diff options
author | Luca Boccassi <bluca@debian.org> | 2022-03-24 23:46:14 +0100 |
---|---|---|
committer | Luca Boccassi <bluca@debian.org> | 2022-03-24 23:46:14 +0100 |
commit | f72f8021182f930bb86ff4e3a05b8f09fa7d3179 (patch) | |
tree | 92b43791da8b8c2455b3f035538c0500433a8713 /NEWS | |
parent | update NEWS (diff) | |
download | systemd-f72f8021182f930bb86ff4e3a05b8f09fa7d3179.tar.xz systemd-f72f8021182f930bb86ff4e3a05b8f09fa7d3179.zip |
update NEWS
Fix typo and list all user session settings that now are documented
to work
Diffstat (limited to '')
-rw-r--r-- | NEWS | 13 |
1 files changed, 9 insertions, 4 deletions
@@ -226,7 +226,7 @@ CHANGES WITH 251 in spe: * When unlocking devices via TPM, TPM2 parameter encryption is now used, to ensure that communication between CPU and discrete TPM chips - cannoted be eavesdropped to acquire disk encryption keys. + cannot be eavesdropped to acquire disk encryption keys. * The user.delegate and user.invocation_id extended attributes on cgroups are used in addition to trusted.delegate and @@ -257,9 +257,14 @@ CHANGES WITH 251 in spe: The new %d specifier resolves to the credentials directory of a service (same as $CREDENTIALS_DIRECTORY). - * The RootDirectory=, MountAPIVFS=, ExtensionDirectories= service - settings now also work in unprivileged user services, i.e. those run - by the user's --user service manager. + * The RootDirectory=, MountAPIVFS=, ExtensionDirectories=, + *Capabilities*=, ProtectHome=, *Directory=, TemporaryFileSystem=, + PrivateTmp=, PrivateDevices=, PrivateNetwork=, NetworkNamespacePath=, + PrivateIPC=, IPCNamespacePath=, PrivateUsers=, ProtectClock=, + ProtectKernelTunables=, ProtectKernelModules=, ProtectKernelLogs=, + MountFlags= service settings now also work in unprivileged user + services, i.e. those run by the user's --user service manager, as long + as user namespaces are enabled on the system. * The --make-machine-id-directory= switch to bootctl has been replaced by --make-entry-directory=, given that the entry directory is not |