summaryrefslogtreecommitdiffstats
path: root/src/ssh-generator (follow)
Commit message (Collapse)AuthorAgeFilesLines
* ssh-generator: silence "Binding to socket" messagesMantas Mikulėnas12 days1-8/+8
|
* tree-wide: drop doubled empty linesYu Watanabe2024-10-071-1/+0
|
* ssh-generator: make sd_json_dispatch_field table staticYu Watanabe2024-09-181-3/+3
|
* meson: tweak meson conditionalization for ssh{d,}_config drop-insLennart Poettering2024-09-091-1/+1
| | | | Let's make sure "no" is an acceptable setting for these paths.
* sd-varlink: make our internal Varlink API public as sd-varlink.[ch]Lennart Poettering2024-07-161-3/+5
| | | | | | | | | | It's time. sd-json was already done earlier in this cycle, let's now make sd-varlink public too. This is mostly just a search/replace job of epical proportions. I left some functions internal (mostly IDL handling), and I turned some static inline calls into regular calls.
* ssh-proxy: add support for connecting to VMs by AF_VSOCK via "machine/…" ↵Lennart Poettering2024-06-212-15/+70
| | | | | | | host specs With this one can type "ssh machine/foobar" to connect to locally registered machine "foobar" via SSH-over-AF_VSOCK.
* tree-wide: replace strv_sort() + strv_uniq() -> strv_sort_uniq()Yu Watanabe2024-06-171-2/+1
|
* iovec-util: add exported constant empty but valid (i.e. non-NULL) iovecLennart Poettering2024-06-141-3/+3
| | | | | | | | | | Also, make sure the NUL byte iovec becomes an exported constant too. This is better than the previous situation where this was a macro resolving to a compount expression, since the lifetime of the expression is limited to its invoking scope. By turning this into a proper variable the lifetime becomes unbounded, which makes it easier to use in various scenarios, such as "if" blocks.
* vsock-mux ssh proxyДамјан Георгиевски2024-06-121-0/+49
| | | | | | | | allow the ssh-proxy to connect to cloud-hypervisor/Firecracker guests, via their unix-domain socket to AF_VSOCK multiplexer: https://github.com/cloud-hypervisor/cloud-hypervisor/blob/main/docs/vsock.md https://github.com/firecracker-microvm/firecracker/blob/main/docs/vsock.md
* meson: don't put a symlink pointing to '20-systemd-ssh-proxy.conf' in /etc ↵Franck Bui2024-05-271-4/+6
| | | | | | | | in all cases On distros like SUSE where ssh config dropins in /usr are supported, there's no need for a symlink in /etc/ssh/ssh_config.d/ that points to the dropin installed somewhere in /usr (that is not reachable by ssh).
* ssh-generator: fix pointer cast typeMike Yuan2024-05-081-1/+1
|
* Simplify a couple of conditionsFrantisek Sumsal2024-04-021-3/+1
|
* Merge pull request #31670 from CodethinkLabs/vmspawn/generate_ssh_keysLuca Boccassi2024-03-221-2/+3
|\ | | | | vmspawn: generate ssh keys
| * ssh-generator: support ssh.ephemeral-key.all-usersSam Leonard2024-03-141-2/+3
| |
* | ssh-generator: introduce ssh-access.targetLennart Poettering2024-03-141-7/+20
|/ | | | | | | | | | | | | This new passive target is supposed to be pulled in by SSH implementations and should be reached when remote SSH access is possible. The idea is that this target can be used as indicator for other components to determine if and when SSH access is possible. One specific usecase for this is the new sd_notify() logic in PID 1 that sends its own supervisor notifications whenever target units are reached. This can be used to precisely schedule SSH connections from host to VM/container, or just to identify systems where SSH is even available.
* path-lookup: rename lookup_paths_free -> _doneMike Yuan2024-03-061-1/+1
| | | | This is stack-allocated, so update to match our usual rules.
* ssh-generator: don't do AF_VSOCK stuff if we run in a containerLennart Poettering2024-02-291-2/+3
| | | | | | | | | | | Tighten our VM check: whether we run in a VM is not enough to do AF_VSOCK. We also need to check if we are run in a container, because if we run in a container inside a VM then we should *not* do the AF_VSOCK stuff, but leave the port free for the VM itself. As discussed here: https://github.com/systemd/systemd/pull/31544#issuecomment-1971455401
* ssh-generator: handle gracefully if AF_VSOCK works, but /dev/vsock doesn'tLennart Poettering2024-02-291-1/+7
| | | | | | Apparently this case exists, let's handle it gracefully. Prompted by: https://github.com/systemd/systemd/pull/31544#issuecomment-1971241397
* meson: don't install broken tmpfiles config with sshd?confdir == 'no'Frantisek Sumsal2024-01-301-1/+1
| | | | | | | | 20-systemd-ssh-generator.conf expands SSHCONFDIR, which is bogus when we build with -Dsshconfdir=no. Similarly, avoid expanding SSHDCONFDIR in 20-systemd-userdb.conf when building with -Dsshconfdir=no. Follow-up 6c7fc5d5f2.
* meson: correctly handle "no" value for sshd?confdir optionsFrantisek Sumsal2024-01-221-10/+12
|
* ssh-generator: correct log level of one functionLennart Poettering2024-01-171-1/+1
| | | | | add_export_unix_socket() generally logs about errors, but we forgot one case.
* ssh-proxy: add ssh ProxyCommand tool that can connect to AF_UNIX + AF_VSOCK ↵Lennart Poettering2024-01-113-0/+137
| | | | | | | | | | | | | | | | | | | | sockets This adds a tiny binary that is hooked into SSH client config via ProxyCommand and which simply connects to an AF_UNIX or AF_VSOCK socket of choice. The syntax is as simple as this: ssh unix/some/path # (this connects to AF_UNIX socket /some/path) or: ssh vsock/4711 I used "/" as separator of the protocol ID and the value since ":" is already taken by SSH itself when doing sftp. And "@" is already taken for separating the user name.
* ssh-generator: add simple new generatorLennart Poettering2024-01-112-0/+484