49af9e1368571f4e423cde0fd45ee284451434d1 |
|
24-Aug-2015 |
Lennart Poettering <lennart@poettering.net> |
machined: add new OpenShell() bus call
This new bus call opens an interactive shell in a container. It works
like the existing OpenLogin() call, but does not involve getty, and
instead opens an arbitrary command line.
This is similar to "systemd-run -t -M" but is controlled by a specific
PolicyKit privilege. |
c01ff965b48bb9693dcd77cbc748b5d8676766b0 |
|
09-Jul-2015 |
Lennart Poettering <lennart@poettering.net> |
nss-mymachines: map userns users of containers to real user names
Given a container "foo", that maps user id $UID to container user, using
user namespaces, this NSS module extenstion will now map the $UID to a
name "vu-foo-$TUID" for the translated UID $UID.
Similar, userns groups are mapped to "vg-foo-$TGID" for translated GIDs
of $GID.
This simple change should make userns users more discoverable. Also,
given that many tools like "adduser" check NSS before allocating a UID,
should lower the chance of UID range conflicts between tools. |
d6ce17c7f02ed3facdb45f65f546e587c2f00950 |
|
25-Feb-2015 |
Lennart Poettering <lennart@poettering.net> |
machined,machinectl: add calls for changing container/VM quotas |
72c3897f77a7352618ea76b880a6764f52d6327b |
|
24-Feb-2015 |
Lennart Poettering <lennart@poettering.net> |
machined: actually open up methods to unprivileged clients on dbus1
Many of machined's operations are now opened up to unprivileged clients
via PolicyKit. Open up the dbus policy so that we can actually make
these calls.
kdbus doesn't reuqire this, hence this wasn't noticed before. |
d04c1fb8e215600b4950c6778c6c16ddafc14024 |
|
23-Dec-2014 |
Lennart Poettering <lennart@poettering.net> |
machined: introduce polkit for OpenLogin() call
This way "machinectl login" can be opened up to run without privileges. |
c2ce6a3d82b717c4c1e6245ad8c6ce1173f502d0 |
|
19-Dec-2014 |
Lennart Poettering <lennart@poettering.net> |
machined: add new GetImage() bus call for retrieving the bus path for an image |
cd61c3bfd718fb398cc53ced906266a9297782c9 |
|
19-Dec-2014 |
Lennart Poettering <lennart@poettering.net> |
machined/machinectl: add logic to show list of available images
This adds a new bus call to machined that enumerates /var/lib/container
and returns all trees stored in it, distuingishing three types:
- GPT disk images, which are files suffixed with ".gpt"
- directory trees
- btrfs subvolumes |
e70bc43cdf75b36e7ad3d29e9a6f8ee1461e7d5e |
|
04-Aug-2014 |
Lennart Poettering <lennart@poettering.net> |
machine: make sure unpriviliged "machinectl status" can show the machine's OS version |
717603e391b52983ca1fd218e7333a1b9dfc5c05 |
|
03-Jul-2014 |
Lennart Poettering <lennart@poettering.net> |
machinectl: show /etc/os-release information of container in status output |
d3152a09ac5804ec8603daee12f98cf03523cce0 |
|
18-May-2014 |
Lennart Poettering <lennart@poettering.net> |
machined: make sure GetMachineAddresses() is available for unprivileged processes |
adacb9575a09981fcf11279f2f661e3fc21e58ff |
|
10-Dec-2013 |
Lennart Poettering <lennart@poettering.net> |
bus: introduce "trusted" bus concept and encode access control in object vtables
Introduces a new concept of "trusted" vs. "untrusted" busses. For the
latter libsystemd-bus will automatically do per-method access control,
for the former all access is automatically granted. Per-method access
control is encoded in the vtables: by default all methods are only
accessible to privileged clients. If the SD_BUS_VTABLE_UNPRIVILEGED flag
is set for a method it is accessible to unprivileged clients too. By
default whether a client is privileged is determined via checking for
its CAP_SYS_ADMIN capability, but this can be altered via the
SD_BUS_VTABLE_CAPABILITY() macro that can be ORed into the flags field
of the method.
Writable properties are also subject to SD_BUS_VTABLE_UNPRIVILEGED and
SD_BUS_VTABLE_CAPABILITY() for controlling write access to them. Note
however that read access is unrestricted, as PropertiesChanged messages
might send out the values anyway as an unrestricted broadcast.
By default the system bus is set to "untrusted" and the user bus is
"trusted" since per-method access control on the latter is unnecessary.
On dbus1 busses we check the UID of the caller rather than the
configured capability since the capability cannot be determined without
race. On kdbus the capability is checked if possible from the attached
meta-data of a message and otherwise queried from the sending peer.
This also decorates the vtables of the various daemons we ship with
these flags. |
97e67f1e52ddc0c21a88cfbcab57e83c59ee627d |
|
02-Jul-2013 |
Lennart Poettering <lennart@poettering.net> |
machined: relax access to GetMachine() |
1ee306e1248866617c96ed9f4263f375588ad838 |
|
02-Jul-2013 |
Lennart Poettering <lennart@poettering.net> |
machined: split out machine registration stuff from logind
Embedded folks don't need the machine registration stuff, hence it's
nice to make this optional. Also, I'd expect that machinectl will grow
additional commands quickly, for example to join existing containers and
suchlike, hence it's better keeping that separate from loginctl. |