summaryrefslogtreecommitdiff
path: root/man
Commit message (Collapse)AuthorAge
* doc: update punctuationJan Engelhardt2014-02-17
| | | | Resolve spotted issues related to missing or extraneous commas, dashes.
* doc: detail what "UID" isJan Engelhardt2014-02-17
|
* doc: quote consistently in autoconf codeJan Engelhardt2014-02-17
| | | | | | AS_HELP_STRING has been observed to expand such that the surround function complains; play it safe and consistenly quote the example code throughout.
* man: fix a typoAnsgar Burchardt2014-02-17
|
* Revert "man: systemd.service(5): clarify behavior of SuccessExitStatus"Lennart Poettering2014-02-17
| | | | | | | This reverts commit 29e254f7f093c07a1ec7e845e60203357f585235. Conflicts: man/systemd.service.xml
* Some modernizationsZbigniew Jędrzejewski-Szmek2014-02-17
|
* nspawn: add new --network-bridge= switchTom Gundersen2014-02-16
| | | | | | | | This adds the host side of the veth link to the given bridge. Also refactor the creation of the veth interfaces a bit to set it up from the host rather than the container. This simplifies the addition to the bridge, but otherwise the behavior is unchanged.
* man: use spaces instead of tabsJason St. John2014-02-14
| | | | | Several sections of the man pages included intermixed tabs and spaces; this commit replaces all tabs with spaces.
* man: replace STDOUT with standard output, etc.Zbigniew Jędrzejewski-Szmek2014-02-14
| | | | | | | | | Actually 'STDOUT' is something that doesn't appear anywhere: in the stdlib we have 'stdin', and there's only the constant STDOUT_FILENO, so there's no reason to use capitals. When refering to code, STDOUT/STDOUT/STDERR are replaced with stdin/stdout/stderr, and in other places they are replaced with normal phrases like standard output, etc.
* man: fix grammatical errors and other formatting issuesJason St. John2014-02-14
| | | | | | | * standardize capitalization of STDIN, STDOUT, and STDERR * reword some sentences for clarity * reflow some very long lines to be shorter than ~80 characters * add some missing <literal>, <constant>, <varname>, <option>, and <filename> tags
* man: always place <programlisting> and </programlisting> in a line with ↵Lennart Poettering2014-02-14
| | | | actual sources, so that we don't get spurious newlines in the man page output
* man: systemd.service(5): clarify behavior of SuccessExitStatusDave Reisner2014-02-14
| | | | | | The behavior of this is a little cryptic in that $MAINPID must exit as a direct result of receiving a signal in order for a listed signal to be considered a success condition.
* nspawn: add new --network-veth switch to add a virtual ethernet link to the hostLennart Poettering2014-02-13
|
* nspawn: --private-network should imply CAP_NET_ADMINLennart Poettering2014-02-13
|
* nspawn: add new --network-interface= switch to move an existing interface ↵Lennart Poettering2014-02-13
| | | | into the container
* nspawn: introduce --capability=all for retaining all capabilitiesLennart Poettering2014-02-13
|
* core: add a system-wide SystemCallArchitectures= settingLennart Poettering2014-02-13
| | | | | | This is useful to prohibit execution of non-native processes on systems, for example 32bit binaries on 64bit systems, this lowering the attack service on incorrect syscall and ioctl 32→64bit mappings.
* core: add SystemCallArchitectures= unit setting to allow disabling of non-nativeLennart Poettering2014-02-13
| | | | | | | architecture support for system calls Also, turn system call filter bus properties into complex types instead of concatenated strings.
* core: rework syscall filterLennart Poettering2014-02-12
| | | | | | | | | | - Allow configuration of an errno error to return from blacklisted syscalls, instead of immediately terminating a process. - Fix parsing logic when libseccomp support is turned off - Only keep the actual syscall set in the ExecContext, and generate the string version only on demand.
* syscallfilter: port to libseccompRonny Chevalier2014-02-12
|
* man: use xinclude to de-deduplicate common textZbigniew Jędrzejewski-Szmek2014-02-12
| | | | | I only tested with python-lxml. I'm not sure if xml.etree should be deprecated.
* pager: support SYSTEMD_LESS environment variableJason A. Donenfeld2014-02-12
| | | | | | This allows customization of the arguments used by less. The main motivation is that some folks might not like having --no-init on every invocation of less.
* nspawn: newer kernels (>= 3.14) allow resetting the audit loginuid, make use ↵Lennart Poettering2014-02-12
| | | | of this
* machinectl: add new "machinectl reboot" callLennart Poettering2014-02-12
|
* machined: optionally, allow registration of pre-existing units (scopesLennart Poettering2014-02-11
| | | | or services) as machine with machined
* nspawn: add --register=yes|no switch to optionally disable registration of ↵Lennart Poettering2014-02-11
| | | | the container with machined
* networkd: VLAN - allow multiple vlans to be created on a linkTom Gundersen2014-02-10
| | | | | | | | Also limit the range of vlan ids. Other implementations and documentation use the ranges {0,1}-{4094,4095}, but we use the one accepted by the kernel: 0-4094. Reported-by: Oleksii Shevchuk <alxchk@gmail.com>
* nspawn: add new --share-system switch to run a container without PID/UTS/IPC ↵Lennart Poettering2014-02-10
| | | | namespacing
* nspawn,man: use a common vocabulary when referring to selinux security contextsLennart Poettering2014-02-10
| | | | | | | | | | | Let's always call the security labels the same way: SMACK: "Smack Label" SELINUX: "SELinux Security Context" And the low-level encapsulation is called "seclabel". Now let's hope we stick to this vocabulary in future, too, and don't mix "label"s and "security contexts" and so on wildly.
* exec: Add support for ignoring errors on SELinuxContext by prefixing it with ↵Michael Scherer2014-02-10
| | | | | | | -, like for others settings. Also remove call to security_check_context, as this doesn't serve anything, since setexeccon will fail anyway.
* exec: Add SELinuxContext configuration itemMichael Scherer2014-02-10
| | | | | | | | This permit to let system administrators decide of the domain of a service. This can be used with templated units to have each service in a différent domain ( for example, a per customer database, using MLS or anything ), or can be used to force a non selinux enabled system (jvm, erlang, etc) to start in a different domain for each service.
* man: fix another reference in systemd-inhibit(1)Zbigniew Jędrzejewski-Szmek2014-02-09
| | | | http://bugs.debian.org/738316
* man: fix reference in systemd-inhibit(1)Zbigniew Jędrzejewski-Szmek2014-02-09
| | | | http://bugs.debian.org/738316
* nspawn: rename --file-label to --apifs-label since it's really just about ↵Lennart Poettering2014-02-07
| | | | the API file systems, nothing else
* networkd: netdev - rename Netdev to NetDevTom Gundersen2014-02-07
| | | | Both in the configuration file format and everywhere else in the code.
* man: cryptsetup-1.6.3 now allows partition device file in system modeJan Janssen2014-02-07
|
* nspawn: add --quiet switch for turning off any output noiseLennart Poettering2014-02-06
|
* man: introduce new "Desktop" property for sessionsLennart Poettering2014-02-05
| | | | | | This is initialized from XDG_SESSION_DESKTOP and is useful for GNOME to recognize its own sessions. It's supposed to be set to a short string identifying the session, such as "kde" or "gnome".
* logind: make session type and class settable via the same waysLennart Poettering2014-02-05
| | | | | | If the session type/class is set via environment variables, use that, and otherwise fallback to something that is set via the PAM module command line.
* nspawn: various fixes in selinux hookupLennart Poettering2014-02-04
| | | | | | | | | | | | | | | - As suggested, prefix argument variables with "arg_" how we do this usually. - As suggested, don't involve memory allocations when storing command line arguments. - Break --help text at 80 chars - man: explain that this is about SELinux - don't do unnecessary memory allocations when putting together mount option string
* Add SELinux support to systemd-nspawnDan Walsh2014-02-04
| | | | | | | | | | | | | | | | | This patch adds to new options: -Z PROCESS_LABEL This specifies the process label to run on processes run within the container. -L FILE_LABEL The file label to assign to memory file systems created within the container. For example if you wanted to wrap an container with SELinux sandbox labels, you could execute a command line the following chcon system_u:object_r:svirt_sandbox_file_t:s0:c0,c1 -R /srv/container systemd-nspawn -L system_u:object_r:svirt_sandbox_file_t:s0:c0,c1 -Z system_u:system_r:svirt_lxc_net_t:s0:c0,c1 -D /srv/container /bin/sh
* networkd: dhcpv4 - add notion of 'CriticalConnection'Tom Gundersen2014-01-30
| | | | | | | | | | These connections are never torn down, even when the DHCP specifications say that they should be. This is useful/necessary when the rootfs (or another critical fs) is mounted over this network connection, and dataloss would result if the connection is lost. This option defaults to off, but our initrd generator (TBD) will enable it when applicable.
* core: introduce new KillMode=mixed which sends SIGTERM only to the main ↵Lennart Poettering2014-01-29
| | | | | | | | process, but SIGKILL to all daemon processes This should fix some race with terminating systemd --user, where the system systemd instance might race against the user systemd instance when sending SIGTERM.
* man: remove erroneous history sectionZbigniew Jędrzejewski-Szmek2014-01-28
|
* manager: add systemd.show_status=auto modeZbigniew Jędrzejewski-Szmek2014-01-27
| | | | | | | | | | | | | When set to auto, status will shown when the first ephemeral message is shown (a job has been running for five seconds). Then until the boot or shutdown ends, status messages will be shown. No indication about the switch is done: I think it should be clear for the user that first the cylon eye and the ephemeral messages appear, and afterwards messages are displayed. The initial arming of the event source was still wrong, but now should really be fixed.
* journal: guarantee async-signal-safety in sd_journald_sendvZbigniew Jędrzejewski-Szmek2014-01-27
| | | | | | | | | | | | | | | | | | signal(7) provides a list of functions which may be called from a signal handler. Other functions, which only call those functions and don't access global memory and are reentrant are also safe. sd_j_sendv was mostly OK, but would call mkostemp and writev in a fallback path, which are unsafe. Being able to call sd_j_sendv in a async-signal-safe way is important because it allows it be used in signal handlers. Safety is achieved by replacing mkostemp with open(O_TMPFILE) and an open-coded writev replacement which uses write. Unfortunately, O_TMPFILE is only available on kernels >= 3.11. When O_TMPFILE is unavailable, an open-coded mkostemp is used. https://bugzilla.gnome.org/show_bug.cgi?id=722889
* cryptsetup: Support key-slot optionChristian Seiler2014-01-26
| | | | | | | | | | | | | | Debian recently introduced the option key-slot to /etc/crypttab to specify the LUKS key slot to be used for decrypting the device. On systems where a keyfile is used and the key is not in the first slot, this can speed up the boot process quite a bit, since cryptsetup does not need to try all of the slots sequentially. (Unsuccessfully testing a key slot typically takes up to about 1 second.) This patch makes systemd aware of this option. Debian bug that introduced the feature: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=704470
* networkd: add basic VLAN supportTom Gundersen2014-01-25
|
* networkd: add basic bonding supportTom Gundersen2014-01-22
| | | | | Refactor bridging support to be generic netdev support and extend it to cover bonding as well.
* man: document message timestamping/sequence number APILennart Poettering2014-01-22
|