summaryrefslogtreecommitdiffstats
path: root/src/fuzz/fuzz-dhcp6-client.c (unfollow)
Commit message (Collapse)AuthorFilesLines
2020-12-21journal-importer: ignore invalid field at one more placeYu Watanabe2-0/+10
Fixes oss-fuzz#28817. https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=28817
2020-12-21man/localtime: document default timezoneLuca BRUNO1-0/+3
This explicitly documents the default `UTC` timezone which is used by systemd and (other softwares) when `/etc/localtime` is not present. Ref: https://github.com/systemd/systemd/blob/v247/src/basic/time-util.c#L1460-L1469
2020-12-21man/systemd.netdev: clarify the wireguard AllowedIPs= settingFlorian Klink1-3/+10
`AllowedIPs=` only affects "routing inside the network interface itself", as in, which wireguard peer packets with a specific destination address are sent to, and what source addresses are accepted from which peer. To cause packets to be sent via wireguard in first place, a route via that interface needs to be added - either in the `[Routes]` section on the `.network` matching the wireguard interface, or outside of networkd. This is a common cause of misunderstanding, because tools like wg-quick also add routes to the interface. However, those tools are meant as a "extremely simple script for easily bringing up a WireGuard interface, suitable for a few common use cases (from their manpage). Networkd also should support other usecases - like setting AllowedIPs to 0.0.0.0/0 and ::/0 and having a dynamic routing protocol setting more specific routes (or the user manually setting them). Reported-In: https://github.com/systemd/systemd/issues/14176
2020-12-20github: add the missing tpm2 optional dependencyFrantisek Sumsal1-0/+1
2020-12-20travis: add missing optional build dependenciesFrantisek Sumsal2-0/+4
2020-12-20cryptenroll: drop an unused variableFrantisek Sumsal1-1/+1
Fixes following warning/error w/ clang: ../src/cryptenroll/cryptenroll-tpm2.c:64:64: error: unused variable 'a' [-Werror,-Wunused-variable] _cleanup_(json_variant_unrefp) JsonVariant *v = NULL, *a = NULL; ^ 1 error generated.
2020-12-19mkosi: Add basic editors to final imagesDaan De Meyer5-0/+10
It's often useful to have an editor available to edit some random config file in the final image. Let's install some basic editors that don't take up too much space.
2020-12-19Add more matching rules to GA labeler bot for subcomponentsLuca Boccassi1-0/+12
2020-12-19False positives in GA labeler botLuca Boccassi1-2/+0
Don't automatically match on man/* and **/meson.build, since we change those files as part of larger changes that we usually don't mark that way
2020-12-19test: fix regex in run-integration-tests.shLuca Boccassi1-1/+1
The regex results in calls of "make setup run -again" which is broken
2020-12-19test: use deny-list in run-integration-tests.shLuca Boccassi1-4/+4
The old env var doesn't seem to be used anywhere, and the script currently doesn't work, so it seems safe to change immediately
2020-12-19mkosi: Use --only-changed meson option when installingDaan De Meyer1-2/+2
Recently, mkosi gained support for specifying an --install-directory option to save the contents of the install directory between bulids. By enabling the --only-changed meson install option, meson won't overwrite the contents of files that haven't changed since the last build when using --install-directory.
2020-12-19man: Advertise systemd-time-wait-sync.service more (#17729)Alexander Batischev1-1/+10
* man: Advertise systemd-time-wait-sync.service more The description of time-sync.target says that NTP services *should* pull that target, but doesn't mention that e.g. systemd-timesyncd.service doesn't actually do that. As a result, time-sync.target is reached way earlier than people expect; see #5097, #8861, #11008. systemd provides systemd-time-wait-sync.service to ameliorate this problem, but doesn't feature it prominently in relevant manpages. In fact, it's only mentioned in passing in systemd-timesyncd.service(8). As a result, I ended up re-implementing that service, and I'm not the first one: https://github.com/NixOS/nixpkgs/pull/51338 This patch adds a mention right in the description of time-sync.target, which will hopefully raise awareness of this helper service.
2020-12-18tmpfiles: fix typoYu Watanabe1-1/+1
Follow-up for 94566540e3863032df3a8a89f948b94d764ca2b4.
2020-12-18man: update org.freedesktop.hostname1.xmlYu Watanabe1-0/+12
2020-12-18memory-id: fix never hit conditionYu Watanabe1-2/+5
As sizeof(int64_t) is always 8.
2020-12-18hostname: fix build failureYu Watanabe1-1/+0
Follow-up for b9d8069832425b34211a6812e06537e0c50d46b6. libudev.h was dropped from most of our binaries.
2020-12-18networkd: add RouteDenyListDevon Pringle6-14/+43
Allow configuration for IPv6 discovered routes to be ignored instead of adding them as a route. This can be used to block unwanted routes, for example, you may wish to not receive some set of routes on an interface if they are causing issues.
2020-12-18netlink: fix size of fib rule messagesYu Watanabe1-3/+3
2020-12-18meson: sort filesYu Watanabe1-2/+2
2020-12-18nspawn: sort headersYu Watanabe1-2/+1
2020-12-18netlink: fix indentationYu Watanabe1-4/+5
2020-12-18netlink: drop unnecessary error handlingYu Watanabe1-6/+3
2020-12-18netlink: use whitespace instead of tabYu Watanabe1-1/+1
2020-12-18sd-netlink: add several assertionsYu Watanabe2-1/+3
2020-12-18sd-netlink: replace *messages[] -> **messagesYu Watanabe4-4/+4
2020-12-18meson: add missing headersYu Watanabe1-0/+4
2020-12-18network: move variable declarationYu Watanabe1-2/+2
2020-12-18tree-wide: fix typoYu Watanabe8-15/+18
2020-12-18tmpfiles: try to set file attributes one by oneYu Watanabe1-5/+9
Closes #17690.
2020-12-18chattr-util: introduce fallback mode to set file attributes one by oneYu Watanabe2-26/+61
2020-12-18network: Allow to configure unreachable/blackhole RoutingPolicyRule (#17984)Susant Sahani6-13/+106
2020-12-17man: document that .timer units now have After= on both time-set.target + ↵Lennart Poettering1-4/+6
time-sync.target
2020-12-17core: order timer units after both time-sync.target and time-set.targetLennart Poettering2-4/+12
If users do not enable a service like systemd-time-wait-sync.target (because they don't want to delay boot for external events, such as an NTP sync), then timers should still take the the weaker time-set.target feature into account, so that the clock is at least monotonic. Hence, order timer units after both of the targets: time-sync.target *and* time-set.target. That way, the right thing will happen regardless if people have no NTP server (and thus also no systemd-time-wait-sync.service or equivalent) or, only have an NTP server (and no systemd-time-wait-sync.service), or have both. Ordering after time-set.target is basically "free". The logic it is backed by should be instant, without communication with the outside going on. It's useful still so that time servers that implement the timestamp from /var/ logic can run in later boot.
2020-12-17units: don't pull in time-sync.target from systemd-timesyncd.serviceLennart Poettering1-1/+1
systemd-timesyncd.service only applies the much weaker monotonic clock from file logic, i.e should pull in and order itself before time-set.target. The strong time-sync.target unit is pulled in by systemd-time-wait-sync.service.
2020-12-17update TODOLennart Poettering1-10/+25
2020-12-17mkosi: add TPM2 packages to debian/ubuntu/fedora mkosi filesLennart Poettering3-2/+17
As suggested: https://github.com/systemd/systemd/pull/17741#issuecomment-743479834
2020-12-17man: document new featuresLennart Poettering10-94/+603
2020-12-17fido2: when listing fido2/hmac-secret devices, actually validate feature setLennart Poettering1-4/+45
2020-12-17test: add tpm2 and fido2 libs to dlopen testLennart Poettering2-1/+11
2020-12-17repart: optionally lock encrypted partitions to TPM2Lennart Poettering1-20/+141
This useful for bootstrapping encrypted systems: on first boot let's create a /var/ partition that is locked to the local TPM2.
2020-12-17string-table: add private version of lookup macro with boolean fallbackLennart Poettering1-0/+1
2020-12-17cryptsetup: add support for TPM2 unlocking of volumesLennart Poettering4-4/+475
2020-12-17cryptenroll: support listing and wiping tokensLennart Poettering7-22/+740
2020-12-17cryptenroll: add support for TPM2 enrollingLennart Poettering8-0/+1279
2020-12-17json: add APIs for quickly inserting hex blobs into as JSON stringsLennart Poettering2-0/+55
This is similar to the base64 support, but fixed-size hash values are typically preferably presented as series of hex values, hence store them here like that too.
2020-12-17sort-util: make cmp_int() generic, so that we can reuse it elsewhereLennart Poettering3-4/+6
2020-12-17cryptenroll: add new "systemd-cryptenroll" tool for enrolling FIDO2+PKCS#11 ↵Lennart Poettering10-0/+829
security tokens
2020-12-17cryptsetup: add fido2 supportLennart Poettering4-5/+460
2020-12-17fido2: don't use up/uv/rk when device doesn't support itLennart Poettering2-74/+137
Apparently devices are supposed to generate failures if we try to turn off features they don't have. Thus don't. Prompted-by: https://github.com/systemd/systemd/issues/17784#issuecomment-737730395