Compare commits
17 Commits
e51bb681bd
...
402fff19b5
Author | SHA1 | Date |
---|---|---|
Zbigniew Jędrzejewski-Szmek | 402fff19b5 | |
Tobias Zimmermann | f70e5620b6 | |
Zbigniew Jędrzejewski-Szmek | 3127c71bf4 | |
Yuri Chornoivan | b153eebfb2 | |
Zbigniew Jędrzejewski-Szmek | 2c06e40ae9 | |
Zbigniew Jędrzejewski-Szmek | 5ca9149464 | |
Luca Boccassi | b7eefa1996 | |
Zbigniew Jędrzejewski-Szmek | 8da8996181 | |
Zbigniew Jędrzejewski-Szmek | fb1ad8c2df | |
Zbigniew Jędrzejewski-Szmek | 7a5997bad1 | |
Zbigniew Jędrzejewski-Szmek | 64e225d4c3 | |
Zbigniew Jędrzejewski-Szmek | d9cb7338f9 | |
Zbigniew Jędrzejewski-Szmek | 654fa34796 | |
Zbigniew Jędrzejewski-Szmek | 0638a45ec9 | |
Zbigniew Jędrzejewski-Szmek | e97f1ad4c9 | |
Zbigniew Jędrzejewski-Szmek | 48e5aec4a3 | |
Zbigniew Jędrzejewski-Szmek | 907a3b128c |
|
@ -1438,6 +1438,11 @@ evdev:input:b0003v046DpC309*
|
||||||
KEYBOARD_KEY_c01b6=images # My Pictures (F11)
|
KEYBOARD_KEY_c01b6=images # My Pictures (F11)
|
||||||
KEYBOARD_KEY_c01b7=audio # My Music (F12)
|
KEYBOARD_KEY_c01b7=audio # My Music (F12)
|
||||||
|
|
||||||
|
# Logitech MX Keys for Mac
|
||||||
|
evdev:input:b0003v046Dp4092*
|
||||||
|
KEYBOARD_KEY_70035=102nd # '<' key
|
||||||
|
KEYBOARD_KEY_70064=grave # '^' key
|
||||||
|
|
||||||
###########################################################
|
###########################################################
|
||||||
# Maxdata
|
# Maxdata
|
||||||
###########################################################
|
###########################################################
|
||||||
|
|
10
po/uk.po
10
po/uk.po
|
@ -9,8 +9,8 @@ msgid ""
|
||||||
msgstr ""
|
msgstr ""
|
||||||
"Report-Msgid-Bugs-To: \n"
|
"Report-Msgid-Bugs-To: \n"
|
||||||
"POT-Creation-Date: 2024-11-06 14:42+0000\n"
|
"POT-Creation-Date: 2024-11-06 14:42+0000\n"
|
||||||
"PO-Revision-Date: 2024-11-20 19:13+0000\n"
|
"PO-Revision-Date: 2024-11-21 19:38+0000\n"
|
||||||
"Last-Translator: Dmytro Markevych <hotr1pak@gmail.com>\n"
|
"Last-Translator: Yuri Chornoivan <yurchor@ukr.net>\n"
|
||||||
"Language-Team: Ukrainian <https://translate.fedoraproject.org/projects/"
|
"Language-Team: Ukrainian <https://translate.fedoraproject.org/projects/"
|
||||||
"systemd/main/uk/>\n"
|
"systemd/main/uk/>\n"
|
||||||
"Language: uk\n"
|
"Language: uk\n"
|
||||||
|
@ -120,11 +120,11 @@ msgstr "Для оновлення домашньої теки користува
|
||||||
|
|
||||||
#: src/home/org.freedesktop.home1.policy:53
|
#: src/home/org.freedesktop.home1.policy:53
|
||||||
msgid "Update your home area"
|
msgid "Update your home area"
|
||||||
msgstr "Оновіть свій домашній простір"
|
msgstr "Оновлення домашньої області"
|
||||||
|
|
||||||
#: src/home/org.freedesktop.home1.policy:54
|
#: src/home/org.freedesktop.home1.policy:54
|
||||||
msgid "Authentication is required to update your home area."
|
msgid "Authentication is required to update your home area."
|
||||||
msgstr "Для оновлення домашньої області потрібна автентифікація."
|
msgstr "Для оновлення домашньої області слід пройти розпізнавання."
|
||||||
|
|
||||||
#: src/home/org.freedesktop.home1.policy:63
|
#: src/home/org.freedesktop.home1.policy:63
|
||||||
msgid "Resize a home area"
|
msgid "Resize a home area"
|
||||||
|
@ -1215,7 +1215,7 @@ msgstr "Керування додатковими функціями"
|
||||||
|
|
||||||
#: src/sysupdate/org.freedesktop.sysupdate1.policy:76
|
#: src/sysupdate/org.freedesktop.sysupdate1.policy:76
|
||||||
msgid "Authentication is required to manage optional features"
|
msgid "Authentication is required to manage optional features"
|
||||||
msgstr "Для керування додатковими функціями потрібна автентифікація"
|
msgstr "Для керування додатковими можливостями слід пройти розпізнавання"
|
||||||
|
|
||||||
#: src/timedate/org.freedesktop.timedate1.policy:22
|
#: src/timedate/org.freedesktop.timedate1.policy:22
|
||||||
msgid "Set system time"
|
msgid "Set system time"
|
||||||
|
|
|
@ -47,30 +47,25 @@ int verb_architectures(int argc, char *argv[], void *userdata) {
|
||||||
|
|
||||||
(void) table_hide_column_from_display(table, (size_t) 0);
|
(void) table_hide_column_from_display(table, (size_t) 0);
|
||||||
|
|
||||||
if (strv_isempty(strv_skip(argv, 1)))
|
char **args = strv_skip(argv, 1);
|
||||||
for (Architecture a = 0; a < _ARCHITECTURE_MAX; a++) {
|
if (args) {
|
||||||
r = add_arch(table, a);
|
STRV_FOREACH(arg, args) {
|
||||||
if (r < 0)
|
|
||||||
return r;
|
|
||||||
}
|
|
||||||
else {
|
|
||||||
STRV_FOREACH(as, strv_skip(argv, 1)) {
|
|
||||||
Architecture a;
|
Architecture a;
|
||||||
|
|
||||||
if (streq(*as, "native"))
|
if (streq(*arg, "native"))
|
||||||
a = native_architecture();
|
a = native_architecture();
|
||||||
else if (streq(*as, "uname"))
|
else if (streq(*arg, "uname"))
|
||||||
a = uname_architecture();
|
a = uname_architecture();
|
||||||
else if (streq(*as, "secondary")) {
|
else if (streq(*arg, "secondary")) {
|
||||||
#ifdef ARCHITECTURE_SECONDARY
|
#ifdef ARCHITECTURE_SECONDARY
|
||||||
a = ARCHITECTURE_SECONDARY;
|
a = ARCHITECTURE_SECONDARY;
|
||||||
#else
|
#else
|
||||||
return log_error_errno(SYNTHETIC_ERRNO(EINVAL), "No secondary architecture.");
|
return log_error_errno(SYNTHETIC_ERRNO(EINVAL), "No secondary architecture.");
|
||||||
#endif
|
#endif
|
||||||
} else
|
} else
|
||||||
a = architecture_from_string(*as);
|
a = architecture_from_string(*arg);
|
||||||
if (a < 0)
|
if (a < 0)
|
||||||
return log_error_errno(a, "Architecture \"%s\" not known.", *as);
|
return log_error_errno(a, "Architecture \"%s\" not known.", *arg);
|
||||||
|
|
||||||
r = add_arch(table, a);
|
r = add_arch(table, a);
|
||||||
if (r < 0)
|
if (r < 0)
|
||||||
|
@ -78,6 +73,11 @@ int verb_architectures(int argc, char *argv[], void *userdata) {
|
||||||
}
|
}
|
||||||
|
|
||||||
(void) table_set_sort(table, (size_t) 0);
|
(void) table_set_sort(table, (size_t) 0);
|
||||||
|
} else
|
||||||
|
for (Architecture a = 0; a < _ARCHITECTURE_MAX; a++) {
|
||||||
|
r = add_arch(table, a);
|
||||||
|
if (r < 0)
|
||||||
|
return r;
|
||||||
}
|
}
|
||||||
|
|
||||||
r = table_print_with_pager(table, arg_json_format_flags, arg_pager_flags, arg_legend);
|
r = table_print_with_pager(table, arg_json_format_flags, arg_pager_flags, arg_legend);
|
||||||
|
|
|
@ -9,12 +9,11 @@
|
||||||
#include "strv.h"
|
#include "strv.h"
|
||||||
|
|
||||||
int verb_cat_config(int argc, char *argv[], void *userdata) {
|
int verb_cat_config(int argc, char *argv[], void *userdata) {
|
||||||
char **list;
|
|
||||||
int r;
|
int r;
|
||||||
|
|
||||||
pager_open(arg_pager_flags);
|
pager_open(arg_pager_flags);
|
||||||
|
|
||||||
list = strv_skip(argv, 1);
|
char **list = strv_skip(argv, 1);
|
||||||
STRV_FOREACH(arg, list) {
|
STRV_FOREACH(arg, list) {
|
||||||
const char *t = NULL;
|
const char *t = NULL;
|
||||||
|
|
||||||
|
|
|
@ -17,7 +17,24 @@ int verb_exit_status(int argc, char *argv[], void *userdata) {
|
||||||
if (r < 0)
|
if (r < 0)
|
||||||
return log_error_errno(r, "Failed to right-align status: %m");
|
return log_error_errno(r, "Failed to right-align status: %m");
|
||||||
|
|
||||||
if (strv_isempty(strv_skip(argv, 1)))
|
char **args = strv_skip(argv, 1);
|
||||||
|
if (args)
|
||||||
|
STRV_FOREACH(arg, args) {
|
||||||
|
int status;
|
||||||
|
|
||||||
|
status = exit_status_from_string(*arg);
|
||||||
|
if (status < 0)
|
||||||
|
return log_error_errno(status, "Invalid exit status \"%s\".", *arg);
|
||||||
|
|
||||||
|
assert(status >= 0 && (size_t) status < ELEMENTSOF(exit_status_mappings));
|
||||||
|
r = table_add_many(table,
|
||||||
|
TABLE_STRING, exit_status_mappings[status].name ?: "-",
|
||||||
|
TABLE_INT, status,
|
||||||
|
TABLE_STRING, exit_status_class(status) ?: "-");
|
||||||
|
if (r < 0)
|
||||||
|
return table_log_add_error(r);
|
||||||
|
}
|
||||||
|
else
|
||||||
for (size_t i = 0; i < ELEMENTSOF(exit_status_mappings); i++) {
|
for (size_t i = 0; i < ELEMENTSOF(exit_status_mappings); i++) {
|
||||||
if (!exit_status_mappings[i].name)
|
if (!exit_status_mappings[i].name)
|
||||||
continue;
|
continue;
|
||||||
|
@ -29,22 +46,6 @@ int verb_exit_status(int argc, char *argv[], void *userdata) {
|
||||||
if (r < 0)
|
if (r < 0)
|
||||||
return table_log_add_error(r);
|
return table_log_add_error(r);
|
||||||
}
|
}
|
||||||
else
|
|
||||||
for (int i = 1; i < argc; i++) {
|
|
||||||
int status;
|
|
||||||
|
|
||||||
status = exit_status_from_string(argv[i]);
|
|
||||||
if (status < 0)
|
|
||||||
return log_error_errno(status, "Invalid exit status \"%s\".", argv[i]);
|
|
||||||
|
|
||||||
assert(status >= 0 && (size_t) status < ELEMENTSOF(exit_status_mappings));
|
|
||||||
r = table_add_many(table,
|
|
||||||
TABLE_STRING, exit_status_mappings[status].name ?: "-",
|
|
||||||
TABLE_INT, status,
|
|
||||||
TABLE_STRING, exit_status_class(status) ?: "-");
|
|
||||||
if (r < 0)
|
|
||||||
return table_log_add_error(r);
|
|
||||||
}
|
|
||||||
|
|
||||||
r = table_print_with_pager(table, arg_json_format_flags, arg_pager_flags, arg_legend);
|
r = table_print_with_pager(table, arg_json_format_flags, arg_pager_flags, arg_legend);
|
||||||
if (r < 0)
|
if (r < 0)
|
||||||
|
|
|
@ -106,15 +106,30 @@ static void dump_filesystem_set(const FilesystemSet *set) {
|
||||||
}
|
}
|
||||||
|
|
||||||
int verb_filesystems(int argc, char *argv[], void *userdata) {
|
int verb_filesystems(int argc, char *argv[], void *userdata) {
|
||||||
bool first = true;
|
|
||||||
|
|
||||||
#if ! HAVE_LIBBPF
|
#if ! HAVE_LIBBPF
|
||||||
return log_error_errno(SYNTHETIC_ERRNO(EOPNOTSUPP), "Not compiled with libbpf support, sorry.");
|
return log_error_errno(SYNTHETIC_ERRNO(EOPNOTSUPP), "Not compiled with libbpf support, sorry.");
|
||||||
#endif
|
#endif
|
||||||
|
|
||||||
pager_open(arg_pager_flags);
|
pager_open(arg_pager_flags);
|
||||||
|
|
||||||
if (strv_isempty(strv_skip(argv, 1))) {
|
char **args = strv_skip(argv, 1);
|
||||||
|
if (args)
|
||||||
|
STRV_FOREACH(name, args) {
|
||||||
|
if (name != args)
|
||||||
|
puts("");
|
||||||
|
|
||||||
|
const FilesystemSet *set = filesystem_set_find(*name);
|
||||||
|
if (!set) {
|
||||||
|
/* make sure the error appears below normal output */
|
||||||
|
fflush(stdout);
|
||||||
|
|
||||||
|
return log_error_errno(SYNTHETIC_ERRNO(ENOENT),
|
||||||
|
"Filesystem set \"%s\" not found.", *name);
|
||||||
|
}
|
||||||
|
|
||||||
|
dump_filesystem_set(set);
|
||||||
|
}
|
||||||
|
else {
|
||||||
_cleanup_set_free_ Set *kernel = NULL, *known = NULL;
|
_cleanup_set_free_ Set *kernel = NULL, *known = NULL;
|
||||||
int k;
|
int k;
|
||||||
|
|
||||||
|
@ -126,27 +141,24 @@ int verb_filesystems(int argc, char *argv[], void *userdata) {
|
||||||
|
|
||||||
for (FilesystemGroups i = 0; i < _FILESYSTEM_SET_MAX; i++) {
|
for (FilesystemGroups i = 0; i < _FILESYSTEM_SET_MAX; i++) {
|
||||||
const FilesystemSet *set = filesystem_sets + i;
|
const FilesystemSet *set = filesystem_sets + i;
|
||||||
if (!first)
|
if (i > 0)
|
||||||
puts("");
|
puts("");
|
||||||
|
|
||||||
dump_filesystem_set(set);
|
dump_filesystem_set(set);
|
||||||
filesystem_set_remove(kernel, set);
|
filesystem_set_remove(kernel, set);
|
||||||
if (i != FILESYSTEM_SET_KNOWN)
|
if (i != FILESYSTEM_SET_KNOWN)
|
||||||
filesystem_set_remove(known, set);
|
filesystem_set_remove(known, set);
|
||||||
first = false;
|
|
||||||
}
|
}
|
||||||
|
|
||||||
if (arg_quiet) /* Let's not show the extra stuff in quiet mode */
|
if (arg_quiet) /* Let's not show the extra stuff in quiet mode */
|
||||||
return 0;
|
return 0;
|
||||||
|
|
||||||
if (!set_isempty(known)) {
|
if (!set_isempty(known)) {
|
||||||
_cleanup_free_ char **l = NULL;
|
|
||||||
|
|
||||||
printf("\n"
|
printf("\n"
|
||||||
"# %sUngrouped filesystems%s (known but not included in any of the groups except @known):\n",
|
"# %sUngrouped filesystems%s (known but not included in any of the groups except @known):\n",
|
||||||
ansi_highlight(), ansi_normal());
|
ansi_highlight(), ansi_normal());
|
||||||
|
|
||||||
l = set_get_strv(known);
|
_cleanup_free_ char **l = set_get_strv(known);
|
||||||
if (!l)
|
if (!l)
|
||||||
return log_oom();
|
return log_oom();
|
||||||
|
|
||||||
|
@ -197,24 +209,6 @@ int verb_filesystems(int argc, char *argv[], void *userdata) {
|
||||||
STRV_FOREACH(filesystem, l)
|
STRV_FOREACH(filesystem, l)
|
||||||
printf("# %s\n", *filesystem);
|
printf("# %s\n", *filesystem);
|
||||||
}
|
}
|
||||||
} else
|
|
||||||
STRV_FOREACH(name, strv_skip(argv, 1)) {
|
|
||||||
const FilesystemSet *set;
|
|
||||||
|
|
||||||
if (!first)
|
|
||||||
puts("");
|
|
||||||
|
|
||||||
set = filesystem_set_find(*name);
|
|
||||||
if (!set) {
|
|
||||||
/* make sure the error appears below normal output */
|
|
||||||
fflush(stdout);
|
|
||||||
|
|
||||||
return log_error_errno(SYNTHETIC_ERRNO(ENOENT),
|
|
||||||
"Filesystem set \"%s\" not found.", *name);
|
|
||||||
}
|
|
||||||
|
|
||||||
dump_filesystem_set(set);
|
|
||||||
first = false;
|
|
||||||
}
|
}
|
||||||
|
|
||||||
return EXIT_SUCCESS;
|
return EXIT_SUCCESS;
|
||||||
|
|
|
@ -35,11 +35,12 @@ int verb_malloc(int argc, char *argv[], void *userdata) {
|
||||||
char **services = STRV_MAKE("org.freedesktop.systemd1");
|
char **services = STRV_MAKE("org.freedesktop.systemd1");
|
||||||
int r;
|
int r;
|
||||||
|
|
||||||
if (!strv_isempty(strv_skip(argv, 1))) {
|
char **args = strv_skip(argv, 1);
|
||||||
services = strv_skip(argv, 1);
|
if (args) {
|
||||||
STRV_FOREACH(service, services)
|
STRV_FOREACH(service, args)
|
||||||
if (!service_name_is_valid(*service))
|
if (!service_name_is_valid(*service))
|
||||||
return log_error_errno(SYNTHETIC_ERRNO(EINVAL), "D-Bus service name '%s' is not valid.", *service);
|
return log_error_errno(SYNTHETIC_ERRNO(EINVAL), "D-Bus service name '%s' is not valid.", *service);
|
||||||
|
services = args;
|
||||||
}
|
}
|
||||||
|
|
||||||
r = acquire_bus(&bus, NULL);
|
r = acquire_bus(&bus, NULL);
|
||||||
|
|
|
@ -114,19 +114,14 @@ int verb_pcrs(int argc, char *argv[], void *userdata) {
|
||||||
if (!alg) /* hide hash column if we couldn't acquire it */
|
if (!alg) /* hide hash column if we couldn't acquire it */
|
||||||
(void) table_set_display(table, 0, 1);
|
(void) table_set_display(table, 0, 1);
|
||||||
|
|
||||||
if (strv_isempty(strv_skip(argv, 1)))
|
char **args = strv_skip(argv, 1);
|
||||||
for (uint32_t pi = 0; pi < _TPM2_PCR_INDEX_MAX_DEFINED; pi++) {
|
if (args) {
|
||||||
r = add_pcr_to_table(table, alg, pi);
|
STRV_FOREACH(arg, args) {
|
||||||
if (r < 0)
|
|
||||||
return r;
|
|
||||||
}
|
|
||||||
else {
|
|
||||||
for (int i = 1; i < argc; i++) {
|
|
||||||
int pi;
|
int pi;
|
||||||
|
|
||||||
pi = tpm2_pcr_index_from_string(argv[i]);
|
pi = tpm2_pcr_index_from_string(*arg);
|
||||||
if (pi < 0)
|
if (pi < 0)
|
||||||
return log_error_errno(pi, "PCR index \"%s\" not known.", argv[i]);
|
return log_error_errno(pi, "PCR index \"%s\" not known.", *arg);
|
||||||
|
|
||||||
r = add_pcr_to_table(table, alg, pi);
|
r = add_pcr_to_table(table, alg, pi);
|
||||||
if (r < 0)
|
if (r < 0)
|
||||||
|
@ -134,6 +129,11 @@ int verb_pcrs(int argc, char *argv[], void *userdata) {
|
||||||
}
|
}
|
||||||
|
|
||||||
(void) table_set_sort(table, (size_t) 0);
|
(void) table_set_sort(table, (size_t) 0);
|
||||||
|
} else
|
||||||
|
for (uint32_t pi = 0; pi < _TPM2_PCR_INDEX_MAX_DEFINED; pi++) {
|
||||||
|
r = add_pcr_to_table(table, alg, pi);
|
||||||
|
if (r < 0)
|
||||||
|
return r;
|
||||||
}
|
}
|
||||||
|
|
||||||
r = table_print_with_pager(table, arg_json_format_flags, arg_pager_flags, /* show_header= */true);
|
r = table_print_with_pager(table, arg_json_format_flags, arg_pager_flags, /* show_header= */true);
|
||||||
|
|
|
@ -103,12 +103,30 @@ static void dump_syscall_filter(const SyscallFilterSet *set) {
|
||||||
}
|
}
|
||||||
|
|
||||||
int verb_syscall_filters(int argc, char *argv[], void *userdata) {
|
int verb_syscall_filters(int argc, char *argv[], void *userdata) {
|
||||||
bool first = true;
|
|
||||||
int r;
|
int r;
|
||||||
|
|
||||||
pager_open(arg_pager_flags);
|
pager_open(arg_pager_flags);
|
||||||
|
|
||||||
if (strv_isempty(strv_skip(argv, 1))) {
|
char **args = strv_skip(argv, 1);
|
||||||
|
if (args)
|
||||||
|
STRV_FOREACH(name, args) {
|
||||||
|
const SyscallFilterSet *set;
|
||||||
|
|
||||||
|
if (name != args)
|
||||||
|
puts("");
|
||||||
|
|
||||||
|
set = syscall_filter_set_find(*name);
|
||||||
|
if (!set) {
|
||||||
|
/* make sure the error appears below normal output */
|
||||||
|
fflush(stdout);
|
||||||
|
|
||||||
|
return log_error_errno(SYNTHETIC_ERRNO(ENOENT),
|
||||||
|
"Filter set \"%s\" not found.", *name);
|
||||||
|
}
|
||||||
|
|
||||||
|
dump_syscall_filter(set);
|
||||||
|
}
|
||||||
|
else {
|
||||||
_cleanup_set_free_ Set *kernel = NULL, *known = NULL;
|
_cleanup_set_free_ Set *kernel = NULL, *known = NULL;
|
||||||
int k = 0; /* explicit initialization to appease gcc */
|
int k = 0; /* explicit initialization to appease gcc */
|
||||||
|
|
||||||
|
@ -121,27 +139,24 @@ int verb_syscall_filters(int argc, char *argv[], void *userdata) {
|
||||||
|
|
||||||
for (int i = 0; i < _SYSCALL_FILTER_SET_MAX; i++) {
|
for (int i = 0; i < _SYSCALL_FILTER_SET_MAX; i++) {
|
||||||
const SyscallFilterSet *set = syscall_filter_sets + i;
|
const SyscallFilterSet *set = syscall_filter_sets + i;
|
||||||
if (!first)
|
if (i > 0)
|
||||||
puts("");
|
puts("");
|
||||||
|
|
||||||
dump_syscall_filter(set);
|
dump_syscall_filter(set);
|
||||||
syscall_set_remove(kernel, set);
|
syscall_set_remove(kernel, set);
|
||||||
if (i != SYSCALL_FILTER_SET_KNOWN)
|
if (i != SYSCALL_FILTER_SET_KNOWN)
|
||||||
syscall_set_remove(known, set);
|
syscall_set_remove(known, set);
|
||||||
first = false;
|
|
||||||
}
|
}
|
||||||
|
|
||||||
if (arg_quiet) /* Let's not show the extra stuff in quiet mode */
|
if (arg_quiet) /* Let's not show the extra stuff in quiet mode */
|
||||||
return 0;
|
return 0;
|
||||||
|
|
||||||
if (!set_isempty(known)) {
|
if (!set_isempty(known)) {
|
||||||
_cleanup_free_ char **l = NULL;
|
|
||||||
|
|
||||||
printf("\n"
|
printf("\n"
|
||||||
"# %sUngrouped System Calls%s (known but not included in any of the groups except @known):\n",
|
"# %sUngrouped System Calls%s (known but not included in any of the groups except @known):\n",
|
||||||
ansi_highlight(), ansi_normal());
|
ansi_highlight(), ansi_normal());
|
||||||
|
|
||||||
l = set_get_strv(known);
|
_cleanup_free_ char **l = set_get_strv(known);
|
||||||
if (!l)
|
if (!l)
|
||||||
return log_oom();
|
return log_oom();
|
||||||
|
|
||||||
|
@ -157,13 +172,11 @@ int verb_syscall_filters(int argc, char *argv[], void *userdata) {
|
||||||
if (!arg_quiet)
|
if (!arg_quiet)
|
||||||
log_notice_errno(k, "# Not showing unlisted system calls, couldn't retrieve kernel system call list: %m");
|
log_notice_errno(k, "# Not showing unlisted system calls, couldn't retrieve kernel system call list: %m");
|
||||||
} else if (!set_isempty(kernel)) {
|
} else if (!set_isempty(kernel)) {
|
||||||
_cleanup_free_ char **l = NULL;
|
|
||||||
|
|
||||||
printf("\n"
|
printf("\n"
|
||||||
"# %sUnlisted System Calls%s (supported by the local kernel, but not included in any of the groups listed above):\n",
|
"# %sUnlisted System Calls%s (supported by the local kernel, but not included in any of the groups listed above):\n",
|
||||||
ansi_highlight(), ansi_normal());
|
ansi_highlight(), ansi_normal());
|
||||||
|
|
||||||
l = set_get_strv(kernel);
|
_cleanup_free_ char **l = set_get_strv(kernel);
|
||||||
if (!l)
|
if (!l)
|
||||||
return log_oom();
|
return log_oom();
|
||||||
|
|
||||||
|
@ -172,24 +185,6 @@ int verb_syscall_filters(int argc, char *argv[], void *userdata) {
|
||||||
STRV_FOREACH(syscall, l)
|
STRV_FOREACH(syscall, l)
|
||||||
printf("# %s\n", *syscall);
|
printf("# %s\n", *syscall);
|
||||||
}
|
}
|
||||||
} else
|
|
||||||
STRV_FOREACH(name, strv_skip(argv, 1)) {
|
|
||||||
const SyscallFilterSet *set;
|
|
||||||
|
|
||||||
if (!first)
|
|
||||||
puts("");
|
|
||||||
|
|
||||||
set = syscall_filter_set_find(*name);
|
|
||||||
if (!set) {
|
|
||||||
/* make sure the error appears below normal output */
|
|
||||||
fflush(stdout);
|
|
||||||
|
|
||||||
return log_error_errno(SYNTHETIC_ERRNO(ENOENT),
|
|
||||||
"Filter set \"%s\" not found.", *name);
|
|
||||||
}
|
|
||||||
|
|
||||||
dump_syscall_filter(set);
|
|
||||||
first = false;
|
|
||||||
}
|
}
|
||||||
|
|
||||||
return EXIT_SUCCESS;
|
return EXIT_SUCCESS;
|
||||||
|
|
|
@ -75,11 +75,12 @@ static int test_timestamp_one(const char *p) {
|
||||||
int verb_timestamp(int argc, char *argv[], void *userdata) {
|
int verb_timestamp(int argc, char *argv[], void *userdata) {
|
||||||
int r = 0;
|
int r = 0;
|
||||||
|
|
||||||
STRV_FOREACH(p, strv_skip(argv, 1)) {
|
char **args = strv_skip(argv, 1);
|
||||||
RET_GATHER(r, test_timestamp_one(*p));
|
STRV_FOREACH(arg, args) {
|
||||||
|
if (arg != args)
|
||||||
|
puts("");
|
||||||
|
|
||||||
if (p[1])
|
RET_GATHER(r, test_timestamp_one(*arg));
|
||||||
putchar('\n');
|
|
||||||
}
|
}
|
||||||
|
|
||||||
return r;
|
return r;
|
||||||
|
|
|
@ -799,7 +799,7 @@ int cg_pid_get_path(const char *controller, pid_t pid, char **ret_path) {
|
||||||
continue;
|
continue;
|
||||||
}
|
}
|
||||||
|
|
||||||
char *path = strdup(e + 1);
|
_cleanup_free_ char *path = strdup(e + 1);
|
||||||
if (!path)
|
if (!path)
|
||||||
return -ENOMEM;
|
return -ENOMEM;
|
||||||
|
|
||||||
|
@ -812,7 +812,7 @@ int cg_pid_get_path(const char *controller, pid_t pid, char **ret_path) {
|
||||||
if (e)
|
if (e)
|
||||||
*e = 0;
|
*e = 0;
|
||||||
|
|
||||||
*ret_path = path;
|
*ret_path = TAKE_PTR(path);
|
||||||
return 0;
|
return 0;
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
|
@ -956,14 +956,16 @@ bool strv_fnmatch_full(
|
||||||
}
|
}
|
||||||
|
|
||||||
char** strv_skip(char **l, size_t n) {
|
char** strv_skip(char **l, size_t n) {
|
||||||
|
|
||||||
while (n > 0) {
|
while (n > 0) {
|
||||||
if (strv_isempty(l))
|
if (strv_isempty(l))
|
||||||
return l;
|
return NULL;
|
||||||
|
|
||||||
l++, n--;
|
l++, n--;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
/* To simplify callers, always return NULL instead of a zero-item array. */
|
||||||
|
if (strv_isempty(l))
|
||||||
|
return NULL;
|
||||||
return l;
|
return l;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|
|
@ -547,9 +547,21 @@ static int tree(int argc, char **argv, void *userdata) {
|
||||||
if (r < 0)
|
if (r < 0)
|
||||||
return r;
|
return r;
|
||||||
|
|
||||||
if (argc <= 1) {
|
char **args = strv_skip(argv, 1);
|
||||||
|
if (args)
|
||||||
|
STRV_FOREACH(arg, args) {
|
||||||
|
if (arg != args)
|
||||||
|
puts("");
|
||||||
|
|
||||||
|
if (args[1]) {
|
||||||
|
pager_open(arg_pager_flags);
|
||||||
|
printf("Service %s%s%s:\n", ansi_highlight(), *arg, ansi_normal());
|
||||||
|
}
|
||||||
|
|
||||||
|
RET_GATHER(r, tree_one(bus, *arg));
|
||||||
|
}
|
||||||
|
else {
|
||||||
_cleanup_strv_free_ char **names = NULL;
|
_cleanup_strv_free_ char **names = NULL;
|
||||||
bool not_first = false;
|
|
||||||
|
|
||||||
r = sd_bus_list_names(bus, &names, NULL);
|
r = sd_bus_list_names(bus, &names, NULL);
|
||||||
if (r < 0)
|
if (r < 0)
|
||||||
|
@ -557,41 +569,20 @@ static int tree(int argc, char **argv, void *userdata) {
|
||||||
|
|
||||||
pager_open(arg_pager_flags);
|
pager_open(arg_pager_flags);
|
||||||
|
|
||||||
STRV_FOREACH(i, names) {
|
STRV_FOREACH(name, names) {
|
||||||
int q;
|
if (!arg_unique && (*name)[0] == ':')
|
||||||
|
|
||||||
if (!arg_unique && (*i)[0] == ':')
|
|
||||||
continue;
|
continue;
|
||||||
|
|
||||||
if (!arg_acquired && (*i)[0] == ':')
|
if (!arg_acquired && (*name)[0] == ':')
|
||||||
continue;
|
continue;
|
||||||
|
|
||||||
if (not_first)
|
if (name != names)
|
||||||
printf("\n");
|
puts("");
|
||||||
|
|
||||||
printf("Service %s%s%s:\n", ansi_highlight(), *i, ansi_normal());
|
printf("Service %s%s%s:\n", ansi_highlight(), *name, ansi_normal());
|
||||||
|
|
||||||
q = tree_one(bus, *i);
|
RET_GATHER(r, tree_one(bus, *name));
|
||||||
if (q < 0 && r >= 0)
|
|
||||||
r = q;
|
|
||||||
|
|
||||||
not_first = true;
|
|
||||||
}
|
}
|
||||||
} else
|
|
||||||
STRV_FOREACH(i, strv_skip(argv, 1)) {
|
|
||||||
int q;
|
|
||||||
|
|
||||||
if (i > argv+1)
|
|
||||||
printf("\n");
|
|
||||||
|
|
||||||
if (argv[2]) {
|
|
||||||
pager_open(arg_pager_flags);
|
|
||||||
printf("Service %s%s%s:\n", ansi_highlight(), *i, ansi_normal());
|
|
||||||
}
|
|
||||||
|
|
||||||
q = tree_one(bus, *i);
|
|
||||||
if (q < 0 && r >= 0)
|
|
||||||
r = q;
|
|
||||||
}
|
}
|
||||||
|
|
||||||
return r;
|
return r;
|
||||||
|
|
|
@ -663,8 +663,9 @@ static int add_root_mount(void) {
|
||||||
|
|
||||||
r = efi_loader_get_device_part_uuid(NULL);
|
r = efi_loader_get_device_part_uuid(NULL);
|
||||||
if (r == -ENOENT) {
|
if (r == -ENOENT) {
|
||||||
log_notice("EFI loader partition unknown, exiting.\n"
|
log_notice("EFI loader partition unknown, not processing %s.\n"
|
||||||
"(The boot loader did not set EFI variable LoaderDevicePartUUID.)");
|
"(The boot loader did not set EFI variable LoaderDevicePartUUID.)",
|
||||||
|
in_initrd() ? "/sysroot" : "/");
|
||||||
return 0;
|
return 0;
|
||||||
} else if (r < 0)
|
} else if (r < 0)
|
||||||
return log_error_errno(r, "Failed to read loader partition UUID: %m");
|
return log_error_errno(r, "Failed to read loader partition UUID: %m");
|
||||||
|
|
|
@ -691,47 +691,7 @@ static void dump_home_record(UserRecord *hr) {
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
static char **mangle_user_list(char **list, char ***ret_allocated) {
|
static int inspect_home(sd_bus *bus, const char *name) {
|
||||||
_cleanup_free_ char *myself = NULL;
|
|
||||||
char **l;
|
|
||||||
|
|
||||||
if (!strv_isempty(list)) {
|
|
||||||
*ret_allocated = NULL;
|
|
||||||
return list;
|
|
||||||
}
|
|
||||||
|
|
||||||
myself = getusername_malloc();
|
|
||||||
if (!myself)
|
|
||||||
return NULL;
|
|
||||||
|
|
||||||
l = new(char*, 2);
|
|
||||||
if (!l)
|
|
||||||
return NULL;
|
|
||||||
|
|
||||||
l[0] = TAKE_PTR(myself);
|
|
||||||
l[1] = NULL;
|
|
||||||
|
|
||||||
*ret_allocated = l;
|
|
||||||
return l;
|
|
||||||
}
|
|
||||||
|
|
||||||
static int inspect_home(int argc, char *argv[], void *userdata) {
|
|
||||||
_cleanup_(sd_bus_flush_close_unrefp) sd_bus *bus = NULL;
|
|
||||||
_cleanup_strv_free_ char **mangled_list = NULL;
|
|
||||||
int r, ret = 0;
|
|
||||||
char **items;
|
|
||||||
|
|
||||||
pager_open(arg_pager_flags);
|
|
||||||
|
|
||||||
r = acquire_bus(&bus);
|
|
||||||
if (r < 0)
|
|
||||||
return r;
|
|
||||||
|
|
||||||
items = mangle_user_list(strv_skip(argv, 1), &mangled_list);
|
|
||||||
if (!items)
|
|
||||||
return log_oom();
|
|
||||||
|
|
||||||
STRV_FOREACH(i, items) {
|
|
||||||
_cleanup_(sd_bus_error_free) sd_bus_error error = SD_BUS_ERROR_NULL;
|
_cleanup_(sd_bus_error_free) sd_bus_error error = SD_BUS_ERROR_NULL;
|
||||||
_cleanup_(sd_bus_message_unrefp) sd_bus_message *reply = NULL;
|
_cleanup_(sd_bus_message_unrefp) sd_bus_message *reply = NULL;
|
||||||
_cleanup_(sd_json_variant_unrefp) sd_json_variant *v = NULL;
|
_cleanup_(sd_json_variant_unrefp) sd_json_variant *v = NULL;
|
||||||
|
@ -739,85 +699,70 @@ static int inspect_home(int argc, char *argv[], void *userdata) {
|
||||||
const char *json;
|
const char *json;
|
||||||
int incomplete;
|
int incomplete;
|
||||||
uid_t uid;
|
uid_t uid;
|
||||||
|
int r;
|
||||||
|
|
||||||
r = parse_uid(*i, &uid);
|
r = parse_uid(name, &uid);
|
||||||
if (r < 0) {
|
if (r < 0) {
|
||||||
if (!valid_user_group_name(*i, 0)) {
|
if (!valid_user_group_name(name, 0))
|
||||||
log_error("Invalid user name '%s'.", *i);
|
return log_error_errno(SYNTHETIC_ERRNO(EINVAL), "Invalid user name '%s'.", name);
|
||||||
if (ret == 0)
|
|
||||||
ret = -EINVAL;
|
|
||||||
|
|
||||||
continue;
|
r = bus_call_method(bus, bus_mgr, "GetUserRecordByName", &error, &reply, "s", name);
|
||||||
}
|
|
||||||
|
|
||||||
r = bus_call_method(bus, bus_mgr, "GetUserRecordByName", &error, &reply, "s", *i);
|
|
||||||
} else
|
} else
|
||||||
r = bus_call_method(bus, bus_mgr, "GetUserRecordByUID", &error, &reply, "u", (uint32_t) uid);
|
r = bus_call_method(bus, bus_mgr, "GetUserRecordByUID", &error, &reply, "u", (uint32_t) uid);
|
||||||
if (r < 0) {
|
if (r < 0)
|
||||||
log_error_errno(r, "Failed to inspect home: %s", bus_error_message(&error, r));
|
return log_error_errno(r, "Failed to inspect home: %s", bus_error_message(&error, r));
|
||||||
if (ret == 0)
|
|
||||||
ret = r;
|
|
||||||
|
|
||||||
continue;
|
|
||||||
}
|
|
||||||
|
|
||||||
r = sd_bus_message_read(reply, "sbo", &json, &incomplete, NULL);
|
r = sd_bus_message_read(reply, "sbo", &json, &incomplete, NULL);
|
||||||
if (r < 0) {
|
if (r < 0)
|
||||||
bus_log_parse_error(r);
|
return bus_log_parse_error(r);
|
||||||
if (ret == 0)
|
|
||||||
ret = r;
|
|
||||||
|
|
||||||
continue;
|
|
||||||
}
|
|
||||||
|
|
||||||
r = sd_json_parse(json, SD_JSON_PARSE_SENSITIVE, &v, NULL, NULL);
|
r = sd_json_parse(json, SD_JSON_PARSE_SENSITIVE, &v, NULL, NULL);
|
||||||
if (r < 0) {
|
if (r < 0)
|
||||||
log_error_errno(r, "Failed to parse JSON identity: %m");
|
return log_error_errno(r, "Failed to parse JSON identity: %m");
|
||||||
if (ret == 0)
|
|
||||||
ret = r;
|
|
||||||
|
|
||||||
continue;
|
|
||||||
}
|
|
||||||
|
|
||||||
hr = user_record_new();
|
hr = user_record_new();
|
||||||
if (!hr)
|
if (!hr)
|
||||||
return log_oom();
|
return log_oom();
|
||||||
|
|
||||||
r = user_record_load(hr, v, USER_RECORD_LOAD_REFUSE_SECRET|USER_RECORD_LOG|USER_RECORD_PERMISSIVE);
|
r = user_record_load(hr, v, USER_RECORD_LOAD_REFUSE_SECRET|USER_RECORD_LOG|USER_RECORD_PERMISSIVE);
|
||||||
if (r < 0) {
|
if (r < 0)
|
||||||
if (ret == 0)
|
return r;
|
||||||
ret = r;
|
|
||||||
|
|
||||||
continue;
|
|
||||||
}
|
|
||||||
|
|
||||||
hr->incomplete = incomplete;
|
hr->incomplete = incomplete;
|
||||||
dump_home_record(hr);
|
dump_home_record(hr);
|
||||||
|
return 0;
|
||||||
}
|
}
|
||||||
|
|
||||||
return ret;
|
static int inspect_homes(int argc, char *argv[], void *userdata) {
|
||||||
}
|
|
||||||
|
|
||||||
static int authenticate_home(int argc, char *argv[], void *userdata) {
|
|
||||||
_cleanup_(sd_bus_flush_close_unrefp) sd_bus *bus = NULL;
|
_cleanup_(sd_bus_flush_close_unrefp) sd_bus *bus = NULL;
|
||||||
_cleanup_strv_free_ char **mangled_list = NULL;
|
int r;
|
||||||
int r, ret = 0;
|
|
||||||
char **items;
|
|
||||||
|
|
||||||
items = mangle_user_list(strv_skip(argv, 1), &mangled_list);
|
|
||||||
if (!items)
|
|
||||||
return log_oom();
|
|
||||||
|
|
||||||
r = acquire_bus(&bus);
|
r = acquire_bus(&bus);
|
||||||
if (r < 0)
|
if (r < 0)
|
||||||
return r;
|
return r;
|
||||||
|
|
||||||
(void) polkit_agent_open_if_enabled(arg_transport, arg_ask_password);
|
pager_open(arg_pager_flags);
|
||||||
|
|
||||||
STRV_FOREACH(i, items) {
|
char **args = strv_skip(argv, 1);
|
||||||
|
if (args) {
|
||||||
|
_cleanup_free_ char *myself = getusername_malloc();
|
||||||
|
if (!myself)
|
||||||
|
return log_oom();
|
||||||
|
|
||||||
|
return inspect_home(bus, myself);
|
||||||
|
} else {
|
||||||
|
STRV_FOREACH(arg, args)
|
||||||
|
RET_GATHER(r, inspect_home(bus, *arg));
|
||||||
|
|
||||||
|
return r;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
static int authenticate_home(sd_bus *bus, const char *name) {
|
||||||
_cleanup_(user_record_unrefp) UserRecord *secret = NULL;
|
_cleanup_(user_record_unrefp) UserRecord *secret = NULL;
|
||||||
|
int r;
|
||||||
|
|
||||||
r = acquire_passed_secrets(*i, &secret);
|
r = acquire_passed_secrets(name, &secret);
|
||||||
if (r < 0)
|
if (r < 0)
|
||||||
return r;
|
return r;
|
||||||
|
|
||||||
|
@ -829,7 +774,7 @@ static int authenticate_home(int argc, char *argv[], void *userdata) {
|
||||||
if (r < 0)
|
if (r < 0)
|
||||||
return bus_log_create_error(r);
|
return bus_log_create_error(r);
|
||||||
|
|
||||||
r = sd_bus_message_append(m, "s", *i);
|
r = sd_bus_message_append(m, "s", name);
|
||||||
if (r < 0)
|
if (r < 0)
|
||||||
return bus_log_create_error(r);
|
return bus_log_create_error(r);
|
||||||
|
|
||||||
|
@ -839,19 +784,37 @@ static int authenticate_home(int argc, char *argv[], void *userdata) {
|
||||||
|
|
||||||
r = sd_bus_call(bus, m, HOME_SLOW_BUS_CALL_TIMEOUT_USEC, &error, NULL);
|
r = sd_bus_call(bus, m, HOME_SLOW_BUS_CALL_TIMEOUT_USEC, &error, NULL);
|
||||||
if (r < 0) {
|
if (r < 0) {
|
||||||
r = handle_generic_user_record_error(*i, secret, &error, r, false);
|
r = handle_generic_user_record_error(name, secret, &error, r, false);
|
||||||
if (r < 0) {
|
if (r >= 0)
|
||||||
if (ret == 0)
|
continue;
|
||||||
ret = r;
|
|
||||||
|
|
||||||
break;
|
|
||||||
}
|
}
|
||||||
} else
|
return r;
|
||||||
break;
|
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
return ret;
|
static int authenticate_homes(int argc, char *argv[], void *userdata) {
|
||||||
|
_cleanup_(sd_bus_flush_close_unrefp) sd_bus *bus = NULL;
|
||||||
|
int r;
|
||||||
|
|
||||||
|
r = acquire_bus(&bus);
|
||||||
|
if (r < 0)
|
||||||
|
return r;
|
||||||
|
|
||||||
|
(void) polkit_agent_open_if_enabled(arg_transport, arg_ask_password);
|
||||||
|
|
||||||
|
char **args = strv_skip(argv, 1);
|
||||||
|
if (args) {
|
||||||
|
_cleanup_free_ char *myself = getusername_malloc();
|
||||||
|
if (!myself)
|
||||||
|
return log_oom();
|
||||||
|
|
||||||
|
return authenticate_home(bus, myself);
|
||||||
|
} else {
|
||||||
|
STRV_FOREACH(arg, args)
|
||||||
|
RET_GATHER(r, authenticate_home(bus, *arg));
|
||||||
|
|
||||||
|
return r;
|
||||||
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
static int update_last_change(sd_json_variant **v, bool with_password, bool override) {
|
static int update_last_change(sd_json_variant **v, bool with_password, bool override) {
|
||||||
|
@ -4727,8 +4690,8 @@ static int run(int argc, char *argv[]) {
|
||||||
{ "list", VERB_ANY, 1, VERB_DEFAULT, list_homes },
|
{ "list", VERB_ANY, 1, VERB_DEFAULT, list_homes },
|
||||||
{ "activate", 2, VERB_ANY, 0, activate_home },
|
{ "activate", 2, VERB_ANY, 0, activate_home },
|
||||||
{ "deactivate", 2, VERB_ANY, 0, deactivate_home },
|
{ "deactivate", 2, VERB_ANY, 0, deactivate_home },
|
||||||
{ "inspect", VERB_ANY, VERB_ANY, 0, inspect_home },
|
{ "inspect", VERB_ANY, VERB_ANY, 0, inspect_homes },
|
||||||
{ "authenticate", VERB_ANY, VERB_ANY, 0, authenticate_home },
|
{ "authenticate", VERB_ANY, VERB_ANY, 0, authenticate_homes },
|
||||||
{ "create", VERB_ANY, 2, 0, create_home },
|
{ "create", VERB_ANY, 2, 0, create_home },
|
||||||
{ "remove", 2, VERB_ANY, 0, remove_home },
|
{ "remove", 2, VERB_ANY, 0, remove_home },
|
||||||
{ "update", VERB_ANY, 2, 0, update_home },
|
{ "update", VERB_ANY, 2, 0, update_home },
|
||||||
|
|
|
@ -133,17 +133,7 @@ static int verb_show(int argc, char **argv, void *userdata) {
|
||||||
int r;
|
int r;
|
||||||
|
|
||||||
argv = strv_skip(argv, 1);
|
argv = strv_skip(argv, 1);
|
||||||
if (strv_isempty(argv)) {
|
if (argv)
|
||||||
if (!sd_id128_is_null(arg_app))
|
|
||||||
return log_error_errno(SYNTHETIC_ERRNO(EINVAL),
|
|
||||||
"'show --app-specific=' can only be used with explicit UUID input.");
|
|
||||||
|
|
||||||
for (const GptPartitionType *e = gpt_partition_type_table; e->name; e++) {
|
|
||||||
r = show_one(&table, e->name, e->uuid, e == gpt_partition_type_table);
|
|
||||||
if (r < 0)
|
|
||||||
return r;
|
|
||||||
}
|
|
||||||
} else
|
|
||||||
STRV_FOREACH(p, argv) {
|
STRV_FOREACH(p, argv) {
|
||||||
sd_id128_t uuid;
|
sd_id128_t uuid;
|
||||||
const char *id = NULL;
|
const char *id = NULL;
|
||||||
|
@ -171,6 +161,17 @@ static int verb_show(int argc, char **argv, void *userdata) {
|
||||||
if (r < 0)
|
if (r < 0)
|
||||||
return r;
|
return r;
|
||||||
}
|
}
|
||||||
|
else {
|
||||||
|
if (!sd_id128_is_null(arg_app))
|
||||||
|
return log_error_errno(SYNTHETIC_ERRNO(EINVAL),
|
||||||
|
"'show --app-specific=' can only be used with explicit UUID input.");
|
||||||
|
|
||||||
|
for (const GptPartitionType *e = gpt_partition_type_table; e->name; e++) {
|
||||||
|
r = show_one(&table, e->name, e->uuid, e == gpt_partition_type_table);
|
||||||
|
if (r < 0)
|
||||||
|
return r;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
if (table) {
|
if (table) {
|
||||||
r = table_print_with_pager(table, arg_json_format_flags, arg_pager_flags, arg_legend);
|
r = table_print_with_pager(table, arg_json_format_flags, arg_pager_flags, arg_legend);
|
||||||
|
|
|
@ -152,11 +152,13 @@ static int do_execute(
|
||||||
}
|
}
|
||||||
|
|
||||||
if (DEBUG_LOGGING) {
|
if (DEBUG_LOGGING) {
|
||||||
_cleanup_free_ char *args = NULL;
|
_cleanup_free_ char *s = NULL;
|
||||||
if (argv)
|
|
||||||
args = quote_command_line(strv_skip(argv, 1), SHELL_ESCAPE_EMPTY);
|
|
||||||
|
|
||||||
log_debug("About to execute %s%s%s", t, argv ? " " : "", argv ? strnull(args) : "");
|
char **args = strv_skip(argv, 1);
|
||||||
|
if (args)
|
||||||
|
s = quote_command_line(args, SHELL_ESCAPE_EMPTY);
|
||||||
|
|
||||||
|
log_debug("About to execute %s%s%s", t, args ? " " : "", args ? strnull(s) : "");
|
||||||
}
|
}
|
||||||
|
|
||||||
if (FLAGS_SET(flags, EXEC_DIR_WARN_WORLD_WRITABLE)) {
|
if (FLAGS_SET(flags, EXEC_DIR_WARN_WORLD_WRITABLE)) {
|
||||||
|
|
|
@ -172,14 +172,14 @@ int verb_list_dependencies(int argc, char *argv[], void *userdata) {
|
||||||
return r;
|
return r;
|
||||||
|
|
||||||
patterns = strv_skip(argv, 1);
|
patterns = strv_skip(argv, 1);
|
||||||
if (strv_isempty(patterns)) {
|
if (patterns) {
|
||||||
units = strv_new(SPECIAL_DEFAULT_TARGET);
|
|
||||||
if (!units)
|
|
||||||
return log_oom();
|
|
||||||
} else {
|
|
||||||
r = expand_unit_names(bus, patterns, NULL, &units, NULL);
|
r = expand_unit_names(bus, patterns, NULL, &units, NULL);
|
||||||
if (r < 0)
|
if (r < 0)
|
||||||
return log_error_errno(r, "Failed to expand names: %m");
|
return log_error_errno(r, "Failed to expand names: %m");
|
||||||
|
} else {
|
||||||
|
units = strv_new(SPECIAL_DEFAULT_TARGET);
|
||||||
|
if (!units)
|
||||||
|
return log_oom();
|
||||||
}
|
}
|
||||||
|
|
||||||
pager_open(arg_pager_flags);
|
pager_open(arg_pager_flags);
|
||||||
|
|
|
@ -20,15 +20,13 @@
|
||||||
*/
|
*/
|
||||||
|
|
||||||
static int run(int argc, char **argv) {
|
static int run(int argc, char **argv) {
|
||||||
_cleanup_close_ int fd = -EBADF;
|
|
||||||
char **args = strv_skip(argv, 1);
|
|
||||||
int r;
|
int r;
|
||||||
|
|
||||||
test_setup_logging(LOG_DEBUG);
|
test_setup_logging(LOG_DEBUG);
|
||||||
|
|
||||||
args = !strv_isempty(args) ? args : STRV_MAKE("/bin/true");
|
char **args = strv_skip(argv, 1) ?: STRV_MAKE("/bin/true");
|
||||||
|
|
||||||
fd = open(args[0], O_RDONLY | O_CLOEXEC);
|
_cleanup_close_ int fd = open(args[0], O_RDONLY | O_CLOEXEC);
|
||||||
if (fd < 0)
|
if (fd < 0)
|
||||||
return log_error_errno(errno, "open(%s) failed: %m", args[0]);
|
return log_error_errno(errno, "open(%s) failed: %m", args[0]);
|
||||||
|
|
||||||
|
|
|
@ -1004,17 +1004,21 @@ TEST(strv_skip) {
|
||||||
test_strv_skip_one(STRV_MAKE("foo", "bar", "baz"), 0, STRV_MAKE("foo", "bar", "baz"));
|
test_strv_skip_one(STRV_MAKE("foo", "bar", "baz"), 0, STRV_MAKE("foo", "bar", "baz"));
|
||||||
test_strv_skip_one(STRV_MAKE("foo", "bar", "baz"), 1, STRV_MAKE("bar", "baz"));
|
test_strv_skip_one(STRV_MAKE("foo", "bar", "baz"), 1, STRV_MAKE("bar", "baz"));
|
||||||
test_strv_skip_one(STRV_MAKE("foo", "bar", "baz"), 2, STRV_MAKE("baz"));
|
test_strv_skip_one(STRV_MAKE("foo", "bar", "baz"), 2, STRV_MAKE("baz"));
|
||||||
test_strv_skip_one(STRV_MAKE("foo", "bar", "baz"), 3, STRV_MAKE(NULL));
|
test_strv_skip_one(STRV_MAKE("foo", "bar", "baz"), 3, NULL);
|
||||||
test_strv_skip_one(STRV_MAKE("foo", "bar", "baz"), 4, STRV_MAKE(NULL));
|
test_strv_skip_one(STRV_MAKE("foo", "bar", "baz"), 4, NULL);
|
||||||
test_strv_skip_one(STRV_MAKE("foo", "bar", "baz"), 55, STRV_MAKE(NULL));
|
test_strv_skip_one(STRV_MAKE("foo", "bar", "baz"), 55, NULL);
|
||||||
|
|
||||||
test_strv_skip_one(STRV_MAKE("quux"), 0, STRV_MAKE("quux"));
|
test_strv_skip_one(STRV_MAKE("quux"), 0, STRV_MAKE("quux"));
|
||||||
test_strv_skip_one(STRV_MAKE("quux"), 1, STRV_MAKE(NULL));
|
test_strv_skip_one(STRV_MAKE("quux"), 1, NULL);
|
||||||
test_strv_skip_one(STRV_MAKE("quux"), 55, STRV_MAKE(NULL));
|
test_strv_skip_one(STRV_MAKE("quux"), 55, NULL);
|
||||||
|
|
||||||
test_strv_skip_one(STRV_MAKE(NULL), 0, STRV_MAKE(NULL));
|
test_strv_skip_one(STRV_MAKE(NULL), 0, NULL);
|
||||||
test_strv_skip_one(STRV_MAKE(NULL), 1, STRV_MAKE(NULL));
|
test_strv_skip_one(STRV_MAKE(NULL), 1, NULL);
|
||||||
test_strv_skip_one(STRV_MAKE(NULL), 55, STRV_MAKE(NULL));
|
test_strv_skip_one(STRV_MAKE(NULL), 55, NULL);
|
||||||
|
|
||||||
|
test_strv_skip_one(NULL, 0, NULL);
|
||||||
|
test_strv_skip_one(NULL, 1, NULL);
|
||||||
|
test_strv_skip_one(NULL, 55, NULL);
|
||||||
}
|
}
|
||||||
|
|
||||||
TEST(strv_extend_n) {
|
TEST(strv_extend_n) {
|
||||||
|
|
|
@ -35,7 +35,10 @@ static int builtin_kmod(UdevEvent *event, int argc, char *argv[]) {
|
||||||
"%s: expected: load [module…]", argv[0]);
|
"%s: expected: load [module…]", argv[0]);
|
||||||
|
|
||||||
char **modules = strv_skip(argv, 2);
|
char **modules = strv_skip(argv, 2);
|
||||||
if (strv_isempty(modules)) {
|
if (modules)
|
||||||
|
STRV_FOREACH(module, modules)
|
||||||
|
(void) module_load_and_warn(ctx, *module, /* verbose = */ false);
|
||||||
|
else {
|
||||||
const char *modalias;
|
const char *modalias;
|
||||||
|
|
||||||
r = sd_device_get_property_value(dev, "MODALIAS", &modalias);
|
r = sd_device_get_property_value(dev, "MODALIAS", &modalias);
|
||||||
|
@ -43,9 +46,7 @@ static int builtin_kmod(UdevEvent *event, int argc, char *argv[]) {
|
||||||
return log_device_warning_errno(dev, r, "Failed to read property \"MODALIAS\": %m");
|
return log_device_warning_errno(dev, r, "Failed to read property \"MODALIAS\": %m");
|
||||||
|
|
||||||
(void) module_load_and_warn(ctx, modalias, /* verbose = */ false);
|
(void) module_load_and_warn(ctx, modalias, /* verbose = */ false);
|
||||||
} else
|
}
|
||||||
STRV_FOREACH(module, modules)
|
|
||||||
(void) module_load_and_warn(ctx, *module, /* verbose = */ false);
|
|
||||||
|
|
||||||
return 0;
|
return 0;
|
||||||
}
|
}
|
||||||
|
|
|
@ -630,7 +630,7 @@ static int run(int argc, char **argv) {
|
||||||
} else {
|
} else {
|
||||||
fd = find_source_vc(&vc, &idx);
|
fd = find_source_vc(&vc, &idx);
|
||||||
if (fd < 0 && fd != -EBUSY)
|
if (fd < 0 && fd != -EBUSY)
|
||||||
return log_error_errno(fd, "No usable source console found: %m");
|
return log_error_errno(fd, "No virtual console that can be configured found: %m");
|
||||||
}
|
}
|
||||||
|
|
||||||
utf8 = is_locale_utf8();
|
utf8 = is_locale_utf8();
|
||||||
|
@ -640,7 +640,7 @@ static int run(int argc, char **argv) {
|
||||||
/* We found only busy VCs, which might happen during the boot process when the boot splash is
|
/* We found only busy VCs, which might happen during the boot process when the boot splash is
|
||||||
* displayed on the only allocated VC. In this case we don't interfere and avoid initializing
|
* displayed on the only allocated VC. In this case we don't interfere and avoid initializing
|
||||||
* the VC partially as some operations are likely to fail. */
|
* the VC partially as some operations are likely to fail. */
|
||||||
log_notice("All allocated VCs are currently busy, skipping initialization of font and keyboard settings.");
|
log_notice("All allocated virtual consoles are busy, will not configure key mapping and font.");
|
||||||
return EXIT_SUCCESS;
|
return EXIT_SUCCESS;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@ -664,7 +664,7 @@ static int run(int argc, char **argv) {
|
||||||
setup_remaining_vcs(fd, idx, utf8);
|
setup_remaining_vcs(fd, idx, utf8);
|
||||||
else
|
else
|
||||||
log_full(r == EX_OSERR ? LOG_NOTICE : LOG_WARNING,
|
log_full(r == EX_OSERR ? LOG_NOTICE : LOG_WARNING,
|
||||||
"Setting source virtual console failed, ignoring remaining ones.");
|
"Configuration of first virtual console failed, ignoring remaining ones.");
|
||||||
}
|
}
|
||||||
|
|
||||||
return IN_SET(r, 0, EX_OSERR) && keyboard_ok ? EXIT_SUCCESS : EXIT_FAILURE;
|
return IN_SET(r, 0, EX_OSERR) && keyboard_ok ? EXIT_SUCCESS : EXIT_FAILURE;
|
||||||
|
|
|
@ -5,7 +5,7 @@
|
||||||
# the Free Software Foundation; either version 2.1 of the License, or
|
# the Free Software Foundation; either version 2.1 of the License, or
|
||||||
# (at your option) any later version.
|
# (at your option) any later version.
|
||||||
|
|
||||||
# See tmpfiles.d(5) for details
|
# See tmpfiles.d(5) for details.
|
||||||
|
|
||||||
{% if LINK_SHELL_EXTRA_DROPIN %}
|
{% if LINK_SHELL_EXTRA_DROPIN %}
|
||||||
L$ {{SHELLPROFILEDIR}}/70-systemd-shell-extra.sh - - - - {{LIBEXECDIR}}/profile.d/70-systemd-shell-extra.sh
|
L$ {{SHELLPROFILEDIR}}/70-systemd-shell-extra.sh - - - - {{LIBEXECDIR}}/profile.d/70-systemd-shell-extra.sh
|
||||||
|
|
|
@ -5,7 +5,7 @@
|
||||||
# the Free Software Foundation; either version 2.1 of the License, or
|
# the Free Software Foundation; either version 2.1 of the License, or
|
||||||
# (at your option) any later version.
|
# (at your option) any later version.
|
||||||
|
|
||||||
# See tmpfiles.d(5) for details
|
# See tmpfiles.d(5) for details.
|
||||||
|
|
||||||
{% if LINK_SSH_PROXY_DROPIN %}
|
{% if LINK_SSH_PROXY_DROPIN %}
|
||||||
L$ {{SSHCONFDIR}}/20-systemd-ssh-proxy.conf - - - - {{LIBEXECDIR}}/ssh_config.d/20-systemd-ssh-proxy.conf
|
L$ {{SSHCONFDIR}}/20-systemd-ssh-proxy.conf - - - - {{LIBEXECDIR}}/ssh_config.d/20-systemd-ssh-proxy.conf
|
||||||
|
|
|
@ -5,7 +5,7 @@
|
||||||
# the Free Software Foundation; either version 2.1 of the License, or
|
# the Free Software Foundation; either version 2.1 of the License, or
|
||||||
# (at your option) any later version.
|
# (at your option) any later version.
|
||||||
|
|
||||||
# See tmpfiles.d(5) for details
|
# See tmpfiles.d(5) for details.
|
||||||
|
|
||||||
# Copy systemd-stub provided metadata such as PCR signature and public key file
|
# Copy systemd-stub provided metadata such as PCR signature and public key file
|
||||||
# from initrd into /run/, so that it will survive the initrd stage
|
# from initrd into /run/, so that it will survive the initrd stage
|
||||||
|
|
|
@ -5,7 +5,7 @@
|
||||||
# the Free Software Foundation; either version 2.1 of the License, or
|
# the Free Software Foundation; either version 2.1 of the License, or
|
||||||
# (at your option) any later version.
|
# (at your option) any later version.
|
||||||
|
|
||||||
# See tmpfiles.d(5) for details
|
# See tmpfiles.d(5) for details.
|
||||||
|
|
||||||
{% if LINK_SSHD_USERDB_DROPIN %}
|
{% if LINK_SSHD_USERDB_DROPIN %}
|
||||||
L {{SSHDCONFDIR}}/20-systemd-userdb.conf - - - - {{LIBEXECDIR}}/sshd_config.d/20-systemd-userdb.conf
|
L {{SSHDCONFDIR}}/20-systemd-userdb.conf - - - - {{LIBEXECDIR}}/sshd_config.d/20-systemd-userdb.conf
|
||||||
|
|
|
@ -5,7 +5,7 @@
|
||||||
# the Free Software Foundation; either version 2.1 of the License, or
|
# the Free Software Foundation; either version 2.1 of the License, or
|
||||||
# (at your option) any later version.
|
# (at your option) any later version.
|
||||||
|
|
||||||
# See tmpfiles.d(5) for details
|
# See tmpfiles.d(5) for details.
|
||||||
|
|
||||||
d /etc/credstore 0700 root root
|
d /etc/credstore 0700 root root
|
||||||
d /etc/credstore.encrypted 0700 root root
|
d /etc/credstore.encrypted 0700 root root
|
||||||
|
|
|
@ -5,7 +5,7 @@
|
||||||
# the Free Software Foundation; either version 2.1 of the License, or
|
# the Free Software Foundation; either version 2.1 of the License, or
|
||||||
# (at your option) any later version.
|
# (at your option) any later version.
|
||||||
|
|
||||||
# See tmpfiles.d(5) for details
|
# See tmpfiles.d(5) for details.
|
||||||
|
|
||||||
L /etc/os-release - - - - ../usr/lib/os-release
|
L /etc/os-release - - - - ../usr/lib/os-release
|
||||||
L+ /etc/mtab - - - - ../proc/self/mounts
|
L+ /etc/mtab - - - - ../proc/self/mounts
|
||||||
|
|
|
@ -5,7 +5,7 @@
|
||||||
# the Free Software Foundation; either version 2.1 of the License, or
|
# the Free Software Foundation; either version 2.1 of the License, or
|
||||||
# (at your option) any later version.
|
# (at your option) any later version.
|
||||||
|
|
||||||
# See tmpfiles.d(5) for details
|
# See tmpfiles.d(5) for details.
|
||||||
|
|
||||||
Q /home 0755 - - -
|
Q /home 0755 - - -
|
||||||
q /srv 0755 - - -
|
q /srv 0755 - - -
|
||||||
|
|
|
@ -5,7 +5,7 @@
|
||||||
# the Free Software Foundation; either version 2.1 of the License, or
|
# the Free Software Foundation; either version 2.1 of the License, or
|
||||||
# (at your option) any later version.
|
# (at your option) any later version.
|
||||||
|
|
||||||
# See tmpfiles.d(5) for details
|
# See tmpfiles.d(5) for details.
|
||||||
|
|
||||||
# Set the NOCOW attribute for directories of journal files. This flag
|
# Set the NOCOW attribute for directories of journal files. This flag
|
||||||
# is inherited by their new files and sub-directories. Matters only
|
# is inherited by their new files and sub-directories. Matters only
|
||||||
|
|
|
@ -5,10 +5,11 @@
|
||||||
# the Free Software Foundation; either version 2.1 of the License, or
|
# the Free Software Foundation; either version 2.1 of the License, or
|
||||||
# (at your option) any later version.
|
# (at your option) any later version.
|
||||||
|
|
||||||
# See tmpfiles.d(5) for details
|
# See tmpfiles.d(5) for details.
|
||||||
|
|
||||||
# These files are considered legacy and are unnecessary on legacy-free
|
# The functionality provided by these files and directories has been replaced
|
||||||
# systems.
|
# by newer interfaces. Their use is discouraged on legacy-free systems. This
|
||||||
|
# configuration is provided to maintain backward compatibility.
|
||||||
|
|
||||||
d /run/lock 0755 root root -
|
d /run/lock 0755 root root -
|
||||||
L /var/lock - - - - ../run/lock
|
L /var/lock - - - - ../run/lock
|
||||||
|
@ -16,15 +17,15 @@ L /var/lock - - - - ../run/lock
|
||||||
L$ /var/log/README - - - - ../..{{DOC_DIR}}/README.logs
|
L$ /var/log/README - - - - ../..{{DOC_DIR}}/README.logs
|
||||||
{% endif %}
|
{% endif %}
|
||||||
|
|
||||||
|
{% if HAVE_SYSV_COMPAT %}
|
||||||
# /run/lock/subsys is used for serializing SysV service execution, and
|
# /run/lock/subsys is used for serializing SysV service execution, and
|
||||||
# hence without use on SysV-less systems.
|
# hence without use on SysV-less systems.
|
||||||
|
|
||||||
d /run/lock/subsys 0755 root root -
|
d /run/lock/subsys 0755 root root -
|
||||||
|
|
||||||
# /forcefsck, /fastboot and /forcequotacheck are deprecated in favor of the
|
# /forcefsck, /fastboot and /forcequotacheck are deprecated in favor of the
|
||||||
# kernel command line options 'fsck.mode=force', 'fsck.mode=skip' and
|
# kernel command line options 'fsck.mode=force', 'fsck.mode=skip' and
|
||||||
# 'quotacheck.mode=force'
|
# 'quotacheck.mode=force'
|
||||||
|
|
||||||
r! /forcefsck
|
r! /forcefsck
|
||||||
r! /fastboot
|
r! /fastboot
|
||||||
r! /forcequotacheck
|
r! /forcequotacheck
|
||||||
|
{% endif %}
|
||||||
|
|
|
@ -35,7 +35,7 @@ in_files = [
|
||||||
['20-systemd-stub.conf', 'ENABLE_EFI'],
|
['20-systemd-stub.conf', 'ENABLE_EFI'],
|
||||||
['20-systemd-userdb.conf', 'ENABLE_SSH_USERDB_CONFIG'],
|
['20-systemd-userdb.conf', 'ENABLE_SSH_USERDB_CONFIG'],
|
||||||
['etc.conf'],
|
['etc.conf'],
|
||||||
['legacy.conf', 'HAVE_SYSV_COMPAT'],
|
['legacy.conf'],
|
||||||
['static-nodes-permissions.conf'],
|
['static-nodes-permissions.conf'],
|
||||||
['systemd.conf'],
|
['systemd.conf'],
|
||||||
['var.conf'],
|
['var.conf'],
|
||||||
|
|
|
@ -1,4 +1,4 @@
|
||||||
# SPDX-License-Identifier: LGPL-2.1-or-later
|
# SPDX-License-Identifier: LGPL-2.1-or-later
|
||||||
# See tmpfiles.d(5) for details
|
# See tmpfiles.d(5) for details.
|
||||||
|
|
||||||
Q /var/lib/portables 0700
|
Q /var/lib/portables 0700
|
||||||
|
|
|
@ -5,7 +5,7 @@
|
||||||
# the Free Software Foundation; either version 2.1 of the License, or
|
# the Free Software Foundation; either version 2.1 of the License, or
|
||||||
# (at your option) any later version.
|
# (at your option) any later version.
|
||||||
|
|
||||||
# See tmpfiles.d(5) for details
|
# See tmpfiles.d(5) for details.
|
||||||
|
|
||||||
# Provision additional login messages from credentials, if they are set. Note
|
# Provision additional login messages from credentials, if they are set. Note
|
||||||
# that these lines are NOPs if the credentials are not set or if the files
|
# that these lines are NOPs if the credentials are not set or if the files
|
||||||
|
|
|
@ -5,7 +5,7 @@
|
||||||
# the Free Software Foundation; either version 2.1 of the License, or
|
# the Free Software Foundation; either version 2.1 of the License, or
|
||||||
# (at your option) any later version.
|
# (at your option) any later version.
|
||||||
|
|
||||||
# See tmpfiles.d(5) for details
|
# See tmpfiles.d(5) for details.
|
||||||
|
|
||||||
d$ /run/systemd/netif 0755 systemd-network systemd-network -
|
d$ /run/systemd/netif 0755 systemd-network systemd-network -
|
||||||
d$ /run/systemd/netif/links 0755 systemd-network systemd-network -
|
d$ /run/systemd/netif/links 0755 systemd-network systemd-network -
|
||||||
|
|
|
@ -5,7 +5,7 @@
|
||||||
# the Free Software Foundation; either version 2.1 of the License, or
|
# the Free Software Foundation; either version 2.1 of the License, or
|
||||||
# (at your option) any later version.
|
# (at your option) any later version.
|
||||||
|
|
||||||
# See tmpfiles.d(5) for details
|
# See tmpfiles.d(5) for details.
|
||||||
|
|
||||||
Q /var/lib/machines 0700 - - -
|
Q /var/lib/machines 0700 - - -
|
||||||
|
|
||||||
|
|
|
@ -5,6 +5,6 @@
|
||||||
# the Free Software Foundation; either version 2.1 of the License, or
|
# the Free Software Foundation; either version 2.1 of the License, or
|
||||||
# (at your option) any later version.
|
# (at your option) any later version.
|
||||||
|
|
||||||
# See tmpfiles.d(5) for details
|
# See tmpfiles.d(5) for details.
|
||||||
|
|
||||||
L! /etc/resolv.conf - - - - ../run/systemd/resolve/stub-resolv.conf
|
L! /etc/resolv.conf - - - - ../run/systemd/resolve/stub-resolv.conf
|
||||||
|
|
|
@ -5,7 +5,7 @@
|
||||||
# the Free Software Foundation; either version 2.1 of the License, or
|
# the Free Software Foundation; either version 2.1 of the License, or
|
||||||
# (at your option) any later version.
|
# (at your option) any later version.
|
||||||
|
|
||||||
# See tmpfiles.d(5) for details
|
# See tmpfiles.d(5) for details.
|
||||||
|
|
||||||
# Exclude namespace mountpoints created with PrivateTmp=yes
|
# Exclude namespace mountpoints created with PrivateTmp=yes
|
||||||
x /tmp/systemd-private-%b-*
|
x /tmp/systemd-private-%b-*
|
||||||
|
|
|
@ -5,7 +5,7 @@
|
||||||
# the Free Software Foundation; either version 2.1 of the License, or
|
# the Free Software Foundation; either version 2.1 of the License, or
|
||||||
# (at your option) any later version.
|
# (at your option) any later version.
|
||||||
|
|
||||||
# See tmpfiles.d(5) for details
|
# See tmpfiles.d(5) for details.
|
||||||
|
|
||||||
d /run/user 0755 root root -
|
d /run/user 0755 root root -
|
||||||
{% if ENABLE_UTMP %}
|
{% if ENABLE_UTMP %}
|
||||||
|
|
|
@ -5,7 +5,7 @@
|
||||||
# the Free Software Foundation; either version 2.1 of the License, or
|
# the Free Software Foundation; either version 2.1 of the License, or
|
||||||
# (at your option) any later version.
|
# (at your option) any later version.
|
||||||
|
|
||||||
# See tmpfiles.d(5) for details
|
# See tmpfiles.d(5) for details.
|
||||||
|
|
||||||
# Clear tmp directories separately, to make them easier to override
|
# Clear tmp directories separately, to make them easier to override
|
||||||
q /tmp 1777 root root 10d
|
q /tmp 1777 root root 10d
|
||||||
|
|
|
@ -5,7 +5,7 @@
|
||||||
# the Free Software Foundation; either version 2.1 of the License, or
|
# the Free Software Foundation; either version 2.1 of the License, or
|
||||||
# (at your option) any later version.
|
# (at your option) any later version.
|
||||||
|
|
||||||
# See tmpfiles.d(5) for details
|
# See tmpfiles.d(5) for details.
|
||||||
|
|
||||||
q /var 0755 - - -
|
q /var 0755 - - -
|
||||||
|
|
||||||
|
|
|
@ -5,7 +5,7 @@
|
||||||
# the Free Software Foundation; either version 2.1 of the License, or
|
# the Free Software Foundation; either version 2.1 of the License, or
|
||||||
# (at your option) any later version.
|
# (at your option) any later version.
|
||||||
|
|
||||||
# See tmpfiles.d(5) for details
|
# See tmpfiles.d(5) for details.
|
||||||
|
|
||||||
# Make sure these are created by default so that nobody else can
|
# Make sure these are created by default so that nobody else can
|
||||||
# or empty them at startup
|
# or empty them at startup
|
||||||
|
|
Loading…
Reference in New Issue