summaryrefslogtreecommitdiffstats
path: root/.travis.yml (unfollow)
Commit message (Collapse)AuthorFilesLines
2020-10-29tree-wide: drop unnecessary inclusion of network-internal.hYu Watanabe6-6/+0
2020-10-29sd-network: move net_get_unique_predictable_data() and net_get_name_persisten()Yu Watanabe6-61/+63
2020-10-29conf-parser: fix indentationYu Watanabe1-49/+56
2020-10-29net-condition: move net_match_config() and related conf parsersYu Watanabe13-442/+458
2020-10-29sd-network: move link_get_type_string()Yu Watanabe5-26/+29
2020-10-29libsystemd-network: move config_parse_hwaddr() and config_parse_hwaddrs()Yu Watanabe4-102/+106
2020-10-29udev: move config_parse_ifalias()Yu Watanabe4-43/+44
2020-10-29network: move config_parse_bridge_port_priority()Yu Watanabe4-44/+45
2020-10-29libsystemd-network: make conf parsers accept an empty stringYu Watanabe1-36/+45
2020-10-29libsystemd-network: downgrade log level in conf parsersYu Watanabe1-10/+10
2020-10-28Update org.freedesktop.hostname1 documentationLuca Weiss1-1/+2
This documents the polkit actions for `SetDeployment()` and `SetLocation()` which previously were undocumented.
2020-10-27meson: fix setting of ENABLE_OOMDZbigniew Jędrzejewski-Szmek1-1/+1
-Doomd=auto (the default) didn't work as intended because the initial correct value was overwritten later by logic that didn't check for 'auto'.
2020-10-27test: add a simple test for the qr printing codeZbigniew Jędrzejewski-Szmek2-0/+27
Ideally, we'd read back what we wrote, but that would have been much more complicated. But just writing stuff is useful to test under valgrind or manually.
2020-10-27journal,homectl: unify implementations of libqrencode loading and fss key ↵Zbigniew Jędrzejewski-Szmek8-185/+123
printing We had two of each: both homectl and journalctl had the whole dlopen() wrapper, and journalctl had two implementations (slightly different) of the code to print the fss:// pattern. print_qrcode() now returns -EOPNOTSUPP when compiled with qrcode support. Both callers ignore the return value, so this changes nothing. No functional change.
2020-10-27network: actually update radv macTimo Rothenpieler1-1/+1
2020-10-27man: update fedora versionZbigniew Jędrzejewski-Szmek1-2/+2
F33 was released today!
2020-10-27man/machinectl: fix pull-raw exampleZbigniew Jędrzejewski-Szmek3-8/+15
We do not allow machine names with "_", so the command would fail as written. Share the example with the systemd-nspawn page instead.
2020-10-27units: turn on timestamping for journald socketsLennart Poettering2-5/+7
To make things simple and robust when debugging journald, we'll leave the SO_TIMESTAMP invocations in the C code in place, even if they are now typically redundant, given that the sockets are already passed into the process with SO_TIMESTAMP turned on now.
2020-10-27man: document the new Timestamping= optionLennart Poettering2-0/+15
2020-10-27core: add Timestamping= option for socket unitsLennart Poettering7-1/+70
This adds a way to control SO_TIMESTAMP/SO_TIMESTAMPNS socket options for sockets PID 1 binds to. This is useful in journald so that we get proper timestamps even for ingress log messages that are submitted before journald is running. We recently turned on packet info metadata from PID 1 for these sockets, but the timestamping info was still missing. Let's correct that.
2020-10-27conf-parser: add a flavour of DEFINE_CONFIG_PARSE_ENUM() that allows ↵Lennart Poettering1-2/+5
specifiying the precie from_string() function to call
2020-10-27journald: remove pointless conditionalizationLennart Poettering2-7/+2
Let's not have #ifdeffery both in the consumers and the providers of the selinux glue code. Unless the code is particularly complex, let's do the ifdeffery only in the provider of the selinux glue code, and let's keep the consumers simple and just invoke it.
2020-10-27socket-util: make socket_set_recvpktinfo control PACKET_AUXDATA sockopt on ↵Lennart Poettering2-4/+8
AF_PACKET Just for the sake of completness.
2020-10-27man: add references to fifo(7) and mq_overview(7) man pagesLennart Poettering1-11/+10
2020-10-27tree-wide: cast result of get_process_comm() to (void) where we ignore itLennart Poettering8-8/+8
2020-10-27sd-event: split out enable and disable codepaths from ↵Lennart Poettering1-116/+129
sd_event_source_set_enabled() So far half of sd_event_source_set_enabled() was doing enabling, the other half was doing disabling. Let's split that into two separate calls. (This also adds a new shortcut to sd_event_source_set_enabled(): if the caller toggles between "ON" and "ONESHOT" we'll now shortcut this, since the event source is already enabled in that case and shall remain enabled.) This heavily borrows and is inspired from Michal Sekletár's #17284 refactoring.
2020-10-27sd-event: split out helper functions for reshuffling prioqsMichal Sekletár1-58/+38
We typically don't just reshuffle a single prioq at once, but always two. Let's add two helper functions that do this, and reuse them everywhere. (Note that this drops one minor optimization: sd_event_source_set_time_accuracy() previously only reshuffled the "latest" prioq, since changing the accuracy has no effect on the earliest time of an event source, just the latest time an event source can run. This optimization is removed to simplify things, given that it's not really worth the effort as prioq_reshuffle() on properly ordered prioqs has practically zero cost O(1)). (Slightly generalized, commented and split out of #17284 by Lennart)
2020-10-27units: unconditionally pull in remote-cryptsetup.target in the initramfsJonathan Lebon1-1/+2
[zjs: Replaces #17149. I took half of the patch in https://github.com/systemd/systemd/pull/17149#issuecomment-698399194, hence I'm keeping Jonathan's authorship. The original reasoning for 6c5496c492a8d74e54d22bf8824160cab1e63c10 was that we enable remote-cryptsetup.target via presets, and since presets are not used for the initrd, we need a different target. But since parts of the unit and target tree are shared between the initramfs and the main system, we can't just create a separate target for the initramfs. All the targets that depend on this one would need to be split also. That condition is true for initrd-fs.target, but not for sysinit.target. So let's instead just uncoditionally pull in remote-cryptsetup.target in the initramfs. It should normally be empty, so there should be no impact on boots that don't have units in the target. Jonathan's patch used initrd-root-fs.target, this version instead uses initrd-root-device.target. initrd-root-device.target is ordered before sysroot.mount, which means that the decrypted devices will be available earlier too.]
2020-10-27Revert "units: add initrd-cryptsetup.target"Zbigniew Jędrzejewski-Szmek4-46/+9
This reverts commit 6c5496c492a8d74e54d22bf8824160cab1e63c10. sysinit.target is shared between the initrd and the host system. Pulling in initrd-cryptsetup.target into sysinit.target causes the following warning at boot: Oct 27 10:42:30 workstation-uefi systemd[1]: initrd-cryptsetup.target: Starting requested but asserts failed. Oct 27 10:42:30 workstation-uefi systemd[1]: Assertion failed for initrd-cryptsetup.target.
2020-10-27meson: simplify with_runlevels ternany op usageZbigniew Jędrzejewski-Szmek1-2/+2
2020-10-27core: clean up inactive/failed {service|scope}'s cgroups when the last ↵Anita Zhang4-2/+42
process exits If processes remain in the unit's cgroup after the final SIGKILL is sent and the unit has exceeded stop timeout, don't release the unit's cgroup information. Pid1 will have failed to `rmdir` the cgroup path due to processes remaining in the cgroup and releasing would leave the cgroup path on the file system with no tracking for pid1 to clean it up. Instead, keep the information around until the last process exits and pid1 sends the cgroup empty notification. The service/scope can then prune the cgroup if the unit is inactive/failed.
2020-10-27syscall-names: add process_madvise which is planned for 5.10Zbigniew Jędrzejewski-Szmek1-0/+1
It was added in v5.9-11793-gecb8ac8b1f and is still present in v5.10-rc1, so it seems likely that it'll be in 5.10 too.
2020-10-27l10n: update Czech TranslationAsciiWolf1-66/+80
2020-10-27docs: update coding style for `return (void) func(...)`Anita Zhang1-0/+8
Seems that people think it's useful for brevity so make it explicit in the CODING_STYLE.
2020-10-27man: correct xdg-autostart-generator pathJosh Brobst1-1/+1
2020-10-26NEWS: v247-rc1v247-rc1Zbigniew Jędrzejewski-Szmek1-1/+1
2020-10-26NEWS: update contributors list for v247-rc1Zbigniew Jędrzejewski-Szmek1-15/+15
2020-10-26NEWS: mention IPv6PrefixDelegation→IPv6SendRA renamingZbigniew Jędrzejewski-Szmek1-0/+5
2020-10-26tmpfiles: Handle filesystems without ACL support in more cases.Pat Coulthard1-11/+16
2020-10-24NEWS: fix typo (`systemd-userdb` > `systemd-userdbd`)Elias Probst1-1/+1
2020-10-24test-network: add a test case for DNSSL in RAYu Watanabe3-0/+8
Closes #4590.
2020-10-24test: ignore ENOMEDIUM error from sd_pid_get_cgroup()Dan Streetman1-1/+1
Ubuntu builds on the Launchpad infrastructure run inside a chroot that does not have the sysfs cgroup dirs mounted, so this call will return ENOMEDIUM from cg_unified_cached() during the build-time testing, for example when building the package in a Launchpad PPA.
2020-10-24tree-wide: fix typos found by Fossies codespell reportYu Watanabe9-11/+11
2020-10-24Revert "sd-dhcp-client: use asynchronous_close()"Yu Watanabe1-4/+4
This effectively reverts the commit 22fc2420b2a7220addcee33c2fa17ada44d87f9c. The function `asynchronous_close()` confuses valgrind. Before this commit, valgrind may report the following: ``` HEAP SUMMARY: in use at exit: 384 bytes in 1 blocks total heap usage: 4,787 allocs, 4,786 frees, 1,379,191 bytes allocated 384 bytes in 1 blocks are possibly lost in loss record 1 of 1 at 0x483CAE9: calloc (vg_replace_malloc.c:760) by 0x401456A: _dl_allocate_tls (in /usr/lib64/ld-2.31.so) by 0x4BD212E: pthread_create@@GLIBC_2.2.5 (in /usr/lib64/libpthread-2.31.so) by 0x499B662: asynchronous_job (async.c:47) by 0x499B7DC: asynchronous_close (async.c:102) by 0x4CFA8B: client_initialize (sd-dhcp-client.c:696) by 0x4CFC5E: client_stop (sd-dhcp-client.c:725) by 0x4D4589: sd_dhcp_client_stop (sd-dhcp-client.c:2134) by 0x493C2F: link_stop_clients (networkd-link.c:620) by 0x4126DB: manager_free (networkd-manager.c:867) by 0x40D193: manager_freep (networkd-manager.h:97) by 0x40DAFC: run (networkd.c:20) LEAK SUMMARY: definitely lost: 0 bytes in 0 blocks indirectly lost: 0 bytes in 0 blocks possibly lost: 384 bytes in 1 blocks still reachable: 0 bytes in 0 blocks suppressed: 0 bytes in 0 blocks For lists of detected and suppressed errors, rerun with: -s ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0) ```
2020-10-24test: make TEST-56-OOMD service unit files staticAnita Zhang4-34/+31
2020-10-23shared/qrcode-util: reduce scope of iterator variablesZbigniew Jędrzejewski-Szmek1-14/+8
2020-10-23meson: sort include dirsZbigniew Jędrzejewski-Szmek1-13/+13
Our headers should have unique names, so the sort order shouldn't matter.
2020-10-23test-network: add tests for routes managed by ManagerYu Watanabe1-0/+60
2020-10-23network: drop routes managed by Manager when link is removedYu Watanabe1-2/+77
Also, foreign routes managed by Manager are dropped in link_drop_foreign_routes().
2020-10-23network: specify route type in route_remove()Yu Watanabe1-146/+108
This factors out the common netlink message handling in route_remote() and route_configure() to route_set_netlink_message().