History log of /systemd/src/machine/org.freedesktop.machine1.conf
Revision Date Author Comments Expand
49af9e1368571f4e423cde0fd45ee284451434d1 24-Aug-2015 Lennart Poettering <lennart@poettering.net>

machined: add new OpenShell() bus call This new bus call opens an interactive shell in a container. It works like the existing OpenLogin() call, but does not involve getty, and instead opens an arbitrary command line. This is similar to "systemd-run -t -M" but is controlled by a specific PolicyKit privilege.

c01ff965b48bb9693dcd77cbc748b5d8676766b0 09-Jul-2015 Lennart Poettering <lennart@poettering.net>

nss-mymachines: map userns users of containers to real user names Given a container "foo", that maps user id $UID to container user, using user namespaces, this NSS module extenstion will now map the $UID to a name "vu-foo-$TUID" for the translated UID $UID. Similar, userns groups are mapped to "vg-foo-$TGID" for translated GIDs of $GID. This simple change should make userns users more discoverable. Also, given that many tools like "adduser" check NSS before allocating a UID, should lower the chance of UID range conflicts between tools.

d6ce17c7f02ed3facdb45f65f546e587c2f00950 25-Feb-2015 Lennart Poettering <lennart@poettering.net>

machined,machinectl: add calls for changing container/VM quotas

72c3897f77a7352618ea76b880a6764f52d6327b 24-Feb-2015 Lennart Poettering <lennart@poettering.net>

machined: actually open up methods to unprivileged clients on dbus1 Many of machined's operations are now opened up to unprivileged clients via PolicyKit. Open up the dbus policy so that we can actually make these calls. kdbus doesn't reuqire this, hence this wasn't noticed before.

d04c1fb8e215600b4950c6778c6c16ddafc14024 23-Dec-2014 Lennart Poettering <lennart@poettering.net>

machined: introduce polkit for OpenLogin() call This way "machinectl login" can be opened up to run without privileges.

c2ce6a3d82b717c4c1e6245ad8c6ce1173f502d0 19-Dec-2014 Lennart Poettering <lennart@poettering.net>

machined: add new GetImage() bus call for retrieving the bus path for an image

cd61c3bfd718fb398cc53ced906266a9297782c9 19-Dec-2014 Lennart Poettering <lennart@poettering.net>

machined/machinectl: add logic to show list of available images This adds a new bus call to machined that enumerates /var/lib/container and returns all trees stored in it, distuingishing three types: - GPT disk images, which are files suffixed with ".gpt" - directory trees - btrfs subvolumes

e70bc43cdf75b36e7ad3d29e9a6f8ee1461e7d5e 04-Aug-2014 Lennart Poettering <lennart@poettering.net>

machine: make sure unpriviliged "machinectl status" can show the machine's OS version

717603e391b52983ca1fd218e7333a1b9dfc5c05 03-Jul-2014 Lennart Poettering <lennart@poettering.net>

machinectl: show /etc/os-release information of container in status output

d3152a09ac5804ec8603daee12f98cf03523cce0 18-May-2014 Lennart Poettering <lennart@poettering.net>

machined: make sure GetMachineAddresses() is available for unprivileged processes

adacb9575a09981fcf11279f2f661e3fc21e58ff 10-Dec-2013 Lennart Poettering <lennart@poettering.net>

bus: introduce "trusted" bus concept and encode access control in object vtables Introduces a new concept of "trusted" vs. "untrusted" busses. For the latter libsystemd-bus will automatically do per-method access control, for the former all access is automatically granted. Per-method access control is encoded in the vtables: by default all methods are only accessible to privileged clients. If the SD_BUS_VTABLE_UNPRIVILEGED flag is set for a method it is accessible to unprivileged clients too. By default whether a client is privileged is determined via checking for its CAP_SYS_ADMIN capability, but this can be altered via the SD_BUS_VTABLE_CAPABILITY() macro that can be ORed into the flags field of the method. Writable properties are also subject to SD_BUS_VTABLE_UNPRIVILEGED and SD_BUS_VTABLE_CAPABILITY() for controlling write access to them. Note however that read access is unrestricted, as PropertiesChanged messages might send out the values anyway as an unrestricted broadcast. By default the system bus is set to "untrusted" and the user bus is "trusted" since per-method access control on the latter is unnecessary. On dbus1 busses we check the UID of the caller rather than the configured capability since the capability cannot be determined without race. On kdbus the capability is checked if possible from the attached meta-data of a message and otherwise queried from the sending peer. This also decorates the vtables of the various daemons we ship with these flags.

97e67f1e52ddc0c21a88cfbcab57e83c59ee627d 02-Jul-2013 Lennart Poettering <lennart@poettering.net>

machined: relax access to GetMachine()

1ee306e1248866617c96ed9f4263f375588ad838 02-Jul-2013 Lennart Poettering <lennart@poettering.net>

machined: split out machine registration stuff from logind Embedded folks don't need the machine registration stuff, hence it's nice to make this optional. Also, I'd expect that machinectl will grow additional commands quickly, for example to join existing containers and suchlike, hence it's better keeping that separate from loginctl.