| Commit message (Collapse) | Author | Age | Files | Lines |
|
|
|
|
|
|
|
|
| |
PK's "allow_inactive" actually means "allow inactive *local* users", so
we do want to allow inactive local users to provide user connections.
We don't want to allow non-local inactive users to provide user connections.
So make the use-user-connections privilege match for both active and
inactive so we get the behavior we want.
|
|
|
|
| |
Where G_FILE_MONITOR_EVENT_MOVED isn't defined yet.
|
|
|
|
|
|
|
| |
This reverts commit 8a1fe31b317bd1a12ff77ce3e674977c7ee02bdd.
This commit was not intended to be pushed, as it's not ready yet
and isn't even my commit (thus attribution is wrong).
|
| |
|
| |
|
|
|
|
| |
Where G_FILE_MONITOR_EVENT_MOVED isn't defined yet.
|
|
|
|
|
|
| |
Monitor the kernel firmware directory (set at configure-time with
--with-kernel-firmware-dir=<path>) for changes, and if there
are any, try bringing up devices that are missing firmware.
|
| |
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
If an NMObject listened to property change notifications from
other NMObjects and then in response to that queued up other
property changes of it's own, those would get added to the
property change list that was being iterated through already.
Each name in the change list is freed after being notified,
but the change list itself is actually freed when all
properties have been notified. So an object that queues up
another change notification ends up in _nm_object_queue_notify()
which iterates the change list where half of the data elements
are already freed...
|
| |
|
|
|
|
| |
Reduce memory usage by not duplicating the IP4 setting.
|
| |
|
| |
|
| |
|
| |
|
|
|
|
| |
dbus-send --system --print-reply --dest=org.freedesktop.NetworkManager /org/freedesktop/NetworkManager/IP6Config/0 org.freedesktop.DBus.Properties.Get string:org.freedesktop.NetworkManager string:Nameservers
|
| |
|
| |
|
|
|
|
|
| |
In this case the large user of periodic scanning, intra-ESS roaming,
isn't used due to the specific AP lock, so don't scan periodically.
|
| |
|
|
|
|
|
|
|
| |
Not all drivers will return errors when even when they don't provide
the GPERMADDR ethtool call; sometimes you'll get 00:00:00:00:00:00
which is clearly not right. In this case, fall back to the current
HW address just like if the ethtool GPERMADDR call failed.
|
|
|
|
|
|
|
|
|
| |
- Just use a byte array to old MAC addresses so we don't need to
use .ether_addr_octet everywhere
- Consolidate setting the current MAC address into one location
- Make sure that if the GPERMADDR call fails we use the current MAC
(this wasn't done for wired devices)
- Make log messages consistent
|
| |
|
|
|
|
|
|
|
|
| |
priv->ip_iface gets destroyed in vpn_cleanup() when the class
signal handler handles FAILED/DISCONNECTED, but the dispatcher
is only called *after* that, so it gets a NULL ip_iface. Fix that
so that the dispatcher always gets the tunnel interface for
vpn-up and vpn-down.
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
Otherwise glibc will count the localhost IPv6 (::1) mapping as
resolving to the IPv4 localhost mapping as well, so this:
127.0.0.1 localhost.localdomain localhost
::1 foobar localhost6.localdomain6 localhost6
192.168.1.2 fooar
causes a lookup of 'foobar' (or even just 'ping foobar') to resolve
to 127.0.0.1, even though the hostname is *not* listed on the
IPv4 localhost line. Apparently glibc just looks for the hostname
on any IPv4 or IPv6 localhost line.
We need to ensure that even if you don't have a routable IP address
for one of [IPv4, IPv6] that the hostname resolves to the localhost
address for that IP version, otherwise lots of stuff starts
breaking. But for the IP versions that you do have a routable IP
address, we want the hostname to map to that IP address too.
|
|
|
|
|
|
|
|
| |
Add the current domain name (from the hostname) to the searches list.
The bug report is that when the hostname is set to something like
'dcbw.foobar.com' (ie an FQDN) that pinging 'dcbw' doesn't work
because the resolver doesn't have anything to append to 'dcbw' when
looking it up.
|
| |
|
|
|
|
|
|
| |
Introduced by 25e758c77041bec8014a4f28333dd9ccd559487e when ensuring
that the code that waits for connections to become advertised by teh
user settings service worked correctly.
|
|
|
|
|
|
|
|
|
| |
This commit implements MAC cloning feature in NetworkManager. To support that,
'PermHwAddress' property is added into *.Device.Wired and *.Device.Wireless
interfaces. The permanent MAC address is obtained when creating the device, and
is used for 'locking' connections to the device. If a cloned MAC is specified
in connection to be activated, the MAC is set to the interface in stage1. While
disconecting, the permanent MAC is set back to the interface.
|
| |
|
|
|
|
|
|
|
|
|
|
|
|
| |
Instead of always mapping the current hostname to 127.0.0.1 or
whatever the user mapped it to manually, make sure the hostname
maps to the default device's IPv4 and IPv6 address if there's
a default device.
This helps out services that do a lookup on the machine hostname
to determine the IP address, which while a broken behavior (since
there are too many edge-cases) is pretty wide-spread and thus
we should support it.
|
|
|
|
|
|
|
| |
In preparation for updating /etc/hosts to assign the current hostname
to the current IP address to allow programs that (somewhat incorrectly)
do DNS lookups on the machine's current hostname to find out its
IP address.
|
|
|
|
| |
First by is OR-ed with 0x02, it won't always equal 0x02.
|
|
|
|
|
|
| |
ifcfg-rh plugin didn't prepend 's:' prefix when writing out ASCII WEP
keys. That rendered the keys file invalid. Moreover, the reading part
was incorrect too not having recognized correct ASCII keys.
|
| |
|
|
|
|
|
| |
Lets apps find out what the actual kernel interface name is for the
device so they can do fun stuff with it.
|
|
|
|
| |
Regression in 773c006a4c9d3162e9b371762dc59fd5948e4b43
|
|
|
|
|
|
|
|
| |
dnsmasq may read from its default config file location, which if that
location is a valid config file, it will combine with the options here
and cause undesirable side-effects. Like sending bogus IP addresses
as the gateway or whatever. So give dnsmasq a bogus config file
location to avoid screwing up the configuration we're passing to it.
|
| |
|
| |
|
| |
|
|
|
|
| |
#448393)
|
|
|
|
| |
Which means we should return an error to the caller.
|
| |
|
| |
|
| |
|
| |
|
|
|
|
| |
Basically cleaned up is_user_request_authorized() from nm-manager.c.
|
|
|
|
|
| |
And if the permissions change, make sure we allow or deny user
settings connections as appropriate.
|
| |
|