1
0
mirror of https://github.com/systemd/systemd synced 2026-04-03 21:54:58 +02:00

Compare commits

..

No commits in common. "be0cc2ce6c947aafadb3f42dba405269f670b31c" and "222cd15654fda4ec9d58f866ab57861ab19f5920" have entirely different histories.

11 changed files with 7 additions and 106 deletions

View File

@ -60,23 +60,6 @@
area, which is not available in other encryption formats.</para> area, which is not available in other encryption formats.</para>
</refsect1> </refsect1>
<refsect1>
<title>Limitations</title>
<para>Note that currently when enrolling a new key of one of the five supported types listed above, it is
required to first provide a passphrase or recovery key (i.e. one of the latter two key types). For
example, it's currently not possible to unlock a device with a FIDO2 key in order to enroll a new FIDO2
key. Instead, in order to enroll a new FIDO2 key, it is necessary to provide an already enrolled regular
passphrase or recovery key. Thus, if in future key roll-over is desired it's generally recommended to
combine TPM2, FIDO2, PKCS#11 key enrollment with enrolling a regular passphrase or recovery key.</para>
<para>Also note that support for enrolling multiple FIDO2 tokens is currently not too useful, as while
unlocking <command>systemd-cryptsetup</command> cannot identify which token is currently plugged in and
thus does not know which authentication request to send to the device. This limitation does not apply to
tokens enrolled via PKCS#11 — because tokens of this type may be identified immediately, before
authentication.</para>
</refsect1>
<refsect1> <refsect1>
<title>Options</title> <title>Options</title>

View File

@ -190,17 +190,12 @@ static void test_x11_convert_to_vconsole(void) {
} }
int main(int argc, char **argv) { int main(int argc, char **argv) {
_cleanup_free_ char *map = NULL;
test_setup_logging(LOG_DEBUG); test_setup_logging(LOG_DEBUG);
test_find_language_fallback(); test_find_language_fallback();
test_find_converted_keymap(); test_find_converted_keymap();
test_find_legacy_keymap(); test_find_legacy_keymap();
assert_se(get_testdata_dir("test-keymap-util/kbd-model-map", &map) >= 0);
assert_se(setenv("SYSTEMD_KBD_MODEL_MAP", map, 1) == 0);
test_vconsole_convert_to_x11(); test_vconsole_convert_to_x11();
test_x11_convert_to_vconsole(); test_x11_convert_to_vconsole();

View File

@ -34,12 +34,6 @@ static int netdev_veth_fill_message_create(NetDev *netdev, Link *link, sd_netlin
return log_netdev_error_errno(netdev, r, "Could not append IFLA_ADDRESS attribute: %m"); return log_netdev_error_errno(netdev, r, "Could not append IFLA_ADDRESS attribute: %m");
} }
if (netdev->mtu != 0) {
r = sd_netlink_message_append_u32(m, IFLA_MTU, netdev->mtu);
if (r < 0)
return log_netdev_error_errno(netdev, r, "Could not append IFLA_MTU attribute: %m");
}
r = sd_netlink_message_close_container(m); r = sd_netlink_message_close_container(m);
if (r < 0) if (r < 0)
return log_netdev_error_errno(netdev, r, "Could not append IFLA_INFO_DATA attribute: %m"); return log_netdev_error_errno(netdev, r, "Could not append IFLA_INFO_DATA attribute: %m");

View File

@ -13,6 +13,7 @@ test_include_dir = include_directories('.')
path = run_command(sh, '-c', 'echo "$PATH"').stdout().strip() path = run_command(sh, '-c', 'echo "$PATH"').stdout().strip()
test_env = environment() test_env = environment()
test_env.set('SYSTEMD_KBD_MODEL_MAP', kbd_model_map)
test_env.set('SYSTEMD_LANGUAGE_FALLBACK_MAP', language_fallback_map) test_env.set('SYSTEMD_LANGUAGE_FALLBACK_MAP', language_fallback_map)
test_env.set('PATH', project_build_root + ':' + path) test_env.set('PATH', project_build_root + ':' + path)

View File

@ -36,9 +36,6 @@ if install_tests
install_subdir('testsuite-63.units', install_subdir('testsuite-63.units',
install_dir : testdata_dir) install_dir : testdata_dir)
install_data(kbd_model_map,
install_dir : testdata_dir + '/test-keymap-util')
testsuite08_dir = testdata_dir + '/testsuite-08.units' testsuite08_dir = testdata_dir + '/testsuite-08.units'
install_data('testsuite-08.units/-.mount', install_data('testsuite-08.units/-.mount',
install_dir : testsuite08_dir) install_dir : testsuite08_dir)

View File

@ -951,21 +951,14 @@ install_multipath() {
install_lvm() { install_lvm() {
image_install lvm image_install lvm
image_install "${ROOTLIBDIR:?}"/system/lvm2-lvmpolld.{service,socket} image_install "${ROOTLIBDIR:?}"/system/lvm2-lvmpolld.{service,socket}
image_install "${ROOTLIBDIR:?}"/system/{blk-availability,lvm2-monitor}.service image_install "${ROOTLIBDIR:?}"/system/{blk-availability,lvm2-monitor,lvm2-pvscan@}.service
image_install "${ROOTLIBDIR:?}"/system-generators/lvm2-activation-generator image_install "${ROOTLIBDIR:?}"/system-generators/lvm2-activation-generator
image_install -o "/lib/tmpfiles.d/lvm2.conf" image_install -o "/lib/tmpfiles.d/lvm2.conf"
if get_bool "$LOOKS_LIKE_DEBIAN"; then if get_bool "$LOOKS_LIKE_DEBIAN"; then
inst_rules 56-lvm.rules 69-lvm-metad.rules inst_rules 56-lvm.rules 69-lvm-metad.rules
else else
# Support the new udev autoactivation introduced in lvm 2.03.14
# https://sourceware.org/git/?p=lvm2.git;a=commit;h=67722b312390cdab29c076c912e14bd739c5c0f6
if [[ -f /lib/udev/rules.d/69-dm-lvm.rules ]]; then
inst_rules 11-dm-lvm.rules 69-dm-lvm.rules
else
image_install "${ROOTLIBDIR:?}"/system/lvm2-pvscan@.service
inst_rules 11-dm-lvm.rules 69-dm-lvm-metad.rules inst_rules 11-dm-lvm.rules 69-dm-lvm-metad.rules
fi fi
fi
mkdir -p "${initdir:?}/etc/lvm" mkdir -p "${initdir:?}/etc/lvm"
} }

View File

@ -1 +0,0 @@
../../src/locale/kbd-model-map

View File

@ -1,10 +0,0 @@
# SPDX-License-Identifier: LGPL-2.1-or-later
[NetDev]
Name=veth-mtu
Kind=veth
MACAddress=12:34:56:78:9a:be
MTUBytes=1800
[Peer]
Name=veth-mtu-peer
MACAddress=12:34:56:78:9a:bf

View File

@ -8,8 +8,6 @@ Name=macvlan99
Name=macvtap99 Name=macvtap99
Name=veth99 Name=veth99
Name=veth-peer Name=veth-peer
Name=veth-mtu
Name=veth-mtu-peer
Name=vcan99 Name=vcan99
Name=vxcan99 Name=vxcan99
Name=vxcan-peer Name=vxcan-peer

View File

@ -904,7 +904,6 @@ class NetworkdNetDevTests(unittest.TestCase, Utilities):
'test1', 'test1',
'tun99', 'tun99',
'vcan99', 'vcan99',
'veth-mtu',
'veth99', 'veth99',
'vlan99', 'vlan99',
'vrf99', 'vrf99',
@ -995,7 +994,6 @@ class NetworkdNetDevTests(unittest.TestCase, Utilities):
'25-tunnel-remote-any.network', '25-tunnel-remote-any.network',
'25-tunnel.network', '25-tunnel.network',
'25-vcan.netdev', '25-vcan.netdev',
'25-veth-mtu.netdev',
'25-veth.netdev', '25-veth.netdev',
'25-vrf.netdev', '25-vrf.netdev',
'25-vti6-tunnel-any-any.netdev', '25-vti6-tunnel-any-any.netdev',
@ -1284,11 +1282,10 @@ class NetworkdNetDevTests(unittest.TestCase, Utilities):
self.assertRegex(output, 'ipvtap *mode ' + mode.lower() + ' ' + flag) self.assertRegex(output, 'ipvtap *mode ' + mode.lower() + ' ' + flag)
def test_veth(self): def test_veth(self):
copy_unit_to_networkd_unit_path('25-veth.netdev', 'netdev-link-local-addressing-yes.network', copy_unit_to_networkd_unit_path('25-veth.netdev', 'netdev-link-local-addressing-yes.network')
'25-veth-mtu.netdev')
start_networkd() start_networkd()
self.wait_online(['veth99:degraded', 'veth-peer:degraded', 'veth-mtu:degraded', 'veth-mtu-peer:degraded']) self.wait_online(['veth99:degraded', 'veth-peer:degraded'])
output = check_output('ip -d link show veth99') output = check_output('ip -d link show veth99')
print(output) print(output)
@ -1297,15 +1294,6 @@ class NetworkdNetDevTests(unittest.TestCase, Utilities):
print(output) print(output)
self.assertRegex(output, 'link/ether 12:34:56:78:9a:bd') self.assertRegex(output, 'link/ether 12:34:56:78:9a:bd')
output = check_output('ip -d link show veth-mtu')
print(output)
self.assertRegex(output, 'link/ether 12:34:56:78:9a:be')
self.assertRegex(output, 'mtu 1800')
output = check_output('ip -d link show veth-mtu-peer')
print(output)
self.assertRegex(output, 'link/ether 12:34:56:78:9a:bf')
self.assertRegex(output, 'mtu 1800')
def test_tun(self): def test_tun(self):
copy_unit_to_networkd_unit_path('25-tun.netdev') copy_unit_to_networkd_unit_path('25-tun.netdev')
start_networkd() start_networkd()

View File

@ -58,43 +58,6 @@ helper_wait_for_dev() {
return 1 return 1
} }
# Wrapper around `helper_wait_for_lvm_activate()` and `helper_wait_for_pvscan()`
# functions to cover differences between pre and post lvm 2.03.14, which introduced
# a new way of vgroup autoactivation
# See: https://sourceware.org/git/?p=lvm2.git;a=commit;h=67722b312390cdab29c076c912e14bd739c5c0f6
# Arguments:
# $1 - device path (for helper_wait_for_pvscan())
# $2 - volume group name (for helper_wait_for_lvm_activate())
# $3 - number of retries (default: 10)
helper_wait_for_vgroup() {
local dev="${1:?}"
local vgroup="${2:?}"
local ntries="${3:-10}"
if ! systemctl -q list-unit-files lvm2-pvscan@.service >/dev/null; then
helper_wait_for_lvm_activate "$vgroup" "$ntries"
else
helper_wait_for_pvscan "$dev" "$ntries"
fi
}
# Wait for the lvm-activate-$vgroup.service of a specific $vgroup to finish
# Arguments:
# $1 - volume group name
# $2 - number of retries (default: 10)
helper_wait_for_lvm_activate() {
local vgroup="${1:?}"
local ntries="${2:-10}"
local i
for ((i = 0; i < ntries; i++)); do
! systemctl -q is-active "lvm-activate-$vgroup.service" || return 0
sleep .5
done
return 1
}
# Wait for the lvm2-pvscan@.service of a specific device to finish # Wait for the lvm2-pvscan@.service of a specific device to finish
# Arguments: # Arguments:
# $1 - device path # $1 - device path
@ -102,7 +65,7 @@ helper_wait_for_lvm_activate() {
helper_wait_for_pvscan() { helper_wait_for_pvscan() {
local dev="${1:?}" local dev="${1:?}"
local ntries="${2:-10}" local ntries="${2:-10}"
local MAJOR MINOR i pvscan_svc real_dev local MAJOR MINOR pvscan_svc real_dev
# Sanity check we got a valid block device (or a symlink to it) # Sanity check we got a valid block device (or a symlink to it)
real_dev="$(readlink -f "$dev")" real_dev="$(readlink -f "$dev")"
@ -613,7 +576,7 @@ testcase_iscsi_lvm() {
udevadm settle udevadm settle
for link in "${expected_symlinks[@]}"; do for link in "${expected_symlinks[@]}"; do
helper_wait_for_dev "$link" helper_wait_for_dev "$link"
helper_wait_for_vgroup "$link" "$vgroup" helper_wait_for_pvscan "$link"
test -e "$link" test -e "$link"
done done
udevadm settle udevadm settle