]> git.ipfire.org Git - thirdparty/systemd.git/log
thirdparty/systemd.git
7 months agoMerge pull request #31166 from mrc0mmand/vpick-tweaks
Yu Watanabe [Fri, 2 Feb 2024 00:37:13 +0000 (09:37 +0900)] 
Merge pull request #31166 from mrc0mmand/vpick-tweaks

vpick: make a working copy of the current dname

7 months agotest-network: fix typo
Yu Watanabe [Fri, 2 Feb 2024 00:29:10 +0000 (09:29 +0900)] 
test-network: fix typo

Follow-up for d4c8de21a07d015f2f2c787e0735be5e4d02fb3c.

7 months agotest: fix typo
Yu Watanabe [Fri, 2 Feb 2024 00:27:49 +0000 (09:27 +0900)] 
test: fix typo

Follow-up for fa8ff98ea4886442bebecd337da78e4dac3d0cb1.

7 months agoman/creds: fix typo
Yu Watanabe [Fri, 2 Feb 2024 00:25:51 +0000 (09:25 +0900)] 
man/creds: fix typo

Follow-up for 7704c3474d0f3176f5d84efee5f44f9d815e615f.

7 months agoman: fix typo
Yu Watanabe [Fri, 2 Feb 2024 00:24:22 +0000 (09:24 +0900)] 
man: fix typo

Follow-up for 34bbda18a5f07fa5a52e8d85d20637ce1c00c4ec.

7 months agosd-bus: fix typo
Yu Watanabe [Fri, 2 Feb 2024 00:22:40 +0000 (09:22 +0900)] 
sd-bus: fix typo

Follow-up for 25fd5343ca3a3481d2e0d3f3aebab2fcf4e42bc7.

7 months agosd-bus: fix typo
Yu Watanabe [Fri, 2 Feb 2024 00:21:15 +0000 (09:21 +0900)] 
sd-bus: fix typo

Follow-up for 71be64064c9e22c9edcb0c25d7ccc9e3c9ed1978.

7 months agocreds: fix typo
Yu Watanabe [Fri, 2 Feb 2024 00:20:02 +0000 (09:20 +0900)] 
creds: fix typo

Follow-up for 8464f7cbd652af75566017c62bec5308d1c30775.

7 months agolocal-addresses: fix typo
Yu Watanabe [Fri, 2 Feb 2024 00:18:35 +0000 (09:18 +0900)] 
local-addresses: fix typo

Follow-up for 5cb56068d0aae4c85e97a4ae16e33a7614cdc0bb.

7 months agotpm2-util: fix typo
Yu Watanabe [Fri, 2 Feb 2024 00:17:22 +0000 (09:17 +0900)] 
tpm2-util: fix typo

Follow-up for d37c312b87aeba4a470ad720eda56cdbc9ea2290.

7 months agonetwork/ndisc: fix typo
Yu Watanabe [Fri, 2 Feb 2024 00:15:59 +0000 (09:15 +0900)] 
network/ndisc: fix typo

Follow-up for d4c8de21a07d015f2f2c787e0735be5e4d02fb3c.

7 months agorepart: fix typo
Yu Watanabe [Fri, 2 Feb 2024 00:14:46 +0000 (09:14 +0900)] 
repart: fix typo

Follow-up for a575f2148f5bf619c75b3c2edadd7a94518ae74d.

7 months agocore/unit: fix typo
Yu Watanabe [Fri, 2 Feb 2024 00:13:00 +0000 (09:13 +0900)] 
core/unit: fix typo

Follow-up for 16b6af6adefa4068b10e1a04f46fc895cb9a3af7.

7 months agocgroup-util: fix typo
Yu Watanabe [Fri, 2 Feb 2024 00:11:40 +0000 (09:11 +0900)] 
cgroup-util: fix typo

Follow-up for 677e6c14b199c1fa637b7c4c8cae39c31213a79d.

7 months agouser-util: fix typo
Yu Watanabe [Fri, 2 Feb 2024 00:09:55 +0000 (09:09 +0900)] 
user-util: fix typo

Follow-up for 75673cd8aee5c6174538e71dd36c7a353c836973.

7 months agoTODO: fix typo
Yu Watanabe [Fri, 2 Feb 2024 00:07:28 +0000 (09:07 +0900)] 
TODO: fix typo

Follow-up for fd40e7da6e005644445d2f6cb3363daf1e170b8c.

7 months agocore: use PidRef in exec_spawn
Luca Boccassi [Fri, 12 Jan 2024 21:18:27 +0000 (21:18 +0000)] 
core: use PidRef in exec_spawn

7 months agovpick: use prefix_roota() to avoid double slash in log messages 31166/head
Frantisek Sumsal [Thu, 1 Feb 2024 13:00:48 +0000 (14:00 +0100)] 
vpick: use prefix_roota() to avoid double slash in log messages

If the toplevel_path is empty we end up with doubled leading slash,
which looks weird:

[ 4737.028985] testsuite-74.sh[102]: Inode '//var/lib/machines/mytree.v/mytree_37.0_arm64+2-3' has wrong type, found 'dir'.
[ 4737.028985] testsuite-74.sh[102]: Failed to pick version for '/var/lib/machines/mytree.v': Is a directory
...
[ 4316.957536] testsuite-74.sh[99]: Failed to open '//var/lib/machines/mytree.v/mytree_37.0': No such file or directory
...

7 months agovpick: make a working copy of the current dname
Frantisek Sumsal [Thu, 1 Feb 2024 12:56:37 +0000 (13:56 +0100)] 
vpick: make a working copy of the current dname

Since we might edit the string later on by inserting NULs, which then
leads up to using an invalid dname when opening the potential chosen
directory:

[ 4316.957536] testsuite-74.sh[99]: make_choice: entry: mytree_37.0_arm64+2-3
[ 4316.957536] testsuite-74.sh[99]: make_choice: best_version: 37.0
[ 4316.957536] testsuite-74.sh[99]: make_choice: best_filename: mytree_37.0
[ 4316.957536] testsuite-74.sh[99]: Failed to open '//var/lib/machines/mytree.v/mytree_37.0': No such file or directory

Uncovered by vpick tests from TEST-74-AUX-UTILS when run on aarch64.

7 months agohomework: Use minimal pbkdf2 parameters without benchmark.
Ondrej Kozina [Wed, 31 Jan 2024 15:12:58 +0000 (16:12 +0100)] 
homework: Use minimal pbkdf2 parameters without benchmark.

7 months agobuild(deps): bump actions/upload-artifact from 4.0.0 to 4.3.0
dependabot[bot] [Thu, 1 Feb 2024 09:47:34 +0000 (09:47 +0000)] 
build(deps): bump actions/upload-artifact from 4.0.0 to 4.3.0

Bumps [actions/upload-artifact](https://github.com/actions/upload-artifact) from 4.0.0 to 4.3.0.
- [Release notes](https://github.com/actions/upload-artifact/releases)
- [Commits](https://github.com/actions/upload-artifact/compare/c7d193f32edcb7bfad88892161225aeda64e9392...26f96dfa697d77e81fd5907df203aa23a56210a8)

---
updated-dependencies:
- dependency-name: actions/upload-artifact
  dependency-type: direct:production
  update-type: version-update:semver-minor
...

Signed-off-by: dependabot[bot] <support@github.com>
7 months agoMerge pull request #31107 from yuwata/pam-setcred-vs-close-session
Mike Yuan [Thu, 1 Feb 2024 11:02:40 +0000 (19:02 +0800)] 
Merge pull request #31107 from yuwata/pam-setcred-vs-close-session

core/exec-invoke: call pam_setcred(PAM_DELETE_CRED) after pam_close_session()

7 months agobuild(deps): bump redhat-plumbers-in-action/advanced-issue-labeler
dependabot[bot] [Thu, 1 Feb 2024 09:47:37 +0000 (09:47 +0000)] 
build(deps): bump redhat-plumbers-in-action/advanced-issue-labeler

Bumps [redhat-plumbers-in-action/advanced-issue-labeler](https://github.com/redhat-plumbers-in-action/advanced-issue-labeler) from 2.0.6 to 3.0.0.
- [Release notes](https://github.com/redhat-plumbers-in-action/advanced-issue-labeler/releases)
- [Commits](https://github.com/redhat-plumbers-in-action/advanced-issue-labeler/compare/71bcf99aef4b9ea844db9a43755e8ac02c8e661e...9e55064634b67244f7deb4211452b4a7217b93de)

---
updated-dependencies:
- dependency-name: redhat-plumbers-in-action/advanced-issue-labeler
  dependency-type: direct:production
  update-type: version-update:semver-major
...

Signed-off-by: dependabot[bot] <support@github.com>
7 months agoexec-invoke: update log message a bit 31107/head
Yu Watanabe [Mon, 29 Jan 2024 04:37:57 +0000 (13:37 +0900)] 
exec-invoke: update log message a bit

7 months agocore/exec-invoke: call pam_setcred(PAM_DELETE_CRED) after pam_close_session()
Yu Watanabe [Thu, 25 Jan 2024 18:09:13 +0000 (03:09 +0900)] 
core/exec-invoke: call pam_setcred(PAM_DELETE_CRED) after pam_close_session()

The man page pam_setcred(3) states:
> The credentials should be deleted after the session has been closed
> (with pam_close_session(3)).

Follow-up for 3bb39ea936a51a6a63a8b65a135521df098c32c4.

7 months agoresolve: include interface name in org.freedesktop.resolve1 polkit checks
networkException [Mon, 29 Jan 2024 21:31:59 +0000 (22:31 +0100)] 
resolve: include interface name in org.freedesktop.resolve1 polkit checks

this patch adds the interface name of the interface to be modified
to *details* when verifying dbus calls to the `org.freedesktop.resolve1`
D-Bus interface for all `Set*` and the `Revert` method.

when defining a polkit rule, this allows limiting the access to a specific
interface:

```js
// This rule prevents the user "vpn" to disable DNSoverTLS for any
// other interface than "vpn0". The vpn service should be allowed
// to disable DNSoverTLS on its own as it provides a local DNS
// server with search domains on the interface and this server does
// not support DNSoverTLS.
polkit.addRule(function(action, subject) {
  if (action.id == "org.freedesktop.resolve1.set-dns-over-tls" &&
      action.lookup("interface") == "vpn0" &&
      subject.user == "vpn") {
    return polkit.Result.YES;
  }
});
```

7 months agoMerge pull request #31141 from poettering/resolvectl-more-json
Lennart Poettering [Wed, 31 Jan 2024 17:59:11 +0000 (18:59 +0100)] 
Merge pull request #31141 from poettering/resolvectl-more-json

resolvectl: add JSON output support for "resolvectl query"

7 months agoresolvectl: add basic ANSI markup to --help text 31141/head
Lennart Poettering [Wed, 31 Jan 2024 14:56:58 +0000 (15:56 +0100)] 
resolvectl: add basic ANSI markup to --help text

Underline the sections, as we nowadays do.

7 months agoresolvectl: add JSON output support for "resolvectl query"
Lennart Poettering [Wed, 31 Jan 2024 10:28:12 +0000 (11:28 +0100)] 
resolvectl: add JSON output support for "resolvectl query"

It's easy to add. Let's do so.

This only covers record lookups, i.e. with the --type= switch.

The higher level lookups are not covered, I opted instead to print a
message there to use --type= instead.

I am a bit reluctant to defining a new JSON format for the high-level
lookups, hence I figured for now a helpful error is good enough, that
points people to the right use.

Fixes: #29755
7 months agoMerge pull request #31144 from poettering/less-loopback
Lennart Poettering [Wed, 31 Jan 2024 15:05:37 +0000 (16:05 +0100)] 
Merge pull request #31144 from poettering/less-loopback

don't try to setup a loopback network device unless CLONE_NEWNET is selected (i.e. not in CLONE_NEWIPC case)

7 months agotest: use a dropin for the journald snippet
Frantisek Sumsal [Wed, 31 Jan 2024 09:45:13 +0000 (10:45 +0100)] 
test: use a dropin for the journald snippet

The original way of appending to /etc/systemd/journald.conf doesn't work
anymore, since we no longer ship the default configs in /etc/.

7 months agotest-namespace: SOCK_CLOEXEC'ify all the things 31144/head
Lennart Poettering [Wed, 31 Jan 2024 12:22:33 +0000 (13:22 +0100)] 
test-namespace: SOCK_CLOEXEC'ify all the things

7 months agonamespace: don't invoke loopback_setup() unless we allocate a CLONE_NEWNET namespace
Lennart Poettering [Wed, 31 Jan 2024 12:19:45 +0000 (13:19 +0100)] 
namespace: don't invoke loopback_setup() unless we allocate a CLONE_NEWNET namespace

It doesn't really make sense to initialize the loopback device if we are
not called for a network namespace.

Follow-up for 54c2459d560283f556e331246f64776cebd6eba6

7 months agoman: always install bootctl
Franck Bui [Wed, 31 Jan 2024 07:33:22 +0000 (08:33 +0100)] 
man: always install bootctl

Since dedb925eafee8214ae565b861dfacfc02085f158 /usr/bin/bootctl is always built
so does its man page.

7 months agoMerge pull request #30847 from keszybz/some-docs-updates
Lennart Poettering [Wed, 31 Jan 2024 10:09:56 +0000 (11:09 +0100)] 
Merge pull request #30847 from keszybz/some-docs-updates

Some docs updates

7 months agoupdate TODO
Lennart Poettering [Wed, 31 Jan 2024 09:10:49 +0000 (10:10 +0100)] 
update TODO

7 months agomkosi: Stop using file provides with CentOS/Fedora
Daan De Meyer [Tue, 30 Jan 2024 21:36:12 +0000 (22:36 +0100)] 
mkosi: Stop using file provides with CentOS/Fedora

dnf5 does not download filelists metadata by default anymore as this
consists of a pretty big chunk of the repository metadata. Let's make
sure the filelists metadata doesn't have to be downloaded by dnf5 by
removing any usage of file provides from our package lists.

7 months agohomed: Add InhibitSuspend() method
Adrian Vovk [Sun, 21 Jan 2024 01:29:40 +0000 (20:29 -0500)] 
homed: Add InhibitSuspend() method

This returns an FD that can be used to temporarily inhibit the automatic
locking on system suspend behavior of homed. As long as the FD is open,
LockAllHomes() won't lock that home directory on suspend. This allows
desktop environments to implement custom more complicated behavior

7 months agoMerge pull request #31039 from AdrianVovk/slice-freeze-thaw
Lennart Poettering [Wed, 31 Jan 2024 08:48:05 +0000 (09:48 +0100)] 
Merge pull request #31039 from AdrianVovk/slice-freeze-thaw

Rework slice recursive freeze/thaw

7 months agoMerge pull request #30968 from poettering/per-user-creds
Lennart Poettering [Wed, 31 Jan 2024 08:47:12 +0000 (09:47 +0100)] 
Merge pull request #30968 from poettering/per-user-creds

per-user encrypted credentials

7 months agomeson: fix installation of html doc aliases
Franck Bui [Tue, 30 Jan 2024 08:34:17 +0000 (09:34 +0100)] 
meson: fix installation of html doc aliases

Apparently since 9289e093ae6fd5484f9119e1ee07d1dffe37cd10, "ln_s" takes
*absolute* paths only.

7 months agomeson: don't install broken tmpfiles config with sshd?confdir == 'no'
Frantisek Sumsal [Tue, 30 Jan 2024 10:25:19 +0000 (11:25 +0100)] 
meson: don't install broken tmpfiles config with sshd?confdir == 'no'

20-systemd-ssh-generator.conf expands SSHCONFDIR, which is bogus when we
build with -Dsshconfdir=no. Similarly, avoid expanding SSHDCONFDIR in
20-systemd-userdb.conf when building with -Dsshconfdir=no.

Follow-up 6c7fc5d5f2.

7 months agotest: explicitly set nsec3-iterations to 0
Frantisek Sumsal [Tue, 30 Jan 2024 15:27:58 +0000 (16:27 +0100)] 
test: explicitly set nsec3-iterations to 0

knot v3.2 and later does this by default. knot v3.1 still has the default set to
10, but it also introduced a warning that the default will be changed to 0 in
later versions, so it effectively complains about its own default, which then
fails the config check. Let's just set the value explicitly to zero to avoid
that.

~# knotc --version
knotc (Knot DNS), version 3.1.6
~# grep nsec3-iterations test/knot-data/knot.conf || echo nope
nope
~# knotc -c /build/test/knot-data/knot.conf conf-check
warning: config, policy[auto_rollover_nsec3].nsec3-iterations defaults to 10, since version 3.2 the default becomes 0
Configuration is valid

Follow-up to 0652cf8e7b.

7 months agocore: Fail to start/stop/reload unit if frozen 31039/head
Adrian Vovk [Wed, 24 Jan 2024 00:50:21 +0000 (19:50 -0500)] 
core: Fail to start/stop/reload unit if frozen

Previously, unit_{start,stop,reload} would call the low-level cgroup
unfreeze function whenever a unit was started, stopped, or reloaded. It
did so with no error checking. This call would ultimately recurse up the
cgroup tree, and unfreeze all the parent cgroups of the unit, unless an
error occurred (in which case I have no idea what would happen...)

After the freeze/thaw rework in a previous commit, this can no longer
work. If we recursively thaw the parent cgroups of the unit, there may
be sibling units marked as PARENT_FROZEN which will no longer actually
have frozen parents. Fixing this is a lot more complicated than simply
disallowing start/stop/reload on a frozen unit

Fixes https://github.com/systemd/systemd/issues/15849

7 months agocore: Rework recursive freeze/thaw
Adrian Vovk [Sun, 21 Jan 2024 20:05:20 +0000 (15:05 -0500)] 
core: Rework recursive freeze/thaw

This commit overhauls the way freeze/thaw works recursively:

First, it introduces new FreezerActions that are like the existing
FREEZE and THAW but indicate that the action was initiated by a parent
unit. We also refactored the code to pass these FreezerActions through
the whole call stack so that we can make use of them. FreezerState was
extended similarly, to be able to differentiate between a unit that's
frozen manually and a unit that's frozen because a parent is frozen.

Next, slices were changed to check recursively that all their child
units can be frozen before it attempts to freeze them. This is different
from the previous behavior, that would just check if the unit's type
supported freezing at all. This cleans up the code, and also ensures
that the behavior of slices corresponds to the unit's actual ability
to be frozen

Next, we make it so that if you FREEZE a slice, it'll PARENT_FREEZE
all of its children. Similarly, if you THAW a slice it will PARENT_THAW
its children.

Finally, we use the new states available to us to refactor the code
that actually does the cgroup freezing. The code now looks at the unit's
existing freezer state and the action being requested, and decides what
next state is most appropriate. Then it puts the unit in that state.
For instance, a RUNNING unit with a request to PARENT_FREEZE will
put the unit into the PARENT_FREEZING state. As another example, a
FROZEN unit who's parent is also FROZEN will transition to
PARENT_FROZEN in response to a request to THAW.

Fixes https://github.com/systemd/systemd/issues/30640
Fixes https://github.com/systemd/systemd/issues/15850

7 months agoMerge pull request #31109 from yuwata/nspawn-resolve-network-interface-before-move
Lennart Poettering [Tue, 30 Jan 2024 16:09:11 +0000 (17:09 +0100)] 
Merge pull request #31109 from yuwata/nspawn-resolve-network-interface-before-move

nspawn: resolve network interface names before move to container namespace

7 months agoMerge pull request #31120 from YHNdnzj/strv-env-non-pure
Lennart Poettering [Tue, 30 Jan 2024 16:08:49 +0000 (17:08 +0100)] 
Merge pull request #31120 from YHNdnzj/strv-env-non-pure

env-util: drop _pure_ for strv_env_get_n

7 months agoMerge pull request #31124 from keszybz/various-small-tweaks
Lennart Poettering [Tue, 30 Jan 2024 16:08:21 +0000 (17:08 +0100)] 
Merge pull request #31124 from keszybz/various-small-tweaks

Various small tweaks

7 months agoupdate TODO 30968/head
Lennart Poettering [Mon, 15 Jan 2024 14:03:09 +0000 (15:03 +0100)] 
update TODO

7 months agoman: document new user-scoped credentials
Lennart Poettering [Tue, 16 Jan 2024 15:56:12 +0000 (16:56 +0100)] 
man: document new user-scoped credentials

7 months agotest: add integration test for per-user creds
Lennart Poettering [Tue, 16 Jan 2024 14:22:31 +0000 (15:22 +0100)] 
test: add integration test for per-user creds

7 months agocreds: go via IPC service when unprivileged and trying to access services
Lennart Poettering [Tue, 16 Jan 2024 10:05:22 +0000 (11:05 +0100)] 
creds: go via IPC service when unprivileged and trying to access services

Fixes: #30191
7 months agocreds-util: add IPC client wrapper for new varlink apis
Lennart Poettering [Wed, 17 Jan 2024 20:45:12 +0000 (21:45 +0100)] 
creds-util: add IPC client wrapper for new varlink apis

7 months agocreds: allow Varlink clients to encrypt/decrypt their own credentials without polkit...
Lennart Poettering [Wed, 17 Jan 2024 20:44:01 +0000 (21:44 +0100)] 
creds: allow Varlink clients to encrypt/decrypt their own credentials without polkit authentication

Now that we have the concept of scoped credentials, we can allow
unprivileged clients to encrypt/decrypt them as longed as they are
scoped to them.

7 months agocreds-tool: add --user/--uid= to operate with scoped credentials
Lennart Poettering [Mon, 15 Jan 2024 16:43:15 +0000 (17:43 +0100)] 
creds-tool: add --user/--uid= to operate with scoped credentials

7 months agocreds-util: add a concept of "user-scoped" credentials
Lennart Poettering [Mon, 15 Jan 2024 16:36:44 +0000 (17:36 +0100)] 
creds-util: add a concept of "user-scoped" credentials

So far credentials are a concept for system services only: to encrypt or
decrypt credential you must be privileged, as only then you can access
the TPM and the host key.

Let's break this up a bit: let's add a "user-scoped" credential, that
are specific to users. Internally this works by adding another step to
the acquisition of the symmetric encryption key for the credential: if a
"user-scoped" credential is used we'll generate an symmetric encryption
key K as usual, but then we'll use it to calculate

    K' = HMAC(K, flags || uid || machine-id || username)

and then use the resulting K' as encryption key instead. This basically
includes the (public) user's identity in the encryption key, ensuring
that only if the right user credentials are specified the correct key
can be acquired.

7 months agoMerge pull request #31121 from YHNdnzj/notify-man
Lennart Poettering [Tue, 30 Jan 2024 16:04:31 +0000 (17:04 +0100)] 
Merge pull request #31121 from YHNdnzj/notify-man

notify: a few cleanups

7 months agoMerge pull request #31126 from poettering/sleep-error-msg
Lennart Poettering [Tue, 30 Jan 2024 16:04:15 +0000 (17:04 +0100)] 
Merge pull request #31126 from poettering/sleep-error-msg

sleep: change log level of some log messages

7 months agovarlink: add short comment that the log message is checked in test
Yu Watanabe [Mon, 29 Jan 2024 02:07:17 +0000 (11:07 +0900)] 
varlink: add short comment that the log message is checked in test

Follow-up for 038e4554627c610ae6799d74f9f4bce530d7c283.

7 months agosocket-util: check for sysconf() error before using value
Luca Boccassi [Tue, 30 Jan 2024 12:16:26 +0000 (12:16 +0000)] 
socket-util: check for sysconf() error before using value

Otherwise -1 will be casted to uint32_t. Found by coverity.

CID#1533989

Follow-up for 7e8aa5c2eebd86efe9bbf36d8db1e98964611aab

7 months agoconf-parser: fix OOM check
Antonio Alvarez Feijoo [Tue, 30 Jan 2024 10:59:54 +0000 (11:59 +0100)] 
conf-parser: fix OOM check

7 months agonspawn: resolve network interface names before moving to container network namespace 31109/head
Yu Watanabe [Sat, 27 Jan 2024 18:27:41 +0000 (03:27 +0900)] 
nspawn: resolve network interface names before moving to container network namespace

To escape a kernel issue fixed by
https://github.com/torvalds/linux/commit/8e15aee621618a3ee3abecaf1fd8c1428098b7ef,
let's resolve provided interface names earlier, and adjust the interface
name pairs with the result.

Fixes #31104.

7 months agosd-device: use new interface name resolvers
Yu Watanabe [Sat, 27 Jan 2024 18:35:06 +0000 (03:35 +0900)] 
sd-device: use new interface name resolvers

7 months agosd-netlink: unify network interface name getter and resolvers
Yu Watanabe [Sat, 27 Jan 2024 17:49:22 +0000 (02:49 +0900)] 
sd-netlink: unify network interface name getter and resolvers

This makes rtnl_resolve_interface() always check the existence of the
resolved interface, which previously did not when a decimal formatted
ifindex is provided, e.g. "1" or "42".

7 months agosleep: upgrade fatal log message to LOG_ERR 31126/head
Lennart Poettering [Tue, 30 Jan 2024 10:32:56 +0000 (11:32 +0100)] 
sleep: upgrade fatal log message to LOG_ERR

7 months agosleep: upgrade some unexpected errors to LOG_WARNING log messages
Lennart Poettering [Tue, 30 Jan 2024 10:32:41 +0000 (11:32 +0100)] 
sleep: upgrade some unexpected errors to LOG_WARNING log messages

7 months agosleep: remove redundant debug log message
Lennart Poettering [Tue, 30 Jan 2024 10:31:56 +0000 (11:31 +0100)] 
sleep: remove redundant debug log message

7 months agosleep: add mising error message
Lennart Poettering [Tue, 30 Jan 2024 10:14:42 +0000 (11:14 +0100)] 
sleep: add mising error message

7 months agoman/networkd.conf: remove strange comment 31124/head
Zbigniew Jędrzejewski-Szmek [Thu, 25 Jan 2024 20:31:30 +0000 (21:31 +0100)] 
man/networkd.conf: remove strange comment

Does anyone even read those pages‽

7 months agopstore: align table
Zbigniew Jędrzejewski-Szmek [Thu, 25 Jan 2024 17:34:08 +0000 (18:34 +0100)] 
pstore: align table

7 months agojournald: inline one variable declaration
Zbigniew Jędrzejewski-Szmek [Thu, 25 Jan 2024 15:38:28 +0000 (16:38 +0100)] 
journald: inline one variable declaration

7 months agoshared/pretty-print: inline one more variable declaration
Zbigniew Jędrzejewski-Szmek [Thu, 14 Dec 2023 09:58:19 +0000 (10:58 +0100)] 
shared/pretty-print: inline one more variable declaration

7 months agoshared/pretty-print: use normal else-if cascade
Zbigniew Jędrzejewski-Szmek [Thu, 14 Dec 2023 09:57:05 +0000 (10:57 +0100)] 
shared/pretty-print: use normal else-if cascade

This is not a hot path, but it seems silly to evalute subsequent branches,
which can never match once one has matched. Also, it makes the code harder to
read, because the reader has to first figure out that only one branch can
match.

7 months agobsod: do not use STRLEN
Zbigniew Jędrzejewski-Szmek [Fri, 8 Dec 2023 08:56:43 +0000 (09:56 +0100)] 
bsod: do not use STRLEN

The compiler optimizes strlen away, so we can use the simplest form that is
type safe and more natural. STRLEN is only for array initialization.

7 months agobasic/alloc-util: drop unnecessary parens
Zbigniew Jędrzejewski-Szmek [Tue, 23 Jan 2024 12:01:43 +0000 (13:01 +0100)] 
basic/alloc-util: drop unnecessary parens

By definition, a parameter cannot contain a comma because commas
are used to delimit parameters. So we also don't need to use parens
when the use site is delimited by commas.

7 months agoenv-util: drop _pure_ for strv_env_get_n 31120/head
Mike Yuan [Mon, 29 Jan 2024 17:50:47 +0000 (01:50 +0800)] 
env-util: drop _pure_ for strv_env_get_n

This function calls getenv() internally, making it
non-pure, as envvars can change between two calls
even if passed arguments are the same.

7 months agoenv-util: don't use strlen_ptr if known non-NULL
Mike Yuan [Mon, 29 Jan 2024 17:50:01 +0000 (01:50 +0800)] 
env-util: don't use strlen_ptr if known non-NULL

7 months agonotify: warn if notify msg specified along with --booted 31121/head
Mike Yuan [Mon, 29 Jan 2024 18:12:15 +0000 (02:12 +0800)] 
notify: warn if notify msg specified along with --booted

7 months agonotify: don't exit silently when --exec but no msg
Mike Yuan [Mon, 29 Jan 2024 18:07:35 +0000 (02:07 +0800)] 
notify: don't exit silently when --exec but no msg

Before this commit, if --exec is used but no message shall
be sent, we silently ignore --exec and exit, which is pretty
surprising. Therefore, let's emit clear error instead.

7 months agoman/systemd-notify: don't say "the latter" if more than 2 options
Mike Yuan [Mon, 29 Jan 2024 17:59:59 +0000 (01:59 +0800)] 
man/systemd-notify: don't say "the latter" if more than 2 options

7 months agonotify: if execve() failed, always show original error
Mike Yuan [Sun, 28 Jan 2024 16:17:09 +0000 (00:17 +0800)] 
notify: if execve() failed, always show original error

7 months agonotify: deduplicate ppid handling
Mike Yuan [Sun, 28 Jan 2024 16:15:00 +0000 (00:15 +0800)] 
notify: deduplicate ppid handling

7 months agonotify: minor modernizations
Mike Yuan [Sun, 28 Jan 2024 16:14:21 +0000 (00:14 +0800)] 
notify: minor modernizations

7 months agoMerge pull request #31106 from poettering/bus-creds-pidref
Luca Boccassi [Mon, 29 Jan 2024 19:19:17 +0000 (19:19 +0000)] 
Merge pull request #31106 from poettering/bus-creds-pidref

sd-bus: port "sd_bus_creds" object to pidfds and use it everywhere

7 months agoupdate TODO 31106/head
Lennart Poettering [Fri, 26 Jan 2024 17:42:33 +0000 (18:42 +0100)] 
update TODO

7 months agoman: document the new APIs
Lennart Poettering [Fri, 26 Jan 2024 18:00:43 +0000 (19:00 +0100)] 
man: document the new APIs

7 months agotree-wide: port various things over to new pidref helpers
Lennart Poettering [Fri, 26 Jan 2024 17:41:24 +0000 (18:41 +0100)] 
tree-wide: port various things over to new pidref helpers

THis not only mkaes a lot of code shorter, but also safer, as we pin the
clients via a pidfd.

7 months agobus-util: add helper for getting PidRef structs from bus
Lennart Poettering [Fri, 26 Jan 2024 17:40:09 +0000 (18:40 +0100)] 
bus-util: add helper for getting PidRef structs from bus

This adds two helpers: one for extracting a PidRef from an sd_bus_creds
object, and one from doing this from and sd_bus_message object.

7 months agosd-bus: tighten rules on sd_bus_query_sender_creds() a bit
Lennart Poettering [Fri, 26 Jan 2024 17:01:25 +0000 (18:01 +0100)] 
sd-bus: tighten rules on sd_bus_query_sender_creds() a bit

Let's always derive credentials from a bus name or a conneciton fd if we
can, because they pin things.

Let's not go via PID really, because it's always racy to do so.

Note that this doesn't change much, since we wouldn't use such augmented
data for auth anyway (because it will be masked in the
sd_bus_creds.augmented mask as untrusted). But still, let's prefer
trusted data over untrusted data.

7 months agosd-bus: also read supplementary gids from bus driver
Lennart Poettering [Fri, 26 Jan 2024 16:09:02 +0000 (17:09 +0100)] 
sd-bus: also read supplementary gids from bus driver

7 months agosd-bus: add pidfd to the sd_bus_creds structure
Lennart Poettering [Fri, 26 Jan 2024 15:46:09 +0000 (16:46 +0100)] 
sd-bus: add pidfd to the sd_bus_creds structure

Let's continue with the pidfd'ification, and include pidfd in our
sd_bus_creds structure tha tracks a peers credentials.

7 months agosocket-util: start SO_PEERGROUP loop with sysconf(_SC_NGROUPS_MAX), too
Lennart Poettering [Mon, 29 Jan 2024 09:18:30 +0000 (10:18 +0100)] 
socket-util: start SO_PEERGROUP loop with sysconf(_SC_NGROUPS_MAX), too

We do this for getgroups_malloc() hence we should do this here too,
after all whether we do it for a socket peer or for ourselves doesn't
make too much of a difference.

7 months agoFix bug where systemd-tmpfiles gets stuck on fifos in tmp.
r-vdp [Mon, 29 Jan 2024 10:21:12 +0000 (11:21 +0100)] 
Fix bug where systemd-tmpfiles gets stuck on fifos in tmp.

Fixes #30690.

7 months agoMerge pull request #31108 from yuwata/core-trivial-cleanups
Mike Yuan [Sat, 27 Jan 2024 18:08:54 +0000 (02:08 +0800)] 
Merge pull request #31108 from yuwata/core-trivial-cleanups

core: several trivial cleanups

7 months agocore/service: introduce SERVICE_STATE_WITH_{MAIN,CONTROL}_PROCESS() 31108/head
Yu Watanabe [Fri, 26 Jan 2024 07:11:10 +0000 (16:11 +0900)] 
core/service: introduce SERVICE_STATE_WITH_{MAIN,CONTROL}_PROCESS()

7 months agocore/socket: introduce SOCKET_STATE_WITH_PROCESS() helper function
Yu Watanabe [Fri, 26 Jan 2024 06:23:20 +0000 (15:23 +0900)] 
core/socket: introduce SOCKET_STATE_WITH_PROCESS() helper function

7 months agocore/unit: update outdated comment
Yu Watanabe [Thu, 25 Jan 2024 09:21:41 +0000 (18:21 +0900)] 
core/unit: update outdated comment

Follow-up for 37eb258e91c780fd6fe5e44110abd9da71dce6de.

7 months agounits: Order pcrlock services after systemd-remounts-fs.service
Daan De Meyer [Fri, 26 Jan 2024 10:29:35 +0000 (11:29 +0100)] 
units: Order pcrlock services after systemd-remounts-fs.service

These write to /var and as such need to wait until after the rootfs
has been remounted read-write.

7 months agotimesyncd: make the transmit timestamp in requests fully random
David Venhoek [Fri, 26 Jan 2024 09:40:03 +0000 (10:40 +0100)] 
timesyncd: make the transmit timestamp in requests fully random

This improves security against off-path attackers, and avoids leaking
the current system time.

7 months agotest: use lstat() instead of stat(follow_symlinks=False)
Frantisek Sumsal [Fri, 26 Jan 2024 13:28:20 +0000 (14:28 +0100)] 
test: use lstat() instead of stat(follow_symlinks=False)

This makes the test compatible with Python 3.9, as the follow_symlinks
keyword was introduced in Python 3.10.