mirror of
https://github.com/morgan9e/systemd
synced 2026-04-14 00:14:32 +09:00
zsh-completion: generate completion for systemd-run from systemd-analyze
continuation of #37641
This commit is contained in:
committed by
Zbigniew Jędrzejewski-Szmek
parent
693f11d5ba
commit
dc6e9c548b
@@ -31,225 +31,9 @@ __systemctl() {
|
||||
|
||||
(( $+functions[_systemd-run_properties] )) ||
|
||||
_systemd-run_properties() {
|
||||
local -a _properties=(
|
||||
# man/systemd.exec.xml
|
||||
ExecSearchPath=
|
||||
WorkingDirectory=
|
||||
RootDirectory=
|
||||
RootImage=
|
||||
RootImageOptions=
|
||||
RootEphemeral=
|
||||
RootHash=
|
||||
RootHashSignature=
|
||||
RootVerity=
|
||||
RootImagePolicy=
|
||||
MountImagePolicy=
|
||||
ExtensionImagePolicy=
|
||||
MountAPIVFS=
|
||||
BindLogSockets=
|
||||
ProtectProc=
|
||||
ProcSubset=
|
||||
BindPaths=
|
||||
BindReadOnlyPaths=
|
||||
MountImages=
|
||||
ExtensionImages=
|
||||
ExtensionDirectories=
|
||||
User=
|
||||
Group=
|
||||
DynamicUser=
|
||||
SupplementaryGroups=
|
||||
SetLoginEnvironment=
|
||||
PAMName=
|
||||
CapabilityBoundingSet=
|
||||
AmbientCapabilities=
|
||||
NoNewPrivileges=
|
||||
SecureBits=
|
||||
SELinuxContext=
|
||||
AppArmorProfile=
|
||||
SmackProcessLabel=
|
||||
LimitCPU=
|
||||
LimitFSIZE=
|
||||
LimitDATA=
|
||||
LimitSTACK=
|
||||
LimitCORE=
|
||||
LimitRSS=
|
||||
LimitNOFILE=
|
||||
LimitAS=
|
||||
LimitNPROC=
|
||||
LimitMEMLOCK=
|
||||
LimitLOCKS=
|
||||
LimitSIGPENDING=
|
||||
LimitMSGQUEUE=
|
||||
LimitNICE=
|
||||
LimitRTPRIO=
|
||||
LimitRTTIME=
|
||||
UMask=
|
||||
CoredumpFilter=
|
||||
KeyringMode=
|
||||
OOMScoreAdjust=
|
||||
TimerSlackNSec=
|
||||
Personality=
|
||||
IgnoreSIGPIPE=
|
||||
Nice=
|
||||
CPUSchedulingPolicy=
|
||||
CPUSchedulingPriority=
|
||||
CPUSchedulingResetOnFork=
|
||||
CPUAffinity=
|
||||
NUMAPolicy=
|
||||
NUMAMask=
|
||||
IOSchedulingClass=
|
||||
IOSchedulingPriority=
|
||||
ProtectSystem=
|
||||
ProtectHome=
|
||||
RuntimeDirectory=
|
||||
StateDirectory=
|
||||
CacheDirectory=
|
||||
LogsDirectory=
|
||||
ConfigurationDirectory=
|
||||
RuntimeDirectoryMode=
|
||||
StateDirectoryMode=
|
||||
CacheDirectoryMode=
|
||||
LogsDirectoryMode=
|
||||
ConfigurationDirectoryMode=
|
||||
RuntimeDirectoryPreserve=
|
||||
TimeoutCleanSec=
|
||||
ReadWritePaths=
|
||||
ReadOnlyPaths=
|
||||
InaccessiblePaths=
|
||||
ExecPaths=
|
||||
NoExecPaths=
|
||||
TemporaryFileSystem=
|
||||
PrivateTmp=
|
||||
PrivateDevices=
|
||||
PrivateNetwork=
|
||||
NetworkNamespacePath=
|
||||
PrivateIPC=
|
||||
IPCNamespacePath=
|
||||
MemoryKSM=
|
||||
PrivatePIDs=
|
||||
PrivateUsers=
|
||||
ProtectHostname=
|
||||
ProtectClock=
|
||||
ProtectKernelTunables=
|
||||
ProtectKernelModules=
|
||||
ProtectKernelLogs=
|
||||
ProtectControlGroups=
|
||||
RestrictAddressFamilies=
|
||||
RestrictFileSystems=
|
||||
RestrictNamespaces=
|
||||
DelegateNamespaces=
|
||||
LockPersonality=
|
||||
MemoryDenyWriteExecute=
|
||||
RestrictRealtime=
|
||||
RestrictSUIDSGID=
|
||||
RemoveIPC=
|
||||
PrivateMounts=
|
||||
MountFlags=
|
||||
SystemCallFilter=
|
||||
SystemCallErrorNumber=
|
||||
SystemCallArchitectures=
|
||||
SystemCallLog=
|
||||
Environment=
|
||||
EnvironmentFile=
|
||||
PassEnvironment=
|
||||
UnsetEnvironment=
|
||||
StandardInput=
|
||||
StandardOutput=
|
||||
StandardError=
|
||||
StandardInputText=
|
||||
StandardInputData=
|
||||
LogLevelMax=
|
||||
LogExtraFields=
|
||||
LogRateLimitIntervalSec=
|
||||
LogRateLimitBurst=
|
||||
LogFilterPatterns=
|
||||
LogNamespace=
|
||||
SyslogIdentifier=
|
||||
SyslogFacility=
|
||||
SyslogLevel=
|
||||
SyslogLevelPrefix=
|
||||
TTYPath=
|
||||
TTYReset=
|
||||
TTYVHangup=
|
||||
TTYColumns=
|
||||
TTYRows=
|
||||
TTYVTDisallocate=
|
||||
LoadCredential=
|
||||
LoadCredentialEncrypted=
|
||||
ImportCredential=
|
||||
SetCredential=
|
||||
SetCredentialEncrypted=
|
||||
UtmpIdentifier=
|
||||
UtmpMode=
|
||||
|
||||
# man/systemd.kill.xml
|
||||
KillMode=
|
||||
KillSignal=
|
||||
RestartKillSignal=
|
||||
SendSIGHUP=
|
||||
SendSIGKILL=
|
||||
FinalKillSignal=
|
||||
WatchdogSignal=
|
||||
|
||||
# man/systemd.resource-control.xml
|
||||
CPUWeight=
|
||||
StartupCPUWeight=
|
||||
CPUQuota=
|
||||
CPUQuotaPeriodSec=
|
||||
AllowedCPUs=
|
||||
StartupAllowedCPUs=
|
||||
MemoryAccounting=
|
||||
MemoryMin=
|
||||
MemoryLow=
|
||||
StartupMemoryLow=
|
||||
DefaultStartupMemoryLow=
|
||||
MemoryHigh=
|
||||
StartupMemoryHigh=
|
||||
MemoryMax=
|
||||
StartupMemoryMax=
|
||||
MemorySwapMax=
|
||||
StartupMemorySwapMax=
|
||||
MemoryZSwapMax=
|
||||
StartupMemoryZSwapMax=
|
||||
MemoryZSwapWriteback=
|
||||
AllowedMemoryNodes=
|
||||
StartupAllowedMemoryNodes=
|
||||
TasksAccounting=
|
||||
TasksMax=
|
||||
IOAccounting=
|
||||
IOWeight=
|
||||
StartupIOWeight=
|
||||
IODeviceWeight=
|
||||
IOReadBandwidthMax=
|
||||
IOWriteBandwidthMax=
|
||||
IOReadIOPSMax=
|
||||
IOWriteIOPSMax=
|
||||
IODeviceLatencyTargetSec=
|
||||
IPAccounting=
|
||||
IPAddressAllow=
|
||||
IPAddressDeny=
|
||||
SocketBindAllow=
|
||||
SocketBindDeny=
|
||||
RestrictNetworkInterfaces=
|
||||
NFTSet=
|
||||
IPIngressFilterPath=
|
||||
IPEgressFilterPath=
|
||||
BPFProgram=
|
||||
DeviceAllow=
|
||||
DevicePolicy=
|
||||
Slice=
|
||||
Delegate=
|
||||
DelegateSubgroup=
|
||||
DisableControllers=
|
||||
ManagedOOMSwap=
|
||||
ManagedOOMMemoryPressure=
|
||||
ManagedOOMMemoryPressureLimit=
|
||||
ManagedOOMMemoryPressureDurationSec=
|
||||
ManagedOOMPreference=
|
||||
MemoryPressureWatch=
|
||||
MemoryPressureThresholdSec=
|
||||
CoredumpReceive=
|
||||
)
|
||||
local -a _properties
|
||||
_properties=($( systemd-analyze transient-settings scope service 2>/dev/null |
|
||||
while read -r p; do [ -z "$p" ] || echo "$p="; done ))
|
||||
_values 'NAME=VALUE' "${_properties[@]}"
|
||||
}
|
||||
|
||||
|
||||
Reference in New Issue
Block a user