summaryrefslogtreecommitdiffstats
path: root/man/bootup.xml (unfollow)
Commit message (Collapse)AuthorFilesLines
2023-12-23udev: use SD_EVENT_SIGNAL_PROCMASKYu Watanabe2-9/+8
2023-12-22TODO: fix typoYu Watanabe1-1/+1
2023-12-22network: use varlink for networkctl check_netns_match()Matt Layher1-9/+21
Use varlink to detect networkd's network namespace when executing networkctl rather than the D-Bus interface. Signed-off-by: Matt Layher <mdlayher@gmail.com>
2023-12-22backlight: split out verb_load() and verb_save(), then use dispatch_verb()Yu Watanabe1-57/+75
No functional change, just refactoring.
2023-12-22backlight: use WRITE_STRING_FILE_MKDIR_0755 flag on saveYu Watanabe1-6/+1
No functional change, just refactoring.
2023-12-22backlight: split out read_saved_brightness()Yu Watanabe1-26/+40
No functional change, just refactoring.
2023-12-22backlight: split out device_new_from_arg()Yu Watanabe1-23/+43
While at it, this replaces strndupa_safe() with strndup(), as the input is a user-controlled string. No functional change, just refactoring.
2023-12-22backlight: split out build_save_file_path()Yu Watanabe1-18/+44
No functional change, just refactoring.
2023-12-22backlight: move validity check of max_brightness to get_max_brightness()Yu Watanabe1-14/+18
Also rename get_max_brightness() -> read_max_brightness() for consistency with read_brightness().
2023-12-22various: clean up isatty() handlingMike Yuan12-29/+26
As per https://github.com/systemd/systemd/pull/30547#discussion_r1434371627
2023-12-22terminal-util: introduce isatty_safe that rejects EBADFMike Yuan2-0/+14
2023-12-22terminal-util: use RET_GATHER moreMike Yuan1-18/+13
2023-12-22test: fix check for device in test-executeLuca Boccassi1-1/+1
The unit actually uses /dev/kmsg, not /dev/kvm Follow-up for ae7482b994e6a9bc8e
2023-12-22systemctl: swap cached_id_map and cached_name_mapYu Watanabe1-5/+5
These are unused or used in the same order. So, this patch does not change any behavior, just for naming consistency with the function prototype. Closes #30570.
2023-12-22networkd: add basic Varlink interfaceLennart Poettering9-3/+140
Let's get networkd onto Varlink. This only adds the most basic of operations. I'd love to see networkd do Varlink for all its basic operations so that networkctl can use that, and work correctly before D-Bus is up. Right now, many of networkctls calls simply don't work before D-Bus, and I'd like to see that improved.
2023-12-22service: don't try to determine selinux label for socket activation if ↵Lennart Poettering3-33/+63
RootImage= is used We cannot determine the SELinux label ahead of time if RootImage= is used, since we'd have to mount the image then, hence don't, and handle this cleanly, and gracefully. While we are at it, stop "reaching over" so much from the socket code to the service code, and instead provide function that most of the hard work in service.c that socket.c just calls. While we are at it, add debug logging and stuff. I noticed the issue when also noticing #30560, but that one is harder to fix, hence I avoided it for now.
2023-12-21Drop /dev test in test-mountpoint-utilDaan De Meyer1-5/+0
Even /dev isn't always guaranteed to be a mount point, so let's drop this part of the test.
2023-12-21bash-completion: add missing option to systemd-confextArthur Zamarin1-1/+10
Signed-off-by: Arthur Zamarin <arthurzam@gentoo.org>
2023-12-21bash-completion: add missing option to systemd-cglsArthur Zamarin1-1/+4
Signed-off-by: Arthur Zamarin <arthurzam@gentoo.org>
2023-12-21bash-completion: add missing option to systemd-catArthur Zamarin1-2/+2
Signed-off-by: Arthur Zamarin <arthurzam@gentoo.org>
2023-12-21polkit: simplify bus_verify_polkit_async() + drop auth-by-cap dbus featureLennart Poettering29-450/+365
This simplifies bus_verify_polkit_async() and related calls quite a bit: 1. This removes any support for authentication-by-Linux-capability. This is ultimately a kdbus leftover: with classic AF_UNIX transports we cannot authenticate by capabilities securely (because we cannot acquire it from the peer without races), hence we never actually did. Since the necessary kernel work didn't materialize in the last 10y, and is unlikely to be added, let's just kill this context. We cannot quite remove the caps stuff from sd-bus for API compat, but for our polkit logic let's kill it. 2. The "good_uid" and "interactive" params are only necessary in very few cases, hence let's move them to a new call bus_verify_polkit_async_full() and make bus_verify_polkit_async() a wrapper around it without those two parameters. This also fixes a bunch of wrong uses of the "interactive" bool. The bool makes no sense today as the ALLOW_INTERACTIVE_AUTHORIZATION field in the D-Bus message header replaces it fully. We only need it to implement method calls we introduced prior to that header field becoming available in D-Bus. And it should only be used on such old method calls, and otherwise always be set to false. This does not change behaviour in any way. Just simplifies stuff. Fixes: #21586
2023-12-21varlink: make use of varlink_error_invalid_parameter() helper where appropriateLennart Poettering1-3/+1
2023-12-21varlink: add helper varlink_error_invalid_parameter_name()Lennart Poettering4-7/+14
2023-12-21test: add simple creds/varlink integration testLennart Poettering1-0/+10
2023-12-21creds: add varlink API for encrypting/decrypting credentialsLennart Poettering8-0/+271
2023-12-21varlink: add helper varlink_error_invalid_parameter_name()Lennart Poettering4-7/+14
2023-12-21update TODOLennart Poettering1-8/+4
2023-12-21test: add minimal integration test coverage for uid0 toolLennart Poettering1-0/+4
2023-12-21man: try to improve wording on --slice-inherit docsLennart Poettering2-6/+9
2023-12-21run/uid0: tint the terminal background color (and add new --background= switch)Lennart Poettering3-1/+89
This adds a new --background= switch that allows specifiying a background color for the terminal while the tool runs. It also teaches the tool when invoked as uid0 to tint the terminal in a reddish hue when operating as root, and in a yellowish hue when operating as any other user. This should highlight nicely when the user is operating with elevated privileges, or changed privileges.
2023-12-21color-util: add helper to convert RGB → HSVLennart Poettering4-0/+104
We already have HSV → RGB, add the opposite operation.
2023-12-21color-util: split out HSV color conversion into color-util.[ch]Lennart Poettering4-34/+50
2023-12-21ptyfwd: optionally, change ANSI background color of forwarded terminalsLennart Poettering2-3/+274
As the bytes flow through our terminal forwarder we can color the background of the terminal with a color of our choices, if that's desired. This will later allow us to color the background of the uid0 tool when running as root with a slightly alarming red color. This does two things: 1. When an ANSI sequence is seen that resets the background color, it is extended to immediately set the color to our choice. 2. When a newline is seen it is immeidately extended to set the background color again and clear the current line till the end. Net effect: all lines written while we forward the ttys will be shown with the background color of choice.
2023-12-21terminal-util: add helper that determines terminal default bg colorLennart Poettering3-0/+221
2023-12-21terminal-util: add helper for disabling terminal echo in termios structLennart Poettering3-4/+12
2023-12-21mkosi: don't turn off installation of our PAM snippetsLennart Poettering1-1/+1
Otherwise we don't get the new PAM snippet for the uid0 PAM stack installed.
2023-12-21run: optionally set the "ignore-failure" flag for ExecStart= linesLennart Poettering2-2/+22
2023-12-21run: when invoked as "uid0", expose some sudo-like behaviourLennart Poettering6-3/+521
This turns "systemd-run" into a multi-call binary. When invoked under the name "uid0", then it behaves a bit more like traditional "sudo". This mostly means defaults appropriuate for that, for example a PAM stack, interactivity and more. Fixes: #29199
2023-12-21env-util: add strv_env_assignf() helperLennart Poettering3-0/+51
2023-12-21sd-journal: use FOREACH_ARRAY() at one more placeYu Watanabe1-2/+2
2023-12-21tree-wide: use hashmap_isempty() and friendsYu Watanabe13-25/+26
2023-12-21varlink: check state rather than flags to determine whether it makes sense ↵Lennart Poettering1-3/+3
to reply We already checked the flags before, and updated the state accordingly, hence let's only look at the state afterwards. This allows us to use the same expressions for all cases where we want to reply automatically to clients.
2023-12-21varlink: add an extra assert encoding our assumption that ucred is valid hereLennart Poettering1-0/+2
2023-12-21varlink: never turn method call handler errors into connection errorsLennart Poettering1-6/+3
Let's make sure method call handlers failing will result in that very method call failing but not the whole connection. We mostly got that right, except for "oneway" calls where the method reply is supposed to be eaten up, but wasn't. Fix that.
2023-12-21varlink: switch various log calls to the local log helpersLennart Poettering1-21/+21
Most code in varlink.c got that right, but some didn't. Fix that.
2023-12-21socket-util: remove unnecessary variableLennart Poettering1-3/+1
2023-12-21socket-util: make sure SO_PEERSEC returned string is always NUL terminatedLennart Poettering1-1/+3
it's not entirely clear to me if the manual NUL termination is necessary, but let's better be safe than sorry, since this is apparently up to the LSMs, and I am not sure we can trust them all. A lot of other code (such as dbus-broker) patches in the NUL byte, hence let's be rather safe-then-sorry, it's trivial after all.
2023-12-21dbus-execute: use new exec_context_get_set_login_environment() helper also ↵Lennart Poettering1-1/+2
as backing for dbus property Note sure why it didn't occur earlier to me, but now that we have this nice helper to get the effective value of the set_login_environment field instead of just falling back to "false". Follow-up for: #30552
2023-12-21resolved: actually check authenticated flag of SOA transactionMichal Sekletar1-2/+2
Fixes #25676
2023-12-21core: imply SetLoginEnvironment= if PAMName= is setLennart Poettering4-7/+20
This geneally makes sense as setting up a PAM session pretty much defines what a login session is. In context of #30547 this has the benefit that we can take benefit of the SetLoginEnvironment= effect without having to set it explicitly, thus retaining some compat of the uid0 client towards older systemd service managers.