and not by our functions, we can't rely on names being escaped/unescaped according to our current logic. Thus, the only safe way is to remove the escaping and when reading names, just escape names that are not properly encoded in UTF-8. Also, remove assert(name) lines from the memfd creation functions, as we explictly allow name to be NULL.
* memfd: simplify APILennart Poettering2014-08-19
| | | | | | | | | | | Now, that the memfd stuff is not exported anymore, we can simplify a few things: Use assert() instead of assert_return(), since this is used internally only, and we should be less permissive then. No need to pass an allocated fd back by call-by-reference, we can just directly return it.
* update TODOLennart Poettering2014-08-19
|
* Revert "socket: introduce SELinuxLabelViaNet option"Lennart Poettering2014-08-19
| | | | | | This reverts commit cf8bd44339b00330fdbc91041d6731ba8aba9fec. Needs more discussion on the mailing list.
* tmpfiles: add new 'r' line type to add UIDs/GIDs to the pool to allocate ↵Lennart Poettering2014-08-19
| | | | | | | | UIDs/GIDs from This way we can guarantee a limited amount of compatibility with login.defs, by generate an appopriate "r" line out of it, on package installation.
* networkd: don't consider deprecated or tentative addresses when determining ↵Tom Gundersen2014-08-19
| | | | | | operstate https://bugs.freedesktop.org/show_bug.cgi?id=81287
* socket: introduce SELinuxLabelViaNet optionMichal Sekletar2014-08-19
| | | | | | | | | | This makes possible to spawn service instances triggered by socket with MLS/MCS SELinux labels which are created based on information provided by connected peer. Implementation of label_get_child_label derived from xinetd. Reviewed-by: Paul Moore <pmoore@redhat.com>
* networkd: netdev - add missing callback when adding stacked devicesTom Gundersen2014-08-19
| | | | | As the comment says, the passed in callback must always be invoked, or the underlying link will hang. This was missed when reworking the code, so add it back in.
* networkd: link - don't enforce ENSLAVING stateTom Gundersen2014-08-19
| | | | | | We are only guaranteed to stay in ENSLAVING state whilst enslaving by bridges/bonds, not when adding stacked devices (as then the underlying device can be IFF_UP'ed and configured in parallel), so drop these asserts.
* update TODOLennart Poettering2014-08-19
|
* util: remove unused FOREACH_WORD_SEPARATOR_QUOTEDLennart Poettering2014-08-19
|
* sysusers: realign sysusers snippetsLennart Poettering2014-08-19
|
* sysusers: set home directory for root to /rootLennart Poettering2014-08-19
|
* sysusers: add another column to sysusers files for the home directoryLennart Poettering2014-08-19
|
* networkd: fix use-after-freeTom Gundersen2014-08-19
| | | | Elements must be removed from the hashtable before they are freed.
* update TODOLennart Poettering2014-08-19
|
* sysusers: add a new RPM macro for creating users directly from data passed ↵Lennart Poettering2014-08-19
| | | | | | | | | | | | | | | in via stdin This allows encoding users to create directly in %pre, which is necessary so that files owned by the RPM can be assigned to the right users/groups. This new macro does create a redundancy, as user definitions for all users that shall own files need to to be listed twice, once with this new macro, and then secondly, in the sysusers file shipped with the package. But there's little way around that, as the users of this type need to exist before we install the first file, but we actually want to ship the user information in a file.
* sysusers: optionally, read sysuers configuration from standard inputLennart Poettering2014-08-19
|
* update TODOLennart Poettering2014-08-19
|
* sysusers: also update /etc/shadow and /etc/gshadow when creating new system ↵Lennart Poettering2014-08-19
| | | | | | users This should resolve problems with tools like "grpck" and suchlike.
* hashmap: try to use the existing 64bit hash functions for dev_t if it is 64bitLennart Poettering2014-08-19
|
* bus: map sealed memfds as MAP_PRIVATEDavid Herrmann2014-08-18
| | | | | | | | | Mapping files as MAP_SHARED is handled by the kernel as 'writable' mapping. Always! Even with PROT_READ. Reason for that is, mprotect(PROT_WRITE) could change the mapping underneath and currently there is no kernel infrastructure to add protection there. This might change in the future, but until then, map sealed files as MAP_PRIVATE so we don't get EPERM.
* Update TODOLennart Poettering2014-08-18
|
* util: try to be a bit more NFS compatible when checking whether an FS is ↵Lennart Poettering2014-08-18
| | | | | | writable https://bugs.freedesktop.org/show_bug.cgi?id=81169
* core: minor modernizationsLennart Poettering2014-08-18
|
* units: fix BindsTo= logic when applied relative to services with Type=oneshotLennart Poettering2014-08-18
| | | | | | | Start jobs for Type=oneshot units are successful when the unit state transition activating → inactive took place. In such a case all units that BindsTo= on it previously would continue to run, even though the unit they dependet on was actually already gone.
* man: fix typoRonny Chevalier2014-08-18
|
* bootchart: use NSEC_PER_SECRonny Chevalier2014-08-18
|
* bus-control: Fix cgroup handlingDenis Kenzior2014-08-18
| | | | | | | | | | On systems without properly setup systemd, cg_get_root_path returns -ENOENT. This means that busctl doesn't display much information. busctl monitor also fails whenever it intercepts messages. This fix fakes creates a fake "/" root cgroup which lets busctl work on such systems.
* man: mention that "units" are commonly system servicesLennart Poettering2014-08-18
| | | | Also, provide an example for -u.