summaryrefslogtreecommitdiffstats
path: root/units/systemd-networkd.service.in (follow)
Commit message (Expand)AuthorAgeFilesLines
* units: enable systemd-network-generator by defaultZbigniew Jędrzejewski-Szmek2021-12-161-0/+4
* unit: networkd does not require AF_ALG anymoreYu Watanabe2021-10-151-1/+1
* units: adjust Descriptions of various unitsZbigniew Jędrzejewski-Szmek2021-06-301-1/+1
* meson: use jinja2 for unit templatesZbigniew Jędrzejewski-Szmek2021-05-191-2/+2
* unit: make systemd-networkd.service support reload commandYu Watanabe2020-12-091-0/+1
* license: LGPL-2.1+ -> LGPL-2.1-or-laterYu Watanabe2020-11-091-1/+1
* unit: declare BusName= in all our units that are on the bus, event if they do...Lennart Poettering2020-09-111-0/+1
* networkd: use socket activation when starting networkdMichael Biebl2020-08-261-2/+2
* units: turn on ProtectProc= wherever suitableLennart Poettering2020-08-241-2/+3
* units: add ProtectClock=yesTopi Miettinen2020-04-071-0/+1
* unit: add AF_ALG to systemd-networkd.serviceYu Watanabe2020-01-281-1/+1
* units: set ProtectKernelLogs=yes on relevant unitsKevin Kuehler2019-11-151-0/+1
* meson: allow WatchdogSec= in services to be configuredZbigniew Jędrzejewski-Szmek2019-10-251-1/+1
* networkd: use SIGUSR2 to do a restartZbigniew Jędrzejewski-Szmek2019-10-021-0/+1
* units: deny access to block devicesTopi Miettinen2019-06-201-0/+1
* units: turn on RestrictSUIDSGID= in most of our long-running daemonsLennart Poettering2019-04-021-0/+1
* units: turn of ProtectHostname= again for services hat need to know about sys...Lennart Poettering2019-03-081-1/+0
* units: enable ProtectHostname=yesTopi Miettinen2019-02-201-0/+1
* units: set NoNewPrivileges= for all long-running servicesLennart Poettering2018-11-121-16/+17
* Revert "network: set DynamicUser= to systemd-networkd.service"Zbigniew Jędrzejewski-Szmek2018-09-201-2/+2
* units: switch from system call blacklist to whitelistLennart Poettering2018-06-141-1/+2
* network: set DynamicUser= to systemd-networkd.serviceYu Watanabe2018-05-221-2/+2
* units: set RestrictNamespaces=yes to networkd and resolvedYu Watanabe2018-05-111-0/+1
* Add SPDX license headers to unit filesZbigniew Jędrzejewski-Szmek2017-11-191-0/+2
* units: set LockPersonality= for all our long-running services (#6819)Lennart Poettering2017-09-141-0/+1
* units: make use of !! ExecStart= prefix in systemd-networkd.serviceYu Watanabe2017-08-261-3/+6
* units: do not perform m4 if not necessary (#6575)Yu Watanabe2017-08-091-0/+46
* units: make networkd pull in its own .busname unitTom Gundersen2015-05-151-32/+0
* Revert "units: add SecureBits"Lennart Poettering2015-02-111-1/+0
* units: add SecureBitsTopi Miettinen2015-02-111-0/+1
* networkd: exit on idleTom Gundersen2015-02-051-1/+1
* networkd: support socket activationTom Gundersen2015-02-021-0/+1
* units: networkd - order after udevTom Gundersen2014-09-081-1/+3
* units: minor cleanupsLennart Poettering2014-06-171-2/+3
* networkd: don't pull in systemd-networkd-wait-online service from systemd-net...Lennart Poettering2014-06-171-1/+0
* units: rebuild /etc/passwd, the udev hwdb and the journal catalog files on bootLennart Poettering2014-06-131-1/+1
* units: introduce network-pre.target as place to hook in firewallsLennart Poettering2014-06-111-1/+1
* core: rename ReadOnlySystem= to ProtectSystem= and add a third value for also...Lennart Poettering2014-06-041-2/+2
* core: add new ReadOnlySystem= and ProtectedHome= settings for service unitsLennart Poettering2014-06-031-0/+2
* networkd: drop CAP_SYS_MODULETom Gundersen2014-06-031-1/+1
* networkd: run as unpriviliged "systemd-network" userLennart Poettering2014-06-011-1/+1
* units: remove CAP_SYS_PTRACE capability from hostnamed/networkdLennart Poettering2014-06-011-1/+1
* Revert "networkd: order after udev kernel socket"Tom Gundersen2014-05-161-1/+1
* networkd: unit - add cap to load modulesTom Gundersen2014-05-121-1/+1
* networkd-wait-online: improve interoptability and enable by defaultTom Gundersen2014-04-241-0/+1
* networkd: order after udev kernel socketTom Gundersen2014-04-191-1/+1
* networkd: add CapabilityBoundingSetTom Gundersen2014-03-241-0/+1
* units: networkd shouldn't have PrivateTmp= set, since it runs in early-bootLennart Poettering2014-03-241-1/+0
* core: enable PrivateNetwork= for a number of our long running services where ...Lennart Poettering2014-03-191-0/+1
* install: do not statically enable systemd-networkdJason A. Donenfeld2014-02-211-0/+3