Commit Graph

8762 Commits

Author SHA1 Message Date
Dan Williams
832c1aa69b release: bump version to 0.9.0
Yay!
2011-08-22 20:33:07 -05:00
Dan Williams
2a5617c22b docs: update documentation for nm_utils_security_valid() 2011-08-22 20:33:07 -05:00
Dan Williams
911328e520 docs: update NetworkManager.h code documentation 2011-08-22 20:33:07 -05:00
Dan Williams
c9f1a728ac build: update gitignore 2011-08-22 20:33:07 -05:00
Dan Williams
a8eaa4a3ea docs: fix a wrong variable name in code documentation 2011-08-22 20:33:07 -05:00
Dan Williams
e3cc3366b2 docs: fix a prototype causing doc generation warnings 2011-08-22 20:33:07 -05:00
Dan Williams
389c847a78 doc: fix a settings specification type 2011-08-22 18:15:41 -05:00
Andika Triwidada
1a12a30679 po: updated Indonesian translation (bgo #656514) 2011-08-22 18:08:07 -05:00
Dan Williams
1bae763d4d build: mention libiw (in addition to wireless-tools) if headers aren't found (bgo #656340) 2011-08-22 17:30:45 -05:00
Yuri Chornoivan
aa9d902add po: updated Ukranian translation (bgo #656921) 2011-08-22 17:25:08 -05:00
Evan Broder
0b8097a26a supplicant: incorporate subject_match and altsubject_matches into supplicant config (bgo #341323) 2011-08-19 18:20:49 -05:00
Evan Broder
ca968105da supplicant: add new separator option to ADD_STRING_LIST_VAL macro 2011-08-19 18:20:49 -05:00
Evan Broder
4f38f02add settings: add 802.1X setting properties for subject and altsubject matches
Includes subject_match and phase2_subject_match (string) parameters,
and altsubject_matches and phase2_altsubject_matches (list of string)
parameters.

subject_match is matched against a substring of the subject from the
certificate presented by the remote authentication server. If this
option is unset, no subject verification is performed.

altsubject_matches are each tested against the alternate subject name
(altSubjectName) of the certificate presented by the remote
authentication server. If this option is unset, no verification of the
altSubjectName is performed.
2011-08-19 18:20:41 -05:00
Dan Williams
770548ac04 dbus: ensure NM can talk to newly installed VPN plugins (fdo #39463)
When new services are installed and the daemon reloads bus policy
(like when installing new VPN plugins with rpm or dpkg) it appears
the rules don't get loaded into NetworkManager's policy space.
Thus any D-Bus message NM sends to the newly installed VPN plugin
gets denied until a restart of NM or the machine.  Work around
this dbus bug by letting NM talk to all known VPN services in the
NM policy file which will always exist when NM is around.
2011-08-19 16:55:16 -05:00
Dan Williams
66281b4ec3 Merge remote-tracking branch 'origin/master' into agent-secrets 2011-08-16 18:00:32 -05:00
Dan Williams
dcc0f835db Merge remote-tracking branch 'origin/master' into libnl3 2011-08-16 17:58:52 -05:00
Tomeu Vizoso
77e9cd53a8 libnm-glib: allow to constuct NMObject with NULL bus 2011-08-16 17:21:07 -05:00
Tomeu Vizoso
dd175e3bf7 libnm-glib: warn early if an object is tried to be instantiated without a path 2011-08-16 17:20:49 -05:00
Daniel Drake
87b88fd38c libnm-glib: allow NMRemoteSettings constructor with NULL bus
NMRemoteSettings's constructor requires a DBusGConnection, but there
currently aren't any usable gobject-introspection bindings for that class.
This means that NMRemoteSettings can't be used over gobject-introspection.

Move the default fallback to the system bus into the constructor path, so
that introspection bindings are usable.

Python test case:
	from gi.repository import NMClient
	NMClient.RemoteSettings()

Before, this produced a segfault. Now it returns a usable RemoteSettings
object.
2011-08-16 17:19:15 -05:00
Alfredo Matos
07cc83fbdb libnl: Move to common route add function interface 2011-08-16 17:16:02 -05:00
Alfredo Matos
a73039c0ec libnl: Create a common netlink route add function 2011-08-16 17:11:52 -05:00
Alfredo Matos
83b1b1660f libnl: route delete can return ERANGE in libnl-1 2011-08-16 17:10:30 -05:00
Alfredo Matos
638d3beb01 libnl: Use compat return for nl_route_add() 2011-08-16 17:08:57 -05:00
Alfredo Matos
2e32003fd2 libnl3: Fix ESRCH return types
ESRCH becomes NLE_OBJ_NOTFOUND. Includes workaround for libnl
  aliased return value where ESRCH is being converted to a generic
  unspecified error by libnl [1].

  [1] http://git.kernel.org/?p=libs/netlink/libnl.git;a=commit;h=7e9d5f
2011-08-16 16:58:19 -05:00
Alfredo Matos
790c16c9f2 libnl3: Add ESRCH to compat error translation 2011-08-16 16:48:30 -05:00
Dan Williams
7addf3009a Merge remote-tracking branch 'origin/master' into libnl3 2011-08-16 16:45:41 -05:00
Daniel Gnoutcheff
f14d8b18ee modem: fix race with nm_modem_set_mm_enabled
Once we've sent a method call over DBus requesting that the modem be
disabled, we should assume that the modem is disabled unless we hear
otherwise.  Otherwise, code that checks the modem state immediately
after it gets disabled might think that it's enabled when it almost
certainly is not.
2011-08-16 16:37:01 -05:00
Daniel Gnoutcheff
ac27e33f0c policy: don't autoconnect disabled modems
Normally, a device disabled via nm_device_interface_set_enabled() will
shift into the UNAVAILABLE state.  Modems, however, don't do that.
Rather, they pretend that they are in the DISCONNECTED state, presumably
to make it easier to re-enable them.  To avoid accidentally re-enabling
and autoconnecting a disabled modem, we need to explicitly make
nm_device_interface_get_enabled() == true a prerequisite for
autoconnecting.
2011-08-16 16:34:21 -05:00
Dan Williams
2b2404bbef settings: preserve agent secrets the right way
What we want to do here is keep separate caches of system and
agent secrets.  For system secrets, we cache them because NM
periodically clears secrets using nm_connection_clear_secrets() to
ensure they don't stay around in memory, and that transient secrets
get requested again when they are needed.  For agent secrets, we
only want them during activation, but a connection read from disk
will not include agent secrets becuase by definition they aren't
stored in system settings along with the connection.  Thus we need
to keep the agent/transient secrets somewhere for the duration of
the activation to ensure they don't get deleted.

This removes the copy-back hack in update_auth_cb() which copied
agent/transient secrets back into the connection over top of the
transient secrets that had been copied back in
nm_settings_connection_replace_settings().  No reason to copy
them twice if we keep an agent/transient secrets hash and do
the right thing with it.
2011-08-16 16:19:23 -05:00
Dan Williams
e2d88f59e6 settings: preserve agent secrets over Update operation
The core problem was that the Update would trigger a write to
disk to save the connection's new settings, which called
nm_settings_connection_replace_settings().  Which saved existing
transient (agent/unsaved) secrets, replaced settings with the
new ones from Update(), then copied back the old transient
secrets.  This was to ensure that changes triggered from getting
agent secrets during activation (which might write the connection
out to disk if new system secrets were provided, which triggered
an inotify read-back of the connection, which blew away the
transient secrets just returned from the agent) didn't blow away
transient secrets.  Unfortunately that fix was too general.

As a quick hack for now, copy the new secrets and re-apply them
after nm_connection_replace_settings() has run.  We'll do the
actual fix later, but it's more involved and needs more testing
so we don't want to apply it this close to release.
2011-08-16 15:48:38 -05:00
Dan Williams
4d635844ec cli: remove unused libraries from the makefile
Nothing in cli uses the marshalller stuff.
2011-08-12 11:05:08 -05:00
Dan Williams
0cb27772f3 docs: update VPN setting 'user-name' property documentation
Lamarque wanted clarification about how it's supposed to be used.
2011-08-12 10:23:25 -05:00
Dan Williams
6c901ab040 api: update version based on configure version
Instead of manually which is error-prone.
2011-08-06 11:19:33 +02:00
Dan Williams
310880a104 api: fix up node names
Not sure if it really makes a difference, but...
2011-08-06 10:46:21 +02:00
Dan Williams
bf89da140c examples: fix up active connection example 2011-08-06 10:44:50 +02:00
Dan Williams
c957fdfb52 examples: make some examples executable 2011-08-05 15:55:51 +02:00
Dan Williams
dab37276d2 examples: new example for printing active connection list 2011-08-05 15:55:14 +02:00
Dan Williams
f1a8227436 nm-tool: show WiMAX info when available
libnm-glib will always be built with WiMAX enabled so we might as well
show it.  It's only NM itself that gets built with/without WiMAX
support.
2011-08-04 14:22:15 -05:00
Jiří Klimeš
9a112d8eeb man: updated man pages 2011-08-02 15:25:40 +02:00
Jiří Klimeš
adc7ec170d ifcfg-rh: make NM_CONTROLLED changes function properly (rh #727501)
Changing NM_CONTROLED from "no" to "yes" worked just the first time.
Fix that by storing unmanaged spec when interface becomes unmanaged
and adjust condition identifying "no-change" updates to the ifcfg
file.
2011-08-02 12:18:52 +02:00
Jiří Klimeš
312c7c952c ifcfg-rh: emit "updated" signal when connection file is changed (rh #727501)
Chain up to parent's commit_changes() even if in-memory and on-disk data are the
same; they are the same when another process changes the on-disk file. Just make
sure not to write out the data needlessly when same.

This fixes a regression caused by 9cba854fa0.
It exhibits e.g. by not auto-activating connection when ONBOOT is changed from
"no" to "yes". Connection "updated" signal was not emitted and listeners like
NMPolicy was not prodded.
2011-08-02 12:18:43 +02:00
Dan Williams
76ecc09989 core: don't warn if loopback address already exists 2011-07-30 16:53:42 -05:00
Dan Williams
7c06436822 Merge remote-tracking branch 'origin/master' into libnl3 2011-07-30 16:48:46 -05:00
Dan Williams
b562839df8 core: misc style fixes to libnl compat code 2011-07-30 15:47:39 -05:00
Alfredo Matos
daeb181fa2 core: add libnl-3 API compatibility 2011-07-30 15:47:33 -05:00
Alfredo Matos
a6c6556831 core: add libnl-2 support with libnl-1 compatibility 2011-07-30 15:47:26 -05:00
Daniel Gnoutcheff
1a98391dc4 supplicant: fix DBus signal signatures
The DBus signatures registered (via dbus_g_proxy_add_signal) for the
fi.w1.wpa_supplicant.Interface.{BSSAdded,ScanDone} signals were
incorrect.  That prevented us from receiving wifi ap scan results, at
least in the case where wpa_supplicant has DBus introspection disabled.
2011-07-29 16:34:03 -05:00
Seongho Cho
54f41031c4 po: updated Korean translation (bgo #655332) 2011-07-28 13:59:23 -05:00
Krzesimir Nowak
c2fffd76d2 build: put test source code into AC_LANG_PROGRAM (bgo #655225)
This change silences autotools warnings about source code not
being inside AC_LANG_SOURCE in AC_LANG_CONFTEST.
2011-07-28 13:53:36 -05:00
Dan Williams
f742b06304 wifi: handle a few more possible D-Bus activation errors
There's two possibilities for errors from D-Bus when trying to
activate the supplicant; either we ignore the error and wait
for the supplicant to restart or be started, or it's a hard
error and we can't continue without risking worse behavior (ie
out of memory, supplicant spawns but exits immediately, etc).
This adds a few more harmless errors to the first category
which can happen if the supplicant's .service file exists
but the supplicant does not, in which case we just wait for
it to magically show up later.
2011-07-28 09:54:06 -05:00