summaryrefslogtreecommitdiff
path: root/system-settings/plugins/keyfile/writer.c
diff options
context:
space:
mode:
Diffstat (limited to 'system-settings/plugins/keyfile/writer.c')
-rw-r--r--system-settings/plugins/keyfile/writer.c1013
1 files changed, 1013 insertions, 0 deletions
diff --git a/system-settings/plugins/keyfile/writer.c b/system-settings/plugins/keyfile/writer.c
new file mode 100644
index 000000000..62ccdfa97
--- /dev/null
+++ b/system-settings/plugins/keyfile/writer.c
@@ -0,0 +1,1013 @@
+/* -*- Mode: C; tab-width: 4; indent-tabs-mode: t; c-basic-offset: 4 -*- */
+/* NetworkManager system settings service - keyfile plugin
+ *
+ * This program is free software; you can redistribute it and/or modify
+ * it under the terms of the GNU General Public License as published by
+ * the Free Software Foundation; either version 2 of the License, or
+ * (at your option) any later version.
+ *
+ * This program is distributed in the hope that it will be useful,
+ * but WITHOUT ANY WARRANTY; without even the implied warranty of
+ * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
+ * GNU General Public License for more details.
+ *
+ * You should have received a copy of the GNU General Public License along
+ * with this program; if not, write to the Free Software Foundation, Inc.,
+ * 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA.
+ *
+ * Copyright (C) 2008 Novell, Inc.
+ * Copyright (C) 2008 - 2011 Red Hat, Inc.
+ */
+
+#include <config.h>
+#include <stdlib.h>
+#include <sys/stat.h>
+#include <unistd.h>
+#include <stdio.h>
+#include <errno.h>
+
+#include <dbus/dbus-glib.h>
+#include <nm-setting.h>
+#include <nm-setting-connection.h>
+#include <nm-setting-ip4-config.h>
+#include <nm-setting-ip6-config.h>
+#include <nm-setting-vpn.h>
+#include <nm-setting-wired.h>
+#include <nm-setting-wireless.h>
+#include <nm-setting-ip4-config.h>
+#include <nm-setting-bluetooth.h>
+#include <nm-setting-8021x.h>
+#include <nm-utils.h>
+#include <string.h>
+#include <arpa/inet.h>
+#include <netinet/ether.h>
+#include <ctype.h>
+
+#include "nm-dbus-glib-types.h"
+#include "writer.h"
+#include "common.h"
+
+static gboolean
+write_array_of_uint (GKeyFile *file,
+ NMSetting *setting,
+ const char *key,
+ const GValue *value)
+{
+ GArray *array;
+ int i;
+ int *tmp_array;
+
+ array = (GArray *) g_value_get_boxed (value);
+ if (!array || !array->len)
+ return TRUE;
+
+ tmp_array = g_new (gint, array->len);
+ for (i = 0; i < array->len; i++)
+ tmp_array[i] = g_array_index (array, int, i);
+
+ g_key_file_set_integer_list (file, nm_setting_get_name (setting), key, tmp_array, array->len);
+ g_free (tmp_array);
+ return TRUE;
+}
+
+static void
+ip4_dns_writer (GKeyFile *file,
+ const char *keyfile_dir,
+ const char *uuid,
+ NMSetting *setting,
+ const char *key,
+ const GValue *value)
+{
+ GArray *array;
+ char **list;
+ int i, num = 0;
+
+ g_return_if_fail (G_VALUE_HOLDS (value, DBUS_TYPE_G_UINT_ARRAY));
+
+ array = (GArray *) g_value_get_boxed (value);
+ if (!array || !array->len)
+ return;
+
+ list = g_new0 (char *, array->len + 1);
+
+ for (i = 0; i < array->len; i++) {
+ char buf[INET_ADDRSTRLEN + 1];
+ struct in_addr addr;
+
+ addr.s_addr = g_array_index (array, guint32, i);
+ if (!inet_ntop (AF_INET, &addr, buf, sizeof (buf))) {
+ nm_warning ("%s: error converting IP4 address 0x%X",
+ __func__, ntohl (addr.s_addr));
+ } else
+ list[num++] = g_strdup (buf);
+ }
+
+ g_key_file_set_string_list (file, nm_setting_get_name (setting), key, (const char **) list, num);
+ g_strfreev (list);
+}
+
+static void
+write_ip4_values (GKeyFile *file,
+ const char *setting_name,
+ const char *key,
+ GPtrArray *array,
+ guint32 tuple_len,
+ guint32 addr1_pos,
+ guint32 addr2_pos)
+{
+ char **list = NULL;
+ int i, j;
+
+ list = g_new (char *, tuple_len);
+
+ for (i = 0, j = 0; i < array->len; i++, j++) {
+ GArray *tuple = g_ptr_array_index (array, i);
+ gboolean success = TRUE;
+ char *key_name;
+ int k;
+
+ memset (list, 0, tuple_len * sizeof (char *));
+
+ for (k = 0; k < tuple_len; k++) {
+ if (k == addr1_pos || k == addr2_pos) {
+ char buf[INET_ADDRSTRLEN + 1];
+ struct in_addr addr;
+
+ /* IP addresses */
+ addr.s_addr = g_array_index (tuple, guint32, k);
+ if (!inet_ntop (AF_INET, &addr, buf, sizeof (buf))) {
+ nm_warning ("%s: error converting IP4 address 0x%X",
+ __func__, ntohl (addr.s_addr));
+ success = FALSE;
+ break;
+ } else {
+ list[k] = g_strdup (buf);
+ }
+ } else {
+ /* prefix, metric */
+ list[k] = g_strdup_printf ("%d", g_array_index (tuple, guint32, k));
+ }
+ }
+
+ if (success) {
+ key_name = g_strdup_printf ("%s%d", key, j + 1);
+ g_key_file_set_string_list (file, setting_name, key_name, (const char **) list, tuple_len);
+ g_free (key_name);
+ }
+
+ for (k = 0; k < tuple_len; k++)
+ g_free (list[k]);
+ }
+ g_free (list);
+}
+
+static void
+ip4_addr_writer (GKeyFile *file,
+ const char *keyfile_dir,
+ const char *uuid,
+ NMSetting *setting,
+ const char *key,
+ const GValue *value)
+{
+ GPtrArray *array;
+ const char *setting_name = nm_setting_get_name (setting);
+
+ g_return_if_fail (G_VALUE_HOLDS (value, DBUS_TYPE_G_ARRAY_OF_ARRAY_OF_UINT));
+
+ array = (GPtrArray *) g_value_get_boxed (value);
+ if (array && array->len)
+ write_ip4_values (file, setting_name, key, array, 3, 0, 2);
+}
+
+static void
+ip4_route_writer (GKeyFile *file,
+ const char *keyfile_dir,
+ const char *uuid,
+ NMSetting *setting,
+ const char *key,
+ const GValue *value)
+{
+ GPtrArray *array;
+ const char *setting_name = nm_setting_get_name (setting);
+
+ g_return_if_fail (G_VALUE_HOLDS (value, DBUS_TYPE_G_ARRAY_OF_ARRAY_OF_UINT));
+
+ array = (GPtrArray *) g_value_get_boxed (value);
+ if (array && array->len)
+ write_ip4_values (file, setting_name, key, array, 4, 0, 2);
+}
+
+static void
+ip6_dns_writer (GKeyFile *file,
+ const char *keyfile_dir,
+ const char *uuid,
+ NMSetting *setting,
+ const char *key,
+ const GValue *value)
+{
+ GPtrArray *array;
+ GByteArray *byte_array;
+ char **list;
+ int i, num = 0;
+
+ g_return_if_fail (G_VALUE_HOLDS (value, DBUS_TYPE_G_ARRAY_OF_ARRAY_OF_UCHAR));
+
+ array = (GPtrArray *) g_value_get_boxed (value);
+ if (!array || !array->len)
+ return;
+
+ list = g_new0 (char *, array->len + 1);
+
+ for (i = 0; i < array->len; i++) {
+ char buf[INET6_ADDRSTRLEN];
+
+ byte_array = g_ptr_array_index (array, i);
+ if (!inet_ntop (AF_INET6, (struct in6_addr *) byte_array->data, buf, sizeof (buf))) {
+ int j;
+ GString *ip6_str = g_string_new (NULL);
+ g_string_append_printf (ip6_str, "%02X", byte_array->data[0]);
+ for (j = 1; j < 16; j++)
+ g_string_append_printf (ip6_str, " %02X", byte_array->data[j]);
+ nm_warning ("%s: error converting IP6 address %s",
+ __func__, ip6_str->str);
+ g_string_free (ip6_str, TRUE);
+ } else
+ list[num++] = g_strdup (buf);
+ }
+
+ g_key_file_set_string_list (file, nm_setting_get_name (setting), key, (const char **) list, num);
+ g_strfreev (list);
+}
+
+static gboolean
+ip6_array_to_addr (GValueArray *values,
+ guint32 idx,
+ char *buf,
+ size_t buflen,
+ gboolean *out_is_unspec)
+{
+ GByteArray *byte_array;
+ GValue *addr_val;
+ struct in6_addr *addr;
+
+ g_return_val_if_fail (buflen >= INET6_ADDRSTRLEN, FALSE);
+
+ addr_val = g_value_array_get_nth (values, idx);
+ byte_array = g_value_get_boxed (addr_val);
+ addr = (struct in6_addr *) byte_array->data;
+
+ if (out_is_unspec && IN6_IS_ADDR_UNSPECIFIED (addr))
+ *out_is_unspec = TRUE;
+
+ errno = 0;
+ if (!inet_ntop (AF_INET6, addr, buf, buflen)) {
+ GString *ip6_str = g_string_sized_new (INET6_ADDRSTRLEN + 10);
+
+ /* error converting the address */
+ g_string_append_printf (ip6_str, "%02X", byte_array->data[0]);
+ for (idx = 1; idx < 16; idx++)
+ g_string_append_printf (ip6_str, " %02X", byte_array->data[idx]);
+ nm_warning ("%s: error %d converting IP6 address %s",
+ __func__, errno, ip6_str->str);
+ g_string_free (ip6_str, TRUE);
+ return FALSE;
+ }
+
+ return TRUE;
+}
+
+static char *
+ip6_array_to_addr_prefix (GValueArray *values)
+{
+ GValue *prefix_val;
+ char *ret = NULL;
+ GString *ip6_str;
+ char buf[INET6_ADDRSTRLEN + 1];
+ gboolean is_unspec = FALSE;
+
+ /* address */
+ if (ip6_array_to_addr (values, 0, buf, sizeof (buf), NULL)) {
+ /* Enough space for the address, '/', and the prefix */
+ ip6_str = g_string_sized_new ((INET6_ADDRSTRLEN * 2) + 5);
+
+ /* prefix */
+ g_string_append (ip6_str, buf);
+ prefix_val = g_value_array_get_nth (values, 1);
+ g_string_append_printf (ip6_str, "/%u", g_value_get_uint (prefix_val));
+
+ if (ip6_array_to_addr (values, 2, buf, sizeof (buf), &is_unspec)) {
+ if (!is_unspec)
+ g_string_append_printf (ip6_str, ",%s", buf);
+ }
+
+ ret = ip6_str->str;
+ g_string_free (ip6_str, FALSE);
+ }
+
+ return ret;
+}
+
+static void
+ip6_addr_writer (GKeyFile *file,
+ const char *keyfile_dir,
+ const char *uuid,
+ NMSetting *setting,
+ const char *key,
+ const GValue *value)
+{
+ GPtrArray *array;
+ const char *setting_name = nm_setting_get_name (setting);
+ int i, j;
+
+ g_return_if_fail (G_VALUE_HOLDS (value, DBUS_TYPE_G_ARRAY_OF_IP6_ADDRESS));
+
+ array = (GPtrArray *) g_value_get_boxed (value);
+ if (!array || !array->len)
+ return;
+
+ for (i = 0, j = 1; i < array->len; i++) {
+ GValueArray *values = g_ptr_array_index (array, i);
+ char *key_name, *ip6_addr;
+
+ if (values->n_values != 3) {
+ nm_warning ("%s: error writing IP6 address %d (address array length "
+ "%d is not 3)",
+ __func__, i, values->n_values);
+ continue;
+ }
+
+ ip6_addr = ip6_array_to_addr_prefix (values);
+ if (ip6_addr) {
+ /* Write it out */
+ key_name = g_strdup_printf ("%s%d", key, j++);
+ g_key_file_set_string (file, setting_name, key_name, ip6_addr);
+ g_free (key_name);
+ g_free (ip6_addr);
+ }
+ }
+}
+
+static void
+ip6_route_writer (GKeyFile *file,
+ const char *keyfile_dir,
+ const char *uuid,
+ NMSetting *setting,
+ const char *key,
+ const GValue *value)
+{
+ GPtrArray *array;
+ const char *setting_name = nm_setting_get_name (setting);
+ char *list[3];
+ int i, j;
+
+ g_return_if_fail (G_VALUE_HOLDS (value, DBUS_TYPE_G_ARRAY_OF_IP6_ROUTE));
+
+ array = (GPtrArray *) g_value_get_boxed (value);
+ if (!array || !array->len)
+ return;
+
+ for (i = 0, j = 1; i < array->len; i++) {
+ GValueArray *values = g_ptr_array_index (array, i);
+ char *key_name;
+ guint32 int_val;
+ char buf[INET6_ADDRSTRLEN + 1];
+ gboolean is_unspec = FALSE;
+
+ memset (list, 0, sizeof (list));
+
+ /* Address and prefix */
+ list[0] = ip6_array_to_addr_prefix (values);
+ if (!list[0])
+ continue;
+
+ /* Next Hop */
+ if (!ip6_array_to_addr (values, 2, buf, sizeof (buf), &is_unspec))
+ continue;
+ if (is_unspec)
+ continue;
+ list[1] = g_strdup (buf);
+
+ /* Metric */
+ value = g_value_array_get_nth (values, 3);
+ int_val = g_value_get_uint (value);
+ list[2] = g_strdup_printf ("%d", int_val);
+
+ /* Write it out */
+ key_name = g_strdup_printf ("%s%d", key, j++);
+ g_key_file_set_string_list (file, setting_name, key_name, (const char **) list, 3);
+ g_free (key_name);
+
+ g_free (list[0]);
+ g_free (list[1]);
+ g_free (list[2]);
+ }
+}
+
+
+static void
+mac_address_writer (GKeyFile *file,
+ const char *keyfile_dir,
+ const char *uuid,
+ NMSetting *setting,
+ const char *key,
+ const GValue *value)
+{
+ GByteArray *array;
+ const char *setting_name = nm_setting_get_name (setting);
+ char *mac;
+ struct ether_addr tmp;
+
+ g_return_if_fail (G_VALUE_HOLDS (value, DBUS_TYPE_G_UCHAR_ARRAY));
+
+ array = (GByteArray *) g_value_get_boxed (value);
+ if (!array)
+ return;
+
+ if (array->len != ETH_ALEN) {
+ nm_warning ("%s: invalid %s / %s MAC address length %d",
+ __func__, setting_name, key, array->len);
+ return;
+ }
+
+ memcpy (tmp.ether_addr_octet, array->data, ETH_ALEN);
+ mac = ether_ntoa (&tmp);
+ g_key_file_set_string (file, setting_name, key, mac);
+}
+
+typedef struct {
+ GKeyFile *file;
+ const char *setting_name;
+} WriteStringHashInfo;
+
+static void
+write_hash_of_string_helper (gpointer key, gpointer data, gpointer user_data)
+{
+ WriteStringHashInfo *info = (WriteStringHashInfo *) user_data;
+ const char *property = (const char *) key;
+ const char *value = (const char *) data;
+
+ g_key_file_set_string (info->file,
+ info->setting_name,
+ property,
+ value);
+}
+
+static void
+write_hash_of_string (GKeyFile *file,
+ NMSetting *setting,
+ const char *key,
+ const GValue *value)
+{
+ GHashTable *hash = g_value_get_boxed (value);
+ WriteStringHashInfo info;
+
+ info.file = file;
+
+ /* Write VPN secrets out to a different group to keep them separate */
+ if ( (G_OBJECT_TYPE (setting) == NM_TYPE_SETTING_VPN)
+ && !strcmp (key, NM_SETTING_VPN_SECRETS)) {
+ info.setting_name = VPN_SECRETS_GROUP;
+ } else
+ info.setting_name = nm_setting_get_name (setting);
+
+ g_hash_table_foreach (hash, write_hash_of_string_helper, &info);
+}
+
+static void
+ssid_writer (GKeyFile *file,
+ const char *keyfile_dir,
+ const char *uuid,
+ NMSetting *setting,
+ const char *key,
+ const GValue *value)
+{
+ GByteArray *array;
+ const char *setting_name = nm_setting_get_name (setting);
+ gboolean new_format = TRUE;
+ int i, *tmp_array;
+ char *ssid;
+
+ g_return_if_fail (G_VALUE_HOLDS (value, DBUS_TYPE_G_UCHAR_ARRAY));
+
+ array = (GByteArray *) g_value_get_boxed (value);
+ if (!array || !array->len)
+ return;
+
+ /* Check whether each byte is printable. If not, we have to use an
+ * integer list, otherwise we can just use a string.
+ */
+ for (i = 0; i < array->len; i++) {
+ char c = array->data[i] & 0xFF;
+ if (!isprint (c)) {
+ new_format = FALSE;
+ break;
+ }
+ }
+
+ if (new_format) {
+ ssid = g_malloc0 (array->len + 1);
+ memcpy (ssid, array->data, array->len);
+ g_key_file_set_string (file, setting_name, key, ssid);
+ g_free (ssid);
+ } else {
+ tmp_array = g_new (gint, array->len);
+ for (i = 0; i < array->len; i++)
+ tmp_array[i] = (int) array->data[i];
+ g_key_file_set_integer_list (file, setting_name, key, tmp_array, array->len);
+ g_free (tmp_array);
+ }
+}
+
+typedef struct ObjectType {
+ const char *key;
+ const char *suffix;
+ const char *privkey_pw_prop;
+ NMSetting8021xCKScheme (*scheme_func) (NMSetting8021x *setting);
+ NMSetting8021xCKFormat (*format_func) (NMSetting8021x *setting);
+ const char * (*path_func) (NMSetting8021x *setting);
+ const GByteArray * (*blob_func) (NMSetting8021x *setting);
+} ObjectType;
+
+static const ObjectType objtypes[10] = {
+ { NM_SETTING_802_1X_CA_CERT,
+ "ca-cert",
+ NULL,
+ nm_setting_802_1x_get_ca_cert_scheme,
+ NULL,
+ nm_setting_802_1x_get_ca_cert_path,
+ nm_setting_802_1x_get_ca_cert_blob },
+
+ { NM_SETTING_802_1X_PHASE2_CA_CERT,
+ "inner-ca-cert",
+ NULL,
+ nm_setting_802_1x_get_phase2_ca_cert_scheme,
+ NULL,
+ nm_setting_802_1x_get_phase2_ca_cert_path,
+ nm_setting_802_1x_get_phase2_ca_cert_blob },
+
+ { NM_SETTING_802_1X_CLIENT_CERT,
+ "client-cert",
+ NULL,
+ nm_setting_802_1x_get_client_cert_scheme,
+ NULL,
+ nm_setting_802_1x_get_client_cert_path,
+ nm_setting_802_1x_get_client_cert_blob },
+
+ { NM_SETTING_802_1X_PHASE2_CLIENT_CERT,
+ "inner-client-cert",
+ NULL,
+ nm_setting_802_1x_get_phase2_client_cert_scheme,
+ NULL,
+ nm_setting_802_1x_get_phase2_client_cert_path,
+ nm_setting_802_1x_get_phase2_client_cert_blob },
+
+ { NM_SETTING_802_1X_PRIVATE_KEY,
+ "private-key",
+ NM_SETTING_802_1X_PRIVATE_KEY_PASSWORD,
+ nm_setting_802_1x_get_private_key_scheme,
+ nm_setting_802_1x_get_private_key_format,
+ nm_setting_802_1x_get_private_key_path,
+ nm_setting_802_1x_get_private_key_blob },
+
+ { NM_SETTING_802_1X_PHASE2_PRIVATE_KEY,
+ "inner-private-key",
+ NM_SETTING_802_1X_PHASE2_PRIVATE_KEY_PASSWORD,
+ nm_setting_802_1x_get_phase2_private_key_scheme,
+ nm_setting_802_1x_get_phase2_private_key_format,
+ nm_setting_802_1x_get_phase2_private_key_path,
+ nm_setting_802_1x_get_phase2_private_key_blob },
+
+ { NULL },
+};
+
+static gboolean
+write_cert_key_file (const char *path,
+ const GByteArray *data,
+ GError **error)
+{
+ char *tmppath;
+ int fd = -1, written;
+ gboolean success = FALSE;
+
+ tmppath = g_malloc0 (strlen (path) + 10);
+ g_assert (tmppath);
+ memcpy (tmppath, path, strlen (path));
+ strcat (tmppath, ".XXXXXX");
+
+ errno = 0;
+ fd = mkstemp (tmppath);
+ if (fd < 0) {
+ g_set_error (error, KEYFILE_PLUGIN_ERROR, 0,
+ "Could not create temporary file for '%s': %d",
+ path, errno);
+ goto out;
+ }
+
+ /* Only readable by root */
+ errno = 0;
+ if (fchmod (fd, S_IRUSR | S_IWUSR) != 0) {
+ close (fd);
+ unlink (tmppath);
+ g_set_error (error, KEYFILE_PLUGIN_ERROR, 0,
+ "Could not set permissions for temporary file '%s': %d",
+ path, errno);
+ goto out;
+ }
+
+ errno = 0;
+ written = write (fd, data->data, data->len);
+ if (written != data->len) {
+ close (fd);
+ unlink (tmppath);
+ g_set_error (error, KEYFILE_PLUGIN_ERROR, 0,
+ "Could not write temporary file for '%s': %d",
+ path, errno);
+ goto out;
+ }
+ close (fd);
+
+ /* Try to rename */
+ errno = 0;
+ if (rename (tmppath, path) == 0)
+ success = TRUE;
+ else {
+ unlink (tmppath);
+ g_set_error (error, KEYFILE_PLUGIN_ERROR, 0,
+ "Could not rename temporary file to '%s': %d",
+ path, errno);
+ }
+
+out:
+ g_free (tmppath);
+ return success;
+}
+
+static void
+cert_writer (GKeyFile *file,
+ const char *keyfile_dir,
+ const char *uuid,
+ NMSetting *setting,
+ const char *key,
+ const GValue *value)
+{
+ const char *setting_name = nm_setting_get_name (setting);
+ NMSetting8021xCKScheme scheme;
+ NMSetting8021xCKFormat format;
+ const char *path = NULL, *ext = "der";
+ const ObjectType *objtype = NULL;
+ int i;
+
+ for (i = 0; i < G_N_ELEMENTS (objtypes) && objtypes[i].key; i++) {
+ if (g_strcmp0 (objtypes[i].key, key) == 0) {
+ objtype = &objtypes[i];
+ break;
+ }
+ }
+ g_return_if_fail (objtype != NULL);
+
+ scheme = objtypes->scheme_func (NM_SETTING_802_1X (setting));
+ if (scheme == NM_SETTING_802_1X_CK_SCHEME_PATH) {
+ path = objtype->path_func (NM_SETTING_802_1X (setting));
+ g_assert (path);
+ g_key_file_set_string (file, setting_name, key, path);
+ } else if (scheme == NM_SETTING_802_1X_CK_SCHEME_BLOB) {
+ const GByteArray *blob;
+ GByteArray *enc_key = NULL;
+ gboolean success;
+ GError *error = NULL;
+ char *new_path;
+
+ /* Write the blob out to a file on-disk. If this item is a private
+ * key, it'll be the decrypted private key data, which we need to
+ * re-encrypt and write out to disk, but not if it's PKCS#12, since
+ * that format is already encrypted as a blob. Whee.
+ */
+ blob = objtype->blob_func (NM_SETTING_802_1X (setting));
+
+ if (objtype->format_func) { /* check for a private key */
+ char *password = NULL, *generated_pw = NULL;
+
+ format = objtype->format_func (NM_SETTING_802_1X (setting));
+ if (format == NM_SETTING_802_1X_CK_FORMAT_PKCS12) {
+ ext = "p12";
+ } else {
+ /* Encrypt the unencrypted private key */
+ g_object_get (setting, objtype->privkey_pw_prop, &password, NULL);
+ blob = enc_key = nm_utils_rsa_key_encrypt (blob, password, &generated_pw, &error);
+ if (!enc_key) {
+ g_warning ("Failed to re-encrypt private key: %s", error->message);
+ g_error_free (error);
+ g_free (password);
+ return;
+ }
+
+ if (generated_pw) {
+ /* Set the string in both the keyfile and the setting in
+ * case the private key password will be set either before
+ * or after this function is called.
+ */
+ g_key_file_set_string (file, setting_name, objtype->privkey_pw_prop, generated_pw);
+ g_object_set (setting, objtype->privkey_pw_prop, generated_pw, NULL);
+ }
+ g_free (password);
+ g_free (generated_pw);
+
+ ext = "pem";
+ }
+ }
+ g_assert (blob || enc_key);
+
+ /* Write the raw data out to the standard file so that we can use paths
+ * from now on instead of pushing around the certificate data itself.
+ */
+ new_path = g_strdup_printf ("%s/%s-%s.%s", keyfile_dir, uuid, objtype->suffix, ext);
+ g_assert (new_path);
+
+ success = write_cert_key_file (new_path, blob, &error);
+ if (success) {
+ /* Write the path value to the keyfile */
+ g_key_file_set_string (file, setting_name, key, new_path);
+ } else {
+ g_warning ("Failed to write certificate/key %s: %s", new_path, error->message);
+ g_error_free (error);
+ }
+
+ g_free (new_path);
+ if (enc_key)
+ g_byte_array_free (enc_key, TRUE);
+ } else
+ g_assert_not_reached ();
+}
+
+typedef struct {
+ const char *setting_name;
+ const char *key;
+ void (*writer) (GKeyFile *keyfile,
+ const char *keyfile_dir,
+ const char *uuid,
+ NMSetting *setting,
+ const char *key,
+ const GValue *value);
+} KeyWriter;
+
+/* A table of keys that require further parsing/conversion because they are
+ * stored in a format that can't be automatically read using the key's type.
+ * i.e. IPv4 addresses, which are stored in NetworkManager as guint32, but are
+ * stored in keyfiles as strings, eg "10.1.1.2" or IPv6 addresses stored
+ * in struct in6_addr internally, but as string in keyfiles.
+ */
+static KeyWriter key_writers[] = {
+ { NM_SETTING_IP4_CONFIG_SETTING_NAME,
+ NM_SETTING_IP4_CONFIG_ADDRESSES,
+ ip4_addr_writer },
+ { NM_SETTING_IP6_CONFIG_SETTING_NAME,
+ NM_SETTING_IP6_CONFIG_ADDRESSES,
+ ip6_addr_writer },
+ { NM_SETTING_IP4_CONFIG_SETTING_NAME,
+ NM_SETTING_IP4_CONFIG_ROUTES,
+ ip4_route_writer },
+ { NM_SETTING_IP6_CONFIG_SETTING_NAME,
+ NM_SETTING_IP6_CONFIG_ROUTES,
+ ip6_route_writer },
+ { NM_SETTING_IP4_CONFIG_SETTING_NAME,
+ NM_SETTING_IP4_CONFIG_DNS,
+ ip4_dns_writer },
+ { NM_SETTING_IP6_CONFIG_SETTING_NAME,
+ NM_SETTING_IP6_CONFIG_DNS,
+ ip6_dns_writer },
+ { NM_SETTING_WIRED_SETTING_NAME,
+ NM_SETTING_WIRED_MAC_ADDRESS,
+ mac_address_writer },
+ { NM_SETTING_WIRED_SETTING_NAME,
+ NM_SETTING_WIRED_CLONED_MAC_ADDRESS,
+ mac_address_writer },
+ { NM_SETTING_WIRELESS_SETTING_NAME,
+ NM_SETTING_WIRELESS_MAC_ADDRESS,
+ mac_address_writer },
+ { NM_SETTING_WIRELESS_SETTING_NAME,
+ NM_SETTING_WIRELESS_CLONED_MAC_ADDRESS,
+ mac_address_writer },
+ { NM_SETTING_WIRELESS_SETTING_NAME,
+ NM_SETTING_WIRELESS_BSSID,
+ mac_address_writer },
+ { NM_SETTING_BLUETOOTH_SETTING_NAME,
+ NM_SETTING_BLUETOOTH_BDADDR,
+ mac_address_writer },
+ { NM_SETTING_WIRELESS_SETTING_NAME,
+ NM_SETTING_WIRELESS_SSID,
+ ssid_writer },
+ { NM_SETTING_802_1X_SETTING_NAME,
+ NM_SETTING_802_1X_CA_CERT,
+ cert_writer },
+ { NM_SETTING_802_1X_SETTING_NAME,
+ NM_SETTING_802_1X_CLIENT_CERT,
+ cert_writer },
+ { NM_SETTING_802_1X_SETTING_NAME,
+ NM_SETTING_802_1X_PRIVATE_KEY,
+ cert_writer },
+ { NM_SETTING_802_1X_SETTING_NAME,
+ NM_SETTING_802_1X_PHASE2_CA_CERT,
+ cert_writer },
+ { NM_SETTING_802_1X_SETTING_NAME,
+ NM_SETTING_802_1X_PHASE2_CLIENT_CERT,
+ cert_writer },
+ { NM_SETTING_802_1X_SETTING_NAME,
+ NM_SETTING_802_1X_PHASE2_PRIVATE_KEY,
+ cert_writer },
+ { NULL, NULL, NULL }
+};
+
+typedef struct {
+ GKeyFile *keyfile;
+ const char *keyfile_dir;
+ const char *uuid;
+} WriteInfo;
+
+static void
+write_setting_value (NMSetting *setting,
+ const char *key,
+ const GValue *value,
+ GParamFlags flag,
+ gpointer user_data)
+{
+ WriteInfo *info = user_data;
+ const char *setting_name;
+ GType type = G_VALUE_TYPE (value);
+ KeyWriter *writer = &key_writers[0];
+ GParamSpec *pspec;
+
+ /* Setting name gets picked up from the keyfile's section name instead */
+ if (!strcmp (key, NM_SETTING_NAME))
+ return;
+
+ /* Don't write the NMSettingConnection object's 'read-only' property */
+ if ( NM_IS_SETTING_CONNECTION (setting)
+ && !strcmp (key, NM_SETTING_CONNECTION_READ_ONLY))
+ return;
+
+ setting_name = nm_setting_get_name (setting);
+
+ /* If the value is the default value, remove the item from the keyfile */
+ pspec = g_object_class_find_property (G_OBJECT_GET_CLASS (setting), key);
+ if (pspec) {
+ if (g_param_value_defaults (pspec, (GValue *) value)) {
+ g_key_file_remove_key (info->keyfile, setting_name, key, NULL);
+ return;
+ }
+ }
+
+ /* Look through the list of handlers for non-standard format key values */
+ while (writer->setting_name) {
+ if (!strcmp (writer->setting_name, setting_name) && !strcmp (writer->key, key)) {
+ (*writer->writer) (info->keyfile, info->keyfile_dir, info->uuid, setting, key, value);
+ return;
+ }
+ writer++;
+ }
+
+ if (type == G_TYPE_STRING) {
+ const char *str;
+
+ str = g_value_get_string (value);
+ if (str)
+ g_key_file_set_string (info->keyfile, setting_name, key, str);
+ } else if (type == G_TYPE_UINT)
+ g_key_file_set_integer (info->keyfile, setting_name, key, (int) g_value_get_uint (value));
+ else if (type == G_TYPE_INT)
+ g_key_file_set_integer (info->keyfile, setting_name, key, g_value_get_int (value));
+ else if (type == G_TYPE_UINT64) {
+ char *numstr;
+
+ numstr = g_strdup_printf ("%" G_GUINT64_FORMAT, g_value_get_uint64 (value));
+ g_key_file_set_value (info->keyfile, setting_name, key, numstr);
+ g_free (numstr);
+ } else if (type == G_TYPE_BOOLEAN) {
+ g_key_file_set_boolean (info->keyfile, setting_name, key, g_value_get_boolean (value));
+ } else if (type == G_TYPE_CHAR) {
+ g_key_file_set_integer (info->keyfile, setting_name, key, (int) g_value_get_char (value));
+ } else if (type == DBUS_TYPE_G_UCHAR_ARRAY) {
+ GByteArray *array;
+
+ array = (GByteArray *) g_value_get_boxed (value);
+ if (array && array->len > 0) {
+ int *tmp_array;
+ int i;
+
+ tmp_array = g_new (gint, array->len);
+ for (i = 0; i < array->len; i++)
+ tmp_array[i] = (int) array->data[i];
+
+ g_key_file_set_integer_list (info->keyfile, setting_name, key, tmp_array, array->len);
+ g_free (tmp_array);
+ }
+ } else if (type == DBUS_TYPE_G_LIST_OF_STRING) {
+ GSList *list;
+ GSList *iter;
+
+ list = (GSList *) g_value_get_boxed (value);
+ if (list) {
+ char **array;
+ int i = 0;
+
+ array = g_new (char *, g_slist_length (list));
+ for (iter = list; iter; iter = iter->next)
+ array[i++] = iter->data;
+
+ g_key_file_set_string_list (info->keyfile, setting_name, key, (const gchar **const) array, i);
+ g_free (array);
+ }
+ } else if (type == DBUS_TYPE_G_MAP_OF_STRING) {
+ write_hash_of_string (info->keyfile, setting, key, value);
+ } else if (type == DBUS_TYPE_G_UINT_ARRAY) {
+ if (!write_array_of_uint (info->keyfile, setting, key, value)) {
+ g_warning ("Unhandled setting property type (write) '%s/%s' : '%s'",
+ setting_name, key, g_type_name (type));
+ }
+ } else {
+ g_warning ("Unhandled setting property type (write) '%s/%s' : '%s'",
+ setting_name, key, g_type_name (type));
+ }
+}
+
+char *
+writer_id_to_filename (const char *id)
+{
+ char *filename, *f;
+ const char *i = id;
+
+ f = filename = g_malloc0 (strlen (id) + 1);
+
+ /* Convert '/' to '*' */
+ while (*i) {
+ if (*i == '/')
+ *f++ = '*';
+ else
+ *f++ = *i;
+ i++;
+ }
+
+ return filename;
+}
+
+gboolean
+write_connection (NMConnection *connection,
+ const char *keyfile_dir,
+ uid_t owner_uid,
+ pid_t owner_grp,
+ char **out_path,
+ GError **error)
+{
+ NMSettingConnection *s_con;
+ GKeyFile *key_file;
+ char *data;
+ gsize len;
+ gboolean success = FALSE;
+ char *filename, *path;
+ int err;
+ WriteInfo info;
+
+ if (out_path)
+ g_return_val_if_fail (*out_path == NULL, FALSE);
+
+ s_con = NM_SETTING_CONNECTION (nm_connection_get_setting (connection, NM_TYPE_SETTING_CONNECTION));
+ if (!s_con)
+ return success;
+
+ info.keyfile = key_file = g_key_file_new ();
+ info.keyfile_dir = keyfile_dir;
+ info.uuid = nm_setting_connection_get_uuid (s_con);
+ nm_connection_for_each_setting_value (connection, write_setting_value, &info);
+ data = g_key_file_to_data (key_file, &len, error);
+ if (!data)
+ goto out;
+
+ filename = writer_id_to_filename (nm_setting_connection_get_id (s_con));
+ path = g_build_filename (keyfile_dir, filename, NULL);
+ g_free (filename);
+
+ g_file_set_contents (path, data, len, error);
+ if (chown (path, owner_uid, owner_grp) < 0) {
+ g_set_error (error, KEYFILE_PLUGIN_ERROR, 0,
+ "%s.%d: error chowning '%s': %d", __FILE__, __LINE__,
+ path, errno);
+ unlink (path);
+ } else {
+ err = chmod (path, S_IRUSR | S_IWUSR);
+ if (err) {
+ g_set_error (error, KEYFILE_PLUGIN_ERROR, 0,
+ "%s.%d: error setting permissions on '%s': %d", __FILE__,
+ __LINE__, path, errno);
+ unlink (path);
+ } else {
+ if (out_path)
+ *out_path = g_strdup (path);
+ success = TRUE;
+ }
+ }
+ g_free (path);
+
+out:
+ g_free (data);
+ g_key_file_free (key_file);
+ return success;
+}