mirror of
https://github.com/systemd/systemd.git
synced 2025-01-11 09:18:07 +03:00
Merge pull request #14779 from keszybz/news-v245
This commit is contained in:
commit
f2394ddb08
234
NEWS
234
NEWS
@ -3,29 +3,26 @@ systemd System and Service Manager
|
|||||||
CHANGES WITH 245 in spe:
|
CHANGES WITH 245 in spe:
|
||||||
|
|
||||||
* A new tool "systemd-repart" has been added, that operates as an
|
* A new tool "systemd-repart" has been added, that operates as an
|
||||||
idempotent, robust, incremental, elastic and declarative
|
idempotent declarative repartitioner for GPT partition tables.
|
||||||
repartitioner. It takes inspiration from
|
Specifically, a set of partitions that must or may exist can be
|
||||||
systemd-tmpfiles/systemd-sysusers but applies the algorithmic
|
configured via drop-in files, and during every boot the partition
|
||||||
concepts to GPT partition tables. Specifically, a set of partitions
|
table on disk is compared with these files, creating missing
|
||||||
that must or may exist can be configured via drop-in files, and
|
partitions or growing existing ones based on configurable relative
|
||||||
during every boot the partition table on disk is compared with these
|
and absolute size constraints. The tool is strictly incremental,
|
||||||
files, creating missing partitions or growing existing ones based on
|
i.e. does not delete, shrink or move partitions, but only adds and
|
||||||
configurable relative and absolute size constraints. The tool is
|
grows them. The primary use-case is OS images that ship in minimized
|
||||||
strictly incremental, i.e. does not delete, shrink or move
|
form, that on first boot are grown to the size of the underlying
|
||||||
partitions, but only adds and grows them. The primary use-case is OS
|
block device or augmented with additional partitions. For example,
|
||||||
images that shall ship in minimized form, with only a minimal boot
|
the root partition could be extended to cover the whole disk, or a
|
||||||
and root partition, that on first boot is grown to the size of the
|
swap or /home partitions could be added on first boot. It can also be
|
||||||
underlying block device or augmented with additional partitions. For
|
used for systems that use an A/B update scheme but ship images with
|
||||||
example, the root partition could be extended to cover the whole
|
just the A partition, with B added on first boot. The tool is
|
||||||
disk, or a swap or /home partitions could be added implicitly on
|
primarily intended to be run in the initrd, shortly before
|
||||||
first boot. It also has uses on systems that use an A/B update scheme
|
transitioning into the host OS, but can also be run after the
|
||||||
to allow shipping minimal images with just the A set of partition,
|
transition took place. It automatically discovers the disk backing
|
||||||
and with the B set added on first boot. The tool is primarily
|
the root file system, and should hence not require any additional
|
||||||
intended to be run in the initrd, shortly before transitioning into
|
configuration besides the partition definition drop-ins. If no
|
||||||
the host OS, but also can be run after the transition took place. It
|
configuration drop-ins are present, no action is taken.
|
||||||
automatically discovers the disk backing the root file system, and
|
|
||||||
should hence not require any additional configuration besides the
|
|
||||||
partition definition drop-ins.
|
|
||||||
|
|
||||||
* A new component "userdb" has been added, along with a small daemon
|
* A new component "userdb" has been added, along with a small daemon
|
||||||
"systemd-userdb.service" and a client tool "userdbctl". The framework
|
"systemd-userdb.service" and a client tool "userdbctl". The framework
|
||||||
@ -43,22 +40,21 @@ CHANGES WITH 245 in spe:
|
|||||||
that for the first time resource management and various other
|
that for the first time resource management and various other
|
||||||
per-user settings can be configured in LDAP directories and then
|
per-user settings can be configured in LDAP directories and then
|
||||||
provided to systemd (specifically to systemd-logind and pam-system)
|
provided to systemd (specifically to systemd-logind and pam-system)
|
||||||
to enforce on log-in. For further details see:
|
to apply on login. For further details see:
|
||||||
|
|
||||||
https://systemd.io/USER_RECORD
|
https://systemd.io/USER_RECORD
|
||||||
https://systemd.io/GROUP_RECORD
|
https://systemd.io/GROUP_RECORD
|
||||||
https://systemd.io/USER_GROUP_API
|
https://systemd.io/USER_GROUP_API
|
||||||
|
|
||||||
* A small new service systemd-homed.service has been added, that may be
|
* A small new service systemd-homed.service has been added, that may be
|
||||||
used to securely manage home directories, with built-in encryption
|
used to securely manage home directories with built-in encryption.
|
||||||
and unifying the user's own home directory data together with
|
The complete user record data is unified with the home directory,
|
||||||
complete user record data in a single place, thus making home
|
thus making home directories naturally migratable. Its primary
|
||||||
directories naturally migratable. Its primary back-end is based on
|
back-end is based on LUKS volumes, but fscrypt, plain directories,
|
||||||
LUKS volumes, but it also supports fscrypt, plain directories and
|
and other storage schemes are also supported. This solves a couple of
|
||||||
more. It solves a couple of problems we saw with traditional ways to
|
problems we saw with traditional ways to manage home directories, in
|
||||||
manage home directories, in particular when it comes to
|
particular when it comes to encryption. For further discussion of
|
||||||
encryption. For further discussion of this, see the video of
|
this, see the video of Lennart's talk at AllSystemsGo! 2019:
|
||||||
Lennart's talk at AllSystemsGo! 2019:
|
|
||||||
|
|
||||||
https://media.ccc.de/v/ASG2019-164-reinventing-home-directories
|
https://media.ccc.de/v/ASG2019-164-reinventing-home-directories
|
||||||
|
|
||||||
@ -69,49 +65,49 @@ CHANGES WITH 245 in spe:
|
|||||||
|
|
||||||
* systemd-journald is now multi-instantiable. In addition to the main
|
* systemd-journald is now multi-instantiable. In addition to the main
|
||||||
instance systemd-journald.service there's now a template unit
|
instance systemd-journald.service there's now a template unit
|
||||||
systemd-journald@.service that can be instantiated multiple times,
|
systemd-journald@.service, with each instance defining a new named
|
||||||
each time defining a new named log 'namespace' (whose name is
|
log 'namespace' (whose name is specified via the instance part of the
|
||||||
specified via the instance part of the instance unit name). A new
|
unit name). A new unit file setting LogNamespace= has been added,
|
||||||
unit file setting LogNamespace= has been added, taking such a
|
taking such a namespace name, that assigns services to the specified
|
||||||
namespace name, that allows assigning services to such log
|
log namespaces. As each log namespace is serviced by its own
|
||||||
namespaces. As each log namespace is serviced by its own, independent
|
independent journal daemon, this functionality may be used to improve
|
||||||
journal daemon this functionality may be use to improve performance
|
performance and increase isolation of applications, at the price of
|
||||||
and increase isolation of applications, at the price of losing global
|
losing global message ordering. Each instance of journald has a
|
||||||
message ordering. Each daemon may have a separate set of
|
separate set of configuration files, with possibly different disk
|
||||||
configuration files, with possibly different disk space settings and
|
usage limitations and other settings.
|
||||||
such. journalctl has been updated to take a new option --namespace=
|
|
||||||
which allows viewing logs from a specific log namespace. The
|
journalctl now takes a new option --namespace= to show logs from a
|
||||||
sd-journal.h API gained sd_journal_open_namespace() for opening the
|
specific log namespace. The sd-journal.h API gained
|
||||||
log stream of a specific log namespace. systemd-journald also gained
|
sd_journal_open_namespace() for opening the log stream of a specific
|
||||||
the ability to exit on idle, which is useful in the context of log
|
log namespace. systemd-journald also gained the ability to exit on
|
||||||
namespaces, as this means log daemons for log namespaces can be
|
idle, which is useful in the context of log namespaces, as this means
|
||||||
activated automatically on demand and stop automatically when no
|
log daemons for log namespaces can be activated automatically on
|
||||||
longer used, minimizing resource usage.
|
demand and will stop automatically when no longer used, minimizing
|
||||||
|
resource usage.
|
||||||
|
|
||||||
* When systemd-tmpfiles copies a file tree using the 'C' line type it
|
* When systemd-tmpfiles copies a file tree using the 'C' line type it
|
||||||
will now implicitly label every copied file matching the SELinux
|
will now label every copied file according to the SELinux database.
|
||||||
database.
|
|
||||||
|
|
||||||
* When systemd/PID 1 detects it is used in the initrd it will now boot
|
* When systemd/PID 1 detects it is used in the initrd it will now boot
|
||||||
into initrd.target rather than default.target by default. This should
|
into initrd.target rather than default.target by default. This should
|
||||||
make it simpler to build initrds with systemd as for many cases the
|
make it simpler to build initrds with systemd as for many cases the
|
||||||
only difference between a host OS image and an initrd image now is
|
only difference between a host OS image and an initrd image now is
|
||||||
the /etc/initrd-release file that identifies the initrd as one.
|
the presence of the /etc/initrd-release file.
|
||||||
|
|
||||||
* A new kernel command line option systemd.cpu_affinity= is now
|
* A new kernel command line option systemd.cpu_affinity= is now
|
||||||
understood. It's equivalent to the CPUAffinity= option in
|
understood. It's equivalent to the CPUAffinity= option in
|
||||||
/etc/systemd/system.conf and allows setting the CPU mask for PID 1
|
/etc/systemd/system.conf and allows setting the CPU mask for PID 1
|
||||||
itself and the default for all forked off processes.
|
itself and the default for all other processes.
|
||||||
|
|
||||||
* When systemd/PID 1 is reloaded (with systemctl daemon-reload or an
|
* When systemd/PID 1 is reloaded (with systemctl daemon-reload or
|
||||||
equivalent tool) the SELinux database is now reloaded, ensuring that
|
equivalent), the SELinux database is now reloaded, ensuring that
|
||||||
sockets and other file system objects are generated taking the new
|
sockets and other file system objects are generated taking the new
|
||||||
database into account.
|
database into account.
|
||||||
|
|
||||||
* The sd-event.h API now has native support for the new Linux "pidfd"
|
* The sd-event.h API gained native support for the new Linux "pidfd"
|
||||||
concept. This permits watching processes using file descriptors
|
concept. This permits watching processes using file descriptors
|
||||||
instead of PID numbers, which fixes a number of races and makes
|
instead of PID numbers, which fixes a number of races and makes
|
||||||
process supervision more robust and more efficient. All of systemd's
|
process supervision more robust and efficient. All of systemd's
|
||||||
components will now use pidfds if the kernel supports it for process
|
components will now use pidfds if the kernel supports it for process
|
||||||
watching, with the exception of PID 1 itself, unfortunately. We hope
|
watching, with the exception of PID 1 itself, unfortunately. We hope
|
||||||
to move PID 1 to exclusively using pidfds too eventually, but this
|
to move PID 1 to exclusively using pidfds too eventually, but this
|
||||||
@ -122,13 +118,13 @@ CHANGES WITH 245 in spe:
|
|||||||
* Closely related to this, the sd-event.h API gained two new calls
|
* Closely related to this, the sd-event.h API gained two new calls
|
||||||
sd_event_source_send_child_signal() (for sending a signal to a
|
sd_event_source_send_child_signal() (for sending a signal to a
|
||||||
watched process) and sd_event_source_get_child_process_own() (for
|
watched process) and sd_event_source_get_child_process_own() (for
|
||||||
marking a process so that it is killed implicitly whenever the event
|
marking a process so that it is killed automatically whenever the
|
||||||
source watching it is freed).
|
event source watching it is freed).
|
||||||
|
|
||||||
* systemd-networkd gained support for configuring Token Bucket Filter
|
* systemd-networkd gained support for configuring Token Bucket Filter
|
||||||
(TBF) parameters in its qdisc configuration support. Similar, support
|
(TBF) parameters in its qdisc configuration support. Similarly,
|
||||||
for Stochastic Fairness Queuing (SFQ), Controlled-Delay Active
|
support for Stochastic Fairness Queuing (SFQ), Controlled-Delay
|
||||||
Queue Management (CoDel), Fair Queueing (FQ) has been added.
|
Active Queue Management (CoDel), and Fair Queue (FQ) has been added.
|
||||||
|
|
||||||
* systemd-networkd gained support for Intermediate Functional Block
|
* systemd-networkd gained support for Intermediate Functional Block
|
||||||
(IFB) network devices.
|
(IFB) network devices.
|
||||||
@ -136,40 +132,39 @@ CHANGES WITH 245 in spe:
|
|||||||
* systemd-networkd gained support for configuring multi-path IP routes,
|
* systemd-networkd gained support for configuring multi-path IP routes,
|
||||||
using the new MultiPathRoute= setting in the [Route] section.
|
using the new MultiPathRoute= setting in the [Route] section.
|
||||||
|
|
||||||
* systemd-networkd's DHCPv4 support has been updated to support a new
|
* systemd-networkd's DHCPv4 client has been updated to support a new
|
||||||
SendDecline= option. If enabled duplicate address detection is done
|
SendDecline= option. If enabled, duplicate address detection is done
|
||||||
after a DHCP offer is received from a server. If a conflict is
|
after a DHCP offer is received from the server. If a conflict is
|
||||||
detected the address is declined. The DHCPv4 support also gained
|
detected, the address is declined. The DHCPv4 client also gained
|
||||||
support for a new RouteMTUBytes= setting that allows to configure the
|
support for a new RouteMTUBytes= setting that allows to configure the
|
||||||
MTU size to be used for routes generated from DHCPv4 leases.
|
MTU size to be used for routes generated from DHCPv4 leases.
|
||||||
|
|
||||||
* The PrefixRoute= setting in systemd-networkd's [Address] section of
|
* The PrefixRoute= setting in systemd-networkd's [Address] section of
|
||||||
.network files has been deprecated, and replaced by AddPrefixRoute=,
|
.network files has been deprecated, and replaced by AddPrefixRoute=,
|
||||||
with it's sense inverted.
|
with its sense inverted.
|
||||||
|
|
||||||
* The Gateway= setting of [Route] sections of .network files gained
|
* The Gateway= setting of [Route] sections of .network files gained
|
||||||
support for a special new value "_dhcp". If set, the configured
|
support for a special new value "_dhcp". If set, the configured
|
||||||
static route uses the gateway host configured via DHCP.
|
static route uses the gateway host configured via DHCP.
|
||||||
|
|
||||||
* A new User= setting has been implemented for the [RoutingPolicyRule]
|
* A new User= setting has been implemented for the [RoutingPolicyRule]
|
||||||
section of .network files for configuring source routing based on UID
|
section of .network files to configure source routing based on UID
|
||||||
ranges.
|
ranges.
|
||||||
|
|
||||||
* sd-bus gained a new API call sd_bus_message_sensitive() for marking a
|
* sd-bus gained a new API call sd_bus_message_sensitive() that marks a
|
||||||
D-Bus message object as "sensitive". Objects that are marked that way
|
D-Bus message object as "sensitive". Those objects are erased from
|
||||||
are erased from memory when they are freed. This concept is intended
|
memory when they are freed. This concept is intended to be used for
|
||||||
to be used for messages that contain security sensitive data that
|
messages that contain security sensitive data. A new flag
|
||||||
should be erased after use. A new flag SD_BUS_VTABLE_SENSITIVE has
|
SD_BUS_VTABLE_SENSITIVE has been introduced as well to mark methods
|
||||||
been introduced as well that allows marking method calls in sd-bus
|
in sd-bus vtables, causing any incoming and outgoing messages of
|
||||||
vtables like this, so that this new message flag is implicitly set
|
those methods to be implicitly marked as "sensitive".
|
||||||
for incoming and outgoing messages of specific methods.
|
|
||||||
|
|
||||||
* sd-bus gained a new API call sd_bus_message_dump() for dumping the
|
* sd-bus gained a new API call sd_bus_message_dump() for dumping the
|
||||||
contents of a message (or parts thereof) onto standard output, for
|
contents of a message (or parts thereof) to standard output for
|
||||||
debugging purposes.
|
debugging purposes.
|
||||||
|
|
||||||
* systemd-sysusers gained support for creating users with primary
|
* systemd-sysusers gained support for creating users with the primary
|
||||||
groups named differently than the user itself.
|
group named differently than the user.
|
||||||
|
|
||||||
* systemd-resolved's DNS-over-TLS support gained SNI validation.
|
* systemd-resolved's DNS-over-TLS support gained SNI validation.
|
||||||
|
|
||||||
@ -178,13 +173,13 @@ CHANGES WITH 245 in spe:
|
|||||||
only ext4 and btrfs partitions.
|
only ext4 and btrfs partitions.
|
||||||
|
|
||||||
* The support for /etc/crypttab gained a new x-initrd.attach option. If
|
* The support for /etc/crypttab gained a new x-initrd.attach option. If
|
||||||
set the specified encrypted volume is unlocked in the initrd
|
set, the specified encrypted volume is unlocked already in the
|
||||||
already. This concept corresponds to the x-initrd.mount option in
|
initrd. This concept corresponds to the x-initrd.mount option in
|
||||||
/etc/fstab.
|
/etc/fstab.
|
||||||
|
|
||||||
* systemd-cryptsetup gained native support for unlocking encrypted
|
* systemd-cryptsetup gained native support for unlocking encrypted
|
||||||
volumes utilizing PKCS#11 smartcards, i.e. for example to bind
|
volumes utilizing PKCS#11 smartcards, i.e. for example to bind
|
||||||
encryption of volumes to YubiKeys.This is exposed in the new
|
encryption of volumes to YubiKeys. This is exposed in the new
|
||||||
pkcs11-uri= option in /etc/crypttab.
|
pkcs11-uri= option in /etc/crypttab.
|
||||||
|
|
||||||
* The /etc/fstab support in systemd now supports two new mount options
|
* The /etc/fstab support in systemd now supports two new mount options
|
||||||
@ -194,42 +189,41 @@ CHANGES WITH 245 in spe:
|
|||||||
|
|
||||||
* The https://systemd.io/ web site has been relaunched, directly
|
* The https://systemd.io/ web site has been relaunched, directly
|
||||||
populated with most of the documentation included in the systemd
|
populated with most of the documentation included in the systemd
|
||||||
repository. In particular, systemd acquired a new logo, thanks to
|
repository. systemd also acquired a new logo, thanks to Tobias
|
||||||
Tobias Bernard.
|
Bernard.
|
||||||
|
|
||||||
* systemd-udevd gained support for managing "alternative" network
|
* systemd-udevd gained support for managing "alternative" network
|
||||||
interface names, as supported by new Linux kernels. For the first
|
interface names, as supported by new Linux kernels. For the first
|
||||||
time this permits assigning multiple (and longer!) names to a network
|
time this permits assigning multiple (and longer!) names to a network
|
||||||
interface. systemd-udevd will now by default assign the names
|
interface. systemd-udevd will now by default assign the names
|
||||||
generated via all supported naming schemes to each interface in
|
generated via all supported naming schemes to each interface. This
|
||||||
parallel. This may be further tweaked with .link drop-in files, and
|
may be further tweaked with .link files and the AlternativeName= and
|
||||||
the AlternativeName= and AlternativeNamesPolicy= settings. All other
|
AlternativeNamesPolicy= settings. Other components of systemd have
|
||||||
components of systemd have been updated to support the new
|
been updated to support the new alternative names wherever
|
||||||
alternative names too, wherever that is appropriate. For example,
|
appropriate. For example, systemd-nspawn will now generate
|
||||||
systemd-nspawn will now generate alternative interface names for the
|
alternative interface names for the host-facing side of container
|
||||||
host-facing side of container veth links based on the full container
|
veth links based on the full container name without truncation.
|
||||||
name without truncation.
|
|
||||||
|
|
||||||
* systemd-nspawn interface naming logic has been updated in another way
|
* systemd-nspawn interface naming logic has been updated in another way
|
||||||
too: if the main interface name (i.e. as opposed to new-style
|
too: if the main interface name (i.e. as opposed to new-style
|
||||||
"alternative" names) is the truncated result of container name a
|
"alternative" names) based on the container name is truncated, a
|
||||||
simple hashing scheme is used that ensures that multiple containers
|
simple hashing scheme is used to give different interface names to
|
||||||
whose name all begin the same are likely resulting in different
|
multiple containers whose names all begin with the same prefix. Since
|
||||||
interface names. Since this changes the primary interface names
|
this changes the primary interface names pointing to containers if
|
||||||
pointing to containers if truncation happens the old scheme may still
|
truncation happens, the old scheme may still be requested by
|
||||||
be requested by selecting a different naming scheme than the v245
|
selecting an older naming scheme, via the net.naming-scheme= kernel
|
||||||
one, via the net.naming-scheme= kernel command line option.
|
command line option.
|
||||||
|
|
||||||
* PrivateUsers= in service files now works in services run by the
|
* PrivateUsers= in service files now works in services run by the
|
||||||
systemd --user per-user instance of the service manager.
|
systemd --user per-user instance of the service manager.
|
||||||
|
|
||||||
* A new per-service sandboxing option ProtectClock= has been added that
|
* A new per-service sandboxing option ProtectClock= has been added that
|
||||||
locks down write access to the system clock. It takes away device
|
locks down write access to the system clock. It takes away device
|
||||||
node access to /dev/rtc as well as the system calls that allow to set
|
node access to /dev/rtc as well as the system calls that set the
|
||||||
the system clock. It also removes the CAP_SYS_TIME and CAP_WAKE_ALARM
|
system clock and the CAP_SYS_TIME and CAP_WAKE_ALARM capabilities.
|
||||||
capabilities. Note that this option does not affect access to
|
Note that this option does not affect access to auxiliary services
|
||||||
auxiliary services that allow changing the clock, for example access
|
that allow changing the clock, for example access to
|
||||||
to systemd-timedated.
|
systemd-timedated.
|
||||||
|
|
||||||
* The systemd-id128 tool gained a new "show" verb for listing or
|
* The systemd-id128 tool gained a new "show" verb for listing or
|
||||||
resolving a number of well-known UUIDs/128bit IDs, currently mostly
|
resolving a number of well-known UUIDs/128bit IDs, currently mostly
|
||||||
@ -257,13 +251,22 @@ CHANGES WITH 245 in spe:
|
|||||||
permanent MAC address of a network device even if a randomized MAC
|
permanent MAC address of a network device even if a randomized MAC
|
||||||
address is used.
|
address is used.
|
||||||
|
|
||||||
* systemd-logind will now validate access to the operation for changing
|
* The [TrafficControlQueueingDiscipline] section in .network files has
|
||||||
virtual terminals via a PolicyKit action. By default only users with
|
been renamed to [NetworkEmulator] with the "NetworkEmulator" prefix
|
||||||
at least one session on a local VT will get access to the method call.
|
dropped from the individual setting names.
|
||||||
|
|
||||||
* When systemd sets up PAM sessions that invoked service processes shall
|
* Any .link and .network files that have an empty [Match] section (this
|
||||||
run in, the pam_setcred() API is now invoked, thus permitting PAM
|
also includes empty and commented-out files) will now be
|
||||||
modules to set additional credentials for the processes.
|
rejected. systemd-udev and systemd-networkd started warning about
|
||||||
|
such files in version 243.
|
||||||
|
|
||||||
|
* systemd-logind will now validate access to the operation of changing
|
||||||
|
the virtual terminal via a PolicyKit action. By default, only users
|
||||||
|
with at least one session on a local VT are granted permission.
|
||||||
|
|
||||||
|
* When systemd sets up PAM sessions that invoked service processes
|
||||||
|
shall run in, the pam_setcred() API is now invoked, thus permitting
|
||||||
|
PAM modules to set additional credentials for the processes.
|
||||||
|
|
||||||
…
|
…
|
||||||
|
|
||||||
@ -7181,10 +7184,9 @@ CHANGES WITH 213:
|
|||||||
* A new fsck.repair= kernel option has been added to control
|
* A new fsck.repair= kernel option has been added to control
|
||||||
how fsck shall deal with unclean file systems at boot.
|
how fsck shall deal with unclean file systems at boot.
|
||||||
|
|
||||||
* The (.ini) configuration file parser will now silently
|
* The (.ini) configuration file parser will now silently ignore
|
||||||
ignore sections whose name begins with "X-". This may be
|
sections whose names begin with "X-". This may be used to maintain
|
||||||
used to maintain application-specific extension sections in unit
|
application-specific extension sections in unit files.
|
||||||
files.
|
|
||||||
|
|
||||||
* machined gained a new API to query the IP addresses of
|
* machined gained a new API to query the IP addresses of
|
||||||
registered containers. "machinectl status" has been updated
|
registered containers. "machinectl status" has been updated
|
||||||
|
@ -848,20 +848,19 @@
|
|||||||
<variablelist>
|
<variablelist>
|
||||||
<varlistentry>
|
<varlistentry>
|
||||||
<term><filename>blockdev@.target</filename></term>
|
<term><filename>blockdev@.target</filename></term>
|
||||||
<listitem><para>This template unit may be used to order mount units and other consumers of block
|
<listitem><para>This template unit is used to order mount units and other consumers of block
|
||||||
devices against services that synthesize these block devices. This is intended to be used to order
|
devices after services that synthesize these block devices. In particular, this is intended to be
|
||||||
storage services (such as
|
used with storage services (such as
|
||||||
<citerefentry><refentrytitle>systemd-cryptsetup@.service</refentrytitle><manvolnum>5</manvolnum></citerefentry>)
|
<citerefentry><refentrytitle>systemd-cryptsetup@.service</refentrytitle><manvolnum>5</manvolnum></citerefentry>)
|
||||||
that allocate and manage a virtual block device against mount units and other consumers of
|
that allocate and manage a virtual block device. Storage services are ordered before an instance of
|
||||||
it. Specifically, the storage services are supposed to be orderd before an instance of
|
<filename>blockdev@.target</filename>, and the consumer units after it. The ordering is
|
||||||
<filename>blockdev@.target</filename>, and the mount unit (or other consuming unit, such as a swap
|
particularly relevant during shutdown, as it ensures that the mount is deactivated first and the
|
||||||
unit) after it. The ordering is particular relevant during shutdown, as it ensures that the mount
|
service backing the mount later. The <filename>blockdev@.target</filename> instance should be
|
||||||
is deactivated first and the service backing the mount only deactivated after that completed. The
|
pulled in via a <option>Wants=</option> dependency of the storage daemon and thus generally not be
|
||||||
<filename>blockdev@.target</filename> instance should be pulled in via a <option>Wants=</option>
|
part of any transaction unless a storage daemon is used. The instance name for instances of this
|
||||||
dependency of the storage daemon and thus generally not be part of any transaction unless a storage
|
template unit must be a properly escaped block device node path, e.g.
|
||||||
daemon is used. The instance name for instances of this template unit is supposed to be the
|
<filename>blockdev@dev-mapper-foobar.target</filename> for the storage device
|
||||||
properly escaped bock device node path, e.g. <filename>blockdev@dev-mapper-foobar.target</filename>
|
<filename>/dev/mapper/foobar</filename>.</para></listitem>
|
||||||
for a storage device <filename>/dev/mapper/foobar</filename>.</para></listitem>
|
|
||||||
</varlistentry>
|
</varlistentry>
|
||||||
<varlistentry>
|
<varlistentry>
|
||||||
<term><filename>cryptsetup-pre.target</filename></term>
|
<term><filename>cryptsetup-pre.target</filename></term>
|
||||||
|
@ -25,6 +25,16 @@
|
|||||||
<para><filename>/etc/sysusers.d/*.conf</filename></para>
|
<para><filename>/etc/sysusers.d/*.conf</filename></para>
|
||||||
<para><filename>/run/sysusers.d/*.conf</filename></para>
|
<para><filename>/run/sysusers.d/*.conf</filename></para>
|
||||||
<para><filename>/usr/lib/sysusers.d/*.conf</filename></para>
|
<para><filename>/usr/lib/sysusers.d/*.conf</filename></para>
|
||||||
|
|
||||||
|
<programlisting>
|
||||||
|
#Type Name ID GECOS Home directory Shell
|
||||||
|
u user_name uid "User Description" /path/to/shell
|
||||||
|
u user_name uid:gid - -
|
||||||
|
u user_name /file/owned/by/user - -
|
||||||
|
g group_name gid "Group Description"
|
||||||
|
g group_name /file/owned/by/group -
|
||||||
|
m user_name group_name
|
||||||
|
r - lowest-highest</programlisting>
|
||||||
</refsynopsisdiv>
|
</refsynopsisdiv>
|
||||||
|
|
||||||
<refsect1>
|
<refsect1>
|
||||||
@ -81,11 +91,13 @@
|
|||||||
|
|
||||||
<programlisting>#Type Name ID GECOS Home directory Shell
|
<programlisting>#Type Name ID GECOS Home directory Shell
|
||||||
u httpd 404 "HTTP User"
|
u httpd 404 "HTTP User"
|
||||||
u authd /usr/bin/authd "Authorization user"
|
u _authd /usr/bin/authd "Authorization user"
|
||||||
u postgres - "Postgresql Database" /var/lib/pgsql /usr/libexec/postgresdb
|
u postgres - "Postgresql Database" /var/lib/pgsql /usr/libexec/postgresdb
|
||||||
g input - -
|
g input - -
|
||||||
m authd input
|
m _authd input
|
||||||
u root 0 "Superuser" /root /bin/zsh</programlisting>
|
u root 0 "Superuser" /root /bin/zsh
|
||||||
|
r - 500-900
|
||||||
|
</programlisting>
|
||||||
|
|
||||||
<para>Empty lines and lines beginning with the <literal>#</literal> character are ignored, and may be used for
|
<para>Empty lines and lines beginning with the <literal>#</literal> character are ignored, and may be used for
|
||||||
commenting.</para>
|
commenting.</para>
|
||||||
@ -109,7 +121,7 @@ u root 0 "Superuser" /root /bin/zsh</pro
|
|||||||
<term><varname>g</varname></term>
|
<term><varname>g</varname></term>
|
||||||
<listitem><para>Create a system group of the specified name
|
<listitem><para>Create a system group of the specified name
|
||||||
should it not exist yet. Note that <varname>u</varname>
|
should it not exist yet. Note that <varname>u</varname>
|
||||||
implicitly create a matching group. The group will be
|
implicitly creates a matching group. The group will be
|
||||||
created with no password set.</para></listitem>
|
created with no password set.</para></listitem>
|
||||||
</varlistentry>
|
</varlistentry>
|
||||||
|
|
||||||
|
Loading…
Reference in New Issue
Block a user