diff options
author | Daniel Baumann <daniel.baumann@progress-linux.org> | 2024-06-17 10:52:33 +0000 |
---|---|---|
committer | Daniel Baumann <daniel.baumann@progress-linux.org> | 2024-06-17 10:52:33 +0000 |
commit | 2c3307fb903f427be3d021c5780b75cac9af2ce8 (patch) | |
tree | 65cf431f40b7481d81ae2dfce9576342686448f7 /upstream/fedora-rawhide/man7/systemd.system-credentials.7 | |
parent | Releasing progress-linux version 4.22.0-1~progress7.99u1. (diff) | |
download | manpages-l10n-2c3307fb903f427be3d021c5780b75cac9af2ce8.tar.xz manpages-l10n-2c3307fb903f427be3d021c5780b75cac9af2ce8.zip |
Merging upstream version 4.23.0.
Signed-off-by: Daniel Baumann <daniel.baumann@progress-linux.org>
Diffstat (limited to 'upstream/fedora-rawhide/man7/systemd.system-credentials.7')
-rw-r--r-- | upstream/fedora-rawhide/man7/systemd.system-credentials.7 | 125 |
1 files changed, 121 insertions, 4 deletions
diff --git a/upstream/fedora-rawhide/man7/systemd.system-credentials.7 b/upstream/fedora-rawhide/man7/systemd.system-credentials.7 index 5ace9a31..b953256b 100644 --- a/upstream/fedora-rawhide/man7/systemd.system-credentials.7 +++ b/upstream/fedora-rawhide/man7/systemd.system-credentials.7 @@ -1,5 +1,5 @@ '\" t -.TH "SYSTEMD\&.SYSTEM\-CREDENTIALS" "7" "" "systemd 255" "systemd.system-credentials" +.TH "SYSTEMD\&.SYSTEM\-CREDENTIALS" "7" "" "systemd 256~rc3" "systemd.system-credentials" .\" ----------------------------------------------------------------- .\" * Define some portability stuff .\" ----------------------------------------------------------------- @@ -118,6 +118,38 @@ DNS server information and search domains\&. Read by Added in version 253\&. .RE .PP +\fInetwork\&.conf\&.*\fR, \fInetwork\&.link\&.*\fR, \fInetwork\&.netdev\&.*\fR, \fInetwork\&.network\&.*\fR +.RS 4 +Configures network devices\&. Read by +\fBsystemd-network-generator.service\fR(8)\&. These credentials should contain valid +\fBnetworkd.conf\fR(5), +\fBsystemd.link\fR(5), +\fBsystemd.netdev\fR(5), +\fBsystemd.network\fR(5) +configuration data\&. From each matching credential a separate file is created\&. Example: the contents of a credential +network\&.link\&.50\-foobar +will be copied into a file +50\-foobar\&.link\&. +.sp +Note that the resulting files are created world\-readable, it\*(Aqs hence recommended to not include secrets in these credentials, but supply them via separate credentials directly to +systemd\-networkd\&.service, e\&.g\&. +\fInetwork\&.wireguard\&.*\fR +as described below\&. +.sp +Added in version 256\&. +.RE +.PP +\fInetwork\&.wireguard\&.*\fR +.RS 4 +Configures secrets for WireGuard netdevs\&. Read by +\fBsystemd-networkd.service\fR(8)\&. For more information, refer to the +\fB[WireGuard]\fR +section of +\fBsystemd.netdev\fR(5)\&. +.sp +Added in version 256\&. +.RE +.PP \fIpasswd\&.hashed\-password\&.root\fR, \fIpasswd\&.plaintext\-password\&.root\fR .RS 4 May contain the password (either in UNIX hashed format, or in plaintext) for the root users\&. Read by both @@ -151,6 +183,15 @@ Consumed by Added in version 252\&. .RE .PP +\fIssh\&.listen\fR +.RS 4 +May be used to configure SSH sockets the system shall be reachable on\&. See +\fBsystemd-ssh-generator\fR(8) +for details\&. +.sp +Added in version 256\&. +.RE +.PP \fIsysusers\&.extra\fR .RS 4 Additional @@ -204,6 +245,28 @@ for details\&. Added in version 254\&. .RE .PP +\fIjournal\&.forward_to_socket\fR +.RS 4 +Used by +\fBsystemd-journald\fR(8) +to determine where to forward log messages for socket forwarding, see +\fBjournald.conf\fR(5) +for details\&. +.sp +Added in version 256\&. +.RE +.PP +\fIjournal\&.storage\fR +.RS 4 +Used by +\fBsystemd-journald\fR(8) +to determine where to store journal files, see +\fBjournald.conf\fR(5) +for details\&. +.sp +Added in version 256\&. +.RE +.PP \fIvmm\&.notify_socket\fR .RS 4 Configures an @@ -223,11 +286,65 @@ Takes a 128bit ID to initialize the machine ID from (if it is not set yet)\&. In .sp Added in version 254\&. .RE +.PP +\fIsystem\&.hostname\fR +.RS 4 +Accepts a (transient) hostname to configure during early boot\&. The static hostname specified in +/etc/hostname, if configured, takes precedence over this setting\&. Interpreted by the service manager (PID 1)\&. For details see +\fBsystemd\fR(1)\&. +.sp +Added in version 254\&. +.RE +.PP +\fIhome\&.create\&.*\fR +.RS 4 +Creates a home area for the specified user with the user record data passed in\&. For details see +\fBhomectl\fR(1)\&. +.sp +Added in version 256\&. +.RE +.PP +\fIcryptsetup\&.passphrase\fR, \fIcryptsetup\&.tpm2\-pin\fR, \fIcryptsetup\&.fido2\-pin\fR, \fIcryptsetup\&.pkcs11\-pin\fR, \fIcryptsetup\&.luks2\-pin\fR +.RS 4 +Specifies the passphrase/PINs to use for unlock encrypted storage volumes\&. For details see +\fBsystemd-cryptsetup\fR(8)\&. +.sp +Added in version 256\&. +.RE +.PP +\fIsystemd\&.extra\-unit\&.*\fR, \fIsystemd\&.unit\-dropin\&.*\fR +.RS 4 +These credentials specify extra units and drop\-ins to add to the system\&. For details see +\fBsystemd-debug-generator\fR(8)\&. +.sp +Added in version 256\&. +.RE +.PP +\fIudev\&.conf\&.*\fR, \fIudev\&.rules\&.*\fR +.RS 4 +Configures udev configuration file and udev rules\&. Read by +systemd\-udev\-load\-credentials\&.service, which invokes +\fBudevadm control \-\-load\-credentials\fR\&. These credentials directly translate to a matching +\fBudev.conf\fR(5) +or +\fBudev\fR(7) +rules file\&. Example: the contents of a credential +udev\&.conf\&.50\-foobar +will be copied into a file +/run/udev/udev\&.conf\&.d/50\-foobar\&.conf, and +udev\&.rules\&.50\-foobar +will be copied into a file +/run/udev/rules\&.d/50\-foobar\&.rules\&. See +\fBudev\fR(7), +\fBudev.conf\fR(5), and +\fBudevadm\fR(8) +for details\&. +.sp +Added in version 256\&. +.RE .SH "SEE ALSO" .PP -\fBsystemd\fR(1), -\fBkernel-command-line\fR(7), -\fBsmbios-type-11\fR(7) +\fBsystemd\fR(1), \fBkernel-command-line\fR(7), \fBsmbios-type-11\fR(7) .SH "NOTES" .IP " 1." 4 System and Service Credentials |