~usarinheininga/ubuntuplasma/+git/systemd:debian-eos3.7

Last commit made on 2019-08-29
Get this branch:
git clone -b debian-eos3.7 https://git.launchpad.net/~usarinheininga/ubuntuplasma/+git/systemd

Branch merges

Branch information

Name:
debian-eos3.7
Repository:
lp:~usarinheininga/ubuntuplasma/+git/systemd

Recent commits

c568caf... by ManMower <email address hidden>

Merge pull request #113 from endlessm/T27442-systemd-boot-signed

Split out systemd-boot for signing

35d1027... by Dan Nicholson

Revert "Ensure only systemd or systemd-signed can be installed"

This reverts commit df34cdc207b37bcec729ae51507c9e436a9e670a. Replacing
a core package like systemd would be very tricky, so the systemd-boot
files have been split out into a separate package. There will no longer
be systemd-signed package after that change, so there's no need to
maintain the Replaces and Conflicts.

b322539... by Dan Nicholson

Ensure only systemd-boot or systemd-boot-signed can be installed

The signed version of the package replaces files from the unsigned
version, so add a Replaces and Conflicts on the signed version.

https://phabricator.endlessm.com/T27442

50a40d1... by Dan Nicholson

Split out systemd-boot to separate package

We want to replace the systemd-boot EFI loader with a signed version,
and our normal way of doing that is to replace the package with a signed
version. However, that would be problematic for a core package like
systemd. Not only are there many reverse dependencies on systemd that
would have to be satisfied by the signed version, but the package is
Priority: important, which means that our apt-bootstrap tool would have
to resolve the conflicts during OS bootstrapping.

Instead, move the few files into a separate package. Nothing directly
depends on systemd-boot, so it should be straightforward to manage it
this way. The built architectures matches those for which gnu-efi is a
build dependency. Without that, systemd-boot is not built.

https://phabricator.endlessm.com/T27442

c18dab5... by Daniel Drake <email address hidden>

Merge pull request #111 from endlessm/T27442-systemd-signed

Ensure only systemd or systemd-signed can be installed

df34cdc... by Dan Nicholson

Ensure only systemd or systemd-signed can be installed

For PAYG, the systemd-boot EFI loader needs to be signed, and this will
be part of a systemd-signed package. Ensure that only systemd or
systemd-signed can be installed by adding Conflicts and Replaces on that
package. The secure boot signer will swap these to systemd when creating
the systemd-signed package.

https://phabricator.endlessm.com/T27442

31eaa5f... by =?utf-8?q?Jo=C3=A3o_Paulo_Rechi_Vita?= <email address hidden>

Merge pull request #106 from endlessm/T27032-debian

pam.d/systemd-user: add pam_keyinit to link session and user keyrings

3d97c1e... by Robert McQueen <email address hidden>

pam.d/systemd-user: add pam_keyinit to link session and user keyrings

Apply a version of the change in
https://github.com/systemd/systemd/commit/ab79099d so that the user
keyring is available in systemd-user sessions, which allows keys to be
configured for accessing encrypted filesystems. See
https://github.com/google/fscrypt/issues/100 and
https://bugs.launchpad.net/ubuntu/+source/systemd/+bug/1754270 for more
details.

https://phabricator.endlessm.com/T27032

c8b360f... by =?utf-8?q?Jo=C3=A3o_Paulo_Rechi_Vita?= <email address hidden>

Do not create kvm group

We set /dev/kvm access mode to 0666, so we don't need a kvm user or
group.

https://phabricator.endlessm.com/T23373

4eac5e1... by =?utf-8?q?Jo=C3=A3o_Paulo_Rechi_Vita?= <email address hidden>

Set dev-kvm-mode to 0666

We want to have /dev/kvm accessible by any user.

https://phabricator.endlessm.com/T22718