summaryrefslogtreecommitdiffstats
path: root/po (unfollow)
Commit message (Collapse)AuthorFilesLines
2020-12-02copy: teach copy_file() that a mode=-1 call means "take mode from original file"Lennart Poettering1-2/+16
2020-12-02pager: stop disabling urlification under a pagerZbigniew Jędrzejewski-Szmek1-5/+1
Less 568 properly shows urlified strings. Putative NEWS entry: * Urlification is now enabled by default even when a pager is used. Previously it was disabled, because less would not show such markup properly. This has been fixed in less 568. Please either upgrade less, or use SYSTEMD_URLIFY=0 to disable the feature.
2020-12-01man: document new ratelimiting APIsLennart Poettering4-1/+156
2020-12-01core: prevent excessive /proc/self/mountinfo parsingMichal Sekletár1-0/+6
2020-12-01test: add ratelimiting testMichal Sekletár1-1/+95
(Taken from Michal's #17274 by Lennart, and slightly adjusted)
2020-12-01sd-event: add ability to ratelimit event sourcesLennart Poettering4-62/+350
Let's a concept of "rate limiting" to event sources: if specific event sources fire too often in some time interval temporarily take them offline, and take them back online once the interval passed. This is a simple scheme of avoiding starvation of event sources if some event source fires too often. This introduces the new conceptual states of "offline" and "online" for event sources: an event source is "online" only when enabled *and* not ratelimited, and offline in all other cases. An event source that is online hence has its fds registered in the epoll, its signals in the signalfd and so on.
2020-12-01sd-event: remove earliest_index/latest_index into common part of event ↵Lennart Poettering2-12/+13
source objects So far we used these fields to organize the earliest/latest timer event priority queue. In a follow-up commit we want to introduce ratelimiting to event sources, at which point we want any kind of event source to be able to trigger time wakeups, and hence they all need to be included in the earliest/latest prioqs. Thus, in preparation let's make this generic. No change in behaviour, just some shifting around of struct members from the type-specific to the generic part.
2020-12-01sd-event: follow coding style with naming return parameterLennart Poettering1-3/+4
2020-12-01sd-event: ref event loop while in sd_event_prepare() ot sd_event_run()Lennart Poettering1-6/+9
sd_event_prepare() invokes callbacks that might drop the last user ref on our event loop. Let's make sure we keep an explicit ref around it, so that we won't end up with an invalid pointer. Similar in sd_event_run(). Basically, any function that is publically callable that might end up invoking callbacks should ref the relevant objects to be protected against callbacks destroying these objects while we still want to access them. We did this correctly in sd_event_dispatch() and sd_event_loop(), but these are not the only ones which are callable from the outside.
2020-12-01sd-event: let's suffix last_run/last_log with "_usec"Lennart Poettering1-6/+6
Otherwise it's a bit confusing what this is about: two timestamps.
2020-12-01sd-event: split out code to add/remove timer event sources to ↵Lennart Poettering1-16/+41
earliest/latest prioq Just some refactoring that makes code prettier, and will come handy later, because we can reuse these functions at more places.
2020-12-01sd-event: split clock data allocation out of sd_event_add_time()Lennart Poettering1-11/+23
Just some simple refactoring, that will make things easier for us later. But it looks better this way even without the later function reuse.
2020-12-01sd-event: mention that two debug logged events are ignoredLennart Poettering1-2/+2
2020-12-01update TODOLennart Poettering1-3/+0
2020-12-01man: drop comment about ECC vs. RSA and YubikeyLennart Poettering1-1/+0
The comment is pointless, ECC systematically doesn't allow encryption/decryption directly, only RSA does that. If you want to use ECC for asymmetric encryption/decryption you have to combine it with key exchange scheme and symmetric scheme. This all is not a limitation of the Yubikey, hence don't claim so. It's just how ECC is.
2020-12-01man: document how cryptsetup keys may be acquired via AF_UNIX socketsLennart Poettering1-19/+58
2020-12-01cryptsetup: modify keyfile search logic to use read_file_full() tooLennart Poettering3-92/+44
Let's move the 3rd way how cryptsetup acquires key files to read_file_full() too. Since load_key_file()'s raison d'etre now is just the search path logic, let's rename the function to find_key_file().
2020-12-01cryptsetup: port cryptsetup's main key file logic over to read_full_file_full()Lennart Poettering1-5/+32
Previously, we'd load the file with libcryptsetup's calls. Let's do that in our own, so that we can make use of READ_FULL_FILE_CONNECT_SOCKET, i.e. read in keys via AF_UNIX sockets, so that people can plug key providers into our logic. This provides functionality similar to Debian's keyscript= crypttab option (see → #3007), as it allows key scripts to be run as socket activated services, that have stdout connected to the activated socket. In contrast to traditional keyscript= support this logic runs stuff out of process however, which is beneficial, since it allows sandboxing and similar.
2020-12-01cryptsetup: port PKCS#11 code to read key file with read_full_file()Lennart Poettering3-2/+19
Now that we can read from offsets/with size, let's port the cryptsetup PKCS#11 key file logic over to read_full_file_full().
2020-12-01fileio: teach read_full_file_full() to read from offset/with maximum sizeLennart Poettering12-38/+132
2020-12-01journal-remote: suffix cmdline option that expects arg with =Lennart Poettering1-1/+1
2020-12-01man: mention that --key= is about *secret* keysLennart Poettering2-3/+3
2020-12-01journal-remote: use READ_FULL_FILE_SECURE|READ_FULL_FILE_WARN_WORLD_READABLE ↵Lennart Poettering2-2/+10
when reading PEM secret key It's secret data, hence use the appropriate flags.
2020-12-01repart: warn about world writable key filesLennart Poettering1-1/+5
We have easy support for this, hence use it for privileged key data.
2020-12-01dissect-image: use simple version of read_full_file() where we canLennart Poettering1-3/+3
2020-12-01journal-remote: erase secret PEM key from memory after useLennart Poettering2-2/+5
2020-12-01scope: on unified, make sure to unwatch all PIDs once they've been moved to ↵Franck Bui1-5/+7
the cgroup scope Commit 428a9f6f1d0396b9eacde2b38d667cbe3f15eb55 freed u->pids which is problematic since the references to this unit in m->watch_pids were no more removed when the unit was freed. This patch makes sure to clean all this refs up before freeing u->pids by calling unit_unwatch_all_pids().
2020-12-01sd-event: fix delays assert brain-o (#17790)Vito Caputo1-1/+1
s/sizeof/ELEMENTSOF/ Bug introduced in 34b87517749caa4142b19eb3c63bdf349fafbc49.
2020-11-30mkosi: make ubuntu image bootable by defaultPavel Sapezhko1-1/+1
2020-11-30man: Speicfy exact return values of sd_bus_message_enter_containerigo958621-2/+7
2020-11-30po: add units/systemd-journald.service.in to POTFILES.skipPiotr Drąg1-2/+3
2020-11-30hwdb: add axis range corrections for Lenovo ThinkPad T14 Gen1Michał Kopeć1-1/+2
2020-11-30network: use IN_SET() macroYu Watanabe1-5/+3
Follow-up for 1d370b2c182505ff8033fccbebcc56621d305220.
2020-11-30network: treat IPv4LL is one of dynamic addressing protocolYu Watanabe1-11/+10
This makes an IPv4LL address optional when multiple dynamic addressing protocols are enabled.
2020-11-30network: simplify the condition about ipv4ll is enabled or notYu Watanabe2-15/+7
2020-11-30network: shorten link_check_ready() a bitYu Watanabe1-56/+27
2020-11-30network: stop IPv4LL engine when DHCPv4 address is successfully acquiredYu Watanabe1-0/+4
2020-11-30networkd: start ipv4ll when dhcp has trouble getting a leaseZbigniew Jędrzejewski-Szmek5-15/+28
Fixes #13316.
2020-11-30sd-dhcp-client: report transient DHCP failure to the callerZbigniew Jędrzejewski-Szmek2-0/+8
So far we only reported major state transitions like failure to acquire the message. Let's report the initial failure after a few timeouts in a new event type. The number of timeouts is hardcoded as 3, since Windows seems to be using that. I don't think we need to make this configurable out of the box. A reasonable default may be enough.
2020-11-30networkd: merge ll addressing fallback modes into normal "boolean" valuesZbigniew Jędrzejewski-Szmek12-53/+35
They are not really boolean, because we have both ipv4 and ipv6, but for each protocol we have either unset, no, and yes. From https://github.com/systemd/systemd/issues/13316#issuecomment-582906817: LinkLocalAddressing must be a boolean option, at least for ipv4: - LinkLocalAddressing=no => no LL at all. - LinkLocalAddressing=yes + Static Address => invalid configuration, warn and interpret as LinkLocalAddressing=no, no LL at all. (we check that during parsing and reject) - LinkLocalAddressing=yes + DHCP => LL process should be subordinated to the DHCP one, an LL address must be acquired at start or after a short N unsuccessful DHCP attemps, and must not stop DHCP to keeping trying. When a DHCP address is acquired, drop the LL address. If the DHCP address is lost, re-adquire a new LL address. (next patch will move in this direction) - LinkLocalAddressing=fallback has no reason to exist, because LL address must always be allocated as a fallback option when using DHCP. Having both DHCP and LL address at the same time is an RFC violation, so LinkLocalAdressing=yes correctly implemented is already the "fallback" behavior. The fallback option must be deprecated and if present in older configs must be interpreted as LinkLocalAddressing=yes. (removed) - And for IPv6, the LinkLocalAddress option has any sense at all? IPv6-LL address aren't required to be always set for every IPv6 enabled interface (in this case, coexisting with static or dynamic address if any)? Shouldn't be always =yes? (good question) This effectively reverts 29e81083bd2fcb2dbf83f67ef358c7d25adf7e9d. There is no special "fallback" mode now, so the check doesn't make sense anymore.
2020-11-30sd-dhcp-client: minor simplificationZbigniew Jędrzejewski-Szmek1-15/+6
2020-11-30man: adjust description of MaxAttemptsZbigniew Jędrzejewski-Szmek1-3/+3
The code was changed in 715cedfbf03a2eb1d4dca5d1b2b876e52a3b652d to allow more than six attempts and the old description stopped making sense.
2020-11-28Update logind-button.cnihilix-melix1-3/+6
2020-11-28test-networkd-conf: add missing assert_seZbigniew Jędrzejewski-Szmek1-1/+1
Coverity CID#1437351. Fixup for f706340979a.
2020-11-28semaphore: temporarily disable the timedated test suiteFrantisek Sumsal1-0/+3
All otherwise passing Semaphore CI builds are now getting stuck on the timedated test suite. Let's temporarily skip it until the issue is resolved. See: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=975010
2020-11-27hwdb: 60-keyboard: Add Dell Inspiron 11 3168 Fn+Home/End/PageUp/PageDown key ↵Konomi1-0/+7
mappings On the Dell Inspiron 11 3168 the Fn and Arrow Keys control the Home, End, Page Up and Page Down keys. This commit allows those keys to work correctly.
2020-11-27NEWS: really fix kernel version number referenceZbigniew Jędrzejewski-Szmek1-2/+2
Fixes #17736.
2020-11-27coccinelle: ignore specific cases to use SYNTHETIC_ERRNO() macroYu Watanabe1-0/+6
2020-11-27cryptsetup: drop unnecessary bracketYu Watanabe1-2/+1
2020-11-27test: use for(;;) instead of while(true)Yu Watanabe1-1/+1