summaryrefslogtreecommitdiff
path: root/cli/src/common.c
diff options
context:
space:
mode:
Diffstat (limited to 'cli/src/common.c')
-rw-r--r--cli/src/common.c785
1 files changed, 693 insertions, 92 deletions
diff --git a/cli/src/common.c b/cli/src/common.c
index 15ddcada4..e6712a8d6 100644
--- a/cli/src/common.c
+++ b/cli/src/common.c
@@ -16,59 +16,68 @@
* with this program; if not, write to the Free Software Foundation, Inc.,
* 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA.
*
- * (C) Copyright 2012 Red Hat, Inc.
+ * (C) Copyright 2012 - 2014 Red Hat, Inc.
*/
#include "config.h"
#include <glib.h>
#include <glib/gi18n.h>
+#include <stdio.h>
+#include <stdlib.h>
+#include <errno.h>
+
+#include <readline/readline.h>
+#include <readline/history.h>
#include "common.h"
#include "utils.h"
/* Available fields for IPv4 group */
-static NmcOutputField nmc_fields_ip4_config[] = {
- {"GROUP", N_("GROUP"), 15, NULL, 0}, /* 0 */
- {"ADDRESS", N_("ADDRESS"), 68, NULL, 0}, /* 1 */
- {"ROUTE", N_("ROUTE"), 68, NULL, 0}, /* 2 */
- {"DNS", N_("DNS"), 35, NULL, 0}, /* 3 */
- {"DOMAIN", N_("DOMAIN"), 35, NULL, 0}, /* 4 */
- {"WINS", N_("WINS"), 20, NULL, 0}, /* 5 */
- {NULL, NULL, 0, NULL, 0}
+NmcOutputField nmc_fields_ip4_config[] = {
+ {"GROUP", N_("GROUP"), 15}, /* 0 */
+ {"ADDRESS", N_("ADDRESS"), 68}, /* 1 */
+ {"ROUTE", N_("ROUTE"), 68}, /* 2 */
+ {"DNS", N_("DNS"), 35}, /* 3 */
+ {"DOMAIN", N_("DOMAIN"), 35}, /* 4 */
+ {"WINS", N_("WINS"), 20}, /* 5 */
+ {NULL, NULL, 0}
};
#define NMC_FIELDS_IP4_CONFIG_ALL "GROUP,ADDRESS,ROUTE,DNS,DOMAIN,WINS"
/* Available fields for DHCPv4 group */
-static NmcOutputField nmc_fields_dhcp4_config[] = {
- {"GROUP", N_("GROUP"), 15, NULL, 0}, /* 0 */
- {"OPTION", N_("OPTION"), 80, NULL, 0}, /* 1 */
- {NULL, NULL, 0, NULL, 0}
+NmcOutputField nmc_fields_dhcp4_config[] = {
+ {"GROUP", N_("GROUP"), 15}, /* 0 */
+ {"OPTION", N_("OPTION"), 80}, /* 1 */
+ {NULL, NULL, 0}
};
#define NMC_FIELDS_DHCP4_CONFIG_ALL "GROUP,OPTION"
/* Available fields for IPv6 group */
-static NmcOutputField nmc_fields_ip6_config[] = {
- {"GROUP", N_("GROUP"), 15, NULL, 0}, /* 0 */
- {"ADDRESS", N_("ADDRESS"), 95, NULL, 0}, /* 1 */
- {"ROUTE", N_("ROUTE"), 95, NULL, 0}, /* 2 */
- {"DNS", N_("DNS"), 60, NULL, 0}, /* 3 */
- {"DOMAIN", N_("DOMAIN"), 35, NULL, 0}, /* 4 */
- {NULL, NULL, 0, NULL, 0}
+NmcOutputField nmc_fields_ip6_config[] = {
+ {"GROUP", N_("GROUP"), 15}, /* 0 */
+ {"ADDRESS", N_("ADDRESS"), 95}, /* 1 */
+ {"ROUTE", N_("ROUTE"), 95}, /* 2 */
+ {"DNS", N_("DNS"), 60}, /* 3 */
+ {"DOMAIN", N_("DOMAIN"), 35}, /* 4 */
+ {NULL, NULL, 0}
};
#define NMC_FIELDS_IP6_CONFIG_ALL "GROUP,ADDRESS,ROUTE,DNS,DOMAIN"
/* Available fields for DHCPv6 group */
-static NmcOutputField nmc_fields_dhcp6_config[] = {
- {"GROUP", N_("GROUP"), 15, NULL, 0}, /* 0 */
- {"OPTION", N_("OPTION"), 80, NULL, 0}, /* 1 */
- {NULL, NULL, 0, NULL, 0}
+NmcOutputField nmc_fields_dhcp6_config[] = {
+ {"GROUP", N_("GROUP"), 15}, /* 0 */
+ {"OPTION", N_("OPTION"), 80}, /* 1 */
+ {NULL, NULL, 0}
};
#define NMC_FIELDS_DHCP6_CONFIG_ALL "GROUP,OPTION"
gboolean
-print_ip4_config (NMIP4Config *cfg4, NmCli *nmc, const char *group_prefix)
+print_ip4_config (NMIP4Config *cfg4,
+ NmCli *nmc,
+ const char *group_prefix,
+ const char *one_field)
{
GSList *list, *iter;
const GArray *array;
@@ -79,17 +88,18 @@ print_ip4_config (NMIP4Config *cfg4, NmCli *nmc, const char *group_prefix)
char **domain_arr = NULL;
char **wins_arr = NULL;
int i = 0;
- guint32 mode_flag = (nmc->print_output == NMC_PRINT_PRETTY) ? NMC_PF_FLAG_PRETTY : (nmc->print_output == NMC_PRINT_TERSE) ? NMC_PF_FLAG_TERSE : 0;
- guint32 multiline_flag = nmc->multiline_output ? NMC_PF_FLAG_MULTILINE : 0;
- guint32 escape_flag = nmc->escape_values ? NMC_PF_FLAG_ESCAPE : 0;
+ NmcOutputField *tmpl, *arr;
+ size_t tmpl_len;
if (cfg4 == NULL)
return FALSE;
- nmc->allowed_fields = nmc_fields_ip4_config;
- nmc->print_fields.flags = multiline_flag | mode_flag | escape_flag | NMC_PF_FLAG_FIELD_NAMES;
- nmc->print_fields.indices = parse_output_fields (NMC_FIELDS_IP4_CONFIG_ALL, nmc->allowed_fields, NULL);
- print_fields (nmc->print_fields, nmc->allowed_fields); /* Print header */
+ tmpl = nmc_fields_ip4_config;
+ tmpl_len = sizeof (nmc_fields_ip4_config);
+ nmc->print_fields.indices = parse_output_fields (one_field ? one_field : NMC_FIELDS_IP4_CONFIG_ALL,
+ tmpl, FALSE, NULL, NULL);
+ arr = nmc_dup_fields_array (tmpl, tmpl_len, NMC_OF_FLAG_FIELD_NAMES);
+ g_ptr_array_add (nmc->output_data, arr);
/* addresses */
list = (GSList *) nm_ip4_config_get_addresses (cfg4);
@@ -144,7 +154,7 @@ print_ip4_config (NMIP4Config *cfg4, NmCli *nmc, const char *group_prefix)
if (ptr_array) {
domain_arr = g_new (char *, ptr_array->len + 1);
for (i = 0; i < ptr_array->len; i++)
- domain_arr[i] = g_ptr_array_index (ptr_array, i);
+ domain_arr[i] = g_strdup (g_ptr_array_index (ptr_array, i));
domain_arr[i] = NULL;
}
@@ -159,27 +169,28 @@ print_ip4_config (NMIP4Config *cfg4, NmCli *nmc, const char *group_prefix)
wins_arr[i] = NULL;
}
- set_val_str (nmc->allowed_fields, 0, group_prefix);
- set_val_arr (nmc->allowed_fields, 1, (const char **) addr_arr);
- set_val_arr (nmc->allowed_fields, 2, (const char **) route_arr);
- set_val_arr (nmc->allowed_fields, 3, (const char **) dns_arr);
- set_val_arr (nmc->allowed_fields, 4, (const char **) domain_arr);
- set_val_arr (nmc->allowed_fields, 5, (const char **) wins_arr);
+ arr = nmc_dup_fields_array (tmpl, tmpl_len, NMC_OF_FLAG_SECTION_PREFIX);
+ set_val_strc (arr, 0, group_prefix);
+ set_val_arr (arr, 1, addr_arr);
+ set_val_arr (arr, 2, route_arr);
+ set_val_arr (arr, 3, dns_arr);
+ set_val_arr (arr, 4, domain_arr);
+ set_val_arr (arr, 5, wins_arr);
+ g_ptr_array_add (nmc->output_data, arr);
- nmc->print_fields.flags = multiline_flag | mode_flag | escape_flag | NMC_PF_FLAG_SECTION_PREFIX;
- print_fields (nmc->print_fields, nmc->allowed_fields); /* Print values */
+ print_data (nmc); /* Print all data */
- g_strfreev (addr_arr);
- g_strfreev (route_arr);
- g_strfreev (dns_arr);
- g_free (domain_arr);
- g_strfreev (wins_arr);
+ /* Remove any previous data */
+ nmc_empty_output_fields (nmc);
return TRUE;
}
gboolean
-print_ip6_config (NMIP6Config *cfg6, NmCli *nmc, const char *group_prefix)
+print_ip6_config (NMIP6Config *cfg6,
+ NmCli *nmc,
+ const char *group_prefix,
+ const char *one_field)
{
GSList *list, *iter;
const GPtrArray *ptr_array;
@@ -188,17 +199,18 @@ print_ip6_config (NMIP6Config *cfg6, NmCli *nmc, const char *group_prefix)
char **dns_arr = NULL;
char **domain_arr = NULL;
int i = 0;
- guint32 mode_flag = (nmc->print_output == NMC_PRINT_PRETTY) ? NMC_PF_FLAG_PRETTY : (nmc->print_output == NMC_PRINT_TERSE) ? NMC_PF_FLAG_TERSE : 0;
- guint32 multiline_flag = nmc->multiline_output ? NMC_PF_FLAG_MULTILINE : 0;
- guint32 escape_flag = nmc->escape_values ? NMC_PF_FLAG_ESCAPE : 0;
+ NmcOutputField *tmpl, *arr;
+ size_t tmpl_len;
if (cfg6 == NULL)
return FALSE;
- nmc->allowed_fields = nmc_fields_ip6_config;
- nmc->print_fields.flags = multiline_flag | mode_flag | escape_flag | NMC_PF_FLAG_FIELD_NAMES;
- nmc->print_fields.indices = parse_output_fields (NMC_FIELDS_IP6_CONFIG_ALL, nmc->allowed_fields, NULL);
- print_fields (nmc->print_fields, nmc->allowed_fields); /* Print header */
+ tmpl = nmc_fields_ip6_config;
+ tmpl_len = sizeof (nmc_fields_ip6_config);
+ nmc->print_fields.indices = parse_output_fields (one_field ? one_field : NMC_FIELDS_IP6_CONFIG_ALL,
+ tmpl, FALSE, NULL, NULL);
+ arr = nmc_dup_fields_array (tmpl, tmpl_len, NMC_OF_FLAG_FIELD_NAMES);
+ g_ptr_array_add (nmc->output_data, arr);
/* addresses */
list = (GSList *) nm_ip6_config_get_addresses (cfg6);
@@ -252,35 +264,36 @@ print_ip6_config (NMIP6Config *cfg6, NmCli *nmc, const char *group_prefix)
if (ptr_array) {
domain_arr = g_new (char *, ptr_array->len + 1);
for (i = 0; i < ptr_array->len; i++)
- domain_arr[i] = g_ptr_array_index (ptr_array, i);
+ domain_arr[i] = g_strdup (g_ptr_array_index (ptr_array, i));
domain_arr[i] = NULL;
}
- set_val_str (nmc->allowed_fields, 0, group_prefix);
- set_val_arr (nmc->allowed_fields, 1, (const char **) addr_arr);
- set_val_arr (nmc->allowed_fields, 2, (const char **) route_arr);
- set_val_arr (nmc->allowed_fields, 3, (const char **) dns_arr);
- set_val_arr (nmc->allowed_fields, 4, (const char **) domain_arr);
+ arr = nmc_dup_fields_array (tmpl, tmpl_len, NMC_OF_FLAG_SECTION_PREFIX);
+ set_val_strc (arr, 0, group_prefix);
+ set_val_arr (arr, 1, addr_arr);
+ set_val_arr (arr, 2, route_arr);
+ set_val_arr (arr, 3, dns_arr);
+ set_val_arr (arr, 4, domain_arr);
+ g_ptr_array_add (nmc->output_data, arr);
- nmc->print_fields.flags = multiline_flag | mode_flag | escape_flag | NMC_PF_FLAG_SECTION_PREFIX;
- print_fields (nmc->print_fields, nmc->allowed_fields); /* Print values */
+ print_data (nmc); /* Print all data */
- g_strfreev (addr_arr);
- g_strfreev (route_arr);
- g_strfreev (dns_arr);
- g_free (domain_arr);
+ /* Remove any previous data */
+ nmc_empty_output_fields (nmc);
return TRUE;
}
gboolean
-print_dhcp4_config (NMDHCP4Config *dhcp4, NmCli *nmc, const char *group_prefix)
+print_dhcp4_config (NMDHCP4Config *dhcp4,
+ NmCli *nmc,
+ const char *group_prefix,
+ const char *one_field)
{
GHashTable *table;
- guint32 mode_flag = (nmc->print_output == NMC_PRINT_PRETTY) ? NMC_PF_FLAG_PRETTY : (nmc->print_output == NMC_PRINT_TERSE) ? NMC_PF_FLAG_TERSE : 0;
- guint32 multiline_flag = nmc->multiline_output ? NMC_PF_FLAG_MULTILINE : 0;
- guint32 escape_flag = nmc->escape_values ? NMC_PF_FLAG_ESCAPE : 0;
+ NmcOutputField *tmpl, *arr;
+ size_t tmpl_len;
if (dhcp4 == NULL)
return FALSE;
@@ -292,10 +305,12 @@ print_dhcp4_config (NMDHCP4Config *dhcp4, NmCli *nmc, const char *group_prefix)
char **options_arr = NULL;
int i = 0;
- nmc->allowed_fields = nmc_fields_dhcp4_config;
- nmc->print_fields.flags = multiline_flag | mode_flag | escape_flag | NMC_PF_FLAG_FIELD_NAMES;
- nmc->print_fields.indices = parse_output_fields (NMC_FIELDS_DHCP4_CONFIG_ALL, nmc->allowed_fields, NULL);
- print_fields (nmc->print_fields, nmc->allowed_fields); /* Print header */
+ tmpl = nmc_fields_dhcp4_config;
+ tmpl_len = sizeof (nmc_fields_dhcp4_config);
+ nmc->print_fields.indices = parse_output_fields (one_field ? one_field : NMC_FIELDS_DHCP4_CONFIG_ALL,
+ tmpl, FALSE, NULL, NULL);
+ arr = nmc_dup_fields_array (tmpl, tmpl_len, NMC_OF_FLAG_FIELD_NAMES);
+ g_ptr_array_add (nmc->output_data, arr);
options_arr = g_new (char *, g_hash_table_size (table) + 1);
g_hash_table_iter_init (&table_iter, table);
@@ -303,13 +318,15 @@ print_dhcp4_config (NMDHCP4Config *dhcp4, NmCli *nmc, const char *group_prefix)
options_arr[i++] = g_strdup_printf ("%s = %s", (char *) key, (char *) value);
options_arr[i] = NULL;
- set_val_str (nmc->allowed_fields, 0, group_prefix);
- set_val_arr (nmc->allowed_fields, 1, (const char **) options_arr);
+ arr = nmc_dup_fields_array (tmpl, tmpl_len, NMC_OF_FLAG_SECTION_PREFIX);
+ set_val_strc (arr, 0, group_prefix);
+ set_val_arr (arr, 1, options_arr);
+ g_ptr_array_add (nmc->output_data, arr);
- nmc->print_fields.flags = multiline_flag | mode_flag | escape_flag | NMC_PF_FLAG_SECTION_PREFIX;
- print_fields (nmc->print_fields, nmc->allowed_fields); /* Print values */
+ print_data (nmc); /* Print all data */
- g_strfreev (options_arr);
+ /* Remove any previous data */
+ nmc_empty_output_fields (nmc);
return TRUE;
}
@@ -317,12 +334,14 @@ print_dhcp4_config (NMDHCP4Config *dhcp4, NmCli *nmc, const char *group_prefix)
}
gboolean
-print_dhcp6_config (NMDHCP6Config *dhcp6, NmCli *nmc, const char *group_prefix)
+print_dhcp6_config (NMDHCP6Config *dhcp6,
+ NmCli *nmc,
+ const char *group_prefix,
+ const char *one_field)
{
GHashTable *table;
- guint32 mode_flag = (nmc->print_output == NMC_PRINT_PRETTY) ? NMC_PF_FLAG_PRETTY : (nmc->print_output == NMC_PRINT_TERSE) ? NMC_PF_FLAG_TERSE : 0;
- guint32 multiline_flag = nmc->multiline_output ? NMC_PF_FLAG_MULTILINE : 0;
- guint32 escape_flag = nmc->escape_values ? NMC_PF_FLAG_ESCAPE : 0;
+ NmcOutputField *tmpl, *arr;
+ size_t tmpl_len;
if (dhcp6 == NULL)
return FALSE;
@@ -334,10 +353,12 @@ print_dhcp6_config (NMDHCP6Config *dhcp6, NmCli *nmc, const char *group_prefix)
char **options_arr = NULL;
int i = 0;
- nmc->allowed_fields = nmc_fields_dhcp6_config;
- nmc->print_fields.flags = multiline_flag | mode_flag | escape_flag | NMC_PF_FLAG_FIELD_NAMES;
- nmc->print_fields.indices = parse_output_fields (NMC_FIELDS_DHCP6_CONFIG_ALL, nmc->allowed_fields, NULL);
- print_fields (nmc->print_fields, nmc->allowed_fields); /* Print header */
+ tmpl = nmc_fields_dhcp6_config;
+ tmpl_len = sizeof (nmc_fields_dhcp6_config);
+ nmc->print_fields.indices = parse_output_fields (one_field ? one_field : NMC_FIELDS_DHCP6_CONFIG_ALL,
+ tmpl, FALSE, NULL, NULL);
+ arr = nmc_dup_fields_array (tmpl, tmpl_len, NMC_OF_FLAG_FIELD_NAMES);
+ g_ptr_array_add (nmc->output_data, arr);
options_arr = g_new (char *, g_hash_table_size (table) + 1);
g_hash_table_iter_init (&table_iter, table);
@@ -345,19 +366,313 @@ print_dhcp6_config (NMDHCP6Config *dhcp6, NmCli *nmc, const char *group_prefix)
options_arr[i++] = g_strdup_printf ("%s = %s", (char *) key, (char *) value);
options_arr[i] = NULL;
- set_val_str (nmc->allowed_fields, 0, group_prefix);
- set_val_arr (nmc->allowed_fields, 1, (const char **) options_arr);
+ arr = nmc_dup_fields_array (tmpl, tmpl_len, NMC_OF_FLAG_SECTION_PREFIX);
+ set_val_strc (arr, 0, group_prefix);
+ set_val_arr (arr, 1, options_arr);
+ g_ptr_array_add (nmc->output_data, arr);
- nmc->print_fields.flags = multiline_flag | mode_flag | escape_flag | NMC_PF_FLAG_SECTION_PREFIX;
- print_fields (nmc->print_fields, nmc->allowed_fields); /* Print values */
+ print_data (nmc); /* Print all data */
- g_strfreev (options_arr);
+ /* Remove any previous data */
+ nmc_empty_output_fields (nmc);
return TRUE;
}
return FALSE;
}
+/*
+ * Parse IPv4 address from string to NMIP4Address stucture.
+ * ip_str is the IPv4 address in the form address/prefix
+ * gw_str is the gateway address (it is optional)
+ */
+NMIP4Address *
+nmc_parse_and_build_ip4_address (const char *ip_str, const char *gw_str, GError **error)
+{
+ NMIP4Address *addr = NULL;
+ guint32 ip4_addr, gw_addr;
+ char *tmp;
+ char *plen;
+ long int prefix;
+
+ g_return_val_if_fail (ip_str != NULL, NULL);
+ g_return_val_if_fail (error == NULL || *error == NULL, NULL);
+
+ tmp = g_strdup (ip_str);
+ plen = strchr (tmp, '/'); /* prefix delimiter */
+ if (plen)
+ *plen++ = '\0';
+
+ if (inet_pton (AF_INET, tmp, &ip4_addr) < 1) {
+ g_set_error (error, NMCLI_ERROR, NMC_RESULT_ERROR_USER_INPUT,
+ _("invalid IPv4 address '%s'"), tmp);
+ goto finish;
+ }
+
+ prefix = 32;
+ if (plen) {
+ if (!nmc_string_to_int (plen, TRUE, 1, 32, &prefix)) {
+ g_set_error (error, NMCLI_ERROR, NMC_RESULT_ERROR_USER_INPUT,
+ _("invalid prefix '%s'; <1-32> allowed"), plen);
+ goto finish;
+ }
+ }
+
+ if (inet_pton (AF_INET, gw_str ? gw_str : "0.0.0.0", &gw_addr) < 1) {
+ g_set_error (error, NMCLI_ERROR, NMC_RESULT_ERROR_USER_INPUT,
+ _("invalid gateway '%s'"), gw_str);
+ goto finish;
+ }
+
+ addr = nm_ip4_address_new ();
+ nm_ip4_address_set_address (addr, ip4_addr);
+ nm_ip4_address_set_prefix (addr, (guint32) prefix);
+ nm_ip4_address_set_gateway (addr, gw_addr);
+
+finish:
+ g_free (tmp);
+ return addr;
+}
+
+/*
+ * Parse IPv6 address from string to NMIP6Address stucture.
+ * ip_str is the IPv6 address in the form address/prefix
+ * gw_str is the gateway address (it is optional)
+ */
+NMIP6Address *
+nmc_parse_and_build_ip6_address (const char *ip_str, const char *gw_str, GError **error)
+{
+ NMIP6Address *addr = NULL;
+ struct in6_addr ip_addr, gw_addr;
+ char *tmp;
+ char *plen;
+ long int prefix;
+
+ g_return_val_if_fail (ip_str != NULL, NULL);
+ g_return_val_if_fail (error == NULL || *error == NULL, NULL);
+
+ tmp = g_strdup (ip_str);
+ plen = strchr (tmp, '/'); /* prefix delimiter */
+ if (plen)
+ *plen++ = '\0';
+
+ if (inet_pton (AF_INET6, tmp, &ip_addr) < 1) {
+ g_set_error (error, NMCLI_ERROR, NMC_RESULT_ERROR_USER_INPUT,
+ _("invalid IPv6 address '%s'"), tmp);
+ goto finish;
+ }
+
+ prefix = 128;
+ if (plen) {
+ if (!nmc_string_to_int (plen, TRUE, 1, 128, &prefix)) {
+ g_set_error (error, NMCLI_ERROR, NMC_RESULT_ERROR_USER_INPUT,
+ _("invalid prefix '%s'; <1-128> allowed"), plen);
+ goto finish;
+ }
+ }
+
+ if (inet_pton (AF_INET6, gw_str ? gw_str : "::", &gw_addr) < 1) {
+ g_set_error (error, NMCLI_ERROR, NMC_RESULT_ERROR_USER_INPUT,
+ _("invalid gateway '%s'"), gw_str);
+ goto finish;
+ }
+
+ addr = nm_ip6_address_new ();
+ nm_ip6_address_set_address (addr, &ip_addr);
+ nm_ip6_address_set_prefix (addr, (guint32) prefix);
+ nm_ip6_address_set_gateway (addr, &gw_addr);
+
+finish:
+ g_free (tmp);
+ return addr;
+}
+
+typedef struct {
+ long int prefix;
+ long int metric;
+ union _IpDest {
+ guint32 ip4_dst;
+ struct in6_addr ip6_dst;
+ } dst;
+ union _IpNextHop {
+ guint32 ip4_nh;
+ struct in6_addr ip6_nh;
+ } nh;
+} ParsedRoute;
+
+/*
+ * _parse_and_build_route:
+ * @family: AF_INET or AF_INET6
+ * @first: the route destination in the form of "address/prefix"
+ (/prefix is optional)
+ * @second: (allow-none): next hop address, if third is not NULL. Otherwise it could be
+ either next hop address or metric. (It can be NULL when @third is NULL).
+ * @third: (allow-none): route metric
+ * @out: (out): route struct to fill
+ * @error: location to store GError
+ *
+ * Parse route from strings and fill @out parameter.
+ *
+ * Returns: %TRUE on success, %FALSE on failure
+ */
+static gboolean
+_parse_and_build_route (int family,
+ const char *first,
+ const char *second,
+ const char *third,
+ ParsedRoute *out,
+ GError **error)
+{
+ int max_prefix;
+ char *tmp, *plen;
+ gboolean success = FALSE;
+
+ g_return_val_if_fail (family == AF_INET || family == AF_INET6, FALSE);
+ g_return_val_if_fail (first != NULL, FALSE);
+ g_return_val_if_fail (second || !third, FALSE);
+ g_return_val_if_fail (out, FALSE);
+ g_return_val_if_fail (error == NULL || *error == NULL, FALSE);
+
+ max_prefix = (family == AF_INET) ? 32 : 128;
+ /* initialize default values */
+ out->prefix = max_prefix;
+ out->metric = 0;
+ if (family == AF_INET)
+ out->nh.ip4_nh = 0;
+ else
+ out->nh.ip6_nh = in6addr_any;
+
+ tmp = g_strdup (first);
+ plen = strchr (tmp, '/'); /* prefix delimiter */
+ if (plen)
+ *plen++ = '\0';
+
+ if (inet_pton (family, tmp, family == AF_INET ? (void *) &out->dst.ip4_dst : (void *) &out->dst.ip6_dst) < 1) {
+ g_set_error (error, NMCLI_ERROR, NMC_RESULT_ERROR_USER_INPUT,
+ _("invalid route destination address '%s'"), tmp);
+ goto finish;
+ }
+
+ if (plen) {
+ if (!nmc_string_to_int (plen, TRUE, 1, max_prefix, &out->prefix)) {
+ g_set_error (error, NMCLI_ERROR, NMC_RESULT_ERROR_USER_INPUT,
+ _("invalid prefix '%s'; <1-%d> allowed"),
+ plen, max_prefix);
+ goto finish;
+ }
+ }
+
+ if (second) {
+ if (inet_pton (family, second, family == AF_INET ? (void *) &out->nh.ip4_nh : (void *) &out->nh.ip6_nh) < 1) {
+ if (third) {
+ g_set_error (error, NMCLI_ERROR, NMC_RESULT_ERROR_USER_INPUT,
+ _("invalid next hop address '%s'"), second);
+ goto finish;
+ } else {
+ /* 'second' can be a metric */
+ if (!nmc_string_to_int (second, TRUE, 0, G_MAXUINT32, &out->metric)) {
+ g_set_error (error, 1, 0, _("the second component of route ('%s') is neither "
+ "a next hop address nor a metric"), second);
+ goto finish;
+ }
+ }
+ }
+ }
+
+ if (third) {
+ if (!nmc_string_to_int (third, TRUE, 0, G_MAXUINT32, &out->metric)) {
+ g_set_error (error, 1, 0, _("invalid metric '%s'"), third);
+ goto finish;
+ }
+ }
+
+ /* We don't accept default routes as NetworkManager handles it itself */
+ if ( (family == AF_INET && out->dst.ip4_dst == 0)
+ || (family == AF_INET6 && IN6_IS_ADDR_UNSPECIFIED (&out->dst.ip6_dst))) {
+ g_set_error_literal (error, NMCLI_ERROR, NMC_RESULT_ERROR_USER_INPUT,
+ _("default route cannot be added (NetworkManager handles it by itself)"));
+ goto finish;
+ }
+
+ success = TRUE;
+
+finish:
+ g_free (tmp);
+ return success;
+}
+
+/*
+ * nmc_parse_and_build_ip4_route:
+ * @first: the IPv4 route destination in the form of "address/prefix"
+ (/prefix is optional)
+ * @second: (allow-none): next hop address, if third is not NULL. Otherwise it could be
+ either next hop address or metric. (It can be NULL when @third is NULL).
+ * @third: (allow-none): route metric
+ * @error: location to store GError
+ *
+ * Parse IPv4 route from strings to NMIP4Route stucture.
+ *
+ * Returns: route as a NMIP4Route object, or %NULL on failure
+ */
+NMIP4Route *
+nmc_parse_and_build_ip4_route (const char *first,
+ const char *second,
+ const char *third,
+ GError **error)
+{
+ ParsedRoute tmp_route;
+ NMIP4Route *route = NULL;
+
+ g_return_val_if_fail (first != NULL, NULL);
+ g_return_val_if_fail (second || !third, NULL);
+ g_return_val_if_fail (error == NULL || *error == NULL, NULL);
+
+ if (_parse_and_build_route (AF_INET, first, second, third, &tmp_route, error)) {
+ route = nm_ip4_route_new ();
+ nm_ip4_route_set_dest (route, tmp_route.dst.ip4_dst);
+ nm_ip4_route_set_prefix (route, (guint32) tmp_route.prefix);
+ nm_ip4_route_set_next_hop (route, tmp_route.nh.ip4_nh);
+ nm_ip4_route_set_metric (route, (guint32) tmp_route.metric);
+ }
+ return route;
+}
+
+/*
+ * nmc_parse_and_build_ip6_route:
+ * @first: the IPv6 route destination in the form of "address/prefix"
+ (/prefix is optional)
+ * @second: (allow-none): next hop address, if third is not NULL. Otherwise it could be
+ either next hop address or metric. (It can be NULL when @third is NULL).
+ * @third: (allow-none): route metric
+ * @error: location to store GError
+ *
+ * Parse IPv6 route from strings to NMIP6Route stucture.
+ *
+ * Returns: route as a NMIP6Route object, or %NULL on failure
+ */
+NMIP6Route *
+nmc_parse_and_build_ip6_route (const char *first,
+ const char *second,
+ const char *third,
+ GError **error)
+{
+ ParsedRoute tmp_route;
+ NMIP6Route *route = NULL;
+
+ g_return_val_if_fail (first != NULL, NULL);
+ g_return_val_if_fail (second || !third, NULL);
+ g_return_val_if_fail (error == NULL || *error == NULL, NULL);
+
+ if (_parse_and_build_route (AF_INET6, first, second, third, &tmp_route, error)) {
+ route = nm_ip6_route_new ();
+ nm_ip6_route_set_dest (route, &tmp_route.dst.ip6_dst);
+ nm_ip6_route_set_prefix (route, (guint32) tmp_route.prefix);
+ nm_ip6_route_set_next_hop (route, &tmp_route.nh.ip6_nh);
+ nm_ip6_route_set_metric (route, (guint32) tmp_route.metric);
+ }
+ return route;
+}
+
const char *
nmc_device_state_to_string (NMDeviceState state)
{
@@ -560,8 +875,294 @@ nmc_device_reason_to_string (NMDeviceStateReason reason)
case NM_DEVICE_STATE_REASON_SECONDARY_CONNECTION_FAILED:
return _("A secondary connection of the base connection failed");
+ case NM_DEVICE_STATE_REASON_DCB_FCOE_FAILED:
+ return _("DCB or FCoE setup failed");
+
+ case NM_DEVICE_STATE_REASON_TEAMD_CONTROL_FAILED:
+ return _("teamd control failed");
+
+ case NM_DEVICE_STATE_REASON_MODEM_FAILED:
+ return _("Modem failed or no longer available");
+
+ case NM_DEVICE_STATE_REASON_MODEM_AVAILABLE:
+ return _("Modem now ready and available");
+
+ case NM_DEVICE_STATE_REASON_SIM_PIN_INCORRECT:
+ return _("SIM PIN was incorrect");
+
default:
+ /* TRANSLATORS: Unknown reason for a device state change (NMDeviceStateReason) */
return _("Unknown");
}
}
+
+/* Max priority values from libnm-util/nm-setting-vlan.c */
+#define MAX_SKB_PRIO G_MAXUINT32
+#define MAX_8021P_PRIO 7 /* Max 802.1p priority */
+
+/*
+ * Parse VLAN priority mappings from the following format: 2:1,3:4,7:3
+ * and verify if the priority numbers are valid
+ *
+ * Return: string array with split maps, or NULL on error
+ * Caller is responsible for freeing the array.
+ */
+char **
+nmc_vlan_parse_priority_maps (const char *priority_map,
+ NMVlanPriorityMap map_type,
+ GError **error)
+{
+ char **mapping = NULL, **iter;
+ unsigned long from, to, from_max, to_max;
+
+ g_return_val_if_fail (priority_map != NULL, NULL);
+ g_return_val_if_fail (error == NULL || *error == NULL, NULL);
+
+ if (map_type == NM_VLAN_INGRESS_MAP) {
+ from_max = MAX_8021P_PRIO;
+ to_max = MAX_SKB_PRIO;
+ } else {
+ from_max = MAX_SKB_PRIO;
+ to_max = MAX_8021P_PRIO;
+ }
+
+ mapping = g_strsplit (priority_map, ",", 0);
+ for (iter = mapping; iter && *iter; iter++) {
+ char *left, *right;
+
+ left = g_strstrip (*iter);
+ right = strchr (left, ':');
+ if (!right) {
+ g_set_error (error, 1, 0, _("invalid priority map '%s'"), *iter);
+ g_strfreev (mapping);
+ return NULL;
+ }
+ *right++ = '\0';
+
+ if (!nmc_string_to_uint (left, TRUE, 0, from_max, &from)) {
+ g_set_error (error, 1, 0, _("priority '%s' is not valid (<0-%ld>)"),
+ left, from_max);
+ g_strfreev (mapping);
+ return NULL;
+ }
+ if (!nmc_string_to_uint (right, TRUE, 0, to_max, &to)) {
+ g_set_error (error, 1, 0, _("priority '%s' is not valid (<0-%ld>)"),
+ right, to_max);
+ g_strfreev (mapping);
+ return NULL;
+ }
+ *(right-1) = ':'; /* Put back ':' */
+ }
+ return mapping;
+}
+
+const char *
+nmc_bond_validate_mode (const char *mode, GError **error)
+{
+ unsigned long mode_int;
+ static const char *valid_modes[] = { "balance-rr",
+ "active-backup",
+ "balance-xor",
+ "broadcast",
+ "802.3ad",
+ "balance-tlb",
+ "balance-alb",
+ NULL };
+ if (nmc_string_to_uint (mode, TRUE, 0, 6, &mode_int)) {
+ /* Translate bonding mode numbers to mode names:
+ * https://www.kernel.org/doc/Documentation/networking/bonding.txt
+ */
+ return valid_modes[mode_int];
+ } else
+ return nmc_string_is_valid (mode, valid_modes, error);
+}
+
+/*
+ * nmc_team_check_config:
+ * @config: file name with team config, or raw team JSON config data
+ * @out_config: raw team JSON config data (with removed new-line characters)
+ * @error: location to store error, or %NUL
+ *
+ * Check team config from @config parameter and return the checked/sanitized
+ * config in @out_config.
+ *
+ * Returns: %TRUE if the config is valid, %FALSE if it is invalid
+ */
+gboolean
+nmc_team_check_config (const char *config, char **out_config, GError **error)
+{
+ char *contents = NULL;
+ size_t c_len = 0;
+
+ *out_config = NULL;
+
+ if (!config || strlen (config) == strspn (config, " \t"))
+ return TRUE;
+
+ /* 'config' can be either a file name or raw JSON config data */
+ if (g_file_test (config, G_FILE_TEST_EXISTS))
+ (void) g_file_get_contents (config, &contents, NULL, NULL);
+ else
+ contents = g_strdup (config);
+
+ if (contents) {
+ g_strstrip (contents);
+ c_len = strlen (contents);
+ }
+
+ /* Do a simple validity check */
+ if (!contents || !contents[0] || c_len > 100000 || contents[0] != '{' || contents[c_len-1] != '}') {
+ g_set_error (error, NMCLI_ERROR, NMC_RESULT_ERROR_USER_INPUT,
+ _("'%s' is not a valid team configuration or file name."), config);
+ g_free (contents);
+ return FALSE;
+ }
+ *out_config = g_strdelimit (contents, "\r\n", ' ');
+ return TRUE;
+}
+
+/*
+ * nmc_find_connection:
+ * @list: list of NMConnections to search in
+ * @filter_type: "id", "uuid", "path" or %NULL
+ * @filter_val: connection to find (connection name, UUID or path)
+ * @start: where to start in @list. The location is updated so that the function
+ * can be called multiple times (for connections with the same name).
+ *
+ * Find a connection in @list according to @filter_val. @filter_type determines
+ * what property is used for comparison. When @filter_type is NULL, compare
+ * @filter_val against all types. Otherwise, only compare against the specified
+ * type. If 'path' filter type is specified, comparison against numeric index
+ * (in addition to the whole path) is allowed.
+ *
+ * Returns: found connection, or %NULL
+ */
+NMConnection *
+nmc_find_connection (GSList *list,
+ const char *filter_type,
+ const char *filter_val,
+ GSList **start)
+{
+ NMConnection *connection;
+ NMConnection *found = NULL;
+ GSList *iterator;
+ const char *id;
+ const char *uuid;
+ const char *path, *path_num;
+
+ iterator = (start && *start) ? *start : list;
+ while (iterator) {
+ connection = NM_CONNECTION (iterator->data);
+
+ id = nm_connection_get_id (connection);
+ uuid = nm_connection_get_uuid (connection);
+ path = nm_connection_get_path (connection);
+ path_num = path ? strrchr (path, '/') + 1 : NULL;
+
+ /* When filter_type is NULL, compare connection ID (filter_val)
+ * against all types. Otherwise, only compare against the specific
+ * type. If 'path' filter type is specified, comparison against
+ * numeric index (in addition to the whole path) is allowed.
+ */
+ if ( ( (!filter_type || strcmp (filter_type, "id") == 0)
+ && strcmp (filter_val, id) == 0)
+ || ( (!filter_type || strcmp (filter_type, "uuid") == 0)
+ && strcmp (filter_val, uuid) == 0)
+ || ( (!filter_type || strcmp (filter_type, "path") == 0)
+ && (g_strcmp0 (filter_val, path) == 0 || (filter_type && g_strcmp0 (filter_val, path_num) == 0)))) {
+ if (!start)
+ return connection;
+ if (found) {
+ *start = iterator;
+ return found;
+ }
+ found = connection;
+ }
+
+ iterator = g_slist_next (iterator);
+ }
+
+ if (start)
+ *start = NULL;
+ return found;
+}
+
+/**
+ * nmc_cleanup_readline:
+ *
+ * Cleanup readline when nmcli is terminated with a signal.
+ * It makes sure the terminal is not garbled.
+ */
+void
+nmc_cleanup_readline (void)
+{
+ rl_free_line_state ();
+ rl_cleanup_after_signal ();
+}
+
+/**
+ * nmc_readline:
+ * @prompt_fmt: prompt to print (telling user what to enter). It is standard
+ * printf() format string
+ * @...: a list of arguments according to the @prompt_fmt format string
+ *
+ * Wrapper around libreadline's readline() function.
+ *
+ * Returns: the user provided string. In case the user entered empty string,
+ * this function returns NULL.
+ */
+char *
+nmc_readline (const char *prompt_fmt, ...)
+{
+ va_list args;
+ char *prompt, *str;
+
+ va_start (args, prompt_fmt);
+ prompt = g_strdup_vprintf (prompt_fmt, args);
+ va_end (args);
+
+ str = readline (prompt);
+ /* Return NULL, not empty string */
+ if (str && *str == '\0') {
+ g_free (str);
+ str = NULL;
+ }
+
+ if (str && *str)
+ add_history (str);
+
+ g_free (prompt);
+ return str;
+}
+
+/**
+ * nmc_rl_gen_func_basic:
+ * @text: text to complete
+ * @state: readline state; says whether start from scratch (state == 0)
+ * @words: strings for completion
+ *
+ * Basic function generating list of completion strings for readline.
+ * See e.g. http://cnswww.cns.cwru.edu/php/chet/readline/readline.html#SEC49
+ */
+char *
+nmc_rl_gen_func_basic (const char *text, int state, const char **words)
+{
+ static int list_idx, len;
+ const char *name;
+
+ if (!state) {
+ list_idx = 0;
+ len = strlen (text);
+ }
+
+ /* Return the next name which partially matches one from the 'words' list. */
+ while ((name = words[list_idx])) {
+ list_idx++;
+
+ if (strncmp (name, text, len) == 0)
+ return g_strdup (name);
+ }
+ return NULL;
+}
+