summaryrefslogtreecommitdiff
Commit message (Collapse)AuthorAgeFilesLines
* policy: don't tear down user connections on VT switch (rh #614556)Dan Williams2010-07-141-1/+1
| | | | | | | | | PK's "allow_inactive" actually means "allow inactive *local* users", so we do want to allow inactive local users to provide user connections. We don't want to allow non-local inactive users to provide user connections. So make the use-user-connections privilege match for both active and inactive so we get the behavior we want.
* core: fix compilation on glib < 2.23.4Dan Williams2010-07-121-0/+2
| | | | Where G_FILE_MONITOR_EVENT_MOVED isn't defined yet.
* Revert "core: fix compilation on glib < 2.23.4"Dan Williams2010-07-128-266/+15
| | | | | | | This reverts commit 8a1fe31b317bd1a12ff77ce3e674977c7ee02bdd. This commit was not intended to be pushed, as it's not ready yet and isn't even my commit (thus attribution is wrong).
* po: update Spanish translation (bgo #624090)Dan Williams2010-07-121-99/+167
|
* dhcp: use ISC DHCPv4 paths now that v4 is nominally requiredMichael Biebl2010-07-091-6/+2
|
* core: fix compilation on glib < 2.23.4Dan Williams2010-07-028-15/+266
| | | | Where G_FILE_MONITOR_EVENT_MOVED isn't defined yet.
* core: better missing firmware handling when firmware appears (rh #609587)Dan Williams2010-07-015-14/+141
| | | | | | Monitor the kernel firmware directory (set at configure-time with --with-kernel-firmware-dir=<path>) for changes, and if there are any, try bringing up devices that are missing firmware.
* core: fix potential use-after-free resetting IPv6 accept_ra valueDan Williams2010-06-301-7/+7
|
* libnm-glib: fix invalid memory access during property notificationDan Williams2010-06-301-7/+12
| | | | | | | | | | | | | If an NMObject listened to property change notifications from other NMObjects and then in response to that queued up other property changes of it's own, those would get added to the property change list that was being iterated through already. Each name in the change list is freed after being notified, but the change list itself is actually freed when all properties have been notified. So an object that queues up another change notification ends up in _nm_object_queue_notify() which iterates the change list where half of the data elements are already freed...
* cli: print IPv6 stuff for 'nmcli dev list'Jiří Klimeš2010-06-291-7/+105
|
* core: simplify DHCP hostname handlingDan Williams2010-06-285-36/+47
| | | | Reduce memory usage by not duplicating the IP4 setting.
* libnm-util: ensure empty VPN secrets are not used (rh #587784)Dan Williams2010-06-281-2/+12
|
* dhcp: try /etc/dhcp too for !SUSE && !DEBIAN && !GENTOO (rh #607759)Dan Williams2010-06-281-0/+12
|
* nm-tool: print IPv6 settings in nm-toolJiří Klimeš2010-06-281-23/+77
|
* libnm-glib: fix handling of 'nameservers' property in NMIP6ConfigJiří Klimeš2010-06-283-9/+11
|
* ipv6: fix a crash when getting 'nameservers' property over D-BusJiří Klimeš2010-06-281-1/+22
| | | | dbus-send --system --print-reply --dest=org.freedesktop.NetworkManager /org/freedesktop/NetworkManager/IP6Config/0 org.freedesktop.DBus.Properties.Get string:org.freedesktop.NetworkManager string:Nameservers
* build: bump version of git master for post-0.8.1Dan Williams2010-06-271-1/+1
|
* po: update Lithuanian translation (bgo #622738)Žygimantas Beručka2010-06-261-62/+1083
|
* wifi: don't request periodic scans when connection is BSSID-locked (bgo #513820)Dan Williams2010-06-261-1/+13
| | | | | In this case the large user of periodic scanning, intra-ESS roaming, isn't used due to the specific AP lock, so don't scan periodically.
* ifcfg-rh: ensure SSIDs don't get double-quoted when written out (rh #606518)Dan Williams2010-06-252-5/+30
|
* core: fall back to current MAC address if permanent one is invalidDan Williams2010-06-242-2/+2
| | | | | | | Not all drivers will return errors when even when they don't provide the GPERMADDR ethtool call; sometimes you'll get 00:00:00:00:00:00 which is clearly not right. In this case, fall back to the current HW address just like if the ethtool GPERMADDR call failed.
* core: consolidate and clean up MAC cloning codeDan Williams2010-06-244-185/+180
| | | | | | | | | - Just use a byte array to old MAC addresses so we don't need to use .ether_addr_octet everywhere - Consolidate setting the current MAC address into one location - Make sure that if the GPERMADDR call fails we use the current MAC (this wasn't done for wired devices) - Make log messages consistent
* core: s/obtain/update for permanant HW addressDan Williams2010-06-244-7/+7
|
* vpn: ensure the IP interface passed to the dispatcher is the tunnel ifaceDan Williams2010-06-231-2/+9
| | | | | | | | priv->ip_iface gets destroyed in vpn_cleanup() when the class signal handler handles FAILED/DISCONNECTED, but the dispatcher is only called *after* that, so it gets a NULL ip_iface. Fix that so that the dispatcher always gets the tunnel interface for vpn-up and vpn-down.
* policy: add public address mappings before localhost onesDan Williams2010-06-232-20/+37
| | | | | | | | | | | | | | | | | | | | Otherwise glibc will count the localhost IPv6 (::1) mapping as resolving to the IPv4 localhost mapping as well, so this: 127.0.0.1 localhost.localdomain localhost ::1 foobar localhost6.localdomain6 localhost6 192.168.1.2 fooar causes a lookup of 'foobar' (or even just 'ping foobar') to resolve to 127.0.0.1, even though the hostname is *not* listed on the IPv4 localhost line. Apparently glibc just looks for the hostname on any IPv4 or IPv6 localhost line. We need to ensure that even if you don't have a routable IP address for one of [IPv4, IPv6] that the hostname resolves to the localhost address for that IP version, otherwise lots of stuff starts breaking. But for the IP versions that you do have a routable IP address, we want the hostname to map to that IP address too.
* dns: include domain part of hostname in resolv.conf 'searches' (rh #600407)Dan Williams2010-06-233-1/+72
| | | | | | | | Add the current domain name (from the hostname) to the searches list. The bug report is that when the hostname is set to something like 'dcbw.foobar.com' (ie an FQDN) that pinging 'dcbw' doesn't work because the resolver doesn't have anything to append to 'dcbw' when looking it up.
* trivial: fix a typo in nm-toolJiří Klimeš2010-06-231-2/+2
|
* core: remove debugging delay from new user connection handlingDan Williams2010-06-221-24/+1
| | | | | | Introduced by 25e758c77041bec8014a4f28333dd9ccd559487e when ensuring that the code that waits for connections to become advertised by teh user settings service worked correctly.
* core: MAC address spoofing/cloning (rh #447827) (bgo #553771)Jiří Klimeš2010-06-2228-128/+705
| | | | | | | | | This commit implements MAC cloning feature in NetworkManager. To support that, 'PermHwAddress' property is added into *.Device.Wired and *.Device.Wireless interfaces. The permanent MAC address is obtained when creating the device, and is used for 'locking' connections to the device. If a cloned MAC is specified in connection to be activated, the MAC is set to the interface in stage1. While disconecting, the permanent MAC is set back to the interface.
* ifcfg-rh: test case for WEP ASCII keysJiří Klimeš2010-06-226-1/+607
|
* policy: map hostname to current IP address (bgo #619931)Dan Williams2010-06-214-105/+431
| | | | | | | | | | | | Instead of always mapping the current hostname to 127.0.0.1 or whatever the user mapped it to manually, make sure the hostname maps to the default device's IPv4 and IPv6 address if there's a default device. This helps out services that do a lookup on the machine hostname to determine the IP address, which while a broken behavior (since there are too many edge-cases) is pretty wide-spread and thus we should support it.
* policy: pass default IPv4 and IPv6 addresses to hostname functionsDan Williams2010-06-175-16/+77
| | | | | | | In preparation for updating /etc/hosts to assign the current hostname to the current IP address to allow programs that (somewhat incorrectly) do DNS lookups on the machine's current hostname to find out its IP address.
* wifi: fix updating of IBSS BSSIDsDan Williams2010-06-171-2/+4
| | | | First by is OR-ed with 0x02, it won't always equal 0x02.
* ifcfg-rh: fix reading/writing ASCII WEP keysJiří Klimeš2010-06-172-5/+21
| | | | | | ifcfg-rh plugin didn't prepend 's:' prefix when writing out ASCII WEP keys. That rendered the keys file invalid. Moreover, the reading part was incorrect too not having recognized correct ASCII keys.
* libnm-glib: add IpInterface propertyDan Williams2010-06-102-0/+36
|
* core: expose device's IP interface when activatedDan Williams2010-06-105-5/+41
| | | | | Lets apps find out what the actual kernel interface name is for the device so they can do fun stuff with it.
* policy: fix possible crash when looking up hostnameDan Williams2010-06-101-1/+1
| | | | Regression in 773c006a4c9d3162e9b371762dc59fd5948e4b43
* dnsmasq: don't allow rogue config file screwing up connection sharingDan Williams2010-06-091-1/+17
| | | | | | | | dnsmasq may read from its default config file location, which if that location is a valid config file, it will combine with the options here and cause undesirable side-effects. Like sending bogus IP addresses as the gateway or whatever. So give dnsmasq a bogus config file location to avoid screwing up the configuration we're passing to it.
* core: add a multicast route entry for connections with link-local IPv4 addressJiří Klimeš2010-06-091-0/+9
|
* po: updated Brazilian Portuguese translation (bgo #620777)Henrique P. Machado2010-06-081-841/+550
|
* policy: support IPv6 address reverse-lookup for hostname tooDan Williams2010-06-083-53/+163
|
* initscript: fix RH initscript return value on double-start (rh #584321) (rh ↵Dan Williams2010-06-071-1/+1
| | | | #448393)
* core: NULL user_proxy means no user settings allowedDan Williams2010-06-041-2/+0
| | | | Which means we should return an error to the caller.
* core: remove some debugging left-oversDan Williams2010-06-041-3/+0
|
* core: don't auto-activate user connections if the user lacks permissionsDan Williams2010-06-043-4/+38
|
* core: PolicyKit protect Deactivate and DisconnectDan Williams2010-06-048-35/+438
|
* core: PolicyKit protect connection activationDan Williams2010-06-031-176/+276
|
* core: add nm_auth_uid_authorized() to check user permissionsDan Williams2010-06-032-0/+67
| | | | Basically cleaned up is_user_request_authorized() from nm-manager.c.
* core: check permissions on the user settings service tooDan Williams2010-06-033-53/+219
| | | | | And if the permissions change, make sure we allow or deny user settings connections as appropriate.
* core: use return_no_pk_error() more and fix returned error messagesDan Williams2010-06-021-13/+3
|