mirror of
https://gitlab.freedesktop.org/NetworkManager/NetworkManager.git
synced 2025-12-27 03:30:09 +01:00
So that normal users who have PolicyKit authorization to edit system connections can read secrets, move system connection secrets logic into the system connection service from libnm-glib, and protect it with PolicyKit checks. Convert the ifcfg-rh plugin over to using NMSysconfigConnection so that it can take advantage of the new PolicyKit protection.
1369 lines
36 KiB
C
1369 lines
36 KiB
C
/* -*- Mode: C; tab-width: 4; indent-tabs-mode: t; c-basic-offset: 4 -*- */
|
|
/* NetworkManager system settings service
|
|
*
|
|
* This program is free software; you can redistribute it and/or modify
|
|
* it under the terms of the GNU General Public License as published by
|
|
* the Free Software Foundation; either version 2 of the License, or
|
|
* (at your option) any later version.
|
|
*
|
|
* This program is distributed in the hope that it will be useful,
|
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
* GNU General Public License for more details.
|
|
*
|
|
* You should have received a copy of the GNU General Public License along
|
|
* with this program; if not, write to the Free Software Foundation, Inc.,
|
|
* 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA.
|
|
*
|
|
* Copyright (C) 2008 - 2009 Red Hat, Inc.
|
|
*/
|
|
|
|
#include <stdlib.h>
|
|
#include <string.h>
|
|
#include <sys/types.h>
|
|
#include <sys/socket.h>
|
|
#include <arpa/inet.h>
|
|
#include <ctype.h>
|
|
#include <sys/inotify.h>
|
|
#include <errno.h>
|
|
#include <net/if.h>
|
|
#include <sys/ioctl.h>
|
|
#include <unistd.h>
|
|
#include <netinet/ether.h>
|
|
|
|
#ifndef __user
|
|
#define __user
|
|
#endif
|
|
#include <linux/types.h>
|
|
#include <wireless.h>
|
|
#undef __user
|
|
|
|
#include <glib.h>
|
|
#include <nm-connection.h>
|
|
#include <NetworkManager.h>
|
|
#include <nm-setting-connection.h>
|
|
#include <nm-setting-ip4-config.h>
|
|
#include <nm-setting-wired.h>
|
|
#include <nm-setting-wireless.h>
|
|
#include <nm-setting-8021x.h>
|
|
#include <nm-utils.h>
|
|
|
|
#include "common.h"
|
|
#include "shvar.h"
|
|
#include "sha1.h"
|
|
|
|
#include "reader.h"
|
|
|
|
#define PLUGIN_PRINT(pname, fmt, args...) \
|
|
{ g_message (" " pname ": " fmt, ##args); }
|
|
|
|
#define PLUGIN_WARN(pname, fmt, args...) \
|
|
{ g_warning (" " pname ": " fmt, ##args); }
|
|
|
|
static char *
|
|
get_ifcfg_name (const char *file)
|
|
{
|
|
char *ifcfg_name;
|
|
char *basename;
|
|
|
|
basename = g_path_get_basename (file);
|
|
if (!basename)
|
|
return NULL;
|
|
|
|
ifcfg_name = g_strdup (basename + strlen (IFCFG_TAG));
|
|
g_free (basename);
|
|
return ifcfg_name;
|
|
}
|
|
|
|
static gboolean
|
|
get_int (const char *str, int *value)
|
|
{
|
|
char *e;
|
|
|
|
*value = strtol (str, &e, 0);
|
|
if (*e != '\0')
|
|
return FALSE;
|
|
|
|
return TRUE;
|
|
}
|
|
|
|
static NMSetting *
|
|
make_connection_setting (const char *file,
|
|
shvarFile *ifcfg,
|
|
const char *type,
|
|
const char *suggested)
|
|
{
|
|
NMSettingConnection *s_con;
|
|
char *ifcfg_name = NULL;
|
|
char *new_id = NULL, *uuid = NULL, *value;
|
|
|
|
ifcfg_name = get_ifcfg_name (file);
|
|
if (!ifcfg_name)
|
|
return NULL;
|
|
|
|
s_con = NM_SETTING_CONNECTION (nm_setting_connection_new ());
|
|
|
|
if (suggested) {
|
|
/* For cosmetic reasons, if the suggested name is the same as
|
|
* the ifcfg files name, don't use it.
|
|
*/
|
|
if (strcmp (ifcfg_name, suggested)) {
|
|
new_id = g_strdup_printf ("System %s (%s)", suggested, ifcfg_name);
|
|
g_object_set (s_con, NM_SETTING_CONNECTION_ID, new_id, NULL);
|
|
}
|
|
}
|
|
|
|
if (!nm_setting_connection_get_id (s_con)) {
|
|
new_id = g_strdup_printf ("System %s", ifcfg_name);
|
|
g_object_set (s_con, NM_SETTING_CONNECTION_ID, new_id, NULL);
|
|
}
|
|
|
|
g_free (new_id);
|
|
|
|
/* Try for a UUID key before falling back to hashing the file name */
|
|
uuid = svGetValue (ifcfg, "UUID", FALSE);
|
|
if (!uuid || !strlen (uuid)) {
|
|
g_free (uuid);
|
|
uuid = nm_utils_uuid_generate_from_string (ifcfg->fileName);
|
|
}
|
|
g_object_set (s_con,
|
|
NM_SETTING_CONNECTION_TYPE, type,
|
|
NM_SETTING_CONNECTION_UUID, uuid,
|
|
NULL);
|
|
g_free (uuid);
|
|
|
|
/* Missing ONBOOT is treated as "ONBOOT=true" by the old network service */
|
|
g_object_set (s_con, NM_SETTING_CONNECTION_AUTOCONNECT,
|
|
svTrueValue (ifcfg, "ONBOOT", TRUE),
|
|
NULL);
|
|
|
|
value = svGetValue (ifcfg, "LAST_CONNECT", FALSE);
|
|
if (value) {
|
|
unsigned long int tmp;
|
|
|
|
errno = 0;
|
|
tmp = strtoul (value, NULL, 10);
|
|
if (errno == 0)
|
|
g_object_set (s_con, NM_SETTING_CONNECTION_TIMESTAMP, tmp, NULL);
|
|
else
|
|
PLUGIN_WARN (IFCFG_PLUGIN_NAME, " warning: invalid LAST_CONNECT time");
|
|
g_free (value);
|
|
}
|
|
|
|
g_free (ifcfg_name);
|
|
return NM_SETTING (s_con);
|
|
}
|
|
|
|
static void
|
|
get_one_ip4_addr (shvarFile *ifcfg,
|
|
const char *tag,
|
|
guint32 *out_addr,
|
|
GError **error)
|
|
{
|
|
char *value = NULL;
|
|
struct in_addr ip4_addr;
|
|
|
|
g_return_if_fail (ifcfg != NULL);
|
|
g_return_if_fail (tag != NULL);
|
|
g_return_if_fail (out_addr != NULL);
|
|
g_return_if_fail (*out_addr == 0);
|
|
g_return_if_fail (error != NULL);
|
|
g_return_if_fail (*error == NULL);
|
|
|
|
value = svGetValue (ifcfg, tag, FALSE);
|
|
if (!value)
|
|
return;
|
|
|
|
if (inet_pton (AF_INET, value, &ip4_addr) > 0)
|
|
*out_addr = ip4_addr.s_addr;
|
|
else {
|
|
g_set_error (error, ifcfg_plugin_error_quark (), 0,
|
|
"Invalid %s IP4 address '%s'", tag, value);
|
|
}
|
|
g_free (value);
|
|
}
|
|
|
|
#define GET_ONE_DNS(tag) \
|
|
{ \
|
|
guint32 dns = 0; \
|
|
get_one_ip4_addr (ifcfg, tag, &dns, error); \
|
|
if (*error) \
|
|
goto error; \
|
|
if (dns) { \
|
|
if (!nm_setting_ip4_config_add_dns (s_ip4, dns)) \
|
|
PLUGIN_WARN (IFCFG_PLUGIN_NAME, " warning: duplicate DNS server %s", tag); \
|
|
} \
|
|
}
|
|
|
|
|
|
static NMSetting *
|
|
make_ip4_setting (shvarFile *ifcfg, const char *network_file, GError **error)
|
|
{
|
|
NMSettingIP4Config *s_ip4 = NULL;
|
|
char *value = NULL;
|
|
NMIP4Address *addr = NULL;
|
|
char *method = NM_SETTING_IP4_CONFIG_METHOD_MANUAL;
|
|
guint32 netmask = 0, tmp = 0;
|
|
shvarFile *network_ifcfg;
|
|
gboolean never_default = FALSE;
|
|
|
|
network_ifcfg = svNewFile (network_file);
|
|
if (network_ifcfg) {
|
|
char *gatewaydev;
|
|
|
|
/* Get the connection ifcfg device name and the global gateway device */
|
|
value = svGetValue (ifcfg, "DEVICE", FALSE);
|
|
gatewaydev = svGetValue (network_ifcfg, "GATEWAYDEV", FALSE);
|
|
|
|
/* If there was a global gateway device specified, then only connections
|
|
* for that device can be the default connection.
|
|
*/
|
|
if (gatewaydev && value && strcmp (value, gatewaydev))
|
|
never_default = TRUE;
|
|
|
|
g_free (gatewaydev);
|
|
g_free (value);
|
|
svCloseFile (network_ifcfg);
|
|
}
|
|
|
|
value = svGetValue (ifcfg, "BOOTPROTO", FALSE);
|
|
if (value) {
|
|
if (!g_ascii_strcasecmp (value, "bootp") || !g_ascii_strcasecmp (value, "dhcp"))
|
|
method = NM_SETTING_IP4_CONFIG_METHOD_AUTO;
|
|
else if (!g_ascii_strcasecmp (value, "autoip")) {
|
|
g_free (value);
|
|
s_ip4 = (NMSettingIP4Config *) nm_setting_ip4_config_new ();
|
|
g_object_set (s_ip4,
|
|
NM_SETTING_IP4_CONFIG_METHOD, NM_SETTING_IP4_CONFIG_METHOD_LINK_LOCAL,
|
|
NM_SETTING_IP4_CONFIG_NEVER_DEFAULT, never_default,
|
|
NULL);
|
|
return NM_SETTING (s_ip4);
|
|
}
|
|
g_free (value);
|
|
} else {
|
|
char *tmp_ip4, *tmp_prefix, *tmp_netmask;
|
|
|
|
/* If there is no BOOTPROTO, no IPADDR, no PREFIX, and no NETMASK,
|
|
* assume DHCP is to be used. Happens with minimal ifcfg files like:
|
|
*
|
|
* DEVICE=eth0
|
|
* HWADDR=11:22:33:44:55:66
|
|
*
|
|
*/
|
|
tmp_ip4 = svGetValue (ifcfg, "IPADDR", FALSE);
|
|
tmp_prefix = svGetValue (ifcfg, "PREFIX", FALSE);
|
|
tmp_netmask = svGetValue (ifcfg, "NETMASK", FALSE);
|
|
if (!tmp_ip4 && !tmp_prefix && !tmp_netmask)
|
|
method = NM_SETTING_IP4_CONFIG_METHOD_AUTO;
|
|
g_free (tmp_ip4);
|
|
g_free (tmp_prefix);
|
|
g_free (tmp_netmask);
|
|
}
|
|
|
|
/* Handle manual settings */
|
|
if (!strcmp (method, NM_SETTING_IP4_CONFIG_METHOD_MANUAL)) {
|
|
addr = nm_ip4_address_new ();
|
|
|
|
tmp = 0;
|
|
get_one_ip4_addr (ifcfg, "IPADDR", &tmp, error);
|
|
if (*error)
|
|
goto error;
|
|
nm_ip4_address_set_address (addr, tmp);
|
|
|
|
tmp = 0;
|
|
get_one_ip4_addr (ifcfg, "GATEWAY", &tmp, error);
|
|
if (*error)
|
|
goto error;
|
|
nm_ip4_address_set_gateway (addr, tmp);
|
|
|
|
/* If no gateway in the ifcfg, try /etc/sysconfig/network instead */
|
|
if (!nm_ip4_address_get_gateway (addr)) {
|
|
network_ifcfg = svNewFile (network_file);
|
|
if (network_ifcfg) {
|
|
tmp = 0;
|
|
get_one_ip4_addr (network_ifcfg, "GATEWAY", &tmp, error);
|
|
svCloseFile (network_ifcfg);
|
|
if (*error)
|
|
goto error;
|
|
nm_ip4_address_set_gateway (addr, tmp);
|
|
}
|
|
}
|
|
|
|
value = svGetValue (ifcfg, "PREFIX", FALSE);
|
|
if (value) {
|
|
long int prefix;
|
|
|
|
errno = 0;
|
|
prefix = strtol (value, NULL, 10);
|
|
if (errno || prefix <= 0 || prefix > 32) {
|
|
g_set_error (error, ifcfg_plugin_error_quark (), 0,
|
|
"Invalid IP4 prefix '%s'", value);
|
|
g_free (value);
|
|
goto error;
|
|
}
|
|
nm_ip4_address_set_prefix (addr, (guint32) prefix);
|
|
g_free (value);
|
|
}
|
|
|
|
/* Fall back to NETMASK if no PREFIX was specified */
|
|
if (!nm_ip4_address_get_prefix (addr)) {
|
|
netmask = 0;
|
|
get_one_ip4_addr (ifcfg, "NETMASK", &netmask, error);
|
|
if (*error)
|
|
goto error;
|
|
nm_ip4_address_set_prefix (addr, nm_utils_ip4_netmask_to_prefix (netmask));
|
|
}
|
|
|
|
/* Validate the prefix */
|
|
if ( !nm_ip4_address_get_prefix (addr)
|
|
|| nm_ip4_address_get_prefix (addr) > 32) {
|
|
g_set_error (error, ifcfg_plugin_error_quark (), 0,
|
|
"Missing or invalid IP4 prefix '%d'",
|
|
nm_ip4_address_get_prefix (addr));
|
|
goto error;
|
|
}
|
|
}
|
|
|
|
/* Yay, let's make an IP4 config */
|
|
s_ip4 = (NMSettingIP4Config *) nm_setting_ip4_config_new ();
|
|
g_object_set (s_ip4,
|
|
NM_SETTING_IP4_CONFIG_METHOD, method,
|
|
NM_SETTING_IP4_CONFIG_IGNORE_AUTO_DNS, !svTrueValue (ifcfg, "PEERDNS", 1),
|
|
NM_SETTING_IP4_CONFIG_NEVER_DEFAULT, never_default,
|
|
NULL);
|
|
|
|
/* DHCP hostname for 'send host-name' option */
|
|
if (!strcmp (method, NM_SETTING_IP4_CONFIG_METHOD_AUTO)) {
|
|
value = svGetValue (ifcfg, "DHCP_HOSTNAME", FALSE);
|
|
if (value && strlen (value))
|
|
g_object_set (s_ip4, NM_SETTING_IP4_CONFIG_DHCP_HOSTNAME, value, NULL);
|
|
g_free (value);
|
|
}
|
|
|
|
if (addr) {
|
|
if (!nm_setting_ip4_config_add_address (s_ip4, addr))
|
|
PLUGIN_WARN (IFCFG_PLUGIN_NAME, " warning: duplicate IP4 address");
|
|
}
|
|
|
|
GET_ONE_DNS("DNS1");
|
|
GET_ONE_DNS("DNS2");
|
|
GET_ONE_DNS("DNS3");
|
|
|
|
/* DNS searches */
|
|
value = svGetValue (ifcfg, "DOMAIN", FALSE);
|
|
if (value) {
|
|
char **searches = NULL;
|
|
|
|
searches = g_strsplit (value, " ", 0);
|
|
if (searches) {
|
|
char **item;
|
|
for (item = searches; *item; item++) {
|
|
if (strlen (*item)) {
|
|
if (!nm_setting_ip4_config_add_dns_search (s_ip4, *item))
|
|
PLUGIN_WARN (IFCFG_PLUGIN_NAME, " warning: duplicate DNS domain '%s'", *item);
|
|
}
|
|
}
|
|
g_strfreev (searches);
|
|
}
|
|
g_free (value);
|
|
}
|
|
|
|
/* Legacy value NM used for a while but is incorrect (rh #459370) */
|
|
if (!nm_setting_ip4_config_get_num_dns_searches (s_ip4)) {
|
|
value = svGetValue (ifcfg, "SEARCH", FALSE);
|
|
if (value) {
|
|
char **searches = NULL;
|
|
|
|
searches = g_strsplit (value, " ", 0);
|
|
if (searches) {
|
|
char **item;
|
|
for (item = searches; *item; item++) {
|
|
if (strlen (*item)) {
|
|
if (!nm_setting_ip4_config_add_dns_search (s_ip4, *item))
|
|
PLUGIN_WARN (IFCFG_PLUGIN_NAME, " warning: duplicate DNS search '%s'", *item);
|
|
}
|
|
}
|
|
g_strfreev (searches);
|
|
}
|
|
g_free (value);
|
|
}
|
|
}
|
|
|
|
if (addr)
|
|
nm_ip4_address_unref (addr);
|
|
|
|
return NM_SETTING (s_ip4);
|
|
|
|
error:
|
|
if (addr)
|
|
nm_ip4_address_unref (addr);
|
|
if (s_ip4)
|
|
g_object_unref (s_ip4);
|
|
return NULL;
|
|
}
|
|
|
|
/*
|
|
* utils_bin2hexstr
|
|
*
|
|
* Convert a byte-array into a hexadecimal string.
|
|
*
|
|
* Code originally by Alex Larsson <alexl@redhat.com> and
|
|
* copyright Red Hat, Inc. under terms of the LGPL.
|
|
*
|
|
*/
|
|
static char *
|
|
utils_bin2hexstr (const char *bytes, int len, int final_len)
|
|
{
|
|
static char hex_digits[] = "0123456789abcdef";
|
|
char * result;
|
|
int i;
|
|
|
|
g_return_val_if_fail (bytes != NULL, NULL);
|
|
g_return_val_if_fail (len > 0, NULL);
|
|
g_return_val_if_fail (len < 256, NULL); /* Arbitrary limit */
|
|
|
|
result = g_malloc0 (len * 2 + 1);
|
|
for (i = 0; i < len; i++)
|
|
{
|
|
result[2*i] = hex_digits[(bytes[i] >> 4) & 0xf];
|
|
result[2*i+1] = hex_digits[bytes[i] & 0xf];
|
|
}
|
|
/* Cut converted key off at the correct length for this cipher type */
|
|
if (final_len > -1)
|
|
result[final_len] = '\0';
|
|
|
|
return result;
|
|
}
|
|
|
|
static gboolean
|
|
read_mac_address (shvarFile *ifcfg, GByteArray **array, GError **error)
|
|
{
|
|
char *value = NULL;
|
|
struct ether_addr *mac;
|
|
|
|
g_return_val_if_fail (ifcfg != NULL, FALSE);
|
|
g_return_val_if_fail (array != NULL, FALSE);
|
|
g_return_val_if_fail (*array == NULL, FALSE);
|
|
g_return_val_if_fail (error != NULL, FALSE);
|
|
g_return_val_if_fail (*error == NULL, FALSE);
|
|
|
|
value = svGetValue (ifcfg, "HWADDR", FALSE);
|
|
if (!value || !strlen (value)) {
|
|
g_free (value);
|
|
return TRUE;
|
|
}
|
|
|
|
mac = ether_aton (value);
|
|
if (!mac) {
|
|
g_free (value);
|
|
g_set_error (error, ifcfg_plugin_error_quark (), 0,
|
|
"The MAC address '%s' was invalid.", value);
|
|
return FALSE;
|
|
}
|
|
|
|
g_free (value);
|
|
*array = g_byte_array_sized_new (ETH_ALEN);
|
|
g_byte_array_append (*array, (guint8 *) mac->ether_addr_octet, ETH_ALEN);
|
|
return TRUE;
|
|
}
|
|
|
|
static gboolean
|
|
add_one_wep_key (shvarFile *ifcfg,
|
|
const char *shvar_key,
|
|
guint8 key_idx,
|
|
NMSettingWirelessSecurity *s_wsec,
|
|
GError **error)
|
|
{
|
|
char *key = NULL;
|
|
char *value = NULL;
|
|
gboolean success = FALSE;
|
|
|
|
g_return_val_if_fail (ifcfg != NULL, FALSE);
|
|
g_return_val_if_fail (shvar_key != NULL, FALSE);
|
|
g_return_val_if_fail (key_idx <= 3, FALSE);
|
|
g_return_val_if_fail (s_wsec != NULL, FALSE);
|
|
|
|
value = svGetValue (ifcfg, shvar_key, FALSE);
|
|
if (!value || !strlen (value)) {
|
|
g_free (value);
|
|
return TRUE;
|
|
}
|
|
|
|
/* Validate keys */
|
|
if (strlen (value) == 10 || strlen (value) == 26) {
|
|
/* Hexadecimal WEP key */
|
|
char *p = value;
|
|
|
|
while (*p) {
|
|
if (!g_ascii_isxdigit (*p)) {
|
|
g_set_error (error, ifcfg_plugin_error_quark (), 0,
|
|
"Invalid hexadecimal WEP key.");
|
|
goto out;
|
|
}
|
|
p++;
|
|
}
|
|
key = g_strdup (value);
|
|
} else if ( strncmp (value, "s:", 2)
|
|
&& (strlen (value) == 7 || strlen (value) == 15)) {
|
|
/* ASCII passphrase */
|
|
char *p = value + 2;
|
|
|
|
while (*p) {
|
|
if (!isascii ((int) (*p))) {
|
|
g_set_error (error, ifcfg_plugin_error_quark (), 0,
|
|
"Invalid ASCII WEP passphrase.");
|
|
goto out;
|
|
}
|
|
p++;
|
|
}
|
|
|
|
key = utils_bin2hexstr (value, strlen (value), strlen (value) * 2);
|
|
} else {
|
|
g_set_error (error, ifcfg_plugin_error_quark (), 0, "Invalid WEP key length.");
|
|
}
|
|
|
|
if (key) {
|
|
nm_setting_wireless_security_set_wep_key (s_wsec, key_idx, key);
|
|
success = TRUE;
|
|
}
|
|
|
|
out:
|
|
g_free (value);
|
|
return success;
|
|
}
|
|
|
|
static char *
|
|
get_keys_file_path (const char *parent)
|
|
{
|
|
char *ifcfg_name;
|
|
char *keys_file = NULL;
|
|
char *tmp = NULL;
|
|
|
|
ifcfg_name = get_ifcfg_name (parent);
|
|
if (!ifcfg_name)
|
|
return NULL;
|
|
|
|
tmp = g_path_get_dirname (parent);
|
|
if (!tmp)
|
|
goto out;
|
|
|
|
keys_file = g_strdup_printf ("%s/" KEYS_TAG "%s", tmp, ifcfg_name);
|
|
|
|
out:
|
|
g_free (tmp);
|
|
g_free (ifcfg_name);
|
|
return keys_file;
|
|
}
|
|
|
|
static shvarFile *
|
|
get_keys_ifcfg (const char *parent)
|
|
{
|
|
shvarFile *ifcfg = NULL;
|
|
char *keys_file;
|
|
|
|
keys_file = get_keys_file_path (parent);
|
|
if (!keys_file)
|
|
return NULL;
|
|
|
|
ifcfg = svNewFile (keys_file);
|
|
g_free (keys_file);
|
|
return ifcfg;
|
|
}
|
|
|
|
static gboolean
|
|
read_wep_keys (shvarFile *ifcfg,
|
|
guint8 def_idx,
|
|
NMSettingWirelessSecurity *s_wsec,
|
|
GError **error)
|
|
{
|
|
if (!add_one_wep_key (ifcfg, "KEY1", 0, s_wsec, error))
|
|
return FALSE;
|
|
if (!add_one_wep_key (ifcfg, "KEY2", 1, s_wsec, error))
|
|
return FALSE;
|
|
if (!add_one_wep_key (ifcfg, "KEY3", 2, s_wsec, error))
|
|
return FALSE;
|
|
if (!add_one_wep_key (ifcfg, "KEY4", 3, s_wsec, error))
|
|
return FALSE;
|
|
if (!add_one_wep_key (ifcfg, "KEY", def_idx, s_wsec, error))
|
|
return FALSE;
|
|
|
|
return TRUE;
|
|
}
|
|
|
|
static NMSetting *
|
|
make_wep_setting (shvarFile *ifcfg,
|
|
const char *file,
|
|
GError **error)
|
|
{
|
|
NMSettingWirelessSecurity *s_wireless_sec;
|
|
char *value;
|
|
shvarFile *keys_ifcfg = NULL;
|
|
int default_key_idx = 0;
|
|
|
|
s_wireless_sec = NM_SETTING_WIRELESS_SECURITY (nm_setting_wireless_security_new ());
|
|
g_object_set (s_wireless_sec, NM_SETTING_WIRELESS_SECURITY_KEY_MGMT, "none", NULL);
|
|
|
|
value = svGetValue (ifcfg, "DEFAULTKEY", FALSE);
|
|
if (value) {
|
|
gboolean success;
|
|
|
|
success = get_int (value, &default_key_idx);
|
|
if (success && (default_key_idx >= 1) && (default_key_idx <= 4)) {
|
|
default_key_idx--; /* convert to [0...3] */
|
|
g_object_set (s_wireless_sec, NM_SETTING_WIRELESS_SECURITY_WEP_TX_KEYIDX, default_key_idx, NULL);
|
|
} else {
|
|
g_set_error (error, ifcfg_plugin_error_quark (), 0,
|
|
"Invalid default WEP key '%s'", value);
|
|
g_free (value);
|
|
goto error;
|
|
}
|
|
g_free (value);
|
|
}
|
|
|
|
/* Read keys in the ifcfg file */
|
|
if (!read_wep_keys (ifcfg, default_key_idx, s_wireless_sec, error))
|
|
goto error;
|
|
|
|
/* Try to get keys from the "shadow" key file */
|
|
keys_ifcfg = get_keys_ifcfg (file);
|
|
if (keys_ifcfg) {
|
|
if (!read_wep_keys (keys_ifcfg, default_key_idx, s_wireless_sec, error)) {
|
|
svCloseFile (keys_ifcfg);
|
|
goto error;
|
|
}
|
|
svCloseFile (keys_ifcfg);
|
|
}
|
|
|
|
/* If there's a default key, ensure that key exists */
|
|
if ((default_key_idx == 1) && !nm_setting_wireless_security_get_wep_key (s_wireless_sec, 1)) {
|
|
g_set_error (error, ifcfg_plugin_error_quark (), 0,
|
|
"Default WEP key index was 2, but no valid KEY2 exists.");
|
|
goto error;
|
|
} else if ((default_key_idx == 2) && !nm_setting_wireless_security_get_wep_key (s_wireless_sec, 2)) {
|
|
g_set_error (error, ifcfg_plugin_error_quark (), 0,
|
|
"Default WEP key index was 3, but no valid KEY3 exists.");
|
|
goto error;
|
|
} else if ((default_key_idx == 3) && !nm_setting_wireless_security_get_wep_key (s_wireless_sec, 3)) {
|
|
g_set_error (error, ifcfg_plugin_error_quark (), 0,
|
|
"Default WEP key index was 4, but no valid KEY4 exists.");
|
|
goto error;
|
|
}
|
|
|
|
value = svGetValue (ifcfg, "SECURITYMODE", FALSE);
|
|
if (value) {
|
|
char *lcase;
|
|
|
|
lcase = g_ascii_strdown (value, -1);
|
|
g_free (value);
|
|
|
|
if (!strcmp (lcase, "open")) {
|
|
g_object_set (s_wireless_sec, NM_SETTING_WIRELESS_SECURITY_AUTH_ALG, "open", NULL);
|
|
} else if (!strcmp (lcase, "restricted")) {
|
|
g_object_set (s_wireless_sec, NM_SETTING_WIRELESS_SECURITY_AUTH_ALG, "shared", NULL);
|
|
} else {
|
|
g_set_error (error, ifcfg_plugin_error_quark (), 0,
|
|
"Invalid WEP authentication algoritm '%s'",
|
|
lcase);
|
|
g_free (lcase);
|
|
goto error;
|
|
}
|
|
g_free (lcase);
|
|
}
|
|
|
|
if ( !nm_setting_wireless_security_get_wep_key (s_wireless_sec, 0)
|
|
&& !nm_setting_wireless_security_get_wep_key (s_wireless_sec, 1)
|
|
&& !nm_setting_wireless_security_get_wep_key (s_wireless_sec, 2)
|
|
&& !nm_setting_wireless_security_get_wep_key (s_wireless_sec, 3)
|
|
&& !nm_setting_wireless_security_get_wep_tx_keyidx (s_wireless_sec)) {
|
|
const char *auth_alg;
|
|
|
|
auth_alg = nm_setting_wireless_security_get_auth_alg (s_wireless_sec);
|
|
if (auth_alg && !strcmp (auth_alg, "shared")) {
|
|
g_set_error (error, ifcfg_plugin_error_quark (), 0,
|
|
"WEP Shared Key authentication is invalid for "
|
|
"unencrypted connections.");
|
|
goto error;
|
|
}
|
|
|
|
/* Unencrypted */
|
|
g_object_unref (s_wireless_sec);
|
|
s_wireless_sec = NULL;
|
|
}
|
|
|
|
return (NMSetting *) s_wireless_sec;
|
|
|
|
error:
|
|
if (s_wireless_sec)
|
|
g_object_unref (s_wireless_sec);
|
|
return NULL;
|
|
}
|
|
|
|
static gboolean
|
|
fill_wpa_ciphers (shvarFile *ifcfg,
|
|
NMSettingWirelessSecurity *wsec,
|
|
gboolean group,
|
|
gboolean adhoc)
|
|
{
|
|
char *value = NULL, *p;
|
|
char **list = NULL, **iter;
|
|
int i = 0;
|
|
|
|
p = value = svGetValue (ifcfg, group ? "CIPHER_GROUP" : "CIPHER_PAIRWISE", TRUE);
|
|
if (!value)
|
|
return TRUE;
|
|
|
|
/* Strip quotes */
|
|
if (p[0] == '"')
|
|
p++;
|
|
if (p[strlen (p) - 1] == '"')
|
|
p[strlen (p) - 1] = '\0';
|
|
|
|
list = g_strsplit_set (p, " ", 0);
|
|
for (iter = list; iter && *iter; iter++, i++) {
|
|
/* Ad-Hoc configurations cannot have pairwise ciphers, and can only
|
|
* have one group cipher. Ignore any additional group ciphers and
|
|
* any pairwise ciphers specified.
|
|
*/
|
|
if (adhoc) {
|
|
if (group && (i > 0)) {
|
|
PLUGIN_WARN (IFCFG_PLUGIN_NAME, " warning: ignoring group cipher '%s' (only one group cipher allowed in Ad-Hoc mode)",
|
|
*iter);
|
|
continue;
|
|
} else if (!group) {
|
|
PLUGIN_WARN (IFCFG_PLUGIN_NAME, " warning: ignoring pairwise cipher '%s' (pairwise not used in Ad-Hoc mode)",
|
|
*iter);
|
|
continue;
|
|
}
|
|
}
|
|
|
|
if (!strcmp (*iter, "CCMP")) {
|
|
if (group)
|
|
nm_setting_wireless_security_add_group (wsec, "ccmp");
|
|
else
|
|
nm_setting_wireless_security_add_pairwise (wsec, "ccmp");
|
|
} else if (!strcmp (*iter, "TKIP")) {
|
|
if (group)
|
|
nm_setting_wireless_security_add_group (wsec, "tkip");
|
|
else
|
|
nm_setting_wireless_security_add_pairwise (wsec, "tkip");
|
|
} else if (group && !strcmp (*iter, "WEP104"))
|
|
nm_setting_wireless_security_add_group (wsec, "wep104");
|
|
else if (group && !strcmp (*iter, "WEP40"))
|
|
nm_setting_wireless_security_add_group (wsec, "wep40");
|
|
else {
|
|
PLUGIN_WARN (IFCFG_PLUGIN_NAME, " warning: ignoring invalid %s cipher '%s'",
|
|
group ? "CIPHER_GROUP" : "CIPHER_PAIRWISE",
|
|
*iter);
|
|
}
|
|
}
|
|
|
|
if (list)
|
|
g_strfreev (list);
|
|
g_free (value);
|
|
return TRUE;
|
|
}
|
|
|
|
#define WPA_PMK_LEN 32
|
|
|
|
static char *
|
|
parse_wpa_psk (shvarFile *ifcfg,
|
|
const char *file,
|
|
const GByteArray *ssid,
|
|
GError **error)
|
|
{
|
|
shvarFile *keys_ifcfg;
|
|
char *psk = NULL, *p, *hashed = NULL;
|
|
|
|
/* Passphrase must be between 10 and 66 characters in length becuase WPA
|
|
* hex keys are exactly 64 characters (no quoting), and WPA passphrases
|
|
* are between 8 and 63 characters (inclusive), plus optional quoting if
|
|
* the passphrase contains spaces.
|
|
*/
|
|
|
|
/* Try to get keys from the "shadow" key file */
|
|
keys_ifcfg = get_keys_ifcfg (file);
|
|
if (keys_ifcfg) {
|
|
psk = svGetValue (keys_ifcfg, "WPA_PSK", TRUE);
|
|
svCloseFile (keys_ifcfg);
|
|
}
|
|
|
|
/* Fall back to the original ifcfg */
|
|
if (!psk)
|
|
psk = svGetValue (ifcfg, "WPA_PSK", TRUE);
|
|
|
|
if (!psk) {
|
|
g_set_error (error, ifcfg_plugin_error_quark (), 0,
|
|
"Missing WPA_PSK for WPA-PSK key management");
|
|
return NULL;
|
|
}
|
|
|
|
p = psk;
|
|
if (p[0] == '"' && psk[strlen (psk) - 1] == '"') {
|
|
unsigned char *buf;
|
|
|
|
/* Get rid of the quotes */
|
|
p++;
|
|
p[strlen (p) - 1] = '\0';
|
|
|
|
/* Length check */
|
|
if (strlen (p) < 8 || strlen (p) > 63) {
|
|
g_set_error (error, ifcfg_plugin_error_quark (), 0,
|
|
"Invalid WPA_PSK (passphrases must be between "
|
|
"8 and 63 characters long (inclusive))");
|
|
goto out;
|
|
}
|
|
|
|
/* hash the passphrase to a hex key */
|
|
buf = g_malloc0 (WPA_PMK_LEN * 2);
|
|
pbkdf2_sha1 (p, (char *) ssid->data, ssid->len, 4096, buf, WPA_PMK_LEN);
|
|
hashed = utils_bin2hexstr ((const char *) buf, WPA_PMK_LEN, WPA_PMK_LEN * 2);
|
|
g_free (buf);
|
|
} else if (strlen (psk) == 64) {
|
|
/* Verify the hex PSK; 64 digits */
|
|
while (*p) {
|
|
if (!isxdigit (*p++)) {
|
|
g_set_error (error, ifcfg_plugin_error_quark (), 0,
|
|
"Invalid WPA_PSK (contains non-hexadecimal characters)");
|
|
goto out;
|
|
}
|
|
}
|
|
hashed = g_strdup (psk);
|
|
} else {
|
|
g_set_error (error, ifcfg_plugin_error_quark (), 0,
|
|
"Invalid WPA_PSK (doesn't look like a passphrase or hex key)");
|
|
goto out;
|
|
}
|
|
|
|
out:
|
|
g_free (psk);
|
|
return hashed;
|
|
}
|
|
|
|
#if 0
|
|
static NMSetting8021x *
|
|
fill_8021x (shvarFile *ifcfg,
|
|
const char *file,
|
|
const char *key_mgmt,
|
|
GError **error)
|
|
{
|
|
return NULL;
|
|
}
|
|
#endif
|
|
|
|
static NMSetting *
|
|
make_wpa_setting (shvarFile *ifcfg,
|
|
const char *file,
|
|
const GByteArray *ssid,
|
|
gboolean adhoc,
|
|
NMSetting8021x **s_8021x,
|
|
GError **error)
|
|
{
|
|
NMSettingWirelessSecurity *wsec;
|
|
char *value, *psk;
|
|
|
|
wsec = NM_SETTING_WIRELESS_SECURITY (nm_setting_wireless_security_new ());
|
|
|
|
value = svGetValue (ifcfg, "KEY_MGMT", FALSE);
|
|
if (!value)
|
|
goto error; /* Not WPA or Dynamic WEP */
|
|
|
|
/* Pairwise and Group ciphers */
|
|
fill_wpa_ciphers (ifcfg, wsec, FALSE, adhoc);
|
|
fill_wpa_ciphers (ifcfg, wsec, TRUE, adhoc);
|
|
|
|
/* WPA and/or RSN */
|
|
if (adhoc) {
|
|
/* Ad-Hoc mode only supports WPA proto for now */
|
|
nm_setting_wireless_security_add_proto (wsec, "wpa");
|
|
} else {
|
|
if (svTrueValue (ifcfg, "WPA_ALLOW_WPA", TRUE))
|
|
nm_setting_wireless_security_add_proto (wsec, "wpa");
|
|
if (svTrueValue (ifcfg, "WPA_ALLOW_WPA2", TRUE))
|
|
nm_setting_wireless_security_add_proto (wsec, "rsn");
|
|
}
|
|
|
|
if (!strcmp (value, "WPA-PSK")) {
|
|
psk = parse_wpa_psk (ifcfg, file, ssid, error);
|
|
if (!psk)
|
|
goto error;
|
|
g_object_set (wsec, NM_SETTING_WIRELESS_SECURITY_PSK, psk, NULL);
|
|
g_free (psk);
|
|
|
|
if (adhoc)
|
|
g_object_set (wsec, NM_SETTING_WIRELESS_SECURITY_KEY_MGMT, "wpa-none", NULL);
|
|
else
|
|
g_object_set (wsec, NM_SETTING_WIRELESS_SECURITY_KEY_MGMT, "wpa-psk", NULL);
|
|
#if 0
|
|
} else if (!strcmp (value, "WPA-EAP") || !strcmp (value, "IEEE8021X")) {
|
|
/* Adhoc mode is mutually exclusive with any 802.1x-based authentication */
|
|
if (adhoc) {
|
|
g_set_error (error, ifcfg_plugin_error_quark (), 0,
|
|
"Ad-Hoc mode cannot be used with KEY_MGMT type '%s'", value);
|
|
goto error;
|
|
}
|
|
|
|
*s_8021x = fill_8021x (ifcfg, file, value, error);
|
|
if (!*s_8021x)
|
|
goto error;
|
|
#endif
|
|
} else {
|
|
g_set_error (error, ifcfg_plugin_error_quark (), 0,
|
|
"Unknown wireless KEY_MGMT type '%s'", value);
|
|
goto error;
|
|
}
|
|
|
|
g_free (value);
|
|
return (NMSetting *) wsec;
|
|
|
|
error:
|
|
g_free (value);
|
|
if (wsec)
|
|
g_object_unref (wsec);
|
|
return NULL;
|
|
}
|
|
|
|
static NMSetting *
|
|
make_wireless_security_setting (shvarFile *ifcfg,
|
|
const char *file,
|
|
const GByteArray *ssid,
|
|
gboolean adhoc,
|
|
NMSetting8021x **s_8021x,
|
|
GError **error)
|
|
{
|
|
NMSetting *wsec;
|
|
|
|
wsec = make_wpa_setting (ifcfg, file, ssid, adhoc, s_8021x, error);
|
|
if (wsec)
|
|
return wsec;
|
|
else if (*error)
|
|
return NULL;
|
|
|
|
wsec = make_wep_setting (ifcfg, file, error);
|
|
if (wsec)
|
|
return wsec;
|
|
else if (*error)
|
|
return NULL;
|
|
|
|
return NULL; /* unencrypted */
|
|
}
|
|
|
|
static NMSetting *
|
|
make_wireless_setting (shvarFile *ifcfg,
|
|
gboolean unmanaged,
|
|
GError **error)
|
|
{
|
|
NMSettingWireless *s_wireless;
|
|
GByteArray *array = NULL;
|
|
char *value;
|
|
|
|
s_wireless = NM_SETTING_WIRELESS (nm_setting_wireless_new ());
|
|
|
|
if (read_mac_address (ifcfg, &array, error)) {
|
|
g_object_set (s_wireless, NM_SETTING_WIRELESS_MAC_ADDRESS, array, NULL);
|
|
g_byte_array_free (array, TRUE);
|
|
} else {
|
|
g_object_unref (s_wireless);
|
|
return NULL;
|
|
}
|
|
|
|
value = svGetValue (ifcfg, "ESSID", FALSE);
|
|
if (value) {
|
|
gsize len = strlen (value);
|
|
|
|
if (len > 32 || len == 0) {
|
|
g_set_error (error, ifcfg_plugin_error_quark (), 0,
|
|
"Invalid SSID '%s' (size %zu not between 1 and 32 inclusive)",
|
|
value, len);
|
|
g_free (value);
|
|
goto error;
|
|
}
|
|
|
|
array = g_byte_array_sized_new (strlen (value));
|
|
g_byte_array_append (array, (const guint8 *) value, len);
|
|
g_free (value);
|
|
g_object_set (s_wireless, NM_SETTING_WIRELESS_SSID, array, NULL);
|
|
g_byte_array_free (array, TRUE);
|
|
} else {
|
|
/* Only fail on lack of SSID if device is managed */
|
|
if (!unmanaged) {
|
|
g_set_error (error, ifcfg_plugin_error_quark (), 0, "Missing SSID");
|
|
goto error;
|
|
}
|
|
}
|
|
|
|
if (!unmanaged) {
|
|
value = svGetValue (ifcfg, "MODE", FALSE);
|
|
if (value) {
|
|
char *lcase;
|
|
const char *mode = NULL;
|
|
|
|
lcase = g_ascii_strdown (value, -1);
|
|
g_free (value);
|
|
|
|
if (!strcmp (lcase, "ad-hoc")) {
|
|
mode = "adhoc";
|
|
} else if (!strcmp (lcase, "managed")) {
|
|
mode = "infrastructure";
|
|
} else {
|
|
g_set_error (error, ifcfg_plugin_error_quark (), 0,
|
|
"Invalid mode '%s' (not 'Ad-Hoc' or 'Managed')",
|
|
lcase);
|
|
g_free (lcase);
|
|
goto error;
|
|
}
|
|
g_free (lcase);
|
|
|
|
g_object_set (s_wireless, NM_SETTING_WIRELESS_MODE, mode, NULL);
|
|
}
|
|
// FIXME: channel/freq, other L2 parameters like RTS
|
|
}
|
|
|
|
return NM_SETTING (s_wireless);
|
|
|
|
error:
|
|
if (s_wireless)
|
|
g_object_unref (s_wireless);
|
|
return NULL;
|
|
}
|
|
|
|
static NMConnection *
|
|
wireless_connection_from_ifcfg (const char *file,
|
|
shvarFile *ifcfg,
|
|
gboolean unmanaged,
|
|
GError **error)
|
|
{
|
|
NMConnection *connection = NULL;
|
|
NMSetting *con_setting = NULL;
|
|
NMSetting *wireless_setting = NULL;
|
|
NMSetting8021x *s_8021x = NULL;
|
|
const GByteArray *ssid;
|
|
NMSetting *security_setting = NULL;
|
|
char *printable_ssid = NULL;
|
|
const char *mode;
|
|
gboolean adhoc = FALSE;
|
|
|
|
g_return_val_if_fail (file != NULL, NULL);
|
|
g_return_val_if_fail (ifcfg != NULL, NULL);
|
|
g_return_val_if_fail (error != NULL, NULL);
|
|
g_return_val_if_fail (*error == NULL, NULL);
|
|
|
|
connection = nm_connection_new ();
|
|
if (!connection) {
|
|
g_set_error (error, ifcfg_plugin_error_quark (), 0,
|
|
"Failed to allocate new connection for %s.", file);
|
|
return NULL;
|
|
}
|
|
|
|
/* Wireless */
|
|
wireless_setting = make_wireless_setting (ifcfg, unmanaged, error);
|
|
if (!wireless_setting) {
|
|
g_object_unref (connection);
|
|
return NULL;
|
|
}
|
|
nm_connection_add_setting (connection, wireless_setting);
|
|
|
|
ssid = nm_setting_wireless_get_ssid (NM_SETTING_WIRELESS (wireless_setting));
|
|
if (ssid)
|
|
printable_ssid = nm_utils_ssid_to_utf8 ((const char *) ssid->data, ssid->len);
|
|
else
|
|
printable_ssid = g_strdup_printf ("unmanaged");
|
|
|
|
if (!unmanaged) {
|
|
mode = nm_setting_wireless_get_mode (NM_SETTING_WIRELESS (wireless_setting));
|
|
if (mode && !strcmp (mode, "adhoc"))
|
|
adhoc = TRUE;
|
|
|
|
/* Wireless security */
|
|
security_setting = make_wireless_security_setting (ifcfg, file, ssid, adhoc, &s_8021x, error);
|
|
if (*error) {
|
|
g_object_unref (connection);
|
|
return NULL;
|
|
}
|
|
if (security_setting) {
|
|
nm_connection_add_setting (connection, security_setting);
|
|
if (s_8021x)
|
|
nm_connection_add_setting (connection, NM_SETTING (s_8021x));
|
|
|
|
g_object_set (wireless_setting, NM_SETTING_WIRELESS_SEC,
|
|
NM_SETTING_WIRELESS_SECURITY_SETTING_NAME, NULL);
|
|
}
|
|
}
|
|
|
|
/* Connection */
|
|
con_setting = make_connection_setting (file, ifcfg,
|
|
NM_SETTING_WIRELESS_SETTING_NAME,
|
|
printable_ssid);
|
|
g_free (printable_ssid);
|
|
if (!con_setting) {
|
|
g_set_error (error, ifcfg_plugin_error_quark (), 0,
|
|
"Failed to create connection setting.");
|
|
g_object_unref (connection);
|
|
return NULL;
|
|
}
|
|
nm_connection_add_setting (connection, con_setting);
|
|
|
|
/* Don't verify if unmanaged since we may not have an SSID or whatever */
|
|
if (!unmanaged) {
|
|
if (!nm_connection_verify (connection, error)) {
|
|
g_object_unref (connection);
|
|
return NULL;
|
|
}
|
|
}
|
|
|
|
return connection;
|
|
}
|
|
|
|
static NMSetting *
|
|
make_wired_setting (shvarFile *ifcfg, gboolean unmanaged, GError **error)
|
|
{
|
|
NMSettingWired *s_wired;
|
|
char *value;
|
|
int mtu;
|
|
GByteArray *mac = NULL;
|
|
|
|
s_wired = NM_SETTING_WIRED (nm_setting_wired_new ());
|
|
|
|
value = svGetValue (ifcfg, "MTU", FALSE);
|
|
if (value) {
|
|
if (get_int (value, &mtu)) {
|
|
if (mtu >= 0 && mtu < 65536)
|
|
g_object_set (s_wired, NM_SETTING_WIRED_MTU, mtu, NULL);
|
|
} else {
|
|
/* Shouldn't be fatal... */
|
|
PLUGIN_WARN (IFCFG_PLUGIN_NAME, " warning: invalid MTU '%s'", value);
|
|
}
|
|
g_free (value);
|
|
}
|
|
|
|
if (read_mac_address (ifcfg, &mac, error)) {
|
|
g_object_set (s_wired, NM_SETTING_WIRED_MAC_ADDRESS, mac, NULL);
|
|
g_byte_array_free (mac, TRUE);
|
|
} else {
|
|
g_object_unref (s_wired);
|
|
s_wired = NULL;
|
|
}
|
|
|
|
return (NMSetting *) s_wired;
|
|
}
|
|
|
|
static NMConnection *
|
|
wired_connection_from_ifcfg (const char *file,
|
|
shvarFile *ifcfg,
|
|
gboolean unmanaged,
|
|
GError **error)
|
|
{
|
|
NMConnection *connection = NULL;
|
|
NMSetting *con_setting = NULL;
|
|
NMSetting *wired_setting = NULL;
|
|
|
|
g_return_val_if_fail (file != NULL, NULL);
|
|
g_return_val_if_fail (ifcfg != NULL, NULL);
|
|
|
|
connection = nm_connection_new ();
|
|
if (!connection) {
|
|
g_set_error (error, ifcfg_plugin_error_quark (), 0,
|
|
"Failed to allocate new connection for %s.", file);
|
|
return NULL;
|
|
}
|
|
|
|
con_setting = make_connection_setting (file, ifcfg, NM_SETTING_WIRED_SETTING_NAME, NULL);
|
|
if (!con_setting) {
|
|
g_set_error (error, ifcfg_plugin_error_quark (), 0,
|
|
"Failed to create connection setting.");
|
|
g_object_unref (connection);
|
|
return NULL;
|
|
}
|
|
nm_connection_add_setting (connection, con_setting);
|
|
|
|
wired_setting = make_wired_setting (ifcfg, unmanaged, error);
|
|
if (!wired_setting) {
|
|
g_object_unref (connection);
|
|
return NULL;
|
|
}
|
|
nm_connection_add_setting (connection, wired_setting);
|
|
|
|
if (!nm_connection_verify (connection, error)) {
|
|
g_object_unref (connection);
|
|
return NULL;
|
|
}
|
|
|
|
return connection;
|
|
}
|
|
|
|
static gboolean
|
|
is_wireless_device (const char *iface)
|
|
{
|
|
int fd;
|
|
struct iw_range range;
|
|
struct iwreq wrq;
|
|
gboolean is_wireless = FALSE;
|
|
|
|
g_return_val_if_fail (iface != NULL, FALSE);
|
|
|
|
fd = socket(AF_INET, SOCK_DGRAM, 0);
|
|
if (!fd)
|
|
return FALSE;
|
|
|
|
memset (&wrq, 0, sizeof (struct iwreq));
|
|
memset (&range, 0, sizeof (struct iw_range));
|
|
strncpy (wrq.ifr_name, iface, IFNAMSIZ);
|
|
wrq.u.data.pointer = (caddr_t) ⦥
|
|
wrq.u.data.length = sizeof (struct iw_range);
|
|
|
|
if (ioctl (fd, SIOCGIWRANGE, &wrq) == 0)
|
|
is_wireless = TRUE;
|
|
else {
|
|
if (errno == EOPNOTSUPP)
|
|
is_wireless = FALSE;
|
|
else {
|
|
/* Sigh... some wired devices (kvm/qemu) return EINVAL when the
|
|
* device is down even though it's not a wireless device. So try
|
|
* IWNAME as a fallback.
|
|
*/
|
|
memset (&wrq, 0, sizeof (struct iwreq));
|
|
strncpy (wrq.ifr_name, iface, IFNAMSIZ);
|
|
if (ioctl (fd, SIOCGIWNAME, &wrq) == 0)
|
|
is_wireless = TRUE;
|
|
}
|
|
}
|
|
|
|
close (fd);
|
|
return is_wireless;
|
|
}
|
|
|
|
NMConnection *
|
|
connection_from_file (const char *filename,
|
|
const char *network_file,
|
|
const char *test_type, /* for unit tests only */
|
|
gboolean *ignored,
|
|
char **keyfile,
|
|
GError **error,
|
|
gboolean *ignore_error)
|
|
{
|
|
NMConnection *connection = NULL;
|
|
NMSettingConnection *s_con;
|
|
shvarFile *parsed;
|
|
char *type;
|
|
char *nmc = NULL;
|
|
NMSetting *s_ip4;
|
|
char *ifcfg_name = NULL;
|
|
|
|
g_return_val_if_fail (filename != NULL, NULL);
|
|
g_return_val_if_fail (ignored != NULL, NULL);
|
|
g_return_val_if_fail (keyfile != NULL, NULL);
|
|
g_return_val_if_fail (*keyfile == NULL, NULL);
|
|
|
|
/* Non-NULL only for unit tests; normally use /etc/sysconfig/network */
|
|
if (!network_file)
|
|
network_file = SYSCONFDIR "/sysconfig/network";
|
|
|
|
ifcfg_name = get_ifcfg_name (filename);
|
|
if (!ifcfg_name) {
|
|
g_set_error (error, ifcfg_plugin_error_quark (), 0,
|
|
"Ignoring connection '%s' because it's not an ifcfg file.", filename);
|
|
return NULL;
|
|
}
|
|
g_free (ifcfg_name);
|
|
|
|
parsed = svNewFile (filename);
|
|
if (!parsed) {
|
|
g_set_error (error, ifcfg_plugin_error_quark (), 0,
|
|
"Couldn't parse file '%s'", filename);
|
|
return NULL;
|
|
}
|
|
|
|
type = svGetValue (parsed, "TYPE", FALSE);
|
|
if (!type) {
|
|
char *device;
|
|
|
|
/* If no type, if the device has wireless extensions, it's wifi,
|
|
* otherwise it's ethernet.
|
|
*/
|
|
device = svGetValue (parsed, "DEVICE", FALSE);
|
|
if (!device) {
|
|
g_set_error (error, ifcfg_plugin_error_quark (), 0,
|
|
"File '%s' had neither TYPE nor DEVICE keys.", filename);
|
|
goto done;
|
|
}
|
|
|
|
if (!strcmp (device, "lo")) {
|
|
*ignore_error = TRUE;
|
|
g_set_error (error, ifcfg_plugin_error_quark (), 0,
|
|
"Ignoring loopback device config.");
|
|
g_free (device);
|
|
goto done;
|
|
}
|
|
|
|
if (!test_type) {
|
|
/* Test wireless extensions */
|
|
if (is_wireless_device (device))
|
|
type = g_strdup (TYPE_WIRELESS);
|
|
else
|
|
type = g_strdup (TYPE_ETHERNET);
|
|
} else {
|
|
/* For the unit tests, there won't necessarily be any
|
|
* adapters of the connection's type in the system so the
|
|
* type can't be tested with ioctls.
|
|
*/
|
|
type = g_strdup (test_type);
|
|
}
|
|
|
|
g_free (device);
|
|
}
|
|
|
|
nmc = svGetValue (parsed, "NM_CONTROLLED", FALSE);
|
|
if (nmc) {
|
|
char *lower;
|
|
|
|
lower = g_ascii_strdown (nmc, -1);
|
|
g_free (nmc);
|
|
|
|
if (!strcmp (lower, "no") || !strcmp (lower, "n") || !strcmp (lower, "false"))
|
|
*ignored = TRUE;
|
|
g_free (lower);
|
|
}
|
|
|
|
if (!strcasecmp (type, TYPE_ETHERNET))
|
|
connection = wired_connection_from_ifcfg (filename, parsed, *ignored, error);
|
|
else if (!strcasecmp (type, TYPE_WIRELESS))
|
|
connection = wireless_connection_from_ifcfg (filename, parsed, *ignored, error);
|
|
else {
|
|
g_set_error (error, ifcfg_plugin_error_quark (), 0,
|
|
"Unknown connection type '%s'", type);
|
|
}
|
|
|
|
g_free (type);
|
|
|
|
/* We don't write connections yet */
|
|
if (connection) {
|
|
s_con = (NMSettingConnection *) nm_connection_get_setting (connection, NM_TYPE_SETTING_CONNECTION);
|
|
// if (s_con)
|
|
// g_object_set (s_con, NM_SETTING_CONNECTION_READ_ONLY, TRUE, NULL);
|
|
}
|
|
|
|
/* Don't bother reading the connection fully if it's unmanaged */
|
|
if (!connection || *ignored)
|
|
goto done;
|
|
|
|
s_ip4 = make_ip4_setting (parsed, network_file, error);
|
|
if (*error) {
|
|
g_object_unref (connection);
|
|
connection = NULL;
|
|
goto done;
|
|
} else if (s_ip4) {
|
|
nm_connection_add_setting (connection, s_ip4);
|
|
}
|
|
|
|
if (!nm_connection_verify (connection, error)) {
|
|
g_object_unref (connection);
|
|
connection = NULL;
|
|
}
|
|
|
|
*keyfile = get_keys_file_path (filename);
|
|
|
|
done:
|
|
svCloseFile (parsed);
|
|
return connection;
|
|
}
|
|
|
|
|