summaryrefslogtreecommitdiff
path: root/src
AgeCommit message (Collapse)Author
2013-12-27bus: PORTING-DBUS1 typo fixesThomas Hindoe Paaboel Andersen
2013-12-27bus: PORTING-DBUS1 clarify pool size valueKay Sievers
2013-12-27bus: PORTING-DBUS1 updateKay Sievers
2013-12-27bus: update PORTING-DBUS1Kay Sievers
2013-12-27bus: actually, the kernel does enforce validity of bus names...Lennart Poettering
2013-12-27bus: explain obsoletion of dbus1 .service filesLennart Poettering
2013-12-27bus: refuse invalid names from kbus meta dataLennart Poettering
2013-12-27bus: add some preliminary docs for porting existing dbus1 client libraries ↵Lennart Poettering
to kdbus
2013-12-26bus: update kdbus.hKay Sievers
2013-12-26Use enums to make it obvious what boolean params meanZbigniew Jędrzejewski-Szmek
Suggested-by: Russ Allbery <rra@debian.org>
2013-12-26systemctl: allow globbing in commands which take multiple unit namesZbigniew Jędrzejewski-Szmek
2013-12-26systemctl: drop uninteresting units immediatelyZbigniew Jędrzejewski-Szmek
Also properly free memory if list-unit-files --root=... is used.
2013-12-26systemctl: simplify start_unitZbigniew Jędrzejewski-Szmek
2013-12-26bus: add a temporary hard-coded policy to proxyd to make gdm workLennart Poettering
gdm relies on the policy to deny its own requests to not deadlock. Given that we currently do not enforce any policy in the dbus1 compat proxy service this means that gdm will necessarily deadlock on our systems. To work around this, enforce a fixed policy teomporarily, until we interpret the legacy XML policy in full. Booh, gdm, booh, for requring this and making me waste two days on tracking this brokenness down.
2013-12-26bus: always show messages we sendLennart Poettering
2013-12-26bus: don't process Peer interface messages in the proxyLennart Poettering
2013-12-26bus: make system bus kdbus node world-accessibleLennart Poettering
2013-12-26journalctl: make sure -b --foobar cannot be misunderstood as --boot=--foobarLennart Poettering
2013-12-26Revert "journalctl: remove unexpected behavior of journalctl -b"Lennart Poettering
This reverts commit cf5bccc2bb9569030cb04debbc4208aaca0fe5b4. We should fix thinks properly if they aren't perfect, not just break other things...
2013-12-25build-sys: minor fixes found with cppcheckLennart Poettering
2013-12-25journalctl: remove unexpected behavior of journalctl -bDave Reisner
This flag shouldn't try and consume the following argument. It should behave like every other flag which takes an optional argument when parsed by getopt_long.
2013-12-25bus: add a bit of pure/const decoratorsLennart Poettering
2013-12-25man: document sd_bus_message_get_cookie()Lennart Poettering
2013-12-25bus: rename message "serial" to "cookie"Lennart Poettering
Even if the lower-leveld dbus1 protocol calls it "serial", let's expose the word "cookie" for this instead, as this is what kdbus uses and since it doesn't imply monotonicity the same way "serial" does.
2013-12-25bus: conditionally set cookie_reply/timeout and update kdbus.hKay Sievers
2013-12-25bus: update kdbus.hKay Sievers
2013-12-25bus: set cookie_reply and update kdbus.hKay Sievers
2013-12-25bus: also write debug logs about messages we sendLennart Poettering
2013-12-25bus: be a bit more verbose when debug mode is onLennart Poettering
2013-12-25shared: fix getpeername_pretty() for AF_UNIX socketsLennart Poettering
2013-12-25unit: include peer identity in description of per-connection ↵Lennart Poettering
socket-activated services
2013-12-24sleep-config: fix useless check for swapfile typeDave Reisner
Since 0c6f1f4ea49 the check was useless, because the kernel will ever only write "partition" or "file" there. OTOH, it is possible that "\\040(deleted)" (escaped " (deleted)") will be added for removed files. This should not happen, so add a warning to detect those cases.
2013-12-24tmpfiles: introduce the concept of unsafe operationsZbigniew Jędrzejewski-Szmek
Various operations done by systemd-tmpfiles may only be safely done at boot (e.g. removal of X lockfiles in /tmp, creation of /run/nologin). Other operations may be done at any point in time (e.g. setting the ownership on /{run,var}/log/journal). This distinction is largely orthogonal to the type of operation. A new switch --unsafe is added, and operations which should only be executed during bootup are marked with an exclamation mark in the configuration files. systemd-tmpfiles.service is modified to use this switch, and guards are added so it is hard to re-start it by mistake. If we install a new version of systemd, we actually want to enforce some changes to tmpfiles configuration immediately. This should now be possible to do safely, so distribution packages can be modified to execute the "safe" subset at package installation time. /run/nologin creation is split out into a separate service, to make it easy to override. https://bugzilla.redhat.com/show_bug.cgi?id=1043212 https://bugzilla.redhat.com/show_bug.cgi?id=1045849
2013-12-24bus: properly shift cgroup data returned from kdbus by the container's root ↵Lennart Poettering
before parsing
2013-12-24bus: fix return message if StartServiceByName() in the driver fails dueLennart Poettering
to non-existing service
2013-12-24busctl: show service/session a name belongs to in the list of namesLennart Poettering
Also, don't show machine name by default as this might cause timeouts on non-responding peers.
2013-12-24log: log_error() and friends add a newline after each line anyway, so avoid ↵Lennart Poettering
including it in the log strings
2013-12-24util: don't accept an empty peer label as validLennart Poettering
2013-12-24bus: only accept kdbus creds if they are validLennart Poettering
This allows userspace to fake kdbus creds via struct ucred in the proxy, without making the recieving side choke on the missing fields of the kdbus struct, more precisel pid_starttime and tid
2013-12-24util: unify SO_PEERCRED/SO_PEERSEC invocationsLennart Poettering
Introduce new call getpeercred() which internally just uses SO_PEERCRED but checks if the returned data is actually useful due to namespace quirks.
2013-12-24bus: fix hello ioctl buffer size calculationLennart Poettering
2013-12-24bus: make gcc shut upLennart Poettering
2013-12-24bus: fake client side creds in the proxy to the caller's credsLennart Poettering
2013-12-24bus: allow peeking signatures recusively inside of containersLennart Poettering
Previously we invalidated the peeked signature as soon as the caller would recurse into a container, making stack based handling difficult. With this change we will keep the peeked signature around until the user advances to the next field.
2013-12-23bus: fix assert when serializing fixed size struct to gvariantLennart Poettering
2013-12-23bus: don't attach KDBUS_ITEM_ID to match ioctl() if we don't need itLennart Poettering
2013-12-23bus: fix sender match creation on kdbusLennart Poettering
2013-12-23sd-event: make sd_event_add_signal() fail with EBUSY if signal is not blockedLennart Poettering
2013-12-23core: when we close the notify fd, we also need to free its event sourceLennart Poettering
2013-12-23sd-event: fix return code of sd_event_run()Lennart Poettering