summaryrefslogtreecommitdiffstats
path: root/test/TEST-50-DISSECT/Makefile (unfollow)
Commit message (Collapse)AuthorFilesLines
2022-07-14smack: fix build failure with -Dsmack=falseasavah1-5/+1
2022-07-14base-filesystem: pick more conservative access mode for /root/Lennart Poettering1-1/+1
Let's not allow anyone to look into /root/ if we create it via the base-filesystem logic. i.e. change 0755 → 0750 as default access mode for /root/, in case we create it if it happens to be missing.
2022-07-14growfs: Expand FS even if underlying block expansion failsundef1-1/+1
This allows growfs to expand the filesystem even when the underlying block device cannot be expanded. This has been useful for example on LUKS devices that have already been expanded using systemd-repart. This works around the following error: ``` root@mobian:/home/mobian# /usr/lib/systemd/systemd-growfs / crypt_resize() of /dev/block/179:2 failed: Operation not permitted ```
2022-07-14man: drop misplaced ','Lennart Poettering1-1/+1
2022-07-14sysctl: also process sysctl requests via the "sysctl.extra" credentialLennart Poettering5-1/+53
2022-07-14update TODOLennart Poettering1-0/+12
2022-07-14kernel-install: add helper for loggingZbigniew Jędrzejewski-Szmek1-36/+30
2022-07-14import-ceds: use the right error variables at four placesLennart Poettering1-4/+4
2022-07-14update TODOLennart Poettering1-0/+13
2022-07-14update TODOLennart Poettering1-2/+4
2022-07-14man/network: ServerAddress= drop "literal" from IP address rangesAndre Kalb1-1/+1
2022-07-14sd-ipv4ll/networkd: Try to select an IPv4 link-local start addressAndre Kalb4-10/+53
2022-07-14growfs: don't actually resize on dry-runundef1-0/+4
This causes systemd-growfs to exit before resizing the partition when `--dry-run` is passed. Resizing during a dry run of a change breaks the users expectations.
2022-07-14update TODOLennart Poettering1-0/+15
2022-07-14growfs: don't reopen fds unnecessarilyLennart Poettering1-8/+15
Instead, just open the mount fd once, and then operate on fds only.
2022-07-14growfs: ensure that we operate on a block device before issuing a block ioctlLennart Poettering1-1/+7
Similar to the previous commit: let's add extra safety so that we don't issue ioctls on the wrong type of inode.
2022-07-14growfs: insist we open a directory when opening fs mount pointLennart Poettering1-1/+1
This is a simple safety check, since we shouldn't invoke ioctls on fds without being reasonably sure they are of the right type since ioctls are overloaded, and we might be tricked hence to execute an operation on an fd which means something different than what we expect.
2022-07-14Revert "logind: don't start user@UID.service instance for background sessions"Michal Sekletar7-20/+17
This reverts commit e73bf3425c0b5a6339388a3a459ce2bac497308b.
2022-07-14Revert "tests: add test for handling of background sessions"Michal Sekletar2-46/+1
This reverts commit bf40417c7cbe0afb185eda97ea46395b1bb74bdf.
2022-07-14Revert "NEWS: mention change in default behavior of background sessions"Michal Sekletar1-8/+0
This reverts commit 1611606fd91648f78137e823d5cc3ac68767e4a2.
2022-07-14update TODOLennart Poettering1-0/+12
2022-07-14tmpfiles: check the directory we were supposed to create, not its parentLennart Poettering1-10/+7
This current code checks the wrong directory. This was broken in 4c39d899ff00e90b7290e4985696f321d7f2726f which converted the previous code incorrectly.
2022-07-14stat-util: replace is_dir() + is_dir_fd() by single is_dir_full() callLennart Poettering2-16/+13
This new call can execute both of the old operations, but also do generic fstatat() like behaviour.
2022-07-14sd-bus: do not pass NULL when received message with invalid typeYu Watanabe1-1/+1
Fixes #24003.
2022-07-14sd-dhcp6-client: fix off-by-one error in parsing dhcp6 optionsYu Watanabe2-2/+44
This fixes error in parsing message when the rapid commit option is located at the end of the message. Fixes an issure reported in #24002.
2022-07-14sd-dhcp6-client: allow NULL option value when length is zeroYu Watanabe1-5/+5
2022-07-14sd-dhcp6-client: add more debugging logs on parsing messageYu Watanabe1-12/+22
2022-07-13network: Add support to select an IPv4 link-local start addressAndre Kalb6-0/+57
2022-07-13network: do not set invalid MAC address for non-ethernet interfaceYu Watanabe3-7/+14
2022-07-13network: NDisc does not require MAC addressYu Watanabe1-10/+0
This effectively revert ba4c7184b320bb8698d470530d46a6c94641cc6e. Fixes #23546.
2022-07-13network: dhcp4: disable DHCPv4 client on interfaces with non-supported typesYu Watanabe1-0/+4
Replaces f42d41cc5f9cd8cac538a1c30fda04d346b5bae2.
2022-07-13Revert "network: configure DHCP clients after MAC address is assigned"Yu Watanabe3-17/+0
This reverts commit f42d41cc5f9cd8cac538a1c30fda04d346b5bae2. DHCPv6 client does not require MAC address. DHCPv4 client will be handled in a different way in a later commit. Partially fixes #23546.
2022-07-13Do not fail EFI build with newer binutilsMichael Biebl1-0/+7
Newer binutils versions currently trigger the following warnings due to a bug in gnu-efi on arm64: /usr/bin/ld.bfd: warning: src/boot/efi/systemd-bootaa64.elf has a LOAD segment with RWX permissions on amd64: /usr/bin/ld.bfd: warning: /usr/lib/crt0-efi-x86_64.o: missing .note.GNU-stack section implies executable stack This results in a build failure due to --fatal-warnings. Work around this issue by suppressing those warnings until gnu-efi has been fixed. See https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1013341
2022-07-13man: lift pam_systemd_homed description to SummaryZbigniew Jędrzejewski-Szmek1-10/+14
Also change the title to describe the module more comprehensively. Follow-up for 90bc309aa2c1430941f4c50f73e681ab3e488bd3. Suggested in https://bugzilla.redhat.com/show_bug.cgi?id=2085485#c5.
2022-07-13test: add test for org.freedesktop.login1.Session SetDisplayDavid Tardon1-0/+39
2022-07-13test: add test for org.freedesktop.login1.Session SetTypeDavid Tardon3-0/+90
2022-07-13test: ensure cleanup functions return successDavid Tardon1-0/+12
Otherwise the return value of the last command is propagated, which may cause spurious test failures. E.g., pkill returns 1 if no process matched, which may be a problem in cleanup session: cleanup_session() { ... pkill -u "$(id -u logind-test-user)" sleep 1 pkill -KILL -u "$(id -u logind-test-user)" } If there are no remaining processes when the final pkill runs, it will return 1 and therefore cleanup_session will return 1 as well.
2022-07-13Add coredump daemons to bug/RFE template component optionsDaan De Meyer2-0/+4
2022-07-13ci: limit which env variables we pass through `sudo`Frantisek Sumsal1-2/+8
to work around #23987.
2022-07-13test-network: save and restore timezoneYu Watanabe1-0/+15
Several DHCP client tests change the system timezone. Let's save the current timezone at the beginning, and restore it with the saved value at the end.
2022-07-13test-network: wait for L2TP tunnels being removedYu Watanabe1-1/+13
Fixes #23985.
2022-07-12logind: don't delay login for root even if systemd-user-sessions.service is ↵Franck Bui7-8/+49
not activated yet If for any reason something goes wrong during the boot process (most likely due to a network issue), system admins should be allowed to log in to the system to debug the problem. However due to the login session barrier enforced by systemd-user-sessions.service for all users, logins for root will be delayed until a (dbus) timeout expires. Beside being confusing, it's not a nice user experience to wait for an indefinite period of time (no message is shown) this and also suggests that something went wrong in the background. The reason of this delay is due to the fact that all units involved in the creation of a user session are ordered after systemd-user-sessions.service, which is subject to network issues. If root needs to log in at that time, logind is requested to create a new session (via pam_systemd), which ultimately ends up waiting for systemd-user-session.service to be activated. This has the bad side effect to block login for root until the dbus call done by pam_systemd times out and the PAM stack proceeds anyways. To solve this problem, this patch orders the session scope units and the user instances only after systemd-user-sessions.service for unprivileged users only.
2022-07-12smack: Add DefaultSmackProcessLabel to user.conf and system.confŁukasz Stelmach9-6/+53
DefaultSmackProcessLabel tells systemd what label to assign to its child process in case SmackProcessLabel is not set in the service file. By default, when DefaultSmackProcessLabel is not set child processes inherit label from systemd. If DefaultSmackProcessLabel is set to "/" (which is an invalid character for a SMACK label) the DEFAULT_SMACK_PROCESS_LABEL set during compilation is ignored and systemd act as if the option was unset.
2022-07-12nspawn: Support relative source paths for --bind and --overlayDaan De Meyer2-23/+66
2022-07-12bcd: Clean up includesJan Janssen2-13/+5
Also, now that bcd.h does not depend on efi.h anymore we can now properly include it in the test instead.
2022-07-12bcd: Use std alignofJan Janssen2-8/+8
2022-07-12boot: Remove _cleanup_freepool_Jan Janssen12-34/+33
2022-07-12boot: Use int instead of INTNJan Janssen2-4/+4
2022-07-12boot: Use uintptr_t when converting EFI_PHYSICAL_ADDRESSJan Janssen1-10/+4
uintptr_t is the more appropriate type when casting to/from pointers.
2022-07-12kernel-install: suppress bogus shellcheck hintZbigniew Jędrzejewski-Szmek1-0/+1
I don't quite understand this, but '{ ! true; }' is not the same as '( ! true )'. In interactive mode, it seems to work as expected. But in a script, it doesn't.