Lennart Poettering [Thu, 2 May 2024 12:26:21 +0000 (14:26 +0200)]
libsystemd: turn json.[ch] into a public API
This is preparation for making our Varlink API a public API. Since our
Varlink API is built on top of our JSON API we need to make that public
first (it's a nice API, but JSON APIs there are already enough, this is
purely about the Varlink angle).
I made most of the json.h APIs public, and just placed them in
sd-json.h. Sometimes I wasn't so sure however, since the underlying data
structures would have to be made public too. If in doubt I didn#t risk
it, and moved the relevant API to src/libsystemd/sd-json/json-util.h
instead (without any sd_* symbol prefixes).
This is mostly a giant search/replace patch.
Lennart Poettering [Wed, 22 May 2024 20:13:57 +0000 (22:13 +0200)]
json: merge json_dispatch_path() + json_dispatch_absolute_path()
The functions more or less do the same thing. Merge them.
This makes json_dispatch_path() the common resulting implementation. it
learnt:
1. Will reset the path to NULL if specified as null in JSON
2. Depending on the JSON_SAFE flag will insist on normalized path or not
With this the two implementations are identical, except for the
differences now toggable via JSON_SAFE flag
Yu Watanabe [Tue, 11 Jun 2024 18:53:12 +0000 (03:53 +0900)]
Reapply "network: add "mac" to alternatives name policy by default"
This reverts commit
152c8946b3a93bb2c086568832d614cb54f11e13.
The kernel patch
https://lore.kernel.org/linux-usb/
20240605153340.25694-1-gmazyland@gmail.com/
is now in net-next branch, and will be hopefully merged soon.
Note that Debian's 73-usb-net-by-mac.link now also supports the kernel patch:
https://salsa.debian.org/systemd-team/systemd/-/commit/
c1afbb2dc295929085be86072c7942c8517ec598
So, hopefully, the change is ready. Let's reapply it.
Lennart Poettering [Wed, 12 Jun 2024 16:04:11 +0000 (18:04 +0200)]
Merge pull request #33100 from dtardon/crypttab-parse-all
cryptsetup-generator: continue parsing after error
Lennart Poettering [Wed, 12 Jun 2024 15:35:56 +0000 (17:35 +0200)]
Merge pull request #33045 from poettering/exit-on-idle-tweaks
bus-util: honour new env var $SYSTEMD_ALLOW_IDLE to permit turning off exit-on-idle logic in hostnamed, timedated, …
Lennart Poettering [Wed, 12 Jun 2024 10:11:50 +0000 (12:11 +0200)]
creds-util: fix "weak" vs. "secure" display for tmpfs/noswap backed credentials
When we display passed credentials we show a brief safety level based on
how the credential is pass in: if it's backed by swappable memory we
give it a "weak" level. This check was so far done by checking if the
file is backed by ramfs. However, since
1155f44f48f8fd59c863d71b3938e34a0b2fec2a we actually prefer tmpfs with
the new "noswap" option for this.
Hence, fix this, and explicitly look for "noswap" among the mount
options in case we detect tmpfs.
David Tardon [Wed, 12 Jun 2024 12:35:34 +0000 (14:35 +0200)]
shell-completion: only offer devices for completion
This skips directories and other stuff like /dev/core, /dev/initctl or
/dev/log.
Luca Boccassi [Wed, 12 Jun 2024 14:57:58 +0000 (15:57 +0100)]
Merge pull request #33287 from bluca/release_doc
docs/news: updates for stable releases
Luca Boccassi [Tue, 11 Jun 2024 22:09:30 +0000 (23:09 +0100)]
NEWS: note that new stable releases will be in the main repo
Luca Boccassi [Tue, 11 Jun 2024 22:07:17 +0000 (23:07 +0100)]
docs: update RELEASE.md to use same repository for stable branches
Daan De Meyer [Mon, 3 Jun 2024 10:35:29 +0000 (12:35 +0200)]
repart: Use CRYPT_ACTIVATE_PRIVATE
Let's skip udev device scanning when activating a LUKS volume in
systemd-repart as we don't depend on any udev symlinks and don't
expect anything except repart to access the volume.
Suggested by https://github.com/systemd/systemd/issues/33129#issuecomment-
2143390941.
Frantisek Sumsal [Wed, 12 Jun 2024 10:09:25 +0000 (12:09 +0200)]
test: dump a simple summary at the end of TEST-02-UNITTEST
Let's dump a list of skipped tests and logs from failed tests at the end
of TEST-02-UNITTEST to make debugging fails in CI slightly less painful.
Antonio Alvarez Feijoo [Wed, 12 Jun 2024 10:08:03 +0000 (12:08 +0200)]
test-ip-protocol-list: include missing_network.h instead of netinet/in.h
This fixes the build for glibc < 2.32
Follow-up for
3f69070598b569bf20f5c296ff21f861bfe003e3
Luca Boccassi [Wed, 12 Jun 2024 13:02:25 +0000 (14:02 +0100)]
Merge pull request #33284 from yuwata/hwdb-optimize
hwdb: improve performance
Lennart Poettering [Wed, 12 Jun 2024 13:01:55 +0000 (15:01 +0200)]
Merge pull request #32810 from poettering/smbios11-analyze
analyze: add new verb "smbios11" for listing passed smbios type #11 strings
Lennart Poettering [Wed, 8 May 2024 08:39:29 +0000 (10:39 +0200)]
bus-util: add log message when exiting because of idle
Lennart Poettering [Wed, 8 May 2024 08:38:52 +0000 (10:38 +0200)]
bus-util: add env var for disabling exit-on-idle
Lennart Poettering [Sat, 11 May 2024 15:00:36 +0000 (17:00 +0200)]
update TODO
Lennart Poettering [Sat, 11 May 2024 14:59:17 +0000 (16:59 +0200)]
analyze: add verb for dumping SMBIOS Type #11 data
I find myself wanting to check this data with a quick command, and
browsing through /sys/ manually getting binary data sucks. Hence let's
do add a nice little analysis tool.
Lennart Poettering [Sat, 11 May 2024 14:57:51 +0000 (16:57 +0200)]
core: split out smbios type 11 reader into src/shared/smbios11.[ch]
Yu Watanabe [Wed, 12 Jun 2024 10:12:37 +0000 (19:12 +0900)]
Merge pull request #32961 from YHNdnzj/starttime-main
core/service: try to query for new main process's starttime
Yu Watanabe [Wed, 12 Jun 2024 10:09:00 +0000 (19:09 +0900)]
Merge pull request #32805 from YHNdnzj/no-cred-mount-unit
core/mount: stop generating mount units for cred mounts
Daan De Meyer [Sun, 2 Jun 2024 14:24:52 +0000 (16:24 +0200)]
repart: Use crypt_reencrypt_run() if available
crypt_reencrypt() is deprecated, so let's look for and prefer
crypt_reencrypt_run() if it is available.
Ronan Pigott [Fri, 8 Mar 2024 20:40:08 +0000 (13:40 -0700)]
resolved: permit dnssec rrtype questions when we aren't validating
This check introduced in
91adc4db33f6 is intended to spare us from
encountering broken resolver behavior we don't want to deal with.
However if we aren't validating we more than likely don't know the state
of the upstream resolver's support for dnssec. Let's let clients try
these queries if they want.
This brings the behavior of sd-resolved in-line with previouly stated
change in the meaning of DNSSEC=no, which now means "don't validate"
rather than "don't validate, because the upstream resolver is declared to
be dnssec-unaware".
Fixes:
9c47b334445a ("resolved: enable DNS proxy mode if client wants DNSSEC")
David Tardon [Thu, 30 May 2024 11:33:57 +0000 (13:33 +0200)]
cryptsetup-generator: always process cmdline devices
David Tardon [Thu, 30 May 2024 11:32:20 +0000 (13:32 +0200)]
cryptsetup-generator: parse all cmdline devices too
David Tardon [Thu, 30 May 2024 08:46:13 +0000 (10:46 +0200)]
cryptsetup-generator: continue parsing after error
Let's make the crypttab parser more robust and continue even if parsing
of a line failed.
David Tardon [Thu, 30 May 2024 08:44:36 +0000 (10:44 +0200)]
cryptsetup-generator: refactor add_crypttab_devices()
Move the processing of a crypttab entry to a separate function.
No functional changes, just refactoring.
Yu Watanabe [Wed, 12 Jun 2024 09:44:30 +0000 (18:44 +0900)]
Merge pull request #33074 from keszybz/bpf-fd-handling
Small cleanups in bpf code
Yu Watanabe [Wed, 12 Jun 2024 09:42:14 +0000 (18:42 +0900)]
Merge pull request #33071 from keszybz/sd_event_source-cleanup
Clean up calls to sd_event_source_set_enabled()
Yu Watanabe [Wed, 12 Jun 2024 09:38:09 +0000 (18:38 +0900)]
Merge pull request #32972 from keszybz/small-cleanups
Small cleanups
Дамјан Георгиевски [Mon, 20 May 2024 14:36:56 +0000 (16:36 +0200)]
vsock-mux ssh proxy
allow the ssh-proxy to connect to cloud-hypervisor/Firecracker guests,
via their unix-domain socket to AF_VSOCK multiplexer:
https://github.com/cloud-hypervisor/cloud-hypervisor/blob/main/docs/vsock.md
https://github.com/firecracker-microvm/firecracker/blob/main/docs/vsock.md
Yu Watanabe [Wed, 12 Jun 2024 09:35:13 +0000 (18:35 +0900)]
Merge pull request #32933 from YHNdnzj/faccessat-empty-path
fs-util: several cleanups
Yu Watanabe [Sun, 19 May 2024 05:21:28 +0000 (14:21 +0900)]
core: invoke_main_loop() does not return MANAGER_RELOAD
Follow-up for
5409c6fcc55e6700360546c42edd4a021ee5014e.
Daan De Meyer [Fri, 17 May 2024 14:20:11 +0000 (16:20 +0200)]
tpm2-setup: Don't fail if we can't access the TPM due to authorization failure
The TPM might be password/pin protected for various reasons even if
there is no SRK yet. Let's handle those cases gracefully instead of
failing the unit as it is enabled by default.
Yu Watanabe [Wed, 12 Jun 2024 09:28:33 +0000 (18:28 +0900)]
Merge pull request #32847 from YHNdnzj/exitrd
shutdown: several cleanups, rename initrd to exitrd
Yu Watanabe [Wed, 12 Jun 2024 09:25:24 +0000 (18:25 +0900)]
Merge pull request #32720 from poettering/hostnamed-no-varlink-exit-on-idle
hostnamed: exit-on-idle tweaks
Yu Watanabe [Wed, 12 Jun 2024 09:22:10 +0000 (18:22 +0900)]
Merge pull request #32603 from YHNdnzj/install-basename
shared/install: modernize and eliminate the use of basename()
Yu Watanabe [Tue, 11 Jun 2024 18:25:57 +0000 (03:25 +0900)]
strbuf: make length for strbuf_add_string() optional
Yu Watanabe [Tue, 11 Jun 2024 18:24:30 +0000 (03:24 +0900)]
strbuf: several cleanups for strbuf_add_string()
- add missing assertions,
- use GREEDY_REALLOC() at one more place,
- etc.
Before:
```
$ sudo time valgrind --leak-check=full ./systemd-hwdb update
==112572== Memcheck, a memory error detector
==112572== Copyright (C) 2002-2024, and GNU GPL'd, by Julian Seward et al.
==112572== Using Valgrind-3.23.0 and LibVEX; rerun with -h for copyright info
==112572== Command: ./systemd-hwdb update
==112572==
==112572==
==112572== HEAP SUMMARY:
==112572== in use at exit: 0 bytes in 0 blocks
==112572== total heap usage: 1,320,113 allocs, 1,320,113 frees, 70,614,501 bytes allocated
==112572==
==112572== All heap blocks were freed -- no leaks are possible
==112572==
==112572== For lists of detected and suppressed errors, rerun with: -s
==112572== ERROR SUMMARY: 0 errors from 0 contexts (suppressed: 0 from 0)
21.94user 0.19system 0:22.23elapsed 99%CPU (0avgtext+0avgdata 229876maxresident)k
0inputs+25264outputs (0major+57275minor)pagefaults 0swaps
```
After:
```
$ sudo time valgrind --leak-check=full ./systemd-hwdb update
[sudo] password for watanabe:
==114732== Memcheck, a memory error detector
==114732== Copyright (C) 2002-2024, and GNU GPL'd, by Julian Seward et al.
==114732== Using Valgrind-3.23.0 and LibVEX; rerun with -h for copyright info
==114732== Command: ./systemd-hwdb update
==114732==
==114732==
==114732== HEAP SUMMARY:
==114732== in use at exit: 0 bytes in 0 blocks
==114732== total heap usage: 1,276,406 allocs, 1,276,406 frees, 68,500,491 bytes allocated
==114732==
==114732== All heap blocks were freed -- no leaks are possible
==114732==
==114732== For lists of detected and suppressed errors, rerun with: -s
==114732== ERROR SUMMARY: 0 errors from 0 contexts (suppressed: 0 from 0)
21.91user 0.24system 0:22.26elapsed 99%CPU (0avgtext+0avgdata 233584maxresident)k
0inputs+25168outputs (0major+58237minor)pagefaults 0swaps
```
q66 [Thu, 6 Jun 2024 11:45:48 +0000 (13:45 +0200)]
strbuf: use GREEDY_REALLOC to grow the buffer
This allows us to reserve a bunch of capacity ahead of time,
improving the performance of hwdb significantly thanks to not
having to reallocate so many times.
Before:
```
$ sudo time valgrind --leak-check=full ./systemd-hwdb update
==113297== Memcheck, a memory error detector
==113297== Copyright (C) 2002-2024, and GNU GPL'd, by Julian Seward et al.
==113297== Using Valgrind-3.23.0 and LibVEX; rerun with -h for copyright info
==113297== Command: ./systemd-hwdb update
==113297==
==113297==
==113297== HEAP SUMMARY:
==113297== in use at exit: 0 bytes in 0 blocks
==113297== total heap usage: 1,412,640 allocs, 1,412,640 frees, 117,920,009,195 bytes allocated
==113297==
==113297== All heap blocks were freed -- no leaks are possible
==113297==
==113297== For lists of detected and suppressed errors, rerun with: -s
==113297== ERROR SUMMARY: 0 errors from 0 contexts (suppressed: 0 from 0)
132.44user 21.15system 2:35.61elapsed 98%CPU (0avgtext+0avgdata 228560maxresident)k
0inputs+25296outputs (0major+6886930minor)pagefaults 0swaps
```
After:
```
$ sudo time valgrind --leak-check=full ./systemd-hwdb update
==112572== Memcheck, a memory error detector
==112572== Copyright (C) 2002-2024, and GNU GPL'd, by Julian Seward et al.
==112572== Using Valgrind-3.23.0 and LibVEX; rerun with -h for copyright info
==112572== Command: ./systemd-hwdb update
==112572==
==112572==
==112572== HEAP SUMMARY:
==112572== in use at exit: 0 bytes in 0 blocks
==112572== total heap usage: 1,320,113 allocs, 1,320,113 frees, 70,614,501 bytes allocated
==112572==
==112572== All heap blocks were freed -- no leaks are possible
==112572==
==112572== For lists of detected and suppressed errors, rerun with: -s
==112572== ERROR SUMMARY: 0 errors from 0 contexts (suppressed: 0 from 0)
21.94user 0.19system 0:22.23elapsed 99%CPU (0avgtext+0avgdata 229876maxresident)k
0inputs+25264outputs (0major+57275minor)pagefaults 0swaps
```
Co-authored-by: Yu Watanabe <watanabe.yu+github@gmail.com>
Mike Yuan [Tue, 14 May 2024 13:28:33 +0000 (21:28 +0800)]
core/exec-credential: drop unused unit_add_default_credential_dependencies
Mike Yuan [Tue, 14 May 2024 10:47:42 +0000 (18:47 +0800)]
Revert "core/credential,mount: re-read /proc/self/mountinfo before invoking umount command"
This reverts commit
1e1225614ca1106116dcad9fb37aaeb6106408ab.
This was an incomplete workaround of the race. Now that
we stop generating mount units for credential mounts,
the logic could be dropped.
Mike Yuan [Tue, 14 May 2024 10:33:32 +0000 (18:33 +0800)]
core/mount: stop generating mount units for cred mounts
While @poettering wants to keep mount units for credential
mounts, this has brought nothing but pain in real life.
By generating mount units for each cred mount, we had trouble
with default dependencies on them, which causes their stop jobs
to race with unmounting through exec_context_destroy_credentials().
There were several attempts to workaround the problem, but
none seems very graceful: #26959, #28787, #28957, #31360, #32011.
Also, we want to carry over credentials for services that
survive soft-reboot to the new mount tree, and during the practice
the stop of mount units are irritating.
The mentioned problems are ultimately resolved by disabling
default deps: #32799. But after doing that, maybe the next question
should be "why do we generate these mount units at all?"
Let's revisit the whole concept here. First of all, the credential
dirs are supposed to be opaque to users, and hence nobody should
really reference to these mounts directly. Secondly, the lifetime
of credentials is strictly bound to the service units, but nothing
else. Moreover, as more and more users of credentials pop up,
we could end up with hundreds of such mount units, which is
something we handle poorly. And we emit useless UnitRemoved signals,
etc...
As discussed, it seems that eliminating these mount units
is the correct way to go. No real use cases are impacted,
and the lifetime management becomes sane again.
Replaces #32011
Ian Abbott [Thu, 30 May 2024 10:20:41 +0000 (11:20 +0100)]
udev: tag MTD devices for systemd
Allow systemd units to require/bind to MTD devices. One use case is for
using a systemd service to attach an MTD device to an UBI controller,
which cannot be done until the MTD device has been probed.
Fixes #33096
Matthieu Baerts (NGI0) [Mon, 20 May 2024 16:37:17 +0000 (18:37 +0200)]
core/socket: allow MPTCP protocol
Multipath TCP (MPTCP), standardized in RFC8684 [1], is a TCP extension
that enables a TCP connection to use different paths. It allows a device
to make use of multiple interfaces at once to send and receive TCP
packets over a single MPTCP connection. MPTCP can aggregate the
bandwidth of multiple interfaces or prefer the one with the lowest
latency, it also allows a fail-over if one path is down, and the traffic
is seamlessly re-injected on other paths.
To benefit from MPTCP, both the client and the server have to support
it. Multipath TCP is a backward-compatible TCP extension that is enabled
by default on recent Linux distributions (Debian, Ubuntu, Redhat, ...).
Multipath TCP is included in the Linux kernel since version 5.6 [2]. To
use it on Linux, an application must explicitly enable it when creating
the socket:
int sd = socket(AF_INET(6), SOCK_STREAM, IPPROTO_MPTCP);
No need to change anything else in the application.
This patch allows MPTCP protocol in the Socket unit configuration. So
now, a <unit>.socket can contain this to use MPTCP instead of TCP:
[Socket]
SocketProtocol=mptcp
MPTCP support has been allowed similarly to what has been already done
to allow SCTP: just one line in core/socket.c, a very simple addition
thanks to the flexible architecture already in place.
On top of that, IPPROTO_MPTCP has also been added in the list of allowed
protocols in two other places, and in the doc. It has also been added to
the missing_network.h file, for systems with an old libc -- note that it
was also required to include <netinet/in.h> in this file to avoid
redefinition errors.
Link: https://www.rfc-editor.org/rfc/rfc8684.html
Link: https://www.mptcp.dev
Kamil Szczęk [Mon, 3 Jun 2024 15:56:42 +0000 (17:56 +0200)]
core: populate $REMOTE_ADDR for AF_UNIX sockets
Set the $REMOTE_ADDR environment variable for AF_UNIX socket connections
when using per-connection socket activation (Accept=yes). $REMOTE_ADDR
will now contain the remote socket's file system path (starting with a
slash "/") or its address in the abstract namespace (starting with an
at symbol "@").
This information is essential for identifying the remote peer in AF_UNIX
socket connections, but it's not easy to obtain in a shell script for
example without pulling in a ton of additional tools. By setting
$REMOTE_ADDR, we make this information readily available to the
activated service.
Mike Yuan [Fri, 7 Jun 2024 21:55:43 +0000 (23:55 +0200)]
core/manager: enclose debug info acquirement in 'if (DEBUG_LOGGING)'
Daan De Meyer [Mon, 10 Jun 2024 10:59:58 +0000 (12:59 +0200)]
rules: Limit the number of device units generated for serial ttys
As per the suggestion in https://github.com/systemd/systemd/issues/33242.
This reduces the number of /dev/ttySXX device units generated in
mkosi from 32 to 4.
Yu Watanabe [Tue, 11 Jun 2024 16:16:55 +0000 (01:16 +0900)]
udev: rewrite token_match_attr() to make it easier for Coverity to understand
No functional change.
Closes CID#
1469719.
Yu Watanabe [Tue, 11 Jun 2024 15:48:56 +0000 (00:48 +0900)]
sd-dhcp-server: clear buffer before receive
I do not think this is necessary, but all other places in
libsystemd-network we clear buffer before receive. Without this,
Coverity warns about use-of-uninitialized-values.
Let's silence Coverity.
Closes CID#
1469721.
Lennart Poettering [Wed, 8 May 2024 11:08:38 +0000 (13:08 +0200)]
bus-util: check sd_bus_pending_method_calls() when determining whether a service is idle
Lennart Poettering [Wed, 8 May 2024 11:05:40 +0000 (13:05 +0200)]
sd-bus: add new sd_bus_pending_method_calls() call
Lennart Poettering [Thu, 23 May 2024 07:46:04 +0000 (09:46 +0200)]
tree-wide: never consider service idle if polkit authentication is still pending
Let's be correct on this.
Lennart Poettering [Wed, 8 May 2024 08:38:11 +0000 (10:38 +0200)]
hostnamed: don't allow hostnamed to exit on idle if varlink connections are still ongoing
And while we are at it, ongoing PK authorizations are also a reason to
block exit on idle.
Mike Yuan [Wed, 1 May 2024 09:09:52 +0000 (17:09 +0800)]
unit-file,portable: replace streq + basename with path_equal_filename
Mike Yuan [Wed, 1 May 2024 09:21:33 +0000 (17:21 +0800)]
shared/install: use FOREACH_ARRAY at one more place
Mike Yuan [Wed, 1 May 2024 07:44:07 +0000 (15:44 +0800)]
shared/install: replace streq + basename with path_equal_filename
Mike Yuan [Wed, 1 May 2024 07:53:54 +0000 (15:53 +0800)]
shared/install: use path_extract_filename in install_info_traverse
Mike Yuan [Wed, 1 May 2024 08:26:05 +0000 (16:26 +0800)]
shared/install: modernize unit_file_get_list, use key destructor
The rest of the basename()s are easy to drop.
Mike Yuan [Wed, 1 May 2024 07:44:37 +0000 (15:44 +0800)]
shared/install: modernize unit_file_link
Also eliminate one more use of basename(), yay!
Mike Yuan [Wed, 1 May 2024 11:18:44 +0000 (19:18 +0800)]
install,dbus-manager: make unit_file_* take (char* const*) for strv
Mike Yuan [Wed, 1 May 2024 07:39:53 +0000 (15:39 +0800)]
shared/install: modernize install_info_add
Mike Yuan [Wed, 1 May 2024 07:32:21 +0000 (15:32 +0800)]
shared/install: modernize find_symlinks and friends
Mike Yuan [Wed, 1 May 2024 07:05:03 +0000 (15:05 +0800)]
shared/install: modernize remove_marked_symlink_fd
Note that we now collect errors from
install_changes_add(), too.
Mike Yuan [Wed, 1 May 2024 07:00:29 +0000 (15:00 +0800)]
shared/install: return bool where appropriate
Mike Yuan [Mon, 13 May 2024 08:48:32 +0000 (16:48 +0800)]
shared/dropin: minor modernization
Luca Boccassi [Tue, 11 Jun 2024 21:55:29 +0000 (22:55 +0100)]
meson: update version to 257~devel
Luca Boccassi [Tue, 11 Jun 2024 21:55:03 +0000 (22:55 +0100)]
NEWS: add placeholder for 257
Luca Boccassi [Tue, 11 Jun 2024 21:42:06 +0000 (22:42 +0100)]
Finalize NEWS and version for v256
Luca Boccassi [Tue, 11 Jun 2024 17:30:29 +0000 (18:30 +0100)]
Update hwdb
ninja -C build update-hwdb
Lennart Poettering [Mon, 10 Jun 2024 16:58:54 +0000 (18:58 +0200)]
tpm2-util: tighten rules on the nvindex handle range we allocate from
Let's follow the conventions set by "Registry of Reserved TPM 2.0 Handles
and Localities" and only allocate nvindex currently not assigned to any
vendor.
For details see:
https://trustedcomputinggroup.org/resource/registry/
Section 2.2
Tobias Jakobi [Thu, 6 Jun 2024 21:17:00 +0000 (23:17 +0200)]
hwdb: add keyboard mappings for the Ayaneo Kun face buttons
See comment in hwdb file for details.
Yu Watanabe [Tue, 11 Jun 2024 17:34:11 +0000 (02:34 +0900)]
Zbigniew Jędrzejewski-Szmek [Thu, 6 Jun 2024 17:12:17 +0000 (19:12 +0200)]
man: document that separate /usr/local/ must not be used for config
Since we document /usr/local/lib/systemd/ and other paths for various things,
add notes that this is not supported if /usr/local is a separate partition. In
systemd.unit, I tried to add the footnote in the table where
/usr/local/lib/systemd/ is listed, but that get's rendered as '[sup]a[/sup]'
with a mangled footnote at the bottom of the table :( .
Also, split paragraphs in one place where the subject changes without any
transition.
Follow-up for
02f35b1c905ac63ba62f94efebf858412e961fc1.
Replaces https://github.com/systemd/systemd/pull/33231.
Zbigniew Jędrzejewski-Szmek [Tue, 11 Jun 2024 10:19:39 +0000 (12:19 +0200)]
bus-unit-util: extend the bus call timeout for UnitFreezer
Follow-up for
1d617b35fef5f7783287965f766c8bb85e932b8e.
Should fix https://github.com/systemd/systemd/issues/33269.
From the logs in the bug:
Jun 10 22:55:37 systemd-logind[909]: The system will suspend now!
Jun 10 22:55:37 ModemManager[996]: <msg> [sleep-monitor-systemd] system is about to suspend
...
Jun 10 22:55:48 systemd-sleep[422408]: Failed to freeze unit 'user.slice': Connection timed out
Jun 10 22:55:48 systemd-sleep[422408]: Performing sleep operation 'suspend'...
The delay is ~11 s, consistent with the patch that set the timeout to 10 s.
Looks like this is not enough. It's the freeze operation that fails, but
thawing might be slow too, so just bump the timeout again.
Daan De Meyer [Thu, 6 Jun 2024 20:59:36 +0000 (22:59 +0200)]
chase: Tighten "." and "./" check
Currently the check also succeeds if the input path starts with a dot, whereas
we only want it to succeed for "." and "./". Tighten the check and add a test.
Yu Watanabe [Tue, 11 Jun 2024 08:41:28 +0000 (17:41 +0900)]
test-network: wait a while for addresses to be dropped
Hopefully fixes the following failure:
```
======================================================================
FAIL: test_ipv6_token_prefixstable (__main__.NetworkdRATests.test_ipv6_token_prefixstable)
----------------------------------------------------------------------
Traceback (most recent call last):
File "/usr/lib/systemd/tests/testdata/test-network/systemd-networkd-tests.py", line 5705, in test_ipv6_token_prefixstable
self.assertNotIn('2002:da8:1:0:b47e:7975:fc7a:7d6e/64', output) # the 1st prefixstable
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
AssertionError: '2002:da8:1:0:b47e:7975:fc7a:7d6e/64' unexpectedly found in
'19: veth99@veth-peer: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc noqueue state UP group default qlen 1000\n
inet6 2002:da8:1:0:b47e:7975:fc7a:7d6e/64 scope global tentative dynamic mngtmpaddr noprefixroute \n
valid_lft 2100sec preferred_lft 1000sec\n
inet6 2002:da8:1:0:da5d:e50a:43fd:5d0f/64 scope global dynamic mngtmpaddr noprefixroute \n
valid_lft 2100sec preferred_lft 1000sec\n
inet6 fe80::1034:56ff:fe78:9abc/64 scope link proto kernel_ll \n
valid_lft forever preferred_lft forever'
----------------------------------------------------------------------
```
Zbigniew Jędrzejewski-Szmek [Tue, 11 Jun 2024 08:41:44 +0000 (10:41 +0200)]
man/systemd-soft-reboot.service: upgrade drop-in to unit file for slice
Follow-up for
d91c7c91bf5de3b12cc2b29dd8b5ad49f29448ef.
Closes https://github.com/systemd/systemd/issues/33260.
Yu Watanabe [Tue, 11 Jun 2024 06:44:20 +0000 (15:44 +0900)]
shell-completion: update bash completion for networkctl
Yu Watanabe [Tue, 11 Jun 2024 06:19:56 +0000 (15:19 +0900)]
shell-completion: update bash-completion for udevadm
- Add missing options.
- Show device nodes when supported.
Closes #33265.
Yu Watanabe [Tue, 11 Jun 2024 06:49:04 +0000 (15:49 +0900)]
Yu Watanabe [Tue, 11 Jun 2024 06:50:12 +0000 (15:50 +0900)]
login: re-used -> reused
Suggested by Fossies.
Luca Boccassi [Mon, 10 Jun 2024 20:57:04 +0000 (21:57 +0100)]
Merge pull request #33264 from bluca/mkosi_dlopen_install
mkosi: install dlopen optional dependencies for debian/ubuntu builds
Luca Boccassi [Mon, 10 Jun 2024 03:06:39 +0000 (04:06 +0100)]
mkosi: install dlopen optional dependencies for debian/ubuntu builds
Luca Boccassi [Mon, 10 Jun 2024 13:17:10 +0000 (14:17 +0100)]
mkosi: update to latest
Mike Gilbert [Fri, 7 Jun 2024 16:28:41 +0000 (12:28 -0400)]
user-util: fix fgetxxent_sane on musl
musl's implementation does not set errno to ENOENT when the end of file
is reached. It returns NULL and leaves errno unchanged.
Luca Boccassi [Sun, 9 Jun 2024 19:14:45 +0000 (20:14 +0100)]
mkosi.prepare: do not install build dependencies with NO_BUILD
Luca Boccassi [Sun, 9 Jun 2024 21:08:41 +0000 (22:08 +0100)]
NEWS: fix typo
Luca Boccassi [Sat, 8 Jun 2024 22:29:56 +0000 (23:29 +0100)]
Merge pull request #33241 from DaanDeMeyer/noble
ci: Switch to Ubuntu 24.04
Daan De Meyer [Fri, 7 Jun 2024 16:54:17 +0000 (18:54 +0200)]
mkosi: Stop using tools tree
Noble has all the tooling we need so let's stop using a tools tree
and just install the dependencies we need on the host system.
Daan De Meyer [Fri, 7 Jun 2024 20:32:08 +0000 (22:32 +0200)]
mkosi: Replace sysusers.d with useradd for test user
sysusers.d is not intended for regular users, so let's use useradd
instead.
Daan De Meyer [Fri, 7 Jun 2024 08:55:53 +0000 (10:55 +0200)]
ci: Switch to Ubuntu 24.04
Daan De Meyer [Fri, 7 Jun 2024 16:50:54 +0000 (18:50 +0200)]
mkosi: Update to latest
Daan De Meyer [Fri, 7 Jun 2024 15:21:48 +0000 (17:21 +0200)]
presets: Don't enable systemd-homed-firstboot.service by default
Enabling this service by default means every CI image without a
regular user now gets stuck on first boot due to the password prompt
from systemd-homed-firstboot.service. Let's not enable the service
by default but instead require users to enable it explicitly if they
want its behavior.
Fixes #33249
Daan De Meyer [Fri, 7 Jun 2024 13:10:58 +0000 (15:10 +0200)]
dev-setup: Follow /dev/console symlinks when locking /dev/console
systemd-nspawn sets up /dev/console as a symlink to a pty, so let's
make sure we follow the symlink when trying to lock /dev/console so
we don't fail with ELOOP.
Luca Boccassi [Thu, 6 Jun 2024 21:10:23 +0000 (22:10 +0100)]
man: note that templated surviving units need a drop-in for their slice
As reported on the mailing list, this is non-obvious, so document it.
https://lists.freedesktop.org/archives/systemd-devel/2024-June/050351.html
Luca Boccassi [Fri, 7 Jun 2024 10:18:26 +0000 (11:18 +0100)]
Merge pull request #33237 from bluca/dlopen_deps
mkosi: enable noble-backports for ubuntu and update debian packaging commit
Luca Boccassi [Thu, 6 Jun 2024 22:01:10 +0000 (23:01 +0100)]
mkosi: update debian packaging commit id
Luca Boccassi [Thu, 6 Jun 2024 22:00:44 +0000 (23:00 +0100)]
mkosi: enable noble-backports for ubuntu
Required to get the new dh-dlopenlibdeps package