
Otherwise, changing the structure is difficult because it all depends on the order (and you don't immdiately see which field is used where). Also, drop the name_l10n field.
1418 lines
39 KiB
C
1418 lines
39 KiB
C
/*
|
|
* nmcli - command-line tool for controlling NetworkManager
|
|
* Common functions and data shared between files.
|
|
*
|
|
* This program is free software; you can redistribute it and/or modify
|
|
* it under the terms of the GNU General Public License as published by
|
|
* the Free Software Foundation; either version 2 of the License, or
|
|
* (at your option) any later version.
|
|
*
|
|
* This program is distributed in the hope that it will be useful,
|
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
* GNU General Public License for more details.
|
|
*
|
|
* You should have received a copy of the GNU General Public License along
|
|
* with this program; if not, write to the Free Software Foundation, Inc.,
|
|
* 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA.
|
|
*
|
|
* Copyright 2012 - 2014 Red Hat, Inc.
|
|
*/
|
|
|
|
#include "nm-default.h"
|
|
|
|
#include <stdio.h>
|
|
#include <stdlib.h>
|
|
#include <errno.h>
|
|
#include <termios.h>
|
|
#include <sys/ioctl.h>
|
|
#include <readline/readline.h>
|
|
#include <readline/history.h>
|
|
|
|
#include "nm-vpn-helpers.h"
|
|
#include "nm-client-utils.h"
|
|
|
|
#include "common.h"
|
|
#include "utils.h"
|
|
|
|
extern GMainLoop *loop;
|
|
|
|
#define OUTPUT_FIELD_WITH_NAME(n) { .name = N_ (n), }
|
|
|
|
/* Available fields for IPv4 group */
|
|
NmcOutputField nmc_fields_ip4_config[] = {
|
|
OUTPUT_FIELD_WITH_NAME ("GROUP"), /* 0 */
|
|
OUTPUT_FIELD_WITH_NAME ("ADDRESS"), /* 1 */
|
|
OUTPUT_FIELD_WITH_NAME ("GATEWAY"), /* 2 */
|
|
OUTPUT_FIELD_WITH_NAME ("ROUTE"), /* 3 */
|
|
OUTPUT_FIELD_WITH_NAME ("DNS"), /* 4 */
|
|
OUTPUT_FIELD_WITH_NAME ("DOMAIN"), /* 5 */
|
|
OUTPUT_FIELD_WITH_NAME ("WINS"), /* 6 */
|
|
{ 0 }
|
|
};
|
|
#define NMC_FIELDS_IP4_CONFIG_ALL "GROUP,ADDRESS,GATEWAY,ROUTE,DNS,DOMAIN,WINS"
|
|
|
|
/* Available fields for DHCPv4 group */
|
|
NmcOutputField nmc_fields_dhcp4_config[] = {
|
|
OUTPUT_FIELD_WITH_NAME ("GROUP"), /* 0 */
|
|
OUTPUT_FIELD_WITH_NAME ("OPTION"), /* 1 */
|
|
{ 0 }
|
|
};
|
|
#define NMC_FIELDS_DHCP4_CONFIG_ALL "GROUP,OPTION"
|
|
|
|
/* Available fields for IPv6 group */
|
|
NmcOutputField nmc_fields_ip6_config[] = {
|
|
OUTPUT_FIELD_WITH_NAME ("GROUP"), /* 0 */
|
|
OUTPUT_FIELD_WITH_NAME ("ADDRESS"), /* 1 */
|
|
OUTPUT_FIELD_WITH_NAME ("GATEWAY"), /* 2 */
|
|
OUTPUT_FIELD_WITH_NAME ("ROUTE"), /* 3 */
|
|
OUTPUT_FIELD_WITH_NAME ("DNS"), /* 4 */
|
|
OUTPUT_FIELD_WITH_NAME ("DOMAIN"), /* 5 */
|
|
{ 0 }
|
|
};
|
|
#define NMC_FIELDS_IP6_CONFIG_ALL "GROUP,ADDRESS,GATEWAY,ROUTE,DNS,DOMAIN"
|
|
|
|
/* Available fields for DHCPv6 group */
|
|
NmcOutputField nmc_fields_dhcp6_config[] = {
|
|
OUTPUT_FIELD_WITH_NAME ("GROUP"), /* 0 */
|
|
OUTPUT_FIELD_WITH_NAME ("OPTION"), /* 1 */
|
|
{ 0 }
|
|
};
|
|
#define NMC_FIELDS_DHCP6_CONFIG_ALL "GROUP,OPTION"
|
|
|
|
|
|
gboolean
|
|
print_ip4_config (NMIPConfig *cfg4,
|
|
NmCli *nmc,
|
|
const char *group_prefix,
|
|
const char *one_field)
|
|
{
|
|
GPtrArray *ptr_array;
|
|
char **addr_arr = NULL;
|
|
char **route_arr = NULL;
|
|
char **dns_arr = NULL;
|
|
char **domain_arr = NULL;
|
|
char **wins_arr = NULL;
|
|
int i = 0;
|
|
NmcOutputField *tmpl, *arr;
|
|
size_t tmpl_len;
|
|
|
|
if (cfg4 == NULL)
|
|
return FALSE;
|
|
|
|
tmpl = nmc_fields_ip4_config;
|
|
tmpl_len = sizeof (nmc_fields_ip4_config);
|
|
nmc->print_fields.indices = parse_output_fields (one_field ? one_field : NMC_FIELDS_IP4_CONFIG_ALL,
|
|
tmpl, FALSE, NULL, NULL);
|
|
arr = nmc_dup_fields_array (tmpl, tmpl_len, NMC_OF_FLAG_FIELD_NAMES);
|
|
g_ptr_array_add (nmc->output_data, arr);
|
|
|
|
/* addresses */
|
|
ptr_array = nm_ip_config_get_addresses (cfg4);
|
|
if (ptr_array) {
|
|
addr_arr = g_new (char *, ptr_array->len + 1);
|
|
for (i = 0; i < ptr_array->len; i++) {
|
|
NMIPAddress *addr = (NMIPAddress *) g_ptr_array_index (ptr_array, i);
|
|
|
|
addr_arr[i] = g_strdup_printf ("%s/%u",
|
|
nm_ip_address_get_address (addr),
|
|
nm_ip_address_get_prefix (addr));
|
|
}
|
|
addr_arr[i] = NULL;
|
|
}
|
|
|
|
/* routes */
|
|
ptr_array = nm_ip_config_get_routes (cfg4);
|
|
if (ptr_array) {
|
|
route_arr = g_new (char *, ptr_array->len + 1);
|
|
for (i = 0; i < ptr_array->len; i++) {
|
|
NMIPRoute *route = (NMIPRoute *) g_ptr_array_index (ptr_array, i);
|
|
const char *next_hop;
|
|
|
|
next_hop = nm_ip_route_get_next_hop (route);
|
|
if (!next_hop)
|
|
next_hop = "0.0.0.0";
|
|
|
|
route_arr[i] = g_strdup_printf ("dst = %s/%u, nh = %s%c mt = %u",
|
|
nm_ip_route_get_dest (route),
|
|
nm_ip_route_get_prefix (route),
|
|
next_hop,
|
|
nm_ip_route_get_metric (route) == -1 ? '\0' : ',',
|
|
(guint32) nm_ip_route_get_metric (route));
|
|
}
|
|
route_arr[i] = NULL;
|
|
}
|
|
|
|
/* DNS */
|
|
dns_arr = g_strdupv ((char **) nm_ip_config_get_nameservers (cfg4));
|
|
|
|
/* domains */
|
|
domain_arr = g_strdupv ((char **) nm_ip_config_get_domains (cfg4));
|
|
|
|
/* WINS */
|
|
wins_arr = g_strdupv ((char **) nm_ip_config_get_wins_servers (cfg4));
|
|
|
|
arr = nmc_dup_fields_array (tmpl, tmpl_len, NMC_OF_FLAG_SECTION_PREFIX);
|
|
set_val_strc (arr, 0, group_prefix);
|
|
set_val_arr (arr, 1, addr_arr);
|
|
set_val_strc (arr, 2, nm_ip_config_get_gateway (cfg4));
|
|
set_val_arr (arr, 3, route_arr);
|
|
set_val_arr (arr, 4, dns_arr);
|
|
set_val_arr (arr, 5, domain_arr);
|
|
set_val_arr (arr, 6, wins_arr);
|
|
g_ptr_array_add (nmc->output_data, arr);
|
|
|
|
print_data (nmc); /* Print all data */
|
|
|
|
/* Remove any previous data */
|
|
nmc_empty_output_fields (nmc);
|
|
|
|
return TRUE;
|
|
}
|
|
|
|
gboolean
|
|
print_ip6_config (NMIPConfig *cfg6,
|
|
NmCli *nmc,
|
|
const char *group_prefix,
|
|
const char *one_field)
|
|
{
|
|
GPtrArray *ptr_array;
|
|
char **addr_arr = NULL;
|
|
char **route_arr = NULL;
|
|
char **dns_arr = NULL;
|
|
char **domain_arr = NULL;
|
|
int i = 0;
|
|
NmcOutputField *tmpl, *arr;
|
|
size_t tmpl_len;
|
|
|
|
if (cfg6 == NULL)
|
|
return FALSE;
|
|
|
|
tmpl = nmc_fields_ip6_config;
|
|
tmpl_len = sizeof (nmc_fields_ip6_config);
|
|
nmc->print_fields.indices = parse_output_fields (one_field ? one_field : NMC_FIELDS_IP6_CONFIG_ALL,
|
|
tmpl, FALSE, NULL, NULL);
|
|
arr = nmc_dup_fields_array (tmpl, tmpl_len, NMC_OF_FLAG_FIELD_NAMES);
|
|
g_ptr_array_add (nmc->output_data, arr);
|
|
|
|
/* addresses */
|
|
ptr_array = nm_ip_config_get_addresses (cfg6);
|
|
if (ptr_array) {
|
|
addr_arr = g_new (char *, ptr_array->len + 1);
|
|
for (i = 0; i < ptr_array->len; i++) {
|
|
NMIPAddress *addr = (NMIPAddress *) g_ptr_array_index (ptr_array, i);
|
|
|
|
addr_arr[i] = g_strdup_printf ("%s/%u",
|
|
nm_ip_address_get_address (addr),
|
|
nm_ip_address_get_prefix (addr));
|
|
}
|
|
addr_arr[i] = NULL;
|
|
}
|
|
|
|
/* routes */
|
|
ptr_array = nm_ip_config_get_routes (cfg6);
|
|
if (ptr_array) {
|
|
route_arr = g_new (char *, ptr_array->len + 1);
|
|
for (i = 0; i < ptr_array->len; i++) {
|
|
NMIPRoute *route = (NMIPRoute *) g_ptr_array_index (ptr_array, i);
|
|
const char *next_hop;
|
|
|
|
next_hop = nm_ip_route_get_next_hop (route);
|
|
if (!next_hop)
|
|
next_hop = "::";
|
|
|
|
route_arr[i] = g_strdup_printf ("dst = %s/%u, nh = %s%c mt = %u",
|
|
nm_ip_route_get_dest (route),
|
|
nm_ip_route_get_prefix (route),
|
|
next_hop,
|
|
nm_ip_route_get_metric (route) == -1 ? '\0' : ',',
|
|
(guint32) nm_ip_route_get_metric (route));
|
|
}
|
|
route_arr[i] = NULL;
|
|
}
|
|
|
|
/* DNS */
|
|
dns_arr = g_strdupv ((char **) nm_ip_config_get_nameservers (cfg6));
|
|
|
|
/* domains */
|
|
domain_arr = g_strdupv ((char **) nm_ip_config_get_domains (cfg6));
|
|
|
|
arr = nmc_dup_fields_array (tmpl, tmpl_len, NMC_OF_FLAG_SECTION_PREFIX);
|
|
set_val_strc (arr, 0, group_prefix);
|
|
set_val_arr (arr, 1, addr_arr);
|
|
set_val_strc (arr, 2, nm_ip_config_get_gateway (cfg6));
|
|
set_val_arr (arr, 3, route_arr);
|
|
set_val_arr (arr, 4, dns_arr);
|
|
set_val_arr (arr, 5, domain_arr);
|
|
g_ptr_array_add (nmc->output_data, arr);
|
|
|
|
print_data (nmc); /* Print all data */
|
|
|
|
/* Remove any previous data */
|
|
nmc_empty_output_fields (nmc);
|
|
|
|
return TRUE;
|
|
}
|
|
|
|
gboolean
|
|
print_dhcp4_config (NMDhcpConfig *dhcp4,
|
|
NmCli *nmc,
|
|
const char *group_prefix,
|
|
const char *one_field)
|
|
{
|
|
GHashTable *table;
|
|
NmcOutputField *tmpl, *arr;
|
|
size_t tmpl_len;
|
|
|
|
if (dhcp4 == NULL)
|
|
return FALSE;
|
|
|
|
table = nm_dhcp_config_get_options (dhcp4);
|
|
if (table) {
|
|
GHashTableIter table_iter;
|
|
gpointer key, value;
|
|
char **options_arr = NULL;
|
|
int i = 0;
|
|
|
|
tmpl = nmc_fields_dhcp4_config;
|
|
tmpl_len = sizeof (nmc_fields_dhcp4_config);
|
|
nmc->print_fields.indices = parse_output_fields (one_field ? one_field : NMC_FIELDS_DHCP4_CONFIG_ALL,
|
|
tmpl, FALSE, NULL, NULL);
|
|
arr = nmc_dup_fields_array (tmpl, tmpl_len, NMC_OF_FLAG_FIELD_NAMES);
|
|
g_ptr_array_add (nmc->output_data, arr);
|
|
|
|
options_arr = g_new (char *, g_hash_table_size (table) + 1);
|
|
g_hash_table_iter_init (&table_iter, table);
|
|
while (g_hash_table_iter_next (&table_iter, &key, &value))
|
|
options_arr[i++] = g_strdup_printf ("%s = %s", (char *) key, (char *) value);
|
|
options_arr[i] = NULL;
|
|
|
|
arr = nmc_dup_fields_array (tmpl, tmpl_len, NMC_OF_FLAG_SECTION_PREFIX);
|
|
set_val_strc (arr, 0, group_prefix);
|
|
set_val_arr (arr, 1, options_arr);
|
|
g_ptr_array_add (nmc->output_data, arr);
|
|
|
|
print_data (nmc); /* Print all data */
|
|
|
|
/* Remove any previous data */
|
|
nmc_empty_output_fields (nmc);
|
|
|
|
return TRUE;
|
|
}
|
|
return FALSE;
|
|
}
|
|
|
|
gboolean
|
|
print_dhcp6_config (NMDhcpConfig *dhcp6,
|
|
NmCli *nmc,
|
|
const char *group_prefix,
|
|
const char *one_field)
|
|
{
|
|
GHashTable *table;
|
|
NmcOutputField *tmpl, *arr;
|
|
size_t tmpl_len;
|
|
|
|
if (dhcp6 == NULL)
|
|
return FALSE;
|
|
|
|
table = nm_dhcp_config_get_options (dhcp6);
|
|
if (table) {
|
|
GHashTableIter table_iter;
|
|
gpointer key, value;
|
|
char **options_arr = NULL;
|
|
int i = 0;
|
|
|
|
tmpl = nmc_fields_dhcp6_config;
|
|
tmpl_len = sizeof (nmc_fields_dhcp6_config);
|
|
nmc->print_fields.indices = parse_output_fields (one_field ? one_field : NMC_FIELDS_DHCP6_CONFIG_ALL,
|
|
tmpl, FALSE, NULL, NULL);
|
|
arr = nmc_dup_fields_array (tmpl, tmpl_len, NMC_OF_FLAG_FIELD_NAMES);
|
|
g_ptr_array_add (nmc->output_data, arr);
|
|
|
|
options_arr = g_new (char *, g_hash_table_size (table) + 1);
|
|
g_hash_table_iter_init (&table_iter, table);
|
|
while (g_hash_table_iter_next (&table_iter, &key, &value))
|
|
options_arr[i++] = g_strdup_printf ("%s = %s", (char *) key, (char *) value);
|
|
options_arr[i] = NULL;
|
|
|
|
arr = nmc_dup_fields_array (tmpl, tmpl_len, NMC_OF_FLAG_SECTION_PREFIX);
|
|
set_val_strc (arr, 0, group_prefix);
|
|
set_val_arr (arr, 1, options_arr);
|
|
g_ptr_array_add (nmc->output_data, arr);
|
|
|
|
print_data (nmc); /* Print all data */
|
|
|
|
/* Remove any previous data */
|
|
nmc_empty_output_fields (nmc);
|
|
|
|
return TRUE;
|
|
}
|
|
return FALSE;
|
|
}
|
|
|
|
const char *
|
|
nmc_device_state_to_string (NMDeviceState state)
|
|
{
|
|
switch (state) {
|
|
case NM_DEVICE_STATE_UNMANAGED:
|
|
return _("unmanaged");
|
|
case NM_DEVICE_STATE_UNAVAILABLE:
|
|
return _("unavailable");
|
|
case NM_DEVICE_STATE_DISCONNECTED:
|
|
return _("disconnected");
|
|
case NM_DEVICE_STATE_PREPARE:
|
|
return _("connecting (prepare)");
|
|
case NM_DEVICE_STATE_CONFIG:
|
|
return _("connecting (configuring)");
|
|
case NM_DEVICE_STATE_NEED_AUTH:
|
|
return _("connecting (need authentication)");
|
|
case NM_DEVICE_STATE_IP_CONFIG:
|
|
return _("connecting (getting IP configuration)");
|
|
case NM_DEVICE_STATE_IP_CHECK:
|
|
return _("connecting (checking IP connectivity)");
|
|
case NM_DEVICE_STATE_SECONDARIES:
|
|
return _("connecting (starting secondary connections)");
|
|
case NM_DEVICE_STATE_ACTIVATED:
|
|
return _("connected");
|
|
case NM_DEVICE_STATE_DEACTIVATING:
|
|
return _("deactivating");
|
|
case NM_DEVICE_STATE_FAILED:
|
|
return _("connection failed");
|
|
default:
|
|
return _("unknown");
|
|
}
|
|
}
|
|
|
|
const char *
|
|
nmc_device_metered_to_string (NMMetered value)
|
|
{
|
|
switch (value) {
|
|
case NM_METERED_YES:
|
|
return _("yes");
|
|
case NM_METERED_NO:
|
|
return _("no");
|
|
case NM_METERED_GUESS_YES:
|
|
return _("yes (guessed)");
|
|
case NM_METERED_GUESS_NO:
|
|
return _("no (guessed)");
|
|
default:
|
|
return _("unknown");
|
|
}
|
|
}
|
|
|
|
const char *
|
|
nmc_device_reason_to_string (NMDeviceStateReason reason)
|
|
{
|
|
switch (reason) {
|
|
case NM_DEVICE_STATE_REASON_NONE:
|
|
return _("No reason given");
|
|
|
|
case NM_DEVICE_STATE_REASON_UNKNOWN:
|
|
return _("Unknown error");
|
|
|
|
case NM_DEVICE_STATE_REASON_NOW_MANAGED:
|
|
return _("Device is now managed");
|
|
|
|
case NM_DEVICE_STATE_REASON_NOW_UNMANAGED:
|
|
return _("Device is now unmanaged");
|
|
|
|
case NM_DEVICE_STATE_REASON_CONFIG_FAILED:
|
|
return _("The device could not be readied for configuration");
|
|
|
|
case NM_DEVICE_STATE_REASON_IP_CONFIG_UNAVAILABLE:
|
|
return _("IP configuration could not be reserved (no available address, timeout, etc.)");
|
|
|
|
case NM_DEVICE_STATE_REASON_IP_CONFIG_EXPIRED:
|
|
return _("The IP configuration is no longer valid");
|
|
|
|
case NM_DEVICE_STATE_REASON_NO_SECRETS:
|
|
return _("Secrets were required, but not provided");
|
|
|
|
case NM_DEVICE_STATE_REASON_SUPPLICANT_DISCONNECT:
|
|
return _("802.1X supplicant disconnected");
|
|
|
|
case NM_DEVICE_STATE_REASON_SUPPLICANT_CONFIG_FAILED:
|
|
return _("802.1X supplicant configuration failed");
|
|
|
|
case NM_DEVICE_STATE_REASON_SUPPLICANT_FAILED:
|
|
return _("802.1X supplicant failed");
|
|
|
|
case NM_DEVICE_STATE_REASON_SUPPLICANT_TIMEOUT:
|
|
return _("802.1X supplicant took too long to authenticate");
|
|
|
|
case NM_DEVICE_STATE_REASON_PPP_START_FAILED:
|
|
return _("PPP service failed to start");
|
|
|
|
case NM_DEVICE_STATE_REASON_PPP_DISCONNECT:
|
|
return _("PPP service disconnected");
|
|
|
|
case NM_DEVICE_STATE_REASON_PPP_FAILED:
|
|
return _("PPP failed");
|
|
|
|
case NM_DEVICE_STATE_REASON_DHCP_START_FAILED:
|
|
return _("DHCP client failed to start");
|
|
|
|
case NM_DEVICE_STATE_REASON_DHCP_ERROR:
|
|
return _("DHCP client error");
|
|
|
|
case NM_DEVICE_STATE_REASON_DHCP_FAILED:
|
|
return _("DHCP client failed");
|
|
|
|
case NM_DEVICE_STATE_REASON_SHARED_START_FAILED:
|
|
return _("Shared connection service failed to start");
|
|
|
|
case NM_DEVICE_STATE_REASON_SHARED_FAILED:
|
|
return _("Shared connection service failed");
|
|
|
|
case NM_DEVICE_STATE_REASON_AUTOIP_START_FAILED:
|
|
return _("AutoIP service failed to start");
|
|
|
|
case NM_DEVICE_STATE_REASON_AUTOIP_ERROR:
|
|
return _("AutoIP service error");
|
|
|
|
case NM_DEVICE_STATE_REASON_AUTOIP_FAILED:
|
|
return _("AutoIP service failed");
|
|
|
|
case NM_DEVICE_STATE_REASON_MODEM_BUSY:
|
|
return _("The line is busy");
|
|
|
|
case NM_DEVICE_STATE_REASON_MODEM_NO_DIAL_TONE:
|
|
return _("No dial tone");
|
|
|
|
case NM_DEVICE_STATE_REASON_MODEM_NO_CARRIER:
|
|
return _("No carrier could be established");
|
|
|
|
case NM_DEVICE_STATE_REASON_MODEM_DIAL_TIMEOUT:
|
|
return _("The dialing request timed out");
|
|
|
|
case NM_DEVICE_STATE_REASON_MODEM_DIAL_FAILED:
|
|
return _("The dialing attempt failed");
|
|
|
|
case NM_DEVICE_STATE_REASON_MODEM_INIT_FAILED:
|
|
return _("Modem initialization failed");
|
|
|
|
case NM_DEVICE_STATE_REASON_GSM_APN_FAILED:
|
|
return _("Failed to select the specified APN");
|
|
|
|
case NM_DEVICE_STATE_REASON_GSM_REGISTRATION_NOT_SEARCHING:
|
|
return _("Not searching for networks");
|
|
|
|
case NM_DEVICE_STATE_REASON_GSM_REGISTRATION_DENIED:
|
|
return _("Network registration denied");
|
|
|
|
case NM_DEVICE_STATE_REASON_GSM_REGISTRATION_TIMEOUT:
|
|
return _("Network registration timed out");
|
|
|
|
case NM_DEVICE_STATE_REASON_GSM_REGISTRATION_FAILED:
|
|
return _("Failed to register with the requested network");
|
|
|
|
case NM_DEVICE_STATE_REASON_GSM_PIN_CHECK_FAILED:
|
|
return _("PIN check failed");
|
|
|
|
case NM_DEVICE_STATE_REASON_FIRMWARE_MISSING:
|
|
return _("Necessary firmware for the device may be missing");
|
|
|
|
case NM_DEVICE_STATE_REASON_REMOVED:
|
|
return _("The device was removed");
|
|
|
|
case NM_DEVICE_STATE_REASON_SLEEPING:
|
|
return _("NetworkManager went to sleep");
|
|
|
|
case NM_DEVICE_STATE_REASON_CONNECTION_REMOVED:
|
|
return _("The device's active connection disappeared");
|
|
|
|
case NM_DEVICE_STATE_REASON_USER_REQUESTED:
|
|
return _("Device disconnected by user or client");
|
|
|
|
case NM_DEVICE_STATE_REASON_CARRIER:
|
|
return _("Carrier/link changed");
|
|
|
|
case NM_DEVICE_STATE_REASON_CONNECTION_ASSUMED:
|
|
return _("The device's existing connection was assumed");
|
|
|
|
case NM_DEVICE_STATE_REASON_SUPPLICANT_AVAILABLE:
|
|
return _("The supplicant is now available");
|
|
|
|
case NM_DEVICE_STATE_REASON_MODEM_NOT_FOUND:
|
|
return _("The modem could not be found");
|
|
|
|
case NM_DEVICE_STATE_REASON_BT_FAILED:
|
|
return _("The Bluetooth connection failed or timed out");
|
|
|
|
case NM_DEVICE_STATE_REASON_GSM_SIM_NOT_INSERTED:
|
|
return _("GSM Modem's SIM card not inserted");
|
|
|
|
case NM_DEVICE_STATE_REASON_GSM_SIM_PIN_REQUIRED:
|
|
return _("GSM Modem's SIM PIN required");
|
|
|
|
case NM_DEVICE_STATE_REASON_GSM_SIM_PUK_REQUIRED:
|
|
return _("GSM Modem's SIM PUK required");
|
|
|
|
case NM_DEVICE_STATE_REASON_GSM_SIM_WRONG:
|
|
return _("GSM Modem's SIM wrong");
|
|
|
|
case NM_DEVICE_STATE_REASON_INFINIBAND_MODE:
|
|
return _("InfiniBand device does not support connected mode");
|
|
|
|
case NM_DEVICE_STATE_REASON_DEPENDENCY_FAILED:
|
|
return _("A dependency of the connection failed");
|
|
|
|
case NM_DEVICE_STATE_REASON_BR2684_FAILED:
|
|
return _("A problem with the RFC 2684 Ethernet over ADSL bridge");
|
|
|
|
case NM_DEVICE_STATE_REASON_MODEM_MANAGER_UNAVAILABLE:
|
|
return _("ModemManager is unavailable");
|
|
|
|
case NM_DEVICE_STATE_REASON_SSID_NOT_FOUND:
|
|
return _("The Wi-Fi network could not be found");
|
|
|
|
case NM_DEVICE_STATE_REASON_SECONDARY_CONNECTION_FAILED:
|
|
return _("A secondary connection of the base connection failed");
|
|
|
|
case NM_DEVICE_STATE_REASON_DCB_FCOE_FAILED:
|
|
return _("DCB or FCoE setup failed");
|
|
|
|
case NM_DEVICE_STATE_REASON_TEAMD_CONTROL_FAILED:
|
|
return _("teamd control failed");
|
|
|
|
case NM_DEVICE_STATE_REASON_MODEM_FAILED:
|
|
return _("Modem failed or no longer available");
|
|
|
|
case NM_DEVICE_STATE_REASON_MODEM_AVAILABLE:
|
|
return _("Modem now ready and available");
|
|
|
|
case NM_DEVICE_STATE_REASON_SIM_PIN_INCORRECT:
|
|
return _("SIM PIN was incorrect");
|
|
|
|
case NM_DEVICE_STATE_REASON_NEW_ACTIVATION:
|
|
return _("New connection activation was enqueued");
|
|
|
|
case NM_DEVICE_STATE_REASON_PARENT_CHANGED:
|
|
return _("The device's parent changed");
|
|
|
|
case NM_DEVICE_STATE_REASON_PARENT_MANAGED_CHANGED:
|
|
return _("The device parent's management changed");
|
|
|
|
default:
|
|
/* TRANSLATORS: Unknown reason for a device state change (NMDeviceStateReason) */
|
|
return _("Unknown");
|
|
}
|
|
}
|
|
|
|
/*
|
|
* nmc_find_connection:
|
|
* @connections: array of NMConnections to search in
|
|
* @filter_type: "id", "uuid", "path" or %NULL
|
|
* @filter_val: connection to find (connection name, UUID or path)
|
|
* @start: where to start in @list. The location is updated so that the function
|
|
* can be called multiple times (for connections with the same name).
|
|
* @complete: print possible completions
|
|
*
|
|
* Find a connection in @list according to @filter_val. @filter_type determines
|
|
* what property is used for comparison. When @filter_type is NULL, compare
|
|
* @filter_val against all types. Otherwise, only compare against the specified
|
|
* type. If 'path' filter type is specified, comparison against numeric index
|
|
* (in addition to the whole path) is allowed.
|
|
*
|
|
* Returns: found connection, or %NULL
|
|
*/
|
|
NMConnection *
|
|
nmc_find_connection (const GPtrArray *connections,
|
|
const char *filter_type,
|
|
const char *filter_val,
|
|
int *start,
|
|
gboolean complete)
|
|
{
|
|
NMConnection *connection;
|
|
NMConnection *found = NULL;
|
|
int i;
|
|
const char *id;
|
|
const char *uuid;
|
|
const char *path, *path_num;
|
|
|
|
for (i = start ? *start : 0; i < connections->len; i++) {
|
|
connection = NM_CONNECTION (connections->pdata[i]);
|
|
|
|
id = nm_connection_get_id (connection);
|
|
uuid = nm_connection_get_uuid (connection);
|
|
path = nm_connection_get_path (connection);
|
|
path_num = path ? strrchr (path, '/') + 1 : NULL;
|
|
|
|
/* When filter_type is NULL, compare connection ID (filter_val)
|
|
* against all types. Otherwise, only compare against the specific
|
|
* type. If 'path' filter type is specified, comparison against
|
|
* numeric index (in addition to the whole path) is allowed.
|
|
*/
|
|
if (!filter_type || strcmp (filter_type, "id") == 0) {
|
|
if (complete)
|
|
nmc_complete_strings (filter_val, id, NULL);
|
|
if (strcmp (filter_val, id) == 0)
|
|
goto found;
|
|
}
|
|
|
|
if (!filter_type || strcmp (filter_type, "uuid") == 0) {
|
|
if (complete && (filter_type || *filter_val))
|
|
nmc_complete_strings (filter_val, uuid, NULL);
|
|
if (strcmp (filter_val, uuid) == 0)
|
|
goto found;
|
|
}
|
|
|
|
if (!filter_type || strcmp (filter_type, "path") == 0) {
|
|
if (complete && (filter_type || *filter_val))
|
|
nmc_complete_strings (filter_val, path, filter_type ? path_num : NULL, NULL);
|
|
if (g_strcmp0 (filter_val, path) == 0 || (filter_type && g_strcmp0 (filter_val, path_num) == 0))
|
|
goto found;
|
|
}
|
|
|
|
continue;
|
|
found:
|
|
if (!start)
|
|
return connection;
|
|
if (found) {
|
|
*start = i;
|
|
return found;
|
|
}
|
|
found = connection;
|
|
}
|
|
|
|
if (start)
|
|
*start = 0;
|
|
return found;
|
|
}
|
|
|
|
static gboolean
|
|
vpn_openconnect_get_secrets (NMConnection *connection, GPtrArray *secrets)
|
|
{
|
|
GError *error = NULL;
|
|
NMSettingVpn *s_vpn;
|
|
const char *vpn_type, *gw, *port;
|
|
char *cookie = NULL;
|
|
char *gateway = NULL;
|
|
char *gwcert = NULL;
|
|
int status = 0;
|
|
int i;
|
|
gboolean ret;
|
|
|
|
if (!connection)
|
|
return FALSE;
|
|
|
|
if (!nm_connection_is_type (connection, NM_SETTING_VPN_SETTING_NAME))
|
|
return FALSE;
|
|
|
|
s_vpn = nm_connection_get_setting_vpn (connection);
|
|
vpn_type = nm_setting_vpn_get_service_type (s_vpn);
|
|
if (g_strcmp0 (vpn_type, NM_DBUS_INTERFACE ".openconnect"))
|
|
return FALSE;
|
|
|
|
/* Get gateway and port */
|
|
gw = nm_setting_vpn_get_data_item (s_vpn, "gateway");
|
|
port = gw ? strrchr (gw, ':') : NULL;
|
|
|
|
/* Interactively authenticate to OpenConnect server and get secrets */
|
|
ret = nm_vpn_openconnect_authenticate_helper (gw, &cookie, &gateway, &gwcert, &status, &error);
|
|
if (!ret) {
|
|
g_printerr (_("Error: openconnect failed: %s\n"), error->message);
|
|
g_clear_error (&error);
|
|
return FALSE;
|
|
}
|
|
|
|
if (WIFEXITED (status)) {
|
|
if (WEXITSTATUS (status) != 0)
|
|
g_printerr (_("Error: openconnect failed with status %d\n"), WEXITSTATUS (status));
|
|
} else if (WIFSIGNALED (status))
|
|
g_printerr (_("Error: openconnect failed with signal %d\n"), WTERMSIG (status));
|
|
|
|
/* Append port to the host value */
|
|
if (gateway && port) {
|
|
char *tmp = gateway;
|
|
gateway = g_strdup_printf ("%s%s", gateway, port);
|
|
g_free (tmp);
|
|
}
|
|
|
|
/* Fill secrets to the array */
|
|
for (i = 0; i < secrets->len; i++) {
|
|
NMSecretAgentSimpleSecret *secret = secrets->pdata[i];
|
|
|
|
if (!g_strcmp0 (secret->vpn_type, vpn_type)) {
|
|
if (!g_strcmp0 (secret->vpn_property, "cookie")) {
|
|
g_free (secret->value);
|
|
secret->value = cookie;
|
|
cookie = NULL;
|
|
} else if (!g_strcmp0 (secret->vpn_property, "gateway")) {
|
|
g_free (secret->value);
|
|
secret->value = gateway;
|
|
gateway = NULL;
|
|
} else if (!g_strcmp0 (secret->vpn_property, "gwcert")) {
|
|
g_free (secret->value);
|
|
secret->value = gwcert;
|
|
gwcert = NULL;
|
|
}
|
|
}
|
|
}
|
|
g_free (cookie);
|
|
g_free (gateway);
|
|
g_free (gwcert);
|
|
|
|
return TRUE;
|
|
}
|
|
|
|
static gboolean
|
|
get_secrets_from_user (const char *request_id,
|
|
const char *title,
|
|
const char *msg,
|
|
NMConnection *connection,
|
|
gboolean ask,
|
|
gboolean echo_on,
|
|
GHashTable *pwds_hash,
|
|
GPtrArray *secrets)
|
|
{
|
|
int i;
|
|
|
|
/* Check if there is a VPN OpenConnect secret to ask for */
|
|
if (ask)
|
|
vpn_openconnect_get_secrets (connection, secrets);
|
|
|
|
for (i = 0; i < secrets->len; i++) {
|
|
NMSecretAgentSimpleSecret *secret = secrets->pdata[i];
|
|
char *pwd = NULL;
|
|
|
|
/* First try to find the password in provided passwords file,
|
|
* then ask user. */
|
|
if (pwds_hash && (pwd = g_hash_table_lookup (pwds_hash, secret->prop_name))) {
|
|
pwd = g_strdup (pwd);
|
|
} else {
|
|
if (ask) {
|
|
if (secret->value) {
|
|
if (!g_strcmp0 (secret->vpn_type, NM_DBUS_INTERFACE ".openconnect")) {
|
|
/* Do not present and ask user for openconnect secrets, we already have them */
|
|
continue;
|
|
} else {
|
|
/* Prefill the password if we have it. */
|
|
rl_startup_hook = nmc_rl_set_deftext;
|
|
nmc_rl_pre_input_deftext = g_strdup (secret->value);
|
|
}
|
|
}
|
|
if (msg)
|
|
g_print ("%s\n", msg);
|
|
pwd = nmc_readline_echo (secret->password ? echo_on : TRUE,
|
|
"%s (%s): ", secret->name, secret->prop_name);
|
|
if (!pwd)
|
|
pwd = g_strdup ("");
|
|
} else {
|
|
if (msg)
|
|
g_print ("%s\n", msg);
|
|
g_printerr (_("Warning: password for '%s' not given in 'passwd-file' "
|
|
"and nmcli cannot ask without '--ask' option.\n"),
|
|
secret->prop_name);
|
|
}
|
|
}
|
|
/* No password provided, cancel the secrets. */
|
|
if (!pwd)
|
|
return FALSE;
|
|
g_free (secret->value);
|
|
secret->value = pwd;
|
|
}
|
|
return TRUE;
|
|
}
|
|
|
|
/**
|
|
* nmc_secrets_requested:
|
|
* @agent: the #NMSecretAgentSimple
|
|
* @request_id: request ID, to eventually pass to
|
|
* nm_secret_agent_simple_response()
|
|
* @title: a title for the password request
|
|
* @msg: a prompt message for the password request
|
|
* @secrets: (element-type #NMSecretAgentSimpleSecret): array of secrets
|
|
* being requested.
|
|
* @user_data: user data passed to the function
|
|
*
|
|
* This function is used as a callback for "request-secrets" signal of
|
|
* NMSecretAgentSimpleSecret.
|
|
*/
|
|
void
|
|
nmc_secrets_requested (NMSecretAgentSimple *agent,
|
|
const char *request_id,
|
|
const char *title,
|
|
const char *msg,
|
|
GPtrArray *secrets,
|
|
gpointer user_data)
|
|
{
|
|
NmCli *nmc = (NmCli *) user_data;
|
|
NMConnection *connection = NULL;
|
|
char *path, *p;
|
|
gboolean success = FALSE;
|
|
const GPtrArray *connections;
|
|
|
|
if (nmc->print_output == NMC_PRINT_PRETTY)
|
|
nmc_terminal_erase_line ();
|
|
|
|
/* Find the connection for the request */
|
|
path = g_strdup (request_id);
|
|
if (path) {
|
|
p = strrchr (path, '/');
|
|
if (p)
|
|
*p = '\0';
|
|
connections = nm_client_get_connections (nmc->client);
|
|
connection = nmc_find_connection (connections, "path", path, NULL, FALSE);
|
|
g_free (path);
|
|
}
|
|
|
|
success = get_secrets_from_user (request_id, title, msg, connection, nmc->in_editor || nmc->ask,
|
|
nmc->show_secrets, nmc->pwds_hash, secrets);
|
|
if (success)
|
|
nm_secret_agent_simple_response (agent, request_id, secrets);
|
|
else {
|
|
/* Unregister our secret agent on failure, so that another agent
|
|
* may be tried */
|
|
if (nmc->secret_agent) {
|
|
nm_secret_agent_old_unregister (nmc->secret_agent, NULL, NULL);
|
|
g_clear_object (&nmc->secret_agent);
|
|
}
|
|
}
|
|
}
|
|
|
|
char *
|
|
nmc_unique_connection_name (const GPtrArray *connections, const char *try_name)
|
|
{
|
|
NMConnection *connection;
|
|
const char *name;
|
|
char *new_name;
|
|
unsigned num = 1;
|
|
int i = 0;
|
|
|
|
new_name = g_strdup (try_name);
|
|
while (i < connections->len) {
|
|
connection = NM_CONNECTION (connections->pdata[i]);
|
|
|
|
name = nm_connection_get_id (connection);
|
|
if (g_strcmp0 (new_name, name) == 0) {
|
|
g_free (new_name);
|
|
new_name = g_strdup_printf ("%s-%d", try_name, num++);
|
|
i = 0;
|
|
} else
|
|
i++;
|
|
}
|
|
return new_name;
|
|
}
|
|
|
|
/* readline state variables */
|
|
static gboolean nmcli_in_readline = FALSE;
|
|
static gboolean rl_got_line;
|
|
static char *rl_string;
|
|
|
|
/**
|
|
* nmc_cleanup_readline:
|
|
*
|
|
* Cleanup readline when nmcli is terminated with a signal.
|
|
* It makes sure the terminal is not garbled.
|
|
*/
|
|
void
|
|
nmc_cleanup_readline (void)
|
|
{
|
|
rl_free_line_state ();
|
|
rl_cleanup_after_signal ();
|
|
}
|
|
|
|
gboolean
|
|
nmc_get_in_readline (void)
|
|
{
|
|
return nmcli_in_readline;
|
|
}
|
|
|
|
void
|
|
nmc_set_in_readline (gboolean in_readline)
|
|
{
|
|
nmcli_in_readline = in_readline;
|
|
}
|
|
|
|
static void
|
|
readline_cb (char *line)
|
|
{
|
|
rl_got_line = TRUE;
|
|
rl_string = line;
|
|
rl_callback_handler_remove ();
|
|
}
|
|
|
|
static gboolean
|
|
stdin_ready_cb (GIOChannel * io, GIOCondition condition, gpointer data)
|
|
{
|
|
rl_callback_read_char ();
|
|
return TRUE;
|
|
}
|
|
|
|
static char *
|
|
nmc_readline_helper (const char *prompt)
|
|
{
|
|
GIOChannel *io = NULL;
|
|
guint io_watch_id;
|
|
|
|
nmc_set_in_readline (TRUE);
|
|
|
|
io = g_io_channel_unix_new (STDIN_FILENO);
|
|
io_watch_id = g_io_add_watch (io, G_IO_IN, stdin_ready_cb, NULL);
|
|
g_io_channel_unref (io);
|
|
|
|
read_again:
|
|
rl_string = NULL;
|
|
rl_got_line = FALSE;
|
|
rl_callback_handler_install (prompt, readline_cb);
|
|
|
|
while ( !rl_got_line
|
|
&& g_main_loop_is_running (loop)
|
|
&& !nmc_seen_sigint ())
|
|
g_main_context_iteration (NULL, TRUE);
|
|
|
|
/* If Ctrl-C was detected, complete the line */
|
|
if (nmc_seen_sigint ()) {
|
|
rl_echo_signal_char (SIGINT);
|
|
rl_stuff_char ('\n');
|
|
rl_callback_read_char ();
|
|
}
|
|
|
|
/* Add string to the history */
|
|
if (rl_string && *rl_string)
|
|
add_history (rl_string);
|
|
|
|
if (nmc_seen_sigint ()) {
|
|
/* Ctrl-C */
|
|
nmc_clear_sigint ();
|
|
if ( nm_cli.in_editor
|
|
|| (rl_string && *rl_string)) {
|
|
/* In editor, or the line is not empty */
|
|
/* Call readline again to get new prompt (repeat) */
|
|
g_free (rl_string);
|
|
goto read_again;
|
|
} else {
|
|
/* Not in editor and line is empty, exit */
|
|
nmc_exit ();
|
|
}
|
|
} else if (!rl_string) {
|
|
/* Ctrl-D, exit */
|
|
nmc_exit ();
|
|
}
|
|
|
|
/* Return NULL, not empty string */
|
|
if (rl_string && *rl_string == '\0') {
|
|
g_free (rl_string);
|
|
rl_string = NULL;
|
|
}
|
|
|
|
g_source_remove (io_watch_id);
|
|
nmc_set_in_readline (FALSE);
|
|
|
|
return rl_string;
|
|
}
|
|
|
|
/**
|
|
* nmc_readline:
|
|
* @prompt_fmt: prompt to print (telling user what to enter). It is standard
|
|
* printf() format string
|
|
* @...: a list of arguments according to the @prompt_fmt format string
|
|
*
|
|
* Wrapper around libreadline's readline() function.
|
|
* If user pressed Ctrl-C, readline() is called again (if not in editor and
|
|
* line is empty, nmcli will quit).
|
|
* If user pressed Ctrl-D on empty line, nmcli will quit.
|
|
*
|
|
* Returns: the user provided string. In case the user entered empty string,
|
|
* this function returns NULL.
|
|
*/
|
|
char *
|
|
nmc_readline (const char *prompt_fmt, ...)
|
|
{
|
|
va_list args;
|
|
char *prompt, *str;
|
|
|
|
va_start (args, prompt_fmt);
|
|
prompt = g_strdup_vprintf (prompt_fmt, args);
|
|
va_end (args);
|
|
|
|
str = nmc_readline_helper (prompt);
|
|
|
|
g_free (prompt);
|
|
|
|
return str;
|
|
}
|
|
|
|
/**
|
|
* nmc_readline_echo:
|
|
*
|
|
* The same as nmc_readline() except it can disable echoing of input characters if @echo_on is %FALSE.
|
|
* nmc_readline(TRUE, ...) == nmc_readline(...)
|
|
*/
|
|
char *
|
|
nmc_readline_echo (gboolean echo_on, const char *prompt_fmt, ...)
|
|
{
|
|
va_list args;
|
|
char *prompt, *str;
|
|
struct termios termios_orig, termios_new;
|
|
|
|
va_start (args, prompt_fmt);
|
|
prompt = g_strdup_vprintf (prompt_fmt, args);
|
|
va_end (args);
|
|
|
|
/* Disable echoing characters */
|
|
if (!echo_on) {
|
|
tcgetattr (STDIN_FILENO, &termios_orig);
|
|
termios_new = termios_orig;
|
|
termios_new.c_lflag &= ~(ECHO);
|
|
tcsetattr (STDIN_FILENO, TCSADRAIN, &termios_new);
|
|
}
|
|
|
|
str = nmc_readline_helper (prompt);
|
|
|
|
g_free (prompt);
|
|
|
|
/* Restore original terminal settings */
|
|
if (!echo_on) {
|
|
tcsetattr (STDIN_FILENO, TCSADRAIN, &termios_orig);
|
|
/* New line - setting ECHONL | ICANON did not help */
|
|
fprintf (stdout, "\n");
|
|
}
|
|
|
|
return str;
|
|
}
|
|
|
|
/**
|
|
* nmc_rl_gen_func_basic:
|
|
* @text: text to complete
|
|
* @state: readline state; says whether start from scratch (state == 0)
|
|
* @words: strings for completion
|
|
*
|
|
* Basic function generating list of completion strings for readline.
|
|
* See e.g. http://cnswww.cns.cwru.edu/php/chet/readline/readline.html#SEC49
|
|
*/
|
|
char *
|
|
nmc_rl_gen_func_basic (const char *text, int state, const char *const*words)
|
|
{
|
|
static int list_idx, len;
|
|
const char *name;
|
|
|
|
if (!state) {
|
|
list_idx = 0;
|
|
len = strlen (text);
|
|
}
|
|
|
|
/* Return the next name which partially matches one from the 'words' list. */
|
|
while ((name = words[list_idx])) {
|
|
list_idx++;
|
|
|
|
if (strncmp (name, text, len) == 0)
|
|
return g_strdup (name);
|
|
}
|
|
return NULL;
|
|
}
|
|
|
|
char *
|
|
nmc_rl_gen_func_ifnames (const char *text, int state)
|
|
{
|
|
int i;
|
|
const GPtrArray *devices;
|
|
const char **ifnames;
|
|
char *ret;
|
|
|
|
devices = nm_client_get_devices (nm_cli.client);
|
|
if (devices->len == 0)
|
|
return NULL;
|
|
|
|
ifnames = g_new (const char *, devices->len + 1);
|
|
for (i = 0; i < devices->len; i++) {
|
|
NMDevice *dev = g_ptr_array_index (devices, i);
|
|
const char *ifname = nm_device_get_iface (dev);
|
|
ifnames[i] = ifname;
|
|
}
|
|
ifnames[i] = NULL;
|
|
|
|
ret = nmc_rl_gen_func_basic (text, state, ifnames);
|
|
|
|
g_free (ifnames);
|
|
return ret;
|
|
}
|
|
|
|
/* for pre-filling a string to readline prompt */
|
|
char *nmc_rl_pre_input_deftext;
|
|
|
|
int
|
|
nmc_rl_set_deftext (void)
|
|
{
|
|
if (nmc_rl_pre_input_deftext && rl_startup_hook) {
|
|
rl_insert_text (nmc_rl_pre_input_deftext);
|
|
g_free (nmc_rl_pre_input_deftext);
|
|
nmc_rl_pre_input_deftext = NULL;
|
|
rl_startup_hook = NULL;
|
|
}
|
|
return 0;
|
|
}
|
|
|
|
/**
|
|
* nmc_parse_lldp_capabilities:
|
|
* @value: the capabilities value
|
|
*
|
|
* Parses LLDP capabilities flags
|
|
*
|
|
* Returns: a newly allocated string containing capabilities names separated by commas.
|
|
*/
|
|
char *
|
|
nmc_parse_lldp_capabilities (guint value)
|
|
{
|
|
/* IEEE Std 802.1AB-2009 - Table 8.4 */
|
|
const char *names[] = { "other", "repeater", "mac-bridge", "wlan-access-point",
|
|
"router", "telephone", "docsis-cable-device", "station-only",
|
|
"c-vlan-component", "s-vlan-component", "tpmr" };
|
|
gboolean first = TRUE;
|
|
GString *str;
|
|
int i;
|
|
|
|
if (!value)
|
|
return g_strdup ("none");
|
|
|
|
str = g_string_new ("");
|
|
|
|
for (i = 0; i < G_N_ELEMENTS (names); i++) {
|
|
if (value & (1 << i)) {
|
|
if (!first)
|
|
g_string_append_c (str, ',');
|
|
|
|
first = FALSE;
|
|
value &= ~(1 << i);
|
|
g_string_append (str, names[i]);
|
|
}
|
|
}
|
|
|
|
if (value) {
|
|
if (!first)
|
|
g_string_append_c (str, ',');
|
|
g_string_append (str, "reserved");
|
|
}
|
|
|
|
return g_string_free (str, FALSE);
|
|
}
|
|
|
|
extern GMainLoop *loop;
|
|
|
|
static void
|
|
command_done (GObject *object, GAsyncResult *res, gpointer user_data)
|
|
{
|
|
GSimpleAsyncResult *simple = (GSimpleAsyncResult *)res;
|
|
NmCli *nmc = user_data;
|
|
GError *error = NULL;
|
|
|
|
if (g_simple_async_result_propagate_error (simple, &error)) {
|
|
nmc->return_value = error->code;
|
|
g_string_assign (nmc->return_text, error->message);
|
|
g_error_free (error);
|
|
}
|
|
|
|
if (!nmc->should_wait)
|
|
g_main_loop_quit (loop);
|
|
}
|
|
|
|
typedef struct {
|
|
NmCli *nmc;
|
|
const NMCCommand *cmd;
|
|
int argc;
|
|
char **argv;
|
|
GSimpleAsyncResult *simple;
|
|
} CmdCall;
|
|
|
|
static void
|
|
call_cmd (NmCli *nmc, GSimpleAsyncResult *simple, const NMCCommand *cmd, int argc, char **argv);
|
|
|
|
static void
|
|
got_client (GObject *source_object, GAsyncResult *res, gpointer user_data)
|
|
{
|
|
GError *error = NULL;
|
|
CmdCall *call = user_data;
|
|
NmCli *nmc = call->nmc;
|
|
|
|
nmc->should_wait--;
|
|
nmc->client = nm_client_new_finish (res, &error);
|
|
|
|
if (!nmc->client) {
|
|
g_simple_async_result_set_error (call->simple, NMCLI_ERROR, NMC_RESULT_ERROR_UNKNOWN,
|
|
_("Error: Could not create NMClient object: %s."), error->message);
|
|
g_error_free (error);
|
|
g_simple_async_result_complete (call->simple);
|
|
} else {
|
|
call_cmd (nmc, call->simple, call->cmd, call->argc, call->argv);
|
|
}
|
|
|
|
g_slice_free (CmdCall, call);
|
|
}
|
|
|
|
static void
|
|
call_cmd (NmCli *nmc, GSimpleAsyncResult *simple, const NMCCommand *cmd, int argc, char **argv)
|
|
{
|
|
CmdCall *call;
|
|
|
|
if (nmc->client || !cmd->needs_client) {
|
|
|
|
/* Check whether NetworkManager is running */
|
|
if (cmd->needs_nm_running && !nm_client_get_nm_running (nmc->client)) {
|
|
g_simple_async_result_set_error (simple, NMCLI_ERROR, NMC_RESULT_ERROR_NM_NOT_RUNNING,
|
|
_("Error: NetworkManager is not running."));
|
|
} else
|
|
nmc->return_value = cmd->func (nmc, argc, argv);
|
|
g_simple_async_result_complete_in_idle (simple);
|
|
g_object_unref (simple);
|
|
} else {
|
|
nmc->should_wait++;
|
|
call = g_slice_new0 (CmdCall);
|
|
call->nmc = nmc;
|
|
call->cmd = cmd;
|
|
call->argc = argc;
|
|
call->argv = argv;
|
|
call->simple = simple;
|
|
nm_client_new_async (NULL, got_client, call);
|
|
}
|
|
}
|
|
|
|
static void
|
|
nmc_complete_help (const char *prefix)
|
|
{
|
|
nmc_complete_strings (prefix, "help", NULL);
|
|
if (*prefix == '-')
|
|
nmc_complete_strings (prefix, "-help", "--help", NULL);
|
|
}
|
|
|
|
/**
|
|
* nmc_do_cmd:
|
|
* @nmc: Client instance
|
|
* @cmds: Command table
|
|
* @cmd: Command
|
|
* @argc: Argument count
|
|
* @argv: Arguments vector. Must be a global variable.
|
|
*
|
|
* Picks the right callback to handle command from the command table.
|
|
* If --help argument follows and the usage callback is specified for the command
|
|
* it calls the usage callback.
|
|
*
|
|
* The command table is terminated with a %NULL command. The terminating
|
|
* entry's handlers are called if the command is empty.
|
|
*
|
|
* The argument vector needs to be a pointer to the global arguments vector that is
|
|
* never freed, since the command handler will be called asynchronously and there's
|
|
* no callback to free the memory in (for simplicity).
|
|
*/
|
|
void
|
|
nmc_do_cmd (NmCli *nmc, const NMCCommand cmds[], const char *cmd, int argc, char **argv)
|
|
{
|
|
const NMCCommand *c;
|
|
GSimpleAsyncResult *simple;
|
|
|
|
simple = g_simple_async_result_new (NULL,
|
|
command_done,
|
|
nmc,
|
|
nmc_do_cmd);
|
|
|
|
if (argc == 0 && nmc->complete) {
|
|
g_simple_async_result_complete_in_idle (simple);
|
|
g_object_unref (simple);
|
|
return;
|
|
}
|
|
|
|
if (argc == 1 && nmc->complete) {
|
|
for (c = cmds; c->cmd; ++c) {
|
|
if (!*cmd || matches (cmd, c->cmd))
|
|
g_print ("%s\n", c->cmd);
|
|
}
|
|
nmc_complete_help (cmd);
|
|
g_simple_async_result_complete_in_idle (simple);
|
|
g_object_unref (simple);
|
|
return;
|
|
}
|
|
|
|
for (c = cmds; c->cmd; ++c) {
|
|
if (cmd && matches (cmd, c->cmd))
|
|
break;
|
|
}
|
|
|
|
if (c->cmd) {
|
|
/* A valid command was specified. */
|
|
if (c->usage && argc == 2 && nmc->complete)
|
|
nmc_complete_help (*(argv+1));
|
|
if (c->usage && nmc_arg_is_help (*(argv+1))) {
|
|
if (!nmc->complete)
|
|
c->usage ();
|
|
g_simple_async_result_complete_in_idle (simple);
|
|
g_object_unref (simple);
|
|
} else {
|
|
next_arg (nmc, &argc, &argv);
|
|
call_cmd (nmc, simple, c, argc, argv);
|
|
}
|
|
} else if (cmd) {
|
|
/* Not a known command. */
|
|
if (nmc_arg_is_help (cmd) && c->usage) {
|
|
c->usage ();
|
|
g_simple_async_result_complete_in_idle (simple);
|
|
g_object_unref (simple);
|
|
} else {
|
|
g_simple_async_result_set_error (simple, NMCLI_ERROR, NMC_RESULT_ERROR_USER_INPUT,
|
|
_("Error: argument '%s' not understood. Try passing --help instead."), cmd);
|
|
g_simple_async_result_complete_in_idle (simple);
|
|
g_object_unref (simple);
|
|
}
|
|
} else if (c->func) {
|
|
/* No command, run the default handler. */
|
|
call_cmd (nmc, simple, c, argc, argv);
|
|
} else {
|
|
/* No command and no default handler. */
|
|
g_simple_async_result_set_error (simple, NMCLI_ERROR, NMC_RESULT_ERROR_USER_INPUT,
|
|
_("Error: missing argument. Try passing --help."));
|
|
g_simple_async_result_complete_in_idle (simple);
|
|
g_object_unref (simple);
|
|
}
|
|
}
|
|
|
|
/**
|
|
* nmc_complete_strings:
|
|
* @prefix: a string to match
|
|
* @...: a %NULL-terminated list of candidate strings
|
|
*
|
|
* Prints all the matching candidates for completion. Useful when there's
|
|
* no better way to suggest completion other than a hardcoded string list.
|
|
*/
|
|
void
|
|
nmc_complete_strings (const char *prefix, ...)
|
|
{
|
|
va_list args;
|
|
const char *candidate;
|
|
|
|
va_start (args, prefix);
|
|
while ((candidate = va_arg (args, const char *))) {
|
|
if (!*prefix || matches (prefix, candidate))
|
|
g_print ("%s\n", candidate);
|
|
}
|
|
va_end (args);
|
|
}
|
|
|
|
/**
|
|
* nmc_complete_bool:
|
|
* @prefix: a string to match
|
|
* @...: a %NULL-terminated list of candidate strings
|
|
*
|
|
* Prints all the matching possible boolean values for completion.
|
|
*/
|
|
void
|
|
nmc_complete_bool (const char *prefix)
|
|
{
|
|
nmc_complete_strings (prefix, "true", "yes", "on",
|
|
"false", "no", "off", NULL);
|
|
}
|
|
|
|
/**
|
|
* nmc_error_get_simple_message:
|
|
* @error: a GError
|
|
*
|
|
* Returns a simplified message for some errors hard to understand.
|
|
*/
|
|
const char *
|
|
nmc_error_get_simple_message (GError *error)
|
|
{
|
|
/* Return a clear message instead of the obscure D-Bus policy error */
|
|
if (g_error_matches (error, G_DBUS_ERROR, G_DBUS_ERROR_ACCESS_DENIED))
|
|
return _("access denied");
|
|
else
|
|
return error->message;
|
|
}
|