summaryrefslogtreecommitdiffstats
Commit message (Collapse)AuthorAgeFilesLines
* creds-util: optionally, allow NULL credentials even with TPMLennart Poettering2024-01-054-7/+21
|
* Merge pull request #30754 from poettering/iovecificationLennart Poettering2024-01-0521-650/+630
|\ | | | | tpm2-util: convert various things over to struct iovec rather that data ptr + size
| * tpm2-util: more iovec'ificationLennart Poettering2024-01-0515-641/+477
| | | | | | | | | | | | | | Let's move more code to using struct iovec for passing around binary chunks of data. No real changes in behaviour, just refactoring.
| * test: add unit tests for the new iovec helpersLennart Poettering2024-01-053-0/+79
| |
| * iovec-util: add CONST_IOVEC_MAKE_STRING()Lennart Poettering2024-01-051-0/+6
| |
| * iovec-util: add new iovec_memdup() helperLennart Poettering2024-01-051-0/+16
| |
| * iovec-util: add new iovec_memcmp() helperLennart Poettering2024-01-051-0/+11
| |
| * iovec-util: add iovec_is_valid() helperLennart Poettering2024-01-051-0/+6
| |
| * iovec-util: rework IOVEC_MAKE_STRING() to work with compound initialized inputLennart Poettering2024-01-051-6/+16
| | | | | | | | | | | | | | | | | | This avoids the ({}) that IOVEC_MAKE_STRING() so far used and might cause a memory corruption if the parameter passed in is itself allocated via a compount initialized array or so. Also, this makes sure both IOVEC_MAKE_STRING() and IOVEC_MAKE() accept 'const' parameters without this causing a compiler warning.
| * json: add more iovec helpers for serializing/deserializing binary dataLennart Poettering2024-01-052-3/+19
| |
* | Merge pull request #30784 from poettering/json-dispatch-enumLennart Poettering2024-01-054-58/+83
|\ \ | | | | | | json: add macro for automatically defining a dispatcher for an enum
| * | oomd: make use of new JSON_DISPATCH_ENUM_DEFINE() macroLennart Poettering2024-01-051-18/+5
| | |
| * | user-record: port over to JSON_DISPATCH_ENUM_DEFINE()Lennart Poettering2024-01-051-40/+5
| | |
| * | test: add unit test for JSON_DISPATCH_ENUM_DEFINE()Lennart Poettering2024-01-051-0/+51
| | |
| * | json: add macro for automatically defining a dispatcher for an enumLennart Poettering2024-01-051-0/+22
| |/
* | Merge pull request #30785 from poettering/json-allow-extensionsLennart Poettering2024-01-058-16/+21
|\ \ | | | | | | json: add flag for allowing extension of json objects when dispatching, without otherwise being permissive
| * | tree-wide: use JSON_ALLOW_EXTENSIONS when disptching at various placesLennart Poettering2024-01-056-8/+8
| | | | | | | | | | | | | | | | | | | | | | | | | | | If we want to allow method replies to be extended without this breaking compat, then we should set this flag. Do so at various method call replies hence. Also do it when parsing user/group records, which are expressly documented to be extensible, as well as the hibernate JSON record.
| * | json: add new dispatch flag JSON_ALLOW_EXTENSIONSLennart Poettering2024-01-052-8/+13
| | | | | | | | | | | | | | | | | | | | | This is a subset of JSON_PERMISSIVE focussed on allowing parsing of varlink replies that get extended, i.e. gain new fields, without allowing more than that (i.e. without allowing missing fields, or bad field types or such).
* | | test: wait for verbose-success.service finishedYu Watanabe2024-01-051-1/+2
|/ / | | | | | | | | | | Otherwise, the command 'echo' may not be invoked yet. Follow-up for 25aa35d465cf4725bc3ebd2a919e7f39ecafb920.
* | Merge pull request #29692 from H5117/fix_pkcs11_uriLennart Poettering2024-01-055-13/+63
|\ \ | |/ |/| cryptenroll: change class in provided PKCS#11 URI if necessary
| * cryptenroll: change class in provided PKCS#11 URI if necessaryVladimir Stoiakin2024-01-055-13/+63
| | | | | | | | | | | | | | | | cryptenroll accepts only PKCS#11 URIs that match both a certificate and a private key in a token. This patch allows users to provide a PKCS#11 URI that points to a certificate only, and makes possible to use output of some PKCS#11 tools directly. Internally the patch changes 'type=cert' in the provided PKCS#11 URI to 'type=private' before storing in a LUKS2 header. Fixes: #23479
* | update TODOLennart Poettering2024-01-051-0/+3
| |
* | Merge pull request #30772 from yuwata/test-network-improvementsFrantisek Sumsal2024-01-0510-82/+228
|\ \ | | | | | | test-network: add more test cases and several cleanups
| * | test-network: add test case about replacing nexthopYu Watanabe2024-01-045-27/+190
| | |
| * | test-network: merge three tests for neighborYu Watanabe2024-01-046-55/+36
| | | | | | | | | | | | To speed up tests.
| * | test-network: show monotonic timestamp and drop hopstname from logsYu Watanabe2024-01-041-0/+2
| | |
* | | test: fix typoYu Watanabe2024-01-051-2/+2
| | | | | | | | | | | | Follow-up for 995bf013a1959d4fb5aed8b135740490888fc196.
* | | man: fix typoYu Watanabe2024-01-051-1/+1
| | | | | | | | | | | | Follow-up for 7d93e4af8088fae7b50eb638c6e297fb8371e307.
* | | vpick: fix typoYu Watanabe2024-01-052-4/+4
| | | | | | | | | | | | Follow-up for 76511c1bd32a262c76d462919083925c47cbd212.
* | | login: noone -> no oneYu Watanabe2024-01-051-1/+1
| | | | | | | | | | | | Follow-up for 59afe07c217c73e3c7c19fb06aef2ff7bf609fd2.
* | | core/dbus-manager: fix typoYu Watanabe2024-01-051-1/+1
| | | | | | | | | | | | Follow-up for 84c01612de805d88875d4d91cfcf73cf10f99447.
* | | string-util: fix typoYu Watanabe2024-01-051-2/+2
| | | | | | | | | | | | Follow-up for 63566c6b6ffbb747727db4d6f78c28547430d54f.
* | | TODO: fix typoYu Watanabe2024-01-051-1/+1
| | | | | | | | | | | | Follow-up for 97c493f2140b207ace89e9e028949ceb254fbfc6.
* | | Merge pull request #30728 from polarina/nodaLennart Poettering2024-01-052-2/+11
|\ \ \ | | | | | | | | Assign noDA attribute to TPM2 objects not dependant on a PIN
| * | | Assign noDA attribute to TPM2 objects not dependant on a PINGabríel Arthúr Pétursson2024-01-041-1/+10
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | All the keys are high-entropy keys that cannot be practically bruteforced and thus don't require protection from dictionary attacks. With the exception of PINs, of course, which are low-entropy and user provided. Note that a new enrollment is required for unlocking while in DA lockdown to function. Existing enrollments are subject to DA lockout. Fixes: #30330
| * | | pcrlock: Print correct NV index when writing new policyGabríel Arthúr Pétursson2024-01-041-1/+1
| | | |
* | | | core: Add %D specifier for $XDG_DATA_HOMEAdrian Vovk2024-01-052-0/+16
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | We already have specifiers that resolve to $XDG_STATE_HOME, and $XDG_CONFIG_HOME. $XDG_DATA_HOME is in a similar vein. It allows units belonging to the user service manager to correctly look into ~/.local/share. I imagine this would be most useful inside of condition checks (i.e. only run a service on session startup if some data is not found in ~/.local/share) or in the inotify monitoring of a .path unit
* | | | network: do not make the implied default have the first priorityYu Watanabe2024-01-052-4/+2
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | Follow-up for b732606950f8726c0280080c7d055a714c2888f5 and 6706ce2fd2a13df0ae5e469b72d688eaf643dac4. If Network.ignore_carrier_loss_set flag is set, then the timeout value is always used, hence the logic implemented by b732606950f8726c0280080c7d055a714c2888f5 never worked.
* | | | core/cgroup: use designated initializer more, make dup source constMike Yuan2024-01-052-36/+40
| | | |
* | | | Merge pull request #30731 from poettering/logind-user-earlyLennart Poettering2024-01-054-6/+17
|\ \ \ \ | | | | | | | | | | logind: rework the special casing we give root's sessions
| * | | | logind: rework the special casing we give root's sessionsLennart Poettering2024-01-044-2/+13
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | Let's add an explicit session class "user-early" for this, so that change of behaviour on logind is primarily bound to the "class" property, and not some explicit root checks. This has the benefit that we can be more fine grained with implying this class: only do so for tty sessions, not others.
| * | | | logind: explain session class types a bitLennart Poettering2024-01-041-4/+4
| | | | |
* | | | | Use .d path for PCRLOCK_KERNEL_*_PATHAlberto Planas2024-01-051-2/+2
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | Fix the path for the generated.pcrlock files for the cmdline and initrd cases. Without it the tool complains with: Failed to parse component file /var/lib/pcrlock.d/720-kernel-initrd.pcrlock, ignoring: Is a directory Signed-off-by: Alberto Planas <aplanas@suse.com>
* | | | | Merge pull request #30753 from aafeijoo-suse/special-refactorLennart Poettering2024-01-053-6/+7
|\ \ \ \ \ | | | | | | | | | | | | tree-wide: use defines from special.h in some missing places
| * | | | | run: use SPECIAL_USER_SLICEAntonio Alvarez Feijoo2024-01-041-1/+2
| | | | | |
| * | | | | tree-wide: use SPECIAL_BASIC_TARGETAntonio Alvarez Feijoo2024-01-042-5/+5
| | | | | |
* | | | | | Merge pull request #30769 from AdrianVovk/statx-timestampLennart Poettering2024-01-052-19/+15
|\ \ \ \ \ \ | | | | | | | | | | | | | | stat-util: Add statx version of timespec_load
| * | | | | | tmpfiles: Use statx_timestamp_loadAdrian Vovk2024-01-041-19/+7
| | | | | | | | | | | | | | | | | | | | | | | | | | | | This is a new utility function recently added. Let's use it.
| * | | | | | stat-util: Add statx version of timespec_loadAdrian Vovk2024-01-041-0/+8
| | |_|_|/ / | |/| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | statx_timestamp is, for all intents and purposes, the same as a struct timespec. So, we can trivially convert it and call timespec_load on it. This commit adds helper functions that do just that.
* | | | | | Merge pull request #30743 from bluca/coverityLuca Boccassi2024-01-055-5/+16
|\ \ \ \ \ \ | | | | | | | | | | | | | | Assorted coverity fixes