Commit Graph

46 Commits

Author SHA1 Message Date
Jiří Klimeš
088454fcab ifcfg-rh: fix assertion failure when IP4 setting is missing while writing connection 2010-09-30 15:13:39 +02:00
Dan Williams
5e88c45925 ifcfg-rh: use IFCFG_PLUGIN_ERROR instead of ifcfg_plugin_error_quark ()
Trivial cleanup.
2010-08-04 16:27:34 -05:00
Dan Williams
4d43ce8fa0 Merge remote branch 'origin/master' into zvm 2010-07-27 23:24:10 -07:00
Dan Williams
bebf8d48b0 Revert "ip6: remove standalone DHCP method since DHCPv6 can't provide gateways" (rh #612445)
This reverts commit a729d2f649.

Turns out this is a valid IP config method that some sites use.
2010-07-27 21:43:42 -07:00
Dan Williams
16bccfd672 core: handle s390 options more cleanly
There are so many... so handle them as a table of key/value pairs
instead of having separate functions for each one.  At the moment
nothing but subchannels is used internally, but this allows plugins
to preserve options that NM doesn't care about when reading/writing
system configuration.
2010-06-29 00:37:14 -07:00
Dan Williams
cdf8c079ef ifcfg-rh: read and write various s390 settings 2010-06-25 23:46:47 -07:00
Dan Williams
ac9d2804bd Merge remote branch 'origin/master' into zvm 2010-06-25 19:57:30 -07:00
Dan Williams
91ab673b5c ifcfg-rh: ensure SSIDs don't get double-quoted when written out (rh #606518) 2010-06-25 09:56:53 -07:00
Jiří Klimeš
1b49f941a6 core: MAC address spoofing/cloning (rh #447827) (bgo #553771)
This commit implements MAC cloning feature in NetworkManager. To support that,
'PermHwAddress' property is added into *.Device.Wired and *.Device.Wireless
interfaces. The permanent MAC address is obtained when creating the device, and
is used for 'locking' connections to the device. If a cloned MAC is specified
in connection to be activated, the MAC is set to the interface in stage1. While
disconecting, the permanent MAC is set back to the interface.
2010-06-22 14:21:25 +02:00
Dan Williams
0b41797b49 s390: replace 'zvm' with s390
ZVM isn't the right terminology here.  s390 is.
2010-06-17 21:24:14 -07:00
Dan Williams
a5d8872c3e Merge remote branch 'origin/master' into zvm 2010-06-17 21:14:09 -07:00
Jiří Klimeš
4e02c67a94 ifcfg-rh: fix reading/writing ASCII WEP keys
ifcfg-rh plugin didn't prepend 's:' prefix when writing out ASCII WEP
keys. That rendered the keys file invalid. Moreover, the reading part
was incorrect too not having recognized correct ASCII keys.
2010-06-17 14:57:25 +02:00
Dan Williams
e22346b9d0 ifcfg-rh: handle z/VM subchannels (rh #591533) 2010-05-26 17:35:57 -07:00
Dan Williams
a729d2f649 ip6: remove standalone DHCP method since DHCPv6 can't provide gateways
All IPv6 enabled sites are expected to provide router advertisement
support apparently.  If standalone DHCP is really used in the wild
then we can clearly re-enable it later.
2010-05-20 10:24:13 -07:00
Dan Williams
13e1aaa423 ifcfg-rh: add support for non-fatal IP configuration failure 2010-05-03 01:33:55 -07:00
Dan Williams
7b38686dbd Merge remote branch 'origin/master' into ip6only 2010-04-23 14:34:39 -07:00
Dan Williams
f20f7294f6 ifcfg-rh: fix handling of WEP passphrases (rh #581718)
ifcfg-rh wasn't updated for WEP passphrases after that capability
got added.  Can't use KEY for passphrases since there's no way
to distinguish some WEP passphrases from some WEP Hex and ASCII
keys, so we use KEY_PASSPHRASE instead.
2010-04-23 14:20:10 -07:00
Dan Williams
24bd77dc92 ifcfg-rh: missing IP4 setting means DHCP 2010-04-23 12:55:05 -07:00
Dan Williams
fe25e20f6a ifcfg-rh: handle disabled IPv4 correctly
Instead of not including the IP4 setting, set its method to disabled.
In reality either one is legal, but including the IP4 setting wtih
the method set to 'disabled' is more explicit.
2010-04-15 14:52:43 -07:00
Dan Williams
dc7fe96e3f ifcfg-rh: fix IPv6-only configurations (rh #538499) 2010-04-12 16:24:07 -07:00
Jiří Klimeš
ab529302a7 ifcfg-rh: fix setting MTU to "automatic" for wired connections (rh #569319)
ifcfg-rh plugin was not able to reset MTU to "automatic" if it had been
set to a value, for wired connection. This fix removes "MTU" variable
from the ifcfg-* file when mtu is 0.
2010-04-12 17:15:28 +02:00
Dan Williams
13af29f693 ifcfg-rh: read and write DHCPv6 connections 2010-01-22 12:04:52 -08:00
Dan Williams
79303517ee ifcfg-rh: formatting fix 2010-01-20 16:37:49 -08:00
Dan Williams
79db492854 ifcfg-rh: ensure IPv6 addresses are cleared when none get written out 2010-01-20 16:30:06 -08:00
Jirka Klimes
686425adce ifcfg-rh: add IPv6 addressing and routes support (rh #523288) 2010-01-05 19:06:27 -06:00
Dan Williams
16c29e6daf ifcfg-rh: remove unused variables 2009-12-23 11:11:11 -08:00
Jirka Klimes
9e93924cca ifcfg-rh: add routes file support (rh #507307)
Add support for reading and writing routes files for ifcfg connections.
2009-12-07 14:23:26 -08:00
Gene Czarcinski
f7d7b3193d ifcfg-rh: interpret DEFROUTE as never-default (rh #528281)
Testcases and cleanups by dcbw.
2009-11-13 14:40:13 -08:00
Dan Williams
4eb2346b67 ifcfg-rh: fix writing LEAP connections 2009-10-19 10:20:25 -07:00
Dan Williams
28e2e44686 ifcfg-rh: really fix writing the WPA PSK and add testcase for it 2009-09-28 15:29:29 -07:00
Dan Williams
4f6eef9e77 ifcfg-rh: quote WPA passphrases when writing connections
The reader requires passphrases to be quoted, but the writer wasn't
doing that.  Hex PSKs were fine though.
2009-09-28 13:34:42 -07:00
Dan Williams
8c35e96b60 libnm-util: add nm_utils_rsa_key_encrypt() and fix crypto padding mixups
To be backwards compatible clients need to handle both paths to private
keys and the decrypted private key data, which is what used to get passed
in the private-key and phase2-private-key attributes of the 802.1x setting.
When moving a connection around between system-settings and user-settings,
if the private key is decrypted data, the settings service needs to store
that decrypted data somewhere so that the key can be sent to NM during
the connection process.

But we don't want to store the decrypted private key data, so we have to
re-encrypt it (possibly generating a private key password if one wasn't
sent with the decrypted data) and save it to disk, then send NM a path
to that private key during connection.

To help clients do this, and so that they don't have to carry around
multiple crypto implementations depending on whether they want to use
NSS or gnutls/gcrypt, add a helper to libnm-util.

Furthermore, I misunderstood a bunch of stuff with crypto padding when
writing the encrypt/decrypt functions long ago, so fix that up.  Don't
return padding as part of the decrypted data, and make sure to verify
the padding's expected lengths and values when decrypting.  Many thanks
to Nalin Dahyabhai for pointing me in the right direction.
2009-09-15 16:01:50 -07:00
Dan Williams
a371951fbc ifcfg-rh: clarify comment 2009-09-14 21:04:19 -07:00
Dan Williams
e5ed391f28 libnm-util: allow certificate/key paths
Overload the certificate and key properties to allow paths to the
certificates and keys using a special prefix for the property data.
Add API to libnm-util for easy certificate path handling, and
documentation for NMSetting8021x.
2009-09-04 09:07:00 -05:00
Dan Williams
80bb28eff2 ifcfg-rh: fix printf format of guint64 2009-04-14 18:47:46 -04:00
Dan Williams
5c3fe78d4b ifcfg-rh: fix writing TTLS-TLS connections and add testcases
Fixes memory leak where ifcfg structure wouldn't be closed on write error too.
2009-04-14 09:09:59 -04:00
Dan Williams
bebe3e891b ifcfg-rh: fix read/write of EAP-TLS connections
TLS uses the 'identity' which previously wasn't read.  The private key
password should also only be used for PKCS#12 files, becuase they aren't
decrypted when read into the setting.

Private keys also need to be handled differently; PKCS#12 keys are written
out unchanged (ie, still encrypted) with their corresponding private key.
DER keys are stored in the setting unencrypted, so they are re-encrypted
before being written out to disk.  But because the private key password
isn't known for DER keys, a random password must be used to re-encrypt
the key.
2009-04-14 09:09:43 -04:00
Dan Williams
f4c1b422cf ifcfg-rh: fix writing multiple WPA & WPA ciphers 2009-04-14 09:09:37 -04:00
Dan Williams
8bbe884d0c ifcfg-rh: ensure certificates & private keys are mode 0600
g_file_set_contents() doesn't allow us to specify the mode, so roll
our own version.
2009-04-14 09:09:30 -04:00
Dan Williams
b564bfb5e2 ifcfg-rh: fix reading/writing PEAP and wired 802.1x connections 2009-04-14 09:09:25 -04:00
Dan Williams
0ee2250583 ifcfg-rh: test and fix up wifi WEP connection writing 2009-04-14 09:09:01 -04:00
Dan Williams
f40d502492 ifcfg-rh: don't write LAST_CONNECT if it's 0 2009-04-14 09:08:44 -04:00
Dan Williams
5ebed3ebfa ifcfg-rh: fix wifi channel and MTU read/write 2009-04-14 09:08:38 -04:00
Dan Williams
13c5e660de ifcfg-rh: read multiple IP addresses, more DNS servers, write more IP4 stuff
Add a simple testcase for write too.
2009-04-14 09:08:20 -04:00
Dan Williams
44964d3b5e ifcfg-rh: initial write support for wifi & wired 2009-04-14 09:08:14 -04:00
Dan Williams
1974b257e0 ifcfg-rh: begin adding write support 2009-04-14 09:08:08 -04:00