summaryrefslogtreecommitdiff
path: root/src/core/load-fragment.h
diff options
context:
space:
mode:
authorZbigniew Jędrzejewski-Szmek <zbyszek@in.waw.pl>2019-08-01 09:58:27 +0200
committerZbigniew Jędrzejewski-Szmek <zbyszek@in.waw.pl>2019-08-19 21:19:13 +0200
commitae480f0b09aec815b64579bb1828ea935d8ee236 (patch)
tree11e606315ae45e8a9d6718f23a8c10f5048f117a /src/core/load-fragment.h
parent1a29610f5fa1bcb2eeb37d2c6b79d8d1a6dbb865 (diff)
downloadsystemd-ae480f0b09aec815b64579bb1828ea935d8ee236.tar.gz
shared/user-util: allow usernames with dots in specific fields
People do have usernames with dots, and it makes them very unhappy that systemd doesn't like their that. It seems that there is no actual problem with allowing dots in the username. In particular chown declares ":" as the official separator, and internally in systemd we never rely on "." as the seperator between user and group (nor do we call chown directly). Using dots in the name is probably not a very good idea, but we don't need to care. Debian tools (adduser) do not allow users with dots to be created. This patch allows *existing* names with dots to be used in User, Group, SupplementaryGroups, SocketUser, SocketGroup fields, both in unit files and on the command line. DynamicUsers and sysusers still follow the strict policy. user@.service and tmpfiles already allowed arbitrary user names, and this remains unchanged. Fixes #12754.
Diffstat (limited to 'src/core/load-fragment.h')
-rw-r--r--src/core/load-fragment.h4
1 files changed, 2 insertions, 2 deletions
diff --git a/src/core/load-fragment.h b/src/core/load-fragment.h
index 326e80893b..664643f08e 100644
--- a/src/core/load-fragment.h
+++ b/src/core/load-fragment.h
@@ -99,8 +99,8 @@ CONFIG_PARSER_PROTOTYPE(config_parse_exec_utmp_mode);
CONFIG_PARSER_PROTOTYPE(config_parse_working_directory);
CONFIG_PARSER_PROTOTYPE(config_parse_fdname);
CONFIG_PARSER_PROTOTYPE(config_parse_sec_fix_0);
-CONFIG_PARSER_PROTOTYPE(config_parse_user_group);
-CONFIG_PARSER_PROTOTYPE(config_parse_user_group_strv);
+CONFIG_PARSER_PROTOTYPE(config_parse_user_group_compat);
+CONFIG_PARSER_PROTOTYPE(config_parse_user_group_strv_compat);
CONFIG_PARSER_PROTOTYPE(config_parse_restrict_namespaces);
CONFIG_PARSER_PROTOTYPE(config_parse_bind_paths);
CONFIG_PARSER_PROTOTYPE(config_parse_exec_keyring_mode);