mirror of
https://gitlab.freedesktop.org/NetworkManager/NetworkManager.git
synced 2026-01-17 14:00:22 +01:00
The fact that NMRemoteConnection has to be an NMConnection and therefore can't be an NMObject means that it needs to reimplement bits of NMObject functionality (and likewise NMObject needs some special magic to deal with it). Likewise, we will need a daemon-side equivalent of NMObject as part of the gdbus port, and we would want NMSettingsConnection to be able to inherit from this as well. Solve this problem by making NMConnection into an interface, and having NMRemoteConnection and NMSettingsConnection implement it. (We use some hacks to keep the GHashTable of NMSettings objects inside nm-connection.c rather than having to be implemented by the implementations.) Since NMConnection is no longer an instantiable type, this adds NMSimpleConnection to replace the various non-D-Bus-based uses of NMConnection throughout the code. nm_connection_new() becomes nm_simple_connection_new(), nm_connection_new_from_hash() becomes nm_simple_connection_new_from_hash(), and nm_connection_duplicate() becomes nm_simple_connection_new_clone().
2055 lines
67 KiB
C
2055 lines
67 KiB
C
/* -*- Mode: C; tab-width: 4; indent-tabs-mode: t; c-basic-offset: 4 -*- */
|
|
/* NetworkManager system settings service
|
|
*
|
|
* Søren Sandmann <sandmann@daimi.au.dk>
|
|
* Dan Williams <dcbw@redhat.com>
|
|
* Tambet Ingo <tambet@gmail.com>
|
|
*
|
|
* This program is free software; you can redistribute it and/or modify
|
|
* it under the terms of the GNU General Public License as published by
|
|
* the Free Software Foundation; either version 2 of the License, or
|
|
* (at your option) any later version.
|
|
*
|
|
* This program is distributed in the hope that it will be useful,
|
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
* GNU General Public License for more details.
|
|
*
|
|
* You should have received a copy of the GNU General Public License along
|
|
* with this program; if not, write to the Free Software Foundation, Inc.,
|
|
* 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA.
|
|
*
|
|
* (C) Copyright 2007 - 2011 Red Hat, Inc.
|
|
* (C) Copyright 2008 Novell, Inc.
|
|
*/
|
|
|
|
#include "config.h"
|
|
|
|
#include <unistd.h>
|
|
#include <string.h>
|
|
#include <gmodule.h>
|
|
#include <pwd.h>
|
|
#include <dbus/dbus.h>
|
|
#include <dbus/dbus-glib-lowlevel.h>
|
|
|
|
#include <nm-dbus-interface.h>
|
|
#include <nm-connection.h>
|
|
#include <nm-setting-8021x.h>
|
|
#include <nm-setting-bluetooth.h>
|
|
#include <nm-setting-cdma.h>
|
|
#include <nm-setting-connection.h>
|
|
#include <nm-setting-gsm.h>
|
|
#include <nm-setting-ip4-config.h>
|
|
#include <nm-setting-ip6-config.h>
|
|
#include <nm-setting-olpc-mesh.h>
|
|
#include <nm-setting-ppp.h>
|
|
#include <nm-setting-pppoe.h>
|
|
#include <nm-setting-serial.h>
|
|
#include <nm-setting-vpn.h>
|
|
#include <nm-setting-wired.h>
|
|
#include <nm-setting-adsl.h>
|
|
#include <nm-setting-wireless.h>
|
|
#include <nm-setting-wireless-security.h>
|
|
#include <nm-setting-bond.h>
|
|
#include <nm-utils.h>
|
|
|
|
#include "nm-device-ethernet.h"
|
|
#include "nm-dbus-glib-types.h"
|
|
#include "nm-settings.h"
|
|
#include "nm-settings-connection.h"
|
|
#include "nm-settings-error.h"
|
|
#include "nm-system-config-interface.h"
|
|
#include "nm-logging.h"
|
|
#include "nm-dbus-manager.h"
|
|
#include "nm-manager-auth.h"
|
|
#include "nm-auth-subject.h"
|
|
#include "nm-session-monitor.h"
|
|
#include "plugins/keyfile/plugin.h"
|
|
#include "nm-agent-manager.h"
|
|
#include "nm-settings-utils.h"
|
|
#include "nm-connection-provider.h"
|
|
#include "nm-config.h"
|
|
#include "NetworkManagerUtils.h"
|
|
|
|
/* LINKER CRACKROCK */
|
|
#define EXPORT(sym) void * __export_##sym = &sym;
|
|
|
|
#include "nm-inotify-helper.h"
|
|
EXPORT(nm_inotify_helper_get_type)
|
|
EXPORT(nm_inotify_helper_get)
|
|
EXPORT(nm_inotify_helper_add_watch)
|
|
EXPORT(nm_inotify_helper_remove_watch)
|
|
|
|
EXPORT(nm_settings_connection_get_type)
|
|
EXPORT(nm_settings_connection_replace_settings)
|
|
EXPORT(nm_settings_connection_replace_and_commit)
|
|
/* END LINKER CRACKROCK */
|
|
|
|
static void claim_connection (NMSettings *self,
|
|
NMSettingsConnection *connection,
|
|
gboolean do_export);
|
|
|
|
static gboolean impl_settings_list_connections (NMSettings *self,
|
|
GPtrArray **connections,
|
|
GError **error);
|
|
|
|
static void impl_settings_get_connection_by_uuid (NMSettings *self,
|
|
const char *uuid,
|
|
DBusGMethodInvocation *context);
|
|
|
|
static void impl_settings_add_connection (NMSettings *self,
|
|
GHashTable *settings,
|
|
DBusGMethodInvocation *context);
|
|
|
|
static void impl_settings_add_connection_unsaved (NMSettings *self,
|
|
GHashTable *settings,
|
|
DBusGMethodInvocation *context);
|
|
|
|
static void impl_settings_load_connections (NMSettings *self,
|
|
char **filenames,
|
|
DBusGMethodInvocation *context);
|
|
|
|
static void impl_settings_reload_connections (NMSettings *self,
|
|
DBusGMethodInvocation *context);
|
|
|
|
static void impl_settings_save_hostname (NMSettings *self,
|
|
const char *hostname,
|
|
DBusGMethodInvocation *context);
|
|
|
|
#include "nm-settings-glue.h"
|
|
|
|
static void unmanaged_specs_changed (NMSystemConfigInterface *config, gpointer user_data);
|
|
static void unrecognized_specs_changed (NMSystemConfigInterface *config, gpointer user_data);
|
|
|
|
static void connection_provider_init (NMConnectionProvider *cp_class);
|
|
|
|
G_DEFINE_TYPE_EXTENDED (NMSettings, nm_settings, G_TYPE_OBJECT, 0,
|
|
G_IMPLEMENT_INTERFACE (NM_TYPE_CONNECTION_PROVIDER, connection_provider_init))
|
|
|
|
|
|
typedef struct {
|
|
NMDBusManager *dbus_mgr;
|
|
|
|
NMAgentManager *agent_mgr;
|
|
|
|
NMConfig *config;
|
|
|
|
GSList *auths;
|
|
|
|
GSList *plugins;
|
|
gboolean connections_loaded;
|
|
GHashTable *connections;
|
|
GSList *unmanaged_specs;
|
|
GSList *unrecognized_specs;
|
|
GSList *get_connections_cache;
|
|
} NMSettingsPrivate;
|
|
|
|
#define NM_SETTINGS_GET_PRIVATE(o) (G_TYPE_INSTANCE_GET_PRIVATE ((o), NM_TYPE_SETTINGS, NMSettingsPrivate))
|
|
|
|
enum {
|
|
PROPERTIES_CHANGED,
|
|
CONNECTION_ADDED,
|
|
CONNECTION_UPDATED,
|
|
CONNECTION_UPDATED_BY_USER,
|
|
CONNECTION_REMOVED,
|
|
CONNECTION_VISIBILITY_CHANGED,
|
|
AGENT_REGISTERED,
|
|
|
|
NEW_CONNECTION, /* exported, not used internally */
|
|
LAST_SIGNAL
|
|
};
|
|
static guint signals[LAST_SIGNAL] = { 0 };
|
|
|
|
enum {
|
|
PROP_0,
|
|
PROP_UNMANAGED_SPECS,
|
|
PROP_HOSTNAME,
|
|
PROP_CAN_MODIFY,
|
|
PROP_CONNECTIONS,
|
|
|
|
LAST_PROP
|
|
};
|
|
|
|
static void
|
|
plugin_connection_added (NMSystemConfigInterface *config,
|
|
NMSettingsConnection *connection,
|
|
gpointer user_data)
|
|
{
|
|
claim_connection (NM_SETTINGS (user_data), connection, TRUE);
|
|
}
|
|
|
|
static void
|
|
load_connections (NMSettings *self)
|
|
{
|
|
NMSettingsPrivate *priv = NM_SETTINGS_GET_PRIVATE (self);
|
|
GSList *iter;
|
|
|
|
for (iter = priv->plugins; iter; iter = g_slist_next (iter)) {
|
|
NMSystemConfigInterface *plugin = NM_SYSTEM_CONFIG_INTERFACE (iter->data);
|
|
GSList *plugin_connections;
|
|
GSList *elt;
|
|
|
|
plugin_connections = nm_system_config_interface_get_connections (plugin);
|
|
|
|
// FIXME: ensure connections from plugins loaded with a lower priority
|
|
// get rejected when they conflict with connections from a higher
|
|
// priority plugin.
|
|
|
|
for (elt = plugin_connections; elt; elt = g_slist_next (elt))
|
|
claim_connection (self, NM_SETTINGS_CONNECTION (elt->data), TRUE);
|
|
|
|
g_slist_free (plugin_connections);
|
|
|
|
g_signal_connect (plugin, NM_SYSTEM_CONFIG_INTERFACE_CONNECTION_ADDED,
|
|
G_CALLBACK (plugin_connection_added), self);
|
|
g_signal_connect (plugin, NM_SYSTEM_CONFIG_INTERFACE_UNMANAGED_SPECS_CHANGED,
|
|
G_CALLBACK (unmanaged_specs_changed), self);
|
|
g_signal_connect (plugin, NM_SYSTEM_CONFIG_INTERFACE_UNRECOGNIZED_SPECS_CHANGED,
|
|
G_CALLBACK (unrecognized_specs_changed), self);
|
|
}
|
|
|
|
priv->connections_loaded = TRUE;
|
|
|
|
unmanaged_specs_changed (NULL, self);
|
|
unrecognized_specs_changed (NULL, self);
|
|
}
|
|
|
|
void
|
|
nm_settings_for_each_connection (NMSettings *self,
|
|
NMSettingsForEachFunc for_each_func,
|
|
gpointer user_data)
|
|
{
|
|
NMSettingsPrivate *priv;
|
|
GHashTableIter iter;
|
|
gpointer data;
|
|
|
|
g_return_if_fail (NM_IS_SETTINGS (self));
|
|
g_return_if_fail (for_each_func != NULL);
|
|
|
|
priv = NM_SETTINGS_GET_PRIVATE (self);
|
|
|
|
g_hash_table_iter_init (&iter, priv->connections);
|
|
while (g_hash_table_iter_next (&iter, NULL, &data))
|
|
for_each_func (self, NM_SETTINGS_CONNECTION (data), user_data);
|
|
}
|
|
|
|
static gboolean
|
|
impl_settings_list_connections (NMSettings *self,
|
|
GPtrArray **connections,
|
|
GError **error)
|
|
{
|
|
NMSettingsPrivate *priv = NM_SETTINGS_GET_PRIVATE (self);
|
|
GHashTableIter iter;
|
|
gpointer key;
|
|
|
|
*connections = g_ptr_array_sized_new (g_hash_table_size (priv->connections) + 1);
|
|
g_hash_table_iter_init (&iter, priv->connections);
|
|
while (g_hash_table_iter_next (&iter, &key, NULL))
|
|
g_ptr_array_add (*connections, g_strdup ((const char *) key));
|
|
return TRUE;
|
|
}
|
|
|
|
NMSettingsConnection *
|
|
nm_settings_get_connection_by_uuid (NMSettings *self, const char *uuid)
|
|
{
|
|
NMSettingsPrivate *priv;
|
|
NMSettingsConnection *candidate;
|
|
GHashTableIter iter;
|
|
|
|
g_return_val_if_fail (NM_IS_SETTINGS (self), NULL);
|
|
g_return_val_if_fail (uuid != NULL, NULL);
|
|
|
|
priv = NM_SETTINGS_GET_PRIVATE (self);
|
|
|
|
g_hash_table_iter_init (&iter, priv->connections);
|
|
while (g_hash_table_iter_next (&iter, NULL, (gpointer) &candidate)) {
|
|
if (g_strcmp0 (uuid, nm_connection_get_uuid (NM_CONNECTION (candidate))) == 0)
|
|
return candidate;
|
|
}
|
|
|
|
return NULL;
|
|
}
|
|
|
|
static void
|
|
impl_settings_get_connection_by_uuid (NMSettings *self,
|
|
const char *uuid,
|
|
DBusGMethodInvocation *context)
|
|
{
|
|
NMSettingsConnection *connection = NULL;
|
|
NMAuthSubject *subject = NULL;
|
|
GError *error = NULL;
|
|
char *error_desc = NULL;
|
|
|
|
connection = nm_settings_get_connection_by_uuid (self, uuid);
|
|
if (!connection) {
|
|
error = g_error_new_literal (NM_SETTINGS_ERROR,
|
|
NM_SETTINGS_ERROR_INVALID_CONNECTION,
|
|
"No connection with the UUID was found.");
|
|
goto error;
|
|
}
|
|
|
|
subject = nm_auth_subject_new_from_context (context);
|
|
if (!subject) {
|
|
error = g_error_new_literal (NM_SETTINGS_ERROR,
|
|
NM_SETTINGS_ERROR_PERMISSION_DENIED,
|
|
"Unable to determine UID of request.");
|
|
goto error;
|
|
}
|
|
|
|
if (!nm_auth_uid_in_acl (NM_CONNECTION (connection),
|
|
nm_session_monitor_get (),
|
|
nm_auth_subject_get_uid (subject),
|
|
&error_desc)) {
|
|
error = g_error_new_literal (NM_SETTINGS_ERROR,
|
|
NM_SETTINGS_ERROR_PERMISSION_DENIED,
|
|
error_desc);
|
|
g_free (error_desc);
|
|
goto error;
|
|
}
|
|
|
|
g_clear_object (&subject);
|
|
dbus_g_method_return (context, nm_connection_get_path (NM_CONNECTION (connection)));
|
|
return;
|
|
|
|
error:
|
|
g_assert (error);
|
|
dbus_g_method_return_error (context, error);
|
|
g_error_free (error);
|
|
g_clear_object (&subject);
|
|
}
|
|
|
|
static int
|
|
connection_sort (gconstpointer pa, gconstpointer pb)
|
|
{
|
|
NMConnection *a = NM_CONNECTION (pa);
|
|
NMSettingConnection *con_a;
|
|
NMConnection *b = NM_CONNECTION (pb);
|
|
NMSettingConnection *con_b;
|
|
guint64 ts_a = 0, ts_b = 0;
|
|
|
|
con_a = nm_connection_get_setting_connection (a);
|
|
g_assert (con_a);
|
|
con_b = nm_connection_get_setting_connection (b);
|
|
g_assert (con_b);
|
|
|
|
if (nm_setting_connection_get_autoconnect (con_a) != nm_setting_connection_get_autoconnect (con_b)) {
|
|
if (nm_setting_connection_get_autoconnect (con_a))
|
|
return -1;
|
|
return 1;
|
|
}
|
|
|
|
nm_settings_connection_get_timestamp (NM_SETTINGS_CONNECTION (pa), &ts_a);
|
|
nm_settings_connection_get_timestamp (NM_SETTINGS_CONNECTION (pb), &ts_b);
|
|
if (ts_a > ts_b)
|
|
return -1;
|
|
else if (ts_a == ts_b)
|
|
return 0;
|
|
return 1;
|
|
}
|
|
|
|
/* Returns a list of NMSettingsConnections.
|
|
* The list is sorted in the order suitable for auto-connecting, i.e.
|
|
* first go connections with autoconnect=yes and most recent timestamp.
|
|
* Caller must free the list with g_slist_free().
|
|
*/
|
|
GSList *
|
|
nm_settings_get_connections (NMSettings *self)
|
|
{
|
|
GHashTableIter iter;
|
|
gpointer data = NULL;
|
|
GSList *list = NULL;
|
|
|
|
g_return_val_if_fail (NM_IS_SETTINGS (self), NULL);
|
|
|
|
g_hash_table_iter_init (&iter, NM_SETTINGS_GET_PRIVATE (self)->connections);
|
|
while (g_hash_table_iter_next (&iter, NULL, &data))
|
|
list = g_slist_insert_sorted (list, data, connection_sort);
|
|
return list;
|
|
}
|
|
|
|
NMSettingsConnection *
|
|
nm_settings_get_connection_by_path (NMSettings *self, const char *path)
|
|
{
|
|
NMSettingsPrivate *priv;
|
|
|
|
g_return_val_if_fail (NM_IS_SETTINGS (self), NULL);
|
|
g_return_val_if_fail (path != NULL, NULL);
|
|
|
|
priv = NM_SETTINGS_GET_PRIVATE (self);
|
|
|
|
return (NMSettingsConnection *) g_hash_table_lookup (priv->connections, path);
|
|
}
|
|
|
|
static char*
|
|
uscore_to_wincaps (const char *uscore)
|
|
{
|
|
const char *p;
|
|
GString *str;
|
|
gboolean last_was_uscore;
|
|
|
|
last_was_uscore = TRUE;
|
|
|
|
str = g_string_new (NULL);
|
|
p = uscore;
|
|
while (p && *p) {
|
|
if (*p == '-' || *p == '_')
|
|
last_was_uscore = TRUE;
|
|
else {
|
|
if (last_was_uscore) {
|
|
g_string_append_c (str, g_ascii_toupper (*p));
|
|
last_was_uscore = FALSE;
|
|
} else
|
|
g_string_append_c (str, *p);
|
|
}
|
|
++p;
|
|
}
|
|
|
|
return g_string_free (str, FALSE);
|
|
}
|
|
|
|
static void
|
|
notify (GObject *object, GParamSpec *pspec)
|
|
{
|
|
GValue *value;
|
|
GHashTable *hash;
|
|
|
|
value = g_slice_new0 (GValue);
|
|
hash = g_hash_table_new_full (g_str_hash, g_str_equal, (GDestroyNotify) g_free, NULL);
|
|
|
|
g_value_init (value, pspec->value_type);
|
|
g_object_get_property (object, pspec->name, value);
|
|
g_hash_table_insert (hash, uscore_to_wincaps (pspec->name), value);
|
|
g_signal_emit (object, signals[PROPERTIES_CHANGED], 0, hash);
|
|
g_hash_table_destroy (hash);
|
|
g_value_unset (value);
|
|
g_slice_free (GValue, value);
|
|
}
|
|
|
|
const GSList *
|
|
nm_settings_get_unmanaged_specs (NMSettings *self)
|
|
{
|
|
NMSettingsPrivate *priv = NM_SETTINGS_GET_PRIVATE (self);
|
|
|
|
return priv->unmanaged_specs;
|
|
}
|
|
|
|
static NMSystemConfigInterface *
|
|
get_plugin (NMSettings *self, guint32 capability)
|
|
{
|
|
NMSettingsPrivate *priv = NM_SETTINGS_GET_PRIVATE (self);
|
|
GSList *iter;
|
|
|
|
g_return_val_if_fail (self != NULL, NULL);
|
|
|
|
/* Do any of the plugins support setting the hostname? */
|
|
for (iter = priv->plugins; iter; iter = iter->next) {
|
|
NMSystemConfigInterfaceCapabilities caps = NM_SYSTEM_CONFIG_INTERFACE_CAP_NONE;
|
|
|
|
g_object_get (G_OBJECT (iter->data), NM_SYSTEM_CONFIG_INTERFACE_CAPABILITIES, &caps, NULL);
|
|
if (caps & capability)
|
|
return NM_SYSTEM_CONFIG_INTERFACE (iter->data);
|
|
}
|
|
|
|
return NULL;
|
|
}
|
|
|
|
/* Returns an allocated string which the caller owns and must eventually free */
|
|
char *
|
|
nm_settings_get_hostname (NMSettings *self)
|
|
{
|
|
NMSettingsPrivate *priv = NM_SETTINGS_GET_PRIVATE (self);
|
|
GSList *iter;
|
|
char *hostname = NULL;
|
|
|
|
/* Hostname returned is the hostname returned from the first plugin
|
|
* that provides one.
|
|
*/
|
|
for (iter = priv->plugins; iter; iter = iter->next) {
|
|
NMSystemConfigInterfaceCapabilities caps = NM_SYSTEM_CONFIG_INTERFACE_CAP_NONE;
|
|
|
|
g_object_get (G_OBJECT (iter->data), NM_SYSTEM_CONFIG_INTERFACE_CAPABILITIES, &caps, NULL);
|
|
if (caps & NM_SYSTEM_CONFIG_INTERFACE_CAP_MODIFY_HOSTNAME) {
|
|
g_object_get (G_OBJECT (iter->data), NM_SYSTEM_CONFIG_INTERFACE_HOSTNAME, &hostname, NULL);
|
|
if (hostname && strlen (hostname))
|
|
return hostname;
|
|
g_free (hostname);
|
|
}
|
|
}
|
|
|
|
return NULL;
|
|
}
|
|
|
|
static gboolean
|
|
find_spec (GSList *spec_list, const char *spec)
|
|
{
|
|
GSList *iter;
|
|
|
|
for (iter = spec_list; iter; iter = g_slist_next (iter)) {
|
|
if (!strcmp ((const char *) iter->data, spec))
|
|
return TRUE;
|
|
}
|
|
return FALSE;
|
|
}
|
|
|
|
static void
|
|
update_specs (NMSettings *self, GSList **specs_ptr,
|
|
GSList * (*get_specs_func) (NMSystemConfigInterface *))
|
|
{
|
|
NMSettingsPrivate *priv = NM_SETTINGS_GET_PRIVATE (self);
|
|
GSList *iter;
|
|
|
|
g_slist_free_full (*specs_ptr, g_free);
|
|
*specs_ptr = NULL;
|
|
|
|
for (iter = priv->plugins; iter; iter = g_slist_next (iter)) {
|
|
GSList *specs, *specs_iter;
|
|
|
|
specs = get_specs_func (NM_SYSTEM_CONFIG_INTERFACE (iter->data));
|
|
for (specs_iter = specs; specs_iter; specs_iter = specs_iter->next) {
|
|
if (!find_spec (*specs_ptr, (const char *) specs_iter->data)) {
|
|
*specs_ptr = g_slist_prepend (*specs_ptr, specs_iter->data);
|
|
} else
|
|
g_free (specs_iter->data);
|
|
}
|
|
|
|
g_slist_free (specs);
|
|
}
|
|
}
|
|
|
|
static void
|
|
unmanaged_specs_changed (NMSystemConfigInterface *config,
|
|
gpointer user_data)
|
|
{
|
|
NMSettings *self = NM_SETTINGS (user_data);
|
|
NMSettingsPrivate *priv = NM_SETTINGS_GET_PRIVATE (self);
|
|
|
|
update_specs (self, &priv->unmanaged_specs,
|
|
nm_system_config_interface_get_unmanaged_specs);
|
|
g_object_notify (G_OBJECT (self), NM_SETTINGS_UNMANAGED_SPECS);
|
|
}
|
|
|
|
static void
|
|
unrecognized_specs_changed (NMSystemConfigInterface *config,
|
|
gpointer user_data)
|
|
{
|
|
NMSettings *self = NM_SETTINGS (user_data);
|
|
NMSettingsPrivate *priv = NM_SETTINGS_GET_PRIVATE (self);
|
|
|
|
update_specs (self, &priv->unrecognized_specs,
|
|
nm_system_config_interface_get_unrecognized_specs);
|
|
}
|
|
|
|
static void
|
|
hostname_changed (NMSystemConfigInterface *config,
|
|
GParamSpec *pspec,
|
|
gpointer user_data)
|
|
{
|
|
g_object_notify (G_OBJECT (user_data), NM_SETTINGS_HOSTNAME);
|
|
}
|
|
|
|
static void
|
|
add_plugin (NMSettings *self, NMSystemConfigInterface *plugin)
|
|
{
|
|
NMSettingsPrivate *priv;
|
|
char *pname = NULL;
|
|
char *pinfo = NULL;
|
|
|
|
g_return_if_fail (NM_IS_SETTINGS (self));
|
|
g_return_if_fail (NM_IS_SYSTEM_CONFIG_INTERFACE (plugin));
|
|
|
|
priv = NM_SETTINGS_GET_PRIVATE (self);
|
|
|
|
priv->plugins = g_slist_append (priv->plugins, g_object_ref (plugin));
|
|
|
|
g_signal_connect (plugin, "notify::hostname", G_CALLBACK (hostname_changed), self);
|
|
|
|
nm_system_config_interface_init (plugin, NULL);
|
|
|
|
g_object_get (G_OBJECT (plugin),
|
|
NM_SYSTEM_CONFIG_INTERFACE_NAME, &pname,
|
|
NM_SYSTEM_CONFIG_INTERFACE_INFO, &pinfo,
|
|
NULL);
|
|
|
|
nm_log_info (LOGD_SETTINGS, "Loaded plugin %s: %s", pname, pinfo);
|
|
g_free (pname);
|
|
g_free (pinfo);
|
|
}
|
|
|
|
static GObject *
|
|
find_plugin (GSList *list, const char *pname)
|
|
{
|
|
GSList *iter;
|
|
GObject *obj = NULL;
|
|
|
|
g_return_val_if_fail (pname != NULL, NULL);
|
|
|
|
for (iter = list; iter && !obj; iter = g_slist_next (iter)) {
|
|
NMSystemConfigInterface *plugin = NM_SYSTEM_CONFIG_INTERFACE (iter->data);
|
|
char *list_pname = NULL;
|
|
|
|
g_object_get (G_OBJECT (plugin),
|
|
NM_SYSTEM_CONFIG_INTERFACE_NAME,
|
|
&list_pname,
|
|
NULL);
|
|
if (list_pname && !strcmp (pname, list_pname))
|
|
obj = G_OBJECT (plugin);
|
|
|
|
g_free (list_pname);
|
|
}
|
|
|
|
return obj;
|
|
}
|
|
|
|
static void
|
|
add_keyfile_plugin (NMSettings *self)
|
|
{
|
|
GObject *keyfile_plugin;
|
|
|
|
keyfile_plugin = nm_settings_keyfile_plugin_new ();
|
|
g_assert (keyfile_plugin);
|
|
add_plugin (self, NM_SYSTEM_CONFIG_INTERFACE (keyfile_plugin));
|
|
}
|
|
|
|
static gboolean
|
|
load_plugins (NMSettings *self, const char **plugins, GError **error)
|
|
{
|
|
GSList *list = NULL;
|
|
const char **iter;
|
|
gboolean keyfile_added = FALSE;
|
|
gboolean success = TRUE;
|
|
|
|
for (iter = plugins; iter && *iter; iter++) {
|
|
GModule *plugin;
|
|
char *full_name, *path;
|
|
const char *pname = *iter;
|
|
GObject *obj;
|
|
GObject * (*factory_func) (void);
|
|
|
|
/* strip leading spaces */
|
|
while (g_ascii_isspace (*pname))
|
|
pname++;
|
|
|
|
/* ifcfg-fedora was renamed ifcfg-rh; handle old configs here */
|
|
if (!strcmp (pname, "ifcfg-fedora"))
|
|
pname = "ifcfg-rh";
|
|
|
|
obj = find_plugin (list, pname);
|
|
if (obj)
|
|
continue;
|
|
|
|
/* keyfile plugin is built-in now */
|
|
if (strcmp (pname, "keyfile") == 0) {
|
|
if (!keyfile_added) {
|
|
add_keyfile_plugin (self);
|
|
keyfile_added = TRUE;
|
|
}
|
|
continue;
|
|
}
|
|
|
|
full_name = g_strdup_printf ("nm-settings-plugin-%s", pname);
|
|
path = g_module_build_path (NMPLUGINDIR, full_name);
|
|
|
|
plugin = g_module_open (path, G_MODULE_BIND_LOCAL);
|
|
if (!plugin) {
|
|
g_set_error (error, 0, 0,
|
|
"Could not load plugin '%s': %s",
|
|
pname, g_module_error ());
|
|
g_free (full_name);
|
|
g_free (path);
|
|
success = FALSE;
|
|
break;
|
|
}
|
|
|
|
g_free (full_name);
|
|
g_free (path);
|
|
|
|
if (!g_module_symbol (plugin, "nm_system_config_factory", (gpointer) (&factory_func))) {
|
|
g_set_error (error, 0, 0,
|
|
"Could not find plugin '%s' factory function.",
|
|
pname);
|
|
success = FALSE;
|
|
break;
|
|
}
|
|
|
|
obj = (*factory_func) ();
|
|
if (!obj || !NM_IS_SYSTEM_CONFIG_INTERFACE (obj)) {
|
|
g_set_error (error, 0, 0,
|
|
"Plugin '%s' returned invalid system config object.",
|
|
pname);
|
|
success = FALSE;
|
|
break;
|
|
}
|
|
|
|
g_module_make_resident (plugin);
|
|
g_object_weak_ref (obj, (GWeakNotify) g_module_close, plugin);
|
|
add_plugin (self, NM_SYSTEM_CONFIG_INTERFACE (obj));
|
|
list = g_slist_append (list, obj);
|
|
}
|
|
|
|
/* If keyfile plugin was not among configured plugins, add it as the last one */
|
|
if (!keyfile_added)
|
|
add_keyfile_plugin (self);
|
|
|
|
g_slist_free_full (list, g_object_unref);
|
|
|
|
return success;
|
|
}
|
|
|
|
static void
|
|
connection_updated (NMSettingsConnection *connection, gpointer user_data)
|
|
{
|
|
/* Re-emit for listeners like NMPolicy */
|
|
g_signal_emit (NM_SETTINGS (user_data),
|
|
signals[CONNECTION_UPDATED],
|
|
0,
|
|
connection);
|
|
g_signal_emit_by_name (NM_SETTINGS (user_data), NM_CP_SIGNAL_CONNECTION_UPDATED, connection);
|
|
}
|
|
|
|
static void
|
|
connection_updated_by_user (NMSettingsConnection *connection, gpointer user_data)
|
|
{
|
|
/* Re-emit for listeners like NMPolicy */
|
|
g_signal_emit (NM_SETTINGS (user_data),
|
|
signals[CONNECTION_UPDATED_BY_USER],
|
|
0,
|
|
connection);
|
|
}
|
|
|
|
static void
|
|
connection_visibility_changed (NMSettingsConnection *connection,
|
|
GParamSpec *pspec,
|
|
gpointer user_data)
|
|
{
|
|
/* Re-emit for listeners like NMPolicy */
|
|
g_signal_emit (NM_SETTINGS (user_data),
|
|
signals[CONNECTION_VISIBILITY_CHANGED],
|
|
0,
|
|
connection);
|
|
}
|
|
|
|
static void
|
|
connection_removed (NMSettingsConnection *connection, gpointer user_data)
|
|
{
|
|
NMSettings *self = NM_SETTINGS (user_data);
|
|
|
|
g_object_ref (connection);
|
|
|
|
/* Disconnect signal handlers, as plugins might still keep references
|
|
* to the connection (and thus the signal handlers would still be live)
|
|
* even after NMSettings has dropped all its references.
|
|
*/
|
|
|
|
g_signal_handlers_disconnect_by_func (connection, G_CALLBACK (connection_removed), self);
|
|
g_signal_handlers_disconnect_by_func (connection, G_CALLBACK (connection_updated), self);
|
|
g_signal_handlers_disconnect_by_func (connection, G_CALLBACK (connection_updated_by_user), self);
|
|
g_signal_handlers_disconnect_by_func (connection, G_CALLBACK (connection_visibility_changed), self);
|
|
|
|
/* Forget about the connection internally */
|
|
g_hash_table_remove (NM_SETTINGS_GET_PRIVATE (user_data)->connections,
|
|
(gpointer) nm_connection_get_path (NM_CONNECTION (connection)));
|
|
|
|
/* Notify D-Bus */
|
|
g_signal_emit (self, signals[CONNECTION_REMOVED], 0, connection);
|
|
|
|
/* Re-emit for listeners like NMPolicy */
|
|
g_signal_emit_by_name (self, NM_CP_SIGNAL_CONNECTION_REMOVED, connection);
|
|
g_object_notify (G_OBJECT (self), NM_SETTINGS_CONNECTIONS);
|
|
|
|
g_object_unref (connection);
|
|
}
|
|
|
|
static void
|
|
secret_agent_registered (NMAgentManager *agent_mgr,
|
|
NMSecretAgent *agent,
|
|
gpointer user_data)
|
|
{
|
|
/* Re-emit for listeners like NMPolicy */
|
|
g_signal_emit (NM_SETTINGS (user_data),
|
|
signals[AGENT_REGISTERED],
|
|
0,
|
|
agent);
|
|
}
|
|
|
|
#define NM_DBUS_SERVICE_OPENCONNECT "org.freedesktop.NetworkManager.openconnect"
|
|
#define NM_OPENCONNECT_KEY_GATEWAY "gateway"
|
|
#define NM_OPENCONNECT_KEY_COOKIE "cookie"
|
|
#define NM_OPENCONNECT_KEY_GWCERT "gwcert"
|
|
#define NM_OPENCONNECT_KEY_XMLCONFIG "xmlconfig"
|
|
#define NM_OPENCONNECT_KEY_LASTHOST "lasthost"
|
|
#define NM_OPENCONNECT_KEY_AUTOCONNECT "autoconnect"
|
|
#define NM_OPENCONNECT_KEY_CERTSIGS "certsigs"
|
|
|
|
static void
|
|
openconnect_migrate_hack (NMConnection *connection)
|
|
{
|
|
NMSettingVpn *s_vpn;
|
|
NMSettingSecretFlags flags = NM_SETTING_SECRET_FLAG_NOT_SAVED;
|
|
|
|
/* Huge hack. There were some openconnect changes that needed to happen
|
|
* pretty late, too late to get into distros. Migration has already
|
|
* happened for many people, and their secret flags are wrong. But we
|
|
* don't want to requrie re-migration, so we have to fix it up here. Ugh.
|
|
*/
|
|
|
|
s_vpn = nm_connection_get_setting_vpn (connection);
|
|
if (s_vpn == NULL)
|
|
return;
|
|
|
|
if (g_strcmp0 (nm_setting_vpn_get_service_type (s_vpn), NM_DBUS_SERVICE_OPENCONNECT) == 0) {
|
|
/* These are different for every login session, and should not be stored */
|
|
nm_setting_set_secret_flags (NM_SETTING (s_vpn), NM_OPENCONNECT_KEY_GATEWAY, flags, NULL);
|
|
nm_setting_set_secret_flags (NM_SETTING (s_vpn), NM_OPENCONNECT_KEY_COOKIE, flags, NULL);
|
|
nm_setting_set_secret_flags (NM_SETTING (s_vpn), NM_OPENCONNECT_KEY_GWCERT, flags, NULL);
|
|
|
|
/* These are purely internal data for the auth-dialog, and should be stored */
|
|
flags = 0;
|
|
nm_setting_set_secret_flags (NM_SETTING (s_vpn), NM_OPENCONNECT_KEY_XMLCONFIG, flags, NULL);
|
|
nm_setting_set_secret_flags (NM_SETTING (s_vpn), NM_OPENCONNECT_KEY_LASTHOST, flags, NULL);
|
|
nm_setting_set_secret_flags (NM_SETTING (s_vpn), NM_OPENCONNECT_KEY_AUTOCONNECT, flags, NULL);
|
|
nm_setting_set_secret_flags (NM_SETTING (s_vpn), NM_OPENCONNECT_KEY_CERTSIGS, flags, NULL);
|
|
}
|
|
}
|
|
|
|
static void
|
|
claim_connection (NMSettings *self,
|
|
NMSettingsConnection *connection,
|
|
gboolean do_export)
|
|
{
|
|
NMSettingsPrivate *priv = NM_SETTINGS_GET_PRIVATE (self);
|
|
static guint32 ec_counter = 0;
|
|
GError *error = NULL;
|
|
GHashTableIter iter;
|
|
gpointer data;
|
|
char *path;
|
|
|
|
g_return_if_fail (NM_IS_SETTINGS_CONNECTION (connection));
|
|
g_return_if_fail (nm_connection_get_path (NM_CONNECTION (connection)) == NULL);
|
|
|
|
g_hash_table_iter_init (&iter, priv->connections);
|
|
while (g_hash_table_iter_next (&iter, NULL, &data)) {
|
|
/* prevent duplicates */
|
|
if (data == connection)
|
|
return;
|
|
}
|
|
|
|
if (!nm_connection_normalize (NM_CONNECTION (connection), NULL, NULL, &error)) {
|
|
nm_log_warn (LOGD_SETTINGS, "plugin provided invalid connection: '%s' / '%s' invalid: %d",
|
|
g_type_name (nm_setting_lookup_type_by_quark (error->domain)),
|
|
error->message, error->code);
|
|
g_error_free (error);
|
|
return;
|
|
}
|
|
|
|
/* Read timestamp from look-aside file and put it into the connection's data */
|
|
nm_settings_connection_read_and_fill_timestamp (connection);
|
|
|
|
/* Read seen-bssids from look-aside file and put it into the connection's data */
|
|
nm_settings_connection_read_and_fill_seen_bssids (connection);
|
|
|
|
/* Ensure it's initial visibility is up-to-date */
|
|
nm_settings_connection_recheck_visibility (connection);
|
|
|
|
/* Evil openconnect migration hack */
|
|
openconnect_migrate_hack (NM_CONNECTION (connection));
|
|
|
|
g_signal_connect (connection, NM_SETTINGS_CONNECTION_REMOVED,
|
|
G_CALLBACK (connection_removed), self);
|
|
g_signal_connect (connection, NM_SETTINGS_CONNECTION_UPDATED,
|
|
G_CALLBACK (connection_updated), self);
|
|
g_signal_connect (connection, NM_SETTINGS_CONNECTION_UPDATED_BY_USER,
|
|
G_CALLBACK (connection_updated_by_user), self);
|
|
g_signal_connect (connection, "notify::" NM_SETTINGS_CONNECTION_VISIBLE,
|
|
G_CALLBACK (connection_visibility_changed),
|
|
self);
|
|
|
|
/* Export the connection over D-Bus */
|
|
g_warn_if_fail (nm_connection_get_path (NM_CONNECTION (connection)) == NULL);
|
|
path = g_strdup_printf ("%s/%u", NM_DBUS_PATH_SETTINGS, ec_counter++);
|
|
nm_connection_set_path (NM_CONNECTION (connection), path);
|
|
nm_dbus_manager_register_object (priv->dbus_mgr, path, G_OBJECT (connection));
|
|
g_free (path);
|
|
|
|
g_hash_table_insert (priv->connections,
|
|
(gpointer) nm_connection_get_path (NM_CONNECTION (connection)),
|
|
g_object_ref (connection));
|
|
|
|
/* Only emit the individual connection-added signal after connections
|
|
* have been initially loaded.
|
|
*/
|
|
if (priv->connections_loaded) {
|
|
/* Internal added signal */
|
|
g_signal_emit (self, signals[CONNECTION_ADDED], 0, connection);
|
|
g_signal_emit_by_name (self, NM_CP_SIGNAL_CONNECTION_ADDED, connection);
|
|
g_object_notify (G_OBJECT (self), NM_SETTINGS_CONNECTIONS);
|
|
|
|
/* Exported D-Bus signal */
|
|
g_signal_emit (self, signals[NEW_CONNECTION], 0, connection);
|
|
}
|
|
}
|
|
|
|
/**
|
|
* nm_settings_add_connection:
|
|
* @self: the #NMSettings object
|
|
* @connection: the source connection to create a new #NMSettingsConnection from
|
|
* @save_to_disk: %TRUE to save the connection to disk immediately, %FALSE to
|
|
* not save to disk
|
|
* @error: on return, a location to store any errors that may occur
|
|
*
|
|
* Creates a new #NMSettingsConnection for the given source @connection.
|
|
* The returned object is owned by @self and the caller must reference
|
|
* the object to continue using it.
|
|
*
|
|
* Returns: the new #NMSettingsConnection or %NULL
|
|
*/
|
|
NMSettingsConnection *
|
|
nm_settings_add_connection (NMSettings *self,
|
|
NMConnection *connection,
|
|
gboolean save_to_disk,
|
|
GError **error)
|
|
{
|
|
NMSettingsPrivate *priv = NM_SETTINGS_GET_PRIVATE (self);
|
|
GSList *iter;
|
|
NMSettingsConnection *added = NULL;
|
|
GHashTableIter citer;
|
|
NMConnection *candidate = NULL;
|
|
|
|
/* Make sure a connection with this UUID doesn't already exist */
|
|
g_hash_table_iter_init (&citer, priv->connections);
|
|
while (g_hash_table_iter_next (&citer, NULL, (gpointer *) &candidate)) {
|
|
if (g_strcmp0 (nm_connection_get_uuid (connection),
|
|
nm_connection_get_uuid (candidate)) == 0) {
|
|
g_set_error_literal (error,
|
|
NM_SETTINGS_ERROR,
|
|
NM_SETTINGS_ERROR_UUID_EXISTS,
|
|
"A connection with this UUID already exists.");
|
|
return NULL;
|
|
}
|
|
}
|
|
|
|
/* 1) plugin writes the NMConnection to disk
|
|
* 2) plugin creates a new NMSettingsConnection subclass with the settings
|
|
* from the NMConnection and returns it to the settings service
|
|
* 3) settings service exports the new NMSettingsConnection subclass
|
|
* 4) plugin notices that something on the filesystem has changed
|
|
* 5) plugin reads the changes and ignores them because they will
|
|
* contain the same data as the connection it already knows about
|
|
*/
|
|
for (iter = priv->plugins; iter; iter = g_slist_next (iter)) {
|
|
NMSystemConfigInterface *plugin = NM_SYSTEM_CONFIG_INTERFACE (iter->data);
|
|
GError *add_error = NULL;
|
|
|
|
added = nm_system_config_interface_add_connection (plugin, connection, save_to_disk, &add_error);
|
|
if (added) {
|
|
claim_connection (self, added, TRUE);
|
|
return added;
|
|
}
|
|
nm_log_dbg (LOGD_SETTINGS, "Failed to add %s/'%s': %s",
|
|
nm_connection_get_uuid (connection),
|
|
nm_connection_get_id (connection),
|
|
add_error ? add_error->message : "(unknown)");
|
|
g_clear_error (&add_error);
|
|
}
|
|
|
|
g_set_error_literal (error, NM_SETTINGS_ERROR, NM_SETTINGS_ERROR_ADD_FAILED,
|
|
"No plugin supported adding this connection");
|
|
return NULL;
|
|
}
|
|
|
|
static NMConnection *
|
|
_nm_connection_provider_add_connection (NMConnectionProvider *provider,
|
|
NMConnection *connection,
|
|
gboolean save_to_disk,
|
|
GError **error)
|
|
{
|
|
g_assert (NM_IS_CONNECTION_PROVIDER (provider) && NM_IS_SETTINGS (provider));
|
|
return NM_CONNECTION (nm_settings_add_connection (NM_SETTINGS (provider), connection, save_to_disk, error));
|
|
}
|
|
|
|
static gboolean
|
|
secrets_filter_cb (NMSetting *setting,
|
|
const char *secret,
|
|
NMSettingSecretFlags flags,
|
|
gpointer user_data)
|
|
{
|
|
NMSettingSecretFlags filter_flags = GPOINTER_TO_UINT (user_data);
|
|
|
|
/* Returns TRUE to remove the secret */
|
|
|
|
/* Can't use bitops with SECRET_FLAG_NONE so handle that specifically */
|
|
if ( (flags == NM_SETTING_SECRET_FLAG_NONE)
|
|
&& (filter_flags == NM_SETTING_SECRET_FLAG_NONE))
|
|
return FALSE;
|
|
|
|
/* Otherwise if the secret has at least one of the desired flags keep it */
|
|
return (flags & filter_flags) ? FALSE : TRUE;
|
|
}
|
|
|
|
static void
|
|
send_agent_owned_secrets (NMSettings *self,
|
|
NMSettingsConnection *connection,
|
|
NMAuthSubject *subject)
|
|
{
|
|
NMSettingsPrivate *priv = NM_SETTINGS_GET_PRIVATE (self);
|
|
NMConnection *for_agent;
|
|
|
|
/* Dupe the connection so we can clear out non-agent-owned secrets,
|
|
* as agent-owned secrets are the only ones we send back to be saved.
|
|
* Only send secrets to agents of the same UID that called update too.
|
|
*/
|
|
for_agent = nm_simple_connection_new_clone (NM_CONNECTION (connection));
|
|
nm_connection_clear_secrets_with_flags (for_agent,
|
|
secrets_filter_cb,
|
|
GUINT_TO_POINTER (NM_SETTING_SECRET_FLAG_AGENT_OWNED));
|
|
nm_agent_manager_save_secrets (priv->agent_mgr, for_agent, subject);
|
|
g_object_unref (for_agent);
|
|
}
|
|
|
|
static void
|
|
pk_add_cb (NMAuthChain *chain,
|
|
GError *chain_error,
|
|
DBusGMethodInvocation *context,
|
|
gpointer user_data)
|
|
{
|
|
NMSettings *self = NM_SETTINGS (user_data);
|
|
NMSettingsPrivate *priv = NM_SETTINGS_GET_PRIVATE (self);
|
|
NMAuthCallResult result;
|
|
GError *error = NULL;
|
|
NMConnection *connection;
|
|
NMSettingsConnection *added = NULL;
|
|
NMSettingsAddCallback callback;
|
|
gpointer callback_data;
|
|
NMAuthSubject *subject;
|
|
const char *perm;
|
|
gboolean save_to_disk;
|
|
|
|
g_assert (context);
|
|
|
|
priv->auths = g_slist_remove (priv->auths, chain);
|
|
|
|
perm = nm_auth_chain_get_data (chain, "perm");
|
|
g_assert (perm);
|
|
result = nm_auth_chain_get_result (chain, perm);
|
|
|
|
if (chain_error) {
|
|
error = g_error_new (NM_SETTINGS_ERROR,
|
|
NM_SETTINGS_ERROR_GENERAL,
|
|
"Error checking authorization: %s",
|
|
chain_error->message ? chain_error->message : "(unknown)");
|
|
} else if (result != NM_AUTH_CALL_RESULT_YES) {
|
|
error = g_error_new_literal (NM_SETTINGS_ERROR,
|
|
NM_SETTINGS_ERROR_PERMISSION_DENIED,
|
|
"Insufficient privileges.");
|
|
} else {
|
|
/* Authorized */
|
|
connection = nm_auth_chain_get_data (chain, "connection");
|
|
g_assert (connection);
|
|
save_to_disk = GPOINTER_TO_UINT (nm_auth_chain_get_data (chain, "save-to-disk"));
|
|
added = nm_settings_add_connection (self, connection, save_to_disk, &error);
|
|
}
|
|
|
|
callback = nm_auth_chain_get_data (chain, "callback");
|
|
callback_data = nm_auth_chain_get_data (chain, "callback-data");
|
|
subject = nm_auth_chain_get_data (chain, "subject");
|
|
|
|
callback (self, added, error, context, callback_data);
|
|
|
|
/* Send agent-owned secrets to the agents */
|
|
if (!error && added)
|
|
send_agent_owned_secrets (self, added, subject);
|
|
|
|
g_clear_error (&error);
|
|
nm_auth_chain_unref (chain);
|
|
}
|
|
|
|
/* FIXME: remove if/when kernel supports adhoc wpa */
|
|
static gboolean
|
|
is_adhoc_wpa (NMConnection *connection)
|
|
{
|
|
NMSettingWireless *s_wifi;
|
|
NMSettingWirelessSecurity *s_wsec;
|
|
const char *mode, *key_mgmt;
|
|
|
|
/* The kernel doesn't support Ad-Hoc WPA connections well at this time,
|
|
* and turns them into open networks. It's been this way since at least
|
|
* 2.6.30 or so; until that's fixed, disable WPA-protected Ad-Hoc networks.
|
|
*/
|
|
|
|
s_wifi = nm_connection_get_setting_wireless (connection);
|
|
if (!s_wifi)
|
|
return FALSE;
|
|
|
|
mode = nm_setting_wireless_get_mode (s_wifi);
|
|
if (g_strcmp0 (mode, NM_SETTING_WIRELESS_MODE_ADHOC) != 0)
|
|
return FALSE;
|
|
|
|
s_wsec = nm_connection_get_setting_wireless_security (connection);
|
|
if (!s_wsec)
|
|
return FALSE;
|
|
|
|
key_mgmt = nm_setting_wireless_security_get_key_mgmt (s_wsec);
|
|
if (g_strcmp0 (key_mgmt, "wpa-none") != 0)
|
|
return FALSE;
|
|
|
|
return TRUE;
|
|
}
|
|
|
|
void
|
|
nm_settings_add_connection_dbus (NMSettings *self,
|
|
NMConnection *connection,
|
|
gboolean save_to_disk,
|
|
DBusGMethodInvocation *context,
|
|
NMSettingsAddCallback callback,
|
|
gpointer user_data)
|
|
{
|
|
NMSettingsPrivate *priv = NM_SETTINGS_GET_PRIVATE (self);
|
|
NMSettingConnection *s_con;
|
|
NMAuthSubject *subject = NULL;
|
|
NMAuthChain *chain;
|
|
GError *error = NULL, *tmp_error = NULL;
|
|
char *error_desc = NULL;
|
|
const char *perm;
|
|
|
|
g_return_if_fail (connection != NULL);
|
|
g_return_if_fail (context != NULL);
|
|
|
|
/* Connection must be valid, of course */
|
|
if (!nm_connection_verify (connection, &tmp_error)) {
|
|
error = g_error_new (NM_SETTINGS_ERROR,
|
|
NM_SETTINGS_ERROR_INVALID_CONNECTION,
|
|
"The connection was invalid: %s",
|
|
tmp_error ? tmp_error->message : "(unknown)");
|
|
g_error_free (tmp_error);
|
|
goto done;
|
|
}
|
|
|
|
/* The kernel doesn't support Ad-Hoc WPA connections well at this time,
|
|
* and turns them into open networks. It's been this way since at least
|
|
* 2.6.30 or so; until that's fixed, disable WPA-protected Ad-Hoc networks.
|
|
*/
|
|
if (is_adhoc_wpa (connection)) {
|
|
error = g_error_new_literal (NM_SETTINGS_ERROR,
|
|
NM_SETTINGS_ERROR_INVALID_CONNECTION,
|
|
"WPA Ad-Hoc disabled due to kernel bugs");
|
|
goto done;
|
|
}
|
|
|
|
/* Do any of the plugins support adding? */
|
|
if (!get_plugin (self, NM_SYSTEM_CONFIG_INTERFACE_CAP_MODIFY_CONNECTIONS)) {
|
|
error = g_error_new_literal (NM_SETTINGS_ERROR,
|
|
NM_SETTINGS_ERROR_ADD_NOT_SUPPORTED,
|
|
"None of the registered plugins support add.");
|
|
goto done;
|
|
}
|
|
|
|
subject = nm_auth_subject_new_from_context (context);
|
|
if (!subject) {
|
|
error = g_error_new_literal (NM_SETTINGS_ERROR,
|
|
NM_SETTINGS_ERROR_PERMISSION_DENIED,
|
|
"Unable to determine UID of request.");
|
|
goto done;
|
|
}
|
|
|
|
/* Ensure the caller's username exists in the connection's permissions,
|
|
* or that the permissions is empty (ie, visible by everyone).
|
|
*/
|
|
if (!nm_auth_uid_in_acl (connection,
|
|
nm_session_monitor_get (),
|
|
nm_auth_subject_get_uid (subject),
|
|
&error_desc)) {
|
|
error = g_error_new_literal (NM_SETTINGS_ERROR,
|
|
NM_SETTINGS_ERROR_PERMISSION_DENIED,
|
|
error_desc);
|
|
g_free (error_desc);
|
|
goto done;
|
|
}
|
|
|
|
/* If the caller is the only user in the connection's permissions, then
|
|
* we use the 'modify.own' permission instead of 'modify.system'. If the
|
|
* request affects more than just the caller, require 'modify.system'.
|
|
*/
|
|
s_con = nm_connection_get_setting_connection (connection);
|
|
g_assert (s_con);
|
|
if (nm_setting_connection_get_num_permissions (s_con) == 1)
|
|
perm = NM_AUTH_PERMISSION_SETTINGS_MODIFY_OWN;
|
|
else
|
|
perm = NM_AUTH_PERMISSION_SETTINGS_MODIFY_SYSTEM;
|
|
|
|
/* Validate the user request */
|
|
chain = nm_auth_chain_new_subject (subject, context, pk_add_cb, self);
|
|
if (!chain) {
|
|
error = g_error_new_literal (NM_SETTINGS_ERROR,
|
|
NM_SETTINGS_ERROR_PERMISSION_DENIED,
|
|
"Unable to authenticate the request.");
|
|
goto done;
|
|
}
|
|
|
|
priv->auths = g_slist_append (priv->auths, chain);
|
|
nm_auth_chain_add_call (chain, perm, TRUE);
|
|
nm_auth_chain_set_data (chain, "perm", (gpointer) perm, NULL);
|
|
nm_auth_chain_set_data (chain, "connection", g_object_ref (connection), g_object_unref);
|
|
nm_auth_chain_set_data (chain, "callback", callback, NULL);
|
|
nm_auth_chain_set_data (chain, "callback-data", user_data, NULL);
|
|
nm_auth_chain_set_data (chain, "subject", g_object_ref (subject), g_object_unref);
|
|
nm_auth_chain_set_data (chain, "save-to-disk", GUINT_TO_POINTER (save_to_disk), NULL);
|
|
|
|
done:
|
|
if (error)
|
|
callback (self, NULL, error, context, user_data);
|
|
|
|
g_clear_error (&error);
|
|
g_clear_object (&subject);
|
|
}
|
|
|
|
static void
|
|
impl_settings_add_connection_add_cb (NMSettings *self,
|
|
NMSettingsConnection *connection,
|
|
GError *error,
|
|
DBusGMethodInvocation *context,
|
|
gpointer user_data)
|
|
{
|
|
if (error)
|
|
dbus_g_method_return_error (context, error);
|
|
else
|
|
dbus_g_method_return (context, nm_connection_get_path (NM_CONNECTION (connection)));
|
|
}
|
|
|
|
static void
|
|
impl_settings_add_connection_helper (NMSettings *self,
|
|
GHashTable *settings,
|
|
gboolean save_to_disk,
|
|
DBusGMethodInvocation *context)
|
|
{
|
|
NMConnection *connection;
|
|
GError *error = NULL;
|
|
|
|
connection = nm_simple_connection_new_from_hash (settings, &error);
|
|
if (connection) {
|
|
nm_settings_add_connection_dbus (self,
|
|
connection,
|
|
save_to_disk,
|
|
context,
|
|
impl_settings_add_connection_add_cb,
|
|
NULL);
|
|
g_object_unref (connection);
|
|
} else {
|
|
g_assert (error);
|
|
dbus_g_method_return_error (context, error);
|
|
g_error_free (error);
|
|
}
|
|
}
|
|
|
|
static void
|
|
impl_settings_add_connection (NMSettings *self,
|
|
GHashTable *settings,
|
|
DBusGMethodInvocation *context)
|
|
{
|
|
impl_settings_add_connection_helper (self, settings, TRUE, context);
|
|
}
|
|
|
|
static void
|
|
impl_settings_add_connection_unsaved (NMSettings *self,
|
|
GHashTable *settings,
|
|
DBusGMethodInvocation *context)
|
|
{
|
|
impl_settings_add_connection_helper (self, settings, FALSE, context);
|
|
}
|
|
|
|
static gboolean
|
|
ensure_root (NMDBusManager *dbus_mgr,
|
|
DBusGMethodInvocation *context)
|
|
{
|
|
gulong caller_uid;
|
|
GError *error = NULL;
|
|
|
|
if (!nm_dbus_manager_get_caller_info (dbus_mgr, context, NULL, &caller_uid, NULL)) {
|
|
error = g_error_new_literal (NM_SETTINGS_ERROR,
|
|
NM_SETTINGS_ERROR_PERMISSION_DENIED,
|
|
"Unable to determine request UID.");
|
|
dbus_g_method_return_error (context, error);
|
|
g_error_free (error);
|
|
return FALSE;
|
|
}
|
|
if (caller_uid != 0) {
|
|
error = g_error_new_literal (NM_SETTINGS_ERROR,
|
|
NM_SETTINGS_ERROR_PERMISSION_DENIED,
|
|
"Permission denied");
|
|
dbus_g_method_return_error (context, error);
|
|
g_error_free (error);
|
|
return FALSE;
|
|
}
|
|
|
|
return TRUE;
|
|
}
|
|
|
|
static void
|
|
impl_settings_load_connections (NMSettings *self,
|
|
char **filenames,
|
|
DBusGMethodInvocation *context)
|
|
{
|
|
NMSettingsPrivate *priv = NM_SETTINGS_GET_PRIVATE (self);
|
|
GPtrArray *failures;
|
|
GSList *iter;
|
|
int i;
|
|
|
|
if (!ensure_root (priv->dbus_mgr, context))
|
|
return;
|
|
|
|
failures = g_ptr_array_new ();
|
|
|
|
for (i = 0; filenames[i]; i++) {
|
|
for (iter = priv->plugins; iter; iter = g_slist_next (iter)) {
|
|
NMSystemConfigInterface *plugin = NM_SYSTEM_CONFIG_INTERFACE (iter->data);
|
|
|
|
if (nm_system_config_interface_load_connection (plugin, filenames[i]))
|
|
break;
|
|
}
|
|
|
|
if (!iter) {
|
|
if (!g_path_is_absolute (filenames[i]))
|
|
nm_log_warn (LOGD_SETTINGS, "Connection filename '%s' is not an absolute path", filenames[i]);
|
|
g_ptr_array_add (failures, (char *) filenames[i]);
|
|
}
|
|
}
|
|
|
|
g_ptr_array_add (failures, NULL);
|
|
dbus_g_method_return (context, failures->len == 1, failures->pdata);
|
|
g_ptr_array_unref (failures);
|
|
}
|
|
|
|
static void
|
|
impl_settings_reload_connections (NMSettings *self,
|
|
DBusGMethodInvocation *context)
|
|
{
|
|
NMSettingsPrivate *priv = NM_SETTINGS_GET_PRIVATE (self);
|
|
GSList *iter;
|
|
|
|
if (!ensure_root (priv->dbus_mgr, context))
|
|
return;
|
|
|
|
for (iter = priv->plugins; iter; iter = g_slist_next (iter)) {
|
|
NMSystemConfigInterface *plugin = NM_SYSTEM_CONFIG_INTERFACE (iter->data);
|
|
|
|
nm_system_config_interface_reload_connections (plugin);
|
|
}
|
|
|
|
dbus_g_method_return (context, TRUE);
|
|
}
|
|
|
|
static void
|
|
pk_hostname_cb (NMAuthChain *chain,
|
|
GError *chain_error,
|
|
DBusGMethodInvocation *context,
|
|
gpointer user_data)
|
|
{
|
|
NMSettings *self = NM_SETTINGS (user_data);
|
|
NMSettingsPrivate *priv = NM_SETTINGS_GET_PRIVATE (self);
|
|
NMAuthCallResult result;
|
|
GError *error = NULL;
|
|
GSList *iter;
|
|
const char *hostname;
|
|
|
|
g_assert (context);
|
|
|
|
priv->auths = g_slist_remove (priv->auths, chain);
|
|
|
|
result = nm_auth_chain_get_result (chain, NM_AUTH_PERMISSION_SETTINGS_MODIFY_HOSTNAME);
|
|
|
|
/* If our NMSettingsConnection is already gone, do nothing */
|
|
if (chain_error) {
|
|
error = g_error_new (NM_SETTINGS_ERROR,
|
|
NM_SETTINGS_ERROR_GENERAL,
|
|
"Error checking authorization: %s",
|
|
chain_error->message ? chain_error->message : "(unknown)");
|
|
} else if (result != NM_AUTH_CALL_RESULT_YES) {
|
|
error = g_error_new_literal (NM_SETTINGS_ERROR,
|
|
NM_SETTINGS_ERROR_PERMISSION_DENIED,
|
|
"Insufficient privileges.");
|
|
} else {
|
|
/* Set the hostname in all plugins */
|
|
hostname = nm_auth_chain_get_data (chain, "hostname");
|
|
for (iter = priv->plugins; iter; iter = iter->next) {
|
|
NMSystemConfigInterfaceCapabilities caps = NM_SYSTEM_CONFIG_INTERFACE_CAP_NONE;
|
|
|
|
/* error will be cleared if any plugin supports saving the hostname */
|
|
error = g_error_new_literal (NM_SETTINGS_ERROR,
|
|
NM_SETTINGS_ERROR_SAVE_HOSTNAME_FAILED,
|
|
"Saving the hostname failed.");
|
|
|
|
g_object_get (G_OBJECT (iter->data), NM_SYSTEM_CONFIG_INTERFACE_CAPABILITIES, &caps, NULL);
|
|
if (caps & NM_SYSTEM_CONFIG_INTERFACE_CAP_MODIFY_HOSTNAME) {
|
|
g_object_set (G_OBJECT (iter->data), NM_SYSTEM_CONFIG_INTERFACE_HOSTNAME, hostname, NULL);
|
|
g_clear_error (&error);
|
|
}
|
|
}
|
|
}
|
|
|
|
if (error)
|
|
dbus_g_method_return_error (context, error);
|
|
else
|
|
dbus_g_method_return (context);
|
|
|
|
g_clear_error (&error);
|
|
nm_auth_chain_unref (chain);
|
|
}
|
|
|
|
static gboolean
|
|
validate_hostname (const char *hostname)
|
|
{
|
|
const char *p;
|
|
gboolean dot = TRUE;
|
|
|
|
if (!hostname || !hostname[0])
|
|
return FALSE;
|
|
|
|
for (p = hostname; *p; p++) {
|
|
if (*p == '.') {
|
|
if (dot)
|
|
return FALSE;
|
|
dot = TRUE;
|
|
} else {
|
|
if (!g_ascii_isalnum (*p) && (*p != '-') && (*p != '_'))
|
|
return FALSE;
|
|
dot = FALSE;
|
|
}
|
|
}
|
|
|
|
if (dot)
|
|
return FALSE;
|
|
|
|
return (p - hostname <= HOST_NAME_MAX);
|
|
}
|
|
|
|
static void
|
|
impl_settings_save_hostname (NMSettings *self,
|
|
const char *hostname,
|
|
DBusGMethodInvocation *context)
|
|
{
|
|
NMSettingsPrivate *priv = NM_SETTINGS_GET_PRIVATE (self);
|
|
NMAuthChain *chain;
|
|
GError *error = NULL;
|
|
|
|
/* Minimal validation of the hostname */
|
|
if (!validate_hostname (hostname)) {
|
|
error = g_error_new_literal (NM_SETTINGS_ERROR,
|
|
NM_SETTINGS_ERROR_HOSTNAME_INVALID,
|
|
"The hostname was too long or contained invalid characters.");
|
|
goto done;
|
|
}
|
|
|
|
/* Do any of the plugins support setting the hostname? */
|
|
if (!get_plugin (self, NM_SYSTEM_CONFIG_INTERFACE_CAP_MODIFY_HOSTNAME)) {
|
|
error = g_error_new_literal (NM_SETTINGS_ERROR,
|
|
NM_SETTINGS_ERROR_SAVE_HOSTNAME_NOT_SUPPORTED,
|
|
"None of the registered plugins support setting the hostname.");
|
|
goto done;
|
|
}
|
|
|
|
chain = nm_auth_chain_new_context (context, pk_hostname_cb, self);
|
|
if (!chain) {
|
|
error = g_error_new_literal (NM_SETTINGS_ERROR,
|
|
NM_SETTINGS_ERROR_PERMISSION_DENIED,
|
|
"Unable to authenticate the request.");
|
|
goto done;
|
|
}
|
|
|
|
priv->auths = g_slist_append (priv->auths, chain);
|
|
nm_auth_chain_add_call (chain, NM_AUTH_PERMISSION_SETTINGS_MODIFY_HOSTNAME, TRUE);
|
|
nm_auth_chain_set_data (chain, "hostname", g_strdup (hostname), g_free);
|
|
|
|
done:
|
|
if (error)
|
|
dbus_g_method_return_error (context, error);
|
|
g_clear_error (&error);
|
|
}
|
|
|
|
static gboolean
|
|
have_connection_for_device (NMSettings *self, NMDevice *device)
|
|
{
|
|
NMSettingsPrivate *priv = NM_SETTINGS_GET_PRIVATE (self);
|
|
GHashTableIter iter;
|
|
gpointer data;
|
|
NMSettingConnection *s_con;
|
|
NMSettingWired *s_wired;
|
|
const GByteArray *setting_mac;
|
|
const char *hwaddr;
|
|
|
|
g_return_val_if_fail (NM_IS_SETTINGS (self), FALSE);
|
|
|
|
hwaddr = nm_device_get_hw_address (device);
|
|
|
|
/* Find a wired connection locked to the given MAC address, if any */
|
|
g_hash_table_iter_init (&iter, priv->connections);
|
|
while (g_hash_table_iter_next (&iter, NULL, &data)) {
|
|
NMConnection *connection = NM_CONNECTION (data);
|
|
const char *ctype, *iface;
|
|
|
|
s_con = nm_connection_get_setting_connection (connection);
|
|
|
|
iface = nm_setting_connection_get_interface_name (s_con);
|
|
if (iface && strcmp (iface, nm_device_get_iface (device)) != 0)
|
|
continue;
|
|
|
|
ctype = nm_setting_connection_get_connection_type (s_con);
|
|
if ( strcmp (ctype, NM_SETTING_WIRED_SETTING_NAME)
|
|
&& strcmp (ctype, NM_SETTING_PPPOE_SETTING_NAME))
|
|
continue;
|
|
|
|
s_wired = nm_connection_get_setting_wired (connection);
|
|
|
|
if (!s_wired && !strcmp (ctype, NM_SETTING_PPPOE_SETTING_NAME)) {
|
|
/* No wired setting; therefore the PPPoE connection applies to any device */
|
|
return TRUE;
|
|
}
|
|
|
|
g_assert (s_wired != NULL);
|
|
|
|
setting_mac = nm_setting_wired_get_mac_address (s_wired);
|
|
if (setting_mac && hwaddr) {
|
|
/* A connection mac-locked to this device */
|
|
if (nm_utils_hwaddr_matches (setting_mac->data, setting_mac->len, hwaddr, -1))
|
|
return TRUE;
|
|
} else {
|
|
/* A connection that applies to any wired device */
|
|
return TRUE;
|
|
}
|
|
}
|
|
|
|
/* See if there's a known non-NetworkManager configuration for the device */
|
|
if (nm_device_spec_match_list (device, priv->unrecognized_specs))
|
|
return TRUE;
|
|
|
|
return FALSE;
|
|
}
|
|
|
|
#define DEFAULT_WIRED_CONNECTION_TAG "default-wired-connection"
|
|
#define DEFAULT_WIRED_DEVICE_TAG "default-wired-device"
|
|
|
|
static void default_wired_clear_tag (NMSettings *self,
|
|
NMDevice *device,
|
|
NMSettingsConnection *connection,
|
|
gboolean add_to_no_auto_default);
|
|
|
|
static void
|
|
default_wired_connection_removed_cb (NMSettingsConnection *connection, NMSettings *self)
|
|
{
|
|
NMDevice *device;
|
|
|
|
/* When the default wired connection is removed (either deleted or saved to
|
|
* a new persistent connection by a plugin), write the MAC address of the
|
|
* wired device to the config file and don't create a new default wired
|
|
* connection for that device again.
|
|
*/
|
|
device = g_object_get_data (G_OBJECT (connection), DEFAULT_WIRED_DEVICE_TAG);
|
|
if (device)
|
|
default_wired_clear_tag (self, device, connection, TRUE);
|
|
}
|
|
|
|
static void
|
|
default_wired_connection_updated_by_user_cb (NMSettingsConnection *connection, NMSettings *self)
|
|
{
|
|
NMDevice *device;
|
|
|
|
/* The connection has been changed by the user, it should no longer be
|
|
* considered a default wired connection, and should no longer affect
|
|
* the no-auto-default configuration option.
|
|
*/
|
|
device = g_object_get_data (G_OBJECT (connection), DEFAULT_WIRED_DEVICE_TAG);
|
|
if (device)
|
|
default_wired_clear_tag (self, device, connection, FALSE);
|
|
}
|
|
|
|
static void
|
|
default_wired_clear_tag (NMSettings *self,
|
|
NMDevice *device,
|
|
NMSettingsConnection *connection,
|
|
gboolean add_to_no_auto_default)
|
|
{
|
|
g_return_if_fail (NM_IS_SETTINGS (self));
|
|
g_return_if_fail (NM_IS_DEVICE (device));
|
|
g_return_if_fail (NM_IS_CONNECTION (connection));
|
|
g_return_if_fail (device == g_object_get_data (G_OBJECT (connection), DEFAULT_WIRED_DEVICE_TAG));
|
|
g_return_if_fail (connection == g_object_get_data (G_OBJECT (device), DEFAULT_WIRED_CONNECTION_TAG));
|
|
|
|
g_object_set_data (G_OBJECT (connection), DEFAULT_WIRED_DEVICE_TAG, NULL);
|
|
g_object_set_data (G_OBJECT (device), DEFAULT_WIRED_CONNECTION_TAG, NULL);
|
|
|
|
g_signal_handlers_disconnect_by_func (connection, G_CALLBACK (default_wired_connection_removed_cb), self);
|
|
g_signal_handlers_disconnect_by_func (connection, G_CALLBACK (default_wired_connection_updated_by_user_cb), self);
|
|
|
|
if (add_to_no_auto_default)
|
|
nm_config_set_ethernet_no_auto_default (NM_SETTINGS_GET_PRIVATE (self)->config, device);
|
|
}
|
|
|
|
void
|
|
nm_settings_device_added (NMSettings *self, NMDevice *device)
|
|
{
|
|
NMSettingsPrivate *priv = NM_SETTINGS_GET_PRIVATE (self);
|
|
NMConnection *connection;
|
|
NMSettingsConnection *added;
|
|
NMSetting *setting;
|
|
GError *error = NULL;
|
|
const char *hw_address;
|
|
char *defname, *uuid;
|
|
GByteArray *mac;
|
|
|
|
if (!NM_IS_DEVICE_ETHERNET (device))
|
|
return;
|
|
|
|
/* If the device isn't managed or it already has a default wired connection,
|
|
* ignore it.
|
|
*/
|
|
if ( !nm_device_get_managed (device)
|
|
|| g_object_get_data (G_OBJECT (device), DEFAULT_WIRED_CONNECTION_TAG)
|
|
|| have_connection_for_device (self, device)
|
|
|| !nm_config_get_ethernet_can_auto_default (priv->config, device))
|
|
return;
|
|
|
|
hw_address = nm_device_get_hw_address (device);
|
|
if (!hw_address)
|
|
return;
|
|
|
|
connection = nm_simple_connection_new ();
|
|
setting = nm_setting_connection_new ();
|
|
nm_connection_add_setting (connection, setting);
|
|
|
|
defname = nm_settings_utils_get_default_wired_name (priv->connections);
|
|
uuid = nm_utils_uuid_generate ();
|
|
g_object_set (setting,
|
|
NM_SETTING_CONNECTION_ID, defname,
|
|
NM_SETTING_CONNECTION_TYPE, NM_SETTING_WIRED_SETTING_NAME,
|
|
NM_SETTING_CONNECTION_AUTOCONNECT, TRUE,
|
|
NM_SETTING_CONNECTION_UUID, uuid,
|
|
NM_SETTING_CONNECTION_TIMESTAMP, (guint64) time (NULL),
|
|
NULL);
|
|
g_free (uuid);
|
|
g_free (defname);
|
|
|
|
/* Lock the connection to the device */
|
|
setting = nm_setting_wired_new ();
|
|
nm_connection_add_setting (connection, setting);
|
|
|
|
mac = nm_utils_hwaddr_atoba (hw_address, ETH_ALEN);
|
|
g_object_set (setting, NM_SETTING_WIRED_MAC_ADDRESS, mac, NULL);
|
|
g_byte_array_unref (mac);
|
|
|
|
/* Add the connection */
|
|
added = nm_settings_add_connection (self, connection, FALSE, &error);
|
|
g_object_unref (connection);
|
|
|
|
if (!added) {
|
|
nm_log_warn (LOGD_SETTINGS, "(%s) couldn't create default wired connection: %s",
|
|
nm_device_get_iface (device),
|
|
(error && error->message) ? error->message : "(unknown)");
|
|
g_clear_error (&error);
|
|
return;
|
|
}
|
|
|
|
g_object_set_data (G_OBJECT (added), DEFAULT_WIRED_DEVICE_TAG, device);
|
|
g_object_set_data (G_OBJECT (device), DEFAULT_WIRED_CONNECTION_TAG, added);
|
|
|
|
g_signal_connect (added, NM_SETTINGS_CONNECTION_UPDATED_BY_USER,
|
|
G_CALLBACK (default_wired_connection_updated_by_user_cb), self);
|
|
g_signal_connect (added, NM_SETTINGS_CONNECTION_REMOVED,
|
|
G_CALLBACK (default_wired_connection_removed_cb), self);
|
|
|
|
nm_log_info (LOGD_SETTINGS, "(%s): created default wired connection '%s'",
|
|
nm_device_get_iface (device),
|
|
nm_connection_get_id (NM_CONNECTION (added)));
|
|
}
|
|
|
|
void
|
|
nm_settings_device_removed (NMSettings *self, NMDevice *device, gboolean quitting)
|
|
{
|
|
NMSettingsConnection *connection;
|
|
|
|
connection = g_object_get_data (G_OBJECT (device), DEFAULT_WIRED_CONNECTION_TAG);
|
|
if (connection) {
|
|
default_wired_clear_tag (self, device, connection, FALSE);
|
|
|
|
/* Don't delete the default wired connection on shutdown, so that it
|
|
* remains up and can be assumed if NM starts again.
|
|
*/
|
|
if (quitting == FALSE)
|
|
nm_settings_connection_delete (connection, NULL, NULL);
|
|
}
|
|
}
|
|
|
|
/***************************************************************/
|
|
|
|
/* GCompareFunc helper for sorting "best" connections.
|
|
* The function sorts connections in ascending timestamp order.
|
|
* That means an older connection (lower timestamp) goes before
|
|
* a newer one.
|
|
*/
|
|
gint
|
|
nm_settings_sort_connections (gconstpointer a, gconstpointer b)
|
|
{
|
|
NMSettingsConnection *ac = (NMSettingsConnection *) a;
|
|
NMSettingsConnection *bc = (NMSettingsConnection *) b;
|
|
guint64 ats = 0, bts = 0;
|
|
|
|
if (ac == bc)
|
|
return 0;
|
|
if (!ac)
|
|
return -1;
|
|
if (!bc)
|
|
return 1;
|
|
|
|
/* In the future we may use connection priorities in addition to timestamps */
|
|
nm_settings_connection_get_timestamp (ac, &ats);
|
|
nm_settings_connection_get_timestamp (bc, &bts);
|
|
|
|
if (ats < bts)
|
|
return -1;
|
|
else if (ats > bts)
|
|
return 1;
|
|
return 0;
|
|
}
|
|
|
|
static GSList *
|
|
get_best_connections (NMConnectionProvider *provider,
|
|
guint max_requested,
|
|
const char *ctype1,
|
|
const char *ctype2,
|
|
NMConnectionFilterFunc func,
|
|
gpointer func_data)
|
|
{
|
|
NMSettings *self = NM_SETTINGS (provider);
|
|
NMSettingsPrivate *priv = NM_SETTINGS_GET_PRIVATE (self);
|
|
GSList *sorted = NULL;
|
|
GHashTableIter iter;
|
|
NMSettingsConnection *connection;
|
|
guint added = 0;
|
|
guint64 oldest = 0;
|
|
|
|
g_hash_table_iter_init (&iter, priv->connections);
|
|
while (g_hash_table_iter_next (&iter, NULL, (gpointer) &connection)) {
|
|
guint64 cur_ts = 0;
|
|
|
|
if (ctype1 && !nm_connection_is_type (NM_CONNECTION (connection), ctype1))
|
|
continue;
|
|
if (ctype2 && !nm_connection_is_type (NM_CONNECTION (connection), ctype2))
|
|
continue;
|
|
if (func && !func (provider, NM_CONNECTION (connection), func_data))
|
|
continue;
|
|
|
|
/* Don't bother with a connection that's older than the oldest one in the list */
|
|
if (max_requested && added >= max_requested) {
|
|
nm_settings_connection_get_timestamp (connection, &cur_ts);
|
|
if (cur_ts <= oldest)
|
|
continue;
|
|
}
|
|
|
|
/* List is sorted with oldest first */
|
|
sorted = g_slist_insert_sorted (sorted, connection, nm_settings_sort_connections);
|
|
added++;
|
|
|
|
if (max_requested && added > max_requested) {
|
|
/* Over the limit, remove the oldest one */
|
|
sorted = g_slist_delete_link (sorted, sorted);
|
|
added--;
|
|
}
|
|
|
|
nm_settings_connection_get_timestamp (NM_SETTINGS_CONNECTION (sorted->data), &oldest);
|
|
}
|
|
|
|
return g_slist_reverse (sorted);
|
|
}
|
|
|
|
static const GSList *
|
|
get_connections (NMConnectionProvider *provider)
|
|
{
|
|
GSList *list = NULL;
|
|
NMSettings *self = NM_SETTINGS (provider);
|
|
NMSettingsPrivate *priv = NM_SETTINGS_GET_PRIVATE (self);
|
|
GHashTableIter iter;
|
|
NMSettingsConnection *connection;
|
|
|
|
g_hash_table_iter_init (&iter, priv->connections);
|
|
while (g_hash_table_iter_next (&iter, NULL, (gpointer) &connection))
|
|
list = g_slist_prepend (list, connection);
|
|
list = g_slist_reverse (list);
|
|
|
|
/* Cache the list every call so we can keep it 'const' for callers */
|
|
g_slist_free (priv->get_connections_cache);
|
|
priv->get_connections_cache = list;
|
|
return list;
|
|
}
|
|
|
|
static NMConnection *
|
|
cp_get_connection_by_uuid (NMConnectionProvider *provider, const char *uuid)
|
|
{
|
|
return NM_CONNECTION (nm_settings_get_connection_by_uuid (NM_SETTINGS (provider), uuid));
|
|
}
|
|
|
|
/***************************************************************/
|
|
|
|
NMSettings *
|
|
nm_settings_new (GError **error)
|
|
{
|
|
NMSettings *self;
|
|
NMSettingsPrivate *priv;
|
|
|
|
self = g_object_new (NM_TYPE_SETTINGS, NULL);
|
|
|
|
priv = NM_SETTINGS_GET_PRIVATE (self);
|
|
|
|
priv->config = nm_config_get ();
|
|
priv->dbus_mgr = nm_dbus_manager_get ();
|
|
|
|
/* Load the plugins; fail if a plugin is not found. */
|
|
if (!load_plugins (self, nm_config_get_plugins (priv->config), error)) {
|
|
g_object_unref (self);
|
|
return NULL;
|
|
}
|
|
|
|
load_connections (self);
|
|
|
|
nm_dbus_manager_register_object (priv->dbus_mgr, NM_DBUS_PATH_SETTINGS, self);
|
|
return self;
|
|
}
|
|
|
|
static void
|
|
connection_provider_init (NMConnectionProvider *cp_class)
|
|
{
|
|
cp_class->get_best_connections = get_best_connections;
|
|
cp_class->get_connections = get_connections;
|
|
cp_class->add_connection = _nm_connection_provider_add_connection;
|
|
cp_class->get_connection_by_uuid = cp_get_connection_by_uuid;
|
|
}
|
|
|
|
static void
|
|
nm_settings_init (NMSettings *self)
|
|
{
|
|
NMSettingsPrivate *priv = NM_SETTINGS_GET_PRIVATE (self);
|
|
|
|
priv->connections = g_hash_table_new_full (g_str_hash, g_str_equal, NULL, g_object_unref);
|
|
|
|
/* Hold a reference to the agent manager so it stays alive; the only
|
|
* other holders are NMSettingsConnection objects which are often
|
|
* transient, and we don't want the agent manager to get destroyed and
|
|
* recreated often.
|
|
*/
|
|
priv->agent_mgr = nm_agent_manager_get ();
|
|
|
|
g_signal_connect (priv->agent_mgr, "agent-registered", G_CALLBACK (secret_agent_registered), self);
|
|
}
|
|
|
|
static void
|
|
dispose (GObject *object)
|
|
{
|
|
NMSettings *self = NM_SETTINGS (object);
|
|
NMSettingsPrivate *priv = NM_SETTINGS_GET_PRIVATE (self);
|
|
|
|
g_slist_free_full (priv->auths, (GDestroyNotify) nm_auth_chain_unref);
|
|
priv->auths = NULL;
|
|
|
|
priv->dbus_mgr = NULL;
|
|
|
|
g_object_unref (priv->agent_mgr);
|
|
|
|
G_OBJECT_CLASS (nm_settings_parent_class)->dispose (object);
|
|
}
|
|
|
|
static void
|
|
finalize (GObject *object)
|
|
{
|
|
NMSettings *self = NM_SETTINGS (object);
|
|
NMSettingsPrivate *priv = NM_SETTINGS_GET_PRIVATE (self);
|
|
|
|
g_hash_table_destroy (priv->connections);
|
|
g_slist_free (priv->get_connections_cache);
|
|
|
|
g_slist_free_full (priv->unmanaged_specs, g_free);
|
|
g_slist_free_full (priv->unrecognized_specs, g_free);
|
|
|
|
g_slist_free_full (priv->plugins, g_object_unref);
|
|
|
|
G_OBJECT_CLASS (nm_settings_parent_class)->finalize (object);
|
|
}
|
|
|
|
static void
|
|
get_property (GObject *object, guint prop_id,
|
|
GValue *value, GParamSpec *pspec)
|
|
{
|
|
NMSettings *self = NM_SETTINGS (object);
|
|
NMSettingsPrivate *priv = NM_SETTINGS_GET_PRIVATE (self);
|
|
const GSList *specs, *iter;
|
|
GSList *copy = NULL;
|
|
GHashTableIter citer;
|
|
GPtrArray *array;
|
|
const char *path;
|
|
|
|
switch (prop_id) {
|
|
case PROP_UNMANAGED_SPECS:
|
|
specs = nm_settings_get_unmanaged_specs (self);
|
|
for (iter = specs; iter; iter = g_slist_next (iter))
|
|
copy = g_slist_append (copy, g_strdup (iter->data));
|
|
g_value_take_boxed (value, copy);
|
|
break;
|
|
case PROP_HOSTNAME:
|
|
g_value_take_string (value, nm_settings_get_hostname (self));
|
|
|
|
/* Don't ever pass NULL through D-Bus */
|
|
if (!g_value_get_string (value))
|
|
g_value_set_static_string (value, "");
|
|
break;
|
|
case PROP_CAN_MODIFY:
|
|
g_value_set_boolean (value, !!get_plugin (self, NM_SYSTEM_CONFIG_INTERFACE_CAP_MODIFY_CONNECTIONS));
|
|
break;
|
|
case PROP_CONNECTIONS:
|
|
array = g_ptr_array_sized_new (g_hash_table_size (priv->connections));
|
|
g_hash_table_iter_init (&citer, priv->connections);
|
|
while (g_hash_table_iter_next (&citer, (gpointer) &path, NULL))
|
|
g_ptr_array_add (array, g_strdup (path));
|
|
g_value_take_boxed (value, array);
|
|
break;
|
|
default:
|
|
G_OBJECT_WARN_INVALID_PROPERTY_ID (object, prop_id, pspec);
|
|
break;
|
|
}
|
|
}
|
|
|
|
static void
|
|
nm_settings_class_init (NMSettingsClass *class)
|
|
{
|
|
GObjectClass *object_class = G_OBJECT_CLASS (class);
|
|
|
|
g_type_class_add_private (class, sizeof (NMSettingsPrivate));
|
|
|
|
/* virtual methods */
|
|
object_class->notify = notify;
|
|
object_class->get_property = get_property;
|
|
object_class->dispose = dispose;
|
|
object_class->finalize = finalize;
|
|
|
|
/* properties */
|
|
|
|
g_object_class_install_property
|
|
(object_class, PROP_UNMANAGED_SPECS,
|
|
g_param_spec_boxed (NM_SETTINGS_UNMANAGED_SPECS, "", "",
|
|
DBUS_TYPE_G_LIST_OF_STRING,
|
|
G_PARAM_READABLE |
|
|
G_PARAM_STATIC_STRINGS));
|
|
|
|
g_object_class_install_property
|
|
(object_class, PROP_HOSTNAME,
|
|
g_param_spec_string (NM_SETTINGS_HOSTNAME, "", "",
|
|
NULL,
|
|
G_PARAM_READABLE |
|
|
G_PARAM_STATIC_STRINGS));
|
|
|
|
g_object_class_install_property
|
|
(object_class, PROP_CAN_MODIFY,
|
|
g_param_spec_boolean (NM_SETTINGS_CAN_MODIFY, "", "",
|
|
FALSE,
|
|
G_PARAM_READABLE |
|
|
G_PARAM_STATIC_STRINGS));
|
|
|
|
g_object_class_install_property
|
|
(object_class, PROP_CONNECTIONS,
|
|
g_param_spec_boxed (NM_SETTINGS_CONNECTIONS, "", "",
|
|
DBUS_TYPE_G_ARRAY_OF_OBJECT_PATH,
|
|
G_PARAM_READABLE |
|
|
G_PARAM_STATIC_STRINGS));
|
|
|
|
/* signals */
|
|
signals[PROPERTIES_CHANGED] =
|
|
g_signal_new ("properties-changed",
|
|
G_OBJECT_CLASS_TYPE (object_class),
|
|
G_SIGNAL_RUN_FIRST,
|
|
G_STRUCT_OFFSET (NMSettingsClass, properties_changed),
|
|
NULL, NULL,
|
|
g_cclosure_marshal_VOID__BOXED,
|
|
G_TYPE_NONE, 1, DBUS_TYPE_G_MAP_OF_VARIANT);
|
|
signals[CONNECTION_ADDED] =
|
|
g_signal_new (NM_SETTINGS_SIGNAL_CONNECTION_ADDED,
|
|
G_OBJECT_CLASS_TYPE (object_class),
|
|
G_SIGNAL_RUN_FIRST,
|
|
G_STRUCT_OFFSET (NMSettingsClass, connection_added),
|
|
NULL, NULL,
|
|
g_cclosure_marshal_VOID__OBJECT,
|
|
G_TYPE_NONE, 1, G_TYPE_OBJECT);
|
|
|
|
signals[CONNECTION_UPDATED] =
|
|
g_signal_new (NM_SETTINGS_SIGNAL_CONNECTION_UPDATED,
|
|
G_OBJECT_CLASS_TYPE (object_class),
|
|
G_SIGNAL_RUN_FIRST,
|
|
G_STRUCT_OFFSET (NMSettingsClass, connection_updated),
|
|
NULL, NULL,
|
|
g_cclosure_marshal_VOID__OBJECT,
|
|
G_TYPE_NONE, 1, G_TYPE_OBJECT);
|
|
|
|
signals[CONNECTION_UPDATED_BY_USER] =
|
|
g_signal_new (NM_SETTINGS_SIGNAL_CONNECTION_UPDATED_BY_USER,
|
|
G_OBJECT_CLASS_TYPE (object_class),
|
|
G_SIGNAL_RUN_FIRST,
|
|
0,
|
|
NULL, NULL,
|
|
g_cclosure_marshal_VOID__OBJECT,
|
|
G_TYPE_NONE, 1, G_TYPE_OBJECT);
|
|
|
|
signals[CONNECTION_REMOVED] =
|
|
g_signal_new (NM_SETTINGS_SIGNAL_CONNECTION_REMOVED,
|
|
G_OBJECT_CLASS_TYPE (object_class),
|
|
G_SIGNAL_RUN_FIRST,
|
|
G_STRUCT_OFFSET (NMSettingsClass, connection_removed),
|
|
NULL, NULL,
|
|
g_cclosure_marshal_VOID__OBJECT,
|
|
G_TYPE_NONE, 1, G_TYPE_OBJECT);
|
|
|
|
signals[CONNECTION_VISIBILITY_CHANGED] =
|
|
g_signal_new (NM_SETTINGS_SIGNAL_CONNECTION_VISIBILITY_CHANGED,
|
|
G_OBJECT_CLASS_TYPE (object_class),
|
|
G_SIGNAL_RUN_FIRST,
|
|
G_STRUCT_OFFSET (NMSettingsClass, connection_visibility_changed),
|
|
NULL, NULL,
|
|
g_cclosure_marshal_VOID__OBJECT,
|
|
G_TYPE_NONE, 1, G_TYPE_OBJECT);
|
|
|
|
signals[AGENT_REGISTERED] =
|
|
g_signal_new (NM_SETTINGS_SIGNAL_AGENT_REGISTERED,
|
|
G_OBJECT_CLASS_TYPE (object_class),
|
|
G_SIGNAL_RUN_FIRST,
|
|
G_STRUCT_OFFSET (NMSettingsClass, agent_registered),
|
|
NULL, NULL,
|
|
g_cclosure_marshal_VOID__OBJECT,
|
|
G_TYPE_NONE, 1, G_TYPE_OBJECT);
|
|
|
|
|
|
signals[NEW_CONNECTION] =
|
|
g_signal_new ("new-connection",
|
|
G_OBJECT_CLASS_TYPE (object_class),
|
|
G_SIGNAL_RUN_FIRST, 0, NULL, NULL,
|
|
g_cclosure_marshal_VOID__OBJECT,
|
|
G_TYPE_NONE, 1, G_TYPE_OBJECT);
|
|
|
|
dbus_g_error_domain_register (NM_SETTINGS_ERROR,
|
|
NM_DBUS_INTERFACE_SETTINGS,
|
|
NM_TYPE_SETTINGS_ERROR);
|
|
|
|
/* And register all the settings errors with D-Bus */
|
|
dbus_g_error_domain_register (NM_CONNECTION_ERROR, NULL, NM_TYPE_CONNECTION_ERROR);
|
|
dbus_g_error_domain_register (NM_SETTING_802_1X_ERROR, NULL, NM_TYPE_SETTING_802_1X_ERROR);
|
|
dbus_g_error_domain_register (NM_SETTING_BLUETOOTH_ERROR, NULL, NM_TYPE_SETTING_BLUETOOTH_ERROR);
|
|
dbus_g_error_domain_register (NM_SETTING_CDMA_ERROR, NULL, NM_TYPE_SETTING_CDMA_ERROR);
|
|
dbus_g_error_domain_register (NM_SETTING_CONNECTION_ERROR, NULL, NM_TYPE_SETTING_CONNECTION_ERROR);
|
|
dbus_g_error_domain_register (NM_SETTING_GSM_ERROR, NULL, NM_TYPE_SETTING_GSM_ERROR);
|
|
dbus_g_error_domain_register (NM_SETTING_IP4_CONFIG_ERROR, NULL, NM_TYPE_SETTING_IP4_CONFIG_ERROR);
|
|
dbus_g_error_domain_register (NM_SETTING_IP6_CONFIG_ERROR, NULL, NM_TYPE_SETTING_IP6_CONFIG_ERROR);
|
|
dbus_g_error_domain_register (NM_SETTING_OLPC_MESH_ERROR, NULL, NM_TYPE_SETTING_OLPC_MESH_ERROR);
|
|
dbus_g_error_domain_register (NM_SETTING_PPP_ERROR, NULL, NM_TYPE_SETTING_PPP_ERROR);
|
|
dbus_g_error_domain_register (NM_SETTING_PPPOE_ERROR, NULL, NM_TYPE_SETTING_PPPOE_ERROR);
|
|
dbus_g_error_domain_register (NM_SETTING_SERIAL_ERROR, NULL, NM_TYPE_SETTING_SERIAL_ERROR);
|
|
dbus_g_error_domain_register (NM_SETTING_ADSL_ERROR, NULL, NM_TYPE_SETTING_ADSL_ERROR);
|
|
dbus_g_error_domain_register (NM_SETTING_VPN_ERROR, NULL, NM_TYPE_SETTING_VPN_ERROR);
|
|
dbus_g_error_domain_register (NM_SETTING_WIRED_ERROR, NULL, NM_TYPE_SETTING_WIRED_ERROR);
|
|
dbus_g_error_domain_register (NM_SETTING_WIRELESS_SECURITY_ERROR, NULL, NM_TYPE_SETTING_WIRELESS_SECURITY_ERROR);
|
|
dbus_g_error_domain_register (NM_SETTING_WIRELESS_ERROR, NULL, NM_TYPE_SETTING_WIRELESS_ERROR);
|
|
dbus_g_error_domain_register (NM_SETTING_ERROR, NULL, NM_TYPE_SETTING_ERROR);
|
|
|
|
dbus_g_object_type_install_info (NM_TYPE_SETTINGS, &dbus_glib_nm_settings_object_info);
|
|
|
|
}
|
|
|