summaryrefslogtreecommitdiffstats
path: root/mkosi.kernel.config (unfollow)
Commit message (Collapse)AuthorFilesLines
2023-07-04getty-generator: minor modernizationsLennart Poettering1-5/+3
2023-07-04getty-generator: allow configuring additional gettys via credentialsLennart Poettering3-1/+82
2023-07-04test: add simple fstab credential testLennart Poettering2-0/+5
2023-07-04fstab-generator: add more parameter name commentsLennart Poettering1-3/+3
2023-07-04fstab-generator: optional read addtional fstab lines from credentialsLennart Poettering3-0/+63
Fixes: #27260
2023-07-04test: add test for initrd credentialsLennart Poettering3-1/+66
This extends the test framework a bit, and allows adding additional initrds to the qemu invocation, which we use here to place credentials in the new /run/systemd/@initrd/ credentials dir which are then passed to the host.
2023-07-04import-creds: unify acquire_credential_directory() + ↵Lennart Poettering1-43/+27
acquire_encrypted_credential_directory() Let's unify these very similar functions, and port them to the new mount_credentials_fs() call. While we are at it, if we detect that the credentials dir already is a mount point, remount it writable so that we can actually write to it.
2023-07-04execute: split out mounting of credentials fsLennart Poettering3-42/+81
Let's add two new helpers: mount_credentials_fs() and credentials_fs_mount_flags(). The former mounts a file system suitable for storing of unencrypted credentials at runtime (i.e. a ramfs or tmpfs). The latter determines the right mount flags to use for such a mount. Both functions mostly just take code from execute.c, but make two changes: 1. If the kernel supports it we'll use a tmpfs with the new "noswap" mount option instead of ramfs. Was added in kernel 6.4, hence is very recent, but tmpfs is so much less crappy than ramfs, hence worth it. 2. We'll set MS_NOSYMFOLLOW on the mounts if supported. These file systems should only contain regulra files, hence no need to allow symlinks.
2023-07-04import-creds: show list of imported credentials during initialization of PID 1Lennart Poettering1-0/+58
Let's make things easier to debug: provide an overview what has been passed, during boot.
2023-07-04core: consult credentials for machine ID to use for hostLennart Poettering4-5/+49
Let's hook up one more thing with credentials: the machine ID to use when none is initialized yet. This requires some reordering of initialization steps in PID 1: we need to import credentials first, and only then initialize the machine ID.
2023-07-04import-creds: pick up vmm.notify_socket also from encrypted credentialsLennart Poettering1-12/+19
Now that we have the infra in place, make PID 1 pick up encrypted credentials too. (While we are at it, split this out into its own helper)
2023-07-04creds-util: add new helper read_credential_with_decryption()Lennart Poettering2-1/+76
This is just like read_credential() but also looks into the encrypted credential directory, not just the regular one. Normally, we decrypt credentials at the moment we pass them to services. From service PoV all credentials are hence decrypted credentials. However, when we want to access credentials in a generator this logic does not apply: here we have the regular and the encrypted credentials directory. So far we didn't attempt to make use of credentials in generators hence. Let's address and add helper that looks into both directories, and talks to the TPM if necessary to decrypt the credentials.
2023-07-04import-creds: define a new dir where initrd configurators can pass ↵Lennart Poettering2-12/+148
credentials to host
2023-07-04execute: fix credential dir handling for fs which support ACLsLennart Poettering5-3/+242
When the credential dir is backed by an fs that supports ACLs we must be more careful with adjusting the 'x' bit of the directory, as any chmod() call on the dir will reset the mask entry of the ACL entirely which we don't want. Hence, do a manual set of ACL changes, that only add/drop the 'x' bit but otherwise leave the ACL as it is. This matters if we use tmpfs rather than ramfs to store credentials.
2023-07-04man: make sure credentials properly show up in directives indexLennart Poettering10-24/+33
2023-07-04journal-remote: upload journals from namespaceIgor Tsiglyar2-1/+37
2023-07-04hwdb : add support for Archos 101 Cesium Educ to 60-sensor.hwdbThomas Genty1-0/+4
2023-07-04NEWS/--help: correct/be clearer on bootclt -R vs. -RRLennart Poettering2-4/+9
The NEWS file was simply wrong. Let's also improve the --help text on this. Fixes: #28221
2023-07-04hibernate-resume-generator: downgrade 'noresume' log messageLennart Poettering1-2/+2
This log message is shown pretty regular at boot in various scenarios (such as CI builds), and it's not a reason for any concern, it's just the immediate effect of explicit configuration. Hence let's downgrade from LOG_NOTICE to LOG_INFO so that it is still usually in the boot output, but not particularly highlighted, since there's really no reason to.
2023-07-04systemctl: implement a new "whoami" verb, that just returns unit of caller/PIDLennart Poettering6-1/+104
2023-07-04test: wait for the interface to become routable after reconfiguringFrantisek Sumsal1-0/+1
Since 6e8477edd3 TEST-75 started failing with: [ 571.468298] testsuite-75.sh[46]: + for addr in "${DNS_ADDRESSES[@]}" [ 571.468298] testsuite-75.sh[46]: + run delv @fd00:dead:beef:cafe::1 -t A mail.signed.test [ 571.468899] testsuite-75.sh[562]: + tee /tmp/tmp.qKlHPbCCJZ [ 571.469317] testsuite-75.sh[561]: + delv @fd00:dead:beef:cafe::1 -t A mail.signed.test [ 571.501381] testsuite-75.sh[562]: ;; network unreachable resolving 'mail.signed.test/A/IN': fd00:dead:beef:cafe::1#53 [ 571.501564] testsuite-75.sh[562]: ;; resolution failed: SERVFAIL [ 571.515457] testsuite-75.sh[46]: + grep -qF '; fully validated' /tmp/tmp.qKlHPbCCJZ Let's wait for the dns0 interface to become routable again after re-enabling IPv6 to, hopefully, mitigate this.
2023-07-03test-network: add test for an invalid captive portal uriRonan Pigott1-0/+38
This could probably be extended to include many more invalid uri
2023-07-03dhcp6: relax data assert in dhcp6_option_parse_stringRonan Pigott1-1/+1
dhcp6_option_parse_string is intended to clear strings with length 0, for consistency. The data assert is too strict for this purpose, so we will allow data || data_len == 0, similar to other dhcp6_option_parse* helpers. Fixes: fde788601be8 ("dhcp6-client: parse RFC8910 captive portal dhcp6 option")
2023-07-03loginctl,machinectl: use same ansi formatting in --help texts as in systemctlLennart Poettering2-20/+22
2023-07-03units: skip systemd-battery-check in environments where it doesn't make senseLennart Poettering1-1/+3
Let's condition the service so that it doesn't run where we aren't directly run on baremetal, or where no power sources are discovered at all.
2023-07-03core/service: show correct restart usec for services in ↵Mike Yuan1-6/+4
SERVICE_AUTO_RESTART_QUEUED Follow-up for #28215 We can now correctly distinguish enqueued auto-restarts from those that are still pending. Let's take advantage of that.
2023-07-03test: add test case for recent OnSuccess=/OnFailure= state machine changesLennart Poettering4-0/+64
2023-07-03core: introduce a new job mode JOB_RESTART_DEPENDENCIESLennart Poettering8-37/+53
This new job mode will enqueue a start job for a unit, and all units depending on the unit will get a restart job enqueued. This is then used for automatic sevice restarts: the unit itself is only started, the depending units restarted. This way the unit will not go down unnecessarily, triggering OnSuccess= needlessly. This also introduces a new state SERVICE_AUTO_RESTART_QUEUED that is entered once the restart jobs are enqueued. Previously we'd stay in SERVICE_AUTO_RESTART, but that's problematic, since we'd lose information whether we still need to enqueue the restart job during a serialization/deserialization cycle or not. By having an explicit state for this we know exactly whether we still need to enqueue the job or not. It's also good since when we are in SERVICE_AUTO_RESTART_QUEUED we want to act on unit_start(), but on SERVICE_AUTO_RESTART we want to wait for the holdoff time to pass before we act on unit_start(). Fixes: #27722
2023-07-03service: re-linebreak some comments matching current coding styleLennart Poettering1-12/+10
2023-07-03ndisc: reject malformed captive portal URI with EBADMSGRonan Pigott1-1/+1
This allows the correct, gracious, error handling to follow up in the ndisc handler. Otherwise, an internal error is assumed and the interface disabled. Fixes: 9747955d2d60 ("ndisc: parse RFC8910 captive portal ipv6ra option")
2023-07-03update TODOLennart Poettering1-0/+2
2023-07-03ndisc: clear ndisc captive portal value on bogus zero-len optionRonan Pigott1-1/+1
This value was freed but erroneously never cleared, leading to use-after-free. Fixes: 9747955d2d60 ("ndisc: parse RFC8910 captive portal ipv6ra option")
2023-07-03test-network: add test for static route with preferred sourceYu Watanabe2-0/+27
This adds possible reproducer for issue #28009 (though, the issue is highly racy, hence this may not trigger the issue reliably).
2023-07-03test-network: check route more strictlyYu Watanabe1-3/+1
2023-07-03network: delay to configure address until it is removed on reconfigureYu Watanabe2-0/+7
When we request an address that already exists and is under removing, we need to wait for the address being removed. Otherwise, configuration of a route whose preferred source is the address will fail. Fixes #28009. Replaces #28088.
2023-07-03network: constify several functionsYu Watanabe1-3/+3
2023-07-02hwdb: Add override for headset form-factorsBastien Nocera3-0/+33
Correct the SOUND_FORM_FACTOR property for Steelseries Arctis headsets. The USB IDs were all gathered from HeadsetControl[1]. [1]: https://github.com/Sapd/HeadsetControl
2023-07-02tree-wide: explicitly ignore return value in a couple more placesFrantisek Sumsal6-8/+8
Resolves: - CID#1490777 - CID#1498366 - CID#1508639 - CID#1509084 - CID#1509086 - CID#1509087
2023-07-02unit: drop an unused assignmentFrantisek Sumsal1-3/+1
Resolves: CID#1509244
2023-07-02virt: drop an unused assignmentFrantisek Sumsal1-2/+0
As `v` gets overwritten by the following detect_vm_cpuid() call. Resolves: CID#1509247
2023-07-02tree-wide: "<n>bit" → "<n>-bit"Zbigniew Jędrzejewski-Szmek83-224/+221
In some places, "<n> bits" is used when more appropriate.
2023-07-02test: drop an unused assignmentFrantisek Sumsal1-2/+0
Unused since 788c2d9523. Resolves: CID#1509248
2023-07-02test-network: add tests for captive portal dhcp optionsRonan Pigott1-0/+39
2023-07-02networkctl: show captive portal configuration in link statusRonan Pigott1-1/+5
2023-07-02networkd: include captive portal information in link json descriptionRonan Pigott1-0/+45
2023-07-02network: Introduce UseCaptivePortal IPv6RA optionRonan Pigott3-0/+19
Accepts a boolean. When enabled retains captive portal configuration advertised by the router.
2023-07-02network: Introduce UseCaptivePortal DHCPv6 optionRonan Pigott6-1/+31
Acepts a boolean. When enabled requests and retains captive portal configuration from the DHCPv6 server.
2023-07-02network: Introduce UseCaptivePortal DHCPv4 optionRonan Pigott8-1/+36
Accepts a boolean. When enabled, UseCaptivePortal will request and retain the captive portal configuration from the DHCP server.
2023-07-02ndisc: parse RFC8910 captive portal ipv6ra optionRonan Pigott7-0/+89
2023-07-01NEWS: reword/fix/extend the entries for v254Zbigniew Jędrzejewski-Szmek1-173/+176