Frantisek Sumsal [Thu, 1 Aug 2024 11:14:52 +0000 (13:14 +0200)]
test: attempt to install sshd-session from multiple places
On Fedora the sshd-session binary is under /usr/libexec/openssh/ so
cover this path as well in the old framework.
Follow-up for
aaa7b36bd15ca3a96a1e11a557482b0bc59c769f.
dependabot[bot] [Thu, 1 Aug 2024 09:02:04 +0000 (09:02 +0000)]
build(deps): bump github/codeql-action from 3.25.11 to 3.25.15
Bumps [github/codeql-action](https://github.com/github/codeql-action) from 3.25.11 to 3.25.15.
- [Release notes](https://github.com/github/codeql-action/releases)
- [Changelog](https://github.com/github/codeql-action/blob/main/CHANGELOG.md)
- [Commits](https://github.com/github/codeql-action/compare/
b611370bb5703a7efb587f9d136a52ea24c5c38c...
afb54ba388a7dca6ecae48f608c4ff05ff4cc77a)
---
updated-dependencies:
- dependency-name: github/codeql-action
dependency-type: direct:production
update-type: version-update:semver-patch
...
Signed-off-by: dependabot[bot] <support@github.com>
dependabot[bot] [Thu, 1 Aug 2024 09:15:29 +0000 (09:15 +0000)]
build(deps): bump meson from 1.4.1 to 1.5.1 in /.github/workflows
Bumps [meson](https://github.com/mesonbuild/meson) from 1.4.1 to 1.5.1.
- [Release notes](https://github.com/mesonbuild/meson/releases)
- [Commits](https://github.com/mesonbuild/meson/compare/1.4.1...1.5.1)
---
updated-dependencies:
- dependency-name: meson
dependency-type: direct:production
update-type: version-update:semver-minor
...
Signed-off-by: dependabot[bot] <support@github.com>
dependabot[bot] [Thu, 1 Aug 2024 09:02:16 +0000 (09:02 +0000)]
build(deps): bump systemd/mkosi
Bumps [systemd/mkosi](https://github.com/systemd/mkosi) from
4eba736412c702bbbe2c6d4a58a92fa977219249 to
63fc1fde5b1aac1abf07ac499068c2b62263dafb.
- [Release notes](https://github.com/systemd/mkosi/releases)
- [Changelog](https://github.com/systemd/mkosi/blob/main/NEWS.md)
- [Commits](https://github.com/systemd/mkosi/compare/
4eba736412c702bbbe2c6d4a58a92fa977219249...
63fc1fde5b1aac1abf07ac499068c2b62263dafb)
---
updated-dependencies:
- dependency-name: systemd/mkosi
dependency-type: direct:production
...
Signed-off-by: dependabot[bot] <support@github.com>
dependabot[bot] [Thu, 1 Aug 2024 09:02:10 +0000 (09:02 +0000)]
build(deps): bump redhat-plumbers-in-action/differential-shellcheck
Bumps [redhat-plumbers-in-action/differential-shellcheck](https://github.com/redhat-plumbers-in-action/differential-shellcheck) from 5.3.0 to 5.4.0.
- [Release notes](https://github.com/redhat-plumbers-in-action/differential-shellcheck/releases)
- [Changelog](https://github.com/redhat-plumbers-in-action/differential-shellcheck/blob/main/docs/CHANGELOG.md)
- [Commits](https://github.com/redhat-plumbers-in-action/differential-shellcheck/compare/
60c9f2b924a9c5a2ddbb25e7b23e8e11b56faab9...
cc6721c45a8800cc666de45493545a07a638d121)
---
updated-dependencies:
- dependency-name: redhat-plumbers-in-action/differential-shellcheck
dependency-type: direct:production
update-type: version-update:semver-minor
...
Signed-off-by: dependabot[bot] <support@github.com>
dependabot[bot] [Thu, 1 Aug 2024 09:02:08 +0000 (09:02 +0000)]
build(deps): bump ossf/scorecard-action from 2.3.3 to 2.4.0
Bumps [ossf/scorecard-action](https://github.com/ossf/scorecard-action) from 2.3.3 to 2.4.0.
- [Release notes](https://github.com/ossf/scorecard-action/releases)
- [Changelog](https://github.com/ossf/scorecard-action/blob/main/RELEASE.md)
- [Commits](https://github.com/ossf/scorecard-action/compare/
dc50aa9510b46c811795eb24b2f1ba02a914e534...
62b2cac7ed8198b15735ed49ab1e5cf35480ba46)
---
updated-dependencies:
- dependency-name: ossf/scorecard-action
dependency-type: direct:production
update-type: version-update:semver-minor
...
Signed-off-by: dependabot[bot] <support@github.com>
Yu Watanabe [Thu, 1 Aug 2024 02:40:20 +0000 (11:40 +0900)]
journalctl: fix compile error on i386
Fixes the following error:
===
In file included from ../src/basic/macro.h:13,
from ../src/basic/dirent-util.h:8,
from ../src/journal/journalctl-misc.c:3:
../src/journal/journalctl-misc.c: In function 'show_log_ids':
../src/journal/journalctl-misc.c:107:22: error: comparison is always true due to limited range of data type [-Werror=type-limits]
107 | assert(n_ids < INT64_MAX);
| ^
../src/fundamental/macro-fundamental.h:70:44: note: in definition of macro '_unlikely_'
70 | #define _unlikely_(x) (__builtin_expect(!!(x), 0))
| ^
../src/basic/macro.h:165:22: note: in expansion of macro 'assert_message_se'
165 | #define assert(expr) assert_message_se(expr, #expr)
| ^~~~~~~~~~~~~~~~~
../src/journal/journalctl-misc.c:107:9: note: in expansion of macro 'assert'
107 | assert(n_ids < INT64_MAX);
| ^~~~~~
cc1: all warnings being treated as errors
===
Follow-up for
0a8c1f6212a874b542a57ed5416e7d3575d2da93.
Yu Watanabe [Thu, 1 Aug 2024 02:35:13 +0000 (11:35 +0900)]
Merge pull request #33888 from YHNdnzj/followups
core: a few follow-ups for recent PRs
Yu Watanabe [Thu, 1 Aug 2024 02:33:20 +0000 (11:33 +0900)]
Merge pull request #32448 from yuwata/journalctl-current-invocation
journalctl: introduce --list-invocations, -I, --invocation= options
Yu Watanabe [Sun, 12 May 2024 07:15:22 +0000 (16:15 +0900)]
test: add test for journalctl --list-invocations and --invocation=
Yu Watanabe [Thu, 25 Apr 2024 04:38:24 +0000 (13:38 +0900)]
journalctl: add --list-invocations command and -I/--invocation options
The --list-invocations command is similar to --list-boots, but shows
invocation IDs of specified unit. This should be useful when showing
a specific invocation of a unit.
The --invocation option is similar to --boot, but takes a invocation ID
or an offset. The -I option is equivalent to --invocation=0.
Yu Watanabe [Thu, 25 Apr 2024 06:28:19 +0000 (15:28 +0900)]
logs-show: extend journal_get_boots() and friends to find invocation IDs
Currently the extended features are not used, but will be used later.
Yu Watanabe [Thu, 25 Apr 2024 06:27:43 +0000 (15:27 +0900)]
logs-show: introduce several helper functions
Currently these are not used, but will be used later.
Yu Watanabe [Sat, 22 Jun 2024 08:45:57 +0000 (17:45 +0900)]
use int64_t for index in show_log_ids()
Yu Watanabe [Thu, 25 Apr 2024 04:15:49 +0000 (13:15 +0900)]
journalctl: split out show_log_ids() from action_list_boots()
No functional change, just refactoring and prepraration for later change.
Yu Watanabe [Wed, 31 Jul 2024 02:27:28 +0000 (11:27 +0900)]
journalctl: update log messages
Yu Watanabe [Thu, 25 Apr 2024 01:10:39 +0000 (10:10 +0900)]
logs-show: rename BootId -> LogId
The struct itself is generic, and can be used for other ID.
Let's rename it to more generic one.
No functional change, just refactoring and preparation for later
commits.
Mike Yuan [Wed, 31 Jul 2024 18:02:05 +0000 (20:02 +0200)]
core/socket: stop hardcoding every service inactive state
History (
c068650fcfc69aebb35be1c71f35dbc25b22030a,
941a12dcba57f6673230a9c413738c51374d2998) has proven
that we're not good at keeping socket and service states
in sync. Instead, let's query the high-level unit_active_state()
first, and only hardcode the two special auto-restart
service states.
Additionally, allow returning to listening state on SERVICE_CLEANING.
Mike Yuan [Wed, 31 Jul 2024 17:53:53 +0000 (19:53 +0200)]
core/cgroup: use UNIT_IS_INACTIVE_OR_FAILED where appropriate
Mike Yuan [Wed, 31 Jul 2024 17:51:23 +0000 (19:51 +0200)]
core/unit: merge use of LOG_CONTEXT_SET_LOG_LEVEL into LOG_CONTEXT_PUSH_UNIT
No functional change, since LOG_CONTEXT_PUSH_UNIT is only used
in exec_spawn().
Mike Yuan [Wed, 31 Jul 2024 16:38:14 +0000 (18:38 +0200)]
core: clean up ambient capability logging
Follow-up for
e0ebc81b2d194206c519375394bd67baa19e67ce
Daan De Meyer [Wed, 31 Jul 2024 18:21:12 +0000 (20:21 +0200)]
Merge pull request #33886 from DaanDeMeyer/autologin
Two mkosi improvements
Daan De Meyer [Wed, 31 Jul 2024 17:07:35 +0000 (19:07 +0200)]
Merge pull request #33885 from DaanDeMeyer/pidref-kthread
Two pidfd fixes
Daan De Meyer [Wed, 31 Jul 2024 15:42:56 +0000 (17:42 +0200)]
mkosi: Beef up testuser a bit
Give it a password and add it to some common groups.
Daan De Meyer [Wed, 31 Jul 2024 15:38:12 +0000 (17:38 +0200)]
mkosi: Switch to autologin via credentials
Let's use the newly added credentials to only enable autologin for
/dev/console (systemd-nspawn) and /dev/hvc0 (qemu) instead of enabling
autologin for every tty.
Daan De Meyer [Wed, 31 Jul 2024 15:35:58 +0000 (17:35 +0200)]
Merge pull request #33873 from DaanDeMeyer/rename-creds
core: Add support for renaming credentials with ImportCredential=
Michal Sekletar [Tue, 30 Jul 2024 14:22:03 +0000 (16:22 +0200)]
socket: fix socket activation of stopped services with pinned FD store
Luca Boccassi [Wed, 31 Jul 2024 14:11:30 +0000 (16:11 +0200)]
Merge pull request #32937 from steelman/github/drop-ambient-caps-executor
core: drop ambient capabilities in systemd-executor
Daan De Meyer [Tue, 30 Jul 2024 14:22:34 +0000 (16:22 +0200)]
units: Import tty specific credentials for each getty unit
As explained in the previous commit, this allows us to configure
agetty and login for individual ttys instead of globally.
Daan De Meyer [Tue, 30 Jul 2024 14:16:26 +0000 (16:16 +0200)]
core: Add support for renaming credentials with ImportCredential=
This allows for "per-instance" credentials for units. The use case
is best explained with an example. Currently all our getty units
have the following stanzas in their unit file:
"""
ImportCredential=agetty.*
ImportCredential=login.*
"""
This means that setting agetty.autologin=root as a system credential
will make every instance of our all our getty units autologin as the
root user. This prevents us from doing autologin on /dev/hvc0 while
still requiring manual login on all other ttys.
To solve the issue, we introduce support for renaming credentials with
ImportCredential=. This will allow us to add the following to e.g.
serial-getty@.service:
"""
ImportCredential=tty.serial.%I.agetty.*:agetty.
ImportCredential=tty.serial.%I.login.*:login.
"""
which for serial-getty@hvc0.service will make the service manager read
all credentials of the form "tty.serial.hvc0.agetty.xxx" and pass them
to the service in the form "agetty.xxx" (same goes for login). We can
apply the same to each of the getty units to allow setting agetty and
login credentials for individual ttys instead of globally.
Daan De Meyer [Wed, 31 Jul 2024 13:02:07 +0000 (15:02 +0200)]
exec-credential: Skip duplicate credentials in load_credential_glob()
We document that when multiple credentials of the same name are found,
we use the first one found so let's actually implement that behavior.
Daan De Meyer [Wed, 31 Jul 2024 13:01:40 +0000 (15:01 +0200)]
exec-credential: Log if we skip duplicate credential
Daan De Meyer [Wed, 31 Jul 2024 13:21:17 +0000 (15:21 +0200)]
Drop EEXIST handling in load_credential_glob()
Credentials are written to a temporary file and renamed to the
destination with renameat() which will replace existing files so
EEXIST should not happen so drop the handling for EEXIST.
Daan De Meyer [Wed, 31 Jul 2024 12:23:08 +0000 (14:23 +0200)]
Merge pull request #33884 from DaanDeMeyer/log-context
log: Fix size calculation for number of iovecs
Daan De Meyer [Wed, 31 Jul 2024 11:38:50 +0000 (13:38 +0200)]
cgroup-util: Don't try to open pidfd for kernel threads
The kernel might start returning -EINVAL when trying to open pidfd's
for kernel threads so let's not try to open pidfd's for kernel threads.
Daan De Meyer [Wed, 31 Jul 2024 11:46:41 +0000 (13:46 +0200)]
Merge pull request #33882 from bluca/efi_proto_fallback_memory
stub: allocate and zero enough space in legacy x86 handover protocol
Daan De Meyer [Wed, 31 Jul 2024 09:39:04 +0000 (11:39 +0200)]
log: Fix size calculation for number of iovecs
Each log context field can expand to up to three iovecs (key, value
and newline) so let's fix the size calculation to take this into
account.
Daan De Meyer [Wed, 31 Jul 2024 11:11:51 +0000 (13:11 +0200)]
execute: Drop log level to unit log level in exec_spawn()
All messages logged from exec_spawn() are attributed to the unit
and as such we should set the log level to the unit's max log level
for the duration of the function.
Łukasz Stelmach [Tue, 28 May 2024 14:56:03 +0000 (16:56 +0200)]
Revert "execute: Call capability_ambient_set_apply even if ambient set is 0"
With ambient capabilities being dropped at the start of process managers
(both system and user) as well as systemd-executor it isn't necessary
to drop them here. Moreover, at this point also the inheritable set can
be preserved. This makes it possible to assign a user session manager
inheritable capabilities which combined with file capabilites (ei sets)
of service executables enable running user services with capabilities
but only when started by the manager.
This reverts commit
943800f4e7728feb2416dd57b8c296614497b94f.
Łukasz Stelmach [Mon, 20 May 2024 14:51:55 +0000 (16:51 +0200)]
core: drop ambient capabilities in systemd-executor
Since the commit
963b6b906e ("core: drop ambient capabilities in
user manager") systemd running as the session manager has dropped ambient
capabilities retaining other sets allowing user services to be started
with elevated capabilities. This, worked fine until the introduction of
sd-executor. For a non-root process to be started with elevated
capabilities by a non-root parent it either needs file capabilities or
ambient capabilities in the parent process. Thus, systemd needs to allow
sd-executor to inherit its ambient capabilities and sd-executor should
drop them as systemd did before.
The ambient set is managed for both system and session managers, but
with the default set for PID#1 being empty, this code does not affect
operation of PID#1.
Fixes:
bb5232b6a3 ("core: add systemd-executor binary")
Yu Watanabe [Sun, 23 Jun 2024 20:03:58 +0000 (05:03 +0900)]
man: suggest to enable global IPv6Forwarding= setting to make IPv6 packets forwarded
Closes #33414.
Yu Watanabe [Tue, 30 Jul 2024 22:31:21 +0000 (07:31 +0900)]
NEWS: mention that udevadm test and test-builtin are now non-destructive
Follow-up for
089bef66316e5bdc91b9984148e5a6455449c1da.
Prompted by https://github.com/systemd/systemd/issues/33619#issuecomment-
2257576579.
Yu Watanabe [Tue, 30 Jul 2024 22:21:09 +0000 (07:21 +0900)]
network: mention that IPv4 ACD is enabled by default for 169.254.0.0/16
Prompted by #33824.
Yu Watanabe [Tue, 30 Jul 2024 21:49:32 +0000 (06:49 +0900)]
network: request non-NULL SSID when a wlan interface is configured as station
To avoid conflicts with user .network file for the wlan interface with Bond=.
See https://github.com/systemd/systemd/issues/19832#issuecomment-
857661200.
Yu Watanabe [Wed, 31 Jul 2024 01:05:43 +0000 (10:05 +0900)]
Merge pull request #33878 from yuwata/network-bind-carrier
network: several cleanups for BindCarrier= setting
Yu Watanabe [Wed, 31 Jul 2024 01:05:11 +0000 (10:05 +0900)]
Merge pull request #33875 from yuwata/network-link-get-address
network: several fixlets related to link_get_address()
Luca Boccassi [Wed, 31 Jul 2024 00:46:58 +0000 (01:46 +0100)]
efi: fix link to legacy EFI handover protocol
Luca Boccassi [Wed, 31 Jul 2024 00:45:06 +0000 (01:45 +0100)]
stub: allocate and zero enough space in legacy x86 handover protocol
A PE image's memory footprint might be larger than its file size due
to uninitialized memory sections. Normally all PE headers should be
parsed to check the actual required size, but the legacy EFI handover
protocol is only used for x86 Linux bzImages, so we know only the last
section will require extra memory. Use SizeOfImage from the PE header
and if it is larger than the file size, allocate and zero extra memory
before using it.
Fixes https://github.com/systemd/systemd/issues/33816
Yu Watanabe [Tue, 30 Jul 2024 18:55:37 +0000 (03:55 +0900)]
network: shorten code a bit
Yu Watanabe [Tue, 30 Jul 2024 18:50:55 +0000 (03:50 +0900)]
network: call link_handle_bound_by_list() before trying to reconfigure interface
Otherwise, when an interface gained its carrier, the interface may not
have matching .network file yet, then link_reconfigure_impl() returns
zero, and link_handle_bound_by_list() is skipped.
Fixes #33837.
Ivan Shapovalov [Sun, 16 Jun 2024 08:46:34 +0000 (10:46 +0200)]
Revert "network/ndisc: ignore most fields of RA header when lifetime is zero"
This reverts commit
ffef01acddcac27caaef02f7f28bff03d7799e5e.
Similar to
2d393b1b6d8 ("network: IPv6 Compliance: Router Advertisement
Processing, Reachable Time [v6LC.2.2.15]"),
Extract from: https://www.ietf.org/rfc/rfc4861.html#section-4.2, p.21,
first paragraph:
The Router Lifetime applies only to
the router's usefulness as a default router; it
does not apply to information contained in other
message fields or options.
So it does not make sense to prevent DHCPv6 when Router Lifetime is 0.
Fixes #33357.
Daniel P. Berrangé [Tue, 30 Jul 2024 09:51:21 +0000 (10:51 +0100)]
Fix detection of TDX confidential VM on Azure platform
The original CVM detection logic for TDX assumes that the guest can see
the standard TDX CPUID leaf. This was true in Azure when this code was
originally written, however, current Azure now blocks that leaf in the
paravisor. Instead it is required to use the same Azure specific CPUID
leaf that is used for SEV-SNP detection, which reports the VM isolation
type.
Signed-off-by: Daniel P. Berrangé <berrange@redhat.com>
Yu Watanabe [Tue, 30 Jul 2024 16:24:00 +0000 (01:24 +0900)]
test-network: add test case for preferred source with peer
For issue #31950.
Yu Watanabe [Tue, 30 Jul 2024 15:59:28 +0000 (00:59 +0900)]
network: make link_get_address() provide matching address with peer
As all callers do not care if the address has peer address.
This also drops prefixlen argument as it is always zero.
Fixes a bug introduced by
42f8b6a80878e688b821adfb315c0a1f0a7076ce.
Fixes #31950.
Yu Watanabe [Tue, 30 Jul 2024 15:25:43 +0000 (00:25 +0900)]
network/ipv4acd: manage ACD engines with Address object
IPv4 addresses are managed with local and peer addresses and prefix
length. So, potentially, the same address with different prefix length
can be assigned on a link, e.g. 192.168.0.1/24 and 192.168.0.1/26.
If one of the address is configured with ACD but the other is not,
then previously ACD might be unexpectedly disabled or enabled on them,
as we managed ACD engines with only local addresses.
This makes ACD engines managed with the corresponding Address objects.
Yu Watanabe [Tue, 30 Jul 2024 18:04:04 +0000 (03:04 +0900)]
network: do not bring down bound interfaces immediately
Even if a timespan specified to IgnoreCarrierLoss= for an interface,
when the carrier of the interface lost, bound interfaces might be bring
down immediately.
Let's also postpone bringing down bound interfaces with the specified
timespan.
Arian van Putten [Tue, 30 Jul 2024 11:35:52 +0000 (13:35 +0200)]
document how TimeoutStartSec= affects notify-reload (#33653)
* document how TimeoutStartSec= affects notify-reload
Yu Watanabe [Tue, 30 Jul 2024 05:35:33 +0000 (14:35 +0900)]
nspawn: remove macvlan interfaces before network namespace died
This is similar to what we do for veth interfaces in remove_veth_links().
When a container rebooted, macvlan interfaces created by the previous
boot may still exist in the kernel, and that causes -EADDRINUSE after
reboot.
Hopefully fixes #680.
Daan De Meyer [Tue, 30 Jul 2024 09:53:32 +0000 (11:53 +0200)]
cgroup-util: Ignore kernel threads in cg_kill_items()
Similar to the implementation of cgroup.kill in the kernel, let's
skip kernel threads in cg_kill_items() as trying to kill kernel
threads as an unprivileged process will fail with EPERM and doesn't
do anything when running privileged.
Daan De Meyer [Mon, 29 Jul 2024 13:41:51 +0000 (15:41 +0200)]
kernel-install: Try some more initrd variants in 90-loaderentry.install
On CentOS/Fedora, dracut is configured to write the initrd to
/boot/initramfs-$KERNEL_VERSION...img so let's check for that as well
if no initrds were supplied.
Daan De Meyer [Mon, 29 Jul 2024 15:13:28 +0000 (17:13 +0200)]
kernel-install: Only read cmdline from /proc/cmdline when not in container
If we're running from within a container, we're very likely not going
to want to use the kernel command line from /proc/cmdline, so let's add
a check to see if we're running from a container to decide whether we'll
use the kernel command line from /proc/cmdline.
Daan De Meyer [Mon, 29 Jul 2024 13:40:48 +0000 (15:40 +0200)]
Merge pull request #33857 from DaanDeMeyer/mkosi
Two small improvements
Daan De Meyer [Mon, 29 Jul 2024 11:42:28 +0000 (13:42 +0200)]
docs: Simplify hacking instructions a bit
We enable RuntimeBuildSources=yes by default so let's drop it from
the documentation.
Daan De Meyer [Mon, 29 Jul 2024 11:40:42 +0000 (13:40 +0200)]
test: Don't mount build sources into image when running non-interactively
Martin Srebotnjak [Mon, 29 Jul 2024 08:38:40 +0000 (10:38 +0200)]
po: Translated using Weblate (Slovenian)
Currently translated at 100.0% (233 of 233 strings)
Co-authored-by: Martin Srebotnjak <miles@filmsi.net>
Translate-URL: https://translate.fedoraproject.org/projects/systemd/main/sl/
Translation: systemd/main
Luca Boccassi [Mon, 29 Jul 2024 09:15:52 +0000 (10:15 +0100)]
Merge pull request #33853 from NickCao/l3mdev
network: Fixup Table when L3MasterDevice is set on routing policy rule
Nick Cao [Sun, 28 Jul 2024 14:07:19 +0000 (10:07 -0400)]
network: Fixup Table when L3MasterDevice is set on routing policy rule
Nick Cao [Sun, 28 Jul 2024 17:50:30 +0000 (13:50 -0400)]
man: network: move note about L3MasterDevice to the correct section
Vladimir Panteleev [Sat, 27 Jul 2024 11:49:20 +0000 (11:49 +0000)]
man: clarify systemd-path variable source
Vladimir Panteleev [Sat, 27 Jul 2024 11:43:47 +0000 (11:43 +0000)]
man: improve ManagerEnvironment documentation
- Improve wording for explanation when these variables are inherited
- Clarify that these variables are not placed in the process environment block,
so /proc/PID/environ cannot be used as a debugging tool
Luca Boccassi [Sat, 27 Jul 2024 10:27:29 +0000 (11:27 +0100)]
Merge pull request #33848 from weblate/weblate-systemd-main
Translations update from Fedora Weblate
Weblate Translation Memory [Fri, 26 Jul 2024 14:38:49 +0000 (16:38 +0200)]
po: Translated using Weblate (Slovenian)
Currently translated at 100.0% (233 of 233 strings)
Co-authored-by: Weblate Translation Memory <noreply-mt-weblate-translation-memory@weblate.org>
Translate-URL: https://translate.fedoraproject.org/projects/systemd/main/sl/
Translation: systemd/main
Martin Srebotnjak [Fri, 26 Jul 2024 14:38:49 +0000 (16:38 +0200)]
po: Translated using Weblate (Slovenian)
Currently translated at 100.0% (233 of 233 strings)
Co-authored-by: Martin Srebotnjak <miles@filmsi.net>
Translate-URL: https://translate.fedoraproject.org/projects/systemd/main/sl/
Translation: systemd/main
Jose Ignacio Tornos Martinez [Fri, 26 Jul 2024 08:28:21 +0000 (10:28 +0200)]
kernel-install: remove depmod generated file modules.weakdep
The new file, modules.weakdep, generated by depmod to get the weak
dpendencies information can be present
(https://github.com/kmod-project/kmod/commit/
05828b4a6e9327a63ef94df544a042b5e9ce4fe7),
so remove it like the other similar files.
Signed-off-by: Jose Ignacio Tornos Martinez <jtornosm@redhat.com>
Luca Boccassi [Fri, 26 Jul 2024 13:01:38 +0000 (14:01 +0100)]
Merge pull request #27855 from Werkov/test-delegate-useraddfixup
Delegate/cgroup test refactor
Zbigniew Jędrzejewski-Szmek [Fri, 26 Jul 2024 11:52:34 +0000 (13:52 +0200)]
Merge pull request #30307 from bluca/enforce_inhibitors
logind: always check for inhibitor locks
Ronan Pigott [Thu, 25 Jul 2024 19:48:03 +0000 (12:48 -0700)]
resolved: Don't retry queries that indicate net error
This probably rarely helped anyway, but it also in some cases interferes
with auxiliary dnssec queries where the authoritative nameserver does
not support EDNS0/DNSSEC.
Fixes:
ac6844460ca1 ("resolved: support RFC 8914 EDE error codes")
Luca Boccassi [Fri, 26 Jul 2024 09:04:20 +0000 (10:04 +0100)]
Merge pull request #33842 from DaanDeMeyer/test
Two fixes
Michal Koutný [Fri, 26 Jul 2024 08:44:10 +0000 (10:44 +0200)]
test: Fail cgroup delegation test when user cannot be created
It means: a) user cannot be created, something's wrong in the
test environment -> fail the test; b) user already exists, we shall not
continue and delete (foreign) user.
Daan De Meyer [Thu, 25 Jul 2024 11:22:42 +0000 (13:22 +0200)]
resize-fs: Put minimal ext4 size in the same ballpark as the other filesystems
TEST-46-HOMED fails on ext4 because the filesystem is deemed to small
for activation by cryptsetup. Let's bump the minimal filesystem size for
ext4 a bit to be in the same ballpark as ext4 and btrfs to avoid weird
errors due to impossibly small filesystems.
Also use U64_MB while we're touching this.
Michal Koutný [Thu, 31 Mar 2022 16:25:36 +0000 (18:25 +0200)]
test: Reorganize testcase of cgroup delegation
There are multiple subtests, just move them around into functions
(leveraging the testcase_* convention) to make space for new related
subtests.
Luca Boccassi [Thu, 25 Jul 2024 13:11:11 +0000 (14:11 +0100)]
Merge pull request #33825 from DaanDeMeyer/chattr
repart: Create disk image file with copy-on-write disabled on btrfs
Luca Boccassi [Thu, 25 Jul 2024 11:05:53 +0000 (12:05 +0100)]
shell completion: add support for sd-analyze capability --mask
Follow-up for
3e7a029c2856e7814b930443cc2d4fb089377592
Luca Boccassi [Thu, 25 Jul 2024 12:18:53 +0000 (13:18 +0100)]
Merge pull request #33840 from bluca/test_locale_dbus
test: fix D-Bus policy override for TEST-73-LOCALE
Luca Boccassi [Wed, 7 Feb 2024 23:27:31 +0000 (23:27 +0000)]
NEWS: mention logind inhibitors change
Luca Boccassi [Sat, 2 Dec 2023 20:11:57 +0000 (20:11 +0000)]
logind: always check for inhibitor locks
Currently inhibitors are bypassed unless an explicit request is made to
check for them, or even in that case when the requestor is root or the
same uid as the holder of the lock.
But in many cases this makes it impractical to rely on inhibitor locks.
For example, in Debian there are several convoluted and archaic
workarounds that divert systemctl/reboot to some hacky custom scripts
to try and enforce blocking accidental reboots, when it's not expected
that the requestor will remember to specify the command line option
to enable checking for active inhibitor locks.
Also in many cases one wants to ensure that locks taken by a user are
respected by actions initiated by that same user.
Change logind so that inhibitors checks are not skipped in these
cases, and systemctl so that locks are checked in order to show a
friendly error message rather than "permission denied".
Add new block-weak and delay-weak modes that keep the previous
behaviour unchanged.
Daan De Meyer [Thu, 25 Jul 2024 11:08:48 +0000 (13:08 +0200)]
TEST-54-CREDS: Specify SMBIOS creds via corresponding mkosi option
This allows mkosi to combine fstab.extra with its own fstab.extra so
that it doesn't override the one we pass for the test.
David Tardon [Thu, 25 Jul 2024 08:06:34 +0000 (10:06 +0200)]
sd-event: do not assert on invalid signal
The signalfd_siginfo struct is received from outside via a FD, hence
assert() is not appropriate way to check it. Just do a normal runtime
check.
David Tardon [Thu, 25 Jul 2024 07:47:56 +0000 (09:47 +0200)]
logind-dbus: check auth. for all inhibitor operations
Fixes #33834
Jeffrey Bosboom [Thu, 25 Jul 2024 01:14:24 +0000 (18:14 -0700)]
docs/CONTROL_GROUP_INTERFACE.md: document accounting information available via D-Bus
Luca Boccassi [Thu, 25 Jul 2024 10:08:21 +0000 (11:08 +0100)]
Merge pull request #33727 from intelfx/work/analyze-capability-masks
analyze: capability: add support for decoding capability masks
Mike Yuan [Wed, 24 Jul 2024 14:28:48 +0000 (16:28 +0200)]
basic/log: do not treat all negative errnos as synthetic
Currently, IS_SYNTHETIC_ERRNO() evaluates to true for all negative errnos,
because of the two's-complement negative value representation.
Subsequently, ERRNO= is not logged for most of our own code.
Let's fix this, by formatting all synthetic errnos as positive.
Then, treat all negative values as non-synthetic.
While at it, mark the evaluation order explicitly, and remove
unneeded comment.
Fixes #33800
Daan De Meyer [Wed, 24 Jul 2024 13:04:43 +0000 (15:04 +0200)]
tree-wide: Don't explicity disable copy-on-write when copying images
Since the copy helpers now copy file attributes as well, let's not
explicitly disable copy-on-write anymore when we copy an image. If
the source already has copy-on-write disabled, the copy will have it
disabled as well. Otherwise, the copy will also have copy-on-write
enabled.
This makes sure that reflinks always work as reflink is only supported
if both source and target are copy-on-write or both source and target
are not copy-on-write.
Daan De Meyer [Wed, 24 Jul 2024 12:56:11 +0000 (14:56 +0200)]
copy: Copy file attributes as well
Let's make sure we copy all file attributes that can be copied as
well.
Luca Boccassi [Thu, 25 Jul 2024 09:46:56 +0000 (10:46 +0100)]
mkosi: update debian commit reference
*
7eebe8c0b1 autopkgtest: allow localectl in localed tests
*
c08a88ffbb Update changelog for 256.4-1 release
*
03814c87fe Fix D-Bus policy for locale1 blocking
*
16f6130038 Drop last patch, all merged upstream
*
fe6956e934 Install varlinkctl zsh completion file
*
9bc2a52832 Update upstream source from tag 'upstream/256.4'
*
8574241978 New upstream version 256.4
Luca Boccassi [Thu, 25 Jul 2024 09:43:48 +0000 (10:43 +0100)]
test: fix D-Bus policy override for TEST-73-LOCALE
We don't need to allow non-root, and the policy needs to specify destination
and interface too, to narrow it down
Follow-up for
7b5c38a91def6cf236605010a0a93a1cd4c137e9
Daan De Meyer [Wed, 24 Jul 2024 12:54:06 +0000 (14:54 +0200)]
Make read_attr_path() more generic
Let's make this an openat() like function so it can be used in more
scenarios.
Daan De Meyer [Tue, 23 Jul 2024 20:44:03 +0000 (22:44 +0200)]
repart: Create disk image file with copy-on-write disabled on btrfs
COW on btrfs generally does not play well lots of random writes so
let's make the disk images generated by repart NOCOW by default on
btrfs like we do elsewhere across the codebase.
Daan De Meyer [Tue, 23 Jul 2024 19:43:13 +0000 (21:43 +0200)]
repart: Make partition files NOCOW if the disk image is NOCOW
On btrfs, reflinks into a disk image that has copy-on-write disabled
only work if the source has copy-on-write disabled as well so let's
make sure that's the case if the disk image has copy-on-write disabled.
Daan De Meyer [Tue, 23 Jul 2024 19:37:11 +0000 (21:37 +0200)]
fs-util: Add XO_NOCOW flag
Let's add a flag for xopenat() that immediately makes a file NOCOW
after opening it if it's supported.