Bug#800087: closed by Michael Biebl (Re: Bug#800087: systemd lists running daemons as failed after reboot)

2015-10-05 Thread Michael Biebl
Am 05.10.2015 um 01:48 schrieb James Bottomley:
> On Sun, 2015-10-04 at 23:06 +, Debian Bug Tracking System wrote:
>> Well, this is apparently an apache configuration problem, causing the
>> service to return a non-zero exit code.
>>
>> Once you fix that, the service should not be marked as failed.
> 
> That's pretty obviously an incorrect deduction, isn't it?  If it were a
> config file problem leading to the control process erroring out then the
> manual systemctl start apache would also fail; but, as you can see from
> the description in the original report, it doesn't.

You might need to have give apache more time to start up. Maybe 20 secs
is not enough since during boot there is a lot of other I/O going on and
the apache control process kills itself prematurely:


> Oct 03 10:45:06 bedivere apache2[693]: Starting web server: apache2AH00180: 
> WARNING: MaxRequestWorkers of 20 exceeds ServerLimit value of
> Oct 03 10:45:06 bedivere apache2[693]: 5 servers, decreasing 
> MaxRequestWorkers to 5.
> Oct 03 10:45:06 bedivere apache2[693]: To increase, please see the 
> ServerLimit directive.
> Oct 03 10:45:42 bedivere apache2[693]: failed!
> Oct 03 10:45:42 bedivere apache2[693]: The apache2 instance did not start 
> within 20 seconds. Please read the log files to discover problems ... 
> (warning).
> Oct 03 10:45:42 bedivere systemd[1]: apache2.service: Control process exited, 
> code=exited status=1




-- 
Why is it that all of the instruments seeking intelligent life in the
universe are pointed away from Earth?



signature.asc
Description: OpenPGP digital signature
___
Pkg-systemd-maintainers mailing list
Pkg-systemd-maintainers@lists.alioth.debian.org
http://lists.alioth.debian.org/cgi-bin/mailman/listinfo/pkg-systemd-maintainers

Bug#800087: closed by Michael Biebl (Re: Bug#800087: systemd lists running daemons as failed after reboot)

2015-10-05 Thread Michael Biebl
Am 05.10.2015 um 10:41 schrieb Michael Biebl:
> Am 05.10.2015 um 01:48 schrieb James Bottomley:
>> On Sun, 2015-10-04 at 23:06 +, Debian Bug Tracking System wrote:
>>> Well, this is apparently an apache configuration problem, causing the
>>> service to return a non-zero exit code.
>>>
>>> Once you fix that, the service should not be marked as failed.
>>
>> That's pretty obviously an incorrect deduction, isn't it?  If it were a
>> config file problem leading to the control process erroring out then the
>> manual systemctl start apache would also fail; but, as you can see from
>> the description in the original report, it doesn't.
> 
> You might need to have give apache more time to start up. Maybe 20 secs
> is not enough since during boot there is a lot of other I/O going on and
> the apache control process kills itself prematurely:
> 

let me rephrase that: try to find out why apache does not start up
properly within 20 secs (e.g. due to missing ressources) and then fix
that or increase the limit.



-- 
Why is it that all of the instruments seeking intelligent life in the
universe are pointed away from Earth?



signature.asc
Description: OpenPGP digital signature
___
Pkg-systemd-maintainers mailing list
Pkg-systemd-maintainers@lists.alioth.debian.org
http://lists.alioth.debian.org/cgi-bin/mailman/listinfo/pkg-systemd-maintainers

Processed: retitle 795494 to udev: network interfaces incorrectly named if naming rules are not in 70-persistent-net.rules

2015-10-05 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

> retitle 795494 udev: network interfaces incorrectly named if naming rules are 
> not in 70-persistent-net.rules
Bug #795494 [udev] udev: network interfaces incorrectly named due to outdated 
initrd
Changed Bug title to 'udev: network interfaces incorrectly named if naming 
rules are not in 70-persistent-net.rules' from 'udev: network interfaces 
incorrectly named due to outdated initrd'
> thanks
Stopping processing here.

Please contact me if you need assistance.
-- 
795494: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=795494
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems


___
Pkg-systemd-maintainers mailing list
Pkg-systemd-maintainers@lists.alioth.debian.org
http://lists.alioth.debian.org/cgi-bin/mailman/listinfo/pkg-systemd-maintainers


Bug#761909: (no subject)

2015-10-05 Thread Martin Pitt
Benedict Broy [2014-11-23 23:45 +0100]:
> Hi, I have exactly the same problem. In my case, network-manager is
> responsible for shutting down the network connection.

Please let's keep this bug about interfaces configured with ifupdown.
NM is an entirely different mechanism, and unlike ifupdown systemd
isn't directly involved in that.

Thanks,

Martin

-- 
Martin Pitt| http://www.piware.de
Ubuntu Developer (www.ubuntu.com)  | Debian Developer  (www.debian.org)


signature.asc
Description: Digital signature
___
Pkg-systemd-maintainers mailing list
Pkg-systemd-maintainers@lists.alioth.debian.org
http://lists.alioth.debian.org/cgi-bin/mailman/listinfo/pkg-systemd-maintainers

Bug#761909: systemd does not unmount nfs shares before bringing down the network interface

2015-10-05 Thread Martin Pitt
Hello,

Giuseppe Bilotta [2014-09-16 20:15 +0200]:
> My fstab includes the line
> 
> labrador:/oneforall /oneforallnfs auto,exec   0   0
> 
> and the nfs share is automatically mounted when a network interface that
> can resolve `labrador` is brought up. I don't use NM nor wicd, so I
> bring the network interfaces up myself, typically with something like:
> 
> sudo ifup wlan0=home
> 
> However, when the network is brought down (manually, or automatically
> during system shutdown), the mountpoint is not unmounted, causing a
> number of issues.

This sounds very similar to https://launchpad.net/bugs/1492546 .
ifupdown's /etc/init.d/networking (and also /etc/init/networking.conf)
call functions check_network_file_systems() and check_network_swap()
and don't tear down the interface(s) in the above situation. This also
applies to e. g. iscsi.

But we don't do the same with the autogenerated ifup@.service -- that
always unconditionally calls "ifdown" on stopping. IMHO we should make
"systemctl stop ifup@ethX.service" a no-op at least during shutdown,
as stopping /etc/init.d/networking will stop them all anyway (or not,
if network file systems are being used).

We could change the ExecStop= to something like

  /bin/sh -ec '[ "$(systemctl is-system-running)" = stopping ] || /sbin/ifdown 
%I"

Or we just declare that we don't support manual stops, and you are
supposed to run "sudo ifdown ethX" to stop an interface. This is also
reasonable as we consider ifup@.service more like an internal helper
unit, not an user-visible/actionable one.

For sure I don't want to replicate the entire
check_network_file_systems()/check_network_swap() logic in
ifup@.service -- running this once on shutdown is bad enough :-)

Thanks,

Martin
-- 
Martin Pitt| http://www.piware.de
Ubuntu Developer (www.ubuntu.com)  | Debian Developer  (www.debian.org)


signature.asc
Description: Digital signature
___
Pkg-systemd-maintainers mailing list
Pkg-systemd-maintainers@lists.alioth.debian.org
http://lists.alioth.debian.org/cgi-bin/mailman/listinfo/pkg-systemd-maintainers

Bug#761909: systemd does not unmount nfs shares before bringing down the network interface

2015-10-05 Thread Michael Biebl
Am 05.10.2015 um 11:15 schrieb Martin Pitt:
> Hello,
> 
> Giuseppe Bilotta [2014-09-16 20:15 +0200]:
>> My fstab includes the line
>>
>> labrador:/oneforall /oneforall   nfs auto,exec   0   0
>>
>> and the nfs share is automatically mounted when a network interface that
>> can resolve `labrador` is brought up. I don't use NM nor wicd, so I
>> bring the network interfaces up myself, typically with something like:
>>
>> sudo ifup wlan0=home
>>
>> However, when the network is brought down (manually, or automatically
>> during system shutdown), the mountpoint is not unmounted, causing a
>> number of issues.
> 
> This sounds very similar to https://launchpad.net/bugs/1492546 .
> ifupdown's /etc/init.d/networking (and also /etc/init/networking.conf)
> call functions check_network_file_systems() and check_network_swap()
> and don't tear down the interface(s) in the above situation. This also
> applies to e. g. iscsi.
> 
> But we don't do the same with the autogenerated ifup@.service -- that
> always unconditionally calls "ifdown" on stopping. IMHO we should make
> "systemctl stop ifup@ethX.service" a no-op at least during shutdown,
> as stopping /etc/init.d/networking will stop them all anyway (or not,
> if network file systems are being used).
> 
> We could change the ExecStop= to something like
> 
>   /bin/sh -ec '[ "$(systemctl is-system-running)" = stopping ] || 
> /sbin/ifdown %I"
> 
> Or we just declare that we don't support manual stops, and you are
> supposed to run "sudo ifdown ethX" to stop an interface. This is also
> reasonable as we consider ifup@.service more like an internal helper
> unit, not an user-visible/actionable one.
> 
> For sure I don't want to replicate the entire
> check_network_file_systems()/check_network_swap() logic in
> ifup@.service -- running this once on shutdown is bad enough :-)
> 


The ifup@.service unit file has DefaultDependencies=no and *no*
Conflicts=shutdown.target, which means it should *not* be stopped on
shutdown. This was done this way for exactly the reason you mention.


-- 
Why is it that all of the instruments seeking intelligent life in the
universe are pointed away from Earth?



signature.asc
Description: OpenPGP digital signature
___
Pkg-systemd-maintainers mailing list
Pkg-systemd-maintainers@lists.alioth.debian.org
http://lists.alioth.debian.org/cgi-bin/mailman/listinfo/pkg-systemd-maintainers

Bug#761909: systemd does not unmount nfs shares before bringing down the network interface

2015-10-05 Thread Michael Biebl
Am 05.10.2015 um 12:07 schrieb Michael Biebl:
> The ifup@.service unit file has DefaultDependencies=no and *no*
> Conflicts=shutdown.target, which means it should *not* be stopped on
> shutdown. This was done this way for exactly the reason you mention.

Originally I designed it that way: no Conflicts=shutdown.target and
letting networking.service do the clean up on shutdown.

ifup@.service was changed in the mean time. I wonder if the
PartOf=network.target breaks that.

Can someone check if ifup@.service units are stopped on shutdown?


-- 
Why is it that all of the instruments seeking intelligent life in the
universe are pointed away from Earth?



signature.asc
Description: OpenPGP digital signature
___
Pkg-systemd-maintainers mailing list
Pkg-systemd-maintainers@lists.alioth.debian.org
http://lists.alioth.debian.org/cgi-bin/mailman/listinfo/pkg-systemd-maintainers

Bug#761909: systemd does not unmount nfs shares before bringing down the network interface

2015-10-05 Thread Martin Pitt
Michael Biebl [2015-10-05 12:11 +0200]:
> Can someone check if ifup@.service units are stopped on shutdown?

I already did this morning before I wrote that reply, they do get
stopped. I added an "echo XXX; systemctl is-system-running" to
ExecStop=, and I see these on shutdown.

Martin
-- 
Martin Pitt| http://www.piware.de
Ubuntu Developer (www.ubuntu.com)  | Debian Developer  (www.debian.org)


signature.asc
Description: Digital signature
___
Pkg-systemd-maintainers mailing list
Pkg-systemd-maintainers@lists.alioth.debian.org
http://lists.alioth.debian.org/cgi-bin/mailman/listinfo/pkg-systemd-maintainers

Bug#800947: ACL for /var/log/journal not set for group adm

2015-10-05 Thread Raphaël Halimi
Package: systemd
Version: 226-4

Hi,

About persistent logging, README.Debian claims :

"systemd will add an ACL for read permissions for users in the "adm" group."

This is not working: after creating /var/log/journal with the "install"
command as instructed in the README.Debian, and even after several
reboots, the ACL is not set:

raph@arche:~$ getfacl /var/log/journal/
getfacl : suppression du premier « / » des noms de chemins absolus
# file: var/log/journal/
# owner: root
# group: systemd-journal
# flags: -s-
user::rwx
group::r-x
other::r-x

Partition is ext4, so ACL are supported (I can set them manually as
instructed in the README.Debian file from Jessie).

Regards,

-- 
Raphaël Halimi



signature.asc
Description: OpenPGP digital signature
___
Pkg-systemd-maintainers mailing list
Pkg-systemd-maintainers@lists.alioth.debian.org
http://lists.alioth.debian.org/cgi-bin/mailman/listinfo/pkg-systemd-maintainers

Bug#761909: systemd does not unmount nfs shares before bringing down the network interface

2015-10-05 Thread Michael Biebl
Am 05.10.2015 um 11:15 schrieb Martin Pitt:
> Or we just declare that we don't support manual stops, and you are
> supposed to run "sudo ifdown ethX" to stop an interface. This is also
> reasonable as we consider ifup@.service more like an internal helper
> unit, not an user-visible/actionable one.

We bind the unit to the lifetime of the interface, i.e. we want to run
ifdown $iface if the device is unplugged. So I don't think we should
remove the ExecStop, at least not without making sure that this would
cause regressions, like stale ifupdown state files.


-- 
Why is it that all of the instruments seeking intelligent life in the
universe are pointed away from Earth?



signature.asc
Description: OpenPGP digital signature
___
Pkg-systemd-maintainers mailing list
Pkg-systemd-maintainers@lists.alioth.debian.org
http://lists.alioth.debian.org/cgi-bin/mailman/listinfo/pkg-systemd-maintainers

Bug#800947: ACL for /var/log/journal not set for group adm

2015-10-05 Thread Michael Biebl
Am 05.10.2015 um 12:26 schrieb Raphaël Halimi:
> Package: systemd
> Version: 226-4
> 
> Hi,
> 
> About persistent logging, README.Debian claims :
> 
> "systemd will add an ACL for read permissions for users in the "adm" group."
> 
> This is not working: after creating /var/log/journal with the "install"
> command as instructed in the README.Debian, and even after several
> reboots, the ACL is not set:
> 
> raph@arche:~$ getfacl /var/log/journal/
> getfacl : suppression du premier « / » des noms de chemins absolus
> # file: var/log/journal/
> # owner: root
> # group: systemd-journal
> # flags: -s-
> user::rwx
> group::r-x
> other::r-x
> 

But the subdirectories of /var/log/journal have the correct ACL set, right?




-- 
Why is it that all of the instruments seeking intelligent life in the
universe are pointed away from Earth?



signature.asc
Description: OpenPGP digital signature
___
Pkg-systemd-maintainers mailing list
Pkg-systemd-maintainers@lists.alioth.debian.org
http://lists.alioth.debian.org/cgi-bin/mailman/listinfo/pkg-systemd-maintainers

Processed: tagging 795494

2015-10-05 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

> tags 795494 + pending
Bug #795494 [udev] udev: network interfaces incorrectly named if naming rules 
are not in 70-persistent-net.rules
Added tag(s) pending.
> thanks
Stopping processing here.

Please contact me if you need assistance.
-- 
795494: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=795494
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems


___
Pkg-systemd-maintainers mailing list
Pkg-systemd-maintainers@lists.alioth.debian.org
http://lists.alioth.debian.org/cgi-bin/mailman/listinfo/pkg-systemd-maintainers


Processed: Re: Bug#761909: systemd does not unmount nfs shares before bringing down the network interface

2015-10-05 Thread Debian Bug Tracking System
Processing control commands:

> tag -1 pending
Bug #761909 [systemd] systemd does not unmount nfs shares before bringing down 
the network interface
Added tag(s) pending.

-- 
761909: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=761909
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems

___
Pkg-systemd-maintainers mailing list
Pkg-systemd-maintainers@lists.alioth.debian.org
http://lists.alioth.debian.org/cgi-bin/mailman/listinfo/pkg-systemd-maintainers


Bug#761909: systemd does not unmount nfs shares before bringing down the network interface

2015-10-05 Thread Martin Pitt
Control: tag -1 pending

Hello Michael,

Michael Biebl [2015-10-05 12:11 +0200]:
> Originally I designed it that way: no Conflicts=shutdown.target and
> letting networking.service do the clean up on shutdown.
> 
> ifup@.service was changed in the mean time. I wonder if the
> PartOf=network.target breaks that.

That's indeed it! I dropped it, and ifup@*.service isn't stopped on
shutdown any more.

The PartOf= has a rather long history: It got introduced in 1afebb7,
immediately reverted in fc63e489, and reintroduced in 3d857c21.

However, with dropping the PartOf=, I just verified that "systemctl
isolate emergency.target" still works fine -- as
/etc/init.d/networking is stopped anyway, all interfaces get stopped,
so we don't need to do that again via ifup@.service.
I dont know why this didn't work back then, or it was just an
oversight. But I dropped the PartOf= again in git now.

Michael Biebl [2015-10-05 12:28 +0200]:
> We bind the unit to the lifetime of the interface, i.e. we want to run
> ifdown $iface if the device is unplugged. So I don't think we should
> remove the ExecStop, at least not without making sure that this would
> cause regressions, like stale ifupdown state files.

Indeed. I think it's fine as it is now, you can stop it manually but
it doesn't stop automatically on shutdown any more.

Thanks,

Martin
-- 
Martin Pitt| http://www.piware.de
Ubuntu Developer (www.ubuntu.com)  | Debian Developer  (www.debian.org)


signature.asc
Description: Digital signature
___
Pkg-systemd-maintainers mailing list
Pkg-systemd-maintainers@lists.alioth.debian.org
http://lists.alioth.debian.org/cgi-bin/mailman/listinfo/pkg-systemd-maintainers

Bug#800947: ACL for /var/log/journal not set for group adm

2015-10-05 Thread Raphaël Halimi
Le 05/10/2015 12:30, Michael Biebl a écrit :
> But the subdirectories of /var/log/journal have the correct ACL set, right?

Yes, you're right, I just noticed it; but using journalctl as a user
won't display system messages (only user messages), which is not the
expected behavior of adding a user in the "adm" group (pre-systemd).

Maybe it's because the system.journal file doesn't have the ACL set ?

raph@arche:~$ getfacl -R /var/log/journal/
getfacl : suppression du premier « / » des noms de chemins absolus
# file: var/log/journal/
# owner: root
# group: systemd-journal
# flags: -s-
user::rwx
group::r-x
other::r-x

# file: var/log/journal//3deacfa10d0c169adfdeb36c50522bd6
# owner: root
# group: systemd-journal
# flags: -s-
user::rwx
group::r-x
group:adm:r-x
mask::r-x
other::r-x
default:user::rwx
default:group::r-x
default:group:adm:r-x
default:mask::r-x
default:other::r-x

# file: var/log/journal//3deacfa10d0c169adfdeb36c50522bd6/user-1000.journal
# owner: root
# group: root
user::rw-
user:raph:r--
group::r--
mask::r--
other::---

# file: var/log/journal//3deacfa10d0c169adfdeb36c50522bd6/system.journal
# owner: root
# group: root
user::rw-
group::r--
other::---

I admit I don't know ACLs very well, but aren't the "default:..." lines
supposed to mean that the files under there should have these
permissions too ?

Regards,

-- 
Raphaël Halimi



signature.asc
Description: OpenPGP digital signature
___
Pkg-systemd-maintainers mailing list
Pkg-systemd-maintainers@lists.alioth.debian.org
http://lists.alioth.debian.org/cgi-bin/mailman/listinfo/pkg-systemd-maintainers

Bug#800947: ACL for /var/log/journal not set for group adm

2015-10-05 Thread Michael Biebl
Am 05.10.2015 um 13:08 schrieb Raphaël Halimi:
> Le 05/10/2015 12:30, Michael Biebl a écrit :
>> But the subdirectories of /var/log/journal have the correct ACL set, right?
> 
> Yes, you're right, I just noticed it; but using journalctl as a user
> won't display system messages (only user messages), which is not the
> expected behavior of adding a user in the "adm" group (pre-systemd).
> 
> Maybe it's because the system.journal file doesn't have the ACL set ?
> 
> raph@arche:~$ getfacl -R /var/log/journal/
> getfacl : suppression du premier « / » des noms de chemins absolus
> # file: var/log/journal/
> # owner: root
> # group: systemd-journal
> # flags: -s-
> user::rwx
> group::r-x
> other::r-x
> 
> # file: var/log/journal//3deacfa10d0c169adfdeb36c50522bd6
> # owner: root
> # group: systemd-journal
> # flags: -s-
> user::rwx
> group::r-x
> group:adm:r-x
> mask::r-x
> other::r-x
> default:user::rwx
> default:group::r-x
> default:group:adm:r-x
> default:mask::r-x
> default:other::r-x
> 
> # file: var/log/journal//3deacfa10d0c169adfdeb36c50522bd6/user-1000.journal
> # owner: root
> # group: root
> user::rw-
> user:raph:r--
> group::r--
> mask::r--
> other::---
> 
> # file: var/log/journal//3deacfa10d0c169adfdeb36c50522bd6/system.journal
> # owner: root
> # group: root
> user::rw-
> group::r--
> other::---
> 
> I admit I don't know ACLs very well, but aren't the "default:..." lines
> supposed to mean that the files under there should have these
> permissions too ?

See
https://github.com/systemd/systemd/commit/8b258a645ae63dff3ab8dde6520d2e770e2a40f1

Apparently this was an intended change.


-- 
Why is it that all of the instruments seeking intelligent life in the
universe are pointed away from Earth?



signature.asc
Description: OpenPGP digital signature
___
Pkg-systemd-maintainers mailing list
Pkg-systemd-maintainers@lists.alioth.debian.org
http://lists.alioth.debian.org/cgi-bin/mailman/listinfo/pkg-systemd-maintainers

Bug#800947: ACL for /var/log/journal not set for group adm

2015-10-05 Thread Michael Biebl
Am 05.10.2015 um 13:12 schrieb Michael Biebl:
> Am 05.10.2015 um 13:08 schrieb Raphaël Halimi:
>> Le 05/10/2015 12:30, Michael Biebl a écrit :
>>> But the subdirectories of /var/log/journal have the correct ACL set, right?
>>
>> Yes, you're right, I just noticed it; but using journalctl as a user
>> won't display system messages (only user messages), which is not the
>> expected behavior of adding a user in the "adm" group (pre-systemd).
>>
>> Maybe it's because the system.journal file doesn't have the ACL set ?
>>
>> raph@arche:~$ getfacl -R /var/log/journal/
>> getfacl : suppression du premier « / » des noms de chemins absolus
>> # file: var/log/journal/
>> # owner: root
>> # group: systemd-journal
>> # flags: -s-
>> user::rwx
>> group::r-x
>> other::r-x
>>
>> # file: var/log/journal//3deacfa10d0c169adfdeb36c50522bd6
>> # owner: root
>> # group: systemd-journal
>> # flags: -s-
>> user::rwx
>> group::r-x
>> group:adm:r-x
>> mask::r-x
>> other::r-x
>> default:user::rwx
>> default:group::r-x
>> default:group:adm:r-x
>> default:mask::r-x
>> default:other::r-x
>>
>> # file: var/log/journal//3deacfa10d0c169adfdeb36c50522bd6/user-1000.journal
>> # owner: root
>> # group: root
>> user::rw-
>> user:raph:r--
>> group::r--
>> mask::r--
>> other::---
>>
>> # file: var/log/journal//3deacfa10d0c169adfdeb36c50522bd6/system.journal
>> # owner: root
>> # group: root
>> user::rw-
>> group::r--
>> other::---
>>
>> I admit I don't know ACLs very well, but aren't the "default:..." lines
>> supposed to mean that the files under there should have these
>> permissions too ?
> 
> See
> https://github.com/systemd/systemd/commit/8b258a645ae63dff3ab8dde6520d2e770e2a40f1
> 
> Apparently this was an intended change.

Apparently the files were created before the ACLs have been set for
/var/log/journal/3deacfa10d0c169adfdeb36c50522bd6
so the journal files that were created did not inherit the correct ACLs
from the parent directory.

Possibly you created /var/log/journal or set Storage=persistent, but did
*not* reboot the system afterwards, which would trigger systemd-tmpfiles
to be run. And once you restart systemd-journald (which can happen by
systemd update), the journal files were created without the ACLs set.

On next reboot, the systemd.conf tmpfile did apply the ACL for the
directory, but it was too late at that point.

I wonder if we should fix the documentation to tell people to run
systemd-tmpfiles /usr/lib/tmpfiles/systemd.conf immediately after
enabling persistent journal.



-- 
Why is it that all of the instruments seeking intelligent life in the
universe are pointed away from Earth?



signature.asc
Description: OpenPGP digital signature
___
Pkg-systemd-maintainers mailing list
Pkg-systemd-maintainers@lists.alioth.debian.org
http://lists.alioth.debian.org/cgi-bin/mailman/listinfo/pkg-systemd-maintainers

Bug#800947: ACL for /var/log/journal not set for group adm

2015-10-05 Thread Michael Biebl
Am 05.10.2015 um 13:21 schrieb Michael Biebl:
> I wonder if we should fix the documentation to tell people to run
> systemd-tmpfiles /usr/lib/tmpfiles/systemd.conf immediately after
> enabling persistent journal.

We might also consider re-adding
https://anonscm.debian.org/cgit/pkg-systemd/systemd.git/commit/debian/systemd.postinst?id=03497b4ae5418470d64f2706af795122afe9645b

but maybe in a slightly modified way. Instead of running setfacl, we
could use
systemd-tmpfiles /usr/lib/tmpfiles.d/systemd.conf
to avoid re-adding a dependency on the "acl" package.

We could poke Lennart what he recommends.


-- 
Why is it that all of the instruments seeking intelligent life in the
universe are pointed away from Earth?



signature.asc
Description: OpenPGP digital signature
___
Pkg-systemd-maintainers mailing list
Pkg-systemd-maintainers@lists.alioth.debian.org
http://lists.alioth.debian.org/cgi-bin/mailman/listinfo/pkg-systemd-maintainers

Bug#800947: ACL for /var/log/journal not set for group adm

2015-10-05 Thread Raphaël Halimi
Le 05/10/2015 13:21, Michael Biebl a écrit :
> Apparently the files were created before the ACLs have been set for
> /var/log/journal/3deacfa10d0c169adfdeb36c50522bd6
> so the journal files that were created did not inherit the correct ACLs
> from the parent directory.
> 
> Possibly you created /var/log/journal or set Storage=persistent, but did
> *not* reboot the system afterwards, which would trigger systemd-tmpfiles
> to be run. And once you restart systemd-journald (which can happen by
> systemd update), the journal files were created without the ACLs set.
> 
> On next reboot, the systemd.conf tmpfile did apply the ACL for the
> directory, but it was too late at that point.

No, I rebooted immediately after creating the directory.

Regards,

-- 
Raphaël Halimi



signature.asc
Description: OpenPGP digital signature
___
Pkg-systemd-maintainers mailing list
Pkg-systemd-maintainers@lists.alioth.debian.org
http://lists.alioth.debian.org/cgi-bin/mailman/listinfo/pkg-systemd-maintainers

Bug#761909: systemd does not unmount nfs shares before bringing down the network interface

2015-10-05 Thread Giuseppe Bilotta
Hello

On Mon, Oct 5, 2015 at 11:15 AM, Martin Pitt  wrote:
>> However, when the network is brought down (manually, or automatically
>> during system shutdown), the mountpoint is not unmounted, causing a
>> number of issues.
>
> This sounds very similar to https://launchpad.net/bugs/1492546 .
> ifupdown's /etc/init.d/networking (and also /etc/init/networking.conf)
> call functions check_network_file_systems() and check_network_swap()
> and don't tear down the interface(s) in the above situation. This also
> applies to e. g. iscsi.
>
> But we don't do the same with the autogenerated ifup@.service -- that
> always unconditionally calls "ifdown" on stopping. IMHO we should make
> "systemctl stop ifup@ethX.service" a no-op at least during shutdown,
> as stopping /etc/init.d/networking will stop them all anyway (or not,
> if network file systems are being used).

Shouldn't a dependcy of network filesystems on network interfaces
automatically prevet the network interfaces services from being
stoppable while the network filesystems are up?

-- 
Giuseppe "Oblomov" Bilotta

___
Pkg-systemd-maintainers mailing list
Pkg-systemd-maintainers@lists.alioth.debian.org
http://lists.alioth.debian.org/cgi-bin/mailman/listinfo/pkg-systemd-maintainers


Bug#800965: systemd networkd profiles--wishlist

2015-10-05 Thread alex bachmer
Package: systemd
Version: 215

Debian GNU/Linux "JESSIE"

Hi

Is it possible, that a user can create custom network profiles in
networkd? Like archuser do with netctl?
Or any planned alternate in systemd?


Greets

alex



signature.asc
Description: OpenPGP digital signature
___
Pkg-systemd-maintainers mailing list
Pkg-systemd-maintainers@lists.alioth.debian.org
http://lists.alioth.debian.org/cgi-bin/mailman/listinfo/pkg-systemd-maintainers

Changing networkd's IPForward= default from "no" to "kernel"?

2015-10-05 Thread Martin Pitt
Hello all,

CC'ing Josh as he works with netword a lot and was rather interested
in its integration into Debian.

upstream networkd (and in Debian up to now) defaults to IPForward=no
(see man systemd.network), i. e. if you configure a network interface
through networkd without explicitly setting IPForward=, the
per-interface setting (/proc/sys/net/ipv{4,6}/conf/iface/forwarding)
will be disabled.

This has the effect that all packages which do something like "echo 1
> /proc/sys/net/ipv4/ip_forward" in their init scripts, postinst, etc.
(and we have a lot: [1]) stop working, as the per-interface setting
naturally overrides the global config.

This is a rather major issue at least for Ubuntu users with LXC, so
for now I applied a patch in Ubuntu [2] to change the default to
"kernel".  The kernel's default is also to disable forwarding, but
with that packages or the admin retain the option to enable/disable
forwarding globally. I must say I don't like patching networkd, but
after discussing other possible alternatives [3] I don't see a better
way.

Is this something which we also want in Debian? My gut feeling says
"yes", but that hasn't always been correct lately :-) The alternative
is to document it something like

  If you install a package that tries to enable IP forwarding, please
  add "IPForward=yes" to the .network file that covers your default
  route (if you aren't sure, add it to all of them). Conversely, if
  you remove such a package, remove the IPForward setting again, or
  change it to "no".

Aside from the fact that almost no user will actually look in
/usr/share/doc/systemd/README.Debian when this happens, this is
utterly complicated and not something which you could ever "sell"
something as a solution. I experimented with something like
/run/systemd/network/{00,zz}_enable_forwarding.network, but *.network
files aren't additive in that way, you can only ever have one that
applies to a particular interface. And changing all *.network files
programmatically from various init scripts is of course a big no-go.

So there doesn't seem to be a better way to do this right now. Ideas
muchly appreciated of course!

Opinions?

Thanks,

Martin

[1] http://codesearch.debian.net/perpackage-results/proc.*net.*ip_forward
[2] 
http://anonscm.debian.org/cgit/pkg-systemd/systemd.git/commit/?h=ubuntu&id=2c83d8ed8e50c
[3] https://github.com/systemd/systemd/issues/1411
-- 
Martin Pitt| http://www.piware.de
Ubuntu Developer (www.ubuntu.com)  | Debian Developer  (www.debian.org)


signature.asc
Description: Digital signature
___
Pkg-systemd-maintainers mailing list
Pkg-systemd-maintainers@lists.alioth.debian.org
http://lists.alioth.debian.org/cgi-bin/mailman/listinfo/pkg-systemd-maintainers

Re: Changing networkd's IPForward= default from "no" to "kernel"?

2015-10-05 Thread Martin Pitt
Martin Pitt [2015-10-05 15:53 +0200]:
> I experimented with something like
> /run/systemd/network/{00,zz}_enable_forwarding.network, but
> *.network files aren't additive in that way, you can only ever have
> one that applies to a particular interface. And changing all
> *.network files programmatically from various init scripts is of
> course a big no-go.

Forgot: At some point networkd is supposed to get a D-BUS control
interface which would allow configuring devices at runtime. Once we
have that, these properties can hopefully be changed easily at
runtime, and that patch can go. But this doesn't exist yet, so we need
to change the builtin default for the time being.

Martin

-- 
Martin Pitt| http://www.piware.de
Ubuntu Developer (www.ubuntu.com)  | Debian Developer  (www.debian.org)


signature.asc
Description: Digital signature
___
Pkg-systemd-maintainers mailing list
Pkg-systemd-maintainers@lists.alioth.debian.org
http://lists.alioth.debian.org/cgi-bin/mailman/listinfo/pkg-systemd-maintainers

Bug#800947: ACL for /var/log/journal not set for group adm

2015-10-05 Thread Michael Biebl
Am 05.10.2015 um 13:57 schrieb Raphaël Halimi:
> Le 05/10/2015 13:21, Michael Biebl a écrit :
>> Apparently the files were created before the ACLs have been set for
>> /var/log/journal/3deacfa10d0c169adfdeb36c50522bd6
>> so the journal files that were created did not inherit the correct ACLs
>> from the parent directory.
>>
>> Possibly you created /var/log/journal or set Storage=persistent, but did
>> *not* reboot the system afterwards, which would trigger systemd-tmpfiles
>> to be run. And once you restart systemd-journald (which can happen by
>> systemd update), the journal files were created without the ACLs set.
>>
>> On next reboot, the systemd.conf tmpfile did apply the ACL for the
>> directory, but it was too late at that point.
> 
> No, I rebooted immediately after creating the directory.

Hm, right. There might be a race condition during boot, where
systemd-journald-flush.service is started before systemd-tmpfiles.service.
We could order systemd-journald-flush.service *after*
systemd-tmpfiles.service.

But, when using Storage=persistent, journald will create the directory
/var/log/journal/ itself. So this won't help in that case, unless
systemd-journald re-added the code to apply ACLs itself.


This change sucks from a user experience POV, as you basically now need
to make sure to apply the correct ACL yourself. I think the supplied ACL
rule in /usr/lib/tmpfiles.d/systemd.conf is pretty much useless.

Martin, any ideas?

Michael


-- 
Why is it that all of the instruments seeking intelligent life in the
universe are pointed away from Earth?



signature.asc
Description: OpenPGP digital signature
___
Pkg-systemd-maintainers mailing list
Pkg-systemd-maintainers@lists.alioth.debian.org
http://lists.alioth.debian.org/cgi-bin/mailman/listinfo/pkg-systemd-maintainers

Bug#800965: marked as done (systemd networkd profiles--wishlist)

2015-10-05 Thread Debian Bug Tracking System
Your message dated Mon, 5 Oct 2015 17:24:52 +0200
with message-id <56129644.5010...@debian.org>
and subject line Re: Bug#800965: systemd networkd profiles--wishlist
has caused the Debian Bug report #800965,
regarding systemd networkd profiles--wishlist
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
800965: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=800965
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Package: systemd
Version: 215

Debian GNU/Linux "JESSIE"

Hi

Is it possible, that a user can create custom network profiles in
networkd? Like archuser do with netctl?
Or any planned alternate in systemd?


Greets

alex



signature.asc
Description: OpenPGP digital signature
--- End Message ---
--- Begin Message ---
Hi

Am 05.10.2015 um 14:49 schrieb alex bachmer:
> Package: systemd
> Version: 215
> 
> Debian GNU/Linux "JESSIE"
> 
> Hi
> 
> Is it possible, that a user can create custom network profiles in
> networkd? Like archuser do with netctl?
> Or any planned alternate in systemd?

The bug tracker is not a user support forum. Please use the Debian User
mailing list for that.

If you have feature requests, please raise them upstream at
https://github.com/systemd/systemd/issues.

Regards,
Michael

-- 
Why is it that all of the instruments seeking intelligent life in the
universe are pointed away from Earth?



signature.asc
Description: OpenPGP digital signature
--- End Message ---
___
Pkg-systemd-maintainers mailing list
Pkg-systemd-maintainers@lists.alioth.debian.org
http://lists.alioth.debian.org/cgi-bin/mailman/listinfo/pkg-systemd-maintainers

Bug#800947: ACL for /var/log/journal not set for group adm

2015-10-05 Thread Michael Biebl
Am 05.10.2015 um 17:35 schrieb Felipe Sateler:
> On 5 October 2015 at 12:20, Michael Biebl  wrote:
>> But, when using Storage=persistent, journald will create the directory
>> /var/log/journal/ itself. So this won't help in that case, unless
>> systemd-journald re-added the code to apply ACLs itself.
> 
> That would be a bug in (upstream) systemd, I think. Journald appears
> to set the ACL on new files but not on the /v/l/j directory.

Are you sure? I thought systemd-journald removed that code and relies on
the file system to set them.

-- 
Why is it that all of the instruments seeking intelligent life in the
universe are pointed away from Earth?



signature.asc
Description: OpenPGP digital signature
___
Pkg-systemd-maintainers mailing list
Pkg-systemd-maintainers@lists.alioth.debian.org
http://lists.alioth.debian.org/cgi-bin/mailman/listinfo/pkg-systemd-maintainers

Bug#800947: ACL for /var/log/journal not set for group adm

2015-10-05 Thread Felipe Sateler
On 5 October 2015 at 12:20, Michael Biebl  wrote:
> Am 05.10.2015 um 13:57 schrieb Raphaël Halimi:
>> Le 05/10/2015 13:21, Michael Biebl a écrit :
>>> Apparently the files were created before the ACLs have been set for
>>> /var/log/journal/3deacfa10d0c169adfdeb36c50522bd6
>>> so the journal files that were created did not inherit the correct ACLs
>>> from the parent directory.
>>>
>>> Possibly you created /var/log/journal or set Storage=persistent, but did
>>> *not* reboot the system afterwards, which would trigger systemd-tmpfiles
>>> to be run. And once you restart systemd-journald (which can happen by
>>> systemd update), the journal files were created without the ACLs set.
>>>
>>> On next reboot, the systemd.conf tmpfile did apply the ACL for the
>>> directory, but it was too late at that point.
>>
>> No, I rebooted immediately after creating the directory.
>
> Hm, right. There might be a race condition during boot, where
> systemd-journald-flush.service is started before systemd-tmpfiles.service.
> We could order systemd-journald-flush.service *after*
> systemd-tmpfiles.service.
>
> But, when using Storage=persistent, journald will create the directory
> /var/log/journal/ itself. So this won't help in that case, unless
> systemd-journald re-added the code to apply ACLs itself.

That would be a bug in (upstream) systemd, I think. Journald appears
to set the ACL on new files but not on the /v/l/j directory.

>
> This change sucks from a user experience POV, as you basically now need
> to make sure to apply the correct ACL yourself. I think the supplied ACL
> rule in /usr/lib/tmpfiles.d/systemd.conf is pretty much useless.
>
> Martin, any ideas?

I think a reasonable alternative is to ship using Storage=volatile by
default, and ship the directory in the package (or create it in
postinst).



-- 

Saludos,
Felipe Sateler

___
Pkg-systemd-maintainers mailing list
Pkg-systemd-maintainers@lists.alioth.debian.org
http://lists.alioth.debian.org/cgi-bin/mailman/listinfo/pkg-systemd-maintainers

Bug#800947: ACL for /var/log/journal not set for group adm

2015-10-05 Thread Michael Biebl
Am 05.10.2015 um 17:20 schrieb Michael Biebl:
> Hm, right. There might be a race condition during boot, where
> systemd-journald-flush.service is started before systemd-tmpfiles.service.
> We could order systemd-journald-flush.service *after*
> systemd-tmpfiles.service.

Fwiw, this directly conflicts with what is used upstream in
https://github.com/systemd/systemd/blob/master/units/systemd-journal-flush.service.in#L15


[Unit]
Description=Flush Journal to Persistent Storage
...
Before=systemd-user-sessions.service systemd-tmpfiles-setup.service






-- 
Why is it that all of the instruments seeking intelligent life in the
universe are pointed away from Earth?



signature.asc
Description: OpenPGP digital signature
___
Pkg-systemd-maintainers mailing list
Pkg-systemd-maintainers@lists.alioth.debian.org
http://lists.alioth.debian.org/cgi-bin/mailman/listinfo/pkg-systemd-maintainers

Bug#800947: ACL for /var/log/journal not set for group adm

2015-10-05 Thread Felipe Sateler
On 5 October 2015 at 12:37, Michael Biebl  wrote:
> Am 05.10.2015 um 17:35 schrieb Felipe Sateler:
>> On 5 October 2015 at 12:20, Michael Biebl  wrote:
>>> But, when using Storage=persistent, journald will create the directory
>>> /var/log/journal/ itself. So this won't help in that case, unless
>>> systemd-journald re-added the code to apply ACLs itself.
>>
>> That would be a bug in (upstream) systemd, I think. Journald appears
>> to set the ACL on new files but not on the /v/l/j directory.
>
> Are you sure? I thought systemd-journald removed that code and relies on
> the file system to set them.

It appears you are correct. I missed the `if (uid <= SYSTEM_UID_MAX)`
check, which makes sure journald will only set acl for regular users
(and thus, not the adm user), so the adm acl must be ensured by the
filesystem.


-- 

Saludos,
Felipe Sateler

___
Pkg-systemd-maintainers mailing list
Pkg-systemd-maintainers@lists.alioth.debian.org
http://lists.alioth.debian.org/cgi-bin/mailman/listinfo/pkg-systemd-maintainers


[bts-link] source package systemd

2015-10-05 Thread bts-link-upstream
#
# bts-link upstream status pull for source package systemd
# see http://lists.debian.org/debian-devel-announce/2006/05/msg1.html
#

user bts-link-upstr...@lists.alioth.debian.org

# remote status report for #776460 (http://bugs.debian.org/776460)
# Bug title: systemd-journald crashed with SIGABRT -- killed by 1 min watchdog 
timeout on longer kernel lockups
#  * https://github.com/systemd/systemd/issues/1353
#  * remote status changed: (?) -> closed
#  * closed upstream
tags 776460 + fixed-upstream
usertags 776460 + status-closed

thanks

___
Pkg-systemd-maintainers mailing list
Pkg-systemd-maintainers@lists.alioth.debian.org
http://lists.alioth.debian.org/cgi-bin/mailman/listinfo/pkg-systemd-maintainers


Processed: [bts-link] source package systemd

2015-10-05 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

> #
> # bts-link upstream status pull for source package systemd
> # see http://lists.debian.org/debian-devel-announce/2006/05/msg1.html
> #
> user bts-link-upstr...@lists.alioth.debian.org
Setting user to bts-link-upstr...@lists.alioth.debian.org (was 
bts-link-de...@lists.alioth.debian.org).
> # remote status report for #776460 (http://bugs.debian.org/776460)
> # Bug title: systemd-journald crashed with SIGABRT -- killed by 1 min 
> watchdog timeout on longer kernel lockups
> #  * https://github.com/systemd/systemd/issues/1353
> #  * remote status changed: (?) -> closed
> #  * closed upstream
> tags 776460 + fixed-upstream
Bug #776460 [systemd] systemd-journald crashed with SIGABRT -- killed by 1 min 
watchdog timeout on longer kernel lockups
Added tag(s) fixed-upstream.
> usertags 776460 + status-closed
There were no usertags set.
Usertags are now: status-closed.
> thanks
Stopping processing here.

Please contact me if you need assistance.
-- 
776460: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=776460
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems

___
Pkg-systemd-maintainers mailing list
Pkg-systemd-maintainers@lists.alioth.debian.org
http://lists.alioth.debian.org/cgi-bin/mailman/listinfo/pkg-systemd-maintainers


Re: Changing networkd's IPForward= default from "no" to "kernel"?

2015-10-05 Thread Josh Triplett
On Mon, Oct 05, 2015 at 03:53:04PM +0200, Martin Pitt wrote:
> CC'ing Josh as he works with netword a lot and was rather interested
> in its integration into Debian.

Thanks, Martin.

> upstream networkd (and in Debian up to now) defaults to IPForward=no
> (see man systemd.network), i. e. if you configure a network interface
> through networkd without explicitly setting IPForward=, the
> per-interface setting (/proc/sys/net/ipv{4,6}/conf/iface/forwarding)
> will be disabled.
> 
> This has the effect that all packages which do something like "echo 1
> > /proc/sys/net/ipv4/ip_forward" in their init scripts, postinst, etc.
> (and we have a lot: [1]) stop working, as the per-interface setting
> naturally overrides the global config.
> 
> This is a rather major issue at least for Ubuntu users with LXC, so
> for now I applied a patch in Ubuntu [2] to change the default to
> "kernel".  The kernel's default is also to disable forwarding, but
> with that packages or the admin retain the option to enable/disable
> forwarding globally. I must say I don't like patching networkd, but
> after discussing other possible alternatives [3] I don't see a better
> way.
> 
> Is this something which we also want in Debian? My gut feeling says
> "yes", but that hasn't always been correct lately :-) The alternative
> is to document it something like
> 
>   If you install a package that tries to enable IP forwarding, please
>   add "IPForward=yes" to the .network file that covers your default
>   route (if you aren't sure, add it to all of them). Conversely, if
>   you remove such a package, remove the IPForward setting again, or
>   change it to "no".
> 
> Aside from the fact that almost no user will actually look in
> /usr/share/doc/systemd/README.Debian when this happens, this is
> utterly complicated and not something which you could ever "sell"
> something as a solution. I experimented with something like
> /run/systemd/network/{00,zz}_enable_forwarding.network, but *.network
> files aren't additive in that way, you can only ever have one that
> applies to a particular interface. And changing all *.network files
> programmatically from various init scripts is of course a big no-go.
> 
> So there doesn't seem to be a better way to do this right now. Ideas
> muchly appreciated of course!

As a temporary measure, while fixing the various packages doing so, this
doesn't seem too unreasonable.  (Note that many of the results of that
search are comments, rather than actual scripts; nevertheless enough
instances exist to make it necessary to cope with somehow.)

However, given the potential security implications, this needs some very
clear documentation, as well as some warnings.  For instance, how about
making networkd emit a warning when when the global flag is set to "yes"
but a .network file doesn't have an *explicit* IPForward setting (either
yes or no)?  That would help people very quickly notice why their
packets don't get forwarded, and point them directly at the setting they
need to change.  With that change, I wonder if we really need to change
the default.

I'd also be tempted to make the kernel emit a warning when setting the
global ip_forward rather than the per-interface flag, but that would
affect non-networkd users as well, and I suspect people would complain.

- Josh Triplett

___
Pkg-systemd-maintainers mailing list
Pkg-systemd-maintainers@lists.alioth.debian.org
http://lists.alioth.debian.org/cgi-bin/mailman/listinfo/pkg-systemd-maintainers