History log of /systemd/units/systemd-machined.service.in
Revision Date Author Comments Expand
c2fc2c2560f0ca0fab383753c065e45d76f465e5 29-Sep-2015 Lennart Poettering <lennart@poettering.net>

units: increase watchdog timeout to 3min for all our services Apparently, disk IO issues are more frequent than we hope, and 1min waiting for disk IO happens, so let's increase the watchdog timeout a bit, for all our services. See #1353 for an example where this triggers.

b242faae06034c981927f48a80817aae04e5e7ff 27-Jul-2015 Lennart Poettering <lennart@poettering.net>

units: add more caps to machined Otherwise copying full directory trees between container and host won't work, as we cannot access some fiels and cannot adjust the ownership properly on the destination. Of course, adding these many caps to the daemon kinda defeats the purpose of the caps lock-down... but well... Fixes #433

90adaa25e894a580930ef2c3e65ab8db8295515a 17-Feb-2015 Lennart Poettering <lennart@poettering.net>

machined: move logic for bind mounting into containers from machinectl to machined This extends the bus interface, adding BindMountMachine() for bind mounting directories from the host into the container.

a24111cea64e042b49d8b4bca85ce6092845bbec 11-Feb-2015 Lennart Poettering <lennart@poettering.net>

Revert "units: add SecureBits" This reverts commit 6a716208b346b742053cfd01e76f76fb27c4ea47. Apparently this doesn't work. http://lists.freedesktop.org/archives/systemd-devel/2015-February/028212.html

6a716208b346b742053cfd01e76f76fb27c4ea47 11-Feb-2015 Topi Miettinen <toiwoton@gmail.com>

units: add SecureBits No setuid programs are expected to be executed, so add SecureBits=noroot noroot-locked to unit files.

cd61c3bfd718fb398cc53ced906266a9297782c9 19-Dec-2014 Lennart Poettering <lennart@poettering.net>

machined/machinectl: add logic to show list of available images This adds a new bus call to machined that enumerates /var/lib/container and returns all trees stored in it, distuingishing three types: - GPT disk images, which are files suffixed with ".gpt" - directory trees - btrfs subvolumes

717603e391b52983ca1fd218e7333a1b9dfc5c05 03-Jul-2014 Lennart Poettering <lennart@poettering.net>

machinectl: show /etc/os-release information of container in status output

a55954297dade7b432fd3a4f328f23261621ff79 19-Jun-2014 Lennart Poettering <lennart@poettering.net>

units: add missing caps so that GetAddresses() can work

3c52ad9237ead4fc26888348f3da74d896fb06ab 06-Jun-2014 Lennart Poettering <lennart@poettering.net>

units: fix minor typo

1b8689f94983b47bf190e77ddb03a8fc6af15fb3 04-Jun-2014 Lennart Poettering <lennart@poettering.net>

core: rename ReadOnlySystem= to ProtectSystem= and add a third value for also mounting /etc read-only Also, rename ProtectedHome= to ProtectHome=, to simplify things a bit. With this in place we now have two neat options ProtectSystem= and ProtectHome= for protecting the OS itself (and optionally its configuration), and for protecting the user's data.

417116f23432073162ebfcb286a7800846482eed 03-Jun-2014 Lennart Poettering <lennart@poettering.net>

core: add new ReadOnlySystem= and ProtectedHome= settings for service units ReadOnlySystem= uses fs namespaces to mount /usr and /boot read-only for a service. ProtectedHome= uses fs namespaces to mount /home and /run/user inaccessible or read-only for a service. This patch also enables these settings for all our long-running services. Together they should be good building block for a minimal service sandbox, removing the ability for services to modify the operating system or access the user's private data.

f21a71a907a1b1289faec94559f4a1c111ea1d13 19-Mar-2014 Lennart Poettering <lennart@poettering.net>

core: enable PrivateNetwork= for a number of our long running services where this is useful

d99a70529637d44cdd8f6ade3b981ea33f09d90d 19-Mar-2014 Lennart Poettering <lennart@poettering.net>

units: make use of PrivateTmp=yes and PrivateDevices=yes for all our long-running daemons

9a8112f5e9f1d80bf1740fe507185f992ab3c34c 23-Dec-2013 Lennart Poettering <lennart@poettering.net>

units: systemd-machined now exits on idle and we shouldn't try to restart it then

cde93897cdefdd7c7f66c400a61e42ceee5f6a46 11-Dec-2013 Lennart Poettering <lennart@poettering.net>

event: hook up sd-event with the service watchdog logic Adds a new call sd_event_set_watchdog() that can be used to hook up the event loop with the watchdog supervision logic of systemd. If enabled and $WATCHDOG_USEC is set the event loop will ping the invoking systemd daemon right after coming back from epoll_wait() but not more often than $WATCHDOG_USEC/4. The epoll_wait() will sleep no longer than $WATCHDOG_USEC/4*3, to make sure the service manager is called in time. This means that setting WatchdogSec= in a .service file and calling sd_event_set_watchdog() in your daemon is enough to hook it up with the watchdog logic.

bc5cb1d525461c75e69ce1f82a52e223309cca7c 19-Jul-2013 Lennart Poettering <lennart@poettering.net>

machined: run machined at minimal capabilities

085b90af43fefd9ed195902c4b55f1da3c568554 19-Jul-2013 Lennart Poettering <lennart@poettering.net>

units: add references to bus API documentation to logind+machined

1ee306e1248866617c96ed9f4263f375588ad838 02-Jul-2013 Lennart Poettering <lennart@poettering.net>

machined: split out machine registration stuff from logind Embedded folks don't need the machine registration stuff, hence it's nice to make this optional. Also, I'd expect that machinectl will grow additional commands quickly, for example to join existing containers and suchlike, hence it's better keeping that separate from loginctl.