
Shift argc and argc manually between argument ant its value and use next_arg() between arguments everywhere. Whill be useful to parse global arguments.
1835 lines
51 KiB
C
1835 lines
51 KiB
C
/*
|
|
* nmcli - command-line tool for controlling NetworkManager
|
|
* Common functions and data shared between files.
|
|
*
|
|
* This program is free software; you can redistribute it and/or modify
|
|
* it under the terms of the GNU General Public License as published by
|
|
* the Free Software Foundation; either version 2 of the License, or
|
|
* (at your option) any later version.
|
|
*
|
|
* This program is distributed in the hope that it will be useful,
|
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
* GNU General Public License for more details.
|
|
*
|
|
* You should have received a copy of the GNU General Public License along
|
|
* with this program; if not, write to the Free Software Foundation, Inc.,
|
|
* 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA.
|
|
*
|
|
* Copyright 2012 - 2014 Red Hat, Inc.
|
|
*/
|
|
|
|
#include "nm-default.h"
|
|
|
|
#include <stdio.h>
|
|
#include <stdlib.h>
|
|
#include <errno.h>
|
|
#include <termios.h>
|
|
#include <sys/ioctl.h>
|
|
#include <readline/readline.h>
|
|
#include <readline/history.h>
|
|
|
|
#include "nm-vpn-helpers.h"
|
|
#include "common.h"
|
|
#include "utils.h"
|
|
|
|
extern GMainLoop *loop;
|
|
|
|
/* Available fields for IPv4 group */
|
|
NmcOutputField nmc_fields_ip4_config[] = {
|
|
{"GROUP", N_("GROUP")}, /* 0 */
|
|
{"ADDRESS", N_("ADDRESS")}, /* 1 */
|
|
{"GATEWAY", N_("GATEWAY")}, /* 2 */
|
|
{"ROUTE", N_("ROUTE")}, /* 3 */
|
|
{"DNS", N_("DNS")}, /* 4 */
|
|
{"DOMAIN", N_("DOMAIN")}, /* 5 */
|
|
{"WINS", N_("WINS")}, /* 6 */
|
|
{NULL, NULL}
|
|
};
|
|
#define NMC_FIELDS_IP4_CONFIG_ALL "GROUP,ADDRESS,GATEWAY,ROUTE,DNS,DOMAIN,WINS"
|
|
|
|
/* Available fields for DHCPv4 group */
|
|
NmcOutputField nmc_fields_dhcp4_config[] = {
|
|
{"GROUP", N_("GROUP")}, /* 0 */
|
|
{"OPTION", N_("OPTION")}, /* 1 */
|
|
{NULL, NULL}
|
|
};
|
|
#define NMC_FIELDS_DHCP4_CONFIG_ALL "GROUP,OPTION"
|
|
|
|
/* Available fields for IPv6 group */
|
|
NmcOutputField nmc_fields_ip6_config[] = {
|
|
{"GROUP", N_("GROUP")}, /* 0 */
|
|
{"ADDRESS", N_("ADDRESS")}, /* 1 */
|
|
{"GATEWAY", N_("GATEWAY")}, /* 2 */
|
|
{"ROUTE", N_("ROUTE")}, /* 3 */
|
|
{"DNS", N_("DNS")}, /* 4 */
|
|
{"DOMAIN", N_("DOMAIN")}, /* 5 */
|
|
{NULL, NULL}
|
|
};
|
|
#define NMC_FIELDS_IP6_CONFIG_ALL "GROUP,ADDRESS,GATEWAY,ROUTE,DNS,DOMAIN"
|
|
|
|
/* Available fields for DHCPv6 group */
|
|
NmcOutputField nmc_fields_dhcp6_config[] = {
|
|
{"GROUP", N_("GROUP")}, /* 0 */
|
|
{"OPTION", N_("OPTION")}, /* 1 */
|
|
{NULL, NULL}
|
|
};
|
|
#define NMC_FIELDS_DHCP6_CONFIG_ALL "GROUP,OPTION"
|
|
|
|
|
|
gboolean
|
|
print_ip4_config (NMIPConfig *cfg4,
|
|
NmCli *nmc,
|
|
const char *group_prefix,
|
|
const char *one_field)
|
|
{
|
|
GPtrArray *ptr_array;
|
|
char **addr_arr = NULL;
|
|
char **route_arr = NULL;
|
|
char **dns_arr = NULL;
|
|
char **domain_arr = NULL;
|
|
char **wins_arr = NULL;
|
|
int i = 0;
|
|
NmcOutputField *tmpl, *arr;
|
|
size_t tmpl_len;
|
|
|
|
if (cfg4 == NULL)
|
|
return FALSE;
|
|
|
|
tmpl = nmc_fields_ip4_config;
|
|
tmpl_len = sizeof (nmc_fields_ip4_config);
|
|
nmc->print_fields.indices = parse_output_fields (one_field ? one_field : NMC_FIELDS_IP4_CONFIG_ALL,
|
|
tmpl, FALSE, NULL, NULL);
|
|
arr = nmc_dup_fields_array (tmpl, tmpl_len, NMC_OF_FLAG_FIELD_NAMES);
|
|
g_ptr_array_add (nmc->output_data, arr);
|
|
|
|
/* addresses */
|
|
ptr_array = nm_ip_config_get_addresses (cfg4);
|
|
if (ptr_array) {
|
|
addr_arr = g_new (char *, ptr_array->len + 1);
|
|
for (i = 0; i < ptr_array->len; i++) {
|
|
NMIPAddress *addr = (NMIPAddress *) g_ptr_array_index (ptr_array, i);
|
|
|
|
addr_arr[i] = g_strdup_printf ("%s/%u",
|
|
nm_ip_address_get_address (addr),
|
|
nm_ip_address_get_prefix (addr));
|
|
}
|
|
addr_arr[i] = NULL;
|
|
}
|
|
|
|
/* routes */
|
|
ptr_array = nm_ip_config_get_routes (cfg4);
|
|
if (ptr_array) {
|
|
route_arr = g_new (char *, ptr_array->len + 1);
|
|
for (i = 0; i < ptr_array->len; i++) {
|
|
NMIPRoute *route = (NMIPRoute *) g_ptr_array_index (ptr_array, i);
|
|
const char *next_hop;
|
|
|
|
next_hop = nm_ip_route_get_next_hop (route);
|
|
if (!next_hop)
|
|
next_hop = "0.0.0.0";
|
|
|
|
route_arr[i] = g_strdup_printf ("dst = %s/%u, nh = %s%c mt = %u",
|
|
nm_ip_route_get_dest (route),
|
|
nm_ip_route_get_prefix (route),
|
|
next_hop,
|
|
nm_ip_route_get_metric (route) == -1 ? '\0' : ',',
|
|
(guint32) nm_ip_route_get_metric (route));
|
|
}
|
|
route_arr[i] = NULL;
|
|
}
|
|
|
|
/* DNS */
|
|
dns_arr = g_strdupv ((char **) nm_ip_config_get_nameservers (cfg4));
|
|
|
|
/* domains */
|
|
domain_arr = g_strdupv ((char **) nm_ip_config_get_domains (cfg4));
|
|
|
|
/* WINS */
|
|
wins_arr = g_strdupv ((char **) nm_ip_config_get_wins_servers (cfg4));
|
|
|
|
arr = nmc_dup_fields_array (tmpl, tmpl_len, NMC_OF_FLAG_SECTION_PREFIX);
|
|
set_val_strc (arr, 0, group_prefix);
|
|
set_val_arr (arr, 1, addr_arr);
|
|
set_val_strc (arr, 2, nm_ip_config_get_gateway (cfg4));
|
|
set_val_arr (arr, 3, route_arr);
|
|
set_val_arr (arr, 4, dns_arr);
|
|
set_val_arr (arr, 5, domain_arr);
|
|
set_val_arr (arr, 6, wins_arr);
|
|
g_ptr_array_add (nmc->output_data, arr);
|
|
|
|
print_data (nmc); /* Print all data */
|
|
|
|
/* Remove any previous data */
|
|
nmc_empty_output_fields (nmc);
|
|
|
|
return TRUE;
|
|
}
|
|
|
|
gboolean
|
|
print_ip6_config (NMIPConfig *cfg6,
|
|
NmCli *nmc,
|
|
const char *group_prefix,
|
|
const char *one_field)
|
|
{
|
|
GPtrArray *ptr_array;
|
|
char **addr_arr = NULL;
|
|
char **route_arr = NULL;
|
|
char **dns_arr = NULL;
|
|
char **domain_arr = NULL;
|
|
int i = 0;
|
|
NmcOutputField *tmpl, *arr;
|
|
size_t tmpl_len;
|
|
|
|
if (cfg6 == NULL)
|
|
return FALSE;
|
|
|
|
tmpl = nmc_fields_ip6_config;
|
|
tmpl_len = sizeof (nmc_fields_ip6_config);
|
|
nmc->print_fields.indices = parse_output_fields (one_field ? one_field : NMC_FIELDS_IP6_CONFIG_ALL,
|
|
tmpl, FALSE, NULL, NULL);
|
|
arr = nmc_dup_fields_array (tmpl, tmpl_len, NMC_OF_FLAG_FIELD_NAMES);
|
|
g_ptr_array_add (nmc->output_data, arr);
|
|
|
|
/* addresses */
|
|
ptr_array = nm_ip_config_get_addresses (cfg6);
|
|
if (ptr_array) {
|
|
addr_arr = g_new (char *, ptr_array->len + 1);
|
|
for (i = 0; i < ptr_array->len; i++) {
|
|
NMIPAddress *addr = (NMIPAddress *) g_ptr_array_index (ptr_array, i);
|
|
|
|
addr_arr[i] = g_strdup_printf ("%s/%u",
|
|
nm_ip_address_get_address (addr),
|
|
nm_ip_address_get_prefix (addr));
|
|
}
|
|
addr_arr[i] = NULL;
|
|
}
|
|
|
|
/* routes */
|
|
ptr_array = nm_ip_config_get_routes (cfg6);
|
|
if (ptr_array) {
|
|
route_arr = g_new (char *, ptr_array->len + 1);
|
|
for (i = 0; i < ptr_array->len; i++) {
|
|
NMIPRoute *route = (NMIPRoute *) g_ptr_array_index (ptr_array, i);
|
|
const char *next_hop;
|
|
|
|
next_hop = nm_ip_route_get_next_hop (route);
|
|
if (!next_hop)
|
|
next_hop = "::";
|
|
|
|
route_arr[i] = g_strdup_printf ("dst = %s/%u, nh = %s%c mt = %u",
|
|
nm_ip_route_get_dest (route),
|
|
nm_ip_route_get_prefix (route),
|
|
next_hop,
|
|
nm_ip_route_get_metric (route) == -1 ? '\0' : ',',
|
|
(guint32) nm_ip_route_get_metric (route));
|
|
}
|
|
route_arr[i] = NULL;
|
|
}
|
|
|
|
/* DNS */
|
|
dns_arr = g_strdupv ((char **) nm_ip_config_get_nameservers (cfg6));
|
|
|
|
/* domains */
|
|
domain_arr = g_strdupv ((char **) nm_ip_config_get_domains (cfg6));
|
|
|
|
arr = nmc_dup_fields_array (tmpl, tmpl_len, NMC_OF_FLAG_SECTION_PREFIX);
|
|
set_val_strc (arr, 0, group_prefix);
|
|
set_val_arr (arr, 1, addr_arr);
|
|
set_val_strc (arr, 2, nm_ip_config_get_gateway (cfg6));
|
|
set_val_arr (arr, 3, route_arr);
|
|
set_val_arr (arr, 4, dns_arr);
|
|
set_val_arr (arr, 5, domain_arr);
|
|
g_ptr_array_add (nmc->output_data, arr);
|
|
|
|
print_data (nmc); /* Print all data */
|
|
|
|
/* Remove any previous data */
|
|
nmc_empty_output_fields (nmc);
|
|
|
|
return TRUE;
|
|
}
|
|
|
|
gboolean
|
|
print_dhcp4_config (NMDhcpConfig *dhcp4,
|
|
NmCli *nmc,
|
|
const char *group_prefix,
|
|
const char *one_field)
|
|
{
|
|
GHashTable *table;
|
|
NmcOutputField *tmpl, *arr;
|
|
size_t tmpl_len;
|
|
|
|
if (dhcp4 == NULL)
|
|
return FALSE;
|
|
|
|
table = nm_dhcp_config_get_options (dhcp4);
|
|
if (table) {
|
|
GHashTableIter table_iter;
|
|
gpointer key, value;
|
|
char **options_arr = NULL;
|
|
int i = 0;
|
|
|
|
tmpl = nmc_fields_dhcp4_config;
|
|
tmpl_len = sizeof (nmc_fields_dhcp4_config);
|
|
nmc->print_fields.indices = parse_output_fields (one_field ? one_field : NMC_FIELDS_DHCP4_CONFIG_ALL,
|
|
tmpl, FALSE, NULL, NULL);
|
|
arr = nmc_dup_fields_array (tmpl, tmpl_len, NMC_OF_FLAG_FIELD_NAMES);
|
|
g_ptr_array_add (nmc->output_data, arr);
|
|
|
|
options_arr = g_new (char *, g_hash_table_size (table) + 1);
|
|
g_hash_table_iter_init (&table_iter, table);
|
|
while (g_hash_table_iter_next (&table_iter, &key, &value))
|
|
options_arr[i++] = g_strdup_printf ("%s = %s", (char *) key, (char *) value);
|
|
options_arr[i] = NULL;
|
|
|
|
arr = nmc_dup_fields_array (tmpl, tmpl_len, NMC_OF_FLAG_SECTION_PREFIX);
|
|
set_val_strc (arr, 0, group_prefix);
|
|
set_val_arr (arr, 1, options_arr);
|
|
g_ptr_array_add (nmc->output_data, arr);
|
|
|
|
print_data (nmc); /* Print all data */
|
|
|
|
/* Remove any previous data */
|
|
nmc_empty_output_fields (nmc);
|
|
|
|
return TRUE;
|
|
}
|
|
return FALSE;
|
|
}
|
|
|
|
gboolean
|
|
print_dhcp6_config (NMDhcpConfig *dhcp6,
|
|
NmCli *nmc,
|
|
const char *group_prefix,
|
|
const char *one_field)
|
|
{
|
|
GHashTable *table;
|
|
NmcOutputField *tmpl, *arr;
|
|
size_t tmpl_len;
|
|
|
|
if (dhcp6 == NULL)
|
|
return FALSE;
|
|
|
|
table = nm_dhcp_config_get_options (dhcp6);
|
|
if (table) {
|
|
GHashTableIter table_iter;
|
|
gpointer key, value;
|
|
char **options_arr = NULL;
|
|
int i = 0;
|
|
|
|
tmpl = nmc_fields_dhcp6_config;
|
|
tmpl_len = sizeof (nmc_fields_dhcp6_config);
|
|
nmc->print_fields.indices = parse_output_fields (one_field ? one_field : NMC_FIELDS_DHCP6_CONFIG_ALL,
|
|
tmpl, FALSE, NULL, NULL);
|
|
arr = nmc_dup_fields_array (tmpl, tmpl_len, NMC_OF_FLAG_FIELD_NAMES);
|
|
g_ptr_array_add (nmc->output_data, arr);
|
|
|
|
options_arr = g_new (char *, g_hash_table_size (table) + 1);
|
|
g_hash_table_iter_init (&table_iter, table);
|
|
while (g_hash_table_iter_next (&table_iter, &key, &value))
|
|
options_arr[i++] = g_strdup_printf ("%s = %s", (char *) key, (char *) value);
|
|
options_arr[i] = NULL;
|
|
|
|
arr = nmc_dup_fields_array (tmpl, tmpl_len, NMC_OF_FLAG_SECTION_PREFIX);
|
|
set_val_strc (arr, 0, group_prefix);
|
|
set_val_arr (arr, 1, options_arr);
|
|
g_ptr_array_add (nmc->output_data, arr);
|
|
|
|
print_data (nmc); /* Print all data */
|
|
|
|
/* Remove any previous data */
|
|
nmc_empty_output_fields (nmc);
|
|
|
|
return TRUE;
|
|
}
|
|
return FALSE;
|
|
}
|
|
|
|
/*
|
|
* Parse IP address from string to NMIPAddress stucture.
|
|
* ip_str is the IP address in the form address/prefix
|
|
*/
|
|
NMIPAddress *
|
|
nmc_parse_and_build_address (int family, const char *ip_str, GError **error)
|
|
{
|
|
int max_prefix = (family == AF_INET) ? 32 : 128;
|
|
NMIPAddress *addr = NULL;
|
|
const char *ip;
|
|
char *tmp;
|
|
char *plen;
|
|
long int prefix;
|
|
GError *local = NULL;
|
|
|
|
g_return_val_if_fail (ip_str != NULL, NULL);
|
|
g_return_val_if_fail (error == NULL || *error == NULL, NULL);
|
|
|
|
tmp = g_strdup (ip_str);
|
|
plen = strchr (tmp, '/'); /* prefix delimiter */
|
|
if (plen)
|
|
*plen++ = '\0';
|
|
|
|
ip = tmp;
|
|
|
|
prefix = max_prefix;
|
|
if (plen) {
|
|
if (!nmc_string_to_int (plen, TRUE, 1, max_prefix, &prefix)) {
|
|
g_set_error (error, NMCLI_ERROR, NMC_RESULT_ERROR_USER_INPUT,
|
|
_("invalid prefix '%s'; <1-%d> allowed"), plen, max_prefix);
|
|
goto finish;
|
|
}
|
|
}
|
|
|
|
addr = nm_ip_address_new (family, ip, (guint32) prefix, &local);
|
|
if (!addr) {
|
|
g_set_error (error, NMCLI_ERROR, NMC_RESULT_ERROR_USER_INPUT,
|
|
_("invalid IP address: %s"), local->message);
|
|
g_clear_error (&local);
|
|
}
|
|
|
|
finish:
|
|
g_free (tmp);
|
|
return addr;
|
|
}
|
|
|
|
/*
|
|
* nmc_parse_and_build_route:
|
|
* @family: AF_INET or AF_INET6
|
|
* @str: route string to be parsed
|
|
* @error: location to store GError
|
|
*
|
|
* Parse route from string and return an #NMIPRoute
|
|
*
|
|
* Returns: a new #NMIPRoute or %NULL on error
|
|
*/
|
|
NMIPRoute *
|
|
nmc_parse_and_build_route (int family,
|
|
const char *str,
|
|
GError **error)
|
|
{
|
|
int max_prefix = (family == AF_INET) ? 32 : 128;
|
|
char *plen = NULL;
|
|
const char *next_hop = NULL;
|
|
const char *canon_dest;
|
|
long int prefix = max_prefix;
|
|
unsigned long int tmp_ulong;
|
|
NMIPRoute *route = NULL;
|
|
gboolean success = FALSE;
|
|
GError *local = NULL;
|
|
gint64 metric = -1;
|
|
guint i, len;
|
|
gs_strfreev char **routev = NULL;
|
|
gs_free char *value = NULL;
|
|
gs_free char *dest = NULL;
|
|
gs_unref_hashtable GHashTable *attrs = NULL;
|
|
GHashTable *tmp_attrs;
|
|
|
|
g_return_val_if_fail (family == AF_INET || family == AF_INET6, FALSE);
|
|
g_return_val_if_fail (str, FALSE);
|
|
g_return_val_if_fail (error == NULL || *error == NULL, FALSE);
|
|
|
|
value = g_strdup (str);
|
|
routev = nmc_strsplit_set (g_strstrip (value), " \t", 0);
|
|
len = g_strv_length (routev);
|
|
if (len < 1) {
|
|
g_set_error (error, 1, 0, _("'%s' is not valid (the format is: ip[/prefix] [next-hop] [metric] [attr=val] [attr=val])"),
|
|
str);
|
|
goto finish;
|
|
}
|
|
|
|
dest = g_strdup (routev[0]);
|
|
plen = strchr (dest, '/'); /* prefix delimiter */
|
|
if (plen)
|
|
*plen++ = '\0';
|
|
|
|
if (plen) {
|
|
if (!nmc_string_to_int (plen, TRUE, 1, max_prefix, &prefix)) {
|
|
g_set_error (error, NMCLI_ERROR, NMC_RESULT_ERROR_USER_INPUT,
|
|
_("invalid prefix '%s'; <1-%d> allowed"),
|
|
plen, max_prefix);
|
|
goto finish;
|
|
}
|
|
}
|
|
|
|
for (i = 1; i < len; i++) {
|
|
if (nm_utils_ipaddr_valid (family, routev[i])) {
|
|
if (metric != -1 || attrs) {
|
|
g_set_error (error, 1, 0, _("the next hop ('%s') must be first"), routev[i]);
|
|
goto finish;
|
|
}
|
|
next_hop = routev[i];
|
|
} else if (nmc_string_to_uint (routev[i], TRUE, 0, G_MAXUINT32, &tmp_ulong)) {
|
|
if (attrs) {
|
|
g_set_error (error, 1, 0, _("the metric ('%s') must be before attributes"), routev[i]);
|
|
goto finish;
|
|
}
|
|
metric = tmp_ulong;
|
|
} else if (strchr (routev[i], '=')) {
|
|
GHashTableIter iter;
|
|
char *iter_key;
|
|
GVariant *iter_value;
|
|
|
|
tmp_attrs = nm_utils_parse_variant_attributes (routev[i], ' ', '=', FALSE,
|
|
nm_ip_route_get_variant_attribute_spec(),
|
|
error);
|
|
if (!tmp_attrs) {
|
|
g_prefix_error (error, "invalid option '%s': ", routev[i]);
|
|
goto finish;
|
|
}
|
|
|
|
if (!attrs)
|
|
attrs = g_hash_table_new (g_str_hash, g_str_equal);
|
|
|
|
g_hash_table_iter_init (&iter, tmp_attrs);
|
|
while (g_hash_table_iter_next (&iter, (gpointer *) &iter_key, (gpointer *) &iter_value)) {
|
|
if (!nm_ip_route_attribute_validate (iter_key, iter_value, family, NULL, error)) {
|
|
g_prefix_error (error, "%s: ", iter_key);
|
|
g_hash_table_unref (tmp_attrs);
|
|
goto finish;
|
|
}
|
|
g_hash_table_insert (attrs, iter_key, iter_value);
|
|
g_hash_table_iter_steal (&iter);
|
|
}
|
|
g_hash_table_unref (tmp_attrs);
|
|
} else {
|
|
g_set_error (error, 1, 0, _("unrecognized option '%s'"), routev[i]);
|
|
goto finish;
|
|
}
|
|
}
|
|
|
|
route = nm_ip_route_new (family, dest, prefix, next_hop, metric, &local);
|
|
if (!route) {
|
|
g_set_error (error, NMCLI_ERROR, NMC_RESULT_ERROR_USER_INPUT,
|
|
_("invalid route: %s"), local->message);
|
|
g_clear_error (&local);
|
|
goto finish;
|
|
}
|
|
|
|
/* We don't accept default routes as NetworkManager handles it
|
|
* itself. But we have to check this after @route has normalized the
|
|
* dest string.
|
|
*/
|
|
canon_dest = nm_ip_route_get_dest (route);
|
|
if (!strcmp (canon_dest, "0.0.0.0") || !strcmp (canon_dest, "::")) {
|
|
g_set_error_literal (error, NMCLI_ERROR, NMC_RESULT_ERROR_USER_INPUT,
|
|
_("default route cannot be added (NetworkManager handles it by itself)"));
|
|
g_clear_pointer (&route, nm_ip_route_unref);
|
|
goto finish;
|
|
}
|
|
|
|
if (attrs) {
|
|
GHashTableIter iter;
|
|
char *name;
|
|
GVariant *variant;
|
|
|
|
g_hash_table_iter_init (&iter, attrs);
|
|
while (g_hash_table_iter_next (&iter, (gpointer *) &name, (gpointer *) &variant))
|
|
nm_ip_route_set_attribute (route, name, variant);
|
|
}
|
|
|
|
success = TRUE;
|
|
|
|
finish:
|
|
return route;
|
|
}
|
|
|
|
const char *
|
|
nmc_device_state_to_string (NMDeviceState state)
|
|
{
|
|
switch (state) {
|
|
case NM_DEVICE_STATE_UNMANAGED:
|
|
return _("unmanaged");
|
|
case NM_DEVICE_STATE_UNAVAILABLE:
|
|
return _("unavailable");
|
|
case NM_DEVICE_STATE_DISCONNECTED:
|
|
return _("disconnected");
|
|
case NM_DEVICE_STATE_PREPARE:
|
|
return _("connecting (prepare)");
|
|
case NM_DEVICE_STATE_CONFIG:
|
|
return _("connecting (configuring)");
|
|
case NM_DEVICE_STATE_NEED_AUTH:
|
|
return _("connecting (need authentication)");
|
|
case NM_DEVICE_STATE_IP_CONFIG:
|
|
return _("connecting (getting IP configuration)");
|
|
case NM_DEVICE_STATE_IP_CHECK:
|
|
return _("connecting (checking IP connectivity)");
|
|
case NM_DEVICE_STATE_SECONDARIES:
|
|
return _("connecting (starting secondary connections)");
|
|
case NM_DEVICE_STATE_ACTIVATED:
|
|
return _("connected");
|
|
case NM_DEVICE_STATE_DEACTIVATING:
|
|
return _("deactivating");
|
|
case NM_DEVICE_STATE_FAILED:
|
|
return _("connection failed");
|
|
default:
|
|
return _("unknown");
|
|
}
|
|
}
|
|
|
|
const char *
|
|
nmc_device_metered_to_string (NMMetered value)
|
|
{
|
|
switch (value) {
|
|
case NM_METERED_YES:
|
|
return _("yes");
|
|
case NM_METERED_NO:
|
|
return _("no");
|
|
case NM_METERED_GUESS_YES:
|
|
return _("yes (guessed)");
|
|
case NM_METERED_GUESS_NO:
|
|
return _("no (guessed)");
|
|
default:
|
|
return _("unknown");
|
|
}
|
|
}
|
|
|
|
const char *
|
|
nmc_device_reason_to_string (NMDeviceStateReason reason)
|
|
{
|
|
switch (reason) {
|
|
case NM_DEVICE_STATE_REASON_NONE:
|
|
return _("No reason given");
|
|
|
|
case NM_DEVICE_STATE_REASON_UNKNOWN:
|
|
return _("Unknown error");
|
|
|
|
case NM_DEVICE_STATE_REASON_NOW_MANAGED:
|
|
return _("Device is now managed");
|
|
|
|
case NM_DEVICE_STATE_REASON_NOW_UNMANAGED:
|
|
return _("Device is now unmanaged");
|
|
|
|
case NM_DEVICE_STATE_REASON_CONFIG_FAILED:
|
|
return _("The device could not be readied for configuration");
|
|
|
|
case NM_DEVICE_STATE_REASON_IP_CONFIG_UNAVAILABLE:
|
|
return _("IP configuration could not be reserved (no available address, timeout, etc.)");
|
|
|
|
case NM_DEVICE_STATE_REASON_IP_CONFIG_EXPIRED:
|
|
return _("The IP configuration is no longer valid");
|
|
|
|
case NM_DEVICE_STATE_REASON_NO_SECRETS:
|
|
return _("Secrets were required, but not provided");
|
|
|
|
case NM_DEVICE_STATE_REASON_SUPPLICANT_DISCONNECT:
|
|
return _("802.1X supplicant disconnected");
|
|
|
|
case NM_DEVICE_STATE_REASON_SUPPLICANT_CONFIG_FAILED:
|
|
return _("802.1X supplicant configuration failed");
|
|
|
|
case NM_DEVICE_STATE_REASON_SUPPLICANT_FAILED:
|
|
return _("802.1X supplicant failed");
|
|
|
|
case NM_DEVICE_STATE_REASON_SUPPLICANT_TIMEOUT:
|
|
return _("802.1X supplicant took too long to authenticate");
|
|
|
|
case NM_DEVICE_STATE_REASON_PPP_START_FAILED:
|
|
return _("PPP service failed to start");
|
|
|
|
case NM_DEVICE_STATE_REASON_PPP_DISCONNECT:
|
|
return _("PPP service disconnected");
|
|
|
|
case NM_DEVICE_STATE_REASON_PPP_FAILED:
|
|
return _("PPP failed");
|
|
|
|
case NM_DEVICE_STATE_REASON_DHCP_START_FAILED:
|
|
return _("DHCP client failed to start");
|
|
|
|
case NM_DEVICE_STATE_REASON_DHCP_ERROR:
|
|
return _("DHCP client error");
|
|
|
|
case NM_DEVICE_STATE_REASON_DHCP_FAILED:
|
|
return _("DHCP client failed");
|
|
|
|
case NM_DEVICE_STATE_REASON_SHARED_START_FAILED:
|
|
return _("Shared connection service failed to start");
|
|
|
|
case NM_DEVICE_STATE_REASON_SHARED_FAILED:
|
|
return _("Shared connection service failed");
|
|
|
|
case NM_DEVICE_STATE_REASON_AUTOIP_START_FAILED:
|
|
return _("AutoIP service failed to start");
|
|
|
|
case NM_DEVICE_STATE_REASON_AUTOIP_ERROR:
|
|
return _("AutoIP service error");
|
|
|
|
case NM_DEVICE_STATE_REASON_AUTOIP_FAILED:
|
|
return _("AutoIP service failed");
|
|
|
|
case NM_DEVICE_STATE_REASON_MODEM_BUSY:
|
|
return _("The line is busy");
|
|
|
|
case NM_DEVICE_STATE_REASON_MODEM_NO_DIAL_TONE:
|
|
return _("No dial tone");
|
|
|
|
case NM_DEVICE_STATE_REASON_MODEM_NO_CARRIER:
|
|
return _("No carrier could be established");
|
|
|
|
case NM_DEVICE_STATE_REASON_MODEM_DIAL_TIMEOUT:
|
|
return _("The dialing request timed out");
|
|
|
|
case NM_DEVICE_STATE_REASON_MODEM_DIAL_FAILED:
|
|
return _("The dialing attempt failed");
|
|
|
|
case NM_DEVICE_STATE_REASON_MODEM_INIT_FAILED:
|
|
return _("Modem initialization failed");
|
|
|
|
case NM_DEVICE_STATE_REASON_GSM_APN_FAILED:
|
|
return _("Failed to select the specified APN");
|
|
|
|
case NM_DEVICE_STATE_REASON_GSM_REGISTRATION_NOT_SEARCHING:
|
|
return _("Not searching for networks");
|
|
|
|
case NM_DEVICE_STATE_REASON_GSM_REGISTRATION_DENIED:
|
|
return _("Network registration denied");
|
|
|
|
case NM_DEVICE_STATE_REASON_GSM_REGISTRATION_TIMEOUT:
|
|
return _("Network registration timed out");
|
|
|
|
case NM_DEVICE_STATE_REASON_GSM_REGISTRATION_FAILED:
|
|
return _("Failed to register with the requested network");
|
|
|
|
case NM_DEVICE_STATE_REASON_GSM_PIN_CHECK_FAILED:
|
|
return _("PIN check failed");
|
|
|
|
case NM_DEVICE_STATE_REASON_FIRMWARE_MISSING:
|
|
return _("Necessary firmware for the device may be missing");
|
|
|
|
case NM_DEVICE_STATE_REASON_REMOVED:
|
|
return _("The device was removed");
|
|
|
|
case NM_DEVICE_STATE_REASON_SLEEPING:
|
|
return _("NetworkManager went to sleep");
|
|
|
|
case NM_DEVICE_STATE_REASON_CONNECTION_REMOVED:
|
|
return _("The device's active connection disappeared");
|
|
|
|
case NM_DEVICE_STATE_REASON_USER_REQUESTED:
|
|
return _("Device disconnected by user or client");
|
|
|
|
case NM_DEVICE_STATE_REASON_CARRIER:
|
|
return _("Carrier/link changed");
|
|
|
|
case NM_DEVICE_STATE_REASON_CONNECTION_ASSUMED:
|
|
return _("The device's existing connection was assumed");
|
|
|
|
case NM_DEVICE_STATE_REASON_SUPPLICANT_AVAILABLE:
|
|
return _("The supplicant is now available");
|
|
|
|
case NM_DEVICE_STATE_REASON_MODEM_NOT_FOUND:
|
|
return _("The modem could not be found");
|
|
|
|
case NM_DEVICE_STATE_REASON_BT_FAILED:
|
|
return _("The Bluetooth connection failed or timed out");
|
|
|
|
case NM_DEVICE_STATE_REASON_GSM_SIM_NOT_INSERTED:
|
|
return _("GSM Modem's SIM card not inserted");
|
|
|
|
case NM_DEVICE_STATE_REASON_GSM_SIM_PIN_REQUIRED:
|
|
return _("GSM Modem's SIM PIN required");
|
|
|
|
case NM_DEVICE_STATE_REASON_GSM_SIM_PUK_REQUIRED:
|
|
return _("GSM Modem's SIM PUK required");
|
|
|
|
case NM_DEVICE_STATE_REASON_GSM_SIM_WRONG:
|
|
return _("GSM Modem's SIM wrong");
|
|
|
|
case NM_DEVICE_STATE_REASON_INFINIBAND_MODE:
|
|
return _("InfiniBand device does not support connected mode");
|
|
|
|
case NM_DEVICE_STATE_REASON_DEPENDENCY_FAILED:
|
|
return _("A dependency of the connection failed");
|
|
|
|
case NM_DEVICE_STATE_REASON_BR2684_FAILED:
|
|
return _("A problem with the RFC 2684 Ethernet over ADSL bridge");
|
|
|
|
case NM_DEVICE_STATE_REASON_MODEM_MANAGER_UNAVAILABLE:
|
|
return _("ModemManager is unavailable");
|
|
|
|
case NM_DEVICE_STATE_REASON_SSID_NOT_FOUND:
|
|
return _("The Wi-Fi network could not be found");
|
|
|
|
case NM_DEVICE_STATE_REASON_SECONDARY_CONNECTION_FAILED:
|
|
return _("A secondary connection of the base connection failed");
|
|
|
|
case NM_DEVICE_STATE_REASON_DCB_FCOE_FAILED:
|
|
return _("DCB or FCoE setup failed");
|
|
|
|
case NM_DEVICE_STATE_REASON_TEAMD_CONTROL_FAILED:
|
|
return _("teamd control failed");
|
|
|
|
case NM_DEVICE_STATE_REASON_MODEM_FAILED:
|
|
return _("Modem failed or no longer available");
|
|
|
|
case NM_DEVICE_STATE_REASON_MODEM_AVAILABLE:
|
|
return _("Modem now ready and available");
|
|
|
|
case NM_DEVICE_STATE_REASON_SIM_PIN_INCORRECT:
|
|
return _("SIM PIN was incorrect");
|
|
|
|
case NM_DEVICE_STATE_REASON_NEW_ACTIVATION:
|
|
return _("New connection activation was enqueued");
|
|
|
|
case NM_DEVICE_STATE_REASON_PARENT_CHANGED:
|
|
return _("The device's parent changed");
|
|
|
|
case NM_DEVICE_STATE_REASON_PARENT_MANAGED_CHANGED:
|
|
return _("The device parent's management changed");
|
|
|
|
default:
|
|
/* TRANSLATORS: Unknown reason for a device state change (NMDeviceStateReason) */
|
|
return _("Unknown");
|
|
}
|
|
}
|
|
|
|
|
|
/* Max priority values from libnm-core/nm-setting-vlan.c */
|
|
#define MAX_SKB_PRIO G_MAXUINT32
|
|
#define MAX_8021P_PRIO 7 /* Max 802.1p priority */
|
|
|
|
/*
|
|
* Parse VLAN priority mappings from the following format: 2:1,3:4,7:3
|
|
* and verify if the priority numbers are valid
|
|
*
|
|
* Return: string array with split maps, or NULL on error
|
|
* Caller is responsible for freeing the array.
|
|
*/
|
|
char **
|
|
nmc_vlan_parse_priority_maps (const char *priority_map,
|
|
NMVlanPriorityMap map_type,
|
|
GError **error)
|
|
{
|
|
char **mapping = NULL, **iter;
|
|
unsigned long from, to, from_max, to_max;
|
|
|
|
g_return_val_if_fail (priority_map != NULL, NULL);
|
|
g_return_val_if_fail (error == NULL || *error == NULL, NULL);
|
|
|
|
if (map_type == NM_VLAN_INGRESS_MAP) {
|
|
from_max = MAX_8021P_PRIO;
|
|
to_max = MAX_SKB_PRIO;
|
|
} else {
|
|
from_max = MAX_SKB_PRIO;
|
|
to_max = MAX_8021P_PRIO;
|
|
}
|
|
|
|
mapping = g_strsplit (priority_map, ",", 0);
|
|
for (iter = mapping; iter && *iter; iter++) {
|
|
char *left, *right;
|
|
|
|
left = g_strstrip (*iter);
|
|
right = strchr (left, ':');
|
|
if (!right) {
|
|
g_set_error (error, 1, 0, _("invalid priority map '%s'"), *iter);
|
|
g_strfreev (mapping);
|
|
return NULL;
|
|
}
|
|
*right++ = '\0';
|
|
|
|
if (!nmc_string_to_uint (left, TRUE, 0, from_max, &from)) {
|
|
g_set_error (error, 1, 0, _("priority '%s' is not valid (<0-%ld>)"),
|
|
left, from_max);
|
|
g_strfreev (mapping);
|
|
return NULL;
|
|
}
|
|
if (!nmc_string_to_uint (right, TRUE, 0, to_max, &to)) {
|
|
g_set_error (error, 1, 0, _("priority '%s' is not valid (<0-%ld>)"),
|
|
right, to_max);
|
|
g_strfreev (mapping);
|
|
return NULL;
|
|
}
|
|
*(right-1) = ':'; /* Put back ':' */
|
|
}
|
|
return mapping;
|
|
}
|
|
|
|
const char *
|
|
nmc_bond_validate_mode (const char *mode, GError **error)
|
|
{
|
|
unsigned long mode_int;
|
|
static const char *valid_modes[] = { "balance-rr",
|
|
"active-backup",
|
|
"balance-xor",
|
|
"broadcast",
|
|
"802.3ad",
|
|
"balance-tlb",
|
|
"balance-alb",
|
|
NULL };
|
|
if (nmc_string_to_uint (mode, TRUE, 0, 6, &mode_int)) {
|
|
/* Translate bonding mode numbers to mode names:
|
|
* https://www.kernel.org/doc/Documentation/networking/bonding.txt
|
|
*/
|
|
return valid_modes[mode_int];
|
|
} else
|
|
return nmc_string_is_valid (mode, valid_modes, error);
|
|
}
|
|
|
|
/*
|
|
* nmc_team_check_config:
|
|
* @config: file name with team config, or raw team JSON config data
|
|
* @out_config: raw team JSON config data
|
|
* The value must be freed with g_free().
|
|
* @error: location to store error, or %NUL
|
|
*
|
|
* Check team config from @config parameter and return the checked
|
|
* config in @out_config.
|
|
*
|
|
* Returns: %TRUE if the config is valid, %FALSE if it is invalid
|
|
*/
|
|
gboolean
|
|
nmc_team_check_config (const char *config, char **out_config, GError **error)
|
|
{
|
|
enum {
|
|
_TEAM_CONFIG_TYPE_GUESS,
|
|
_TEAM_CONFIG_TYPE_FILE,
|
|
_TEAM_CONFIG_TYPE_JSON,
|
|
} desired_type = _TEAM_CONFIG_TYPE_GUESS;
|
|
const char *filename = NULL;
|
|
size_t c_len = 0;
|
|
gs_free char *config_clone = NULL;
|
|
|
|
*out_config = NULL;
|
|
|
|
if (!config || !config[0])
|
|
return TRUE;
|
|
|
|
if (g_str_has_prefix (config, "file://")) {
|
|
config += NM_STRLEN ("file://");
|
|
desired_type = _TEAM_CONFIG_TYPE_FILE;
|
|
} else if (g_str_has_prefix (config, "json://")) {
|
|
config += NM_STRLEN ("json://");
|
|
desired_type = _TEAM_CONFIG_TYPE_JSON;
|
|
}
|
|
|
|
if (NM_IN_SET (desired_type, _TEAM_CONFIG_TYPE_FILE, _TEAM_CONFIG_TYPE_GUESS)) {
|
|
gs_free char *contents = NULL;
|
|
|
|
if (!g_file_get_contents (config, &contents, &c_len, NULL)) {
|
|
if (desired_type == _TEAM_CONFIG_TYPE_FILE) {
|
|
g_set_error (error, NMCLI_ERROR, NMC_RESULT_ERROR_USER_INPUT,
|
|
_("cannot read team config from file '%s'"),
|
|
config);
|
|
return FALSE;
|
|
}
|
|
} else {
|
|
if (c_len != strlen (contents)) {
|
|
g_set_error (error, NMCLI_ERROR, NMC_RESULT_ERROR_USER_INPUT,
|
|
_("team config file '%s' contains non-valid utf-8"),
|
|
config);
|
|
return FALSE;
|
|
}
|
|
filename = config;
|
|
config = config_clone = g_steal_pointer (&contents);
|
|
}
|
|
}
|
|
|
|
if (!nm_utils_is_json_object (config, NULL)) {
|
|
if (filename) {
|
|
g_set_error (error, NMCLI_ERROR, NMC_RESULT_ERROR_USER_INPUT,
|
|
_("'%s' does not contain a valid team configuration"), filename);
|
|
} else {
|
|
g_set_error (error, NMCLI_ERROR, NMC_RESULT_ERROR_USER_INPUT,
|
|
_("team configuration must be a JSON object"));
|
|
}
|
|
return FALSE;
|
|
}
|
|
|
|
*out_config = (config == config_clone)
|
|
? g_steal_pointer (&config_clone)
|
|
: g_strdup (config);
|
|
return TRUE;
|
|
}
|
|
|
|
/*
|
|
* nmc_proxy_check_script:
|
|
* @script: file name with PAC script, or raw PAC Script data
|
|
* @out_script: raw PAC Script (with removed new-line characters)
|
|
* @error: location to store error, or %NULL
|
|
*
|
|
* Check PAC Script from @script parameter and return the checked/sanitized
|
|
* config in @out_script.
|
|
*
|
|
* Returns: %TRUE if the script is valid, %FALSE if it is invalid
|
|
*/
|
|
gboolean
|
|
nmc_proxy_check_script (const char *script, char **out_script, GError **error)
|
|
{
|
|
enum {
|
|
_PAC_SCRIPT_TYPE_GUESS,
|
|
_PAC_SCRIPT_TYPE_FILE,
|
|
_PAC_SCRIPT_TYPE_JSON,
|
|
} desired_type = _PAC_SCRIPT_TYPE_GUESS;
|
|
const char *filename = NULL;
|
|
size_t c_len = 0;
|
|
gs_free char *script_clone = NULL;
|
|
|
|
*out_script = NULL;
|
|
|
|
if (!script || !script[0])
|
|
return TRUE;
|
|
|
|
if (g_str_has_prefix (script, "file://")) {
|
|
script += NM_STRLEN ("file://");
|
|
desired_type = _PAC_SCRIPT_TYPE_FILE;
|
|
} else if (g_str_has_prefix (script, "js://")) {
|
|
script += NM_STRLEN ("js://");
|
|
desired_type = _PAC_SCRIPT_TYPE_JSON;
|
|
}
|
|
|
|
if (NM_IN_SET (desired_type, _PAC_SCRIPT_TYPE_FILE, _PAC_SCRIPT_TYPE_GUESS)) {
|
|
gs_free char *contents = NULL;
|
|
|
|
if (!g_file_get_contents (script, &contents, &c_len, NULL)) {
|
|
if (desired_type == _PAC_SCRIPT_TYPE_FILE) {
|
|
g_set_error (error, NMCLI_ERROR, NMC_RESULT_ERROR_USER_INPUT,
|
|
_("cannot read pac-script from file '%s'"),
|
|
script);
|
|
return FALSE;
|
|
}
|
|
} else {
|
|
if (c_len != strlen (contents)) {
|
|
g_set_error (error, NMCLI_ERROR, NMC_RESULT_ERROR_USER_INPUT,
|
|
_("file '%s' contains non-valid utf-8"),
|
|
script);
|
|
return FALSE;
|
|
}
|
|
filename = script;
|
|
script = script_clone = g_steal_pointer (&contents);
|
|
}
|
|
}
|
|
|
|
if ( !strstr (script, "FindProxyForURL")
|
|
|| !g_utf8_validate (script, -1, NULL)) {
|
|
if (filename) {
|
|
g_set_error (error, NMCLI_ERROR, NMC_RESULT_ERROR_USER_INPUT,
|
|
_("'%s' does not contain a valid PAC Script"), filename);
|
|
} else {
|
|
g_set_error (error, NMCLI_ERROR, NMC_RESULT_ERROR_USER_INPUT,
|
|
_("Not a valid PAC Script"));
|
|
}
|
|
return FALSE;
|
|
}
|
|
|
|
*out_script = (script == script_clone)
|
|
? g_steal_pointer (&script_clone)
|
|
: g_strdup (script);
|
|
return TRUE;
|
|
}
|
|
|
|
/*
|
|
* nmc_find_connection:
|
|
* @connections: array of NMConnections to search in
|
|
* @filter_type: "id", "uuid", "path" or %NULL
|
|
* @filter_val: connection to find (connection name, UUID or path)
|
|
* @start: where to start in @list. The location is updated so that the function
|
|
* can be called multiple times (for connections with the same name).
|
|
* @complete: print possible completions
|
|
*
|
|
* Find a connection in @list according to @filter_val. @filter_type determines
|
|
* what property is used for comparison. When @filter_type is NULL, compare
|
|
* @filter_val against all types. Otherwise, only compare against the specified
|
|
* type. If 'path' filter type is specified, comparison against numeric index
|
|
* (in addition to the whole path) is allowed.
|
|
*
|
|
* Returns: found connection, or %NULL
|
|
*/
|
|
NMConnection *
|
|
nmc_find_connection (const GPtrArray *connections,
|
|
const char *filter_type,
|
|
const char *filter_val,
|
|
int *start,
|
|
gboolean complete)
|
|
{
|
|
NMConnection *connection;
|
|
NMConnection *found = NULL;
|
|
int i;
|
|
const char *id;
|
|
const char *uuid;
|
|
const char *path, *path_num;
|
|
|
|
for (i = start ? *start : 0; i < connections->len; i++) {
|
|
connection = NM_CONNECTION (connections->pdata[i]);
|
|
|
|
id = nm_connection_get_id (connection);
|
|
uuid = nm_connection_get_uuid (connection);
|
|
path = nm_connection_get_path (connection);
|
|
path_num = path ? strrchr (path, '/') + 1 : NULL;
|
|
|
|
/* When filter_type is NULL, compare connection ID (filter_val)
|
|
* against all types. Otherwise, only compare against the specific
|
|
* type. If 'path' filter type is specified, comparison against
|
|
* numeric index (in addition to the whole path) is allowed.
|
|
*/
|
|
if (!filter_type || strcmp (filter_type, "id") == 0) {
|
|
if (complete)
|
|
nmc_complete_strings (filter_val, id, NULL);
|
|
if (strcmp (filter_val, id) == 0)
|
|
goto found;
|
|
}
|
|
|
|
if (!filter_type || strcmp (filter_type, "uuid") == 0) {
|
|
if (complete && (filter_type || *filter_val))
|
|
nmc_complete_strings (filter_val, uuid, NULL);
|
|
if (strcmp (filter_val, uuid) == 0)
|
|
goto found;
|
|
}
|
|
|
|
if (!filter_type || strcmp (filter_type, "path") == 0) {
|
|
if (complete && (filter_type || *filter_val))
|
|
nmc_complete_strings (filter_val, path, filter_type ? path_num : NULL, NULL);
|
|
if (g_strcmp0 (filter_val, path) == 0 || (filter_type && g_strcmp0 (filter_val, path_num) == 0))
|
|
goto found;
|
|
}
|
|
|
|
continue;
|
|
found:
|
|
if (!start)
|
|
return connection;
|
|
if (found) {
|
|
*start = i;
|
|
return found;
|
|
}
|
|
found = connection;
|
|
}
|
|
|
|
if (start)
|
|
*start = 0;
|
|
return found;
|
|
}
|
|
|
|
static gboolean
|
|
vpn_openconnect_get_secrets (NMConnection *connection, GPtrArray *secrets)
|
|
{
|
|
GError *error = NULL;
|
|
NMSettingVpn *s_vpn;
|
|
const char *vpn_type, *gw, *port;
|
|
char *cookie = NULL;
|
|
char *gateway = NULL;
|
|
char *gwcert = NULL;
|
|
int status = 0;
|
|
int i;
|
|
gboolean ret;
|
|
|
|
if (!connection)
|
|
return FALSE;
|
|
|
|
if (!nm_connection_is_type (connection, NM_SETTING_VPN_SETTING_NAME))
|
|
return FALSE;
|
|
|
|
s_vpn = nm_connection_get_setting_vpn (connection);
|
|
vpn_type = nm_setting_vpn_get_service_type (s_vpn);
|
|
if (g_strcmp0 (vpn_type, NM_DBUS_INTERFACE ".openconnect"))
|
|
return FALSE;
|
|
|
|
/* Get gateway and port */
|
|
gw = nm_setting_vpn_get_data_item (s_vpn, "gateway");
|
|
port = gw ? strrchr (gw, ':') : NULL;
|
|
|
|
/* Interactively authenticate to OpenConnect server and get secrets */
|
|
ret = nm_vpn_openconnect_authenticate_helper (gw, &cookie, &gateway, &gwcert, &status, &error);
|
|
if (!ret) {
|
|
g_printerr (_("Error: openconnect failed: %s\n"), error->message);
|
|
g_clear_error (&error);
|
|
return FALSE;
|
|
}
|
|
|
|
if (WIFEXITED (status)) {
|
|
if (WEXITSTATUS (status) != 0)
|
|
g_printerr (_("Error: openconnect failed with status %d\n"), WEXITSTATUS (status));
|
|
} else if (WIFSIGNALED (status))
|
|
g_printerr (_("Error: openconnect failed with signal %d\n"), WTERMSIG (status));
|
|
|
|
/* Append port to the host value */
|
|
if (gateway && port) {
|
|
char *tmp = gateway;
|
|
gateway = g_strdup_printf ("%s%s", gateway, port);
|
|
g_free (tmp);
|
|
}
|
|
|
|
/* Fill secrets to the array */
|
|
for (i = 0; i < secrets->len; i++) {
|
|
NMSecretAgentSimpleSecret *secret = secrets->pdata[i];
|
|
|
|
if (!g_strcmp0 (secret->vpn_type, vpn_type)) {
|
|
if (!g_strcmp0 (secret->vpn_property, "cookie")) {
|
|
g_free (secret->value);
|
|
secret->value = cookie;
|
|
cookie = NULL;
|
|
} else if (!g_strcmp0 (secret->vpn_property, "gateway")) {
|
|
g_free (secret->value);
|
|
secret->value = gateway;
|
|
gateway = NULL;
|
|
} else if (!g_strcmp0 (secret->vpn_property, "gwcert")) {
|
|
g_free (secret->value);
|
|
secret->value = gwcert;
|
|
gwcert = NULL;
|
|
}
|
|
}
|
|
}
|
|
g_free (cookie);
|
|
g_free (gateway);
|
|
g_free (gwcert);
|
|
|
|
return TRUE;
|
|
}
|
|
|
|
static gboolean
|
|
get_secrets_from_user (const char *request_id,
|
|
const char *title,
|
|
const char *msg,
|
|
NMConnection *connection,
|
|
gboolean ask,
|
|
gboolean echo_on,
|
|
GHashTable *pwds_hash,
|
|
GPtrArray *secrets)
|
|
{
|
|
int i;
|
|
|
|
/* Check if there is a VPN OpenConnect secret to ask for */
|
|
if (ask)
|
|
vpn_openconnect_get_secrets (connection, secrets);
|
|
|
|
for (i = 0; i < secrets->len; i++) {
|
|
NMSecretAgentSimpleSecret *secret = secrets->pdata[i];
|
|
char *pwd = NULL;
|
|
|
|
/* First try to find the password in provided passwords file,
|
|
* then ask user. */
|
|
if (pwds_hash && (pwd = g_hash_table_lookup (pwds_hash, secret->prop_name))) {
|
|
pwd = g_strdup (pwd);
|
|
} else {
|
|
if (ask) {
|
|
if (secret->value) {
|
|
if (!g_strcmp0 (secret->vpn_type, NM_DBUS_INTERFACE ".openconnect")) {
|
|
/* Do not present and ask user for openconnect secrets, we already have them */
|
|
continue;
|
|
} else {
|
|
/* Prefill the password if we have it. */
|
|
rl_startup_hook = nmc_rl_set_deftext;
|
|
nmc_rl_pre_input_deftext = g_strdup (secret->value);
|
|
}
|
|
}
|
|
if (msg)
|
|
g_print ("%s\n", msg);
|
|
pwd = nmc_readline_echo (secret->password ? echo_on : TRUE,
|
|
"%s (%s): ", secret->name, secret->prop_name);
|
|
if (!pwd)
|
|
pwd = g_strdup ("");
|
|
} else {
|
|
if (msg)
|
|
g_print ("%s\n", msg);
|
|
g_printerr (_("Warning: password for '%s' not given in 'passwd-file' "
|
|
"and nmcli cannot ask without '--ask' option.\n"),
|
|
secret->prop_name);
|
|
}
|
|
}
|
|
/* No password provided, cancel the secrets. */
|
|
if (!pwd)
|
|
return FALSE;
|
|
g_free (secret->value);
|
|
secret->value = pwd;
|
|
}
|
|
return TRUE;
|
|
}
|
|
|
|
/**
|
|
* nmc_secrets_requested:
|
|
* @agent: the #NMSecretAgentSimple
|
|
* @request_id: request ID, to eventually pass to
|
|
* nm_secret_agent_simple_response()
|
|
* @title: a title for the password request
|
|
* @msg: a prompt message for the password request
|
|
* @secrets: (element-type #NMSecretAgentSimpleSecret): array of secrets
|
|
* being requested.
|
|
* @user_data: user data passed to the function
|
|
*
|
|
* This function is used as a callback for "request-secrets" signal of
|
|
* NMSecretAgentSimpleSecret.
|
|
*/
|
|
void
|
|
nmc_secrets_requested (NMSecretAgentSimple *agent,
|
|
const char *request_id,
|
|
const char *title,
|
|
const char *msg,
|
|
GPtrArray *secrets,
|
|
gpointer user_data)
|
|
{
|
|
NmCli *nmc = (NmCli *) user_data;
|
|
NMConnection *connection = NULL;
|
|
char *path, *p;
|
|
gboolean success = FALSE;
|
|
const GPtrArray *connections;
|
|
|
|
if (nmc->print_output == NMC_PRINT_PRETTY)
|
|
nmc_terminal_erase_line ();
|
|
|
|
/* Find the connection for the request */
|
|
path = g_strdup (request_id);
|
|
if (path) {
|
|
p = strrchr (path, '/');
|
|
if (p)
|
|
*p = '\0';
|
|
connections = nm_client_get_connections (nmc->client);
|
|
connection = nmc_find_connection (connections, "path", path, NULL, FALSE);
|
|
g_free (path);
|
|
}
|
|
|
|
success = get_secrets_from_user (request_id, title, msg, connection, nmc->in_editor || nmc->ask,
|
|
nmc->show_secrets, nmc->pwds_hash, secrets);
|
|
if (success)
|
|
nm_secret_agent_simple_response (agent, request_id, secrets);
|
|
else {
|
|
/* Unregister our secret agent on failure, so that another agent
|
|
* may be tried */
|
|
if (nmc->secret_agent) {
|
|
nm_secret_agent_old_unregister (nmc->secret_agent, NULL, NULL);
|
|
g_clear_object (&nmc->secret_agent);
|
|
}
|
|
}
|
|
}
|
|
|
|
char *
|
|
nmc_unique_connection_name (const GPtrArray *connections, const char *try_name)
|
|
{
|
|
NMConnection *connection;
|
|
const char *name;
|
|
char *new_name;
|
|
unsigned num = 1;
|
|
int i = 0;
|
|
|
|
new_name = g_strdup (try_name);
|
|
while (i < connections->len) {
|
|
connection = NM_CONNECTION (connections->pdata[i]);
|
|
|
|
name = nm_connection_get_id (connection);
|
|
if (g_strcmp0 (new_name, name) == 0) {
|
|
g_free (new_name);
|
|
new_name = g_strdup_printf ("%s-%d", try_name, num++);
|
|
i = 0;
|
|
} else
|
|
i++;
|
|
}
|
|
return new_name;
|
|
}
|
|
|
|
/* readline state variables */
|
|
static gboolean nmcli_in_readline = FALSE;
|
|
static gboolean rl_got_line;
|
|
static char *rl_string;
|
|
|
|
/**
|
|
* nmc_cleanup_readline:
|
|
*
|
|
* Cleanup readline when nmcli is terminated with a signal.
|
|
* It makes sure the terminal is not garbled.
|
|
*/
|
|
void
|
|
nmc_cleanup_readline (void)
|
|
{
|
|
rl_free_line_state ();
|
|
rl_cleanup_after_signal ();
|
|
}
|
|
|
|
gboolean
|
|
nmc_get_in_readline (void)
|
|
{
|
|
return nmcli_in_readline;
|
|
}
|
|
|
|
void
|
|
nmc_set_in_readline (gboolean in_readline)
|
|
{
|
|
nmcli_in_readline = in_readline;
|
|
}
|
|
|
|
static void
|
|
readline_cb (char *line)
|
|
{
|
|
rl_got_line = TRUE;
|
|
rl_string = line;
|
|
rl_callback_handler_remove ();
|
|
}
|
|
|
|
static gboolean
|
|
stdin_ready_cb (GIOChannel * io, GIOCondition condition, gpointer data)
|
|
{
|
|
rl_callback_read_char ();
|
|
return TRUE;
|
|
}
|
|
|
|
static char *
|
|
nmc_readline_helper (const char *prompt)
|
|
{
|
|
GIOChannel *io = NULL;
|
|
guint io_watch_id;
|
|
|
|
nmc_set_in_readline (TRUE);
|
|
|
|
io = g_io_channel_unix_new (STDIN_FILENO);
|
|
io_watch_id = g_io_add_watch (io, G_IO_IN, stdin_ready_cb, NULL);
|
|
g_io_channel_unref (io);
|
|
|
|
read_again:
|
|
rl_string = NULL;
|
|
rl_got_line = FALSE;
|
|
rl_callback_handler_install (prompt, readline_cb);
|
|
|
|
while ( !rl_got_line
|
|
&& g_main_loop_is_running (loop)
|
|
&& !nmc_seen_sigint ())
|
|
g_main_context_iteration (NULL, TRUE);
|
|
|
|
/* If Ctrl-C was detected, complete the line */
|
|
if (nmc_seen_sigint ()) {
|
|
rl_echo_signal_char (SIGINT);
|
|
rl_stuff_char ('\n');
|
|
rl_callback_read_char ();
|
|
}
|
|
|
|
/* Add string to the history */
|
|
if (rl_string && *rl_string)
|
|
add_history (rl_string);
|
|
|
|
if (nmc_seen_sigint ()) {
|
|
/* Ctrl-C */
|
|
nmc_clear_sigint ();
|
|
if ( nm_cli.in_editor
|
|
|| (rl_string && *rl_string)) {
|
|
/* In editor, or the line is not empty */
|
|
/* Call readline again to get new prompt (repeat) */
|
|
g_free (rl_string);
|
|
goto read_again;
|
|
} else {
|
|
/* Not in editor and line is empty, exit */
|
|
nmc_exit ();
|
|
}
|
|
} else if (!rl_string) {
|
|
/* Ctrl-D, exit */
|
|
nmc_exit ();
|
|
}
|
|
|
|
/* Return NULL, not empty string */
|
|
if (rl_string && *rl_string == '\0') {
|
|
g_free (rl_string);
|
|
rl_string = NULL;
|
|
}
|
|
|
|
g_source_remove (io_watch_id);
|
|
nmc_set_in_readline (FALSE);
|
|
|
|
return rl_string;
|
|
}
|
|
|
|
/**
|
|
* nmc_readline:
|
|
* @prompt_fmt: prompt to print (telling user what to enter). It is standard
|
|
* printf() format string
|
|
* @...: a list of arguments according to the @prompt_fmt format string
|
|
*
|
|
* Wrapper around libreadline's readline() function.
|
|
* If user pressed Ctrl-C, readline() is called again (if not in editor and
|
|
* line is empty, nmcli will quit).
|
|
* If user pressed Ctrl-D on empty line, nmcli will quit.
|
|
*
|
|
* Returns: the user provided string. In case the user entered empty string,
|
|
* this function returns NULL.
|
|
*/
|
|
char *
|
|
nmc_readline (const char *prompt_fmt, ...)
|
|
{
|
|
va_list args;
|
|
char *prompt, *str;
|
|
|
|
va_start (args, prompt_fmt);
|
|
prompt = g_strdup_vprintf (prompt_fmt, args);
|
|
va_end (args);
|
|
|
|
str = nmc_readline_helper (prompt);
|
|
|
|
g_free (prompt);
|
|
|
|
return str;
|
|
}
|
|
|
|
/**
|
|
* nmc_readline_echo:
|
|
*
|
|
* The same as nmc_readline() except it can disable echoing of input characters if @echo_on is %FALSE.
|
|
* nmc_readline(TRUE, ...) == nmc_readline(...)
|
|
*/
|
|
char *
|
|
nmc_readline_echo (gboolean echo_on, const char *prompt_fmt, ...)
|
|
{
|
|
va_list args;
|
|
char *prompt, *str;
|
|
struct termios termios_orig, termios_new;
|
|
|
|
va_start (args, prompt_fmt);
|
|
prompt = g_strdup_vprintf (prompt_fmt, args);
|
|
va_end (args);
|
|
|
|
/* Disable echoing characters */
|
|
if (!echo_on) {
|
|
tcgetattr (STDIN_FILENO, &termios_orig);
|
|
termios_new = termios_orig;
|
|
termios_new.c_lflag &= ~(ECHO);
|
|
tcsetattr (STDIN_FILENO, TCSADRAIN, &termios_new);
|
|
}
|
|
|
|
str = nmc_readline_helper (prompt);
|
|
|
|
g_free (prompt);
|
|
|
|
/* Restore original terminal settings */
|
|
if (!echo_on) {
|
|
tcsetattr (STDIN_FILENO, TCSADRAIN, &termios_orig);
|
|
/* New line - setting ECHONL | ICANON did not help */
|
|
fprintf (stdout, "\n");
|
|
}
|
|
|
|
return str;
|
|
}
|
|
|
|
/**
|
|
* nmc_rl_gen_func_basic:
|
|
* @text: text to complete
|
|
* @state: readline state; says whether start from scratch (state == 0)
|
|
* @words: strings for completion
|
|
*
|
|
* Basic function generating list of completion strings for readline.
|
|
* See e.g. http://cnswww.cns.cwru.edu/php/chet/readline/readline.html#SEC49
|
|
*/
|
|
char *
|
|
nmc_rl_gen_func_basic (const char *text, int state, const char **words)
|
|
{
|
|
static int list_idx, len;
|
|
const char *name;
|
|
|
|
if (!state) {
|
|
list_idx = 0;
|
|
len = strlen (text);
|
|
}
|
|
|
|
/* Return the next name which partially matches one from the 'words' list. */
|
|
while ((name = words[list_idx])) {
|
|
list_idx++;
|
|
|
|
if (strncmp (name, text, len) == 0)
|
|
return g_strdup (name);
|
|
}
|
|
return NULL;
|
|
}
|
|
|
|
char *
|
|
nmc_rl_gen_func_ifnames (const char *text, int state)
|
|
{
|
|
int i;
|
|
const GPtrArray *devices;
|
|
const char **ifnames;
|
|
char *ret;
|
|
|
|
devices = nm_client_get_devices (nm_cli.client);
|
|
if (devices->len == 0)
|
|
return NULL;
|
|
|
|
ifnames = g_new (const char *, devices->len + 1);
|
|
for (i = 0; i < devices->len; i++) {
|
|
NMDevice *dev = g_ptr_array_index (devices, i);
|
|
const char *ifname = nm_device_get_iface (dev);
|
|
ifnames[i] = ifname;
|
|
}
|
|
ifnames[i] = NULL;
|
|
|
|
ret = nmc_rl_gen_func_basic (text, state, ifnames);
|
|
|
|
g_free (ifnames);
|
|
return ret;
|
|
}
|
|
|
|
/* for pre-filling a string to readline prompt */
|
|
char *nmc_rl_pre_input_deftext;
|
|
|
|
int
|
|
nmc_rl_set_deftext (void)
|
|
{
|
|
if (nmc_rl_pre_input_deftext && rl_startup_hook) {
|
|
rl_insert_text (nmc_rl_pre_input_deftext);
|
|
g_free (nmc_rl_pre_input_deftext);
|
|
nmc_rl_pre_input_deftext = NULL;
|
|
rl_startup_hook = NULL;
|
|
}
|
|
return 0;
|
|
}
|
|
|
|
/**
|
|
* nmc_parse_lldp_capabilities:
|
|
* @value: the capabilities value
|
|
*
|
|
* Parses LLDP capabilities flags
|
|
*
|
|
* Returns: a newly allocated string containing capabilities names separated by commas.
|
|
*/
|
|
char *
|
|
nmc_parse_lldp_capabilities (guint value)
|
|
{
|
|
/* IEEE Std 802.1AB-2009 - Table 8.4 */
|
|
const char *names[] = { "other", "repeater", "mac-bridge", "wlan-access-point",
|
|
"router", "telephone", "docsis-cable-device", "station-only",
|
|
"c-vlan-component", "s-vlan-component", "tpmr" };
|
|
gboolean first = TRUE;
|
|
GString *str;
|
|
int i;
|
|
|
|
if (!value)
|
|
return g_strdup ("none");
|
|
|
|
str = g_string_new ("");
|
|
|
|
for (i = 0; i < G_N_ELEMENTS (names); i++) {
|
|
if (value & (1 << i)) {
|
|
if (!first)
|
|
g_string_append_c (str, ',');
|
|
|
|
first = FALSE;
|
|
value &= ~(1 << i);
|
|
g_string_append (str, names[i]);
|
|
}
|
|
}
|
|
|
|
if (value) {
|
|
if (!first)
|
|
g_string_append_c (str, ',');
|
|
g_string_append (str, "reserved");
|
|
}
|
|
|
|
return g_string_free (str, FALSE);
|
|
}
|
|
|
|
extern GMainLoop *loop;
|
|
|
|
static void
|
|
command_done (GObject *object, GAsyncResult *res, gpointer user_data)
|
|
{
|
|
GSimpleAsyncResult *simple = (GSimpleAsyncResult *)res;
|
|
NmCli *nmc = user_data;
|
|
GError *error = NULL;
|
|
|
|
if (g_simple_async_result_propagate_error (simple, &error)) {
|
|
nmc->return_value = error->code;
|
|
g_string_assign (nmc->return_text, error->message);
|
|
g_error_free (error);
|
|
}
|
|
|
|
if (!nmc->should_wait)
|
|
g_main_loop_quit (loop);
|
|
}
|
|
|
|
typedef struct {
|
|
NmCli *nmc;
|
|
const NMCCommand *cmd;
|
|
int argc;
|
|
char **argv;
|
|
GSimpleAsyncResult *simple;
|
|
} CmdCall;
|
|
|
|
static void
|
|
call_cmd (NmCli *nmc, GSimpleAsyncResult *simple, const NMCCommand *cmd, int argc, char **argv);
|
|
|
|
static void
|
|
got_client (GObject *source_object, GAsyncResult *res, gpointer user_data)
|
|
{
|
|
GError *error = NULL;
|
|
CmdCall *call = user_data;
|
|
NmCli *nmc = call->nmc;
|
|
|
|
nmc->should_wait--;
|
|
nmc->client = nm_client_new_finish (res, &error);
|
|
|
|
if (!nmc->client) {
|
|
g_simple_async_result_set_error (call->simple, NMCLI_ERROR, NMC_RESULT_ERROR_UNKNOWN,
|
|
_("Error: Could not create NMClient object: %s."), error->message);
|
|
g_error_free (error);
|
|
g_simple_async_result_complete (call->simple);
|
|
} else {
|
|
call_cmd (nmc, call->simple, call->cmd, call->argc, call->argv);
|
|
}
|
|
|
|
g_slice_free (CmdCall, call);
|
|
}
|
|
|
|
static void
|
|
call_cmd (NmCli *nmc, GSimpleAsyncResult *simple, const NMCCommand *cmd, int argc, char **argv)
|
|
{
|
|
CmdCall *call;
|
|
|
|
if (nmc->client || !cmd->needs_client) {
|
|
|
|
/* Check whether NetworkManager is running */
|
|
if (cmd->needs_nm_running && !nm_client_get_nm_running (nmc->client)) {
|
|
g_simple_async_result_set_error (simple, NMCLI_ERROR, NMC_RESULT_ERROR_NM_NOT_RUNNING,
|
|
_("Error: NetworkManager is not running."));
|
|
} else
|
|
nmc->return_value = cmd->func (nmc, argc, argv);
|
|
g_simple_async_result_complete_in_idle (simple);
|
|
g_object_unref (simple);
|
|
} else {
|
|
nmc->should_wait++;
|
|
call = g_slice_new0 (CmdCall);
|
|
call->nmc = nmc;
|
|
call->cmd = cmd;
|
|
call->argc = argc;
|
|
call->argv = argv;
|
|
call->simple = simple;
|
|
nm_client_new_async (NULL, got_client, call);
|
|
}
|
|
}
|
|
|
|
static void
|
|
nmc_complete_help (const char *prefix)
|
|
{
|
|
nmc_complete_strings (prefix, "help", NULL);
|
|
if (*prefix == '-')
|
|
nmc_complete_strings (prefix, "-help", "--help", NULL);
|
|
}
|
|
|
|
/**
|
|
* nmc_do_cmd:
|
|
* @nmc: Client instance
|
|
* @cmds: Command table
|
|
* @cmd: Command
|
|
* @argc: Argument count
|
|
* @argv: Arguments vector. Must be a global variable.
|
|
*
|
|
* Picks the right callback to handle command from the command table.
|
|
* If --help argument follows and the usage callback is specified for the command
|
|
* it calls the usage callback.
|
|
*
|
|
* The command table is terminated with a %NULL command. The terminating
|
|
* entry's handlers are called if the command is empty.
|
|
*
|
|
* The argument vector needs to be a pointer to the global arguments vector that is
|
|
* never freed, since the command handler will be called asynchronously and there's
|
|
* no callback to free the memory in (for simplicity).
|
|
*/
|
|
void
|
|
nmc_do_cmd (NmCli *nmc, const NMCCommand cmds[], const char *cmd, int argc, char **argv)
|
|
{
|
|
const NMCCommand *c;
|
|
GSimpleAsyncResult *simple;
|
|
|
|
simple = g_simple_async_result_new (NULL,
|
|
command_done,
|
|
nmc,
|
|
nmc_do_cmd);
|
|
|
|
if (argc == 0 && nmc->complete) {
|
|
g_simple_async_result_complete_in_idle (simple);
|
|
g_object_unref (simple);
|
|
return;
|
|
}
|
|
|
|
if (argc == 1 && nmc->complete) {
|
|
for (c = cmds; c->cmd; ++c) {
|
|
if (!*cmd || matches (cmd, c->cmd))
|
|
g_print ("%s\n", c->cmd);
|
|
}
|
|
nmc_complete_help (cmd);
|
|
g_simple_async_result_complete_in_idle (simple);
|
|
g_object_unref (simple);
|
|
return;
|
|
}
|
|
|
|
for (c = cmds; c->cmd; ++c) {
|
|
if (cmd && matches (cmd, c->cmd))
|
|
break;
|
|
}
|
|
|
|
if (c->cmd) {
|
|
/* A valid command was specified. */
|
|
if (c->usage && argc == 2 && nmc->complete)
|
|
nmc_complete_help (*(argv+1));
|
|
if (c->usage && nmc_arg_is_help (*(argv+1))) {
|
|
if (!nmc->complete)
|
|
c->usage ();
|
|
g_simple_async_result_complete_in_idle (simple);
|
|
g_object_unref (simple);
|
|
} else {
|
|
next_arg (nmc, &argc, &argv);
|
|
call_cmd (nmc, simple, c, argc, argv);
|
|
}
|
|
} else if (cmd) {
|
|
/* Not a known command. */
|
|
if (nmc_arg_is_help (cmd) && c->usage) {
|
|
c->usage ();
|
|
g_simple_async_result_complete_in_idle (simple);
|
|
g_object_unref (simple);
|
|
} else {
|
|
g_simple_async_result_set_error (simple, NMCLI_ERROR, NMC_RESULT_ERROR_USER_INPUT,
|
|
_("Error: argument '%s' not understood. Try passing --help instead."), cmd);
|
|
g_simple_async_result_complete_in_idle (simple);
|
|
g_object_unref (simple);
|
|
}
|
|
} else if (c->func) {
|
|
/* No command, run the default handler. */
|
|
call_cmd (nmc, simple, c, argc, argv);
|
|
} else {
|
|
/* No command and no default handler. */
|
|
g_simple_async_result_set_error (simple, NMCLI_ERROR, NMC_RESULT_ERROR_USER_INPUT,
|
|
_("Error: missing argument. Try passing --help."));
|
|
g_simple_async_result_complete_in_idle (simple);
|
|
g_object_unref (simple);
|
|
}
|
|
}
|
|
|
|
/**
|
|
* nmc_complete_strings:
|
|
* @prefix: a string to match
|
|
* @...: a %NULL-terminated list of candidate strings
|
|
*
|
|
* Prints all the matching candidates for completion. Useful when there's
|
|
* no better way to suggest completion other than a hardcoded string list.
|
|
*/
|
|
void
|
|
nmc_complete_strings (const char *prefix, ...)
|
|
{
|
|
va_list args;
|
|
const char *candidate;
|
|
|
|
va_start (args, prefix);
|
|
while ((candidate = va_arg (args, const char *))) {
|
|
if (!*prefix || matches (prefix, candidate))
|
|
g_print ("%s\n", candidate);
|
|
}
|
|
va_end (args);
|
|
}
|
|
|
|
/**
|
|
* nmc_complete_bool:
|
|
* @prefix: a string to match
|
|
* @...: a %NULL-terminated list of candidate strings
|
|
*
|
|
* Prints all the matching possible boolean values for completion.
|
|
*/
|
|
void
|
|
nmc_complete_bool (const char *prefix)
|
|
{
|
|
nmc_complete_strings (prefix, "true", "yes", "on",
|
|
"false", "no", "off", NULL);
|
|
}
|
|
|
|
/**
|
|
* nmc_error_get_simple_message:
|
|
* @error: a GError
|
|
*
|
|
* Returns a simplified message for some errors hard to understand.
|
|
*/
|
|
const char *
|
|
nmc_error_get_simple_message (GError *error)
|
|
{
|
|
/* Return a clear message instead of the obscure D-Bus policy error */
|
|
if (g_error_matches (error, G_DBUS_ERROR, G_DBUS_ERROR_ACCESS_DENIED))
|
|
return _("access denied");
|
|
else
|
|
return error->message;
|
|
}
|