summaryrefslogtreecommitdiffstats
path: root/rules.d/70-camera.rules (unfollow)
Commit message (Collapse)AuthorFilesLines
2022-04-26po: update italian translationsDaniele Medri1-13/+31
2022-04-26ci: unpin CFLiteEvgeny Vereshchagin2-3/+3
The idea was to catch CFLite regressions but since the action itself pulls the latest docker images it can't be pinned properly and issues like https://github.com/google/clusterfuzzlite/issues/91 are going to pop up anyway. Let's unpin it by analogy with CIFuzz and hope it doesn't break very often.
2022-04-25test: use cp for journal copying when systemd-journal-remote non-existentwangyuhang1-2/+6
2022-04-25tree-wide: Fix typoYu Watanabe4-4/+4
2022-04-23tree-wide: Simplify variable declarations behind #ifdefJan Janssen5-41/+16
2022-04-23loopback-setup: tweak message if loopback device is already set upLennart Poettering1-1/+6
2022-04-23test: extend the "hashed" unit names coverage a bitFrantisek Sumsal1-3/+16
Follow-up to #22759.
2022-04-23udevadm: wait: check if specified path not exist on --removeYu Watanabe1-10/+14
Even if the corresponding device node or syspath are already removed, the specified symlink to the device node may still exist. Fixes #23166.
2022-04-22cryptenroll,homectl: Introduce --fido2-credential-algorithm optionMkfsSion10-10/+113
* Some authenticators(like Yubikey) support credential algorithm other than ES256 * Introduce a new option so users can make use of it
2022-04-22hwdb: Fix rotation for HP Pro Tablet 408 G1Lance1-0/+4
2022-04-22hwdb: Remap micmute to f20 for ASUS WMI hotkeysBenjamin Berg1-0/+1
For micmute userspace handles both micmute and f20, as Xorg cannot handle the high keycode that the micmute key has. As such, adding the remapping means that the key will work on Xorg clients and not just when using wayland.
2022-04-22docs: suggest to erase /var/lib/systemd/credential.secret when preparing ↵Lennart Poettering1-0/+9
golden images
2022-04-22update TODOLennart Poettering1-0/+5
2022-04-22meson: use a single constant for default compression settingZbigniew Jędrzejewski-Szmek4-38/+43
Suggested by Daniele Nicolodi: https://github.com/systemd/systemd/pull/23160#discussion_r855853716 This is possible only if the macro is never used in #if, but only in C code. This means that all places that use #if have to be refactored into C, but we reduce the duplication a bit, and C is nicer to read than preprocessor conditionals.
2022-04-22meson: simplify setting of default compressionZbigniew Jędrzejewski-Szmek7-73/+67
Follow-up for da13d2ca0731b413841663052f2cc6832a855334. Instead of having separate definitions of the bitmask flags, just define DEFAULT_COMPRESSION_FOO=0|1 directly. (It *should* be possible to do this more simply, but the problem is that anything that is used in #if cannot refer to C constants or enums. This is the simplest I could come up with that preserves the property that we don't use #ifdef.) The return value from compress_blob() is changed to propagate the error instead of always returning -EOPNOTSUPP. The callers don't care about the specific error value. compress_blob_*() are changed to return the compression method on success, so that compress_blob() can be simplified. compress_stream_*() and compress_stream() are changed in the same way for consistency, even though the callers do not currently use this information (outside of tests).
2022-04-22test: also test nspawn system→service inheritance of credsLennart Poettering2-0/+15
2022-04-22test: make sure that SetCredential=/LoadCredential fallback won#t regressLennart Poettering1-0/+6
2022-04-22execute: add more debug loggingLennart Poettering1-1/+1
2022-04-22execute: restore ability that SetCredential= can act as fallback for ↵Lennart Poettering1-2/+4
LoadCredential= If SetCredential= and LoadCredentials= are combined for the same credential name, then the former shall act as fallback for the latter in case the source file does not exist. That's documented, but didn't work. Let's fix that.
2022-04-22execute: restore ability to propagate creds from further up (i.e. container ↵Lennart Poettering1-9/+12
manager and such) This was broken in 3989bdc1ad7cca4d75c06cdf601fea2cb37ba337 let's restore the functionality. Basically, we want that if a relative name is specified as source to load from we take it relative to the credentials dir the service manager itself got passed.
2022-04-22execute: share error path between reg file/dir credential loadingLennart Poettering1-10/+4
2022-04-22execute: correct commentsLennart Poettering1-2/+6
This is not done first, but second. Also, while we are at it, explain why faccessat() is OK here.
2022-04-22execute: sort directory entries when loading credentials recursivelyLennart Poettering1-1/+1
Given that the recusive credential loading allows two ways to load the same credentials, it's important to define a clear order so that it is always the same one that wins. i.e. if you use LoadCredential=foobar:/tmp/xyz and there are two files /tmp/xyz/abc/cde and /tmp/xyz/abc_cde these would both result in a credential foobar_abc_cde being set, hence it is important to make clear which one shall win, and that it is always the same one.
2022-04-22execute: drop 'seen_creds' setLennart Poettering1-16/+3
When checking whether we already loaded a credential before, let's just use faccessat() in the credential dir we are populating. First of all, we already do it exactly that way when appliying SetCredential= settings later. Secondly, this is not performance relevant, and by using faccessat() things simply become a lot simpler.
2022-04-22execute: simplify 'load_creds_args' struct a bitLennart Poettering1-3/+3
Given we only need a single field off the ExecLoadCredential structure we don't have to link it as a whole, but just copy that one bit over directly, simplifying the struct a bit.
2022-04-22execute: let recurse_dir() concate the cred name for usLennart Poettering1-7/+3
recurse_dir() allows specifiying a freely choosable initial path to which to append the subdirs as it descends into the tree. If we pass the configured id there, recurse_dir() will suffix the subdir to that for us, so that we don't have to do that manually anymore in the callback, simplifying things a bit.
2022-04-22execute: passing NULL as second argument for recurse_dir() is equivalent to ""Lennart Poettering1-1/+1
2022-04-22execute: debug log if a generated recursive cred name is too longLennart Poettering1-1/+1
2022-04-22execute: rework load_credential() not to take an ExecLoadCredential object ↵Lennart Poettering1-31/+56
we must synthesize Let's just simplify the logic and pass the fields we need as regular arguments, even if that means the function now has a lot. It's otherwise really weird that we have to fake a local ExecLoadCredential from the real one.
2022-04-22execute: drop double empty lineLennart Poettering1-1/+0
2022-04-22execute: use ASSERT_PTR where appropriateLennart Poettering1-1/+1
2022-04-22update TODOLennart Poettering1-0/+4
2022-04-22tpm2-util: if we run in a container, ignore /sys/class/tpmrm/* contentsLennart Poettering1-6/+13
2022-04-22hwdb: add resolutions for the Vaio FE14 touchpad (#23136)davijosw1-0/+11
2022-04-22kernel-install: Skip execution if $KERNEL_INSTALL_BYPASS=1Daan De Meyer2-0/+12
2022-04-22mkosi: Update to latest commitDaan De Meyer1-1/+1
We recently added caching for the dependencies we build from source in mkosi's github action which speeds up builds by +-10 minutes. Let's update to the latest commit so we benefit from this in systemd's mkosi CI as well.
2022-04-22oss-fuzz: turn off fuzz-introspectorEvgeny Vereshchagin1-0/+12
fuzz-introspector passes -fuse-ld=gold and -flto using CFLAGS/LDFLAGS and due to https://github.com/mesonbuild/meson/issues/6377#issuecomment-575977919 and https://github.com/mesonbuild/meson/issues/6377 it doesn't mix well with meson. It's possible to build systemd with duct tape there using something like https://github.com/google/oss-fuzz/pull/7583#issuecomment-1104011067 but apparently even with gold and lto some parts of systemd are missing from reports (presumably due to https://github.com/google/oss-fuzz/issues/7598). Let's just fail here for now to make it clear that fuzz-introspector isn't supported.
2022-04-21man: make clear that encrypted credentials are also authenticatedLennart Poettering2-16/+17
We use authenticated encryption, and that deserves mention. This in particular relevant as the fact they are authenticated makes the credentials useful as initrd parameterization items.
2022-04-21hostnamed: update to use new style sd-bus macrosSonali Srivastava1-62/+45
2022-04-21bus-unit-util: make sure we can set LoadCredentials= property with a single ↵Lennart Poettering1-1/+4
string LoadCredentials= in unit files supports a syntax passing a single string only (in which case the credentials are propagated down from the host). but systemd-run's --property= setting doesn't allow that yet. Fix that.
2022-04-21hwdb 60-keyboard Add HP/Compaq KBR0133Matthew Blythe1-0/+1
2022-04-21creds-util: upgrade message about TPM2 not workingLennart Poettering1-1/+1
2022-04-21creds-util: also warn about unencrypted creds host key if we are creating itLennart Poettering1-11/+25
Previously we'd only warn when we consume it, but it's even more relevant to warn if we save it to an unencrypted storage location.
2022-04-21main: voidify call to kmod_setup()Lennart Poettering1-1/+1
2022-04-21sd-bus: switch to a manual overflow check in sd_bus_track_add_name()Lennart Poettering1-3/+13
This is generally used in a directly client controllable way, hence we should handle ref count overflow gracefully, instead of hitting an assert(). As discussed: https://github.com/systemd/systemd/pull/23099#discussion_r854341850
2022-04-21macro: upgrade ref counting overflow check assert() → assert_se()Lennart Poettering1-1/+1
The overflow check for ref counting should not be subject to NDEBUG, hence upgrade assert() → assert_se(). (The check for zero is an immediate bug in our code, and should be impossible to trigger, hence it's fine if the check is optimized away if people are crazy enough to set NDEBUG, so that can stay assert()) https://github.com/systemd/systemd/pull/23099#discussion_r854341850
2022-04-20update TODOLennart Poettering1-0/+4
2022-04-20man: update TPM2 PCR documentationLennart Poettering2-7/+85
The assignments were partly simply incorrectly documented, partly changed with 4d32507f5186a89e98093659fbbe386787a97b9f and partly missing. Moreover kernel 5.17 now measures all initrds to PCR 9 on its own (https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=f046fff8bc4c4d8f8a478022e76e40b818f692df) Let's correct all this and bring it up-to-date. And while we are at it extend the docs about this in systemd-stub, with a new table that indicates which OS resource is protected by which PCR.
2022-04-20update TODOLennart Poettering1-6/+0
2022-04-20creds-util: permit credentials encrypted/signed by fixed zero length keys as ↵Lennart Poettering4-21/+87
fallback for systems lacking TPM2 This is supposed to be useful when generating credentials for immutable initrd environments, where it is is relevant to support credentials even on systems lacking a TPM2 chip. With this, if `systemd-creds encrypt --with-key=auto-initrd` is used a credential will be encrypted/signed with the TPM2 if it is available and recognized by the firmware. Otherwise it will be encrypted/signed with the fixed empty key, thus providing no confidentiality or authenticity. The idea is that distributions use this mode to generically create credentials that are as locked down as possible on the specific platform.