summaryrefslogtreecommitdiffstats
path: root/tmpfiles.d (follow)
Commit message (Collapse)AuthorAgeFilesLines
* tmpfiles: don't recursively descend into journal directories in /varLennart Poettering2015-07-091-1/+1
| | | | | | | | | | | | | | | Do so only in /run. We shouldn't alter ACLs for existing files in /var, but only for new files. If the admin made changes to the ACLs they shouls stay in place. We should still do recursive ACL changes for files in /run, since those are not persistent, and will hence lack ACLs on every boot. Also, /var/log/journal might be quit large, /run/log/journal is usually not, hence we should avoid the recursive descending on /var, but not on /run. Fixes #534
* tmpfiles: automatically remove old machine snapshots at bootLennart Poettering2015-06-152-1/+23
| | | | | | | | | | | | | | | Remove old temporary snapshots, but only at boot. Ideally we'd have "self-destroying" btrfs snapshots that go away if the last last reference to it does. To mimic a scheme like this at least remove the old snapshots on fresh boots, where we know they cannot be referenced anymore. Note that we actually remove all temporary files in /var/lib/machines/ at boot, which should be safe since the directory has defined semantics. In the root directory (where systemd-nspawn --ephemeral places snapshots) we are more strict, to avoid removing unrelated temporary files. This also splits out nspawn/container related tmpfiles bits into a new tmpfiles snippet to systemd-nspawn.conf
* tmpfiles: Fix comment typoColin Guthrie2015-06-011-1/+1
|
* tmpfiles: create /etc/resolv.conf symlink only on bootZbigniew Jędrzejewski-Szmek2015-05-211-1/+1
| | | | | | | | | | We will create the symlink on boot as a fallback to provide name resolution. But if the symlink was removed afterwards, it most likely should not be recreated. Creating it only on boot also solves the issue where it would be created prematurely during installation, before the system was actually booted. https://bugzilla.redhat.com/show_bug.cgi?id=1197204
* tmpfiles: make /home and /var btrfs subvolumes by default when booted up ↵Lennart Poettering2015-04-212-1/+12
| | | | | | | with them missing This way the root subvolume can be left read-only easily, and variable and user data writable with explicit quota set.
* tmpfiles: there's no systemd-forbid-user-logins.service serviceLennart Poettering2015-04-211-1/+1
|
* tmpfiles: Add +C attrib to the journal files directoriesGoffredo Baroncelli2015-04-131-0/+27
| | | | | | | | | | | | | | | | | | | | Add the +C file attribute (NOCOW) to the journal directories, so that the flag is inherited automatically for new journal files created in them. The journal write pattern is problematic on btrfs file systems as it results in badly fragmented files when copy-on-write (COW) is used: the performances decreases substantially over time. To avoid this issue, this tmpfile.d snippet sets the NOCOW attribute to the journal files directories, so newly created journal files inherit the NCOOW attribute that disables copy-on-write. Be aware that the NOCOW file attribute also disables btrfs checksumming for these files, and thus prevents btrfs from rebuilding corrupted files on a RAID filesystem. In a single disk filesystems (or filesystems without redundancy) it is safe to use the NOCOW flags without drawbacks, since the journal files contain their own checksumming.
* tmpfiles.d: only copy /etc/pam.d if PAM is presentRoss Burton2015-03-031-0/+2
| | | | | If HAVE_PAM isn't set then don't attempt to copy /etc/pam.d from the factory, as it doesn't get installed.
* tmpfiles: Remove unnecessary blank line when configured with ↵Sangjung Woo2015-02-021-1/+1
| | | | | | | | "--disable-resolved" This patch removes unnecessary blank line in /usr/lib/tmpfiles.d/etc.conf when configured with "--disable-resolved". (i.e. ENABLE_RESOLVED is not defined)
* tmpfiles: use ACL magic on journal directoriesZbigniew Jędrzejewski-Szmek2015-01-221-0/+8
|
* nspawn,machined: change default container image location from ↵Lennart Poettering2015-01-151-1/+1
| | | | | | | | | | | /var/lib/container to /var/lib/machines Given that this is also the place to store raw disk images which are very much bootable with qemu/kvm it sounds like a misnomer to call the directory "container". Hence, let's change this sooner rather than later, and use the generic name, in particular since we otherwise try to use the generic "machine" preferably over the more specific "container" or "vm".
* tmpfiles.d: upgrade a couple of directories we create at boot to subvolumesLennart Poettering2014-12-282-3/+3
| | | | | In particular we upgrade /var/lib/container, /var/tmp and /tmp to subvolumes.
* build-sys: configure the list of system users, files and directoriesŁukasz Stelmach2014-12-012-1/+4
| | | | | | Choose which system users defined in sysusers.d/systemd.conf and files or directories in tmpfiles.d/systemd.conf, should be provided depending on comile-time configuration.
* tmpfiles.d: Fix directory nameMartin Pitt2014-11-251-1/+1
| | | | The .service uses "/var/lib/container", not "containers".
* tmpfiles.d: Create /var/lib/containersMartin Pitt2014-11-211-0/+2
| | | | | | | | | Create /var/lib/containers so that it exists with an appropriate mode. We want 0700 by default so that users on the host aren't able to call suid root binaries in the container. This becomes a security issue if a user can enter a container as root, create a suid root binary, and call that from the host. (This assumes that containers are caged by mandatory access control or are started as user).
* tmpfiles: make resolv.conf entry conditional on resolved supportTom Gundersen2014-08-272-0/+3
|
* factory: install minimal PAM and nsswitch configKay Sievers2014-07-291-0/+2
|
* journal-remote: add units and read certs from default locationsZbigniew Jędrzejewski-Szmek2014-07-161-0/+11
|
* tmpfiles: explicitly set mode for /run/logLennart Poettering2014-06-301-0/+2
|
* tmpfiles: don't do automatic cleanup in $XDG_RUNTIME_DIRLennart Poettering2014-06-301-1/+1
| | | | | | | | | Now that logind will clean up all IPC resources of a user we should really consider $XDG_RUNTIME_DIR as just another kind of IPC with the same life-cycle logic as the other IPC resources. This should be safe now to do since every user gets his own $XDG_RUNTIME_DIR tmpfs instance with a fixed size limit, so that flooding of it will more effectively be averted.
* tmpfiles: automatically clean up /var/lib/systemd/coredump after 3dLennart Poettering2014-06-191-0/+3
|
* tmpfiles: remove line for automatic clean-ups for /var/cache/man/Lennart Poettering2014-06-171-1/+0
| | | | | | | | | | | | | | | Management of /var/cache/man should move to the distribution package owning the directory (for example, man-db). As man pages are a non-essential part of the system and unnecessary for minimal setups, there's no point in having systemd ship these lines. Distribution packages should make sure the appropriate package for their distribution adopts this line. Ideally, the line is adopted by the upstream package. For Fedora I have filed this bug: https://bugzilla.redhat.com/show_bug.cgi?id=1110274
* tmpfiles: add new "L+" command as stronger version of "L", that removes the ↵Lennart Poettering2014-06-161-1/+1
| | | | | | | destination before creating a symlink Also, make use of this for mtab as long as mount insists on creating it even if we invoke it with "-n".
* tmpfiles: create /etc/resolv.conf as link to networkd's version, if it ↵Lennart Poettering2014-06-151-0/+1
| | | | | | | doesn't exist If /etc/resolv.conf doesn't exist it's better than nothing to make it point to networkd's version.
* tmpfiles: always use relative symlinks from tmpfiles snippetsLennart Poettering2014-06-131-1/+1
|
* tmpfiles: add minimal tmpfiles snippet to rebuild the most essential stuff ↵Lennart Poettering2014-06-131-0/+12
| | | | from /etc
* tmpfiles: don't allow read access to journal files to users not in ↵Lennart Poettering2014-06-111-3/+4
| | | | | | | systemd-journal Also, don't apply access mode recursively to /var/log/journal/*/, since that might be quite large, and should be correct anyway.
* tmpfiles: don't apply sgid and executable bit to journal files, only the ↵Lennart Poettering2014-06-111-2/+2
| | | | directories they are contained in
* tmpfiles: if /var is mounted from tmpfs, we should adjust its access modeLennart Poettering2014-06-111-0/+2
|
* tmpfiles: always recreate the most basic directory structure in /varLennart Poettering2014-06-113-5/+21
| | | | | | Let's allow booting up with /var empty. Only create the most basic directories to get to a working directory structure and symlink set in /var.
* tmpfiles: get rid of "m" lines, make them redundant by "z"Lennart Poettering2014-06-101-2/+2
| | | | | | | "m" so far has been a non-globbing version of "z". Since this makes it quite redundant, let's get rid of it. Remove "m" from the man pages, beef up "z" docs instead, and make "m" nothing more than a compatibility alias for "z".
* networkd: split runtime config dir from state dirTom Gundersen2014-06-031-3/+3
| | | | | | | | | | | | Configuration will be in root:root /run/systemd/network and state will be in systemd-network:systemd-network /run/systemd/netif This matches what we do for logind's seat/session state.
* tmpfiles: systemd.conf - fix ownership of network directoriesTom Gundersen2014-06-021-3/+3
|
* timesyncd: order after tmpfiles to get a working network monitorKay Sievers2014-05-221-0/+1
|
* network: always create /run/systemd/network/linksLennart Poettering2014-05-161-0/+2
| | | | | | | This ways the networkd client library should work even if networkd is not running. http://lists.freedesktop.org/archives/systemd-devel/2014-May/019242.html
* tmpfiles: fix permissions on new journal filesGreg KH2014-04-181-2/+2
| | | | | When starting up journald on a new system, set the proper permissions on the system.journal files, not only on the journal directory.
* tmpfiles: introduce the concept of unsafe operationsZbigniew Jędrzejewski-Szmek2013-12-244-7/+16
| | | | | | | | | | | | | | | | | | | | | | | | Various operations done by systemd-tmpfiles may only be safely done at boot (e.g. removal of X lockfiles in /tmp, creation of /run/nologin). Other operations may be done at any point in time (e.g. setting the ownership on /{run,var}/log/journal). This distinction is largely orthogonal to the type of operation. A new switch --unsafe is added, and operations which should only be executed during bootup are marked with an exclamation mark in the configuration files. systemd-tmpfiles.service is modified to use this switch, and guards are added so it is hard to re-start it by mistake. If we install a new version of systemd, we actually want to enforce some changes to tmpfiles configuration immediately. This should now be possible to do safely, so distribution packages can be modified to execute the "safe" subset at package installation time. /run/nologin creation is split out into a separate service, to make it easy to override. https://bugzilla.redhat.com/show_bug.cgi?id=1043212 https://bugzilla.redhat.com/show_bug.cgi?id=1045849
* namespace: include boot id in private tmp directoriesLennart Poettering2013-12-131-21/+4
| | | | | | | | This way it is easy to only exclude directories from the current boot from automatic clean up in /var/tmp. Also, pick a longer name for the directories so that are globs in tmp.conf can be simpler yet equally accurate.
* tmpfiles: adjust excludes for the new per-service private dirsZbigniew Jędrzejewski-Szmek2013-11-161-0/+17
| | | | | In d8c9d3a (systemd: use unit name in PrivateTmp directories) I forgot to update the tmpfiles config.
* tmpfiles.d: include setgid perms for /run/log/journalDave Reisner2013-10-021-0/+2
| | | | | | | 4608af4333d0f7f5 set permissions for journal storage on persistent disk but not the volatile storage. ref: https://bugs.archlinux.org/task/37170
* Add a bit more explicit message, to help confused usersMichael Scherer2013-09-271-1/+1
| | | | | | | Seeing http://www.happyassassin.net/2013/09/27/further-sysadmin-adventures-wheres-my-freeipa-badge/ it seems that the default message is a bit confusing for people who never encountered it before, so adding a link to the manpage could help them.
* journald: avoid NSS in journaldLennart Poettering2013-09-171-0/+3
| | | | | | | | | | | | In order to avoid a deadlock between journald looking up the "systemd-journal" group name, and nscd (or anyother NSS backing daemon) logging something back to the journal avoid all NSS in journald the same way as we avoid it from PID 1. With this change we rely on the kernel file system logic to adjust the group of created journal files via the SETGID bit on the journal directory. To ensure that it is always set, even after the user created it with a simply "mkdir" on the shell we fix it up via tmpfiles on boot.
* machined: split out machine registration stuff from logindLennart Poettering2013-07-021-0/+1
| | | | | | | Embedded folks don't need the machine registration stuff, hence it's nice to make this optional. Also, I'd expect that machinectl will grow additional commands quickly, for example to join existing containers and suchlike, hence it's better keeping that separate from loginctl.
* Make PrivateTmp dirs also inaccessible from the outsideZbigniew Jędrzejewski-Szmek2013-03-201-2/+4
| | | | | | | | | | | Currently, PrivateTmp=yes means that the service cannot see the /tmp shared by rest of the system and is isolated from other services using PrivateTmp, but users can access and modify /tmp as seen by the service. Move the private /tmp and /var/tmp directories into a 0077-mode directory. This way unpriviledged users on the system cannot see (or modify) /tmp as seen by the service.
* tmpfiles: exclude /var/tmp/systemd-private-* tooZbigniew Jędrzejewski-Szmek2013-01-261-0/+1
|
* tmpfiles: exclude /tmp/systemd-private-* from cleanupZbigniew Jędrzejewski-Szmek2013-01-251-0/+3
| | | | | See http://thread.gmane.org/gmane.comp.sysutils.systemd.devel/6874/focus=6891 Should fix https://bugzilla.redhat.com/show_bug.cgi?id=866693
* tmpfiles: do not make /run/nologin executableMichał Bartoszkiewicz2013-01-191-1/+1
|
* tmpfiles: move legacy flag-files handling to legacy.confTom Gundersen2013-01-072-9/+17
|
* tmpfiles: write /run/nologin during early boot to disallow too early user loginsLennart Poettering2012-06-251-0/+2
| | | | | systemd-user-sessoins.service will later on remove the flag file, thus permitting user logins when the time has come.
* tmpfiles: exclude the first level directories in /run/user from automatic ↵Lennart Poettering2012-06-201-1/+1
| | | | | | | clean up It's logind's job to maintain those user dirs, so avoid automatic clean up for them. However, we do cover everything within them.