Commit Graph

2903 Commits

Author SHA1 Message Date
Lennart Poettering
898944a51a update TODO 2025-02-21 10:04:15 +01:00
Lennart Poettering
a971e6603f update TODO 2025-02-20 15:24:19 +01:00
Lennart Poettering
52cd94b9e4 update TODO 2025-02-19 16:08:39 +01:00
Lennart Poettering
47cb765b86 update TODO 2025-02-18 22:33:23 +01:00
Lennart Poettering
89b3d1fafb update TODO 2025-02-18 09:16:57 +01:00
Lennart Poettering
480f72c0a3 update TODO 2025-02-17 11:38:32 +01:00
Yu Watanabe
530ee01c60 TODO: fix typo
Follow-ups for 0eeeb36bd5 and
3fd11dbcd9.
2025-02-14 13:23:11 +09:00
Lennart Poettering
411bc7c96c update TODO 2025-02-13 17:43:11 +01:00
Lennart Poettering
3329debc93 update TODO 2025-02-13 17:35:59 +01:00
Daan De Meyer
3fd11dbcd9 Update TODO 2025-02-13 10:21:03 +01:00
Lennart Poettering
276e641275 update TODO 2025-02-12 22:02:04 +01:00
Lennart Poettering
0eeeb36bd5 update TODO 2025-02-12 21:55:57 +01:00
Lennart Poettering
a3196d4e9e update TODO 2025-02-10 10:05:01 +01:00
Lennart Poettering
592b715f4f update TODO 2025-02-09 23:44:00 +01:00
Lennart Poettering
a5e4a89b90 update TODO 2025-02-09 08:02:52 +01:00
Lennart Poettering
40e6d38b8a update TODO 2025-02-05 23:37:17 +01:00
Lennart Poettering
1ff24db10b update TODO 2025-02-05 11:51:31 +01:00
Lennart Poettering
bc9e080396 update TODO 2025-02-05 11:04:09 +01:00
Daan De Meyer
895b2f18cf Update TODO 2025-02-03 17:09:52 +01:00
Lennart Poettering
4b840414be cryptenroll/repart/creds: no longer default to binding against literal PCR 7
PCR 7 covers the SecureBoot policy, in particular "dbx", i.e. the
denylist of bad actors. That list is pretty much as frequently updated
as firmware these days (as fwupd took over automatic updating). This
means literal PCR 7 policies are problematic: they likely break soon,
and are as brittle as any other literal PCR policies.

hence, pick safer defaults, i.e. exclude PCR 7 from the default mask.
This means the mask is now empty.

Generally, people should really switch to signed PCR policies covering
PCR 11, in combination with systemd-pcrlock for the other PCRs.
2025-01-30 10:32:26 +01:00
Lennart Poettering
37cc66324c userdb: move filter of user/group records to the varlink server side (#36133)
In v257 userdbctl gained support for filtering user records with fuzzy
matching and some other parameters. It was done on the client side only.
This PR adds server-side matching, by exendting the generic userdb
varlink api.

The api is generic any may have many other implementors, hence care is
taken to fallback to exclusively client side filtering in case the
service does not support the new parameters.

In fact I even opted to not actually implement server-side filtering in
any services but systemd-userdbd.service, because it's probably not too
much an optimization in relevant services (we might want to revisit this
later). By implementing it in userdbd the primary entrypoint for userdb
is however covered: the multiplexer interface which provides a single
interface for the multitude of backends. Or in other words: the
multiplexer itself supports server-side filtering even if its own
backends don't, and will hide this neatly away.

One nice side effect from not implementing server side filtering for all
our backends is that the fallback codepaths are comprehensively tested.

Note that this adds some unit tests but not new integration test for all
this, as the filtering tests for userdbctl already existed before, we
just move their implementation from the client to the server side.
2025-01-29 13:11:38 +01:00
Lennart Poettering
814e9eab1e update TODO 2025-01-28 23:56:34 +01:00
Lennart Poettering
3512118499 update TODO 2025-01-27 23:51:57 +01:00
Lennart Poettering
d6b008b01e Enforce per-user quota on /tmp/ and /dev/shm/ as user logs in (#36010)
There's finally quota on tmpfs, hence let's use it to make it harder for
users to DoS the system by consuming all disk space in /tmp/ and
/dev/shm/.

This enforces a default limit of 80% quota of the backing fs for these
two dirs for users, but this can be overriden in the user record, if
desired.

This also adds two other interesting features:

1. mount units gain GracefulOptions= which takes optional mount options
that are added only if supported by the kernel. (this is used to enable
usrquota on /tmp/, if available.)
2. The PAM logic in service management now supports reading passwords
from service credentials and via the askpw logic. This used for make
testing easy (so that we can run0 into a homed user which strictly
requires a password).
2025-01-24 12:52:27 +01:00
Lennart Poettering
0054b7dce9 update TODO 2025-01-23 22:36:39 +01:00
Lennart Poettering
ab659a685e update TODO 2025-01-23 21:48:02 +01:00
Lennart Poettering
eab9b9b4ea update TODO 2025-01-21 23:06:55 +01:00
Lennart Poettering
3d3f27cd9a update TODO 2025-01-21 09:59:16 +01:00
Lennart Poettering
b2b7c54c17 update TODO 2025-01-20 21:51:40 +01:00
Lennart Poettering
09b70f7cc9 update TODO 2025-01-20 11:35:04 +01:00
Yu Watanabe
dadd182317 TODO: fix typo
Follow-up for fb8d46cffe.
2025-01-19 04:25:22 +09:00
Lennart Poettering
fb8d46cffe update TODO 2025-01-16 21:58:35 +01:00
Lennart Poettering
cf8f6cd057 logind: introduce "user-light" session class
This new session class is to "user" what "background" is to
"background-light": it doesn't cause the per-user service manager to
start.

This new session class is now the default if no session class was
provided at session registration time and the following conditions hold:

1. The session is not graphical
2. The user is not a regular user (but not root)

Or in other words root and system users won't get a service manager
started automatically if they go through a PAM session as part of things
like cron or ftp. They will however still get one if they log in
graphically.

This changes behaviour a bit, but hopefully in OK was.

This also makes "background-light" for system users incl. root.

This addresses one of the ideas discussed in #34988.
2025-01-15 17:03:21 +01:00
Lennart Poettering
3eafa5e23c update TODO 2025-01-15 10:37:19 +01:00
Lennart Poettering
28425b73ee update TODO 2025-01-15 00:26:00 +01:00
Lennart Poettering
857ddc2e55 core: serialize API bus id and validate before deserializing bus tracks, plus several other bus util cleanups (#35970)
Follow-up for #35406
2025-01-14 14:39:58 +01:00
Lennart Poettering
255468d7f2 update TODO 2025-01-14 13:59:54 +01:00
Mike Yuan
1446e3c392 core: serialize API bus id and validate before deserializing bus tracks 2025-01-13 21:52:19 +01:00
Zbigniew Jędrzejewski-Szmek
ad7e0fdbf9 Extend elf package metadata to pe/coff files (#35681) 2025-01-11 13:12:39 +01:00
Lennart Poettering
46f881e321 update TODO 2025-01-09 14:40:17 +01:00
Lennart Poettering
0ae98d2f23 update TODO 2025-01-09 14:36:37 +01:00
Lennart Poettering
268d39d18a update TODO 2025-01-08 22:24:39 +01:00
Lennart Poettering
bcd2764960 update TODO 2025-01-06 23:37:45 +01:00
Mike Yuan
4cad58788b namespace-util: hook pidref_namespace_open() up with pidfd_get_namespace()
Supersedes #35308
2025-01-04 17:08:00 +01:00
Yu Watanabe
aac9d150ed tpm2: tweaks to PCR mask parsing (#35835) 2025-01-04 12:42:54 +09:00
Lennart Poettering
55d47a8988 update TODO 2025-01-03 10:48:07 +01:00
Lennart Poettering
f16e08f18e update TODO 2025-01-03 10:44:38 +01:00
Mike Yuan
03ccee1939 errno-list: prefer strerrorname_np() as errno_to_name() provider 2025-01-02 12:01:53 +01:00
Lennart Poettering
ccaa76ac48 image-discovery: add per-user scope (#35510) 2024-12-20 22:12:35 +01:00
Lennart Poettering
2b717a7f14 update TODO 2024-12-20 18:04:01 +01:00