Commit Graph

1914 Commits

Author SHA1 Message Date
Lennart Poettering 1d0106996c update TODO 2017-02-01 20:02:17 +01:00
Zbigniew Jędrzejewski-Szmek 6b3d378331 Merge pull request #4879 from poettering/systemd 2017-01-14 21:29:27 -05:00
Lennart Poettering 08422e63b2 update TODO 2016-12-21 19:09:32 +01:00
Lennart Poettering 8eb7383ba8 update TODO 2016-12-14 18:30:05 +01:00
Lennart Poettering f59d1da8cd update TODO 2016-12-14 00:55:12 +01:00
Lennart Poettering 280b29ac84 Merge pull request #4861 from keszybz/dissect-tweaks
A prettification of the dissect code, mkosi and TODO updates
2016-12-11 20:09:04 +01:00
Zbigniew Jędrzejewski-Szmek 347a17d553 TODO: add dissect section 2016-12-10 01:41:50 -05:00
Zbigniew Jędrzejewski-Szmek 1ac7a93574 Merge pull request #4835 from poettering/unit-name-printf
Various specifier resolution fixes.
2016-12-10 01:29:52 -05:00
Reverend Homer 8fb3f00997 tree-wide: replace all readdir cycles with FOREACH_DIRENT{,_ALL} (#4853) 2016-12-09 10:04:30 +01:00
Lennart Poettering 6a9cd374e0 update TODO 2016-12-07 18:47:32 +01:00
Susant Sahani 10452f7c93 core: introduce parse_ip_port (#4825)
1. Listed in TODO.
2. Tree wide replace safe_atou16 with parse_ip_port incase
   it's used for ports.
2016-12-06 12:21:45 +01:00
Douglas Christman 8ea803516e calendarspec: add support for scheduling timers at the end of the month
"*-*~1"       => The last day of every month
"*-02~3..5"   => The third, fourth, and fifth last days in February
"Mon 05~07/1" => The last Monday in May

Resolves #3861
2016-11-23 12:37:43 -05:00
Lennart Poettering 0c426957d8 update TODO 2016-11-17 18:10:30 +01:00
Lennart Poettering 7d992a6ede update TODO 2016-11-16 17:01:46 +01:00
Zbigniew Jędrzejewski-Szmek d85a0f8028 Merge pull request #4536 from poettering/seccomp-namespaces
core: add new RestrictNamespaces= unit file setting

Merging, not rebasing, because this touches many files and there were tree-wide cleanups in the mean time.
2016-11-08 19:54:21 -05:00
Zbigniew Jędrzejewski-Szmek bc8ec170d2 Drop FOREACH_WORD_QUOTED 2016-11-05 18:54:27 -04:00
Lennart Poettering add005357d core: add new RestrictNamespaces= unit file setting
This new setting permits restricting whether namespaces may be created and
managed by processes started by a unit. It installs a seccomp filter blocking
certain invocations of unshare(), clone() and setns().

RestrictNamespaces=no is the default, and does not restrict namespaces in any
way. RestrictNamespaces=yes takes away the ability to create or manage any kind
of namspace. "RestrictNamespaces=mnt ipc" restricts the creation of namespaces
so that only mount and IPC namespaces may be created/managed, but no other
kind of namespaces.

This setting should be improve security quite a bit as in particular user
namespacing was a major source of CVEs in the kernel in the past, and is
accessible to unprivileged processes. With this setting the entire attack
surface may be removed for system services that do not make use of namespaces.
2016-11-04 07:40:13 -06:00
Lennart Poettering 67234d218b update TODO 2016-11-02 08:49:59 -06:00
Lennart Poettering b5bdbcd5ba update TODO 2016-10-20 14:22:43 -04:00
Lennart Poettering da597d2b52 update TODO 2016-10-12 20:33:33 +02:00
Zbigniew Jędrzejewski-Szmek b744e8937c Merge pull request #4067 from poettering/invocation-id
Add an "invocation ID" concept to the service manager
2016-10-11 13:40:50 -04:00
Lennart Poettering 642d6665f4 update TODO 2016-10-10 19:56:45 +02:00
Lennart Poettering a46eac1bbd update TODO 2016-10-07 20:32:23 +02:00
Lennart Poettering d21494ea25 update TODO 2016-10-06 17:27:23 +02:00
Zbigniew Jędrzejewski-Szmek 4a77c53d64 NEWS: add another batch of entries 2016-10-03 07:36:59 -04:00
Zbigniew Jędrzejewski-Szmek dd5e7000cb core: complain if Before= dep on .device is declared
[Unit]
Before=foobar.device

[Service]
ExecStart=/bin/true
Type=oneshot

$ systemd-analyze verify before-device.service
before-device.service: Dependency Before=foobar.device ignored (.device units cannot be delayed)
2016-10-01 22:53:17 +02:00
Zbigniew Jędrzejewski-Szmek 73a99163a7 coredump,catalog: give better notice when a core file is truncated
coredump had code to check if copy_bytes() hit the max_bytes limit,
and refuse further processing in that case.
But in 84ee096044, the return convention for copy_bytes() was changed
from -EFBIG to 1 for the case when the limit is hit, so the condition
check in coredump couldn't ever trigger.
But it seems that *do* want to process such truncated cores [1].
So change the code to detect truncation properly, but instead of
returning an error, give a nice log entry.

[1] https://github.com/systemd/systemd/issues/3883#issuecomment-239106337

Should fix (or at least alleviate) #3883.
2016-09-28 23:50:29 +02:00
Lennart Poettering 0439746492 Update TODO 2016-09-25 10:52:57 +02:00
Susant Sahani 1bc7460bf2 TODO: update networkd TODO 2016-09-15 10:18:22 +05:30
Zbigniew Jędrzejewski-Szmek e031c227cb TODO: remove duplicated item 2016-09-13 20:10:57 -04:00
Zbigniew Jędrzejewski-Szmek 481a2b02a3 Always use unicode ellipsis when ellipsizing
We were already unconditionally using the unicode character when the
input string was not pure ASCII, leading to different behaviour in
depending on the input string.

systemd[1]: Starting printit.service.
python3[19962]: foooooooooooooooooooooooooooooooooooo…oooo
python3[19964]: fooąęoooooooooooooooooooooooooooooooo…oooo
python3[19966]: fooąęoooooooooooooooooooooooooooooooo…ąęąę
python3[19968]: fooąęoooooooooooooooooąęąęąęąęąęąęąęą…ąęąę
systemd[1]: Started printit.service.
2016-09-13 20:10:57 -04:00
Zbigniew Jędrzejewski-Szmek 432b5c8a4d TODO: remove strerror entry
I believe the remaining call sites are legitimate uses which cannot be
easily replaced with %m.
2016-09-13 20:10:57 -04:00
Seraphime Kirkovski 07b0b339d6 machinectl: split OS field in two; print ip addresses (#4058)
This splits the OS field in two : one for the distribution name
and one for the the version id.
Dashes are written for missing fields.
This also prints ip addresses of known machines. The `--max-addresses`
option specifies how much ip addresses we want to see. The default is 1.
When more than one address is written for a machine, a `,` follows it.
If there are more ips than `--max-addresses`, `...` follows the last
address.
2016-08-31 20:06:57 +02:00
Lennart Poettering 2c5f295823 update TODO 2016-08-22 17:31:41 +02:00
Zbigniew Jędrzejewski-Szmek d87a2ef782 Merge pull request #3884 from poettering/private-users 2016-08-06 17:04:45 -04:00
Lennart Poettering d47f681b28 update TODO 2016-08-04 23:08:05 +02:00
Lennart Poettering 8ce9b83a8f update TODO 2016-08-03 20:43:50 +02:00
Lennart Poettering d82047bef5 update TODO 2016-07-22 15:53:45 +02:00
Lennart Poettering 36376e0b71 update TODO 2016-07-21 11:09:24 +02:00
Torstein Husebø 61233823aa treewide: fix typos and remove accidental repetition of words 2016-07-11 16:18:43 +02:00
Douglas Christman 32b5236916 calendarspec: allow ranges in date and time specifications
Resolves #3042
2016-07-01 23:13:58 -04:00
Lennart Poettering 563a69f480 update TODO 2016-07-01 18:39:26 -07:00
Lennart Poettering 3efb871a3c update 2016-06-24 11:45:06 +02:00
Doug Christman 39c38ce17c systemctl: Create new unit files with "edit --force" (#3584) 2016-06-24 08:00:35 +02:00
Lennart Poettering 79e21f7a71 update TODO 2016-06-16 16:48:16 +02:00
Lennart Poettering 0e2e03c67a update TODO 2016-06-14 20:01:45 +02:00
Lennart Poettering 0e3f29f03f update TODO 2016-06-13 16:25:54 +02:00
Lennart Poettering 7a79d1ec08 update TODO 2016-06-10 20:13:29 +02:00
Lennart Poettering f8afc2a9ba update TODO 2016-06-10 18:21:11 +02:00
Lennart Poettering ac83514cbf update TODO 2016-05-30 19:36:25 +02:00
Lennart Poettering 42d61dedcf update TODO 2016-05-12 20:14:46 +02:00
Lennart Poettering 54ff1d6913 update TODO 2016-05-09 15:45:31 +02:00
Lennart Poettering e40a326cef NEWS: bring NEWS a bit up-to-date 2016-05-06 16:55:44 +02:00
Zbigniew Jędrzejewski-Szmek b920500ef1 Merge pull request #3190 from poettering/logind-fixes 2016-05-05 20:28:23 -04:00
Lennart Poettering 89f193fac8 update TODO 2016-05-05 22:50:09 +02:00
Lennart Poettering ed3902530e update TODO 2016-05-05 22:34:47 +02:00
Zbigniew Jędrzejewski-Szmek a819a985e0 Merge pull request #3173 from poettering/dnssec-incapdns-fix
Dnssec incapdns fix
2016-05-03 14:50:43 -04:00
Lennart Poettering 9e2db6894f update TODO 2016-05-02 18:35:09 +02:00
Lennart Poettering 3e8a82dbd0 update TODO 2016-05-02 11:17:07 +02:00
Lennart Poettering f9bf1b8fee update TODO 2016-04-29 16:27:49 +02:00
Lennart Poettering 6809de5bb1 update TODO a bit 2016-04-29 12:23:34 +02:00
Lennart Poettering b8c7afdf4b update TODO 2016-04-22 16:18:32 +02:00
Zbigniew Jędrzejewski-Szmek ccddd104fc tree-wide: use mdash instead of a two minuses 2016-04-21 23:00:13 -04:00
Lennart Poettering 1e555cb52b update TODO 2016-04-12 13:43:33 +02:00
Michal Sekletar e01ff70a77 nspawn: always setup machine id
We check /etc/machine-id of the container and if it is already populated
we use value from there, possibly ignoring value of --uuid option from
the command line. When dealing with R/O image we setup transient machine
id.

Once we determined machine id of the container, we use this value for
registration with systemd-machined and we also export it via
container_uuid environment variable.

As registration with systemd-machined is done by the main nspawn process
we communicate container machine id established by setup_machine_id from
outer child to the main process by unix domain socket. Similarly to PID
of inner child.
2016-04-11 16:43:16 +02:00
Zbigniew Jędrzejewski-Szmek a44202e98b basic/copy: use copy_file_range()
For btrfs, c_f_r() is like BTRFS_IOC_CLONE which we already used, but also
works when max_bytes is set. We do call copy_bytes in coredump code with
max_bytes set, and for large files, so we might see some benefit from using
c_f_r() on btrfs.

For other filesystems, c_f_r() falls back to do_splice_direct(), the same as
sendfile, which we already call, so there shouldn't be much difference.

Tested with test-copy and systemd-coredump on Linux 4.3 (w/o c_f_r)
and 4.5 (w/ c_f_r).
2016-03-17 13:02:18 -04:00
Daniel Mack 232c84b2d2 Remove systemd-bootchart
This commit rips out systemd-bootchart. It will be given a new home, outside
of the systemd repository. The code itself isn't actually specific to
systemd and can be used without systemd even, so let's put it somewhere
else.
2016-02-23 13:30:09 +01:00
Lennart Poettering c8048350b8 update TODO 2016-02-21 20:59:55 +01:00
Lennart Poettering 8eff97a103 Merge pull request #2618 from zonque/busproxy-removal
remove bus-proxyd
2016-02-15 14:54:09 +01:00
Lennart Poettering c834959498 update TODO 2016-02-13 20:33:49 +01:00
Lennart Poettering 479050b363 core: drop Capabilities= setting
The setting is hardly useful (since its effect is generally reduced to zero due
to file system caps), and with the advent of ambient caps an actually useful
replacement exists, hence let's get rid of this.

I am pretty sure this was unused and our man page already recommended against
its use, hence this should be a safe thing to remove.
2016-02-13 11:59:34 +01:00
Daniel Mack 798c486fbc remove bus-proxyd
As kdbus won't land in the anticipated way, the bus-proxy is not needed in
its current form. It can be resurrected at any time thanks to the history,
but for now, let's remove it from the sources. If we'll have a similar tool
in the future, it will look quite differently anyway.

Note that stdio-bridge is still available. It was restored from a version
prior to f252ff17, and refactored to make use of the current APIs.
2016-02-12 19:10:01 +01:00
Lennart Poettering 648b122045 update TODO 2016-02-10 22:54:33 +01:00
Lennart Poettering 2f1a7412b2 update TODO 2016-02-10 16:09:24 +01:00
Lennart Poettering c5962fcff0 update TODO 2016-02-01 22:18:16 +01:00
Tom Gundersen cfd77192c1 Merge pull request #2437 from poettering/dnssec19
nineteenth dnssec patch
2016-01-26 18:07:19 +01:00
Lennart Poettering 590e0ac4bd Merge pull request #2441 from msekletar/killing-spree-excluded-log-v3
shutdown: complain if process excluded from killing spree runs of the same rootfs as PID1 (v3)
2016-01-26 14:50:43 +01:00
Lennart Poettering 720652b30b update TODO
This gets rid of the private DNSSEC TODO and moves it in the main TODO dump site, as the DNSSEC implementation is
pretty complete now, and the remaining bits are low-priority.
2016-01-26 14:42:04 +01:00
Michal Sekletar 1359fffa57 shutdown: complain if process excluded from killing spree runs of the same rootfs as PID1 2016-01-26 14:13:13 +01:00
Zbigniew Jędrzejewski-Szmek ca8625e9f9 TODO: remove syslog broadcasting
This should most likely be implemented as part of journal-netlogd
(https://github.com/systemd/systemd/pull/1890), which it seems
is not going to be merged.

systemctl edit was mentioned twice.
2016-01-23 19:49:00 -05:00
Michal Sekletar 99d7bd1c00 Remove TODO entry
Feature was introduced by 06af2a0
2016-01-22 10:10:45 +01:00
Lennart Poettering 3d39e6e5d4 Update TODO 2016-01-17 20:44:25 +01:00
Lennart Poettering f506d09f71 update TODO 2016-01-13 20:21:36 +01:00
Daniel Mack c57d67f718 Merge pull request #2096 from teg/resolved-cache
Misc resolved cache fixes
2015-12-10 20:48:42 +01:00
Tom Gundersen 2250592422 TODO 2015-12-10 19:47:47 +01:00
Lennart Poettering b43d75c378 importd: drop dkr support
The current code is not compatible with current dkr protocols anyway,
and dkr has a different focus ("microservices") than nspawn anyway
("whole machine containers"), hence drop support for it, we cannot
reasonably keep this up to date, and it creates the impression we'd
actually care for the microservices usecase.
2015-12-10 16:54:41 +01:00
Lennart Poettering daa27350c3 update TODO 2015-11-27 00:46:51 +01:00
Lennart Poettering ccc3e8a104 update TODO 2015-11-24 00:20:39 +01:00
Lennart Poettering 39609489ca update TODO 2015-11-18 17:07:11 +01:00
David Herrmann e25b5a8d73 TODO: sort 2015-11-16 15:05:00 +01:00
Michal Schmidt 7152869f0a Merge pull request #1869 from poettering/kill-overridable
Remove support for RequiresOverridable= and RequisiteOverridable=
2015-11-13 14:04:34 +01:00
Lennart Poettering 63fdeeb7df update TODO 2015-11-12 22:04:49 +01:00
Lennart Poettering 06ce859b58 update TODO 2015-11-12 20:25:39 +01:00
Filipe Brandenburger b4c14404b3 execute: Add new PassEnvironment= directive
This directive allows passing environment variables from the system
manager to spawned services. Variables in the system manager can be set
inside a container by passing `--set-env=...` options to systemd-spawn.

Tested with an on-disk test.service unit. Tested using multiple variable
names on a single line, with an empty setting to clear the current list
of variables, with non-existing variables.

Tested using `systemd-run -p PassEnvironment=VARNAME` to confirm it
works with transient units.

Confirmed that `systemctl show` will display the PassEnvironment
settings.

Checked that man pages are generated correctly.

No regressions in `make check`.
2015-11-11 07:55:23 -08:00
Lennart Poettering bd098bcedd update TODO 2015-11-11 14:32:26 +01:00
Zbigniew Jędrzejewski-Szmek 3917a2bb45 TODO: remove SYSTEMD_PAGER
This is already done in Fedora rawhide.
2015-11-10 18:50:52 -05:00
Lennart Poettering de7399eb74 update TODO 2015-11-10 17:36:53 +01:00
Tom Gundersen 5af12d8b09 Merge pull request #1831 from keszybz/todo-trimming
Todo trimming
2015-11-10 14:43:42 +01:00
Zbigniew Jędrzejewski-Szmek 9f6434a675 man: describe the reason why runlevels are obsolete
Put it at the top of the file, where it's hard to miss.

Also add the mapping of runlevel → target because since it is now
static.

I'm not adding runlevel(7), because we do not want to make obsolete
stuff even more prominent.
2015-11-10 08:16:08 -05:00
Zbigniew Jędrzejewski-Szmek 28f90ea25f man: tweak description of machinectl show
Also, machinectl status is anything but terse. Remove "terse".
2015-11-10 07:53:43 -05:00