Commit message (Collapse) | Author | Age | Files | Lines | |
---|---|---|---|---|---|
* | netlink: fix indentation | Yu Watanabe | 2020-12-18 | 1 | -4/+5 |
| | |||||
* | netlink: drop unnecessary error handling | Yu Watanabe | 2020-12-18 | 1 | -6/+3 |
| | |||||
* | netlink: use whitespace instead of tab | Yu Watanabe | 2020-12-18 | 1 | -1/+1 |
| | |||||
* | sd-netlink: add several assertions | Yu Watanabe | 2020-12-18 | 2 | -1/+3 |
| | |||||
* | sd-netlink: replace *messages[] -> **messages | Yu Watanabe | 2020-12-18 | 4 | -4/+4 |
| | |||||
* | meson: add missing headers | Yu Watanabe | 2020-12-18 | 1 | -0/+4 |
| | |||||
* | network: move variable declaration | Yu Watanabe | 2020-12-18 | 1 | -2/+2 |
| | |||||
* | tree-wide: fix typo | Yu Watanabe | 2020-12-18 | 8 | -15/+18 |
| | |||||
* | network: Allow to configure unreachable/blackhole RoutingPolicyRule (#17984) | Susant Sahani | 2020-12-18 | 6 | -13/+106 |
| | |||||
* | Merge pull request #17741 from poettering/cryptsetup-fido2 | Lennart Poettering | 2020-12-17 | 73 | -1212/+6562 |
|\ | | | | | cryptsetup: add support for unlocking cryptsetup volumes via FIDO2 + TPM2 + add systemd-cryptenroll tool + more | ||||
| * | update TODO | Lennart Poettering | 2020-12-17 | 1 | -10/+25 |
| | | |||||
| * | mkosi: add TPM2 packages to debian/ubuntu/fedora mkosi files | Lennart Poettering | 2020-12-17 | 3 | -2/+17 |
| | | | | | | | | As suggested: https://github.com/systemd/systemd/pull/17741#issuecomment-743479834 | ||||
| * | man: document new features | Lennart Poettering | 2020-12-17 | 10 | -94/+603 |
| | | |||||
| * | fido2: when listing fido2/hmac-secret devices, actually validate feature set | Lennart Poettering | 2020-12-17 | 1 | -4/+45 |
| | | |||||
| * | test: add tpm2 and fido2 libs to dlopen test | Lennart Poettering | 2020-12-17 | 2 | -1/+11 |
| | | |||||
| * | repart: optionally lock encrypted partitions to TPM2 | Lennart Poettering | 2020-12-17 | 1 | -20/+141 |
| | | | | | | | | | | This useful for bootstrapping encrypted systems: on first boot let's create a /var/ partition that is locked to the local TPM2. | ||||
| * | string-table: add private version of lookup macro with boolean fallback | Lennart Poettering | 2020-12-17 | 1 | -0/+1 |
| | | |||||
| * | cryptsetup: add support for TPM2 unlocking of volumes | Lennart Poettering | 2020-12-17 | 4 | -4/+475 |
| | | |||||
| * | cryptenroll: support listing and wiping tokens | Lennart Poettering | 2020-12-17 | 7 | -22/+740 |
| | | |||||
| * | cryptenroll: add support for TPM2 enrolling | Lennart Poettering | 2020-12-17 | 8 | -0/+1279 |
| | | |||||
| * | json: add APIs for quickly inserting hex blobs into as JSON strings | Lennart Poettering | 2020-12-17 | 2 | -0/+55 |
| | | | | | | | | | | | | This is similar to the base64 support, but fixed-size hash values are typically preferably presented as series of hex values, hence store them here like that too. | ||||
| * | sort-util: make cmp_int() generic, so that we can reuse it elsewhere | Lennart Poettering | 2020-12-17 | 3 | -4/+6 |
| | | |||||
| * | cryptenroll: add new "systemd-cryptenroll" tool for enrolling FIDO2+PKCS#11 ↵ | Lennart Poettering | 2020-12-17 | 10 | -0/+829 |
| | | | | | | | | security tokens | ||||
| * | cryptsetup: add fido2 support | Lennart Poettering | 2020-12-17 | 4 | -5/+460 |
| | | |||||
| * | fido2: don't use up/uv/rk when device doesn't support it | Lennart Poettering | 2020-12-17 | 2 | -74/+137 |
| | | | | | | | | | | | | | | Apparently devices are supposed to generate failures if we try to turn off features they don't have. Thus don't. Prompted-by: https://github.com/systemd/systemd/issues/17784#issuecomment-737730395 | ||||
| * | homed: split out HMAC-HASH fido2 decode code into src/shared/ | Lennart Poettering | 2020-12-17 | 3 | -180/+265 |
| | | | | | | | | | | That way we can use it later on in systemd-cryptsetup to unlock devices with FIDO2 tokens. | ||||
| * | homed: move fido2 setup code to src/shared/ | Lennart Poettering | 2020-12-17 | 3 | -245/+331 |
| | | | | | | | | That way we can reuse it from systemd-cryptenroll | ||||
| * | homed: move fido2 device enumeration logic to shared code | Lennart Poettering | 2020-12-17 | 5 | -141/+143 |
| | | |||||
| * | homed: turn libfido2 into a dlopen() type dependency | Lennart Poettering | 2020-12-17 | 6 | -106/+313 |
| | | |||||
| * | cryptsetup: split up attach_luks_or_plain_or_bitlk() into smaller functions | Lennart Poettering | 2020-12-17 | 1 | -180/+250 |
| | | | | | | | | Just some refactoring. | ||||
| * | cryptsetup: read PKCS#11 key and token info from LUKS2 metadata | Lennart Poettering | 2020-12-17 | 4 | -13/+142 |
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | Optionally, embedd PKCS#11 token URI and encrypted key in LUKS2 JSON metadata header. That way it becomes very easy to unlock properly set up PKCS#11-enabled LUKS2 volumes, a simple /etc/crypttab line like the following suffices: mytest /dev/disk/by-partuuid/41c1df55-e628-4dbb-8492-bc69d81e172e - pkcs11-uri=auto Such a line declares that unlocking via PKCS#11 shall be attempted, and the token URI and the encrypted key shall be read from the LUKS2 header. An external key file for the encrypted PKCS#11 key is hence no longer necessary, nor is specifying the precise URI to use. | ||||
| * | cryptsetup: be more careful with erasing key material from memory | Lennart Poettering | 2020-12-17 | 1 | -4/+5 |
| | | |||||
| * | cryptsetup: split code that allocates udev security device monitor into its ↵ | Lennart Poettering | 2020-12-17 | 1 | -14/+28 |
| | | | | | | | | own function | ||||
| * | cryptsetup-util: add helper for setting minimal PBKDF | Lennart Poettering | 2020-12-17 | 2 | -0/+29 |
| | | |||||
| * | cryptsetup-util: add helper call for extracting/parsing token JSON | Lennart Poettering | 2020-12-17 | 2 | -0/+110 |
| | | |||||
| * | homed: move code to list and resolve "auto" pkcs#11 URL into common code | Lennart Poettering | 2020-12-17 | 4 | -142/+143 |
| | | | | | | | | That way we can reuse it from systemd-cryptenroll. | ||||
| * | homed: split out code that determines suitable LUKS passphrase size from RSA key | Lennart Poettering | 2020-12-17 | 3 | -18/+41 |
| | | | | | | | | We can use this in cryptenroll later on, hence let's make this generic. | ||||
| * | homed: move pkcs11 LUKS glue into shared code | Lennart Poettering | 2020-12-17 | 3 | -83/+94 |
| | | | | | | | | That way we can lter reuse it from cryptsetup/cryptenroll too. | ||||
| * | homed: move helper calls for RSA encryption to shared code | Lennart Poettering | 2020-12-17 | 4 | -40/+48 |
| | | |||||
| * | homed: move homectl's recovery key generation/modhex code to src/shared/ | Lennart Poettering | 2020-12-17 | 9 | -68/+58 |
|/ | | | | | This allows us to later reuse the code to generate recovery keys for traditional LUKS volumes, too and share the code. | ||||
* | test: fix fd_is_mount_point() check | Lennart Poettering | 2020-12-17 | 3 | -7/+60 |
| | | | | | | | | | | | | | | | | | | | So the currentl and only fd_is_mount_point() check is actually entirely bogus: it passes "/" as filename argument, but that's not actually a a valid filename, but an absolute path. fd_is_mount_point() is written in a way tha the fd refers to a directory and the specified path is a file directly below it that shall be checked. The test call actually violated that rule, but still expected success. Let's fix this, and check for this explicitly, and refuse it. Let's extend the test and move it to test-mountpoint-util.c where the rest of the tests for related calls are placed. Replaces: #18004 Fixes: #17950 | ||||
* | tree-wide: suggest meson command lines instead of ninja ones | Lennart Poettering | 2020-12-17 | 5 | -22/+24 |
| | | | | | | | This only changes documentation. In various places we call "ninja" directly. I figured it would be safer to leave those in place for now, given the meson replacement commands lines appears to be supported in newer meson versions only. | ||||
* | Merge pull request #18001 from systemd/wip/hadess/unsupported-dmi | Zbigniew Jędrzejewski-Szmek | 2020-12-17 | 3 | -4/+12 |
|\ | | | | | meson: Disable dmi_memory_id on arches without DMI | ||||
| * | meson: Disable dmi_memory_id on arches without DMI | Bastien Nocera | 2020-12-16 | 3 | -3/+10 |
| | | |||||
| * | meson: Split off udev helper programs array | Bastien Nocera | 2020-12-16 | 1 | -1/+2 |
| | | |||||
* | | terminal-util: use 256 color mode for PID 1 output, too | Lennart Poettering | 2020-12-17 | 1 | -3/+8 |
| | | | | | | | | | | | | Follow-up for: #17702 Alsoe, see earlier review comment: https://github.com/systemd/systemd/pull/17702#pullrequestreview-552329600 | ||||
* | | Merge pull request #17998 from mrc0mmand/qemu-drop-trailing-whitespace | Frantisek Sumsal | 2020-12-16 | 2 | -2/+2 |
|\ \ | | | | | | | test: drop the trailing whitespace from the QEMU version check | ||||
| * | | test: s/MUMA/NUMA/ | Frantisek Sumsal | 2020-12-16 | 1 | -1/+1 |
| | | | |||||
| * | | test: drop the trailing whitespace from the QEMU version check | Frantisek Sumsal | 2020-12-16 | 1 | -1/+1 |
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | I suspect the original version of the regex was written on a system, which prints both the QEMU version and the QEMU package version in the --version output, like Fedora: $ /bin/qemu-system-x86_64 --version QEMU emulator version 4.2.1 (qemu-4.2.1-1.fc32) Copyright (c) 2003-2019 Fabrice Bellard and the QEMU Project developers However, Arch Linux prints only the QEMU version: $ /bin/qemu-system-x86_64 --version QEMU emulator version 5.2.0 Copyright (c) 2003-2020 Fabrice Bellard and the QEMU Project developers This causes the awk regex to not match the version string, since there's no whitespace after it, causing the version check to fail (as well as the TEST-36-NUMAPOLICY) as well. Follow-up for 43b49470d1f2808555c07f64cd0a1529b7ddd559. | ||||
* | | | Merge pull request #17702 from rnhmjoj/master | Lennart Poettering | 2020-12-16 | 8 | -74/+139 |
|\ \ \ | | | | | | | | | Extend $SYSTEMD_COLORS to switch colors mode |