c2fc2c2560f0ca0fab383753c065e45d76f465e5 |
|
29-Sep-2015 |
Lennart Poettering <lennart@poettering.net> |
units: increase watchdog timeout to 3min for all our services
Apparently, disk IO issues are more frequent than we hope, and 1min
waiting for disk IO happens, so let's increase the watchdog timeout a
bit, for all our services.
See #1353 for an example where this triggers. |
b242faae06034c981927f48a80817aae04e5e7ff |
|
27-Jul-2015 |
Lennart Poettering <lennart@poettering.net> |
units: add more caps to machined
Otherwise copying full directory trees between container and host won't
work, as we cannot access some fiels and cannot adjust the ownership
properly on the destination.
Of course, adding these many caps to the daemon kinda defeats the
purpose of the caps lock-down... but well...
Fixes #433 |
90adaa25e894a580930ef2c3e65ab8db8295515a |
|
17-Feb-2015 |
Lennart Poettering <lennart@poettering.net> |
machined: move logic for bind mounting into containers from machinectl to machined
This extends the bus interface, adding BindMountMachine() for bind
mounting directories from the host into the container. |
a24111cea64e042b49d8b4bca85ce6092845bbec |
|
11-Feb-2015 |
Lennart Poettering <lennart@poettering.net> |
Revert "units: add SecureBits"
This reverts commit 6a716208b346b742053cfd01e76f76fb27c4ea47.
Apparently this doesn't work.
http://lists.freedesktop.org/archives/systemd-devel/2015-February/028212.html |
6a716208b346b742053cfd01e76f76fb27c4ea47 |
|
11-Feb-2015 |
Topi Miettinen <toiwoton@gmail.com> |
units: add SecureBits
No setuid programs are expected to be executed, so add
SecureBits=noroot noroot-locked
to unit files. |
cd61c3bfd718fb398cc53ced906266a9297782c9 |
|
19-Dec-2014 |
Lennart Poettering <lennart@poettering.net> |
machined/machinectl: add logic to show list of available images
This adds a new bus call to machined that enumerates /var/lib/container
and returns all trees stored in it, distuingishing three types:
- GPT disk images, which are files suffixed with ".gpt"
- directory trees
- btrfs subvolumes |
717603e391b52983ca1fd218e7333a1b9dfc5c05 |
|
03-Jul-2014 |
Lennart Poettering <lennart@poettering.net> |
machinectl: show /etc/os-release information of container in status output |
a55954297dade7b432fd3a4f328f23261621ff79 |
|
19-Jun-2014 |
Lennart Poettering <lennart@poettering.net> |
units: add missing caps so that GetAddresses() can work |
3c52ad9237ead4fc26888348f3da74d896fb06ab |
|
06-Jun-2014 |
Lennart Poettering <lennart@poettering.net> |
units: fix minor typo |
1b8689f94983b47bf190e77ddb03a8fc6af15fb3 |
|
04-Jun-2014 |
Lennart Poettering <lennart@poettering.net> |
core: rename ReadOnlySystem= to ProtectSystem= and add a third value for also mounting /etc read-only
Also, rename ProtectedHome= to ProtectHome=, to simplify things a bit.
With this in place we now have two neat options ProtectSystem= and
ProtectHome= for protecting the OS itself (and optionally its
configuration), and for protecting the user's data. |
417116f23432073162ebfcb286a7800846482eed |
|
03-Jun-2014 |
Lennart Poettering <lennart@poettering.net> |
core: add new ReadOnlySystem= and ProtectedHome= settings for service units
ReadOnlySystem= uses fs namespaces to mount /usr and /boot read-only for
a service.
ProtectedHome= uses fs namespaces to mount /home and /run/user
inaccessible or read-only for a service.
This patch also enables these settings for all our long-running services.
Together they should be good building block for a minimal service
sandbox, removing the ability for services to modify the operating
system or access the user's private data. |
f21a71a907a1b1289faec94559f4a1c111ea1d13 |
|
19-Mar-2014 |
Lennart Poettering <lennart@poettering.net> |
core: enable PrivateNetwork= for a number of our long running services where this is useful |
d99a70529637d44cdd8f6ade3b981ea33f09d90d |
|
19-Mar-2014 |
Lennart Poettering <lennart@poettering.net> |
units: make use of PrivateTmp=yes and PrivateDevices=yes for all our long-running daemons |
9a8112f5e9f1d80bf1740fe507185f992ab3c34c |
|
23-Dec-2013 |
Lennart Poettering <lennart@poettering.net> |
units: systemd-machined now exits on idle and we shouldn't try to restart it then |
cde93897cdefdd7c7f66c400a61e42ceee5f6a46 |
|
11-Dec-2013 |
Lennart Poettering <lennart@poettering.net> |
event: hook up sd-event with the service watchdog logic
Adds a new call sd_event_set_watchdog() that can be used to hook up the
event loop with the watchdog supervision logic of systemd. If enabled
and $WATCHDOG_USEC is set the event loop will ping the invoking systemd
daemon right after coming back from epoll_wait() but not more often than
$WATCHDOG_USEC/4. The epoll_wait() will sleep no longer than
$WATCHDOG_USEC/4*3, to make sure the service manager is called in time.
This means that setting WatchdogSec= in a .service file and calling
sd_event_set_watchdog() in your daemon is enough to hook it up with the
watchdog logic. |
bc5cb1d525461c75e69ce1f82a52e223309cca7c |
|
19-Jul-2013 |
Lennart Poettering <lennart@poettering.net> |
machined: run machined at minimal capabilities |
085b90af43fefd9ed195902c4b55f1da3c568554 |
|
19-Jul-2013 |
Lennart Poettering <lennart@poettering.net> |
units: add references to bus API documentation to logind+machined |
1ee306e1248866617c96ed9f4263f375588ad838 |
|
02-Jul-2013 |
Lennart Poettering <lennart@poettering.net> |
machined: split out machine registration stuff from logind
Embedded folks don't need the machine registration stuff, hence it's
nice to make this optional. Also, I'd expect that machinectl will grow
additional commands quickly, for example to join existing containers and
suchlike, hence it's better keeping that separate from loginctl. |