| Commit message (Collapse) | Author | Age | Files | Lines |
| |
|
| |
|
|
|
|
|
|
|
|
|
|
|
|
| |
- move nm_auth_chain_check_done() and nm_auth_chain_remove_call()
into the only caller auth_call_complete().
- take a ref of the "context" argument.
- in nm_auth_chain_add_call(), assert that we didn't yet invoke the
done-callback. The auth-chain should not be reusued.
- use slice allocator for ChainData, AuthCall and NMAuthChain
|
| |
|
|
|
|
| |
TRIVIAL: only renaming
|
| |
|
|
|
|
| |
For dispatcher, pass both applied and settings connection.
|
|
|
|
| |
Drop initial_connection and inject the argument somehow differently.
|
|
|
|
|
|
|
| |
For logging, fallback to initial_connection if settings_connection
is yet unset.
This commit will be dropped (if we accept the following fixup).
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
TODO: reword commit message
- split nm_active_connection_get_connection() into
nm_active_connection_get_initial_connection() and
nm_active_connection_get_settings_connection().
settings_connection is now of NMSettingsConnection
type.
- Also for NMVpnConnection it does not hold that
the settings-connection is known from the beginning.
Also for vpns we do add-and-activate.
- get rid of nm_active_connection_get_connection_type()
and nm_active_connection_get_connection_uuid(). From the
name it is unclear whether this returns the settings or applied
connection. The (very few) callers, should figure that out themselfes.
- rename nm_active_connection_get_id() to
nm_active_connection_get_settings_connection_id(). This function
is only used internally for logging.
|
|
|
|
|
|
|
| |
[[was:]] activation-request: cease using the secrets if the original connection changed
I will squash this branch into the previous one. They cannot easily
be treated separately.
|
|
|
|
|
|
|
|
| |
Clone the connection upon activation. This makes it safe for the user to modify
the original connection while the settings are being applied.
This makes it possible to determine the differencies between the connection
that was applied and current version of the connection.
|
|
|
|
|
|
|
|
|
|
| |
Those getters are convenience methods to retrieve the id/type from
the NMSettingConnection. If the NMSettingConnection was missing
(and thus the connection invalid) we would raise an assertion.
Don't be so strict and just silently return NULL.
Otherwise, the caller cannot use the functions on unverified
connections.
|
|
|
|
|
| |
In AddAndActivate the uuid and id make no sense until authorization succeeds
and the connection is saved.
|
|
|
|
|
|
|
|
|
|
| |
This now gives every logging line of a NMVpnConnection
a fully descriptive prefix.
Especially for non-debug logging, this looks a bit verbose
and repetitive, so we could suppress the prefix in that case.
I still add it because I think the verbose information does help
during debugging.
|
| |
|
| |
|
|
|
|
| |
impl_manager_deactivate_connection()
|
| |
|
|
|
|
|
|
|
| |
strv can be NULL.
Reproducer:
$ nmcli con mod my-vlan vlan.ingress 1:5
|
|
|
|
|
|
|
|
|
| |
udev rules file
Those are not required with systemd-udevd v210 or newer. This way
distros which have a new enough version of udev can skip installing
84-nm-drivers.rules. While at it, don't use absolute paths for sed and
ethtool.
|
| |
|
|
|
|
| |
Fixes: 41e7051165166839c7e44f644dc750169d233e96
|
| |
|
| |
|
|
|
|
|
| |
You can't really compare a symbol resolved by ld.so to dlsym()'d one. The
former one is likely just an address of trampoline in PLT.
|
|
|
|
|
| |
These two has been seen in the wild.
Libreswan is the RHEL's openswan fork.
|
|\
| |
| |
| | |
https://bugzilla.redhat.com/show_bug.cgi?id=1255927
|
| |
| |
| |
| |
| |
| |
| | |
Without that MTU is not saved to ifcfg file for bond and team and thus it is
lost over NetworkManager restart.
https://bugzilla.redhat.com/show_bug.cgi?id=1255927
|
|/
|
|
|
|
|
|
|
| |
Set the MTU if 802-3-ethernet.mtu is present and non-zero. The ifcfg-rh writer
sets it if there's a MTU key.
The same change as for bond in commit a169a79a7df1dbb8d966937c9cb887ffc6a63695.
https://bugzilla.redhat.com/show_bug.cgi?id=1255927
|
|
|
|
| |
Fixes: abc96ecdfd1162bf59048d10ff13cbe11a0c8da7
|
|
|
|
|
| |
test-dispatcher-envp.c: In function 'test_generic':
test-dispatcher-envp.c:507:3: error: format not a string literal and no format arguments [-Werror=format-security]
|
|
|
|
|
|
|
|
| |
Don't disconnect the device when the DHCP renewal fails and there are
already configured static IP addresses on the device. Instead, keep
the device up and try DHCP again after some time.
https://bugzilla.redhat.com/show_bug.cgi?id=1168388
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
check_if_startup_complete() could be invoked from nm_settings_start() before
devices had chance to be added, which results in premature "startup complete"
and NM would quit when configure-and-quit=yes is set up.
Postpone actual check_if_startup_complete() resolution until we add all devices
and they are processed.
(gdb) bt
#0 0x00005555556401f3 in check_if_startup_complete (self=0x5555559f91d0)
at nm-manager.c:719
#1 0x00007ffff4d69de8 in g_closure_invoke () at /lib64/libgobject-2.0.so.0
#2 0x00007ffff4d7b70d in signal_emit_unlocked_R ()
at /lib64/libgobject-2.0.so.0
#3 0x00007ffff4d83471 in g_signal_emit_valist () at /lib64/libgobject-2.0.so.0
#4 0x00007ffff4d8372f in g_signal_emit () at /lib64/libgobject-2.0.so.0
#5 0x00007ffff4d6e4b5 in g_object_dispatch_properties_changed ()
at /lib64/libgobject-2.0.so.0
#6 0x00007ffff4d709d9 in g_object_notify () at /lib64/libgobject-2.0.so.0
#7 0x00005555556e232c in check_startup_complete (self=self@entry=0x555555a0e130) at settings/nm-settings.c:204
#8 0x00005555556e5203 in nm_settings_start (self=0x555555a0e130, error=error@entry=0x7fffffffe658) at settings/nm-settings.c:2122
#9 0x0000555555646d06 in nm_manager_start (self=0x5555559f91d0, error=0x7fffffffe658) at nm-manager.c:4153
#10 0x00005555555add43 in main (argc=1, argv=0x7fffffffe7c8) at main.c:428
(gdb)
Fixes:Beaker:NetworkManager_Test37_run_once_new_connection
https://bugzilla.redhat.com/show_bug.cgi?id=1256772
|
|\
| |
| |
| |
| |
| |
| |
| |
| |
| | |
Add support for IFLA_LINK_NETNSID to properly handle linked parent
interfaces that reside in another netns.
This requires support of the IFLA_LINK_NETNSID from both the kernel
and libnl3.
https://bugzilla.gnome.org/show_bug.cgi?id=753726
|
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| | |
The parent of a link (IFLA_LINK) can be in another network namespace and
thus invisible to NM.
This requires the netlink attribute IFLA_LINK_NETNSID which is supported
by recent versions of kernel and libnl.
In this case, set the parent field to NM_PLATFORM_LINK_OTHER_NETNS
and properly handle this special case.
|
| | |
|
| |
| |
| |
| |
| | |
This had not real consequences, because @master and @parent are of
the same size.
|
| | |
|
|/ |
|
|
|
|
| |
nm_vpn_service_plugin_set_ip6_config()
|
|
|
|
| |
Fixes: 13386f760ac46564c363ea690d517d941fd1686e
|
|
|
|
| |
Seems to be forgotten.
|
|\
| |
| |
| |
| |
| | |
Several fixes and refactoring for NMSecretAgent and NMAgentManager.
https://bugzilla.redhat.com/show_bug.cgi?id=1253407
|
| | |
|
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| | |
The signal "notify:g-name-owner" is only emitted for well-known
names, but not for unique connection names (":1.x") such as the secret
agent's connection. Also, it will not be emited for private connections.
That meant that when the client disconnected without explicitly
unregistering, the NMSecretAgent was not cleaned up and leaked
indefinitely.
As only one instance of secret agent with a certain 'identifier/uid'
pair can register, this bug also prevented the client from registering
until restart of NetworkManager.
Fixes: df6706813a698e7a697739b0940bd8f528713aab
|
| | |
|
| | |
|
| |
| |
| |
| |
| |
| |
| |
| |
| |
| | |
This code was unused, because we never enqueued any hashes
to the @asked list. Note that hashing also might give wrong
hash collisions, so this was buggy anyway.
Also, note that impl_agent_manager_register_with_capabilities()
already ensures that duplicate agents are not registered
in the first place (find_agent_by_identifier_and_uid()).
|
| |
| |
| |
| |
| | |
There is a race and there is no guarantee that getpwuid() can lookup a
uid that (previously) existed. Just accept %NULL as @owner_username.
|