summaryrefslogtreecommitdiff
AgeCommit message (Collapse)Author
2012-09-19util: fix bad strstrip() return value in normalize_env_assignment()Lennart Poettering
https://bugzilla.redhat.com/show_bug.cgi?id=858780
2012-09-19path: support specifier resolvin in .path unitsLennart Poettering
2012-09-19libudev: remove dead codeKay Sievers
2012-09-19timedated: unregister the right bus serviceLennart Poettering
https://bugzilla.redhat.com/show_bug.cgi?id=858771
2012-09-19update TODOLennart Poettering
2012-09-19logind: if a lid-switch lock was taken while the lid was closed, recheck lid ↵Lennart Poettering
status when the lock is released
2012-09-19logind: properly parse handle-lid-switch inhibitorLennart Poettering
2012-09-19man: document new inhibitor typesLennart Poettering
2012-09-19logind: rework power key/suspend key/lid switch handlingLennart Poettering
http://lists.freedesktop.org/archives/systemd-devel/2012-September/006604.html https://bugzilla.gnome.org/show_bug.cgi?id=680689 This changes the meaning of the HandlePowerKey=/HandleSleepKey=/HandleLidSwitch= setting of logind.conf
2012-09-19journal: when comparing two entries from separate files make sure we ↵Lennart Poettering
reposition the mmap window The mmap cache doesn't guarantee that we can look at two files at the same time. Hence make sure to look at the entries to compare one after the other, instead of at the same time when comparing them, and reposition the window in between.
2012-09-19mount: reword directory empty warning a bitLennart Poettering
2012-09-19systemctl: warn about triggering units only at the endZbigniew Jędrzejewski-Szmek
Instead of checking each unit separately, check once at the end. This should avoid spurious warnings about a service being triggerable by other stuff.
2012-09-19systemctl: properly report successZbigniew Jędrzejewski-Szmek
Systemctl would always return 1, because it treated uninteresting dbus messages ("job added") as errors. Just ignore everything apart from interesting ("job removed") messages.
2012-09-19systemctl: use automatic cleanup once moreZbigniew Jędrzejewski-Szmek
Semantics are slightly different, because before unit_name_mangle returning NULL was ignored, and now it is reported as oom. But unit_name_mangle only returns NULL on oom.
2012-09-19systemctl: use automatic cleanupZbigniew Jędrzejewski-Szmek
Introduce a helper method to unref dbus messages and use it.
2012-09-18core: move ManagerRunningAs to sharedZbigniew Jędrzejewski-Szmek
Note: I did s/MANAGER/SYSTEMD/ everywhere, even though it makes the patch quite verbose. Nevertheless, keeping MANAGER prefix in some places, and SYSTEMD prefix in others would just lead to confusion down the road. Better to rip off the band-aid now.
2012-09-18automount: also whine if an automount directory is not emptyLennart Poettering
2012-09-18mount: notify the user if we over-mount a non-empty directoryLennart Poettering
https://bugzilla.redhat.com/show_bug.cgi?id=858266
2012-09-18update TODOLennart Poettering
2012-09-18mount: don't mount securityfs in a containerLennart Poettering
2012-09-18unit-printf: add specifiers for the host name, machine id, boot idLennart Poettering
2012-09-18unit-printf: before resolving exec context specifiers check whether the ↵Lennart Poettering
object actually has an exec context
2012-09-18unit: split unit_printf() and friends into its own .c fileLennart Poettering
2012-09-18unit: fix %f resolvingLennart Poettering
2012-09-18journalctl: don't choke on entries with no MESSAGE= fieldLennart Poettering
https://bugs.freedesktop.org/show_bug.cgi?id=50177
2012-09-18docs: typos in loginctl.xmlThomas Hindoe Paaboel Andersen
2012-09-18target: imply default ordering for PartsOf deps as wellLennart Poettering
2012-09-18execute: apply PAM logic only to main process if PermissionsStartOnly is setLennart Poettering
https://bugs.freedesktop.org/show_bug.cgi?id=54176
2012-09-18selinux: rework method tail, make it into a nulstr arrayLennart Poettering
2012-09-18selinux: use existing library calls for audit dataLennart Poettering
2012-09-18selinux: prefer source path over fragment pathLennart Poettering
2012-09-18util: introduce get_process_gid()Lennart Poettering
2012-09-18selinux: add bus service access controlDaniel J Walsh
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 This patch adds the ability to look at the calling process that is trying to do dbus calls into systemd, then it checks with the SELinux policy to see if the calling process is allowed to do the activity. The basic idea is we want to allow NetworkManager_t to be able to start and stop ntpd.service, but not necessarly mysqld.service. Similarly we want to allow a root admin webadm_t that can only manage the apache environment. systemctl enable httpd.service, systemctl disable iptables.service bad. To make this code cleaner, we really need to refactor the dbus-manager.c code. This has just become a huge if-then-else blob, which makes doing the correct check difficult. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.12 (GNU/Linux) Comment: Using GnuPG with Mozilla - http://www.enigmail.net/ iEYEARECAAYFAlBJBi8ACgkQrlYvE4MpobOzTwCdEUikbvRWUCwOb83KlVF0Nuy5 lRAAnjZZNuc19Z+aNxm3k3nwD4p/JYco =yops -----END PGP SIGNATURE-----
2012-09-18Update TODOLennart Poettering
2012-09-18logind: split up inhibit acquire policyLennart Poettering
2012-09-17journald: log when we fail to forward messages to syslogLennart Poettering
https://bugzilla.redhat.com/show_bug.cgi?id=847207
2012-09-17log: avoid function loopLennart Poettering
https://bugs.freedesktop.org/show_bug.cgi?id=54766
2012-09-17conf-parser: don't unescape parsed configuration strings by defaultLennart Poettering
In many cases this might have a negative effect since we drop escaping from strings where we better shouldn't have dropped it. If unescaping makes sense for some settings we can readd it later again, on a per-case basis. https://bugs.freedesktop.org/show_bug.cgi?id=54522
2012-09-17logind: make VT reservation logic compatible with containersLennart Poettering
2012-09-17main: newer kernels return EINVAL if we invoke reboot() in a container ↵Lennart Poettering
lacking perms, deal with it
2012-09-17util: various cleanups for printing boot statusLennart Poettering
2012-09-17git: update .gitignoreLennart Poettering
2012-09-17utmp: read the right timestampLennart Poettering
2012-09-17main: when transitioning from initrd to the main system log to kmsgLennart Poettering
When the new PID is invoked the journal socket from the initrd might still be around. Due to the default log target being journal we'd log to that initially when the new main systemd initializes even if the kernel command line included a directive to redirect systemd's logging elsewhere. With this fix we initially always log to kmsg now, if we are PID1, and only after parsing the kernel cmdline try to open the journal if that's desired. (The effective benefit of this is that SELinux performance data is now logged again to kmsg like it used to be.)
2012-09-17hwclock: always set the kernel's timezoneKay Sievers
Properly tell the kernel at bootup, and any later time zone changes, the actual system time zone. Things like the kernel's FAT filesystem driver needs the actual time zone to calculate the proper local time to use for the on-disk time stamps. https://bugzilla.redhat.com/show_bug.cgi?id=802198
2012-09-17main: bump up RLIMIT_NOFILE for systemd itselfLennart Poettering
For setups with many listening sockets the default kernel resource limit of 1024 fds is not enough. Bump this up to 64K to avoid any limitations in this regard. We are careful to pass on the kernel default to daemons however, since normally resource limits are a good to enforce, especially since select() can't handle fds > 1023.
2012-09-17journald: properly update perms on freshly rotate user journalsLennart Poettering
2012-09-17service: don't hit an assert if a service unit changes type and we get a ↵Lennart Poettering
spurious event from before
2012-09-17update TODOLennart Poettering
2012-09-17udev: add btrfs supportKay Sievers
All "btrfs" file systems will be registered with the kernel when they show up. Incomplete multi-device volumes will set SYSTEMD_READY=0, to prevent access until the volume is complete and fully registered.