summaryrefslogtreecommitdiff
path: root/src
Commit message (Collapse)AuthorAge
* bus: update kdbus.h (ABI break)David Herrmann2014-11-26
| | | | We changed creds to u32, so fix systemd sd-bus to acknowledge that.
* udevadm trigger: allow matching by device nameZbigniew Jędrzejewski-Szmek2014-11-25
| | | | | | | | | | This makes udevadm trigger mirror udevadm info, except that multiple device names can be specified. Instructions in 60-keyboard.hwdb should now actually work. udevadm(8) is updated, but it could use a bit more polishing. https://bugs.freedesktop.org/show_bug.cgi?id=82311
* udevadm: split out find_device helperZbigniew Jędrzejewski-Szmek2014-11-25
| | | | The idea is to unify the way that devices can be specified.
* bus-kernel: when installing an activator, ask for any kind of metadata to be ↵Lennart Poettering2014-11-26
| | | | | | | attached to incoming messages We don't know what the activated service might want in the end, hence enable everything current and future, just to be sure.
* sd-bus: don't clobber return values on failure in bus_kernel_open_bus_fd()Lennart Poettering2014-11-26
|
* sd-bus: set per-bus attach flag requirement mask to ANYLennart Poettering2014-11-26
| | | | | | | On the system and user busses we create it's the receiver that chooses which metadata is attched, not the sender, hence set the requirement mask to ANY, to allow any current of future credential bit to be attached.
* sd-bus: add suppot for renegotiating message credential attach flagsLennart Poettering2014-11-26
|
* sd-bus: use free_and_strdup() where appropriateLennart Poettering2014-11-26
| | | | | This simplifies things a bit and makes sure we free any previously set creds component before writing in a new one.
* resolved: fix typo in sd_notify() callTom Gundersen2014-11-25
|
* core: show log message about process triggering kdbus service activationLennart Poettering2014-11-25
|
* sd-bus: react properly to EOVERFLOW by generating a log message about ↵Lennart Poettering2014-11-25
| | | | dropped broadcast messages and proceeding
* kdbus: update header file to current upstream versionLennart Poettering2014-11-25
|
* kdbus: minor simplificationLennart Poettering2014-11-25
|
* util: mark page_size() as pureLennart Poettering2014-11-25
|
* sd-bus: fix error handling when receiving invalid service nameLennart Poettering2014-11-25
| | | | Also, properly keep track of incoming additional service names.
* sd-bus: properly handle non-initialized audit records attached to incoming ↵Lennart Poettering2014-11-25
| | | | kernel messages
* sd-bus: properly copy selinux label and description field when duplicating ↵Lennart Poettering2014-11-25
| | | | creds object
* sd-bus: add supplementary groups list to creds objectLennart Poettering2014-11-25
|
* busctl: if no parameter is specified for "busctl status" show credentials of ↵Lennart Poettering2014-11-25
| | | | bus owner
* sd-bus: properly handle uninitialized audit creds from kdbusLennart Poettering2014-11-25
|
* sd-bus: don't fail when querying creds and dbus1 refuses to tell us the ↵Lennart Poettering2014-11-25
| | | | selinux context
* busctl: add new --augment-creds= switch for controlling whether shown ↵Lennart Poettering2014-11-25
| | | | credential data shall be augment with data from /proc
* sd-bus: update to current kernel version, by splitting off the extended ↵Lennart Poettering2014-11-25
| | | | | | | | | | | | | | | | | | | | | | KDBUS_ITEM_PIDS structure from KDBUS_ITEM_CREDS Also: - adds support for euid, suid, fsuid, egid, sgid, fsgid fields. - makes augmentation of creds with data from /proc explicitly controllable to give apps better control over this, given that this is racy. - enables augmentation for kdbus connections (previously we only did it for dbus1). This is useful since with recent kdbus versions it is possible for clients to control the metadata they want to send. - changes sd_bus_query_sender_privilege() to take the euid of the client into consideration, if known - when we don't have permissions to read augmentation data from /proc, don't fail, just don't add the data in
* busctl: improve readability a bitLennart Poettering2014-11-25
|
* bus: change creds dumping order to be more close to internal storage orderLennart Poettering2014-11-25
|
* util: skip incomplete ucred information in getpeersec()Lennart Poettering2014-11-25
|
* sd-bus: don't blindly take incomplete ucred bits from AF_UNIX when ↵Lennart Poettering2014-11-25
| | | | constructing message
* localed: verify xkb keymaps after pk-queriesDavid Herrmann2014-11-25
| | | | | Make sure not to run xkb-keymap validation twice if pk-queries are used. Move it below pk-checks.
* terminal/idev: forward xkb-messagesDavid Herrmann2014-11-25
| | | | | | | Properly forward all XKB messages. You can use XKB_LOG_VERBOSITY= to control the amount of messages sent by XKB. We explicitly set XKB_LOG_LEVEL to 7 you can use SYSTEMD_LOG_LEVEL to control the log-level generically.
* terminal/idev: avoid magic numbersDavid Herrmann2014-11-25
| | | | Use XKB_CONTEXT_NO_FLAGS instead of magic 0.
* terminal/idev: use compose tablesDavid Herrmann2014-11-24
| | | | | | | | | | | | | | | | | | Before forwarding keyboard events, feed them into possible compose tables. This enables Compose-key and Dead-key features. Few notes: * REPEAT events are never fed into compose tables. It just doesn't make sense and is usually not wanted. Compose-sequences are usually hard to remember and take time to type. Thus, the REPEAT event of the Compose-key itself would often cancel the compose sequence already. * Stop resolving symbols for UP events. Anything but keycodes is never associated to a physical key, but is a one-time action. There is nothing like UP events for key-symbols! * Cancel compose-sequences on Multi-Key UP. See the inline comment. We should make this configurable!
* terminal/idev: add compose-file supportDavid Herrmann2014-11-24
| | | | | | | | Add support for compose files to idev-keyboard. This requires libxkbcommon-0.5.0, which is pretty new, but should be fine. We don't use the compose-files, yet. Further commits will put life into them.
* smack: introduce new SmackProcessLabel optionWaLyong Cho2014-11-24
| | | | | | | | | | | | | | | | | In service file, if the file has some of special SMACK label in ExecStart= and systemd has no permission for the special SMACK label then permission error will occurred. To resolve this, systemd should be able to set its SMACK label to something accessible of ExecStart=. So introduce new SmackProcessLabel. If label is specified with SmackProcessLabel= then the child systemd will set its label to that. To successfully execute the ExecStart=, accessible label should be specified with SmackProcessLabel=. Additionally, by SMACK policy, if the file in ExecStart= has no SMACK64EXEC then the executed process will have given label by SmackProcessLabel=. But if the file has SMACK64EXEC then the SMACK64EXEC label will be overridden. [zj: reword man page]
* gpt-auto-generator: properly ignore valueZbigniew Jędrzejewski-Szmek2014-11-24
| | | | A negative return code was treated as a true value.
* localed: validate xkb keymapsDavid Herrmann2014-11-24
| | | | | | | | | | | Introduce a new optional dependency on libxkbcommon for systemd-localed. Whenever the x11 keymap settings are changed, use libxkbcommon to compile the keymap. If the compilation fails, print a warning so users will get notified. On compilation failure, we still update the keymap settings for now. This patch just introduces the xkbcommon infrastructure to have keymap validation in place. We can later decide if/how we want to enforce this.
* cryptsetup: default to no hash when keyfile is specifiedZbigniew Jędrzejewski-Szmek2014-11-24
| | | | | | | | | For plain dm-crypt devices, the behavior of cryptsetup package is to ignore the hash algorithm when a key file is provided. It seems wrong to ignore a hash when it is explicitly specified, but we should default to no hash if the keyfile is specified. https://bugs.freedesktop.org/show_bug.cgi?id=52630
* manager: only issue overmount warning when the check succeededZbigniew Jędrzejewski-Szmek2014-11-23
| | | | | If for any reason the check failed (selinux?), we would still issue the warning. Check the return status.
* manager: let manager_free() handle NULLsZbigniew Jędrzejewski-Szmek2014-11-23
| | | | This makes the calling code a bit simpler.
* dbus: return non-zero return value in the case that prefix won't matchLukas Nykryn2014-11-23
| | | | | | | strv_extend returns 0 in the case of success which means that else if (bus_track_deserialize_item(&m->deserialized_subscribed, l) == 0) log_warning("Unknown serialization item '%s'", l); will be printed when value is added correctly.
* test: support empty environment variables in unit filesIago López Galeiras2014-11-23
| | | | | Also update TODO, empty environment variables in Environment= and EnvironmentFile= options work.
* systemctl: show BindsTo/BoundBy in list-dependenciesZbigniew Jędrzejewski-Szmek2014-11-22
| | | | | | Suggested-by: Peter Mattern <matternp@arcor.de> http://lists.freedesktop.org/archives/systemd-devel/2014-November/025437.html
* nspawn: ignore EEXIST when mounting tmpfsRichard Schütz2014-11-22
| | | | | | commit 79d80fc1466512d0ca211f4bfcd9de5f2f816a5a introduced a regression that prevents mounting a tmpfs if the mount point already exits in the container's root file system. This commit fixes the problem by ignoring EEXIST.
* Do not check for existence of remote binariesZbigniew Jędrzejewski-Szmek2014-11-22
| | | | | | | | | | | | | | systemd-run would fail when run with -M or -H and an absolute path, if this path did not exists locally. Allow it to continue, since we don't have a nice way of checking if the binary exists remotely. The case where -M or -H is used and a local path is unchanged, and we still iterate over $PATH to find the binary. We need to convert to an absolute path, and we don't have a nice mechanism to check remotely, so we assume that the binary will be located in the same place locally and remotely. http://lists.freedesktop.org/archives/systemd-devel/2014-November/025418.html
* missing: add IFLA_BRPORT_LEARNING and friendsZbigniew Jędrzejewski-Szmek2014-11-22
| | | | | IFLA_BRPORT_LEARNING was added in v3.10-rc4-583-g9ba18891f7, and IFLA_BRPORT_UNICAST_FLOOD in v3.10-rc4-584-g867a59436f.
* missing: add __NR_getrandom for a few more archsZbigniew Jędrzejewski-Szmek2014-11-22
| | | | | | Mips has getrandom() too, but there's just too many variants for me too care. Either someone who cares does it, or they get compile-time warnings with old kernel headers.
* selinux-access: fix broken ternary operatorLukas Nykryn2014-11-21
| | | | | | it seems to be a typo introduced by ebcf1f97de4f6b1580ae55eb56b1a3939fe6b602 - _r = selinux_access_check(_b, _m, _u->source_path ?:_u->fragment_path, (permission), &_error); \ + ({ Unit *_unit = (unit); selinux_generic_access_check(bus,message, _unit->fragment_path ?: _unit->fragment_path, permission,error); })
* busctl: add --timeout= option to specify method call timeoutLennart Poettering2014-11-21
|
* busctl: add options to control message header flags when invoking methodsLennart Poettering2014-11-21
|
* nspawn: Add try-{host,guest} journal link modesMartin Pitt2014-11-21
| | | | | | | | | | | | | | | | | --link-journal={host,guest} fail if the host does not have persistent journalling enabled and /var/log/journal/ does not exist. Even worse, as there is no stdout/err any more, there is no error message to point that out. Introduce two new modes "try-host" and "try-guest" which don't fail in this case, and instead just silently skip the guest journal setup. Change -j to mean "try-guest" instead of "guest", and fix the wrong --help output for it (it said "host" before). Change systemd-nspawn@.service.in to use "try-guest" so that this unit works with both persistent and non-persistent journals on the host without failing. https://bugs.debian.org/770275
* busctl: show property values in "introspect" output, add "set-property" ↵Lennart Poettering2014-11-21
| | | | command, and support both a terse and a verbose output format