mirror of
https://gitlab.freedesktop.org/NetworkManager/NetworkManager.git
synced 2026-01-10 22:10:17 +01:00
Remove the PLUGIN_PRINT() and PLUGIN_WARN() macros and use the
standard NM logging functions instead.
Also changed PLUGIN_PRINT("error: ...") to nm_log_warn("...") in
places.
1150 lines
34 KiB
C
1150 lines
34 KiB
C
/* -*- Mode: C; tab-width: 4; indent-tabs-mode: t; c-basic-offset: 4 -*- */
|
|
/* NetworkManager system settings service - keyfile plugin
|
|
*
|
|
* This program is free software; you can redistribute it and/or modify
|
|
* it under the terms of the GNU General Public License as published by
|
|
* the Free Software Foundation; either version 2 of the License, or
|
|
* (at your option) any later version.
|
|
*
|
|
* This program is distributed in the hope that it will be useful,
|
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
* GNU General Public License for more details.
|
|
*
|
|
* You should have received a copy of the GNU General Public License along
|
|
* with this program; if not, write to the Free Software Foundation, Inc.,
|
|
* 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA.
|
|
*
|
|
* Copyright (C) 2008 Novell, Inc.
|
|
* Copyright (C) 2008 - 2012 Red Hat, Inc.
|
|
*/
|
|
|
|
#include <config.h>
|
|
#include <stdlib.h>
|
|
#include <sys/stat.h>
|
|
#include <unistd.h>
|
|
#include <stdio.h>
|
|
#include <errno.h>
|
|
|
|
#include <dbus/dbus-glib.h>
|
|
#include <nm-setting.h>
|
|
#include <nm-setting-connection.h>
|
|
#include <nm-setting-ip4-config.h>
|
|
#include <nm-setting-ip6-config.h>
|
|
#include <nm-setting-vpn.h>
|
|
#include <nm-setting-wired.h>
|
|
#include <nm-setting-wireless.h>
|
|
#include <nm-setting-ip4-config.h>
|
|
#include <nm-setting-bluetooth.h>
|
|
#include <nm-setting-8021x.h>
|
|
#include <nm-utils.h>
|
|
#include <string.h>
|
|
#include <arpa/inet.h>
|
|
#include <netinet/ether.h>
|
|
|
|
#include "nm-dbus-glib-types.h"
|
|
#include "nm-glib-compat.h"
|
|
#include "nm-logging.h"
|
|
#include "writer.h"
|
|
#include "common.h"
|
|
#include "utils.h"
|
|
|
|
/* Some setting properties also contain setting names, such as
|
|
* NMSettingConnection's 'type' property (which specifies the base type of the
|
|
* connection, eg ethernet or wifi) or the 802-11-wireless setting's
|
|
* 'security' property which specifies whether or not the AP requires
|
|
* encrpytion. This function handles translating those properties' values
|
|
* from the real setting name to the more-readable alias.
|
|
*/
|
|
static void
|
|
setting_alias_writer (GKeyFile *file,
|
|
const char *keyfile_dir,
|
|
const char *uuid,
|
|
NMSetting *setting,
|
|
const char *key,
|
|
const GValue *value)
|
|
{
|
|
const char *str, *alias;
|
|
|
|
str = g_value_get_string (value);
|
|
alias = nm_keyfile_plugin_get_alias_for_setting_name (str);
|
|
nm_keyfile_plugin_kf_set_string (file,
|
|
nm_setting_get_name (setting),
|
|
key,
|
|
alias ? alias : str);
|
|
}
|
|
|
|
static gboolean
|
|
write_array_of_uint (GKeyFile *file,
|
|
NMSetting *setting,
|
|
const char *key,
|
|
const GValue *value)
|
|
{
|
|
GArray *array;
|
|
int i;
|
|
int *tmp_array;
|
|
|
|
array = (GArray *) g_value_get_boxed (value);
|
|
if (!array || !array->len)
|
|
return TRUE;
|
|
|
|
tmp_array = g_new (gint, array->len);
|
|
for (i = 0; i < array->len; i++)
|
|
tmp_array[i] = g_array_index (array, int, i);
|
|
|
|
nm_keyfile_plugin_kf_set_integer_list (file, nm_setting_get_name (setting), key, tmp_array, array->len);
|
|
g_free (tmp_array);
|
|
return TRUE;
|
|
}
|
|
|
|
static void
|
|
ip4_dns_writer (GKeyFile *file,
|
|
const char *keyfile_dir,
|
|
const char *uuid,
|
|
NMSetting *setting,
|
|
const char *key,
|
|
const GValue *value)
|
|
{
|
|
GArray *array;
|
|
char **list;
|
|
int i, num = 0;
|
|
|
|
g_return_if_fail (G_VALUE_HOLDS (value, DBUS_TYPE_G_UINT_ARRAY));
|
|
|
|
array = (GArray *) g_value_get_boxed (value);
|
|
if (!array || !array->len)
|
|
return;
|
|
|
|
list = g_new0 (char *, array->len + 1);
|
|
|
|
for (i = 0; i < array->len; i++) {
|
|
char *buf = g_new (char, INET_ADDRSTRLEN);
|
|
guint32 addr;
|
|
|
|
addr = g_array_index (array, guint32, i);
|
|
nm_utils_inet4_ntop (addr, buf);
|
|
list[num++] = buf;
|
|
}
|
|
|
|
nm_keyfile_plugin_kf_set_string_list (file, nm_setting_get_name (setting), key, (const char **) list, num);
|
|
g_strfreev (list);
|
|
}
|
|
|
|
static void
|
|
write_ip4_values (GKeyFile *file,
|
|
const char *setting_name,
|
|
GPtrArray *array,
|
|
gboolean is_route)
|
|
{
|
|
GString *output;
|
|
int i;
|
|
guint32 addr, gw, plen, metric;
|
|
char key_name[30], *key_name_idx;
|
|
|
|
if (!array->len)
|
|
return;
|
|
|
|
strcpy (key_name, is_route ? "route" : "address");
|
|
key_name_idx = key_name + strlen (key_name);
|
|
|
|
output = g_string_sized_new (2*INET_ADDRSTRLEN + 10);
|
|
for (i = 0; i < array->len; i++) {
|
|
GArray *tuple = g_ptr_array_index (array, i);
|
|
|
|
addr = g_array_index (tuple, guint32, 0);
|
|
plen = g_array_index (tuple, guint32, 1);
|
|
gw = g_array_index (tuple, guint32, 2);
|
|
metric = is_route ? g_array_index (tuple, guint32, 3) : 0;
|
|
|
|
g_string_set_size (output, 0);
|
|
g_string_append_printf (output, "%s/%u",
|
|
nm_utils_inet4_ntop (addr, NULL),
|
|
(unsigned) plen);
|
|
if (metric || gw) {
|
|
/* Older versions of the plugin do not support the form
|
|
* "a.b.c.d/plen,,metric", so, we always have to write the
|
|
* gateway, even if it's 0.0.0.0.
|
|
* The current version support reading of the above form. */
|
|
g_string_append_c (output, ',');
|
|
g_string_append (output, nm_utils_inet4_ntop (gw, NULL));
|
|
if (metric)
|
|
g_string_append_printf (output, ",%lu", (unsigned long) metric);
|
|
}
|
|
|
|
sprintf (key_name_idx, "%d", i + 1);
|
|
nm_keyfile_plugin_kf_set_string (file, setting_name, key_name, output->str);
|
|
}
|
|
g_string_free (output, TRUE);
|
|
}
|
|
|
|
static void
|
|
ip4_addr_writer (GKeyFile *file,
|
|
const char *keyfile_dir,
|
|
const char *uuid,
|
|
NMSetting *setting,
|
|
const char *key,
|
|
const GValue *value)
|
|
{
|
|
GPtrArray *array;
|
|
const char *setting_name = nm_setting_get_name (setting);
|
|
|
|
g_return_if_fail (G_VALUE_HOLDS (value, DBUS_TYPE_G_ARRAY_OF_ARRAY_OF_UINT));
|
|
|
|
array = (GPtrArray *) g_value_get_boxed (value);
|
|
if (array && array->len)
|
|
write_ip4_values (file, setting_name, array, FALSE);
|
|
}
|
|
|
|
static void
|
|
ip4_addr_label_writer (GKeyFile *file,
|
|
const char *keyfile_dir,
|
|
const char *uuid,
|
|
NMSetting *setting,
|
|
const char *key,
|
|
const GValue *value)
|
|
{
|
|
/* skip */
|
|
}
|
|
|
|
static void
|
|
ip4_route_writer (GKeyFile *file,
|
|
const char *keyfile_dir,
|
|
const char *uuid,
|
|
NMSetting *setting,
|
|
const char *key,
|
|
const GValue *value)
|
|
{
|
|
GPtrArray *array;
|
|
const char *setting_name = nm_setting_get_name (setting);
|
|
|
|
g_return_if_fail (G_VALUE_HOLDS (value, DBUS_TYPE_G_ARRAY_OF_ARRAY_OF_UINT));
|
|
|
|
array = (GPtrArray *) g_value_get_boxed (value);
|
|
if (array && array->len)
|
|
write_ip4_values (file, setting_name, array, TRUE);
|
|
}
|
|
|
|
static void
|
|
ip6_dns_writer (GKeyFile *file,
|
|
const char *keyfile_dir,
|
|
const char *uuid,
|
|
NMSetting *setting,
|
|
const char *key,
|
|
const GValue *value)
|
|
{
|
|
GPtrArray *array;
|
|
GByteArray *byte_array;
|
|
char **list;
|
|
int i, num = 0;
|
|
|
|
g_return_if_fail (G_VALUE_HOLDS (value, DBUS_TYPE_G_ARRAY_OF_ARRAY_OF_UCHAR));
|
|
|
|
array = (GPtrArray *) g_value_get_boxed (value);
|
|
if (!array || !array->len)
|
|
return;
|
|
|
|
list = g_new0 (char *, array->len + 1);
|
|
|
|
for (i = 0; i < array->len; i++) {
|
|
char *buf = g_new (char, INET6_ADDRSTRLEN);
|
|
|
|
byte_array = g_ptr_array_index (array, i);
|
|
nm_utils_inet6_ntop ((const struct in6_addr *) byte_array->data, buf);
|
|
list[num++] = buf;
|
|
}
|
|
|
|
nm_keyfile_plugin_kf_set_string_list (file, nm_setting_get_name (setting), key, (const char **) list, num);
|
|
g_strfreev (list);
|
|
}
|
|
|
|
static void
|
|
ip6_array_to_addr (GValueArray *values,
|
|
guint32 idx,
|
|
char *buf,
|
|
struct in6_addr *out_addr)
|
|
{
|
|
GByteArray *byte_array;
|
|
GValue *addr_val;
|
|
const struct in6_addr *addr;
|
|
|
|
addr_val = g_value_array_get_nth (values, idx);
|
|
byte_array = g_value_get_boxed (addr_val);
|
|
addr = (const struct in6_addr *) byte_array->data;
|
|
|
|
nm_utils_inet6_ntop (addr, buf);
|
|
|
|
if (out_addr)
|
|
*out_addr = *addr;
|
|
}
|
|
|
|
static char *
|
|
ip6_array_to_addr_prefix (GValueArray *values, gboolean force_write_gateway)
|
|
{
|
|
GValue *prefix_val;
|
|
char *ret = NULL;
|
|
GString *ip6_str;
|
|
char buf[INET6_ADDRSTRLEN];
|
|
struct in6_addr addr;
|
|
|
|
/* address */
|
|
ip6_array_to_addr (values, 0, buf, NULL);
|
|
|
|
/* Enough space for the address, '/', and the prefix */
|
|
ip6_str = g_string_sized_new ((INET6_ADDRSTRLEN * 2) + 5);
|
|
|
|
/* prefix */
|
|
g_string_append (ip6_str, buf);
|
|
prefix_val = g_value_array_get_nth (values, 1);
|
|
g_string_append_printf (ip6_str, "/%u", g_value_get_uint (prefix_val));
|
|
|
|
ip6_array_to_addr (values, 2, buf, &addr);
|
|
if (force_write_gateway || !IN6_IS_ADDR_UNSPECIFIED (&addr))
|
|
g_string_append_printf (ip6_str, ",%s", buf);
|
|
|
|
ret = ip6_str->str;
|
|
g_string_free (ip6_str, FALSE);
|
|
|
|
return ret;
|
|
}
|
|
|
|
static void
|
|
ip6_addr_writer (GKeyFile *file,
|
|
const char *keyfile_dir,
|
|
const char *uuid,
|
|
NMSetting *setting,
|
|
const char *key,
|
|
const GValue *value)
|
|
{
|
|
GPtrArray *array;
|
|
const char *setting_name = nm_setting_get_name (setting);
|
|
int i, j;
|
|
|
|
g_return_if_fail (G_VALUE_HOLDS (value, DBUS_TYPE_G_ARRAY_OF_IP6_ADDRESS));
|
|
|
|
array = (GPtrArray *) g_value_get_boxed (value);
|
|
if (!array || !array->len)
|
|
return;
|
|
|
|
for (i = 0, j = 1; i < array->len; i++) {
|
|
GValueArray *values = g_ptr_array_index (array, i);
|
|
char *key_name, *ip6_addr;
|
|
|
|
if (values->n_values != 3) {
|
|
nm_log_warn (LOGD_SETTINGS, "%s: error writing IP6 address %d (address array "
|
|
"length %d is not 3)", __func__, i, values->n_values);
|
|
continue;
|
|
}
|
|
|
|
/* we allow omitting the gateway if it's :: */
|
|
ip6_addr = ip6_array_to_addr_prefix (values, FALSE);
|
|
/* Write it out */
|
|
key_name = g_strdup_printf ("address%d", j++);
|
|
nm_keyfile_plugin_kf_set_string (file, setting_name, key_name, ip6_addr);
|
|
g_free (key_name);
|
|
g_free (ip6_addr);
|
|
}
|
|
}
|
|
|
|
static void
|
|
ip6_route_writer (GKeyFile *file,
|
|
const char *keyfile_dir,
|
|
const char *uuid,
|
|
NMSetting *setting,
|
|
const char *key,
|
|
const GValue *value)
|
|
{
|
|
GPtrArray *array;
|
|
const char *setting_name = nm_setting_get_name (setting);
|
|
GString *output;
|
|
int i, j;
|
|
|
|
g_return_if_fail (G_VALUE_HOLDS (value, DBUS_TYPE_G_ARRAY_OF_IP6_ROUTE));
|
|
|
|
array = (GPtrArray *) g_value_get_boxed (value);
|
|
if (!array || !array->len)
|
|
return;
|
|
|
|
for (i = 0, j = 1; i < array->len; i++) {
|
|
GValueArray *values = g_ptr_array_index (array, i);
|
|
char *key_name;
|
|
char *addr_str;
|
|
guint metric;
|
|
|
|
output = g_string_new ("");
|
|
|
|
/* Metric */
|
|
value = g_value_array_get_nth (values, 3);
|
|
metric = g_value_get_uint (value);
|
|
|
|
/* Address, prefix and next hop
|
|
* We allow omitting the gateway ::, if we also omit the metric
|
|
* and force writing of the gateway, if we add a non zero metric.
|
|
* The current version of the reader also supports the syntax
|
|
* "a:b:c::/plen,,metric" for a gateway ::.
|
|
* As older versions of the plugin, cannot read this form,
|
|
* we always write the gateway, whenever we also write the metric.
|
|
* But if possible, we omit them both (",::,0") or only the metric
|
|
* (",0").
|
|
**/
|
|
addr_str = ip6_array_to_addr_prefix (values, metric != 0);
|
|
g_string_append (output, addr_str);
|
|
g_free (addr_str);
|
|
|
|
if (metric != 0)
|
|
g_string_append_printf (output, ",%u", metric);
|
|
|
|
/* Write it out */
|
|
key_name = g_strdup_printf ("route%d", j++);
|
|
nm_keyfile_plugin_kf_set_string (file, setting_name, key_name, output->str);
|
|
g_free (key_name);
|
|
|
|
g_string_free (output, TRUE);
|
|
}
|
|
}
|
|
|
|
|
|
static void
|
|
mac_address_writer (GKeyFile *file,
|
|
const char *keyfile_dir,
|
|
const char *uuid,
|
|
NMSetting *setting,
|
|
const char *key,
|
|
const GValue *value)
|
|
{
|
|
GByteArray *array;
|
|
const char *setting_name = nm_setting_get_name (setting);
|
|
char *mac;
|
|
int type;
|
|
|
|
g_return_if_fail (G_VALUE_HOLDS (value, DBUS_TYPE_G_UCHAR_ARRAY));
|
|
|
|
array = (GByteArray *) g_value_get_boxed (value);
|
|
if (!array)
|
|
return;
|
|
|
|
type = nm_utils_hwaddr_type (array->len);
|
|
if (type < 0) {
|
|
nm_log_warn (LOGD_SETTINGS, "%s: invalid %s / %s MAC address length %d",
|
|
__func__, setting_name, key, array->len);
|
|
return;
|
|
}
|
|
|
|
mac = nm_utils_hwaddr_ntoa (array->data, type);
|
|
nm_keyfile_plugin_kf_set_string (file, setting_name, key, mac);
|
|
g_free (mac);
|
|
}
|
|
|
|
static void
|
|
write_hash_of_string (GKeyFile *file,
|
|
NMSetting *setting,
|
|
const char *key,
|
|
const GValue *value)
|
|
{
|
|
GHashTableIter iter;
|
|
const char *property = NULL, *data = NULL;
|
|
const char *group_name = nm_setting_get_name (setting);
|
|
gboolean vpn_secrets = FALSE;
|
|
|
|
/* Write VPN secrets out to a different group to keep them separate */
|
|
if (NM_IS_SETTING_VPN (setting) && !strcmp (key, NM_SETTING_VPN_SECRETS)) {
|
|
group_name = VPN_SECRETS_GROUP;
|
|
vpn_secrets = TRUE;
|
|
}
|
|
|
|
g_hash_table_iter_init (&iter, (GHashTable *) g_value_get_boxed (value));
|
|
while (g_hash_table_iter_next (&iter, (gpointer *) &property, (gpointer *) &data)) {
|
|
gboolean write_item = TRUE;
|
|
|
|
/* Handle VPN secrets specially; they are nested in the property's hash;
|
|
* we don't want to write them if the secret is not saved, not required,
|
|
* or owned by a user's secret agent.
|
|
*/
|
|
if (vpn_secrets) {
|
|
NMSettingSecretFlags secret_flags = NM_SETTING_SECRET_FLAG_NONE;
|
|
|
|
nm_setting_get_secret_flags (setting, property, &secret_flags, NULL);
|
|
if (secret_flags != NM_SETTING_SECRET_FLAG_NONE)
|
|
write_item = FALSE;
|
|
}
|
|
|
|
if (write_item)
|
|
nm_keyfile_plugin_kf_set_string (file, group_name, property, data);
|
|
}
|
|
}
|
|
|
|
static void
|
|
ssid_writer (GKeyFile *file,
|
|
const char *keyfile_dir,
|
|
const char *uuid,
|
|
NMSetting *setting,
|
|
const char *key,
|
|
const GValue *value)
|
|
{
|
|
GByteArray *array;
|
|
const char *setting_name = nm_setting_get_name (setting);
|
|
gboolean new_format = TRUE;
|
|
unsigned int semicolons = 0;
|
|
int i, *tmp_array;
|
|
char *ssid;
|
|
|
|
g_return_if_fail (G_VALUE_HOLDS (value, DBUS_TYPE_G_UCHAR_ARRAY));
|
|
|
|
array = (GByteArray *) g_value_get_boxed (value);
|
|
if (!array || !array->len)
|
|
return;
|
|
|
|
/* Check whether each byte is printable. If not, we have to use an
|
|
* integer list, otherwise we can just use a string.
|
|
*/
|
|
for (i = 0; i < array->len; i++) {
|
|
char c = array->data[i] & 0xFF;
|
|
if (!g_ascii_isprint (c)) {
|
|
new_format = FALSE;
|
|
break;
|
|
}
|
|
if (c == ';')
|
|
semicolons++;
|
|
}
|
|
|
|
if (new_format) {
|
|
ssid = g_malloc0 (array->len + semicolons + 1);
|
|
if (semicolons == 0)
|
|
memcpy (ssid, array->data, array->len);
|
|
else {
|
|
/* Escape semicolons with backslashes to make strings
|
|
* containing ';', such as '16;17;' unambiguous */
|
|
int j = 0;
|
|
for (i = 0; i < array->len; i++) {
|
|
if (array->data[i] == ';')
|
|
ssid[j++] = '\\';
|
|
ssid[j++] = array->data[i];
|
|
}
|
|
}
|
|
nm_keyfile_plugin_kf_set_string (file, setting_name, key, ssid);
|
|
g_free (ssid);
|
|
} else {
|
|
tmp_array = g_new (gint, array->len);
|
|
for (i = 0; i < array->len; i++)
|
|
tmp_array[i] = (int) array->data[i];
|
|
nm_keyfile_plugin_kf_set_integer_list (file, setting_name, key, tmp_array, array->len);
|
|
g_free (tmp_array);
|
|
}
|
|
}
|
|
|
|
static void
|
|
password_raw_writer (GKeyFile *file,
|
|
const char *keyfile_dir,
|
|
const char *uuid,
|
|
NMSetting *setting,
|
|
const char *key,
|
|
const GValue *value)
|
|
{
|
|
const char *setting_name = nm_setting_get_name (setting);
|
|
GByteArray *array;
|
|
int i, *tmp_array;
|
|
|
|
g_return_if_fail (G_VALUE_HOLDS (value, DBUS_TYPE_G_UCHAR_ARRAY));
|
|
|
|
array = (GByteArray *) g_value_get_boxed (value);
|
|
if (!array || !array->len)
|
|
return;
|
|
|
|
tmp_array = g_new (gint, array->len);
|
|
for (i = 0; i < array->len; i++)
|
|
tmp_array[i] = (int) array->data[i];
|
|
nm_keyfile_plugin_kf_set_integer_list (file, setting_name, key, tmp_array, array->len);
|
|
g_free (tmp_array);
|
|
}
|
|
|
|
typedef struct ObjectType {
|
|
const char *key;
|
|
const char *suffix;
|
|
const char *privkey_pw_prop;
|
|
NMSetting8021xCKScheme (*scheme_func) (NMSetting8021x *setting);
|
|
NMSetting8021xCKFormat (*format_func) (NMSetting8021x *setting);
|
|
const char * (*path_func) (NMSetting8021x *setting);
|
|
const GByteArray * (*blob_func) (NMSetting8021x *setting);
|
|
} ObjectType;
|
|
|
|
static const ObjectType objtypes[10] = {
|
|
{ NM_SETTING_802_1X_CA_CERT,
|
|
"ca-cert",
|
|
NULL,
|
|
nm_setting_802_1x_get_ca_cert_scheme,
|
|
NULL,
|
|
nm_setting_802_1x_get_ca_cert_path,
|
|
nm_setting_802_1x_get_ca_cert_blob },
|
|
|
|
{ NM_SETTING_802_1X_PHASE2_CA_CERT,
|
|
"inner-ca-cert",
|
|
NULL,
|
|
nm_setting_802_1x_get_phase2_ca_cert_scheme,
|
|
NULL,
|
|
nm_setting_802_1x_get_phase2_ca_cert_path,
|
|
nm_setting_802_1x_get_phase2_ca_cert_blob },
|
|
|
|
{ NM_SETTING_802_1X_CLIENT_CERT,
|
|
"client-cert",
|
|
NULL,
|
|
nm_setting_802_1x_get_client_cert_scheme,
|
|
NULL,
|
|
nm_setting_802_1x_get_client_cert_path,
|
|
nm_setting_802_1x_get_client_cert_blob },
|
|
|
|
{ NM_SETTING_802_1X_PHASE2_CLIENT_CERT,
|
|
"inner-client-cert",
|
|
NULL,
|
|
nm_setting_802_1x_get_phase2_client_cert_scheme,
|
|
NULL,
|
|
nm_setting_802_1x_get_phase2_client_cert_path,
|
|
nm_setting_802_1x_get_phase2_client_cert_blob },
|
|
|
|
{ NM_SETTING_802_1X_PRIVATE_KEY,
|
|
"private-key",
|
|
NM_SETTING_802_1X_PRIVATE_KEY_PASSWORD,
|
|
nm_setting_802_1x_get_private_key_scheme,
|
|
nm_setting_802_1x_get_private_key_format,
|
|
nm_setting_802_1x_get_private_key_path,
|
|
nm_setting_802_1x_get_private_key_blob },
|
|
|
|
{ NM_SETTING_802_1X_PHASE2_PRIVATE_KEY,
|
|
"inner-private-key",
|
|
NM_SETTING_802_1X_PHASE2_PRIVATE_KEY_PASSWORD,
|
|
nm_setting_802_1x_get_phase2_private_key_scheme,
|
|
nm_setting_802_1x_get_phase2_private_key_format,
|
|
nm_setting_802_1x_get_phase2_private_key_path,
|
|
nm_setting_802_1x_get_phase2_private_key_blob },
|
|
|
|
{ NULL },
|
|
};
|
|
|
|
static gboolean
|
|
write_cert_key_file (const char *path,
|
|
const GByteArray *data,
|
|
GError **error)
|
|
{
|
|
char *tmppath;
|
|
int fd = -1, written;
|
|
gboolean success = FALSE;
|
|
|
|
tmppath = g_malloc0 (strlen (path) + 10);
|
|
g_assert (tmppath);
|
|
memcpy (tmppath, path, strlen (path));
|
|
strcat (tmppath, ".XXXXXX");
|
|
|
|
errno = 0;
|
|
fd = mkstemp (tmppath);
|
|
if (fd < 0) {
|
|
g_set_error (error, KEYFILE_PLUGIN_ERROR, 0,
|
|
"Could not create temporary file for '%s': %d",
|
|
path, errno);
|
|
goto out;
|
|
}
|
|
|
|
/* Only readable by root */
|
|
errno = 0;
|
|
if (fchmod (fd, S_IRUSR | S_IWUSR) != 0) {
|
|
close (fd);
|
|
unlink (tmppath);
|
|
g_set_error (error, KEYFILE_PLUGIN_ERROR, 0,
|
|
"Could not set permissions for temporary file '%s': %d",
|
|
path, errno);
|
|
goto out;
|
|
}
|
|
|
|
errno = 0;
|
|
written = write (fd, data->data, data->len);
|
|
if (written != data->len) {
|
|
close (fd);
|
|
unlink (tmppath);
|
|
g_set_error (error, KEYFILE_PLUGIN_ERROR, 0,
|
|
"Could not write temporary file for '%s': %d",
|
|
path, errno);
|
|
goto out;
|
|
}
|
|
close (fd);
|
|
|
|
/* Try to rename */
|
|
errno = 0;
|
|
if (rename (tmppath, path) == 0)
|
|
success = TRUE;
|
|
else {
|
|
unlink (tmppath);
|
|
g_set_error (error, KEYFILE_PLUGIN_ERROR, 0,
|
|
"Could not rename temporary file to '%s': %d",
|
|
path, errno);
|
|
}
|
|
|
|
out:
|
|
g_free (tmppath);
|
|
return success;
|
|
}
|
|
|
|
static void
|
|
cert_writer (GKeyFile *file,
|
|
const char *keyfile_dir,
|
|
const char *uuid,
|
|
NMSetting *setting,
|
|
const char *key,
|
|
const GValue *value)
|
|
{
|
|
const char *setting_name = nm_setting_get_name (setting);
|
|
NMSetting8021xCKScheme scheme;
|
|
NMSetting8021xCKFormat format;
|
|
const char *path = NULL, *ext = "pem";
|
|
const ObjectType *objtype = NULL;
|
|
int i;
|
|
|
|
for (i = 0; i < G_N_ELEMENTS (objtypes) && objtypes[i].key; i++) {
|
|
if (g_strcmp0 (objtypes[i].key, key) == 0) {
|
|
objtype = &objtypes[i];
|
|
break;
|
|
}
|
|
}
|
|
if (!objtype) {
|
|
g_return_if_fail (objtype);
|
|
return;
|
|
}
|
|
|
|
scheme = objtype->scheme_func (NM_SETTING_802_1X (setting));
|
|
if (scheme == NM_SETTING_802_1X_CK_SCHEME_PATH) {
|
|
path = objtype->path_func (NM_SETTING_802_1X (setting));
|
|
g_assert (path);
|
|
|
|
/* If the path is rooted in the keyfile directory, just use a
|
|
* relative path instead of an absolute one.
|
|
*/
|
|
if (g_str_has_prefix (path, keyfile_dir)) {
|
|
path += strlen (keyfile_dir);
|
|
while (*path == '/')
|
|
path++;
|
|
}
|
|
|
|
nm_keyfile_plugin_kf_set_string (file, setting_name, key, path);
|
|
} else if (scheme == NM_SETTING_802_1X_CK_SCHEME_BLOB) {
|
|
const GByteArray *blob;
|
|
gboolean success;
|
|
GError *error = NULL;
|
|
char *new_path;
|
|
|
|
blob = objtype->blob_func (NM_SETTING_802_1X (setting));
|
|
g_assert (blob);
|
|
|
|
if (objtype->format_func) {
|
|
/* Get the extension for a private key */
|
|
format = objtype->format_func (NM_SETTING_802_1X (setting));
|
|
if (format == NM_SETTING_802_1X_CK_FORMAT_PKCS12)
|
|
ext = "p12";
|
|
} else {
|
|
/* DER or PEM format certificate? */
|
|
if (blob->len > 2 && blob->data[0] == 0x30 && blob->data[1] == 0x82)
|
|
ext = "der";
|
|
}
|
|
|
|
/* Write the raw data out to the standard file so that we can use paths
|
|
* from now on instead of pushing around the certificate data.
|
|
*/
|
|
new_path = g_strdup_printf ("%s/%s-%s.%s", keyfile_dir, uuid, objtype->suffix, ext);
|
|
g_assert (new_path);
|
|
|
|
success = write_cert_key_file (new_path, blob, &error);
|
|
if (success) {
|
|
/* Write the path value to the keyfile */
|
|
nm_keyfile_plugin_kf_set_string (file, setting_name, key, new_path);
|
|
} else {
|
|
nm_log_warn (LOGD_SETTINGS, "Failed to write certificate/key %s: %s",
|
|
new_path, error->message);
|
|
g_error_free (error);
|
|
}
|
|
g_free (new_path);
|
|
} else
|
|
g_assert_not_reached ();
|
|
}
|
|
|
|
typedef struct {
|
|
const char *setting_name;
|
|
const char *key;
|
|
void (*writer) (GKeyFile *keyfile,
|
|
const char *keyfile_dir,
|
|
const char *uuid,
|
|
NMSetting *setting,
|
|
const char *key,
|
|
const GValue *value);
|
|
} KeyWriter;
|
|
|
|
/* A table of keys that require further parsing/conversion because they are
|
|
* stored in a format that can't be automatically read using the key's type.
|
|
* i.e. IPv4 addresses, which are stored in NetworkManager as guint32, but are
|
|
* stored in keyfiles as strings, eg "10.1.1.2" or IPv6 addresses stored
|
|
* in struct in6_addr internally, but as string in keyfiles.
|
|
*/
|
|
static KeyWriter key_writers[] = {
|
|
{ NM_SETTING_CONNECTION_SETTING_NAME,
|
|
NM_SETTING_CONNECTION_TYPE,
|
|
setting_alias_writer },
|
|
{ NM_SETTING_IP4_CONFIG_SETTING_NAME,
|
|
NM_SETTING_IP4_CONFIG_ADDRESSES,
|
|
ip4_addr_writer },
|
|
{ NM_SETTING_IP4_CONFIG_SETTING_NAME,
|
|
"address-labels",
|
|
ip4_addr_label_writer },
|
|
{ NM_SETTING_IP6_CONFIG_SETTING_NAME,
|
|
NM_SETTING_IP6_CONFIG_ADDRESSES,
|
|
ip6_addr_writer },
|
|
{ NM_SETTING_IP4_CONFIG_SETTING_NAME,
|
|
NM_SETTING_IP4_CONFIG_ROUTES,
|
|
ip4_route_writer },
|
|
{ NM_SETTING_IP6_CONFIG_SETTING_NAME,
|
|
NM_SETTING_IP6_CONFIG_ROUTES,
|
|
ip6_route_writer },
|
|
{ NM_SETTING_IP4_CONFIG_SETTING_NAME,
|
|
NM_SETTING_IP4_CONFIG_DNS,
|
|
ip4_dns_writer },
|
|
{ NM_SETTING_IP6_CONFIG_SETTING_NAME,
|
|
NM_SETTING_IP6_CONFIG_DNS,
|
|
ip6_dns_writer },
|
|
{ NM_SETTING_WIRED_SETTING_NAME,
|
|
NM_SETTING_WIRED_MAC_ADDRESS,
|
|
mac_address_writer },
|
|
{ NM_SETTING_WIRED_SETTING_NAME,
|
|
NM_SETTING_WIRED_CLONED_MAC_ADDRESS,
|
|
mac_address_writer },
|
|
{ NM_SETTING_WIRELESS_SETTING_NAME,
|
|
NM_SETTING_WIRELESS_MAC_ADDRESS,
|
|
mac_address_writer },
|
|
{ NM_SETTING_WIRELESS_SETTING_NAME,
|
|
NM_SETTING_WIRELESS_CLONED_MAC_ADDRESS,
|
|
mac_address_writer },
|
|
{ NM_SETTING_WIRELESS_SETTING_NAME,
|
|
NM_SETTING_WIRELESS_BSSID,
|
|
mac_address_writer },
|
|
{ NM_SETTING_BLUETOOTH_SETTING_NAME,
|
|
NM_SETTING_BLUETOOTH_BDADDR,
|
|
mac_address_writer },
|
|
{ NM_SETTING_INFINIBAND_SETTING_NAME,
|
|
NM_SETTING_INFINIBAND_MAC_ADDRESS,
|
|
mac_address_writer },
|
|
{ NM_SETTING_WIMAX_SETTING_NAME,
|
|
NM_SETTING_WIMAX_MAC_ADDRESS,
|
|
mac_address_writer },
|
|
{ NM_SETTING_WIRELESS_SETTING_NAME,
|
|
NM_SETTING_WIRELESS_SSID,
|
|
ssid_writer },
|
|
{ NM_SETTING_802_1X_SETTING_NAME,
|
|
NM_SETTING_802_1X_PASSWORD_RAW,
|
|
password_raw_writer },
|
|
{ NM_SETTING_802_1X_SETTING_NAME,
|
|
NM_SETTING_802_1X_CA_CERT,
|
|
cert_writer },
|
|
{ NM_SETTING_802_1X_SETTING_NAME,
|
|
NM_SETTING_802_1X_CLIENT_CERT,
|
|
cert_writer },
|
|
{ NM_SETTING_802_1X_SETTING_NAME,
|
|
NM_SETTING_802_1X_PRIVATE_KEY,
|
|
cert_writer },
|
|
{ NM_SETTING_802_1X_SETTING_NAME,
|
|
NM_SETTING_802_1X_PHASE2_CA_CERT,
|
|
cert_writer },
|
|
{ NM_SETTING_802_1X_SETTING_NAME,
|
|
NM_SETTING_802_1X_PHASE2_CLIENT_CERT,
|
|
cert_writer },
|
|
{ NM_SETTING_802_1X_SETTING_NAME,
|
|
NM_SETTING_802_1X_PHASE2_PRIVATE_KEY,
|
|
cert_writer },
|
|
{ NULL, NULL, NULL }
|
|
};
|
|
|
|
typedef struct {
|
|
GKeyFile *keyfile;
|
|
const char *keyfile_dir;
|
|
const char *uuid;
|
|
} WriteInfo;
|
|
|
|
static void
|
|
write_setting_value (NMSetting *setting,
|
|
const char *key,
|
|
const GValue *value,
|
|
GParamFlags flag,
|
|
gpointer user_data)
|
|
{
|
|
WriteInfo *info = user_data;
|
|
const char *setting_name;
|
|
GType type = G_VALUE_TYPE (value);
|
|
KeyWriter *writer = &key_writers[0];
|
|
GParamSpec *pspec;
|
|
|
|
/* Setting name gets picked up from the keyfile's section name instead */
|
|
if (!strcmp (key, NM_SETTING_NAME))
|
|
return;
|
|
|
|
/* Don't write the NMSettingConnection object's 'read-only' property */
|
|
if ( NM_IS_SETTING_CONNECTION (setting)
|
|
&& !strcmp (key, NM_SETTING_CONNECTION_READ_ONLY))
|
|
return;
|
|
|
|
setting_name = nm_setting_get_name (setting);
|
|
|
|
/* If the value is the default value, remove the item from the keyfile */
|
|
pspec = g_object_class_find_property (G_OBJECT_GET_CLASS (setting), key);
|
|
if (pspec) {
|
|
if (g_param_value_defaults (pspec, (GValue *) value)) {
|
|
g_key_file_remove_key (info->keyfile, setting_name, key, NULL);
|
|
return;
|
|
}
|
|
}
|
|
|
|
/* Don't write secrets that are owned by user secret agents or aren't
|
|
* supposed to be saved. VPN secrets are handled specially though since
|
|
* the secret flags there are in a third-level hash in the 'secrets'
|
|
* property.
|
|
*/
|
|
if (pspec && (pspec->flags & NM_SETTING_PARAM_SECRET) && !NM_IS_SETTING_VPN (setting)) {
|
|
NMSettingSecretFlags secret_flags = NM_SETTING_SECRET_FLAG_NONE;
|
|
|
|
nm_setting_get_secret_flags (setting, key, &secret_flags, NULL);
|
|
if (secret_flags != NM_SETTING_SECRET_FLAG_NONE)
|
|
return;
|
|
}
|
|
|
|
/* Look through the list of handlers for non-standard format key values */
|
|
while (writer->setting_name) {
|
|
if (!strcmp (writer->setting_name, setting_name) && !strcmp (writer->key, key)) {
|
|
(*writer->writer) (info->keyfile, info->keyfile_dir, info->uuid, setting, key, value);
|
|
return;
|
|
}
|
|
writer++;
|
|
}
|
|
|
|
if (type == G_TYPE_STRING) {
|
|
const char *str;
|
|
|
|
str = g_value_get_string (value);
|
|
if (str)
|
|
nm_keyfile_plugin_kf_set_string (info->keyfile, setting_name, key, str);
|
|
} else if (type == G_TYPE_UINT)
|
|
nm_keyfile_plugin_kf_set_integer (info->keyfile, setting_name, key, (int) g_value_get_uint (value));
|
|
else if (type == G_TYPE_INT)
|
|
nm_keyfile_plugin_kf_set_integer (info->keyfile, setting_name, key, g_value_get_int (value));
|
|
else if (type == G_TYPE_UINT64) {
|
|
char *numstr;
|
|
|
|
numstr = g_strdup_printf ("%" G_GUINT64_FORMAT, g_value_get_uint64 (value));
|
|
nm_keyfile_plugin_kf_set_value (info->keyfile, setting_name, key, numstr);
|
|
g_free (numstr);
|
|
} else if (type == G_TYPE_BOOLEAN) {
|
|
nm_keyfile_plugin_kf_set_boolean (info->keyfile, setting_name, key, g_value_get_boolean (value));
|
|
} else if (type == G_TYPE_CHAR) {
|
|
nm_keyfile_plugin_kf_set_integer (info->keyfile, setting_name, key, (int) g_value_get_schar (value));
|
|
} else if (type == DBUS_TYPE_G_UCHAR_ARRAY) {
|
|
GByteArray *array;
|
|
|
|
array = (GByteArray *) g_value_get_boxed (value);
|
|
if (array && array->len > 0) {
|
|
int *tmp_array;
|
|
int i;
|
|
|
|
tmp_array = g_new (gint, array->len);
|
|
for (i = 0; i < array->len; i++)
|
|
tmp_array[i] = (int) array->data[i];
|
|
|
|
nm_keyfile_plugin_kf_set_integer_list (info->keyfile, setting_name, key, tmp_array, array->len);
|
|
g_free (tmp_array);
|
|
}
|
|
} else if (type == DBUS_TYPE_G_LIST_OF_STRING) {
|
|
GSList *list;
|
|
GSList *iter;
|
|
|
|
list = (GSList *) g_value_get_boxed (value);
|
|
if (list) {
|
|
char **array;
|
|
int i = 0;
|
|
|
|
array = g_new (char *, g_slist_length (list));
|
|
for (iter = list; iter; iter = iter->next)
|
|
array[i++] = iter->data;
|
|
|
|
nm_keyfile_plugin_kf_set_string_list (info->keyfile, setting_name, key, (const gchar **const) array, i);
|
|
g_free (array);
|
|
}
|
|
} else if (type == DBUS_TYPE_G_MAP_OF_STRING) {
|
|
write_hash_of_string (info->keyfile, setting, key, value);
|
|
} else if (type == DBUS_TYPE_G_UINT_ARRAY) {
|
|
if (!write_array_of_uint (info->keyfile, setting, key, value)) {
|
|
nm_log_warn (LOGD_SETTINGS, "Unhandled setting property type (write) '%s/%s' : '%s'",
|
|
setting_name, key, g_type_name (type));
|
|
}
|
|
} else {
|
|
nm_log_warn (LOGD_SETTINGS, "Unhandled setting property type (write) '%s/%s' : '%s'",
|
|
setting_name, key, g_type_name (type));
|
|
}
|
|
}
|
|
|
|
static char *
|
|
_writer_id_to_filename (const char *id)
|
|
{
|
|
char *filename, *f;
|
|
const char *i = id;
|
|
|
|
f = filename = g_malloc0 (strlen (id) + 1);
|
|
|
|
/* Convert '/' to '*' */
|
|
while (*i) {
|
|
if (*i == '/')
|
|
*f++ = '*';
|
|
else
|
|
*f++ = *i;
|
|
i++;
|
|
}
|
|
|
|
return filename;
|
|
}
|
|
|
|
static gboolean
|
|
_internal_write_connection (NMConnection *connection,
|
|
const char *keyfile_dir,
|
|
uid_t owner_uid,
|
|
pid_t owner_grp,
|
|
const char *existing_path,
|
|
char **out_path,
|
|
GError **error)
|
|
{
|
|
GKeyFile *key_file;
|
|
char *data;
|
|
gsize len;
|
|
gboolean success = FALSE;
|
|
char *filename = NULL, *path;
|
|
const char *id;
|
|
WriteInfo info;
|
|
GError *local_err = NULL;
|
|
|
|
if (out_path)
|
|
g_return_val_if_fail (*out_path == NULL, FALSE);
|
|
|
|
id = nm_connection_get_id (connection);
|
|
if (!id) {
|
|
g_set_error (error, KEYFILE_PLUGIN_ERROR, 0,
|
|
"%s.%d: connection had no ID", __FILE__, __LINE__);
|
|
return FALSE;
|
|
}
|
|
|
|
info.keyfile = key_file = g_key_file_new ();
|
|
info.keyfile_dir = keyfile_dir;
|
|
info.uuid = nm_connection_get_uuid (connection);
|
|
g_assert (info.uuid);
|
|
nm_connection_for_each_setting_value (connection, write_setting_value, &info);
|
|
data = g_key_file_to_data (key_file, &len, error);
|
|
if (!data)
|
|
goto out;
|
|
|
|
/* If we have existing file path, use it. Else generate one from
|
|
* connection's ID.
|
|
*/
|
|
if (existing_path != NULL) {
|
|
path = g_strdup (existing_path);
|
|
} else {
|
|
filename = _writer_id_to_filename (id);
|
|
path = g_build_filename (keyfile_dir, filename, NULL);
|
|
}
|
|
|
|
/* If a file with this path already exists (but isn't the existing path
|
|
* of the connection) then we need another name. Multiple connections
|
|
* can have the same ID (ie if two connections with the same ID are visible
|
|
* to different users) but of course can't have the same path. Yeah,
|
|
* there's a race here, but there's not a lot we can do about it, and
|
|
* we shouldn't get more than one connection with the same UUID either.
|
|
*/
|
|
if (g_file_test (path, G_FILE_TEST_EXISTS) && (g_strcmp0 (path, existing_path) != 0)) {
|
|
/* A keyfile with this connection's ID already exists. Pick another name. */
|
|
g_free (path);
|
|
|
|
path = g_strdup_printf ("%s/%s-%s", keyfile_dir, filename, nm_connection_get_uuid (connection));
|
|
if (g_file_test (path, G_FILE_TEST_EXISTS)) {
|
|
if (existing_path == NULL || g_strcmp0 (path, existing_path) != 0) {
|
|
/* This should not happen. But, it actually occurs when
|
|
* two connections have the same UUID, and one of the connections
|
|
* is edited to contain the same ID as the other one.
|
|
* Give up.
|
|
*/
|
|
g_set_error (error, KEYFILE_PLUGIN_ERROR, 0,
|
|
"%s.%d: could not find suitable keyfile file name (%s already used)",
|
|
__FILE__, __LINE__, path);
|
|
g_free (path);
|
|
goto out;
|
|
}
|
|
}
|
|
}
|
|
|
|
/* In case of updating the connection and changing the file path,
|
|
* we need to remove the old one, not to end up with two connections.
|
|
*/
|
|
if (existing_path != NULL && strcmp (path, existing_path) != 0)
|
|
unlink (existing_path);
|
|
|
|
g_file_set_contents (path, data, len, &local_err);
|
|
if (local_err) {
|
|
g_set_error (error, KEYFILE_PLUGIN_ERROR, 0,
|
|
"%s.%d: error writing to file '%s': %s", __FILE__, __LINE__,
|
|
path, local_err->message);
|
|
g_error_free (local_err);
|
|
g_free (path);
|
|
goto out;
|
|
}
|
|
|
|
if (chown (path, owner_uid, owner_grp) < 0) {
|
|
g_set_error (error, KEYFILE_PLUGIN_ERROR, 0,
|
|
"%s.%d: error chowning '%s': %d", __FILE__, __LINE__,
|
|
path, errno);
|
|
unlink (path);
|
|
} else {
|
|
if (chmod (path, S_IRUSR | S_IWUSR) < 0) {
|
|
g_set_error (error, KEYFILE_PLUGIN_ERROR, 0,
|
|
"%s.%d: error setting permissions on '%s': %d", __FILE__,
|
|
__LINE__, path, errno);
|
|
unlink (path);
|
|
} else {
|
|
if (out_path && g_strcmp0 (existing_path, path)) {
|
|
*out_path = path; /* pass path out to caller */
|
|
path = NULL;
|
|
}
|
|
success = TRUE;
|
|
}
|
|
}
|
|
g_free (path);
|
|
|
|
out:
|
|
g_free (filename);
|
|
g_free (data);
|
|
g_key_file_free (key_file);
|
|
return success;
|
|
}
|
|
|
|
gboolean
|
|
nm_keyfile_plugin_write_connection (NMConnection *connection,
|
|
const char *existing_path,
|
|
char **out_path,
|
|
GError **error)
|
|
{
|
|
return _internal_write_connection (connection,
|
|
KEYFILE_DIR,
|
|
0, 0,
|
|
existing_path,
|
|
out_path,
|
|
error);
|
|
}
|
|
|
|
gboolean
|
|
nm_keyfile_plugin_write_test_connection (NMConnection *connection,
|
|
const char *keyfile_dir,
|
|
uid_t owner_uid,
|
|
pid_t owner_grp,
|
|
char **out_path,
|
|
GError **error)
|
|
{
|
|
return _internal_write_connection (connection,
|
|
keyfile_dir,
|
|
owner_uid, owner_grp,
|
|
NULL,
|
|
out_path,
|
|
error);
|
|
}
|
|
|