Commit graph

19000 commits

Author SHA1 Message Date
Thomas Haller
2aaecebdcc core: clear autoconnect-blocked-reason USER_REQUEST when activating connection
(cherry picked from commit 98ff1e291c)
2017-12-06 09:32:26 +01:00
Thomas Haller
4dd2208fa2 libnm: add nm_remote_connection_update2()
- only add an async version. I think sync requests are fundamentally flawed
  because they mess up the order of D-Bus messages. Hence, also don't
  call the function *_async(), like we do for other functions. As there
  is only the async form, it doesn't have a suffix.

- Don't accept a NMConnection as @settings argument, but a GVariant.
  In general, keep the libnm API closer to the D-Bus API and don't hide
  the underlying function with a less powerful form. The user still can
  conveniently call the function with

    nm_remote_connection_update2 (connection,
                                  nm_connection_to_dbus (NM_CONNECTION (connection),
                                                         NM_CONNECTION_SERIALIZE_ALL),
                                  save_to_disk
                                    ? NM_SETTINGS_UPDATE2_FLAG_TO_DISK
                                    : NM_SETTINGS_UPDATE2_FLAG_IN_MEMORY,
                                  NULL,
                                  cancellable,
                                  callback,
                                  user_data);

  I believe the parts of libnm that invoke D-Bus methods, should be
  close to the D-Bus API. Not like nm_remote_connection_commit_changes()
  which has no corresponding D-Bus method.

(cherry picked from commit d00eb95c55)
2017-12-06 09:32:26 +01:00
Thomas Haller
4d7a0642f3 all: add new D-Bus API org.freedesktop.NetworkManager.Settings.Connection.Update2()
We already have Update(), UpdateUnsaved() and Save(), which serve
similar purposes. We will need a form of update with another argument.

Most notably, to block autoconnect while doing the update.

Other use cases could be to prevent reapplying connection.zone and
connection.metered, to to reapply all changes.

Instead of adding a specific update function that only serves that
new use-case, add a extensible Update2() function. It can be extended
to cope with future variants of update.

(cherry picked from commit 98ee18d888)
2017-12-06 09:32:26 +01:00
Thomas Haller
82ab0fb9ac checkpoint: don't bypass settings-connection commit code on rollback
commit involves more then just replacing the setting and writing them
out. What? Dunno. It's complex.

But let's not bypass the commit-changes function. That one is supposed
to get it right.

(cherry picked from commit d26c749ea6)
2017-12-06 09:32:26 +01:00
Thomas Haller
ed3e783e3e settings/trivial: rename update function in nm-settings-connection.c
(cherry picked from commit f73e78770e)
2017-12-06 09:32:26 +01:00
Thomas Haller
5dc83f954b settings: merge _replace_settings_full() into _commit_changes_full()
It's complicated what happens during a commit/replace/update (whatever
you call it).

It doesn't get simpler by spreading it out to various functions.
Let's have one large function (_commit_changes_full()) which does
all the steps necessary. There should be no alternative ways
how to update a connection.

(cherry picked from commit ad9deb6968)
2017-12-06 09:32:26 +01:00
Thomas Haller
500e80272d settings: always call _commit_changes_full() instead of _replace_settings_full()
All callers of _replace_settings_full() now use _commit_changes_full().
commit-changes should contain all the logic what to do when updating
a connection. Now, the connection might optionally be written to disk.

(cherry picked from commit 7a0900be7c)
2017-12-06 09:32:26 +01:00
Thomas Haller
75a520af69 settings: in _commit_changes_full() mark the connection as saved before emitting signals
_commit_changes_full() calls _replace_settings_full() which already emits signals
about the changed connection. We should mark the connectin as saved earlier.

In fact, we can tell _replace_settings_full() to mark it as not-unsaved
via the persist-mode parameter.

(cherry picked from commit 4fd5e6e1bb)
2017-12-06 09:32:26 +01:00
Thomas Haller
2bac3ea550 settings: call replace-settings also without new settings
_replace_settings_full() does more then just replace the settings.
It at least also sets some flags, like saved/unsaved depending
on @persist_mode.

_replace_settings_full() also emits the "updated" signal. Note that
previously it would just return without signal if nm_connection_compare()
indicates that there is no difference. But the caller probably cares
about whether the user tries to change the connection at all, not
whether the change actually introduced a real difference in the
settings. Like, policy might re-set the autoconnect blocked flags.
But it should do so on every user-update, regardless of whether
a change was actually made.

It makes sense to call _replace_settings_full() with a @new_connection
of %NULL, to mean: just update the flags, but keep the current connection.

Extend _replace_settings_full() to allow for that.

Also, update update_auth_cb() to always call _replace_settings_full(),
even if no new connection is provided. In this case, only update
the connection flags accordingly.

(cherry picked from commit 9988f9dbbb)
2017-12-06 09:32:26 +01:00
Thomas Haller
359e52651b settings: refactor update_auth_cb() and prepare connection once
Note how nm_settings_connection_commit_changes() would call
prepare() a second time. Don't do that.

Also, move the prepare step earlier, and call _replace_settings_full()
without preparing the new connection again.

(cherry picked from commit 3706fd17eb)
2017-12-06 09:32:26 +01:00
Thomas Haller
0d0b778c29 settings: split nm_settings_connection_commit_changes() to call it without preparing the new connection
Will be used next.

(cherry picked from commit 75f787d1da)
2017-12-06 09:32:26 +01:00
Thomas Haller
00182192f7 settings: add persistent-mode argument for connection-replace
The current behavior of update_unsaved is confusing. Give the argument
an enum with a name that describes better what's happening. Also, it
makes the uses grep-able.

(cherry picked from commit 9531da8b3e)
2017-12-06 09:32:26 +01:00
Thomas Haller
10ba7dca0b settings: log pretty names for settings-connection flags
(cherry picked from commit c3dd5d8df2)
2017-12-06 09:32:26 +01:00
Thomas Haller
2129c1451c version: add NM_AVAILABLE_IN_1_10_2 define 2017-12-06 09:32:26 +01:00
Beniamino Galvani
f5e34b4051 ifcfg-rh: merge branch 'bg/ifcfg-rh-wep-key-type-rh1518177'
https://bugzilla.redhat.com/show_bug.cgi?id=1518177
(cherry picked from commit 16f3946ee7)
2017-12-04 16:02:32 +01:00
Thomas Haller
860a4041ef ifcfg-rh: avoid unnecessary string copies in add_one_wep_key()
(cherry picked from commit c3d192b6a3)
2017-12-04 16:01:58 +01:00
Thomas Haller
d94c0e747b ifcfg-rh: use NM_IN_SET() macro in add_one_wep_key()
Evaluate strlen() only once.

(cherry picked from commit 5a857b3922)
2017-12-04 16:01:57 +01:00
Thomas Haller
74c2538bb3 ifcfg-rh: use NM_STRCHAR_ANY() macro in add_one_wep_key()
(cherry picked from commit da6394d572)
2017-12-04 16:01:56 +01:00
Beniamino Galvani
020dcf5bc1 ifcfg-rh: persist the wep key type
The wireless-security setting has a 'wep-key-type' property that is
used to specify the WEP key type and is needed because some keys could
be interpreted both as a passphrase or a hex/ascii key.

The ifcfg-rh plugin currently stores the key type implicitly: if
wep-key-type is 'passphrase' it uses the KEY_PASSPHRASE%d variable, if
it's 'key' the KEY%d variable and when it's 'unknown' it uses either
variables depending on the detected type (preferring 'key' in case
both are compatible).

This means that some connections will be read differently from how
they were written, because once the KEY (or KEY_PASSPHRASE) is read
there is no way to know whether the 'wep-key-type' property was 'key'
(or 'passphrase') or 'unknown'.

Fix this by persisting the key type explicitly in the file. The new
variable is redundant in most cases because the variables used for
keys also determine the key type.

https://bugzilla.redhat.com/show_bug.cgi?id=1518177
(cherry picked from commit c6eb18ee05)
2017-12-04 16:01:54 +01:00
Beniamino Galvani
e48b9300bd cli: don't print warnings when completing arguments
$ nmcli con add type wifi ifname wlan0 \
     wifi-sec.key-mgmt none \
     wifi-sec.wep-key0 $ascii_key \
     ssid <TAB>

 completes the line with:

  "Info:\ WEP\ key\ is\ guessed\ to\ be\ of\ '2\ \(passphrase\)'"

The environment warning function should not emit warning when
completing arguments.

(cherry picked from commit 5e239d2c04)
2017-12-01 14:29:45 +01:00
Beniamino Galvani
d2372f0a2e ifcfg-rh: merge branch 'bg/ifcfg-rh-dns-rh1517794'
https://bugzilla.redhat.com/show_bug.cgi?id=1517794
(cherry picked from commit 6f5f1b2d29)
2017-12-01 00:02:49 +01:00
Thomas Haller
e38e1ec659 ifcfg-rh: only open network file once when parsing connection
(cherry picked from commit 9b08f2c61d)
2017-12-01 00:02:34 +01:00
Beniamino Galvani
bd4754da05 ifcfg-rh: use different variables for IPv4 and IPv6 DNS options
Until now the ifcfg-rh plugin merged the values of 'ipv4.dns-options'
and 'ipv6.dns-options' and wrote the result to the RES_OPTIONS
variable. This is wrong because writing a connection and reading it
back gives a different connection compared to the original.

This behavior existed since when DNS options were introduced, but it
became more evident now that we reread the connection after write,
because after doing a:

 $ nmcli connection modify ethie ipv4.dns-options ndots:2

the connection has both ipv4.dns-options and ipv6.dns-options set. In
order to delete the option, an user has to delete it from both
settings:

 $ nmcli connection modify ethie ipv4.dns-options "" ipv6.dns-options ""

To improve this let's use different variables for IPv4 and IPv6. To
keep backwards compatibility IPv4 still uses RES_OPTIONS, while IPv6
uses a new IPV6_RES_OPTIONS variable.

https://bugzilla.redhat.com/show_bug.cgi?id=1517794
(cherry picked from commit 8379785560)
2017-12-01 00:02:32 +01:00
Beniamino Galvani
967d5d4059 clients: fix display value for dns-options
We must show the default value "(default)" when the list of
dns-options is initialized but empty.

(cherry picked from commit ca06f82371)
2017-12-01 00:02:30 +01:00
Beniamino Galvani
f3b08bf114 all: replace 'inital' with 'initial'
sed -i -e 's/inital/initial/g' $(git grep -l inital)

(cherry picked from commit d74e1bef36)
2017-12-01 00:02:29 +01:00
Beniamino Galvani
91a460c0b4 tui: fix creation of open Wi-Fi connections
Commit 6a4af482f0 ("nmtui: always create ethernet settings for VLAN
and wireless security for wifi.") changed nmtui to always add the
wireless security setting to the new connection, but without
initializing it. This leads to a crash that was fixed in 40fcf67a84
("tui: fix crash creating Wi-Fi connection").

There is an additional bug: connections without authentication can't
be saved because the wireless security setting has uninitialized
fields.

To fix this, revert both patches (the first partially) because the
previous code did the right thing as it added the setting only when
needed.

Fixes: 6a4af482f0

https://bugzilla.redhat.com/show_bug.cgi?id=1518167
(cherry picked from commit fead82f419)
2017-11-30 23:43:30 +01:00
Thomas Haller
2a884bb638 device: add "indicated" argument to nm_utils_match_connection()
The matching works fuzzy and is not reliable. That is why we store
which connection should be assumed after restart in the state file
of NetworkManager.

In that case, we don't need to do a full check (with the possibility
of a false-reject). Just check for the minimum required properties:
the type and slave-type.

Yes, if the user modifies the connection while restarting NM, then
we might wrongly assume a connection that no longer would match.
But NM should not read minds, it should do as indicated.

(cherry picked from commit cc74cffe12)
2017-11-30 14:48:45 +01:00
Thomas Haller
7a11dcfbd8 libnm: drop now unused helper function _nm_utils_strsplit_set()
(cherry picked from commit 15608713c4)
2017-11-29 19:15:30 +01:00
Thomas Haller
11eb191302 ifcfg-rh: replace usage of _nm_utils_strsplit_set() with nm_utils_strsplit_set()
(cherry picked from commit a81ad3474d)
2017-11-29 19:15:30 +01:00
Thomas Haller
a961a65cea ifcfg-rh: avoid copy of value for "HWADDR_BLACKLIST"
(cherry picked from commit d3520813e8)
2017-11-29 19:15:30 +01:00
Thomas Haller
7135097762 shared: fix nm_utils_strsplit_set() to increase buffer size exponentially
(cherry picked from commit de92e88161)
2017-11-29 19:15:30 +01:00
Beniamino Galvani
66a728e8ac cli: exit from main loop after 'quit' editor command
When we stop processing the editor command loop (after a 'quit'
command) we must quit the GLib main loop.

https://bugzilla.redhat.com/show_bug.cgi?id=1517401
(cherry picked from commit 21cfeff777)
2017-11-29 11:06:07 +01:00
Thomas Haller
213fdb10d0 core: avoid duplicate <info> logging message when sleeping/waking
<debug> [1511941494.1809] manager: Received resuming signal
  <info>  [1511941494.1809] manager: wake requested (sleeping: yes  enabled: yes)
  <info>  [1511941494.1809] manager: waking up...

(cherry picked from commit 199525ba52)
2017-11-29 10:22:59 +01:00
Thomas Haller
6c22f99219 policy: don't schedule_activate_all() when going to sleep
This was added by cfb2af1df2, but it's
wrong. Here we reset the autoconnect-blocked-reasons when going to sleep,
not when waking up.

(cherry picked from commit 88549b031a)
2017-11-29 10:22:58 +01:00
Thomas Haller
e4f042f9bf core: fix broken autoconnect due to wrong nm_settings_connection_autoconnect_is_blocked()
Fixes: 36ac08c092
(cherry picked from commit 249aff6349)
2017-11-29 10:22:56 +01:00
Lubomir Rintel
5468e72d25 policy: fix possible crash on deactivating connection on removal
_deactivate_if_active() takes a NMPolicy instance while the
connection_removed signal handler takes a NMPolicyPrivate pointer.

(cherry picked from commit c9db2c17aa)
2017-11-28 13:52:40 +01:00
Thomas Haller
bf7661189e c-list: re-import latest version of c-list.h from upstream
Most notably, it renames
  c_list_unlink_init() -> c_list_unlink()
  c_list_unlink() -> c_list_unlink_stale()

  $ sed -e 's/\<c_list_unlink\>/c_list_unlink_old/g' \
        -e 's/\<c_list_unlink_init\>/c_list_unlink/g' \
        -e 's/\<c_list_unlink_old\>/c_list_unlink_stale/g' \
        $(git grep -l c_list_unlink -- ':(exclude)shared/nm-utils/c-list.h') \
        -i

(cherry picked from commit b6efac9ec2)
2017-11-28 12:04:15 +01:00
Thomas Haller
eb95d6bbbb device: merge branch 'th/device-carrier-wait-timeout'
https://bugzilla.redhat.com/show_bug.cgi?id=1483343
https://bugzilla.redhat.com/show_bug.cgi?id=1487702
https://bugzilla.redhat.com/show_bug.cgi?id=1515027
https://bugzilla.gnome.org/show_bug.cgi?id=784854

(cherry picked from commit 2becc0a0ac)
2017-11-28 10:56:39 +01:00
Thomas Haller
27e38c77dd device: use same values for carrier-wait and carrier-defer time
Waiting for carrier on startup is probably the same times that carrier
needs, e.g. on an MTU change. Use the same timing.

Note, that as carrier-wait-timeout is no configurable, this
configuration applies to both -- as the manual page already
claims to do.

(cherry picked from commit 245590bacd)
2017-11-28 10:56:22 +01:00
Thomas Haller
d8b786570c device: extend carrier lost defer time after MTU change
Commit a17195b844 already tried to fix the
bug, but it did so wrongly. We must not increase the carrier-wait-time,
but the carrier-defer-time.

Keep the increase of carrier-wait-time too, and increase both timeouts
after a MTU change.

https://bugzilla.redhat.com/show_bug.cgi?id=1487702
https://bugzilla.gnome.org/show_bug.cgi?id=784854
(cherry picked from commit e4099f6764)
2017-11-28 10:56:22 +01:00
Thomas Haller
d67eeec5ef device: make carrier-wait-timeout configurable per device
As this depends on the particular host configuration, it's hard to find
a default that suits everybody. At least make it configurable per-device.

https://bugzilla.redhat.com/show_bug.cgi?id=1483343
https://bugzilla.redhat.com/show_bug.cgi?id=1515027
(cherry picked from commit b595a80977)
2017-11-28 10:56:22 +01:00
Beniamino Galvani
d23e050ef5 cli: do completion only when needed on 'nmcli con down'
$ nmcli connection down p
 path
 Connection 'p' successfully deactivated (D-Bus active path: /org/freedesktop/NetworkManager/ActiveConnection/2)

Don't do completion when not requested.

(cherry picked from commit 021d797089)
2017-11-28 09:38:48 +01:00
Beniamino Galvani
092c8f4e6a settings: fix clist initialization
Fixes: 310973bb64
(cherry picked from commit 1e1af30d95)
2017-11-27 21:05:07 +01:00
Thomas Haller
49c22d23ef core: merge branch 'th/user-block-autoconnect-rh1401515'
Related: https://bugzilla.redhat.com/show_bug.cgi?id=1401515
https://bugzilla.gnome.org/show_bug.cgi?id=790571

(cherry picked from commit 2c3dccfd28)
2017-11-27 16:07:55 +01:00
Thomas Haller
118b9f2978 core: fix race of blocking autoconnect for no-secrets when a new secret-agent registers
When activation of the connection fails with no-secrets, we block
autoconnect due to that. However, NMPolicy also unblocks such
autoconnect, whenever a new secret-agent registers. The reason
is obviously, that the new secret-agent might be able to provide
the previously missing secrets.

However, there is a race between
  - making the secret request, failing activation and blocking autoconnect
  - new secret-agent registers

If the secret-agent registers after making the request, but before we
block autoconnect, then autoconnect stays blocked.

  [1511468634.5759] device (wlp4s0): state change: config -> need-auth (reason 'none', sys-iface-state: 'managed')
  [1511468634.5772] device (wlp4s0): No agents were available for this request.
  [1511468638.4082] agent-manager: req[0x55ea7e58a5d0, :1.32/org.kde.plasma.networkmanagement/1000]: agent registered
  [1511468638.4082] policy: re-enabling autoconnect for all connections with failed secrets
  [1511468664.6280] device (wlp4s0): state change: need-auth -> failed (reason 'no-secrets', sys-iface-state: 'managed')
  [1511468664.6287] policy: connection 'tuxmobil' now blocked from autoconnect due to no secrets

Note the long timing between making the secret request and the
activation failure. This race already existed before, but now with
WPS push-button method enabled by default, the duraction of the
activation is much longer and the race is easy to hit.

https://bugzilla.gnome.org/show_bug.cgi?id=790571
(cherry picked from commit e2c8ef45ac)
2017-11-27 16:00:53 +01:00
Thomas Haller
37ac96cb55 policy: use "agent-registered" signal directly from NMAgentManager instead of NMSettings
(cherry picked from commit 46af70b508)
2017-11-27 16:00:53 +01:00
Thomas Haller
44cd35c16c core: use #define for "agent-registered" signal name
(cherry picked from commit c3cae3d0dc)
2017-11-27 16:00:53 +01:00
Thomas Haller
64af67b90f settings: use slice allocator for UpdateInfo data
(cherry picked from commit 6ab0ff8a7c)
2017-11-27 16:00:53 +01:00
Thomas Haller
d0039b5521 policy: avoid false positives for checking for autoactivation
We want to only check for autoconnect all, if something happend that
makes it possible that we can autoconnect now (while we couldn't
previously).

It's not a real problem to check more often then strictly necessary.
But add a check to rule out a few false-positives to avoid the
overhead of checking all devices for autoconnect.

(cherry picked from commit f0147a9c47)
2017-11-27 16:00:53 +01:00
Thomas Haller
01dbbf1404 policy: add nm_settings_connection_autoconnect_is_blocked() helper function
(cherry picked from commit 36ac08c092)
2017-11-27 16:00:53 +01:00