Commit Graph

2928 Commits

Author SHA1 Message Date
Lennart Poettering
76f1c94674 update TODO 2025-03-13 10:35:24 +01:00
Lennart Poettering
ceaf0bda47 update TODO 2025-03-13 09:55:59 +01:00
Lennart Poettering
d77bf27c80 update TODO 2025-03-12 13:35:20 +01:00
Lennart Poettering
36f529fd2d update TODO 2025-03-12 13:30:30 +01:00
Yu Watanabe
ced634a62d resolve question marks in /etc/hostname to characters hashed from machine ID (#36647)
So I have a bunch of particle os instances around, that I frequently
factory reset. and it's confusing, since they all have the same name.
Let's do something about this, and extend the hostname setup logic a bit
to deal better with "cattle" rather than "pet" deployments.
Specifically: if a hostname in /etc/hostname contains a bunch of
question marks we'll replace it with hex chars hashed from the machine
id.

This allows us to do something like this:

hostnamectl set-hostname --static 'funky-????-????-???'

and we'll end up with a hostname like `funky-baf4-b653-e230`
2025-03-12 04:50:33 +09:00
Lennart Poettering
5721b9bc46 update TODO 2025-03-11 18:20:31 +01:00
Lennart Poettering
16771b505e update TODO 2025-03-11 18:19:24 +01:00
Lennart Poettering
06967d4049 update TODO 2025-03-11 18:01:42 +01:00
Lennart Poettering
338553715b update TODO 2025-03-11 17:19:32 +01:00
Lennart Poettering
f8a09ace1d core/service: introduce sd_notify() RESTART_RESET=1 for resetting restart counter (#36698) 2025-03-11 12:03:12 +01:00
Lennart Poettering
a0d8484eeb update TODO 2025-03-11 10:48:40 +01:00
Mike Yuan
c139ac7f53 TODO: support RESTART_RESET=1 in journal-upload 2025-03-11 00:44:44 +01:00
Lennart Poettering
1ec2d28b6f update TODO 2025-03-07 18:15:13 +01:00
Lennart Poettering
f63a4ef4a0 update TODO 2025-03-07 14:59:29 +01:00
Lennart Poettering
4d44670dc6 update TODO 2025-03-06 23:11:20 +01:00
Lennart Poettering
457f4cfbba update TODO 2025-03-06 22:32:30 +01:00
Lennart Poettering
c65f40b1a1 update TODO 2025-03-06 11:30:06 +01:00
Lennart Poettering
c22948f6c2 factory-reset: rework infrastructure, make it work with gpt-auto, and add support for resetting TPM as part of factory reset (#36512) 2025-03-05 15:25:36 +01:00
Yu Watanabe
7ae2ea52ac TODO: fix typo
Follow-up for 31ec0d8a2e.
2025-03-05 23:17:36 +09:00
Lennart Poettering
0f2425b2fc update TODO 2025-03-05 12:38:46 +01:00
Lennart Poettering
9e050b0458 repart: port to new factory reset state apis 2025-03-05 12:37:24 +01:00
Lennart Poettering
31ec0d8a2e update TODO 2025-03-05 11:40:46 +01:00
Daan De Meyer
d9c7d47f99 Update TODO 2025-02-27 14:55:00 +01:00
Lennart Poettering
4ec864162d update TODO 2025-02-26 22:07:05 +01:00
Lennart Poettering
b7908e1cb7 update TODO 2025-02-25 14:32:23 +01:00
Lennart Poettering
898944a51a update TODO 2025-02-21 10:04:15 +01:00
Lennart Poettering
a971e6603f update TODO 2025-02-20 15:24:19 +01:00
Lennart Poettering
52cd94b9e4 update TODO 2025-02-19 16:08:39 +01:00
Lennart Poettering
47cb765b86 update TODO 2025-02-18 22:33:23 +01:00
Lennart Poettering
89b3d1fafb update TODO 2025-02-18 09:16:57 +01:00
Lennart Poettering
480f72c0a3 update TODO 2025-02-17 11:38:32 +01:00
Yu Watanabe
530ee01c60 TODO: fix typo
Follow-ups for 0eeeb36bd5 and
3fd11dbcd9.
2025-02-14 13:23:11 +09:00
Lennart Poettering
411bc7c96c update TODO 2025-02-13 17:43:11 +01:00
Lennart Poettering
3329debc93 update TODO 2025-02-13 17:35:59 +01:00
Daan De Meyer
3fd11dbcd9 Update TODO 2025-02-13 10:21:03 +01:00
Lennart Poettering
276e641275 update TODO 2025-02-12 22:02:04 +01:00
Lennart Poettering
0eeeb36bd5 update TODO 2025-02-12 21:55:57 +01:00
Lennart Poettering
a3196d4e9e update TODO 2025-02-10 10:05:01 +01:00
Lennart Poettering
592b715f4f update TODO 2025-02-09 23:44:00 +01:00
Lennart Poettering
a5e4a89b90 update TODO 2025-02-09 08:02:52 +01:00
Lennart Poettering
40e6d38b8a update TODO 2025-02-05 23:37:17 +01:00
Lennart Poettering
1ff24db10b update TODO 2025-02-05 11:51:31 +01:00
Lennart Poettering
bc9e080396 update TODO 2025-02-05 11:04:09 +01:00
Daan De Meyer
895b2f18cf Update TODO 2025-02-03 17:09:52 +01:00
Lennart Poettering
4b840414be cryptenroll/repart/creds: no longer default to binding against literal PCR 7
PCR 7 covers the SecureBoot policy, in particular "dbx", i.e. the
denylist of bad actors. That list is pretty much as frequently updated
as firmware these days (as fwupd took over automatic updating). This
means literal PCR 7 policies are problematic: they likely break soon,
and are as brittle as any other literal PCR policies.

hence, pick safer defaults, i.e. exclude PCR 7 from the default mask.
This means the mask is now empty.

Generally, people should really switch to signed PCR policies covering
PCR 11, in combination with systemd-pcrlock for the other PCRs.
2025-01-30 10:32:26 +01:00
Lennart Poettering
37cc66324c userdb: move filter of user/group records to the varlink server side (#36133)
In v257 userdbctl gained support for filtering user records with fuzzy
matching and some other parameters. It was done on the client side only.
This PR adds server-side matching, by exendting the generic userdb
varlink api.

The api is generic any may have many other implementors, hence care is
taken to fallback to exclusively client side filtering in case the
service does not support the new parameters.

In fact I even opted to not actually implement server-side filtering in
any services but systemd-userdbd.service, because it's probably not too
much an optimization in relevant services (we might want to revisit this
later). By implementing it in userdbd the primary entrypoint for userdb
is however covered: the multiplexer interface which provides a single
interface for the multitude of backends. Or in other words: the
multiplexer itself supports server-side filtering even if its own
backends don't, and will hide this neatly away.

One nice side effect from not implementing server side filtering for all
our backends is that the fallback codepaths are comprehensively tested.

Note that this adds some unit tests but not new integration test for all
this, as the filtering tests for userdbctl already existed before, we
just move their implementation from the client to the server side.
2025-01-29 13:11:38 +01:00
Lennart Poettering
814e9eab1e update TODO 2025-01-28 23:56:34 +01:00
Lennart Poettering
3512118499 update TODO 2025-01-27 23:51:57 +01:00
Lennart Poettering
d6b008b01e Enforce per-user quota on /tmp/ and /dev/shm/ as user logs in (#36010)
There's finally quota on tmpfs, hence let's use it to make it harder for
users to DoS the system by consuming all disk space in /tmp/ and
/dev/shm/.

This enforces a default limit of 80% quota of the backing fs for these
two dirs for users, but this can be overriden in the user record, if
desired.

This also adds two other interesting features:

1. mount units gain GracefulOptions= which takes optional mount options
that are added only if supported by the kernel. (this is used to enable
usrquota on /tmp/, if available.)
2. The PAM logic in service management now supports reading passwords
from service credentials and via the askpw logic. This used for make
testing easy (so that we can run0 into a homed user which strictly
requires a password).
2025-01-24 12:52:27 +01:00
Lennart Poettering
0054b7dce9 update TODO 2025-01-23 22:36:39 +01:00