/* -*- Mode: C; tab-width: 4; indent-tabs-mode: t; c-basic-offset: 4 -*- */ /* NetworkManager -- Network link manager * * This program is free software; you can redistribute it and/or modify * it under the terms of the GNU General Public License as published by * the Free Software Foundation; either version 2 of the License, or * (at your option) any later version. * * This program is distributed in the hope that it will be useful, * but WITHOUT ANY WARRANTY; without even the implied warranty of * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the * GNU General Public License for more details. * * You should have received a copy of the GNU General Public License along * with this program; if not, write to the Free Software Foundation, Inc., * 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA. * * Copyright (C) 2007 - 2009 Novell, Inc. * Copyright (C) 2007 - 2012 Red Hat, Inc. */ #include #include #include #include #include #include #include #include #include #include #include #include #include #include "nm-glib-compat.h" #include "nm-manager.h" #include "nm-logging.h" #include "nm-dbus-manager.h" #include "nm-vpn-manager.h" #include "nm-device.h" #include "nm-device-ethernet.h" #include "nm-device-wifi.h" #include "nm-device-olpc-mesh.h" #include "nm-device-infiniband.h" #include "nm-device-bond.h" #include "nm-device-team.h" #include "nm-device-bridge.h" #include "nm-device-vlan.h" #include "nm-device-generic.h" #include "nm-device-veth.h" #include "nm-device-tun.h" #include "nm-device-macvlan.h" #include "nm-device-vxlan.h" #include "nm-device-gre.h" #include "nm-setting-connection.h" #include "nm-setting-wireless.h" #include "nm-setting-vpn.h" #include "nm-dbus-glib-types.h" #include "nm-platform.h" #include "nm-rfkill-manager.h" #include "nm-hostname-provider.h" #include "nm-settings.h" #include "nm-settings-connection.h" #include "nm-manager-auth.h" #include "NetworkManagerUtils.h" #include "nm-utils.h" #include "nm-device-factory.h" #include "nm-enum-types.h" #include "nm-sleep-monitor.h" #include "nm-connectivity.h" #include "nm-policy.h" #define NM_AUTOIP_DBUS_SERVICE "org.freedesktop.nm_avahi_autoipd" #define NM_AUTOIP_DBUS_IFACE "org.freedesktop.nm_avahi_autoipd" static gboolean impl_manager_get_devices (NMManager *manager, GPtrArray **devices, GError **err); static gboolean impl_manager_get_device_by_ip_iface (NMManager *self, const char *iface, char **out_object_path, GError **error); static void impl_manager_activate_connection (NMManager *manager, const char *connection_path, const char *device_path, const char *specific_object_path, DBusGMethodInvocation *context); static void impl_manager_add_and_activate_connection (NMManager *manager, GHashTable *settings, const char *device_path, const char *specific_object_path, DBusGMethodInvocation *context); static void impl_manager_deactivate_connection (NMManager *manager, const char *connection_path, DBusGMethodInvocation *context); static void impl_manager_sleep (NMManager *manager, gboolean do_sleep, DBusGMethodInvocation *context); static void impl_manager_enable (NMManager *manager, gboolean enable, DBusGMethodInvocation *context); static void impl_manager_get_permissions (NMManager *manager, DBusGMethodInvocation *context); static gboolean impl_manager_get_state (NMManager *manager, guint32 *state, GError **error); static void impl_manager_set_logging (NMManager *manager, const char *level, const char *domains, DBusGMethodInvocation *context); static void impl_manager_get_logging (NMManager *manager, char **level, char **domains); static void impl_manager_check_connectivity (NMManager *manager, DBusGMethodInvocation *context); #include "nm-manager-glue.h" static void add_device (NMManager *self, NMDevice *device, gboolean generate_con); static void remove_device (NMManager *self, NMDevice *device, gboolean quitting); static void hostname_provider_init (NMHostnameProvider *provider_class); static NMActiveConnection *_new_active_connection (NMManager *self, NMConnection *connection, const char *specific_object, NMDevice *device, NMAuthSubject *subject, GError **error); static void policy_activating_device_changed (GObject *object, GParamSpec *pspec, gpointer user_data); static NMDevice *find_device_by_ip_iface (NMManager *self, const gchar *iface); static void rfkill_change_wifi (const char *desc, gboolean enabled); static void platform_link_added_cb (NMPlatform *platform, int ifindex, NMPlatformLink *plink, NMPlatformReason reason, gpointer user_data); static gboolean find_master (NMManager *self, NMConnection *connection, NMDevice *device, NMConnection **out_master_connection, NMDevice **out_master_device, NMActiveConnection **out_master_ac, GError **error); static void nm_manager_update_state (NMManager *manager); #define SSD_POKE_INTERVAL 120 #define ORIGDEV_TAG "originating-device" typedef struct { gboolean user_enabled; gboolean daemon_enabled; gboolean sw_enabled; gboolean hw_enabled; RfKillType rtype; const char *desc; const char *key; const char *prop; const char *hw_prop; RfKillState (*other_enabled_func) (NMManager *); RfKillState (*daemon_enabled_func) (NMManager *); } RadioState; typedef struct { char *state_file; GSList *active_connections; guint ac_cleanup_id; NMActiveConnection *primary_connection; NMActiveConnection *activating_connection; GSList *devices; NMState state; NMConnectivity *connectivity; NMPolicy *policy; NMDBusManager *dbus_mgr; gboolean prop_filter_added; NMRfkillManager *rfkill_mgr; /* List of NMDeviceFactoryFunc pointers sorted in priority order */ GSList *factories; NMSettings *settings; char *hostname; RadioState radio_states[RFKILL_TYPE_MAX]; gboolean sleeping; gboolean net_enabled; NMVPNManager *vpn_manager; DBusGProxy *aipd_proxy; NMSleepMonitor *sleep_monitor; GSList *auth_chains; /* Firmware dir monitor */ GFileMonitor *fw_monitor; guint fw_changed_id; guint timestamp_update_id; gboolean startup; } NMManagerPrivate; #define NM_MANAGER_GET_PRIVATE(o) (G_TYPE_INSTANCE_GET_PRIVATE ((o), NM_TYPE_MANAGER, NMManagerPrivate)) G_DEFINE_TYPE_EXTENDED (NMManager, nm_manager, G_TYPE_OBJECT, 0, G_IMPLEMENT_INTERFACE (NM_TYPE_HOSTNAME_PROVIDER, hostname_provider_init)) enum { DEVICE_ADDED, DEVICE_REMOVED, STATE_CHANGED, CHECK_PERMISSIONS, USER_PERMISSIONS_CHANGED, ACTIVE_CONNECTION_ADDED, ACTIVE_CONNECTION_REMOVED, LAST_SIGNAL }; static guint signals[LAST_SIGNAL] = { 0 }; enum { PROP_0, PROP_VERSION, PROP_STATE, PROP_STARTUP, PROP_NETWORKING_ENABLED, PROP_WIRELESS_ENABLED, PROP_WIRELESS_HARDWARE_ENABLED, PROP_WWAN_ENABLED, PROP_WWAN_HARDWARE_ENABLED, PROP_WIMAX_ENABLED, PROP_WIMAX_HARDWARE_ENABLED, PROP_ACTIVE_CONNECTIONS, PROP_CONNECTIVITY, PROP_PRIMARY_CONNECTION, PROP_ACTIVATING_CONNECTION, PROP_DEVICES, /* Not exported */ PROP_HOSTNAME, PROP_SLEEPING, LAST_PROP }; /************************************************************************/ #define NM_MANAGER_ERROR (nm_manager_error_quark ()) static GQuark nm_manager_error_quark (void) { static GQuark quark = 0; if (!quark) quark = g_quark_from_static_string ("nm-manager-error"); return quark; } /************************************************************************/ static void active_connection_state_changed (NMActiveConnection *active, GParamSpec *pspec, NMManager *self); /* Returns: whether to notify D-Bus of the removal or not */ static gboolean active_connection_remove (NMManager *self, NMActiveConnection *active) { NMManagerPrivate *priv = NM_MANAGER_GET_PRIVATE (self); gboolean notify = !!nm_active_connection_get_path (active); GSList *found; /* FIXME: switch to a GList for faster removal */ found = g_slist_find (priv->active_connections, active); if (found) { priv->active_connections = g_slist_remove (priv->active_connections, active); g_signal_emit (self, signals[ACTIVE_CONNECTION_REMOVED], 0, active); g_signal_handlers_disconnect_by_func (active, active_connection_state_changed, self); g_object_unref (active); } return found && notify; } static gboolean _active_connection_cleanup (gpointer user_data) { NMManager *self = NM_MANAGER (user_data); NMManagerPrivate *priv = NM_MANAGER_GET_PRIVATE (self); GSList *iter; priv->ac_cleanup_id = 0; g_object_freeze_notify (G_OBJECT (self)); iter = priv->active_connections; while (iter) { NMActiveConnection *ac = iter->data; iter = iter->next; if (nm_active_connection_get_state (ac) == NM_ACTIVE_CONNECTION_STATE_DEACTIVATED) { if (active_connection_remove (self, ac)) g_object_notify (G_OBJECT (self), NM_MANAGER_ACTIVE_CONNECTIONS); } } g_object_thaw_notify (G_OBJECT (self)); return FALSE; } static void active_connection_state_changed (NMActiveConnection *active, GParamSpec *pspec, NMManager *self) { NMManagerPrivate *priv = NM_MANAGER_GET_PRIVATE (self); NMActiveConnectionState state; state = nm_active_connection_get_state (active); if (state == NM_ACTIVE_CONNECTION_STATE_DEACTIVATED) { /* Destroy active connections from an idle handler to ensure that * their last property change notifications go out, which wouldn't * happen if we destroyed them immediately when their state was set * to DEACTIVATED. */ if (!priv->ac_cleanup_id) priv->ac_cleanup_id = g_idle_add (_active_connection_cleanup, self); } nm_manager_update_state (self); } /** * active_connection_add(): * @self: the #NMManager * @active: the #NMActiveConnection to manage * * Begins to track and manage @active. Increases the refcount of @active. */ static void active_connection_add (NMManager *self, NMActiveConnection *active) { NMManagerPrivate *priv = NM_MANAGER_GET_PRIVATE (self); g_return_if_fail (g_slist_find (priv->active_connections, active) == FALSE); priv->active_connections = g_slist_prepend (priv->active_connections, g_object_ref (active)); g_signal_connect (active, "notify::" NM_ACTIVE_CONNECTION_STATE, G_CALLBACK (active_connection_state_changed), self); g_signal_emit (self, signals[ACTIVE_CONNECTION_ADDED], 0, active); /* Only notify D-Bus if the active connection is actually exported */ if (nm_active_connection_get_path (active)) g_object_notify (G_OBJECT (self), NM_MANAGER_ACTIVE_CONNECTIONS); } const GSList * nm_manager_get_active_connections (NMManager *manager) { return NM_MANAGER_GET_PRIVATE (manager)->active_connections; } static NMActiveConnection * find_ac_for_connection (NMManager *manager, NMConnection *connection) { NMManagerPrivate *priv = NM_MANAGER_GET_PRIVATE (manager); GSList *iter; NMActiveConnection *ac; NMConnection *ac_connection; NMActiveConnectionState ac_state; const char *uuid; uuid = nm_connection_get_uuid (connection); for (iter = priv->active_connections; iter; iter = iter->next) { ac = iter->data; ac_connection = nm_active_connection_get_connection (ac); ac_state = nm_active_connection_get_state (ac); if ( !strcmp (nm_connection_get_uuid (ac_connection), uuid) && (ac_state < NM_ACTIVE_CONNECTION_STATE_DEACTIVATED)) return ac; } return NULL; } /* Filter out connections that are already active. * nm_settings_get_connections() returns sorted list. We need to preserve the * order so that we didn't change auto-activation order (recent timestamps * are first). * Caller is responsible for freeing the returned list with g_slist_free(). */ GSList * nm_manager_get_activatable_connections (NMManager *manager) { NMManagerPrivate *priv = NM_MANAGER_GET_PRIVATE (manager); GSList *all_connections = nm_settings_get_connections (priv->settings); GSList *connections = NULL, *iter; NMConnection *connection; for (iter = all_connections; iter; iter = iter->next) { connection = iter->data; if (!find_ac_for_connection (manager, connection)) connections = g_slist_prepend (connections, connection); } g_slist_free (all_connections); return g_slist_reverse (connections); } static NMActiveConnection * active_connection_get_by_path (NMManager *manager, const char *path) { NMManagerPrivate *priv = NM_MANAGER_GET_PRIVATE (manager); GSList *iter; g_return_val_if_fail (manager != NULL, NULL); g_return_val_if_fail (path != NULL, NULL); for (iter = priv->active_connections; iter; iter = g_slist_next (iter)) { NMActiveConnection *candidate = iter->data; if (g_strcmp0 (path, nm_active_connection_get_path (candidate)) == 0) return candidate; } return NULL; } /************************************************************************/ static NMDevice * nm_manager_get_device_by_udi (NMManager *manager, const char *udi) { GSList *iter; g_return_val_if_fail (udi != NULL, NULL); for (iter = NM_MANAGER_GET_PRIVATE (manager)->devices; iter; iter = iter->next) { if (!strcmp (nm_device_get_udi (NM_DEVICE (iter->data)), udi)) return NM_DEVICE (iter->data); } return NULL; } static NMDevice * nm_manager_get_device_by_path (NMManager *manager, const char *path) { GSList *iter; g_return_val_if_fail (path != NULL, NULL); for (iter = NM_MANAGER_GET_PRIVATE (manager)->devices; iter; iter = iter->next) { if (!strcmp (nm_device_get_path (NM_DEVICE (iter->data)), path)) return NM_DEVICE (iter->data); } return NULL; } NMDevice * nm_manager_get_device_by_master (NMManager *manager, const char *master, const char *driver) { GSList *iter; g_return_val_if_fail (master != NULL, NULL); for (iter = NM_MANAGER_GET_PRIVATE (manager)->devices; iter; iter = iter->next) { NMDevice *device = NM_DEVICE (iter->data); if (!strcmp (nm_device_get_iface (device), master) && (!driver || !strcmp (nm_device_get_driver (device), driver))) return device; } return NULL; } NMDevice * nm_manager_get_device_by_ifindex (NMManager *manager, int ifindex) { GSList *iter; for (iter = NM_MANAGER_GET_PRIVATE (manager)->devices; iter; iter = iter->next) { NMDevice *device = NM_DEVICE (iter->data); if (nm_device_get_ifindex (device) == ifindex) return device; } return NULL; } static gboolean manager_sleeping (NMManager *self) { NMManagerPrivate *priv = NM_MANAGER_GET_PRIVATE (self); if (priv->sleeping || !priv->net_enabled) return TRUE; return FALSE; } static void set_state (NMManager *manager, NMState state) { NMManagerPrivate *priv = NM_MANAGER_GET_PRIVATE (manager); const char *state_str; if (priv->state == state) return; priv->state = state; switch (state) { case NM_STATE_ASLEEP: state_str = "ASLEEP"; break; case NM_STATE_DISCONNECTED: state_str = "DISCONNECTED"; break; case NM_STATE_DISCONNECTING: state_str = "DISCONNECTING"; break; case NM_STATE_CONNECTING: state_str = "CONNECTING"; break; case NM_STATE_CONNECTED_LOCAL: state_str = "CONNECTED_LOCAL"; break; case NM_STATE_CONNECTED_SITE: state_str = "CONNECTED_SITE"; break; case NM_STATE_CONNECTED_GLOBAL: state_str = "CONNECTED_GLOBAL"; break; case NM_STATE_UNKNOWN: default: state_str = "UNKNOWN"; break; } nm_log_info (LOGD_CORE, "NetworkManager state is now %s", state_str); g_object_notify (G_OBJECT (manager), NM_MANAGER_STATE); g_signal_emit (manager, signals[STATE_CHANGED], 0, priv->state); } static void checked_connectivity (GObject *object, GAsyncResult *result, gpointer user_data) { NMManager *manager = user_data; NMManagerPrivate *priv = NM_MANAGER_GET_PRIVATE (manager); NMConnectivityState connectivity; if (priv->state == NM_STATE_CONNECTING || priv->state == NM_STATE_CONNECTED_SITE) { connectivity = nm_connectivity_check_finish (priv->connectivity, result, NULL); if (connectivity == NM_CONNECTIVITY_FULL) set_state (manager, NM_STATE_CONNECTED_GLOBAL); else if ( connectivity == NM_CONNECTIVITY_PORTAL || connectivity == NM_CONNECTIVITY_LIMITED) set_state (manager, NM_STATE_CONNECTED_SITE); g_object_notify (G_OBJECT (manager), NM_MANAGER_CONNECTIVITY); } g_object_unref (manager); } static NMState find_best_device_state (NMManager *manager, gboolean *want_connectivity_check) { NMManagerPrivate *priv = NM_MANAGER_GET_PRIVATE (manager); NMState best_state = NM_STATE_DISCONNECTED; GSList *iter; for (iter = priv->active_connections; iter; iter = iter->next) { NMActiveConnection *ac = NM_ACTIVE_CONNECTION (iter->data); NMActiveConnectionState ac_state = nm_active_connection_get_state (ac); switch (ac_state) { case NM_ACTIVE_CONNECTION_STATE_ACTIVATED: if ( nm_active_connection_get_default (ac) || nm_active_connection_get_default6 (ac)) { nm_connectivity_set_online (priv->connectivity, TRUE); if (nm_connectivity_get_state (priv->connectivity) == NM_CONNECTIVITY_FULL) { *want_connectivity_check = FALSE; return NM_STATE_CONNECTED_GLOBAL; } best_state = NM_STATE_CONNECTING; *want_connectivity_check = TRUE; } else { if (best_state < NM_STATE_CONNECTING) best_state = NM_STATE_CONNECTED_LOCAL; } break; case NM_ACTIVE_CONNECTION_STATE_ACTIVATING: if (!nm_active_connection_get_assumed (ac)) { if (best_state != NM_STATE_CONNECTED_GLOBAL) best_state = NM_STATE_CONNECTING; } break; case NM_ACTIVE_CONNECTION_STATE_DEACTIVATING: if (!nm_active_connection_get_assumed (ac)) { if (best_state < NM_STATE_DISCONNECTING) best_state = NM_STATE_DISCONNECTING; } break; default: break; } } return best_state; } static void nm_manager_update_state (NMManager *manager) { NMManagerPrivate *priv; NMState new_state = NM_STATE_DISCONNECTED; gboolean want_connectivity_check = FALSE; g_return_if_fail (NM_IS_MANAGER (manager)); priv = NM_MANAGER_GET_PRIVATE (manager); if (manager_sleeping (manager)) new_state = NM_STATE_ASLEEP; else new_state = find_best_device_state (manager, &want_connectivity_check); if (new_state == NM_STATE_CONNECTING && want_connectivity_check) { nm_connectivity_check_async (priv->connectivity, checked_connectivity, g_object_ref (manager)); return; } nm_connectivity_set_online (priv->connectivity, new_state >= NM_STATE_CONNECTED_LOCAL); set_state (manager, new_state); } static void manager_device_state_changed (NMDevice *device, NMDeviceState new_state, NMDeviceState old_state, NMDeviceStateReason reason, gpointer user_data) { NMManager *self = NM_MANAGER (user_data); switch (new_state) { case NM_DEVICE_STATE_UNMANAGED: case NM_DEVICE_STATE_UNAVAILABLE: case NM_DEVICE_STATE_DISCONNECTED: case NM_DEVICE_STATE_PREPARE: case NM_DEVICE_STATE_FAILED: g_object_notify (G_OBJECT (self), NM_MANAGER_ACTIVE_CONNECTIONS); break; default: break; } } static void device_has_pending_action_changed (NMDevice *device, GParamSpec *pspec, NMManager *self); static void check_if_startup_complete (NMManager *self) { NMManagerPrivate *priv = NM_MANAGER_GET_PRIVATE (self); GSList *iter; if (!priv->startup) return; for (iter = priv->devices; iter; iter = iter->next) { NMDevice *dev = iter->data; if (nm_device_has_pending_action (dev)) { nm_log_dbg (LOGD_CORE, "check_if_startup_complete returns FALSE because of %s", nm_device_get_iface (dev)); return; } } nm_log_info (LOGD_CORE, "startup complete"); priv->startup = FALSE; g_object_notify (G_OBJECT (self), "startup"); /* We don't have to watch notify::has-pending-action any more. */ for (iter = priv->devices; iter; iter = iter->next) { NMDevice *dev = iter->data; g_signal_handlers_disconnect_by_func (dev, G_CALLBACK (device_has_pending_action_changed), self); } } static void device_has_pending_action_changed (NMDevice *device, GParamSpec *pspec, NMManager *self) { check_if_startup_complete (self); } static void remove_device (NMManager *manager, NMDevice *device, gboolean quitting) { NMManagerPrivate *priv = NM_MANAGER_GET_PRIVATE (manager); if (nm_device_get_managed (device)) { /* Leave configured interfaces up when quitting so they can be * taken over again if NM starts up, and to ensure connectivity while * NM is gone. Assumed connections don't get taken down even if they * haven't been fully activated. */ if ( !nm_device_can_assume_connections (device) || (nm_device_get_state (device) != NM_DEVICE_STATE_ACTIVATED) || !quitting) { NMActRequest *req = nm_device_get_act_request (device); if (!req || !nm_active_connection_get_assumed (NM_ACTIVE_CONNECTION (req))) nm_device_set_managed (device, NM_MANAGED_INTERNAL, FALSE, NM_DEVICE_STATE_REASON_REMOVED); } } g_signal_handlers_disconnect_matched (device, G_SIGNAL_MATCH_DATA, 0, 0, NULL, NULL, manager); nm_settings_device_removed (priv->settings, device, quitting); priv->devices = g_slist_remove (priv->devices, device); g_signal_emit (manager, signals[DEVICE_REMOVED], 0, device); g_object_notify (G_OBJECT (manager), NM_MANAGER_DEVICES); g_object_unref (device); if (priv->startup) check_if_startup_complete (manager); } static void device_removed_cb (NMDevice *device, gpointer user_data) { remove_device (NM_MANAGER (user_data), device, FALSE); } static void aipd_handle_event (DBusGProxy *proxy, const char *event, const char *iface, const char *address, gpointer user_data) { NMManager *manager = NM_MANAGER (user_data); NMManagerPrivate *priv = NM_MANAGER_GET_PRIVATE (manager); GSList *iter; gboolean handled = FALSE; if (!event || !iface) { nm_log_warn (LOGD_AUTOIP4, "incomplete message received from avahi-autoipd"); return; } if ( (strcmp (event, "BIND") != 0) && (strcmp (event, "CONFLICT") != 0) && (strcmp (event, "UNBIND") != 0) && (strcmp (event, "STOP") != 0)) { nm_log_warn (LOGD_AUTOIP4, "unknown event '%s' received from avahi-autoipd", event); return; } for (iter = priv->devices; iter; iter = g_slist_next (iter)) { NMDevice *candidate = NM_DEVICE (iter->data); if (!strcmp (nm_device_get_iface (candidate), iface)) { nm_device_handle_autoip4_event (candidate, event, address); handled = TRUE; break; } } if (!handled) nm_log_warn (LOGD_AUTOIP4, "(%s): unhandled avahi-autoipd event", iface); } static const char * hostname_provider_get_hostname (NMHostnameProvider *provider) { return NM_MANAGER_GET_PRIVATE (provider)->hostname; } static void hostname_provider_init (NMHostnameProvider *provider_class) { provider_class->get_hostname = hostname_provider_get_hostname; } NMState nm_manager_get_state (NMManager *manager) { g_return_val_if_fail (NM_IS_MANAGER (manager), NM_STATE_UNKNOWN); return NM_MANAGER_GET_PRIVATE (manager)->state; } /*******************************************************************/ /* Settings stuff via NMSettings */ /*******************************************************************/ static NMDevice * get_device_from_hwaddr (NMManager *self, const GByteArray *setting_mac) { NMManagerPrivate *priv = NM_MANAGER_GET_PRIVATE (self); const guint8 *device_mac; guint device_mac_len; GSList *iter; if (!setting_mac) return NULL; for (iter = priv->devices; iter; iter = g_slist_next (iter)) { NMDevice *device = iter->data; device_mac = nm_device_get_hw_address (iter->data, &device_mac_len); if ( setting_mac->len == device_mac_len && memcmp (setting_mac->data, device_mac, device_mac_len) == 0) return device; } return NULL; } static NMDevice * find_vlan_parent (NMManager *self, NMConnection *connection) { NMManagerPrivate *priv = NM_MANAGER_GET_PRIVATE (self); NMSettingVlan *s_vlan; NMSettingWired *s_wired; NMConnection *parent_connection; const char *parent_iface; NMDevice *parent = NULL; const GByteArray *setting_mac; GSList *iter; /* The 'parent' property could be given by an interface name, a * connection UUID, or the MAC address of an NMSettingWired. */ s_vlan = nm_connection_get_setting_vlan (connection); g_return_val_if_fail (s_vlan != NULL, NULL); s_wired = nm_connection_get_setting_wired (connection); setting_mac = s_wired ? nm_setting_wired_get_mac_address (s_wired) : NULL; parent_iface = nm_setting_vlan_get_parent (s_vlan); if (parent_iface) { parent = find_device_by_ip_iface (self, parent_iface); if (parent) return parent; if (nm_utils_is_uuid (parent_iface)) { /* Try as a connection UUID */ parent_connection = (NMConnection *) nm_settings_get_connection_by_uuid (priv->settings, parent_iface); if (parent_connection) { /* Check if the parent connection is activated on some device already */ for (iter = priv->devices; iter; iter = g_slist_next (iter)) { NMActRequest *req; NMConnection *candidate; req = nm_device_get_act_request (NM_DEVICE (iter->data)); if (req) { candidate = nm_active_connection_get_connection (NM_ACTIVE_CONNECTION (req)); if (candidate == parent_connection) return NM_DEVICE (iter->data); } } /* Check the hardware address of the parent connection */ return get_device_from_hwaddr (self, setting_mac); } return NULL; } } /* Try the hardware address from the VLAN connection's hardware setting */ return get_device_from_hwaddr (self, setting_mac); } static NMDevice * find_infiniband_parent (NMManager *self, NMConnection *connection) { NMSettingInfiniband *s_infiniband; const char *parent_iface; NMDevice *parent = NULL; const GByteArray *setting_mac; s_infiniband = nm_connection_get_setting_infiniband (connection); g_return_val_if_fail (s_infiniband != NULL, NULL); parent_iface = nm_setting_infiniband_get_parent (s_infiniband); if (parent_iface) { parent = find_device_by_ip_iface (self, parent_iface); if (parent) return parent; } setting_mac = nm_setting_infiniband_get_mac_address (s_infiniband); return get_device_from_hwaddr (self, setting_mac); } /** * get_virtual_iface_name: * @self: the #NMManager * @connection: the #NMConnection representing a virtual interface * @out_parent: on success, the parent device if any * * Given @connection, returns the interface name that the connection * would represent. If the interface name is not given by the connection, * this may require constructing it based on information in the connection * and existing network interfaces. * * Returns: the expected interface name (caller takes ownership), or %NULL */ static char * get_virtual_iface_name (NMManager *self, NMConnection *connection, NMDevice **out_parent) { NMDevice *parent = NULL; if (out_parent) *out_parent = NULL; if (nm_connection_is_type (connection, NM_SETTING_BOND_SETTING_NAME)) return g_strdup (nm_connection_get_virtual_iface_name (connection)); if (nm_connection_is_type (connection, NM_SETTING_TEAM_SETTING_NAME)) return g_strdup (nm_connection_get_virtual_iface_name (connection)); if (nm_connection_is_type (connection, NM_SETTING_BRIDGE_SETTING_NAME)) return g_strdup (nm_connection_get_virtual_iface_name (connection)); if (nm_connection_is_type (connection, NM_SETTING_VLAN_SETTING_NAME)) { NMSettingVlan *s_vlan; const char *ifname; char *vname; s_vlan = nm_connection_get_setting_vlan (connection); g_return_val_if_fail (s_vlan != NULL, NULL); parent = find_vlan_parent (self, connection); if (parent) { ifname = nm_connection_get_virtual_iface_name (connection); if (!nm_device_supports_vlans (parent)) { nm_log_warn (LOGD_DEVICE, "(%s): No support for VLANs on interface %s of type %s", ifname ? ifname : nm_connection_get_id (connection), nm_device_get_ip_iface (parent), nm_device_get_type_desc (parent)); return NULL; } /* If the connection doesn't specify the interface name for the VLAN * device, we create one for it using the VLAN ID and the parent * interface's name. */ if (ifname) vname = g_strdup (ifname); else { vname = nm_utils_new_vlan_name (nm_device_get_ip_iface (parent), nm_setting_vlan_get_id (s_vlan)); } if (out_parent) *out_parent = parent; return vname; } } if (nm_connection_is_type (connection, NM_SETTING_INFINIBAND_SETTING_NAME)) { const char *ifname; char *name; parent = find_infiniband_parent (self, connection); if (parent) { ifname = nm_connection_get_virtual_iface_name (connection); if (ifname) name = g_strdup (ifname); else { NMSettingInfiniband *s_infiniband; int p_key; ifname = nm_device_get_iface (parent); s_infiniband = nm_connection_get_setting_infiniband (connection); p_key = nm_setting_infiniband_get_p_key (s_infiniband); name = g_strdup_printf ("%s.%04x", ifname, p_key); } if (out_parent) *out_parent = parent; return name; } } return NULL; } static gboolean connection_needs_virtual_device (NMConnection *connection) { if ( nm_connection_is_type (connection, NM_SETTING_BOND_SETTING_NAME) || nm_connection_is_type (connection, NM_SETTING_TEAM_SETTING_NAME) || nm_connection_is_type (connection, NM_SETTING_BRIDGE_SETTING_NAME) || nm_connection_is_type (connection, NM_SETTING_VLAN_SETTING_NAME)) return TRUE; if (nm_connection_is_type (connection, NM_SETTING_INFINIBAND_SETTING_NAME)) { NMSettingInfiniband *s_infiniband; s_infiniband = nm_connection_get_setting_infiniband (connection); g_return_val_if_fail (s_infiniband != NULL, FALSE); if (nm_setting_infiniband_get_p_key (s_infiniband) != -1) return TRUE; } return FALSE; } /***************************/ /** * system_create_virtual_device: * @self: the #NMManager * @connection: the connection which might require a virtual device * * If @connection requires a virtual device and one does not yet exist for it, * creates that device. * * Returns: the #NMDevice if successfully created, %NULL if not */ static NMDevice * system_create_virtual_device (NMManager *self, NMConnection *connection) { NMManagerPrivate *priv = NM_MANAGER_GET_PRIVATE (self); GSList *iter; char *iface = NULL; NMDevice *device = NULL, *parent = NULL; iface = get_virtual_iface_name (self, connection, &parent); if (!iface) { nm_log_dbg (LOGD_DEVICE, "(%s) failed to determine virtual interface name", nm_connection_get_id (connection)); return NULL; } /* Make sure we didn't create a device for this connection already */ for (iter = priv->devices; iter; iter = g_slist_next (iter)) { NMDevice *candidate = iter->data; GError *error = NULL; if ( g_strcmp0 (nm_device_get_iface (candidate), iface) == 0 || nm_device_check_connection_compatible (candidate, connection, &error)) { g_clear_error (&error); goto out; } g_clear_error (&error); } /* Block notification of link added since we're creating the device * explicitly here, otherwise adding the platform/kernel device would * create it before this function can do the rest of the setup. */ g_signal_handlers_block_by_func (nm_platform_get (), G_CALLBACK (platform_link_added_cb), self); if (nm_connection_is_type (connection, NM_SETTING_BOND_SETTING_NAME)) { device = nm_device_bond_new_for_connection (connection); } else if (nm_connection_is_type (connection, NM_SETTING_TEAM_SETTING_NAME)) { device = nm_device_team_new_for_connection (connection); } else if (nm_connection_is_type (connection, NM_SETTING_BRIDGE_SETTING_NAME)) { device = nm_device_bridge_new_for_connection (connection); } else if (nm_connection_is_type (connection, NM_SETTING_VLAN_SETTING_NAME)) { device = nm_device_vlan_new_for_connection (connection, parent); } else if (nm_connection_is_type (connection, NM_SETTING_INFINIBAND_SETTING_NAME)) { device = nm_device_infiniband_new_partition (connection, parent); } if (device) { nm_device_set_is_nm_owned (device, TRUE); add_device (self, device, FALSE); g_object_unref (device); } g_signal_handlers_unblock_by_func (nm_platform_get (), G_CALLBACK (platform_link_added_cb), self); out: g_free (iface); return device; } static void system_create_virtual_devices (NMManager *self) { NMManagerPrivate *priv = NM_MANAGER_GET_PRIVATE (self); GSList *iter, *connections; nm_log_dbg (LOGD_CORE, "creating virtual devices..."); connections = nm_settings_get_connections (priv->settings); for (iter = connections; iter; iter = g_slist_next (iter)) { NMConnection *connection = iter->data; /* We only create a virtual interface if the connection can autoconnect */ if ( connection_needs_virtual_device (connection) && nm_settings_connection_can_autoconnect (NM_SETTINGS_CONNECTION (connection))) system_create_virtual_device (self, connection); } g_slist_free (connections); } static void connection_added (NMSettings *settings, NMSettingsConnection *settings_connection, NMManager *manager) { NMConnection *connection = NM_CONNECTION (settings_connection); if (connection_needs_virtual_device (connection)) { NMSettingConnection *s_con = nm_connection_get_setting_connection (connection); g_assert (s_con); if (nm_setting_connection_get_autoconnect (s_con)) system_create_virtual_device (manager, connection); } } static void connection_changed (NMSettings *settings, NMSettingsConnection *connection, NMManager *manager) { /* FIXME: Some virtual devices may need to be updated in the future. */ } static void connection_removed (NMSettings *settings, NMSettingsConnection *connection, NMManager *manager) { /* * Do not delete existing virtual devices to keep connectivity up. * Virtual devices are reused when NetworkManager is restarted. */ } static void system_unmanaged_devices_changed_cb (NMSettings *settings, GParamSpec *pspec, gpointer user_data) { NMManager *self = NM_MANAGER (user_data); NMManagerPrivate *priv = NM_MANAGER_GET_PRIVATE (self); const GSList *unmanaged_specs, *iter; unmanaged_specs = nm_settings_get_unmanaged_specs (priv->settings); for (iter = priv->devices; iter; iter = g_slist_next (iter)) { NMDevice *device = NM_DEVICE (iter->data); gboolean managed; managed = !nm_device_spec_match_list (device, unmanaged_specs); nm_device_set_managed (device, NM_MANAGED_USER, managed, managed ? NM_DEVICE_STATE_REASON_NOW_MANAGED : NM_DEVICE_STATE_REASON_NOW_UNMANAGED); } } static void system_hostname_changed_cb (NMSettings *settings, GParamSpec *pspec, gpointer user_data) { NMManager *self = NM_MANAGER (user_data); NMManagerPrivate *priv = NM_MANAGER_GET_PRIVATE (self); char *hostname; hostname = nm_settings_get_hostname (priv->settings); if (!hostname && !priv->hostname) return; if (hostname && priv->hostname && !strcmp (hostname, priv->hostname)) return; g_free (priv->hostname); priv->hostname = (hostname && strlen (hostname)) ? g_strdup (hostname) : NULL; g_object_notify (G_OBJECT (self), NM_MANAGER_HOSTNAME); g_free (hostname); } /*******************************************************************/ /* General NMManager stuff */ /*******************************************************************/ /* Store value into key-file; supported types: boolean, int, string */ static gboolean write_value_to_state_file (const char *filename, const char *group, const char *key, GType value_type, gpointer value, GError **error) { GKeyFile *key_file; char *data; gsize len = 0; gboolean ret = FALSE; g_return_val_if_fail (filename != NULL, FALSE); g_return_val_if_fail (group != NULL, FALSE); g_return_val_if_fail (key != NULL, FALSE); g_return_val_if_fail (value_type == G_TYPE_BOOLEAN || value_type == G_TYPE_INT || value_type == G_TYPE_STRING, FALSE); key_file = g_key_file_new (); g_key_file_set_list_separator (key_file, ','); g_key_file_load_from_file (key_file, filename, G_KEY_FILE_KEEP_COMMENTS, NULL); switch (value_type) { case G_TYPE_BOOLEAN: g_key_file_set_boolean (key_file, group, key, *((gboolean *) value)); break; case G_TYPE_INT: g_key_file_set_integer (key_file, group, key, *((gint *) value)); break; case G_TYPE_STRING: g_key_file_set_string (key_file, group, key, *((const gchar **) value)); break; } data = g_key_file_to_data (key_file, &len, NULL); if (data) { ret = g_file_set_contents (filename, data, len, error); g_free (data); } g_key_file_free (key_file); return ret; } static gboolean radio_enabled_for_rstate (RadioState *rstate, gboolean check_changeable) { gboolean enabled; enabled = rstate->user_enabled && rstate->hw_enabled; if (check_changeable) { enabled &= rstate->sw_enabled; if (rstate->daemon_enabled_func) enabled &= rstate->daemon_enabled; } return enabled; } static gboolean radio_enabled_for_type (NMManager *self, RfKillType rtype, gboolean check_changeable) { NMManagerPrivate *priv = NM_MANAGER_GET_PRIVATE (self); return radio_enabled_for_rstate (&priv->radio_states[rtype], check_changeable); } static void manager_update_radio_enabled (NMManager *self, RadioState *rstate, gboolean enabled) { NMManagerPrivate *priv = NM_MANAGER_GET_PRIVATE (self); GSList *iter; /* Do nothing for radio types not yet implemented */ if (!rstate->prop) return; g_object_notify (G_OBJECT (self), rstate->prop); /* Don't touch devices if asleep/networking disabled */ if (manager_sleeping (self)) return; /* enable/disable wireless devices as required */ for (iter = priv->devices; iter; iter = iter->next) { NMDevice *device = NM_DEVICE (iter->data); if (nm_device_get_rfkill_type (device) == rstate->rtype) { nm_log_dbg (LOGD_RFKILL, "(%s): setting radio %s", nm_device_get_iface (device), enabled ? "enabled" : "disabled"); nm_device_set_enabled (device, enabled); } } } static void manager_hidden_ap_found (NMDevice *device, NMAccessPoint *ap, gpointer user_data) { NMManager *manager = NM_MANAGER (user_data); NMManagerPrivate *priv = NM_MANAGER_GET_PRIVATE (manager); const struct ether_addr *bssid; GSList *iter; GSList *connections; gboolean done = FALSE; g_return_if_fail (nm_ap_get_ssid (ap) == NULL); bssid = nm_ap_get_address (ap); g_assert (bssid); /* Look for this AP's BSSID in the seen-bssids list of a connection, * and if a match is found, copy over the SSID */ connections = nm_settings_get_connections (priv->settings); for (iter = connections; iter && !done; iter = g_slist_next (iter)) { NMConnection *connection = NM_CONNECTION (iter->data); NMSettingWireless *s_wifi; s_wifi = nm_connection_get_setting_wireless (connection); if (s_wifi) { if (nm_settings_connection_has_seen_bssid (NM_SETTINGS_CONNECTION (connection), bssid)) nm_ap_set_ssid (ap, nm_setting_wireless_get_ssid (s_wifi)); } } g_slist_free (connections); } static RfKillState nm_manager_get_ipw_rfkill_state (NMManager *self) { NMManagerPrivate *priv = NM_MANAGER_GET_PRIVATE (self); GSList *iter; RfKillState ipw_state = RFKILL_UNBLOCKED; for (iter = priv->devices; iter; iter = g_slist_next (iter)) { NMDevice *candidate = NM_DEVICE (iter->data); RfKillState candidate_state; if (nm_device_get_device_type (candidate) == NM_DEVICE_TYPE_WIFI) { candidate_state = nm_device_wifi_get_ipw_rfkill_state (NM_DEVICE_WIFI (candidate)); if (candidate_state > ipw_state) ipw_state = candidate_state; } } return ipw_state; } static RfKillState nm_manager_get_modem_enabled_state (NMManager *self) { NMManagerPrivate *priv = NM_MANAGER_GET_PRIVATE (self); GSList *iter; RfKillState wwan_state = RFKILL_UNBLOCKED; for (iter = priv->devices; iter; iter = g_slist_next (iter)) { NMDevice *candidate = NM_DEVICE (iter->data); RfKillState candidate_state = RFKILL_UNBLOCKED; if (nm_device_get_rfkill_type (candidate) == RFKILL_TYPE_WWAN) { if (!nm_device_get_enabled (candidate)) candidate_state = RFKILL_SOFT_BLOCKED; if (candidate_state > wwan_state) wwan_state = candidate_state; } } return wwan_state; } static void update_rstate_from_rfkill (RadioState *rstate, RfKillState rfkill) { if (rfkill == RFKILL_UNBLOCKED) { rstate->sw_enabled = TRUE; rstate->hw_enabled = TRUE; } else if (rfkill == RFKILL_SOFT_BLOCKED) { rstate->sw_enabled = FALSE; rstate->hw_enabled = TRUE; } else if (rfkill == RFKILL_HARD_BLOCKED) { rstate->sw_enabled = FALSE; rstate->hw_enabled = FALSE; } } static void manager_rfkill_update_one_type (NMManager *self, RadioState *rstate, RfKillType rtype) { NMManagerPrivate *priv = NM_MANAGER_GET_PRIVATE (self); RfKillState udev_state = RFKILL_UNBLOCKED; RfKillState other_state = RFKILL_UNBLOCKED; RfKillState composite; gboolean old_enabled, new_enabled, old_rfkilled, new_rfkilled; gboolean old_hwe, old_daemon_enabled = FALSE; old_enabled = radio_enabled_for_rstate (rstate, TRUE); old_rfkilled = rstate->hw_enabled && rstate->sw_enabled; old_hwe = rstate->hw_enabled; udev_state = nm_rfkill_manager_get_rfkill_state (priv->rfkill_mgr, rtype); if (rstate->other_enabled_func) other_state = rstate->other_enabled_func (self); /* The composite state is the "worst" of either udev or other states */ if (udev_state == RFKILL_HARD_BLOCKED || other_state == RFKILL_HARD_BLOCKED) composite = RFKILL_HARD_BLOCKED; else if (udev_state == RFKILL_SOFT_BLOCKED || other_state == RFKILL_SOFT_BLOCKED) composite = RFKILL_SOFT_BLOCKED; else composite = RFKILL_UNBLOCKED; update_rstate_from_rfkill (rstate, composite); /* If the device has a management daemon that can affect enabled state, check that now */ if (rstate->daemon_enabled_func) { old_daemon_enabled = rstate->daemon_enabled; rstate->daemon_enabled = (rstate->daemon_enabled_func (self) == RFKILL_UNBLOCKED); if (old_daemon_enabled != rstate->daemon_enabled) { nm_log_info (LOGD_RFKILL, "%s now %s by management service", rstate->desc, rstate->daemon_enabled ? "enabled" : "disabled"); } } /* Print out all states affecting device enablement */ if (rstate->desc) { if (rstate->daemon_enabled_func) { nm_log_dbg (LOGD_RFKILL, "%s hw-enabled %d sw-enabled %d daemon-enabled %d", rstate->desc, rstate->hw_enabled, rstate->sw_enabled, rstate->daemon_enabled); } else { nm_log_dbg (LOGD_RFKILL, "%s hw-enabled %d sw-enabled %d", rstate->desc, rstate->hw_enabled, rstate->sw_enabled); } } /* Log new killswitch state */ new_rfkilled = rstate->hw_enabled && rstate->sw_enabled; if (old_rfkilled != new_rfkilled) { nm_log_info (LOGD_RFKILL, "%s now %s by radio killswitch", rstate->desc, new_rfkilled ? "enabled" : "disabled"); } /* Send out property changed signal for HW enabled */ if (rstate->hw_enabled != old_hwe) { if (rstate->hw_prop) g_object_notify (G_OBJECT (self), rstate->hw_prop); } /* And finally update the actual device radio state itself; respect the * daemon state here because this is never called from user-triggered * radio changes and we only want to ignore the daemon enabled state when * handling user radio change requests. */ new_enabled = radio_enabled_for_rstate (rstate, TRUE); if (new_enabled != old_enabled) manager_update_radio_enabled (self, rstate, new_enabled); } static void nm_manager_rfkill_update (NMManager *self, RfKillType rtype) { NMManagerPrivate *priv = NM_MANAGER_GET_PRIVATE (self); guint i; if (rtype != RFKILL_TYPE_UNKNOWN) manager_rfkill_update_one_type (self, &priv->radio_states[rtype], rtype); else { /* Otherwise sync all radio types */ for (i = 0; i < RFKILL_TYPE_MAX; i++) manager_rfkill_update_one_type (self, &priv->radio_states[i], i); } } static void manager_ipw_rfkill_state_changed (NMDeviceWifi *device, GParamSpec *pspec, gpointer user_data) { nm_manager_rfkill_update (NM_MANAGER (user_data), RFKILL_TYPE_WLAN); } static void manager_modem_enabled_changed (NMDevice *device, gpointer user_data) { nm_manager_rfkill_update (NM_MANAGER (user_data), RFKILL_TYPE_WWAN); } static void device_auth_done_cb (NMAuthChain *chain, GError *auth_error, DBusGMethodInvocation *context, gpointer user_data) { NMManager *self = NM_MANAGER (user_data); NMManagerPrivate *priv = NM_MANAGER_GET_PRIVATE (self); GError *error = NULL; NMAuthCallResult result; NMDevice *device; const char *permission; NMDeviceAuthRequestFunc callback; g_assert (context); priv->auth_chains = g_slist_remove (priv->auth_chains, chain); permission = nm_auth_chain_get_data (chain, "requested-permission"); g_assert (permission); callback = nm_auth_chain_get_data (chain, "callback"); g_assert (callback); device = nm_auth_chain_get_data (chain, "device"); g_assert (device); result = nm_auth_chain_get_result (chain, permission); if (auth_error) { /* translate the auth error into a manager permission denied error */ nm_log_dbg (LOGD_CORE, "%s request failed: %s", permission, auth_error->message); error = g_error_new (NM_MANAGER_ERROR, NM_MANAGER_ERROR_PERMISSION_DENIED, "%s request failed: %s", permission, auth_error->message); } else if (result != NM_AUTH_CALL_RESULT_YES) { nm_log_dbg (LOGD_CORE, "%s request failed: not authorized", permission); error = g_error_new (NM_MANAGER_ERROR, NM_MANAGER_ERROR_PERMISSION_DENIED, "%s request failed: not authorized", permission); } g_assert (error || (result == NM_AUTH_CALL_RESULT_YES)); callback (device, context, error, nm_auth_chain_get_data (chain, "user-data")); g_clear_error (&error); nm_auth_chain_unref (chain); } static void device_auth_request_cb (NMDevice *device, DBusGMethodInvocation *context, NMConnection *connection, const char *permission, gboolean allow_interaction, NMDeviceAuthRequestFunc callback, gpointer user_data, NMManager *self) { NMManagerPrivate *priv = NM_MANAGER_GET_PRIVATE (self); GError *error = NULL; NMAuthSubject *subject = NULL; char *error_desc = NULL; NMAuthChain *chain; /* Validate the caller */ subject = nm_auth_subject_new_from_context (context); if (!subject) { error = g_error_new_literal (NM_MANAGER_ERROR, NM_MANAGER_ERROR_PERMISSION_DENIED, "Failed to get request UID."); goto done; } /* Ensure the subject has permissions for this connection */ if (connection && !nm_auth_uid_in_acl (connection, nm_session_monitor_get (), nm_auth_subject_get_uid (subject), &error_desc)) { error = g_error_new_literal (NM_MANAGER_ERROR, NM_MANAGER_ERROR_PERMISSION_DENIED, error_desc); g_free (error_desc); goto done; } /* Validate the request */ chain = nm_auth_chain_new_subject (subject, context, device_auth_done_cb, self); if (!chain) { error = g_error_new_literal (NM_MANAGER_ERROR, NM_MANAGER_ERROR_PERMISSION_DENIED, "Unable to authenticate request."); goto done; } priv->auth_chains = g_slist_append (priv->auth_chains, chain); nm_auth_chain_set_data (chain, "device", g_object_ref (device), g_object_unref); nm_auth_chain_set_data (chain, "requested-permission", g_strdup (permission), g_free); nm_auth_chain_set_data (chain, "callback", callback, NULL); nm_auth_chain_set_data (chain, "user-data", user_data, NULL); nm_auth_chain_add_call (chain, permission, allow_interaction); done: g_clear_object (&subject); if (error) callback (device, context, error, user_data); g_clear_error (&error); } /* This should really be moved to gsystem. */ #define free_slist __attribute__ ((cleanup(local_slist_free))) static void local_slist_free (void *loc) { GSList **location = loc; if (location) g_slist_free (*location); } static gboolean match_connection_filter (NMConnection *connection, gpointer user_data) { return nm_device_check_connection_compatible (NM_DEVICE (user_data), connection, NULL); } /** * get_existing_connection: * @manager: #NMManager instance * @device: #NMDevice instance * * Returns: a #NMSettingsConnection to be assumed by the device, or %NULL if * the device does not support assuming existing connections. */ static NMConnection * get_existing_connection (NMManager *manager, NMDevice *device) { NMManagerPrivate *priv = NM_MANAGER_GET_PRIVATE (manager); free_slist GSList *connections = nm_manager_get_activatable_connections (manager); NMConnection *connection = NULL, *matched; NMSettingsConnection *added = NULL; GError *error = NULL; nm_device_capture_initial_config (device); /* The core of the API is nm_device_generate_connection() function and * update_connection() virtual method and the convenient connection_type * class attribute. Subclasses supporting the new API must have * update_connection() implemented, otherwise nm_device_generate_connection() * returns NULL. */ connection = nm_device_generate_connection (device); if (!connection) return NULL; /* Now we need to compare the generated connection to each configured * connection. The comparison function is the heart of the connection * assumption implementation and it must compare the connections very * carefully to sort out various corner cases. Also, the comparison is * not entirely symmetric. * * When no configured connection matches the generated connection, we keep * the generated connection instead. */ connections = g_slist_sort (connections, nm_settings_sort_connections); matched = nm_utils_match_connection (connections, connection, nm_device_has_carrier (device), match_connection_filter, device); if (matched) { nm_log_info (LOGD_DEVICE, "(%s): found matching connection '%s'", nm_device_get_iface (device), nm_connection_get_id (matched)); g_object_unref (connection); return matched; } nm_log_dbg (LOGD_DEVICE, "(%s): generated connection '%s'", nm_device_get_iface (device), nm_connection_get_id (connection)); added = nm_settings_add_connection (priv->settings, connection, FALSE, &error); if (!added) { nm_log_warn (LOGD_SETTINGS, "(%s) Couldn't save generated connection '%s': %s", nm_device_get_iface (device), nm_connection_get_id (connection), (error && error->message) ? error->message : "(unknown)"); g_clear_error (&error); } g_object_unref (connection); return added ? NM_CONNECTION (added) : NULL; } /** * add_device: * @self: the #NMManager * @device: the #NMDevice to add * @generate_con: %TRUE if existing connection (if any) should be assumed * * If successful, this function will increase the references count of @device. * Callers should decrease the reference count. */ static void add_device (NMManager *self, NMDevice *device, gboolean generate_con) { NMManagerPrivate *priv = NM_MANAGER_GET_PRIVATE (self); const char *iface, *driver, *type_desc; char *path; static guint32 devcount = 0; const GSList *unmanaged_specs; gboolean user_unmanaged, sleeping; NMConnection *connection = NULL; gboolean enabled = FALSE; RfKillType rtype; NMDeviceType devtype; GSList *iter, *remove = NULL; devtype = nm_device_get_device_type (device); /* No duplicates */ if (nm_manager_get_device_by_udi (self, nm_device_get_udi (device))) return; /* Remove existing devices owned by the new device; eg remove ethernet * ports that are owned by a WWAN modem, since udev may announce them * before the modem is fully discovered. * * FIXME: use parent/child device relationships instead of removing * the child NMDevice entirely */ for (iter = priv->devices; iter; iter = iter->next) { iface = nm_device_get_ip_iface (iter->data); if (nm_device_owns_iface (device, iface)) remove = g_slist_prepend (remove, iter->data); } for (iter = remove; iter; iter = iter->next) remove_device (self, NM_DEVICE (iter->data), FALSE); g_slist_free (remove); priv->devices = g_slist_append (priv->devices, g_object_ref (device)); g_signal_connect (device, "state-changed", G_CALLBACK (manager_device_state_changed), self); g_signal_connect (device, NM_DEVICE_AUTH_REQUEST, G_CALLBACK (device_auth_request_cb), self); g_signal_connect (device, NM_DEVICE_REMOVED, G_CALLBACK (device_removed_cb), self); if (priv->startup) { g_signal_connect (device, "notify::" NM_DEVICE_HAS_PENDING_ACTION, G_CALLBACK (device_has_pending_action_changed), self); } if (devtype == NM_DEVICE_TYPE_WIFI) { /* Attach to the access-point-added signal so that the manager can fill * non-SSID-broadcasting APs with an SSID. */ g_signal_connect (device, "hidden-ap-found", G_CALLBACK (manager_hidden_ap_found), self); /* Hook up rfkill handling for ipw-based cards until they get converted * to use the kernel's rfkill subsystem in 2.6.33. */ g_signal_connect (device, "notify::" NM_DEVICE_WIFI_IPW_RFKILL_STATE, G_CALLBACK (manager_ipw_rfkill_state_changed), self); } else if (devtype == NM_DEVICE_TYPE_MODEM) { g_signal_connect (device, "enable-changed", G_CALLBACK (manager_modem_enabled_changed), self); } /* Update global rfkill state for this device type with the device's * rfkill state, and then set this device's rfkill state based on the * global state. */ rtype = nm_device_get_rfkill_type (device); if (rtype != RFKILL_TYPE_UNKNOWN) { nm_manager_rfkill_update (self, rtype); enabled = radio_enabled_for_type (self, rtype, TRUE); nm_device_set_enabled (device, enabled); } iface = nm_device_get_iface (device); g_assert (iface); type_desc = nm_device_get_type_desc (device); g_assert (type_desc); driver = nm_device_get_driver (device); if (!driver) driver = "unknown"; nm_log_info (LOGD_HW, "(%s): new %s device (driver: '%s' ifindex: %d)", iface, type_desc, driver, nm_device_get_ifindex (device)); unmanaged_specs = nm_settings_get_unmanaged_specs (priv->settings); user_unmanaged = nm_device_spec_match_list (device, unmanaged_specs); sleeping = manager_sleeping (self); nm_device_set_initial_managed_flags (device, NM_MANAGED_USER, !user_unmanaged, NM_MANAGED_INTERNAL, !sleeping, NM_MANAGED_UNKNOWN); path = g_strdup_printf ("/org/freedesktop/NetworkManager/Devices/%d", devcount++); nm_device_set_path (device, path); nm_dbus_manager_register_object (priv->dbus_mgr, path, device); nm_log_info (LOGD_CORE, "(%s): exported as %s", iface, path); g_free (path); /* Don't generate a connection e.g. for devices NM just created, or * for the loopback, or when we're sleeping. */ if (generate_con && !user_unmanaged && !sleeping) connection = get_existing_connection (self, device); /* Start the device if it'supposed to be managed. Note that this will * manage default-unmanaged devices if they have a generated connection. */ if (nm_device_get_managed (device) || connection) { nm_device_state_changed (device, NM_DEVICE_STATE_UNAVAILABLE, connection ? NM_DEVICE_STATE_REASON_CONNECTION_ASSUMED : NM_DEVICE_STATE_REASON_NOW_MANAGED); } nm_settings_device_added (priv->settings, device); g_signal_emit (self, signals[DEVICE_ADDED], 0, device); g_object_notify (G_OBJECT (self), NM_MANAGER_DEVICES); /* New devices might be master interfaces for virtual interfaces; so we may * need to create new virtual interfaces now. */ system_create_virtual_devices (self); /* If the device has a connection it can assume, do that now */ if (connection) { NMActiveConnection *active; NMAuthSubject *subject; GError *error = NULL; nm_log_dbg (LOGD_DEVICE, "(%s): will attempt to assume connection", nm_device_get_iface (device)); /* Move device to DISCONNECTED to activate the connection */ nm_device_state_changed (device, NM_DEVICE_STATE_DISCONNECTED, NM_DEVICE_STATE_REASON_CONNECTION_ASSUMED); subject = nm_auth_subject_new_internal (); active = _new_active_connection (self, connection, NULL, device, subject, &error); if (active) { NMActiveConnection *master_ac = NULL; /* If the device is a slave or VLAN, find the master ActiveConnection */ if (find_master (self, connection, device, NULL, NULL, &master_ac, NULL) && master_ac) nm_active_connection_set_master (active, master_ac); nm_active_connection_set_assumed (active, TRUE); nm_active_connection_export (active); active_connection_add (self, active); nm_device_queue_activation (device, NM_ACT_REQUEST (active)); g_object_unref (active); } else { nm_log_warn (LOGD_DEVICE, "assumed connection %s failed to activate: (%d) %s", nm_connection_get_path (connection), error ? error->code : -1, error && error->message ? error->message : "(unknown)"); g_error_free (error); } g_object_unref (subject); } } static NMDevice * find_device_by_ip_iface (NMManager *self, const gchar *iface) { NMManagerPrivate *priv = NM_MANAGER_GET_PRIVATE (self); GSList *iter; for (iter = priv->devices; iter; iter = g_slist_next (iter)) { NMDevice *candidate = iter->data; if (g_strcmp0 (nm_device_get_ip_iface (candidate), iface) == 0) return candidate; } return NULL; } static NMDevice * find_device_by_ifindex (NMManager *self, guint32 ifindex) { NMManagerPrivate *priv = NM_MANAGER_GET_PRIVATE (self); GSList *iter; for (iter = priv->devices; iter; iter = g_slist_next (iter)) { NMDevice *candidate = NM_DEVICE (iter->data); if (ifindex == nm_device_get_ifindex (candidate)) return candidate; } return NULL; } static void factory_device_added_cb (NMDeviceFactory *factory, NMDevice *device, gpointer user_data) { add_device (NM_MANAGER (user_data), device, FALSE); } static gboolean factory_component_added_cb (NMDeviceFactory *factory, GObject *component, gpointer user_data) { NMManager *self = NM_MANAGER (user_data); GSList *iter; for (iter = NM_MANAGER_GET_PRIVATE (self)->devices; iter; iter = iter->next) { if (nm_device_notify_component_added (NM_DEVICE (iter->data), component)) return TRUE; } return FALSE; } #define PLUGIN_PREFIX "libnm-device-plugin-" #define PLUGIN_PATH_TAG "NMManager-plugin-path" static void load_device_factories (NMManager *self) { NMManagerPrivate *priv = NM_MANAGER_GET_PRIVATE (self); GDir *dir; GError *error = NULL; const char *item; char *path; GSList *iter; dir = g_dir_open (NMPLUGINDIR, 0, &error); if (!dir) { nm_log_warn (LOGD_HW, "Failed to open plugin directory %s: %s", NMPLUGINDIR, (error && error->message) ? error->message : "(unknown)"); g_clear_error (&error); return; } while ((item = g_dir_read_name (dir))) { GModule *plugin; NMDeviceFactory *factory; NMDeviceFactoryCreateFunc create_func; NMDeviceFactoryDeviceTypeFunc type_func; NMDeviceType dev_type; const char *found = NULL; if (!g_str_has_prefix (item, PLUGIN_PREFIX)) continue; if (g_str_has_suffix (item, ".la")) continue; path = g_module_build_path (NMPLUGINDIR, item); g_assert (path); plugin = g_module_open (path, G_MODULE_BIND_LOCAL); g_free (path); if (!plugin) { nm_log_warn (LOGD_HW, "(%s): failed to load plugin: %s", item, g_module_error ()); continue; } if (!g_module_symbol (plugin, "nm_device_factory_get_device_type", (gpointer) &type_func)) { nm_log_warn (LOGD_HW, "(%s): failed to find device factory type: %s", item, g_module_error ()); g_module_close (plugin); continue; } /* Make sure we don't double-load plugins */ dev_type = type_func (); for (iter = priv->factories; iter; iter = iter->next) { NMDeviceType t = NM_DEVICE_TYPE_UNKNOWN; g_object_get (G_OBJECT (iter->data), NM_DEVICE_FACTORY_DEVICE_TYPE, &t, NULL); if (dev_type == t) { found = g_object_get_data (G_OBJECT (iter->data), PLUGIN_PATH_TAG); break; } } if (found) { nm_log_warn (LOGD_HW, "Found multiple device plugins for same type: %s vs %s", found, g_module_name (plugin)); g_module_close (plugin); continue; } if (!g_module_symbol (plugin, "nm_device_factory_create", (gpointer) &create_func)) { nm_log_warn (LOGD_HW, "(%s): failed to find device factory creator: %s", item, g_module_error ()); g_module_close (plugin); continue; } factory = create_func (&error); if (!factory) { nm_log_warn (LOGD_HW, "(%s): failed to initialize device factory: %s", item, error ? error->message : "unknown"); g_clear_error (&error); g_module_close (plugin); continue; } g_clear_error (&error); g_module_make_resident (plugin); priv->factories = g_slist_prepend (priv->factories, factory); g_signal_connect (factory, NM_DEVICE_FACTORY_DEVICE_ADDED, G_CALLBACK (factory_device_added_cb), self); g_signal_connect (factory, NM_DEVICE_FACTORY_COMPONENT_ADDED, G_CALLBACK (factory_component_added_cb), self); g_object_set_data_full (G_OBJECT (factory), PLUGIN_PATH_TAG, g_strdup (g_module_name (plugin)), g_free); nm_log_info (LOGD_HW, "Loaded device plugin: %s", g_module_name (plugin)); }; g_dir_close (dir); priv->factories = g_slist_reverse (priv->factories); } static void platform_link_added_cb (NMPlatform *platform, int ifindex, NMPlatformLink *plink, NMPlatformReason reason, gpointer user_data) { NMManager *self = NM_MANAGER (user_data); NMManagerPrivate *priv = NM_MANAGER_GET_PRIVATE (self); NMDevice *device = NULL; GSList *iter; GError *error = NULL; g_return_if_fail (ifindex > 0); if (find_device_by_ifindex (self, ifindex)) return; /* Try registered device factories */ for (iter = priv->factories; iter; iter = iter->next) { NMDeviceFactory *factory = NM_DEVICE_FACTORY (iter->data); device = nm_device_factory_new_link (factory, plink, &error); if (device && NM_IS_DEVICE (device)) { g_assert_no_error (error); break; /* success! */ } if (error) { nm_log_warn (LOGD_HW, "%s: factory failed to create device: (%d) %s", plink->udi, error ? error->code : -1, error ? error->message : "(unknown)"); g_clear_error (&error); return; } } if (device == NULL) { int parent_ifindex = -1; NMDevice *parent; switch (plink->type) { case NM_LINK_TYPE_ETHERNET: device = nm_device_ethernet_new (plink); break; case NM_LINK_TYPE_INFINIBAND: device = nm_device_infiniband_new (plink); break; case NM_LINK_TYPE_OLPC_MESH: device = nm_device_olpc_mesh_new (plink); break; case NM_LINK_TYPE_WIFI: device = nm_device_wifi_new (plink); break; case NM_LINK_TYPE_BOND: device = nm_device_bond_new (plink); break; case NM_LINK_TYPE_TEAM: device = nm_device_team_new (plink); break; case NM_LINK_TYPE_BRIDGE: device = nm_device_bridge_new (plink); break; case NM_LINK_TYPE_VLAN: /* Have to find the parent device */ if (nm_platform_vlan_get_info (ifindex, &parent_ifindex, NULL)) { parent = find_device_by_ifindex (self, parent_ifindex); if (parent) device = nm_device_vlan_new (plink, parent); else { /* If udev signaled the VLAN interface before it signaled * the VLAN's parent at startup we may not know about the * parent device yet. But we'll find it on the second pass * from nm_manager_start(). */ nm_log_dbg (LOGD_HW, "(%s): VLAN parent interface unknown", plink->name); } } else nm_log_err (LOGD_HW, "(%s): failed to get VLAN parent ifindex", plink->name); break; case NM_LINK_TYPE_VETH: device = nm_device_veth_new (plink); break; case NM_LINK_TYPE_TUN: case NM_LINK_TYPE_TAP: device = nm_device_tun_new (plink); break; case NM_LINK_TYPE_MACVLAN: case NM_LINK_TYPE_MACVTAP: device = nm_device_macvlan_new (plink); break; case NM_LINK_TYPE_VXLAN: device = nm_device_vxlan_new (plink); break; case NM_LINK_TYPE_GRE: case NM_LINK_TYPE_GRETAP: device = nm_device_gre_new (plink); break; case NM_LINK_TYPE_WWAN_ETHERNET: /* WWAN pseudo-ethernet interfaces are handled automatically by * their NMDeviceModem and don't get a separate NMDevice object. */ break; case NM_LINK_TYPE_WIMAX: /* If the WiMAX plugin is not installed, we can't control the * interface, so ignore it. */ break; default: device = nm_device_generic_new (plink); break; } } if (device) { add_device (self, device, plink->type != NM_LINK_TYPE_LOOPBACK); g_object_unref (device); } } static void platform_link_removed_cb (NMPlatform *platform, int ifindex, NMPlatformLink *plink, NMPlatformReason reason, gpointer user_data) { NMManager *self = NM_MANAGER (user_data); NMDevice *device; device = find_device_by_ifindex (self, ifindex); if (device) remove_device (self, device, FALSE); } static void rfkill_manager_rfkill_changed_cb (NMRfkillManager *rfkill_mgr, RfKillType rtype, RfKillState udev_state, gpointer user_data) { nm_manager_rfkill_update (NM_MANAGER (user_data), rtype); } GSList * nm_manager_get_devices (NMManager *manager) { g_return_val_if_fail (NM_IS_MANAGER (manager), NULL); return NM_MANAGER_GET_PRIVATE (manager)->devices; } static gboolean impl_manager_get_devices (NMManager *manager, GPtrArray **devices, GError **err) { NMManagerPrivate *priv = NM_MANAGER_GET_PRIVATE (manager); GSList *iter; *devices = g_ptr_array_sized_new (g_slist_length (priv->devices)); for (iter = priv->devices; iter; iter = iter->next) g_ptr_array_add (*devices, g_strdup (nm_device_get_path (NM_DEVICE (iter->data)))); return TRUE; } static gboolean impl_manager_get_device_by_ip_iface (NMManager *self, const char *iface, char **out_object_path, GError **error) { NMDevice *device; const char *path = NULL; device = find_device_by_ip_iface (self, iface); if (device) { path = nm_device_get_path (device); if (path) *out_object_path = g_strdup (path); } if (path == NULL) { g_set_error_literal (error, NM_MANAGER_ERROR, NM_MANAGER_ERROR_UNKNOWN_DEVICE, "No device found for the requested iface."); } return path ? TRUE : FALSE; } static gboolean is_compatible_with_slave (NMConnection *master, NMConnection *slave) { NMSettingConnection *s_con; g_return_val_if_fail (master, FALSE); g_return_val_if_fail (slave, FALSE); s_con = nm_connection_get_setting_connection (slave); g_assert (s_con); return nm_connection_is_type (master, nm_setting_connection_get_slave_type (s_con)); } /** * find_master: * @self: #NMManager object * @connection: the #NMConnection to find the master connection and device for * @device: the #NMDevice, if any, which will activate @connection * @out_master_connection: on success, the master connection of @connection if * that master connection was found * @out_master_device: on success, the master device of @connection if that * master device was found * @out_master_ac: on success, the master ActiveConnection of @connection if * there already is one * @error: the error, if an error occurred * * Given an #NMConnection, attempts to find its master. If @connection has * no master, this will return %TRUE and @out_master_connection and * @out_master_device will be untouched. * * If @connection does have a master, then the outputs depend on what is in its * #NMSettingConnection:master property: * * If "master" is the ifname of an existing #NMDevice, and that device has a * compatible master connection activated or activating on it, then * @out_master_device, @out_master_connection, and @out_master_ac will all be * set. If the device exists and is idle, only @out_master_device will be set. * If the device exists and has an incompatible connection on it, an error * will be returned. * * If "master" is the ifname of a non-existent device, then @out_master_device * will be %NULL, and @out_master_connection will be a connection whose * activation would cause the creation of that device. @out_master_ac MAY be * set in this case as well (if the connection has started activating, but has * not yet created its device). * * If "master" is the UUID of a compatible master connection, then * @out_master_connection will be the identified connection, and @out_master_device * and/or @out_master_ac will be set if the connection is currently activating. * (@out_master_device will not be set if the device exists but does not have * @out_master_connection active/activating on it.) * * Returns: %TRUE if the master device and/or connection could be found or if * the connection did not require a master, %FALSE otherwise **/ static gboolean find_master (NMManager *self, NMConnection *connection, NMDevice *device, NMConnection **out_master_connection, NMDevice **out_master_device, NMActiveConnection **out_master_ac, GError **error) { NMManagerPrivate *priv = NM_MANAGER_GET_PRIVATE (self); NMSettingConnection *s_con; const char *master; NMDevice *master_device = NULL; NMConnection *master_connection = NULL; GSList *iter, *connections = NULL; s_con = nm_connection_get_setting_connection (connection); g_assert (s_con); master = nm_setting_connection_get_master (s_con); if (master == NULL) return TRUE; /* success, but no master */ /* Try as an interface name first */ master_device = find_device_by_ip_iface (self, master); if (master_device) { if (master_device == device) { g_set_error_literal (error, NM_MANAGER_ERROR, NM_MANAGER_ERROR_DEPENDENCY_FAILED, "Device cannot be its own master"); return FALSE; } master_connection = nm_device_get_connection (master_device); if (master_connection && !is_compatible_with_slave (master_connection, connection)) { g_set_error (error, NM_MANAGER_ERROR, NM_MANAGER_ERROR_DEPENDENCY_FAILED, "The active connection on %s is not a valid master for '%s'", nm_device_get_iface (master_device), nm_connection_get_id (connection)); return FALSE; } } else { /* Try master as a connection UUID */ master_connection = (NMConnection *) nm_settings_get_connection_by_uuid (priv->settings, master); if (master_connection) { /* Check if the master connection is activated on some device already */ for (iter = priv->devices; iter; iter = g_slist_next (iter)) { NMDevice *candidate = NM_DEVICE (iter->data); if (candidate == device) continue; if (nm_device_get_connection (candidate) == master_connection) { master_device = candidate; break; } } } else { /* Might be a virtual interface that hasn't been created yet, so * look through the interface names of connections that require * virtual interfaces and see if one of their virtual interface * names matches the master. */ connections = nm_manager_get_activatable_connections (self); for (iter = connections; iter && !master_connection; iter = g_slist_next (iter)) { NMConnection *candidate = iter->data; char *vname; if (connection_needs_virtual_device (candidate)) { vname = get_virtual_iface_name (self, candidate, NULL); if ( g_strcmp0 (master, vname) == 0 && is_compatible_with_slave (candidate, connection)) master_connection = candidate; g_free (vname); } } g_slist_free (connections); } } if (out_master_connection) *out_master_connection = master_connection; if (out_master_device) *out_master_device = master_device; if (out_master_ac && master_connection) *out_master_ac = find_ac_for_connection (self, master_connection); if (master_device || master_connection) return TRUE; else { g_set_error_literal (error, NM_MANAGER_ERROR, NM_MANAGER_ERROR_UNKNOWN_DEVICE, "Master connection not found or invalid"); return FALSE; } } /** * ensure_master_active_connection: * @self: the #NMManager * @subject: the #NMAuthSubject representing the requestor of this activation * @connection: the connection that should depend on @master_connection * @device: the #NMDevice, if any, which will activate @connection * @master_connection: the master connection, or %NULL * @master_device: the master device, or %NULL * @error: the error, if an error occurred * * Determines whether a given #NMConnection depends on another connection to * be activated, and if so, finds that master connection or creates it. * * If @master_device and @master_connection are both set then @master_connection * MUST already be activated or activating on @master_device, and the function will * return the existing #NMActiveConnection. * * If only @master_device is set, and it has an #NMActiveConnection, then the * function will return it if it is a compatible master, or an error if not. If it * doesn't have an AC, then the function will create one if a compatible master * connection exists, or return an error if not. * * If only @master_connection is set, then this will try to find or create a compatible * #NMDevice, and either activate @master_connection on that device or return an error. * * Returns: the master #NMActiveConnection that the caller should depend on, or * %NULL if an error occurred */ static NMActiveConnection * ensure_master_active_connection (NMManager *self, NMAuthSubject *subject, NMConnection *connection, NMDevice *device, NMConnection *master_connection, NMDevice *master_device, GError **error) { NMManagerPrivate *priv = NM_MANAGER_GET_PRIVATE (self); NMActiveConnection *master_ac = NULL; NMDeviceState master_state; GSList *iter; g_assert (connection); g_assert (master_connection || master_device); /* If the master device isn't activated then we need to activate it using * compatible connection. If it's already activating we can just proceed. */ if (master_device) { NMConnection *device_connection = nm_device_get_connection (master_device); /* If we're passed a connection and a device, we require that connection * be already activated on the device, eg returned from find_master(). */ if (master_connection) g_assert (device_connection == master_connection); else if (!is_compatible_with_slave (device_connection, connection)) { g_set_error (error, NM_MANAGER_ERROR, NM_MANAGER_ERROR_DEPENDENCY_FAILED, "The active connection on %s is not a valid master for '%s'", nm_device_get_iface (master_device), nm_connection_get_id (connection)); return NULL; } master_state = nm_device_get_state (master_device); if ( (master_state == NM_DEVICE_STATE_ACTIVATED) || nm_device_is_activating (master_device)) { /* Device already using master_connection */ return NM_ACTIVE_CONNECTION (nm_device_get_act_request (master_device)); } /* If the device is disconnected, find a compatible connection and * activate it on the device. */ if (master_state == NM_DEVICE_STATE_DISCONNECTED) { GSList *connections; g_assert (master_connection == NULL); /* Find a compatible connection and activate this device using it */ connections = nm_manager_get_activatable_connections (self); for (iter = connections; iter; iter = g_slist_next (iter)) { NMConnection *candidate = NM_CONNECTION (iter->data); /* Ensure eg bond/team slave and the candidate master is a * bond/team master */ if (!is_compatible_with_slave (candidate, connection)) continue; if (nm_device_connection_is_available (master_device, candidate, TRUE)) { master_ac = nm_manager_activate_connection (self, candidate, NULL, master_device, subject, error); if (!master_ac) g_prefix_error (error, "%s", "Master device activation failed: "); g_slist_free (connections); return master_ac; } } g_slist_free (connections); g_set_error (error, NM_MANAGER_ERROR, NM_MANAGER_ERROR_UNKNOWN_CONNECTION, "No compatible connection found for master device %s.", nm_device_get_iface (master_device)); return NULL; } /* Otherwise, the device is unmanaged, unavailable, or disconnecting */ g_set_error (error, NM_MANAGER_ERROR, NM_MANAGER_ERROR_UNMANAGED_DEVICE, "Master device %s unmanaged or not available for activation", nm_device_get_iface (master_device)); } else if (master_connection) { gboolean found_device = FALSE; /* Find a compatible device and activate it using this connection */ for (iter = priv->devices; iter; iter = g_slist_next (iter)) { NMDevice *candidate = NM_DEVICE (iter->data); if (candidate == device) { /* A device obviously can't be its own master */ continue; } if (!nm_device_connection_is_available (candidate, master_connection, TRUE)) continue; found_device = TRUE; master_state = nm_device_get_state (candidate); if (master_state != NM_DEVICE_STATE_DISCONNECTED) continue; master_ac = nm_manager_activate_connection (self, master_connection, NULL, candidate, subject, error); if (!master_ac) g_prefix_error (error, "%s", "Master device activation failed: "); return master_ac; } /* Device described by master_connection may be a virtual one that's * not created yet. */ if (!found_device && connection_needs_virtual_device (master_connection)) { master_ac = nm_manager_activate_connection (self, master_connection, NULL, NULL, subject, error); if (!master_ac) g_prefix_error (error, "%s", "Master device activation failed: "); return master_ac; } g_set_error (error, NM_MANAGER_ERROR, NM_MANAGER_ERROR_UNKNOWN_DEVICE, "No compatible disconnected device found for master connection %s.", nm_connection_get_uuid (master_connection)); } else g_assert_not_reached (); return NULL; } static gboolean _internal_activate_vpn (NMManager *self, NMActiveConnection *active, GError **error) { gboolean success; g_assert (NM_IS_VPN_CONNECTION (active)); success = nm_vpn_manager_activate_connection (NM_MANAGER_GET_PRIVATE (self)->vpn_manager, NM_VPN_CONNECTION (active), error); if (success) { nm_active_connection_export (active); g_object_notify (G_OBJECT (self), NM_MANAGER_ACTIVE_CONNECTIONS); } return success; } static gboolean _internal_activate_device (NMManager *self, NMActiveConnection *active, GError **error) { NMDevice *device, *master_device = NULL; NMConnection *connection; NMConnection *master_connection = NULL; NMActiveConnection *master_ac = NULL; g_return_val_if_fail (NM_IS_MANAGER (self), FALSE); g_return_val_if_fail (NM_IS_ACTIVE_CONNECTION (active), FALSE); g_return_val_if_fail (error == NULL || *error == NULL, FALSE); g_assert (NM_IS_VPN_CONNECTION (active) == FALSE); connection = nm_active_connection_get_connection (active); g_assert (connection); device = nm_active_connection_get_device (active); if (!device) { if (!connection_needs_virtual_device (connection)) { NMSettingConnection *s_con = nm_connection_get_setting_connection (connection); g_assert (s_con); g_set_error (error, NM_MANAGER_ERROR, NM_MANAGER_ERROR_UNKNOWN_DEVICE, "Unsupported virtual interface type '%s'", nm_setting_connection_get_connection_type (s_con)); return FALSE; } device = system_create_virtual_device (self, connection); if (!device) { g_set_error_literal (error, NM_MANAGER_ERROR, NM_MANAGER_ERROR_UNKNOWN_DEVICE, "Failed to create virtual interface"); return FALSE; } if (!nm_active_connection_set_device (active, device)) { g_set_error_literal (error, NM_MANAGER_ERROR, NM_MANAGER_ERROR_UNKNOWN_DEVICE, "The device could not be activated with this connection"); return FALSE; } /* A newly created device, if allowed to be managed by NM, will be * in the UNAVAILABLE state here. To ensure it can be activated * immediately, we transition it to DISCONNECTED. */ if ( nm_device_is_available (device) && (nm_device_get_state (device) == NM_DEVICE_STATE_UNAVAILABLE)) { nm_device_state_changed (device, NM_DEVICE_STATE_DISCONNECTED, NM_DEVICE_STATE_REASON_NONE); } } else { NMConnection *existing_connection = NULL; NMAuthSubject *subject; char *error_desc = NULL; /* If the device is active and its connection is not visible to the * user that's requesting this new activation, fail, since other users * should not be allowed to implicitly deactivate private connections * by activating a connection of their own. */ existing_connection = nm_device_get_connection (device); subject = nm_active_connection_get_subject (active); if (existing_connection && !nm_auth_uid_in_acl (existing_connection, nm_session_monitor_get (), nm_auth_subject_get_uid (subject), &error_desc)) { g_set_error (error, NM_MANAGER_ERROR, NM_MANAGER_ERROR_PERMISSION_DENIED, "Private connection already active on the device: %s", error_desc); g_free (error_desc); return FALSE; } } /* Final connection must be available on device */ if (!nm_device_connection_is_available (device, connection, TRUE)) { g_set_error (error, NM_MANAGER_ERROR, NM_MANAGER_ERROR_UNKNOWN_CONNECTION, "Connection '%s' is not available on the device %s at this time.", nm_connection_get_id (connection), nm_device_get_iface (device)); return FALSE; } /* If this is an autoconnect request, but the device isn't allowing autoconnect * right now, we reject it. */ if (!nm_active_connection_get_user_requested (active) && !nm_device_autoconnect_allowed (device)) { g_set_error (error, NM_MANAGER_ERROR, NM_MANAGER_ERROR_AUTOCONNECT_NOT_ALLOWED, "%s does not allow automatic connections at this time", nm_device_get_iface (device)); return FALSE; } /* Try to find the master connection/device if the connection has a dependency */ if (!find_master (self, connection, device, &master_connection, &master_device, &master_ac, error)) return FALSE; /* Ensure there's a master active connection the new connection we're * activating can depend on. */ if (master_connection || master_device) { if (master_connection) { nm_log_dbg (LOGD_CORE, "Activation of '%s' requires master connection '%s'", nm_connection_get_id (connection), nm_connection_get_id (master_connection)); } if (master_device) { nm_log_dbg (LOGD_CORE, "Activation of '%s' requires master device '%s'", nm_connection_get_id (connection), nm_device_get_ip_iface (master_device)); } /* Ensure eg bond slave and the candidate master is a bond master */ if (master_connection && !is_compatible_with_slave (master_connection, connection)) { g_set_error_literal (error, NM_MANAGER_ERROR, NM_MANAGER_ERROR_DEPENDENCY_FAILED, "The master connection was not compatible"); return FALSE; } if (!master_ac) { master_ac = ensure_master_active_connection (self, nm_active_connection_get_subject (active), connection, device, master_connection, master_device, error); if (!master_ac) { if (error) g_assert (*error); return FALSE; } } nm_active_connection_set_master (active, master_ac); nm_log_dbg (LOGD_CORE, "Activation of '%s' depends on active connection %s", nm_connection_get_id (connection), nm_active_connection_get_path (master_ac)); } /* Export the new ActiveConnection to clients and start it on the device */ nm_active_connection_export (active); g_object_notify (G_OBJECT (self), NM_MANAGER_ACTIVE_CONNECTIONS); nm_device_queue_activation (device, NM_ACT_REQUEST (active)); return TRUE; } static gboolean _internal_activate_generic (NMManager *self, NMActiveConnection *active, GError **error) { NMManagerPrivate *priv = NM_MANAGER_GET_PRIVATE (self); gboolean success = FALSE; /* Ensure activation request is still valid, eg that its device hasn't gone * away or that some other dependency has not failed. */ if (nm_active_connection_get_state (active) >= NM_ACTIVE_CONNECTION_STATE_DEACTIVATING) { g_set_error_literal (error, NM_MANAGER_ERROR, NM_MANAGER_ERROR_DEPENDENCY_FAILED, "Activation failed because dependencies failed."); return FALSE; } if (NM_IS_VPN_CONNECTION (active)) success = _internal_activate_vpn (self, active, error); else success = _internal_activate_device (self, active, error); if (success) { /* Force an update of the Manager's activating-connection property. * The device changes state before the AC gets exported, which causes * the manager's 'activating-connection' property to be NULL since the * AC only gets a D-Bus path when it's exported. So now that the AC * is exported, make sure the manager's activating-connection property * is up-to-date. */ policy_activating_device_changed (G_OBJECT (priv->policy), NULL, self); } return success; } static NMActiveConnection * _new_vpn_active_connection (NMManager *self, NMConnection *connection, const char *specific_object, NMAuthSubject *subject, GError **error) { NMManagerPrivate *priv = NM_MANAGER_GET_PRIVATE (self); NMActiveConnection *parent = NULL; NMDevice *device = NULL; if (specific_object) { /* Find the specific connection the client requested we use */ parent = active_connection_get_by_path (self, specific_object); if (!parent) { g_set_error_literal (error, NM_MANAGER_ERROR, NM_MANAGER_ERROR_CONNECTION_NOT_ACTIVE, "Base connection for VPN connection not active."); return NULL; } } else parent = priv->primary_connection; if (!parent) { g_set_error_literal (error, NM_MANAGER_ERROR, NM_MANAGER_ERROR_UNKNOWN_CONNECTION, "Could not find source connection."); return NULL; } device = nm_active_connection_get_device (parent); if (!device) { g_set_error_literal (error, NM_MANAGER_ERROR, NM_MANAGER_ERROR_UNKNOWN_DEVICE, "Source connection had no active device."); return NULL; } return (NMActiveConnection *) nm_vpn_connection_new (connection, device, nm_active_connection_get_path (parent), subject); } static NMActiveConnection * _new_active_connection (NMManager *self, NMConnection *connection, const char *specific_object, NMDevice *device, NMAuthSubject *subject, GError **error) { NMActiveConnection *existing_ac; g_return_val_if_fail (NM_IS_CONNECTION (connection), NULL); g_return_val_if_fail (NM_IS_AUTH_SUBJECT (subject), NULL); /* Can't create new AC for already-active connection */ existing_ac = find_ac_for_connection (self, connection); if (NM_IS_VPN_CONNECTION (existing_ac)) { g_set_error (error, NM_MANAGER_ERROR, NM_MANAGER_ERROR_CONNECTION_ALREADY_ACTIVE, "Connection '%s' is already active", nm_connection_get_id (connection)); return NULL; } if (existing_ac) { NMDevice *existing_device = nm_active_connection_get_device (existing_ac); if (existing_device != device) { g_set_error (error, NM_MANAGER_ERROR, NM_MANAGER_ERROR_CONNECTION_ALREADY_ACTIVE, "Connection '%s' is already active on %s", nm_connection_get_id (connection), nm_device_get_iface (existing_device)); return NULL; } } /* Normalize the specific object */ if (specific_object && g_strcmp0 (specific_object, "/") == 0) specific_object = NULL; if (nm_connection_is_type (connection, NM_SETTING_VPN_SETTING_NAME)) { return _new_vpn_active_connection (self, connection, specific_object, subject, error); } return (NMActiveConnection *) nm_act_request_new (connection, specific_object, subject, device); } static void _internal_activation_failed (NMManager *self, NMActiveConnection *active, const char *error_desc) { nm_log_warn (LOGD_CORE, "Failed to activate '%s': %s", nm_connection_get_id (nm_active_connection_get_connection (active)), error_desc); if (nm_active_connection_get_state (active) <= NM_ACTIVE_CONNECTION_STATE_ACTIVATED) { nm_active_connection_set_state (active, NM_ACTIVE_CONNECTION_STATE_DEACTIVATING); nm_active_connection_set_state (active, NM_ACTIVE_CONNECTION_STATE_DEACTIVATED); } active_connection_remove (self, active); } static void _internal_activation_auth_done (NMActiveConnection *active, gboolean success, const char *error_desc, gpointer user_data1, gpointer user_data2) { NMManager *self = user_data1; GError *error = NULL; if (success) { if (_internal_activate_generic (self, active, &error)) { g_object_unref (active); return; } } g_assert (error_desc || error); _internal_activation_failed (self, active, error_desc ? error_desc : error->message); g_object_unref (active); g_clear_error (&error); } /** * nm_manager_activate_connection(): * @self: the #NMManager * @connection: the #NMConnection to activate on @device * @specific_object: the specific object path, if any, for the activation * @device: the #NMDevice to activate @connection on * @subject: the subject which requested activation * @error: return location for an error * * Begins a new internally-initiated activation of @connection on @device. * @subject should be the subject of the activation that triggered this * one, or if this is an autoconnect request, a new internal subject. * The returned #NMActiveConnection is owned by the Manager and should be * referenced by the caller if the caller continues to use it. * * Returns: (transfer none): the new #NMActiveConnection that tracks * activation of @connection on @device */ NMActiveConnection * nm_manager_activate_connection (NMManager *self, NMConnection *connection, const char *specific_object, NMDevice *device, NMAuthSubject *subject, GError **error) { NMActiveConnection *active; char *error_desc = NULL; g_return_val_if_fail (self != NULL, NULL); g_return_val_if_fail (connection != NULL, NULL); g_return_val_if_fail (error != NULL, NULL); g_return_val_if_fail (*error == NULL, NULL); /* Ensure the subject has permissions for this connection */ if (!nm_auth_uid_in_acl (connection, nm_session_monitor_get (), nm_auth_subject_get_uid (subject), &error_desc)) { g_set_error_literal (error, NM_MANAGER_ERROR, NM_MANAGER_ERROR_PERMISSION_DENIED, error_desc); g_free (error_desc); return NULL; } active = _new_active_connection (self, connection, specific_object, device, subject, error); if (active) { nm_active_connection_authorize (active, _internal_activation_auth_done, self, NULL); active_connection_add (self, active); } return active; } static NMAuthSubject * validate_activation_request (NMManager *self, DBusGMethodInvocation *context, NMConnection *connection, const char *device_path, NMDevice **out_device, gboolean *out_vpn, GError **error) { NMDevice *device = NULL; gboolean vpn = FALSE; NMAuthSubject *subject = NULL; char *error_desc = NULL; g_assert (connection); g_assert (out_device); g_assert (out_vpn); /* Validate the caller */ subject = nm_auth_subject_new_from_context (context); if (!subject) { g_set_error_literal (error, NM_MANAGER_ERROR, NM_MANAGER_ERROR_PERMISSION_DENIED, "Failed to get request UID."); return NULL; } /* Ensure the subject has permissions for this connection */ if (!nm_auth_uid_in_acl (connection, nm_session_monitor_get (), nm_auth_subject_get_uid (subject), &error_desc)) { g_set_error_literal (error, NM_MANAGER_ERROR, NM_MANAGER_ERROR_PERMISSION_DENIED, error_desc); g_free (error_desc); goto error; } /* Check whether it's a VPN or not */ if ( nm_connection_get_setting_vpn (connection) || nm_connection_is_type (connection, NM_SETTING_VPN_SETTING_NAME)) vpn = TRUE; /* Normalize device path */ if (device_path && g_strcmp0 (device_path, "/") == 0) device_path = NULL; /* And validate it */ if (device_path) { device = nm_manager_get_device_by_path (self, device_path); if (!device) { g_set_error_literal (error, NM_MANAGER_ERROR, NM_MANAGER_ERROR_UNKNOWN_DEVICE, "Device not found"); goto error; } } else { gboolean is_software = connection_needs_virtual_device (connection); /* VPN and software-device connections don't need a device yet */ if (!vpn && !is_software) { g_set_error_literal (error, NM_MANAGER_ERROR, NM_MANAGER_ERROR_UNKNOWN_DEVICE, "This connection requires an existing device."); goto error; } if (is_software) { /* Look for an existing device with the connection's interface name */ char *iface; iface = get_virtual_iface_name (self, connection, NULL); if (!iface) { g_set_error_literal (error, NM_MANAGER_ERROR, NM_MANAGER_ERROR_UNKNOWN_DEVICE, "Failed to determine connection's virtual interface name"); goto error; } device = find_device_by_ip_iface (self, iface); g_free (iface); } } *out_device = device; *out_vpn = vpn; return subject; error: g_object_unref (subject); return NULL; } /***********************************************************************/ static void _activation_auth_done (NMActiveConnection *active, gboolean success, const char *error_desc, gpointer user_data1, gpointer user_data2) { NMManager *self = user_data1; DBusGMethodInvocation *context = user_data2; GError *error = NULL; if (success) { if (_internal_activate_generic (self, active, &error)) { dbus_g_method_return (context, nm_active_connection_get_path (active)); g_object_unref (active); return; } } else { error = g_error_new_literal (NM_MANAGER_ERROR, NM_MANAGER_ERROR_PERMISSION_DENIED, error_desc); } g_assert (error); dbus_g_method_return_error (context, error); _internal_activation_failed (self, active, error->message); g_object_unref (active); g_error_free (error); } static void impl_manager_activate_connection (NMManager *self, const char *connection_path, const char *device_path, const char *specific_object_path, DBusGMethodInvocation *context) { NMManagerPrivate *priv = NM_MANAGER_GET_PRIVATE (self); NMActiveConnection *active = NULL; NMAuthSubject *subject = NULL; NMConnection *connection; NMDevice *device = NULL; gboolean is_vpn = FALSE; GError *error = NULL; /* Normalize object paths */ if (g_strcmp0 (connection_path, "/") == 0) connection_path = NULL; if (g_strcmp0 (specific_object_path, "/") == 0) specific_object_path = NULL; if (g_strcmp0 (device_path, "/") == 0) device_path = NULL; /* If the connection path is given and valid, that connection is activated. * Otherwise the "best" connection for the device is chosen and activated, * regardless of whether that connection is autoconnect-enabled or not * (since this is an explicit request, not an auto-activation request). */ if (!connection_path) { GPtrArray *available; guint64 best_timestamp = 0; guint i; /* If no connection is given, find a suitable connection for the given device path */ if (!device_path) { error = g_error_new_literal (NM_MANAGER_ERROR, NM_MANAGER_ERROR_UNKNOWN_DEVICE, "Only devices may be activated without a specifying a connection"); goto error; } device = nm_manager_get_device_by_path (self, device_path); if (!device) { error = g_error_new (NM_MANAGER_ERROR, NM_MANAGER_ERROR_UNKNOWN_DEVICE, "Cannot activate unknown device %s", device_path); goto error; } available = nm_device_get_available_connections (device, specific_object_path); for (i = 0; available && i < available->len; i++) { NMSettingsConnection *candidate = g_ptr_array_index (available, i); guint64 candidate_timestamp = 0; nm_settings_connection_get_timestamp (candidate, &candidate_timestamp); if (!connection_path || (candidate_timestamp > best_timestamp)) { connection_path = nm_connection_get_path (NM_CONNECTION (candidate)); best_timestamp = candidate_timestamp; } } if (available) g_ptr_array_free (available, TRUE); if (!connection_path) { error = g_error_new_literal (NM_MANAGER_ERROR, NM_MANAGER_ERROR_UNKNOWN_CONNECTION, "The device has no connections available."); goto error; } } g_assert (connection_path); connection = (NMConnection *) nm_settings_get_connection_by_path (priv->settings, connection_path); if (!connection) { error = g_error_new_literal (NM_MANAGER_ERROR, NM_MANAGER_ERROR_UNKNOWN_CONNECTION, "Connection could not be found."); goto error; } subject = validate_activation_request (self, context, connection, device_path, &device, &is_vpn, &error); if (!subject) goto error; active = _new_active_connection (self, connection, specific_object_path, device, subject, &error); if (!active) goto error; nm_active_connection_authorize (active, _activation_auth_done, self, context); active_connection_add (self, active); g_clear_object (&subject); return; error: g_clear_object (&active); g_clear_object (&subject); g_assert (error); dbus_g_method_return_error (context, error); g_error_free (error); } /***********************************************************************/ typedef struct { NMManager *manager; NMActiveConnection *active; } AddAndActivateInfo; static void activation_add_done (NMSettings *self, NMSettingsConnection *new_connection, GError *error, DBusGMethodInvocation *context, gpointer user_data) { AddAndActivateInfo *info = user_data; GError *local = NULL; if (!error) { nm_active_connection_set_connection (info->active, NM_CONNECTION (new_connection)); if (_internal_activate_generic (info->manager, info->active, &local)) { dbus_g_method_return (context, nm_connection_get_path (NM_CONNECTION (new_connection)), nm_active_connection_get_path (info->active)); goto done; } error = local; } g_assert (error); _internal_activation_failed (info->manager, info->active, error->message); dbus_g_method_return_error (context, error); g_clear_error (&local); done: g_object_unref (info->active); g_free (info); } static void _add_and_activate_auth_done (NMActiveConnection *active, gboolean success, const char *error_desc, gpointer user_data1, gpointer user_data2) { NMManager *self = user_data1; NMManagerPrivate *priv = NM_MANAGER_GET_PRIVATE (self); DBusGMethodInvocation *context = user_data2; AddAndActivateInfo *info; GError *error = NULL; if (success) { info = g_malloc0 (sizeof (*info)); info->manager = self; info->active = g_object_ref (active); /* Basic sender auth checks performed; try to add the connection */ nm_settings_add_connection_dbus (priv->settings, nm_active_connection_get_connection (active), TRUE, context, activation_add_done, info); } else { active_connection_remove (self, active); g_assert (error_desc); error = g_error_new_literal (NM_MANAGER_ERROR, NM_MANAGER_ERROR_PERMISSION_DENIED, error_desc); dbus_g_method_return_error (context, error); g_error_free (error); } g_object_unref (active); } static void impl_manager_add_and_activate_connection (NMManager *self, GHashTable *settings, const char *device_path, const char *specific_object_path, DBusGMethodInvocation *context) { NMManagerPrivate *priv = NM_MANAGER_GET_PRIVATE (self); NMConnection *connection = NULL; GSList *all_connections = NULL; NMActiveConnection *active = NULL; NMAuthSubject *subject = NULL; GError *error = NULL; NMDevice *device = NULL; gboolean vpn = FALSE; /* Normalize object paths */ if (g_strcmp0 (specific_object_path, "/") == 0) specific_object_path = NULL; if (g_strcmp0 (device_path, "/") == 0) device_path = NULL; /* Try to create a new connection with the given settings. * We allow empty settings for AddAndActivateConnection(). In that case, * the connection will be completed in nm_utils_complete_generic() or * nm_device_complete_connection() below. Just make sure we don't expect * specific data being in the connection till then (especially in * validate_activation_request()). */ connection = nm_connection_new (); if (settings && g_hash_table_size (settings)) nm_connection_replace_settings (connection, settings, NULL); subject = validate_activation_request (self, context, connection, device_path, &device, &vpn, &error); if (!subject) goto error; /* AddAndActivate() requires a device to complete the connection with */ if (!device) { error = g_error_new_literal (NM_MANAGER_ERROR, NM_MANAGER_ERROR_UNKNOWN_DEVICE, "This connection requires an existing device."); goto error; } all_connections = nm_settings_get_connections (priv->settings); if (vpn) { /* Try to fill the VPN's connection setting and name at least */ if (!nm_connection_get_setting_vpn (connection)) { error = g_error_new_literal (NM_MANAGER_ERROR, NM_MANAGER_ERROR_UNSUPPORTED_CONNECTION_TYPE, "VPN connections require a 'vpn' setting"); goto error; } nm_utils_complete_generic (connection, NM_SETTING_VPN_SETTING_NAME, all_connections, _("VPN connection %d"), NULL, FALSE); /* No IPv6 by default for now */ } else { /* Let each device subclass complete the connection */ if (!nm_device_complete_connection (device, connection, specific_object_path, all_connections, &error)) goto error; } g_slist_free (all_connections); all_connections = NULL; active = _new_active_connection (self, connection, specific_object_path, device, subject, &error); if (!active) goto error; nm_active_connection_authorize (active, _add_and_activate_auth_done, self, context); active_connection_add (self, active); g_object_unref (connection); g_object_unref (subject); return; error: g_clear_object (&connection); g_slist_free (all_connections); g_clear_object (&subject); g_clear_object (&active); g_assert (error); dbus_g_method_return_error (context, error); g_error_free (error); } /***********************************************************************/ gboolean nm_manager_deactivate_connection (NMManager *manager, const char *connection_path, NMDeviceStateReason reason, GError **error) { NMManagerPrivate *priv = NM_MANAGER_GET_PRIVATE (manager); NMActiveConnection *active; gboolean success = FALSE; active = active_connection_get_by_path (manager, connection_path); if (!active) { g_set_error_literal (error, NM_MANAGER_ERROR, NM_MANAGER_ERROR_CONNECTION_NOT_ACTIVE, "The connection was not active."); return FALSE; } if (NM_IS_VPN_CONNECTION (active)) { NMVPNConnectionStateReason vpn_reason = NM_VPN_CONNECTION_STATE_REASON_USER_DISCONNECTED; if (reason == NM_DEVICE_STATE_REASON_CONNECTION_REMOVED) vpn_reason = NM_VPN_CONNECTION_STATE_REASON_CONNECTION_REMOVED; if (nm_vpn_manager_deactivate_connection (priv->vpn_manager, NM_VPN_CONNECTION (active), vpn_reason)) success = TRUE; else g_set_error_literal (error, NM_MANAGER_ERROR, NM_MANAGER_ERROR_CONNECTION_NOT_ACTIVE, "The VPN connection was not active."); } else { g_assert (NM_IS_ACT_REQUEST (active)); nm_device_state_changed (nm_active_connection_get_device (active), NM_DEVICE_STATE_DEACTIVATING, reason); success = TRUE; } if (success) g_object_notify (G_OBJECT (manager), NM_MANAGER_ACTIVE_CONNECTIONS); return success; } static void deactivate_net_auth_done_cb (NMAuthChain *chain, GError *auth_error, DBusGMethodInvocation *context, gpointer user_data) { NMManager *self = NM_MANAGER (user_data); NMManagerPrivate *priv = NM_MANAGER_GET_PRIVATE (self); GError *error = NULL; NMAuthCallResult result; g_assert (context); priv->auth_chains = g_slist_remove (priv->auth_chains, chain); result = nm_auth_chain_get_result (chain, NM_AUTH_PERMISSION_NETWORK_CONTROL); if (auth_error) { nm_log_dbg (LOGD_CORE, "Disconnect request failed: %s", auth_error->message); error = g_error_new (NM_MANAGER_ERROR, NM_MANAGER_ERROR_PERMISSION_DENIED, "Deactivate request failed: %s", auth_error->message); } else if (result != NM_AUTH_CALL_RESULT_YES) { error = g_error_new_literal (NM_MANAGER_ERROR, NM_MANAGER_ERROR_PERMISSION_DENIED, "Not authorized to deactivate connections"); } else { /* success; deactivation allowed */ if (!nm_manager_deactivate_connection (self, nm_auth_chain_get_data (chain, "path"), NM_DEVICE_STATE_REASON_USER_REQUESTED, &error)) g_assert (error); } if (error) dbus_g_method_return_error (context, error); else dbus_g_method_return (context); g_clear_error (&error); nm_auth_chain_unref (chain); } static void impl_manager_deactivate_connection (NMManager *self, const char *active_path, DBusGMethodInvocation *context) { NMManagerPrivate *priv = NM_MANAGER_GET_PRIVATE (self); NMConnection *connection = NULL; GError *error = NULL; NMAuthSubject *subject = NULL; GSList *iter; NMAuthChain *chain; char *error_desc = NULL; /* Find the connection by its object path */ for (iter = priv->active_connections; iter; iter = g_slist_next (iter)) { NMActiveConnection *ac = iter->data; if (g_strcmp0 (nm_active_connection_get_path (ac), active_path) == 0) { connection = nm_active_connection_get_connection (ac); break; } } if (!connection) { error = g_error_new_literal (NM_MANAGER_ERROR, NM_MANAGER_ERROR_CONNECTION_NOT_ACTIVE, "The connection was not active."); goto done; } /* Validate the caller */ subject = nm_auth_subject_new_from_context (context); if (!subject) { error = g_error_new_literal (NM_MANAGER_ERROR, NM_MANAGER_ERROR_PERMISSION_DENIED, "Failed to get request UID."); goto done; } /* Ensure the subject has permissions for this connection */ if (!nm_auth_uid_in_acl (connection, nm_session_monitor_get (), nm_auth_subject_get_uid (subject), &error_desc)) { error = g_error_new_literal (NM_MANAGER_ERROR, NM_MANAGER_ERROR_PERMISSION_DENIED, error_desc); g_free (error_desc); goto done; } /* Validate the user request */ chain = nm_auth_chain_new_subject (subject, context, deactivate_net_auth_done_cb, self); if (!chain) { error = g_error_new_literal (NM_MANAGER_ERROR, NM_MANAGER_ERROR_PERMISSION_DENIED, "Unable to authenticate request."); goto done; } priv->auth_chains = g_slist_append (priv->auth_chains, chain); nm_auth_chain_set_data (chain, "path", g_strdup (active_path), g_free); nm_auth_chain_add_call (chain, NM_AUTH_PERMISSION_NETWORK_CONTROL, TRUE); done: g_clear_object (&subject); if (error) dbus_g_method_return_error (context, error); g_clear_error (&error); } static void do_sleep_wake (NMManager *self) { NMManagerPrivate *priv = NM_MANAGER_GET_PRIVATE (self); const GSList *unmanaged_specs; GSList *iter; if (manager_sleeping (self)) { nm_log_info (LOGD_SUSPEND, "sleeping or disabling..."); /* Just deactivate and down all physical devices from the device list, * to keep things fast the device list will get resynced when * the manager wakes up. */ for (iter = priv->devices; iter; iter = iter->next) { NMDevice *device = iter->data; if (!nm_device_is_software (device)) nm_device_set_managed (device, NM_MANAGED_INTERNAL, FALSE, NM_DEVICE_STATE_REASON_SLEEPING); } } else { nm_log_info (LOGD_SUSPEND, "waking up and re-enabling..."); unmanaged_specs = nm_settings_get_unmanaged_specs (priv->settings); /* Ensure rfkill state is up-to-date since we don't respond to state * changes during sleep. */ nm_manager_rfkill_update (self, RFKILL_TYPE_UNKNOWN); /* Re-manage managed devices */ for (iter = priv->devices; iter; iter = iter->next) { NMDevice *device = NM_DEVICE (iter->data); guint i; if (nm_device_is_software (device)) continue; /* enable/disable wireless devices since that we don't respond * to killswitch changes during sleep. */ for (i = 0; i < RFKILL_TYPE_MAX; i++) { RadioState *rstate = &priv->radio_states[i]; gboolean enabled = radio_enabled_for_rstate (rstate, TRUE); if (rstate->desc) { nm_log_dbg (LOGD_RFKILL, "%s %s devices (hw_enabled %d, sw_enabled %d, user_enabled %d)", enabled ? "enabling" : "disabling", rstate->desc, rstate->hw_enabled, rstate->sw_enabled, rstate->user_enabled); } if (nm_device_get_rfkill_type (device) == rstate->rtype) nm_device_set_enabled (device, enabled); } g_object_set (G_OBJECT (device), NM_DEVICE_AUTOCONNECT, TRUE, NULL); if (nm_device_spec_match_list (device, unmanaged_specs)) nm_device_set_managed (device, NM_MANAGED_INTERNAL, FALSE, NM_DEVICE_STATE_REASON_NOW_UNMANAGED); else nm_device_set_managed (device, NM_MANAGED_INTERNAL, TRUE, NM_DEVICE_STATE_REASON_NOW_MANAGED); } } nm_manager_update_state (self); } static void _internal_sleep (NMManager *self, gboolean do_sleep) { NMManagerPrivate *priv = NM_MANAGER_GET_PRIVATE (self); if (priv->sleeping == do_sleep) return; nm_log_info (LOGD_SUSPEND, "%s requested (sleeping: %s enabled: %s)", do_sleep ? "sleep" : "wake", priv->sleeping ? "yes" : "no", priv->net_enabled ? "yes" : "no"); priv->sleeping = do_sleep; do_sleep_wake (self); g_object_notify (G_OBJECT (self), NM_MANAGER_SLEEPING); } #if 0 static void sleep_auth_done_cb (NMAuthChain *chain, GError *error, DBusGMethodInvocation *context, gpointer user_data) { NMManager *self = NM_MANAGER (user_data); NMManagerPrivate *priv = NM_MANAGER_GET_PRIVATE (self); GError *ret_error; NMAuthCallResult result; gboolean do_sleep; priv->auth_chains = g_slist_remove (priv->auth_chains, chain); result = nm_auth_chain_get_result (chain, NM_AUTH_PERMISSION_SLEEP_WAKE); if (error) { nm_log_dbg (LOGD_SUSPEND, "Sleep/wake request failed: %s", error->message); ret_error = g_error_new (NM_MANAGER_ERROR, NM_MANAGER_ERROR_PERMISSION_DENIED, "Sleep/wake request failed: %s", error->message); dbus_g_method_return_error (context, ret_error); g_error_free (ret_error); } else if (result != NM_AUTH_CALL_RESULT_YES) { ret_error = g_error_new_literal (NM_MANAGER_ERROR, NM_MANAGER_ERROR_PERMISSION_DENIED, "Not authorized to sleep/wake"); dbus_g_method_return_error (context, ret_error); g_error_free (ret_error); } else { /* Auth success */ do_sleep = GPOINTER_TO_UINT (nm_auth_chain_get_data (chain, "sleep")); _internal_sleep (self, do_sleep); dbus_g_method_return (context); } nm_auth_chain_unref (chain); } #endif static void impl_manager_sleep (NMManager *self, gboolean do_sleep, DBusGMethodInvocation *context) { NMManagerPrivate *priv; GError *error = NULL; #if 0 NMAuthChain *chain; const char *error_desc = NULL; #endif g_return_if_fail (NM_IS_MANAGER (self)); priv = NM_MANAGER_GET_PRIVATE (self); if (priv->sleeping == do_sleep) { error = g_error_new (NM_MANAGER_ERROR, NM_MANAGER_ERROR_ALREADY_ASLEEP_OR_AWAKE, "Already %s", do_sleep ? "asleep" : "awake"); dbus_g_method_return_error (context, error); g_error_free (error); return; } /* Unconditionally allow the request. Previously it was polkit protected * but unfortunately that doesn't work for short-lived processes like * pm-utils. It uses dbus-send without --print-reply, which quits * immediately after sending the request, and NM is unable to obtain the * sender's UID as dbus-send has already dropped off the bus. Thus NM * fails the request. Instead, don't validate the request, but rely on * D-Bus permissions to restrict the call to root. */ _internal_sleep (self, do_sleep); dbus_g_method_return (context); return; #if 0 chain = nm_auth_chain_new (context, sleep_auth_done_cb, self, &error_desc); if (chain) { priv->auth_chains = g_slist_append (priv->auth_chains, chain); nm_auth_chain_set_data (chain, "sleep", GUINT_TO_POINTER (do_sleep), NULL); nm_auth_chain_add_call (chain, NM_AUTH_PERMISSION_SLEEP_WAKE, TRUE); } else { error = g_error_new_literal (NM_MANAGER_ERROR, NM_MANAGER_ERROR_PERMISSION_DENIED, error_desc); dbus_g_method_return_error (context, error); g_error_free (error); } #endif } static void sleeping_cb (DBusGProxy *proxy, gpointer user_data) { nm_log_dbg (LOGD_SUSPEND, "Received sleeping signal"); _internal_sleep (NM_MANAGER (user_data), TRUE); } static void resuming_cb (DBusGProxy *proxy, gpointer user_data) { nm_log_dbg (LOGD_SUSPEND, "Received resuming signal"); _internal_sleep (NM_MANAGER (user_data), FALSE); } static void _internal_enable (NMManager *self, gboolean enable) { NMManagerPrivate *priv = NM_MANAGER_GET_PRIVATE (self); GError *err = NULL; /* Update "NetworkingEnabled" key in state file */ if (priv->state_file) { if (!write_value_to_state_file (priv->state_file, "main", "NetworkingEnabled", G_TYPE_BOOLEAN, (gpointer) &enable, &err)) { /* Not a hard error */ nm_log_warn (LOGD_SUSPEND, "writing to state file %s failed: (%d) %s.", priv->state_file, err ? err->code : -1, (err && err->message) ? err->message : "unknown"); } } nm_log_info (LOGD_SUSPEND, "%s requested (sleeping: %s enabled: %s)", enable ? "enable" : "disable", priv->sleeping ? "yes" : "no", priv->net_enabled ? "yes" : "no"); priv->net_enabled = enable; do_sleep_wake (self); g_object_notify (G_OBJECT (self), NM_MANAGER_NETWORKING_ENABLED); } static void enable_net_done_cb (NMAuthChain *chain, GError *error, DBusGMethodInvocation *context, gpointer user_data) { NMManager *self = NM_MANAGER (user_data); NMManagerPrivate *priv = NM_MANAGER_GET_PRIVATE (self); GError *ret_error = NULL; NMAuthCallResult result; gboolean enable; g_assert (context); priv->auth_chains = g_slist_remove (priv->auth_chains, chain); result = nm_auth_chain_get_result (chain, NM_AUTH_PERMISSION_ENABLE_DISABLE_NETWORK); if (error) { nm_log_dbg (LOGD_CORE, "Enable request failed: %s", error->message); ret_error = g_error_new (NM_MANAGER_ERROR, NM_MANAGER_ERROR_PERMISSION_DENIED, "Enable request failed: %s", error->message); } else if (result != NM_AUTH_CALL_RESULT_YES) { ret_error = g_error_new_literal (NM_MANAGER_ERROR, NM_MANAGER_ERROR_PERMISSION_DENIED, "Not authorized to enable/disable networking"); } else { /* Auth success */ enable = GPOINTER_TO_UINT (nm_auth_chain_get_data (chain, "enable")); _internal_enable (self, enable); dbus_g_method_return (context); } if (ret_error) { dbus_g_method_return_error (context, ret_error); g_error_free (ret_error); } nm_auth_chain_unref (chain); } static void impl_manager_enable (NMManager *self, gboolean enable, DBusGMethodInvocation *context) { NMManagerPrivate *priv; NMAuthChain *chain; GError *error = NULL; g_return_if_fail (NM_IS_MANAGER (self)); priv = NM_MANAGER_GET_PRIVATE (self); if (priv->net_enabled == enable) { error = g_error_new (NM_MANAGER_ERROR, NM_MANAGER_ERROR_ALREADY_ENABLED_OR_DISABLED, "Already %s", enable ? "enabled" : "disabled"); goto done; } chain = nm_auth_chain_new_context (context, enable_net_done_cb, self); if (!chain) { error = g_error_new_literal (NM_MANAGER_ERROR, NM_MANAGER_ERROR_PERMISSION_DENIED, "Unable to authenticate request."); goto done; } priv->auth_chains = g_slist_append (priv->auth_chains, chain); nm_auth_chain_set_data (chain, "enable", GUINT_TO_POINTER (enable), NULL); nm_auth_chain_add_call (chain, NM_AUTH_PERMISSION_ENABLE_DISABLE_NETWORK, TRUE); done: if (error) dbus_g_method_return_error (context, error); g_clear_error (&error); } /* Permissions */ static void get_perm_add_result (NMAuthChain *chain, GHashTable *results, const char *permission) { NMAuthCallResult result; result = nm_auth_chain_get_result (chain, permission); if (result == NM_AUTH_CALL_RESULT_YES) g_hash_table_insert (results, (char *) permission, "yes"); else if (result == NM_AUTH_CALL_RESULT_NO) g_hash_table_insert (results, (char *) permission, "no"); else if (result == NM_AUTH_CALL_RESULT_AUTH) g_hash_table_insert (results, (char *) permission, "auth"); else { nm_log_dbg (LOGD_CORE, "unknown auth chain result %d", result); } } static void get_permissions_done_cb (NMAuthChain *chain, GError *error, DBusGMethodInvocation *context, gpointer user_data) { NMManager *self = NM_MANAGER (user_data); NMManagerPrivate *priv = NM_MANAGER_GET_PRIVATE (self); GError *ret_error; GHashTable *results; g_assert (context); priv->auth_chains = g_slist_remove (priv->auth_chains, chain); if (error) { nm_log_dbg (LOGD_CORE, "Permissions request failed: %s", error->message); ret_error = g_error_new (NM_MANAGER_ERROR, NM_MANAGER_ERROR_PERMISSION_DENIED, "Permissions request failed: %s", error->message); dbus_g_method_return_error (context, ret_error); g_error_free (ret_error); } else { results = g_hash_table_new (g_str_hash, g_str_equal); get_perm_add_result (chain, results, NM_AUTH_PERMISSION_ENABLE_DISABLE_NETWORK); get_perm_add_result (chain, results, NM_AUTH_PERMISSION_SLEEP_WAKE); get_perm_add_result (chain, results, NM_AUTH_PERMISSION_ENABLE_DISABLE_WIFI); get_perm_add_result (chain, results, NM_AUTH_PERMISSION_ENABLE_DISABLE_WWAN); get_perm_add_result (chain, results, NM_AUTH_PERMISSION_ENABLE_DISABLE_WIMAX); get_perm_add_result (chain, results, NM_AUTH_PERMISSION_NETWORK_CONTROL); get_perm_add_result (chain, results, NM_AUTH_PERMISSION_WIFI_SHARE_PROTECTED); get_perm_add_result (chain, results, NM_AUTH_PERMISSION_WIFI_SHARE_OPEN); get_perm_add_result (chain, results, NM_AUTH_PERMISSION_SETTINGS_MODIFY_SYSTEM); get_perm_add_result (chain, results, NM_AUTH_PERMISSION_SETTINGS_MODIFY_OWN); get_perm_add_result (chain, results, NM_AUTH_PERMISSION_SETTINGS_MODIFY_HOSTNAME); dbus_g_method_return (context, results); g_hash_table_destroy (results); } nm_auth_chain_unref (chain); } static void impl_manager_get_permissions (NMManager *self, DBusGMethodInvocation *context) { NMManagerPrivate *priv = NM_MANAGER_GET_PRIVATE (self); NMAuthChain *chain; GError *error = NULL; chain = nm_auth_chain_new_context (context, get_permissions_done_cb, self); if (!chain) { error = g_error_new_literal (NM_MANAGER_ERROR, NM_MANAGER_ERROR_PERMISSION_DENIED, "Unable to authenticate request."); dbus_g_method_return_error (context, error); g_clear_error (&error); return; } priv->auth_chains = g_slist_append (priv->auth_chains, chain); nm_auth_chain_add_call (chain, NM_AUTH_PERMISSION_ENABLE_DISABLE_NETWORK, FALSE); nm_auth_chain_add_call (chain, NM_AUTH_PERMISSION_SLEEP_WAKE, FALSE); nm_auth_chain_add_call (chain, NM_AUTH_PERMISSION_ENABLE_DISABLE_WIFI, FALSE); nm_auth_chain_add_call (chain, NM_AUTH_PERMISSION_ENABLE_DISABLE_WWAN, FALSE); nm_auth_chain_add_call (chain, NM_AUTH_PERMISSION_ENABLE_DISABLE_WIMAX, FALSE); nm_auth_chain_add_call (chain, NM_AUTH_PERMISSION_NETWORK_CONTROL, FALSE); nm_auth_chain_add_call (chain, NM_AUTH_PERMISSION_WIFI_SHARE_PROTECTED, FALSE); nm_auth_chain_add_call (chain, NM_AUTH_PERMISSION_WIFI_SHARE_OPEN, FALSE); nm_auth_chain_add_call (chain, NM_AUTH_PERMISSION_SETTINGS_MODIFY_SYSTEM, FALSE); nm_auth_chain_add_call (chain, NM_AUTH_PERMISSION_SETTINGS_MODIFY_OWN, FALSE); nm_auth_chain_add_call (chain, NM_AUTH_PERMISSION_SETTINGS_MODIFY_HOSTNAME, FALSE); } static gboolean impl_manager_get_state (NMManager *manager, guint32 *state, GError **error) { nm_manager_update_state (manager); *state = NM_MANAGER_GET_PRIVATE (manager)->state; return TRUE; } static void impl_manager_set_logging (NMManager *manager, const char *level, const char *domains, DBusGMethodInvocation *context) { NMManagerPrivate *priv = NM_MANAGER_GET_PRIVATE (manager); GError *error = NULL; gulong caller_uid = G_MAXULONG; if (!nm_dbus_manager_get_caller_info (priv->dbus_mgr, context, NULL, &caller_uid, NULL)) { error = g_error_new_literal (NM_MANAGER_ERROR, NM_MANAGER_ERROR_PERMISSION_DENIED, "Failed to get request UID."); goto done; } if (0 != caller_uid) { error = g_error_new_literal (NM_MANAGER_ERROR, NM_MANAGER_ERROR_PERMISSION_DENIED, "Permission denied"); goto done; } if (nm_logging_setup (level, domains, NULL, &error)) { char *new_level = nm_logging_level_to_string (); char *new_domains = nm_logging_domains_to_string (); nm_log_info (LOGD_CORE, "logging: level '%s' domains '%s'", new_level, new_domains); g_free (new_level); g_free (new_domains); } done: if (error) { dbus_g_method_return_error (context, error); g_error_free (error); } else dbus_g_method_return (context); } static void impl_manager_get_logging (NMManager *manager, char **level, char **domains) { *level = nm_logging_level_to_string (); *domains = nm_logging_domains_to_string (); } static void connectivity_check_done (GObject *object, GAsyncResult *result, gpointer user_data) { DBusGMethodInvocation *context = user_data; NMConnectivityState state; GError *error = NULL; state = nm_connectivity_check_finish (NM_CONNECTIVITY (object), result, &error); if (error) { dbus_g_method_return_error (context, error); g_error_free (error); } else dbus_g_method_return (context, state); } static void check_connectivity_auth_done_cb (NMAuthChain *chain, GError *auth_error, DBusGMethodInvocation *context, gpointer user_data) { NMManager *self = NM_MANAGER (user_data); NMManagerPrivate *priv = NM_MANAGER_GET_PRIVATE (self); GError *error = NULL; NMAuthCallResult result; priv->auth_chains = g_slist_remove (priv->auth_chains, chain); result = nm_auth_chain_get_result (chain, NM_AUTH_PERMISSION_NETWORK_CONTROL); if (auth_error) { nm_log_dbg (LOGD_CORE, "CheckConnectivity request failed: %s", auth_error->message); error = g_error_new (NM_MANAGER_ERROR, NM_MANAGER_ERROR_PERMISSION_DENIED, "Connectivity check request failed: %s", auth_error->message); } else if (result != NM_AUTH_CALL_RESULT_YES) { error = g_error_new_literal (NM_MANAGER_ERROR, NM_MANAGER_ERROR_PERMISSION_DENIED, "Not authorized to recheck connectivity"); } else { /* it's allowed */ nm_connectivity_check_async (priv->connectivity, connectivity_check_done, context); } if (error) { dbus_g_method_return_error (context, error); g_error_free (error); } nm_auth_chain_unref (chain); } static void impl_manager_check_connectivity (NMManager *manager, DBusGMethodInvocation *context) { NMManagerPrivate *priv = NM_MANAGER_GET_PRIVATE (manager); NMAuthChain *chain; GError *error = NULL; /* Validate the request */ chain = nm_auth_chain_new_context (context, check_connectivity_auth_done_cb, manager); if (!chain) { error = g_error_new_literal (NM_MANAGER_ERROR, NM_MANAGER_ERROR_PERMISSION_DENIED, "Unable to authenticate request."); dbus_g_method_return_error (context, error); g_clear_error (&error); return; } priv->auth_chains = g_slist_append (priv->auth_chains, chain); nm_auth_chain_add_call (chain, NM_AUTH_PERMISSION_NETWORK_CONTROL, TRUE); } void nm_manager_start (NMManager *self) { NMManagerPrivate *priv = NM_MANAGER_GET_PRIVATE (self); guint i; /* Set initial radio enabled/disabled state */ for (i = 0; i < RFKILL_TYPE_MAX; i++) { RadioState *rstate = &priv->radio_states[i]; RfKillState udev_state; gboolean enabled; if (!rstate->desc) continue; udev_state = nm_rfkill_manager_get_rfkill_state (priv->rfkill_mgr, i); update_rstate_from_rfkill (rstate, udev_state); if (rstate->desc) { nm_log_info (LOGD_RFKILL, "%s %s by radio killswitch; %s by state file", rstate->desc, (rstate->hw_enabled && rstate->sw_enabled) ? "enabled" : "disabled", rstate->user_enabled ? "enabled" : "disabled"); } enabled = radio_enabled_for_rstate (rstate, TRUE); manager_update_radio_enabled (self, rstate, enabled); } /* Log overall networking status - enabled/disabled */ nm_log_info (LOGD_CORE, "Networking is %s by state file", priv->net_enabled ? "enabled" : "disabled"); system_unmanaged_devices_changed_cb (priv->settings, NULL, self); system_hostname_changed_cb (priv->settings, NULL, self); nm_platform_query_devices (); /* * Connections added before the manager is started do not emit * connection-added signals thus devices have to be created manually. */ system_create_virtual_devices (self); check_if_startup_complete (self); } static gboolean handle_firmware_changed (gpointer user_data) { NMManager *self = NM_MANAGER (user_data); NMManagerPrivate *priv = NM_MANAGER_GET_PRIVATE (self); GSList *iter; priv->fw_changed_id = 0; if (manager_sleeping (self)) return FALSE; /* Try to re-enable devices with missing firmware */ for (iter = priv->devices; iter; iter = iter->next) { NMDevice *candidate = NM_DEVICE (iter->data); NMDeviceState state = nm_device_get_state (candidate); if ( nm_device_get_firmware_missing (candidate) && (state == NM_DEVICE_STATE_UNAVAILABLE)) { nm_log_info (LOGD_CORE, "(%s): firmware may now be available", nm_device_get_iface (candidate)); /* Re-set unavailable state to try bringing the device up again */ nm_device_state_changed (candidate, NM_DEVICE_STATE_UNAVAILABLE, NM_DEVICE_STATE_REASON_NONE); } } return FALSE; } static void connectivity_changed (NMConnectivity *connectivity, GParamSpec *pspec, gpointer user_data) { NMManager *self = NM_MANAGER (user_data); NMConnectivityState state; static const char *connectivity_states[] = { "UNKNOWN", "NONE", "PORTAL", "LIMITED", "FULL" }; state = nm_connectivity_get_state (connectivity); nm_log_dbg (LOGD_CORE, "connectivity checking indicates %s", connectivity_states[state]); nm_manager_update_state (self); g_object_notify (G_OBJECT (self), NM_MANAGER_CONNECTIVITY); } static void firmware_dir_changed (GFileMonitor *monitor, GFile *file, GFile *other_file, GFileMonitorEvent event_type, gpointer user_data) { NMManager *self = NM_MANAGER (user_data); NMManagerPrivate *priv = NM_MANAGER_GET_PRIVATE (self); switch (event_type) { case G_FILE_MONITOR_EVENT_CREATED: case G_FILE_MONITOR_EVENT_CHANGED: case G_FILE_MONITOR_EVENT_MOVED: case G_FILE_MONITOR_EVENT_ATTRIBUTE_CHANGED: case G_FILE_MONITOR_EVENT_CHANGES_DONE_HINT: if (!priv->fw_changed_id) { priv->fw_changed_id = g_timeout_add_seconds (4, handle_firmware_changed, self); nm_log_info (LOGD_CORE, "kernel firmware directory '%s' changed", KERNEL_FIRMWARE_DIR); } break; default: break; } } static void policy_default_device_changed (GObject *object, GParamSpec *pspec, gpointer user_data) { NMManager *self = NM_MANAGER (user_data); NMManagerPrivate *priv = NM_MANAGER_GET_PRIVATE (self); NMDevice *best; NMActiveConnection *ac; /* Note: this assumes that it's not possible for the IP4 default * route to be going over the default-ip6-device. If that changes, * we need something more complicated here. */ best = nm_policy_get_default_ip4_device (priv->policy); if (!best) best = nm_policy_get_default_ip6_device (priv->policy); if (best) ac = NM_ACTIVE_CONNECTION (nm_device_get_act_request (best)); else ac = NULL; if (ac != priv->primary_connection) { g_clear_object (&priv->primary_connection); priv->primary_connection = ac ? g_object_ref (ac) : NULL; nm_log_dbg (LOGD_CORE, "PrimaryConnection now %s", ac ? nm_active_connection_get_id (ac) : "(none)"); g_object_notify (G_OBJECT (self), NM_MANAGER_PRIMARY_CONNECTION); } } static void policy_activating_device_changed (GObject *object, GParamSpec *pspec, gpointer user_data) { NMManager *self = NM_MANAGER (user_data); NMManagerPrivate *priv = NM_MANAGER_GET_PRIVATE (self); NMDevice *activating, *best; NMActiveConnection *ac; /* We only look at activating-ip6-device if activating-ip4-device * AND default-ip4-device are NULL; if default-ip4-device is * non-NULL, then activating-ip6-device is irrelevant, since while * that device might become the new default-ip6-device, it can't * become primary-connection while default-ip4-device is set to * something else. */ activating = nm_policy_get_activating_ip4_device (priv->policy); best = nm_policy_get_default_ip4_device (priv->policy); if (!activating && !best) activating = nm_policy_get_activating_ip6_device (priv->policy); if (activating) ac = NM_ACTIVE_CONNECTION (nm_device_get_act_request (activating)); else ac = NULL; if (ac != priv->activating_connection) { g_clear_object (&priv->activating_connection); priv->activating_connection = ac ? g_object_ref (ac) : NULL; nm_log_dbg (LOGD_CORE, "ActivatingConnection now %s", ac ? nm_active_connection_get_id (ac) : "(none)"); g_object_notify (G_OBJECT (self), NM_MANAGER_ACTIVATING_CONNECTION); } } #define NM_PERM_DENIED_ERROR "org.freedesktop.NetworkManager.PermissionDenied" #define DEV_PERM_DENIED_ERROR "org.freedesktop.NetworkManager.Device.PermissionDenied" static void prop_set_auth_done_cb (NMAuthChain *chain, GError *error, DBusGMethodInvocation *context, gpointer user_data) { NMManager *self = NM_MANAGER (user_data); NMManagerPrivate *priv = NM_MANAGER_GET_PRIVATE (self); DBusConnection *connection; NMAuthCallResult result; DBusMessage *reply = NULL, *message; const char *permission, *prop; GObject *obj; gboolean set_enabled = TRUE; priv->auth_chains = g_slist_remove (priv->auth_chains, chain); message = nm_auth_chain_get_data (chain, "message"); permission = nm_auth_chain_get_data (chain, "permission"); prop = nm_auth_chain_get_data (chain, "prop"); set_enabled = GPOINTER_TO_UINT (nm_auth_chain_get_data (chain, "enabled")); obj = nm_auth_chain_get_data (chain, "object"); result = nm_auth_chain_get_result (chain, permission); if (error || (result != NM_AUTH_CALL_RESULT_YES)) { reply = dbus_message_new_error (message, NM_IS_DEVICE (obj) ? DEV_PERM_DENIED_ERROR : NM_PERM_DENIED_ERROR, "Not authorized to perform this operation"); } else { g_object_set (obj, prop, set_enabled, NULL); reply = dbus_message_new_method_return (message); } g_assert (reply); connection = nm_auth_chain_get_data (chain, "connection"); g_assert (connection); dbus_connection_send (connection, reply, NULL); dbus_message_unref (reply); nm_auth_chain_unref (chain); } static DBusHandlerResult prop_filter (DBusConnection *connection, DBusMessage *message, void *user_data) { NMManager *self = NM_MANAGER (user_data); NMManagerPrivate *priv = NM_MANAGER_GET_PRIVATE (self); DBusMessageIter iter; DBusMessageIter sub; const char *propiface = NULL; const char *propname = NULL; const char *glib_propname = NULL, *permission = NULL; DBusMessage *reply = NULL; gboolean set_enabled = FALSE; NMAuthSubject *subject = NULL; NMAuthChain *chain; GObject *obj; /* The sole purpose of this function is to validate property accesses * on the NMManager object since dbus-glib doesn't yet give us this * functionality. */ if (!dbus_message_is_method_call (message, DBUS_INTERFACE_PROPERTIES, "Set")) return DBUS_HANDLER_RESULT_NOT_YET_HANDLED; dbus_message_iter_init (message, &iter); /* Get the D-Bus interface of the property to set */ if (dbus_message_iter_get_arg_type (&iter) != DBUS_TYPE_STRING) return DBUS_HANDLER_RESULT_NOT_YET_HANDLED; dbus_message_iter_get_basic (&iter, &propiface); if (!propiface || (strcmp (propiface, NM_DBUS_INTERFACE) && strcmp (propiface, NM_DBUS_INTERFACE_DEVICE))) return DBUS_HANDLER_RESULT_NOT_YET_HANDLED; dbus_message_iter_next (&iter); /* Get the property name that's going to be set */ if (dbus_message_iter_get_arg_type (&iter) != DBUS_TYPE_STRING) return DBUS_HANDLER_RESULT_NOT_YET_HANDLED; dbus_message_iter_get_basic (&iter, &propname); dbus_message_iter_next (&iter); if (!strcmp (propname, "WirelessEnabled")) { glib_propname = NM_MANAGER_WIRELESS_ENABLED; permission = NM_AUTH_PERMISSION_ENABLE_DISABLE_WIFI; } else if (!strcmp (propname, "WwanEnabled")) { glib_propname = NM_MANAGER_WWAN_ENABLED; permission = NM_AUTH_PERMISSION_ENABLE_DISABLE_WWAN; } else if (!strcmp (propname, "WimaxEnabled")) { glib_propname = NM_MANAGER_WIMAX_ENABLED; permission = NM_AUTH_PERMISSION_ENABLE_DISABLE_WIMAX; } else if (!strcmp (propname, "Autoconnect")) { glib_propname = NM_DEVICE_AUTOCONNECT; permission = NM_AUTH_PERMISSION_NETWORK_CONTROL; } else return DBUS_HANDLER_RESULT_NOT_YET_HANDLED; /* Get the new value for the property */ if (dbus_message_iter_get_arg_type (&iter) != DBUS_TYPE_VARIANT) return DBUS_HANDLER_RESULT_NOT_YET_HANDLED; dbus_message_iter_recurse (&iter, &sub); if (dbus_message_iter_get_arg_type (&sub) != DBUS_TYPE_BOOLEAN) return DBUS_HANDLER_RESULT_NOT_YET_HANDLED; dbus_message_iter_get_basic (&sub, &set_enabled); /* Make sure the object exists */ obj = dbus_g_connection_lookup_g_object (dbus_connection_get_g_connection (connection), dbus_message_get_path (message)); if (!obj) { reply = dbus_message_new_error (message, NM_PERM_DENIED_ERROR, "Object does not exist"); goto out; } subject = nm_auth_subject_new_from_message (connection, message); if (!subject) { reply = dbus_message_new_error (message, NM_PERM_DENIED_ERROR, "Could not determine request UID."); goto out; } /* Validate the user request */ chain = nm_auth_chain_new_subject (subject, NULL, prop_set_auth_done_cb, self); if (!chain) { reply = dbus_message_new_error (message, NM_PERM_DENIED_ERROR, "Could not authenticate request."); goto out; } priv->auth_chains = g_slist_append (priv->auth_chains, chain); nm_auth_chain_set_data (chain, "prop", g_strdup (glib_propname), g_free); nm_auth_chain_set_data (chain, "permission", g_strdup (permission), g_free); nm_auth_chain_set_data (chain, "enabled", GUINT_TO_POINTER (set_enabled), NULL); nm_auth_chain_set_data (chain, "message", dbus_message_ref (message), (GDestroyNotify) dbus_message_unref); nm_auth_chain_set_data (chain, "connection", dbus_connection_ref (connection), (GDestroyNotify) dbus_connection_unref); nm_auth_chain_set_data (chain, "object", g_object_ref (obj), (GDestroyNotify) g_object_unref); nm_auth_chain_add_call (chain, permission, TRUE); out: if (reply) { dbus_connection_send (connection, reply, NULL); dbus_message_unref (reply); } g_clear_object (&subject); return DBUS_HANDLER_RESULT_HANDLED; } static void authority_changed_cb (gpointer user_data) { /* Let clients know they should re-check their authorization */ g_signal_emit (NM_MANAGER (user_data), signals[CHECK_PERMISSIONS], 0); } #define KERN_RFKILL_OP_CHANGE_ALL 3 #define KERN_RFKILL_TYPE_WLAN 1 struct rfkill_event { __u32 idx; __u8 type; __u8 op; __u8 soft, hard; } __attribute__((packed)); static void rfkill_change_wifi (const char *desc, gboolean enabled) { int fd; struct rfkill_event event; ssize_t len; errno = 0; fd = open ("/dev/rfkill", O_RDWR); if (fd < 0) { if (errno == EACCES) nm_log_warn (LOGD_RFKILL, "(%s): failed to open killswitch device " "for WiFi radio control", desc); return; } if (fcntl (fd, F_SETFL, O_NONBLOCK) < 0) { nm_log_warn (LOGD_RFKILL, "(%s): failed to set killswitch device for " "non-blocking operation", desc); close (fd); return; } memset (&event, 0, sizeof (event)); event.op = KERN_RFKILL_OP_CHANGE_ALL; event.type = KERN_RFKILL_TYPE_WLAN; event.soft = enabled ? 0 : 1; len = write (fd, &event, sizeof (event)); if (len < 0) { nm_log_warn (LOGD_RFKILL, "(%s): failed to change WiFi killswitch state: (%d) %s", desc, errno, g_strerror (errno)); } else if (len == sizeof (event)) { nm_log_info (LOGD_RFKILL, "%s hardware radio set %s", desc, enabled ? "enabled" : "disabled"); } else { /* Failed to write full structure */ nm_log_warn (LOGD_RFKILL, "(%s): failed to change WiFi killswitch state", desc); } close (fd); } static void manager_radio_user_toggled (NMManager *self, RadioState *rstate, gboolean enabled) { NMManagerPrivate *priv = NM_MANAGER_GET_PRIVATE (self); GError *error = NULL; gboolean old_enabled, new_enabled; if (rstate->desc) { nm_log_dbg (LOGD_RFKILL, "(%s): setting radio %s by user", rstate->desc, enabled ? "enabled" : "disabled"); } /* Update enabled key in state file */ if (priv->state_file) { if (!write_value_to_state_file (priv->state_file, "main", rstate->key, G_TYPE_BOOLEAN, (gpointer) &enabled, &error)) { nm_log_warn (LOGD_CORE, "writing to state file %s failed: (%d) %s.", priv->state_file, error ? error->code : -1, (error && error->message) ? error->message : "unknown"); g_clear_error (&error); } } /* When the user toggles the radio, their request should override any * daemon (like ModemManager) enabled state that can be changed. For WWAN * for example, we want the WwanEnabled property to reflect the daemon state * too so that users can toggle the modem powered, but we don't want that * daemon state to affect whether or not the user *can* turn it on, which is * what the kernel rfkill state does. So we ignore daemon enabled state * when determining what the new state should be since it shouldn't block * the user's request. */ old_enabled = radio_enabled_for_rstate (rstate, TRUE); rstate->user_enabled = enabled; new_enabled = radio_enabled_for_rstate (rstate, FALSE); if (new_enabled != old_enabled) { manager_update_radio_enabled (self, rstate, new_enabled); /* For WiFi only (for now) set the actual kernel rfkill state */ if (rstate->rtype == RFKILL_TYPE_WLAN) rfkill_change_wifi (rstate->desc, new_enabled); } } static gboolean periodic_update_active_connection_timestamps (gpointer user_data) { NMManager *manager = NM_MANAGER (user_data); NMManagerPrivate *priv = NM_MANAGER_GET_PRIVATE (manager); GSList *iter; for (iter = priv->active_connections; iter; iter = g_slist_next (iter)) { NMActiveConnection *ac = iter->data; NMSettingsConnection *connection; if (nm_active_connection_get_state (ac) == NM_ACTIVE_CONNECTION_STATE_ACTIVATED) { connection = NM_SETTINGS_CONNECTION (nm_active_connection_get_connection (ac)); nm_settings_connection_update_timestamp (connection, (guint64) time (NULL), FALSE); } } return TRUE; } static void dbus_connection_changed_cb (NMDBusManager *dbus_mgr, DBusConnection *dbus_connection, gpointer user_data) { NMManager *self = NM_MANAGER (user_data); gboolean success = FALSE; if (dbus_connection) { /* Register property filter on new connection; there's no reason this * should fail except out-of-memory or program error; if it does fail * then there's no Manager property access control, which is bad. */ success = dbus_connection_add_filter (dbus_connection, prop_filter, self, NULL); g_assert (success); } NM_MANAGER_GET_PRIVATE (self)->prop_filter_added = success; } /**********************************************************************/ static NMManager *singleton = NULL; NMManager * nm_manager_get (void) { g_assert (singleton); return singleton; } NMConnectionProvider * nm_connection_provider_get (void) { g_assert (singleton); g_assert (NM_MANAGER_GET_PRIVATE (singleton)->settings); return NM_CONNECTION_PROVIDER (NM_MANAGER_GET_PRIVATE (singleton)->settings); } NMManager * nm_manager_new (NMSettings *settings, const char *state_file, gboolean initial_net_enabled, gboolean initial_wifi_enabled, gboolean initial_wwan_enabled, gboolean initial_wimax_enabled, GError **error) { NMManagerPrivate *priv; DBusGConnection *bus; DBusConnection *dbus_connection; g_assert (settings); /* Can only be called once */ g_assert (singleton == NULL); singleton = (NMManager *) g_object_new (NM_TYPE_MANAGER, NULL); g_assert (singleton); priv = NM_MANAGER_GET_PRIVATE (singleton); bus = nm_dbus_manager_get_connection (priv->dbus_mgr); if (!bus) { g_set_error_literal (error, NM_MANAGER_ERROR, NM_MANAGER_ERROR_INTERNAL, "Failed to initialize D-Bus connection"); g_object_unref (singleton); return NULL; } dbus_connection = dbus_g_connection_get_connection (bus); g_assert (dbus_connection); priv->policy = nm_policy_new (singleton, settings); g_signal_connect (priv->policy, "notify::" NM_POLICY_DEFAULT_IP4_DEVICE, G_CALLBACK (policy_default_device_changed), singleton); g_signal_connect (priv->policy, "notify::" NM_POLICY_DEFAULT_IP6_DEVICE, G_CALLBACK (policy_default_device_changed), singleton); g_signal_connect (priv->policy, "notify::" NM_POLICY_ACTIVATING_IP4_DEVICE, G_CALLBACK (policy_activating_device_changed), singleton); g_signal_connect (priv->policy, "notify::" NM_POLICY_ACTIVATING_IP6_DEVICE, G_CALLBACK (policy_activating_device_changed), singleton); priv->connectivity = nm_connectivity_new (); g_signal_connect (priv->connectivity, "notify::" NM_CONNECTIVITY_STATE, G_CALLBACK (connectivity_changed), singleton); if (!dbus_connection_add_filter (dbus_connection, prop_filter, singleton, NULL)) { g_set_error_literal (error, NM_MANAGER_ERROR, NM_MANAGER_ERROR_INTERNAL, "Failed to register DBus connection filter"); g_object_unref (singleton); return NULL; } priv->prop_filter_added = TRUE; priv->settings = g_object_ref (settings); priv->state_file = g_strdup (state_file); priv->net_enabled = initial_net_enabled; priv->radio_states[RFKILL_TYPE_WLAN].user_enabled = initial_wifi_enabled; priv->radio_states[RFKILL_TYPE_WWAN].user_enabled = initial_wwan_enabled; priv->radio_states[RFKILL_TYPE_WIMAX].user_enabled = initial_wimax_enabled; g_signal_connect (priv->settings, "notify::" NM_SETTINGS_UNMANAGED_SPECS, G_CALLBACK (system_unmanaged_devices_changed_cb), singleton); g_signal_connect (priv->settings, "notify::" NM_SETTINGS_HOSTNAME, G_CALLBACK (system_hostname_changed_cb), singleton); g_signal_connect (priv->settings, NM_SETTINGS_SIGNAL_CONNECTION_ADDED, G_CALLBACK (connection_added), singleton); g_signal_connect (priv->settings, NM_SETTINGS_SIGNAL_CONNECTION_UPDATED, G_CALLBACK (connection_changed), singleton); g_signal_connect (priv->settings, NM_SETTINGS_SIGNAL_CONNECTION_REMOVED, G_CALLBACK (connection_removed), singleton); g_signal_connect (priv->settings, NM_SETTINGS_SIGNAL_CONNECTION_VISIBILITY_CHANGED, G_CALLBACK (connection_changed), singleton); nm_dbus_manager_register_object (priv->dbus_mgr, NM_DBUS_PATH, singleton); g_signal_connect (nm_platform_get (), NM_PLATFORM_LINK_ADDED, G_CALLBACK (platform_link_added_cb), singleton); g_signal_connect (nm_platform_get (), NM_PLATFORM_LINK_REMOVED, G_CALLBACK (platform_link_removed_cb), singleton); priv->rfkill_mgr = nm_rfkill_manager_new (); g_signal_connect (priv->rfkill_mgr, "rfkill-changed", G_CALLBACK (rfkill_manager_rfkill_changed_cb), singleton); /* Force kernel WiFi rfkill state to follow NM saved wifi state in case * the BIOS doesn't save rfkill state, and to be consistent with user * changes to the WirelessEnabled property which toggles kernel rfkill. */ rfkill_change_wifi (priv->radio_states[RFKILL_TYPE_WLAN].desc, initial_wifi_enabled); load_device_factories (singleton); return singleton; } static void nm_manager_init (NMManager *manager) { NMManagerPrivate *priv = NM_MANAGER_GET_PRIVATE (manager); DBusGConnection *g_connection; guint i; GFile *file; /* Initialize rfkill structures and states */ memset (priv->radio_states, 0, sizeof (priv->radio_states)); priv->radio_states[RFKILL_TYPE_WLAN].user_enabled = TRUE; priv->radio_states[RFKILL_TYPE_WLAN].key = "WirelessEnabled"; priv->radio_states[RFKILL_TYPE_WLAN].prop = NM_MANAGER_WIRELESS_ENABLED; priv->radio_states[RFKILL_TYPE_WLAN].hw_prop = NM_MANAGER_WIRELESS_HARDWARE_ENABLED; priv->radio_states[RFKILL_TYPE_WLAN].desc = "WiFi"; priv->radio_states[RFKILL_TYPE_WLAN].other_enabled_func = nm_manager_get_ipw_rfkill_state; priv->radio_states[RFKILL_TYPE_WLAN].rtype = RFKILL_TYPE_WLAN; priv->radio_states[RFKILL_TYPE_WWAN].user_enabled = TRUE; priv->radio_states[RFKILL_TYPE_WWAN].key = "WWANEnabled"; priv->radio_states[RFKILL_TYPE_WWAN].prop = NM_MANAGER_WWAN_ENABLED; priv->radio_states[RFKILL_TYPE_WWAN].hw_prop = NM_MANAGER_WWAN_HARDWARE_ENABLED; priv->radio_states[RFKILL_TYPE_WWAN].desc = "WWAN"; priv->radio_states[RFKILL_TYPE_WWAN].daemon_enabled_func = nm_manager_get_modem_enabled_state; priv->radio_states[RFKILL_TYPE_WWAN].rtype = RFKILL_TYPE_WWAN; priv->radio_states[RFKILL_TYPE_WIMAX].user_enabled = TRUE; priv->radio_states[RFKILL_TYPE_WIMAX].key = "WiMAXEnabled"; priv->radio_states[RFKILL_TYPE_WIMAX].prop = NM_MANAGER_WIMAX_ENABLED; priv->radio_states[RFKILL_TYPE_WIMAX].hw_prop = NM_MANAGER_WIMAX_HARDWARE_ENABLED; priv->radio_states[RFKILL_TYPE_WIMAX].desc = "WiMAX"; priv->radio_states[RFKILL_TYPE_WIMAX].other_enabled_func = NULL; priv->radio_states[RFKILL_TYPE_WIMAX].rtype = RFKILL_TYPE_WIMAX; for (i = 0; i < RFKILL_TYPE_MAX; i++) priv->radio_states[i].hw_enabled = TRUE; priv->sleeping = FALSE; priv->state = NM_STATE_DISCONNECTED; priv->startup = TRUE; priv->dbus_mgr = nm_dbus_manager_get (); g_signal_connect (priv->dbus_mgr, NM_DBUS_MANAGER_DBUS_CONNECTION_CHANGED, G_CALLBACK (dbus_connection_changed_cb), manager); priv->vpn_manager = nm_vpn_manager_get (); g_connection = nm_dbus_manager_get_connection (priv->dbus_mgr); /* avahi-autoipd stuff */ priv->aipd_proxy = dbus_g_proxy_new_for_name (g_connection, NM_AUTOIP_DBUS_SERVICE, "/", NM_AUTOIP_DBUS_IFACE); if (priv->aipd_proxy) { dbus_g_object_register_marshaller (g_cclosure_marshal_generic, G_TYPE_NONE, G_TYPE_STRING, G_TYPE_STRING, G_TYPE_STRING, G_TYPE_INVALID); dbus_g_proxy_add_signal (priv->aipd_proxy, "Event", G_TYPE_STRING, G_TYPE_STRING, G_TYPE_STRING, G_TYPE_INVALID); dbus_g_proxy_connect_signal (priv->aipd_proxy, "Event", G_CALLBACK (aipd_handle_event), manager, NULL); } else nm_log_warn (LOGD_AUTOIP4, "could not initialize avahi-autoipd D-Bus proxy"); /* sleep/wake handling */ priv->sleep_monitor = nm_sleep_monitor_get (); g_signal_connect (priv->sleep_monitor, "sleeping", G_CALLBACK (sleeping_cb), manager); g_signal_connect (priv->sleep_monitor, "resuming", G_CALLBACK (resuming_cb), manager); /* Listen for authorization changes */ nm_auth_changed_func_register (authority_changed_cb, manager); /* Monitor the firmware directory */ if (strlen (KERNEL_FIRMWARE_DIR)) { file = g_file_new_for_path (KERNEL_FIRMWARE_DIR "/"); priv->fw_monitor = g_file_monitor_directory (file, G_FILE_MONITOR_NONE, NULL, NULL); g_object_unref (file); } if (priv->fw_monitor) { g_signal_connect (priv->fw_monitor, "changed", G_CALLBACK (firmware_dir_changed), manager); nm_log_info (LOGD_CORE, "monitoring kernel firmware directory '%s'.", KERNEL_FIRMWARE_DIR); } else { nm_log_warn (LOGD_CORE, "failed to monitor kernel firmware directory '%s'.", KERNEL_FIRMWARE_DIR); } /* Update timestamps in active connections */ priv->timestamp_update_id = g_timeout_add_seconds (300, (GSourceFunc) periodic_update_active_connection_timestamps, manager); } static void get_property (GObject *object, guint prop_id, GValue *value, GParamSpec *pspec) { NMManager *self = NM_MANAGER (object); NMManagerPrivate *priv = NM_MANAGER_GET_PRIVATE (self); GSList *iter; GPtrArray *array; const char *path; switch (prop_id) { case PROP_VERSION: g_value_set_string (value, VERSION); break; case PROP_STATE: nm_manager_update_state (self); g_value_set_uint (value, priv->state); break; case PROP_STARTUP: g_value_set_boolean (value, priv->startup); break; case PROP_NETWORKING_ENABLED: g_value_set_boolean (value, priv->net_enabled); break; case PROP_WIRELESS_ENABLED: g_value_set_boolean (value, radio_enabled_for_type (self, RFKILL_TYPE_WLAN, TRUE)); break; case PROP_WIRELESS_HARDWARE_ENABLED: g_value_set_boolean (value, priv->radio_states[RFKILL_TYPE_WLAN].hw_enabled); break; case PROP_WWAN_ENABLED: g_value_set_boolean (value, radio_enabled_for_type (self, RFKILL_TYPE_WWAN, TRUE)); break; case PROP_WWAN_HARDWARE_ENABLED: g_value_set_boolean (value, priv->radio_states[RFKILL_TYPE_WWAN].hw_enabled); break; case PROP_WIMAX_ENABLED: g_value_set_boolean (value, radio_enabled_for_type (self, RFKILL_TYPE_WIMAX, TRUE)); break; case PROP_WIMAX_HARDWARE_ENABLED: g_value_set_boolean (value, priv->radio_states[RFKILL_TYPE_WIMAX].hw_enabled); break; case PROP_ACTIVE_CONNECTIONS: array = g_ptr_array_sized_new (3); for (iter = priv->active_connections; iter; iter = g_slist_next (iter)) { path = nm_active_connection_get_path (NM_ACTIVE_CONNECTION (iter->data)); if (path) g_ptr_array_add (array, g_strdup (path)); } g_value_take_boxed (value, array); break; case PROP_CONNECTIVITY: g_value_set_uint (value, nm_connectivity_get_state (priv->connectivity)); break; case PROP_PRIMARY_CONNECTION: path = priv->primary_connection ? nm_active_connection_get_path (priv->primary_connection) : NULL; g_value_set_boxed (value, path ? path : "/"); break; case PROP_ACTIVATING_CONNECTION: path = priv->activating_connection ? nm_active_connection_get_path (priv->activating_connection) : NULL; g_value_set_boxed (value, path ? path : "/"); break; case PROP_HOSTNAME: g_value_set_string (value, priv->hostname); break; case PROP_SLEEPING: g_value_set_boolean (value, priv->sleeping); break; case PROP_DEVICES: array = g_ptr_array_sized_new (5); for (iter = priv->devices; iter; iter = g_slist_next (iter)) { path = nm_device_get_path (NM_DEVICE (iter->data)); if (path) g_ptr_array_add (array, g_strdup (path)); } g_value_take_boxed (value, array); break; default: G_OBJECT_WARN_INVALID_PROPERTY_ID (object, prop_id, pspec); break; } } static void set_property (GObject *object, guint prop_id, const GValue *value, GParamSpec *pspec) { NMManager *self = NM_MANAGER (object); NMManagerPrivate *priv = NM_MANAGER_GET_PRIVATE (self); switch (prop_id) { case PROP_NETWORKING_ENABLED: /* Construct only for now */ priv->net_enabled = g_value_get_boolean (value); break; case PROP_WIRELESS_ENABLED: manager_radio_user_toggled (NM_MANAGER (object), &priv->radio_states[RFKILL_TYPE_WLAN], g_value_get_boolean (value)); break; case PROP_WWAN_ENABLED: manager_radio_user_toggled (NM_MANAGER (object), &priv->radio_states[RFKILL_TYPE_WWAN], g_value_get_boolean (value)); break; case PROP_WIMAX_ENABLED: manager_radio_user_toggled (NM_MANAGER (object), &priv->radio_states[RFKILL_TYPE_WIMAX], g_value_get_boolean (value)); break; default: G_OBJECT_WARN_INVALID_PROPERTY_ID (object, prop_id, pspec); break; } } static void dispose (GObject *object) { NMManager *manager = NM_MANAGER (object); NMManagerPrivate *priv = NM_MANAGER_GET_PRIVATE (manager); DBusGConnection *bus; DBusConnection *dbus_connection; GSList *iter; g_slist_free_full (priv->auth_chains, (GDestroyNotify) nm_auth_chain_unref); priv->auth_chains = NULL; nm_auth_changed_func_unregister (authority_changed_cb, manager); /* Remove all devices */ while (priv->devices) remove_device (manager, NM_DEVICE (priv->devices->data), TRUE); if (priv->ac_cleanup_id) { g_source_remove (priv->ac_cleanup_id); priv->ac_cleanup_id = 0; } while (priv->active_connections) active_connection_remove (manager, NM_ACTIVE_CONNECTION (priv->active_connections->data)); g_clear_pointer (&priv->active_connections, g_slist_free); g_clear_object (&priv->primary_connection); g_clear_object (&priv->activating_connection); g_clear_object (&priv->connectivity); g_free (priv->hostname); if (priv->policy) { g_signal_handlers_disconnect_by_func (priv->policy, policy_default_device_changed, manager); g_signal_handlers_disconnect_by_func (priv->policy, policy_activating_device_changed, manager); g_clear_object (&priv->policy); } g_clear_object (&priv->settings); g_clear_object (&priv->vpn_manager); /* Unregister property filter */ if (priv->dbus_mgr) { bus = nm_dbus_manager_get_connection (priv->dbus_mgr); if (bus) { dbus_connection = dbus_g_connection_get_connection (bus); if (dbus_connection && priv->prop_filter_added) { dbus_connection_remove_filter (dbus_connection, prop_filter, manager); priv->prop_filter_added = FALSE; } } g_signal_handlers_disconnect_by_func (priv->dbus_mgr, dbus_connection_changed_cb, manager); priv->dbus_mgr = NULL; } g_clear_object (&priv->aipd_proxy); g_clear_object (&priv->sleep_monitor); if (priv->fw_monitor) { g_signal_handlers_disconnect_by_func (priv->fw_monitor, firmware_dir_changed, manager); if (priv->fw_changed_id) { g_source_remove (priv->fw_changed_id); priv->fw_changed_id = 0; } g_file_monitor_cancel (priv->fw_monitor); g_clear_object (&priv->fw_monitor); } for (iter = priv->factories; iter; iter = iter->next) { NMDeviceFactory *factory = iter->data; g_signal_handlers_disconnect_matched (factory, G_SIGNAL_MATCH_DATA, 0, 0, NULL, NULL, manager); g_object_unref (factory); } g_clear_pointer (&priv->factories, g_slist_free); if (priv->timestamp_update_id) { g_source_remove (priv->timestamp_update_id); priv->timestamp_update_id = 0; } G_OBJECT_CLASS (nm_manager_parent_class)->dispose (object); } static void nm_manager_class_init (NMManagerClass *manager_class) { GObjectClass *object_class = G_OBJECT_CLASS (manager_class); g_type_class_add_private (manager_class, sizeof (NMManagerPrivate)); /* virtual methods */ object_class->set_property = set_property; object_class->get_property = get_property; object_class->dispose = dispose; /* properties */ g_object_class_install_property (object_class, PROP_VERSION, g_param_spec_string (NM_MANAGER_VERSION, "Version", "NetworkManager version", NULL, G_PARAM_READABLE)); g_object_class_install_property (object_class, PROP_STATE, g_param_spec_uint (NM_MANAGER_STATE, "State", "Current state", 0, NM_STATE_DISCONNECTED, 0, G_PARAM_READABLE)); g_object_class_install_property (object_class, PROP_STARTUP, g_param_spec_boolean (NM_MANAGER_STARTUP, "Startup", "Is NetworkManager still starting up", TRUE, G_PARAM_READABLE)); g_object_class_install_property (object_class, PROP_NETWORKING_ENABLED, g_param_spec_boolean (NM_MANAGER_NETWORKING_ENABLED, "NetworkingEnabled", "Is networking enabled", TRUE, G_PARAM_READWRITE | G_PARAM_CONSTRUCT_ONLY)); g_object_class_install_property (object_class, PROP_WIRELESS_ENABLED, g_param_spec_boolean (NM_MANAGER_WIRELESS_ENABLED, "WirelessEnabled", "Is wireless enabled", TRUE, G_PARAM_READWRITE)); g_object_class_install_property (object_class, PROP_WIRELESS_HARDWARE_ENABLED, g_param_spec_boolean (NM_MANAGER_WIRELESS_HARDWARE_ENABLED, "WirelessHardwareEnabled", "RF kill state", TRUE, G_PARAM_READABLE)); g_object_class_install_property (object_class, PROP_WWAN_ENABLED, g_param_spec_boolean (NM_MANAGER_WWAN_ENABLED, "WwanEnabled", "Is mobile broadband enabled", TRUE, G_PARAM_READWRITE)); g_object_class_install_property (object_class, PROP_WWAN_HARDWARE_ENABLED, g_param_spec_boolean (NM_MANAGER_WWAN_HARDWARE_ENABLED, "WwanHardwareEnabled", "Whether WWAN is disabled by a hardware switch or not", TRUE, G_PARAM_READABLE)); g_object_class_install_property (object_class, PROP_WIMAX_ENABLED, g_param_spec_boolean (NM_MANAGER_WIMAX_ENABLED, "WimaxEnabled", "Is WiMAX enabled", TRUE, G_PARAM_READWRITE)); g_object_class_install_property (object_class, PROP_WIMAX_HARDWARE_ENABLED, g_param_spec_boolean (NM_MANAGER_WIMAX_HARDWARE_ENABLED, "WimaxHardwareEnabled", "Whether WiMAX is disabled by a hardware switch or not", TRUE, G_PARAM_READABLE)); g_object_class_install_property (object_class, PROP_ACTIVE_CONNECTIONS, g_param_spec_boxed (NM_MANAGER_ACTIVE_CONNECTIONS, "Active connections", "Active connections", DBUS_TYPE_G_ARRAY_OF_OBJECT_PATH, G_PARAM_READABLE)); g_object_class_install_property (object_class, PROP_CONNECTIVITY, g_param_spec_uint (NM_MANAGER_CONNECTIVITY, "Connectivity", "Connectivity state", NM_CONNECTIVITY_UNKNOWN, NM_CONNECTIVITY_FULL, NM_CONNECTIVITY_UNKNOWN, G_PARAM_READABLE)); g_object_class_install_property (object_class, PROP_PRIMARY_CONNECTION, g_param_spec_boxed (NM_MANAGER_PRIMARY_CONNECTION, "Primary connection", "Primary connection", DBUS_TYPE_G_OBJECT_PATH, G_PARAM_READABLE)); g_object_class_install_property (object_class, PROP_ACTIVATING_CONNECTION, g_param_spec_boxed (NM_MANAGER_ACTIVATING_CONNECTION, "Activating connection", "Activating connection", DBUS_TYPE_G_OBJECT_PATH, G_PARAM_READABLE)); /* Hostname is not exported over D-Bus */ g_object_class_install_property (object_class, PROP_HOSTNAME, g_param_spec_string (NM_MANAGER_HOSTNAME, "Hostname", "Hostname", NULL, G_PARAM_READABLE)); /* Sleeping is not exported over D-Bus */ g_object_class_install_property (object_class, PROP_SLEEPING, g_param_spec_boolean (NM_MANAGER_SLEEPING, "Sleeping", "Sleeping", FALSE, G_PARAM_READABLE)); g_object_class_install_property (object_class, PROP_DEVICES, g_param_spec_boxed (NM_MANAGER_DEVICES, "Devices", "Devices", DBUS_TYPE_G_ARRAY_OF_OBJECT_PATH, G_PARAM_READABLE)); /* signals */ signals[DEVICE_ADDED] = g_signal_new ("device-added", G_OBJECT_CLASS_TYPE (object_class), G_SIGNAL_RUN_FIRST, G_STRUCT_OFFSET (NMManagerClass, device_added), NULL, NULL, NULL, G_TYPE_NONE, 1, G_TYPE_OBJECT); signals[DEVICE_REMOVED] = g_signal_new ("device-removed", G_OBJECT_CLASS_TYPE (object_class), G_SIGNAL_RUN_FIRST, G_STRUCT_OFFSET (NMManagerClass, device_removed), NULL, NULL, NULL, G_TYPE_NONE, 1, G_TYPE_OBJECT); signals[STATE_CHANGED] = g_signal_new ("state-changed", G_OBJECT_CLASS_TYPE (object_class), G_SIGNAL_RUN_FIRST, G_STRUCT_OFFSET (NMManagerClass, state_changed), NULL, NULL, NULL, G_TYPE_NONE, 1, G_TYPE_UINT); signals[CHECK_PERMISSIONS] = g_signal_new ("check-permissions", G_OBJECT_CLASS_TYPE (object_class), G_SIGNAL_RUN_FIRST, 0, NULL, NULL, NULL, G_TYPE_NONE, 0); signals[USER_PERMISSIONS_CHANGED] = g_signal_new ("user-permissions-changed", G_OBJECT_CLASS_TYPE (object_class), G_SIGNAL_RUN_FIRST, 0, NULL, NULL, NULL, G_TYPE_NONE, 0); signals[ACTIVE_CONNECTION_ADDED] = g_signal_new (NM_MANAGER_ACTIVE_CONNECTION_ADDED, G_OBJECT_CLASS_TYPE (object_class), G_SIGNAL_RUN_FIRST, 0, NULL, NULL, NULL, G_TYPE_NONE, 1, G_TYPE_OBJECT); signals[ACTIVE_CONNECTION_REMOVED] = g_signal_new (NM_MANAGER_ACTIVE_CONNECTION_REMOVED, G_OBJECT_CLASS_TYPE (object_class), G_SIGNAL_RUN_FIRST, 0, NULL, NULL, NULL, G_TYPE_NONE, 1, G_TYPE_OBJECT); nm_dbus_manager_register_exported_type (nm_dbus_manager_get (), G_TYPE_FROM_CLASS (manager_class), &dbus_glib_nm_manager_object_info); dbus_g_error_domain_register (NM_MANAGER_ERROR, NULL, NM_TYPE_MANAGER_ERROR); dbus_g_error_domain_register (NM_LOGGING_ERROR, "org.freedesktop.NetworkManager.Logging", NM_TYPE_LOGGING_ERROR); }