Age | Commit message (Collapse) | Author | Files | Lines |
|
|
|
|
|
The main.conf 'DefaultAutoConnectTechnologies' is a list of
service type strings. It is converted to a list of service type
enums, and thus the configuration option is accessible via the
function connman_setting_get_uint_list().
If this option is not specified, the default technologies to
autoconnect are wifi, ethernet and cellular just like before.
|
|
|
|
In order to cancel any ongoing resolution, check
if both resolv and resolv_id are valid.
|
|
Add Fallback timeservers via main.conf.
These timeservers are used for time corrections when
there are no valid timeservers provided by the user or by the
network. The list of timeservers which are queried for
timing correction are Timeservers.Configuration (set by the
user), service timeservers(via service), gateway, global
timeservers (via clock API) and fallback timeservers, in that order.
|
|
|
|
If the NTP server failed to respond, NTP client wait for 16 seconds
before trying the next server. But since now we have the default
gateway as a possible candidate for NTP (which has higher priority over
global timeaservers), there might be a chance that it might fail to
respond to a NTP query (e.g a wifi router without ntp support).
We have to wait for 16 sec, untill NTP switches to the next server.
This seems like a long period, especially if you made timezone changes
and you want the NTP sync to happen asap. Hence reducing this timeout to
5 seconds.
|
|
Add script to modify service Timeservers.Configuration property.
|
|
|
|
Add Timeservers.Configuration timerservers (if any) to the list of
timeservers for time correction query. Now the Order is
Timeserver.Config (via the user), service timeserver (via DHCP).
default gateway (system), global timeservers (via the user).
|
|
This property helps to add service specific timeservers. These are set by the
user and are per service.
|
|
Add default service gateway to the timeserver query list.
Now the list is service timeservers (via DHCP), gateway and global
timeservers, in that order.
|
|
Create a timeserver list for NTP query. This list consists of
timeserver provided via DHCP and the ones set by user in that
order. We recreate this list everytime the default service changes
or one of the timeserver values change.
Use getaddrinfo to determine if the timeserver is a domain name or
a IP address.
|
|
Trigger NTP sync on default service going to READY/ONLINE state
instead of triggering NTP sync on ONLINE state only. This makes
sense for local ntp servers even if the wispr check fails.
|
|
Export the default service via this api. This is helpful
to obtain info like default service's timeserver list and gateway.
|
|
Fixes BMC#24997.
|
|
The fallback Timeservers should replace this plugin.
|
|
Even though service watches accepted a "destroy" callback, they were
being ignored. This fix properly pass them along so they are called when
the watch is removed.
|
|
- corrected the space before '{'
|
|
This is needed so that VPN gets default route when moving
services. That can happen if VPN did not had default route
before.
|
|
Before this patch the system created following routes for VPN
Destination Gateway Genmask Flags Metric Ref Use Iface
0.0.0.0 192.168.10.9 0.0.0.0 UG 0 0 0 vpn0
192.168.2.0 0.0.0.0 255.255.255.0 U 0 0 0 wlan0
192.168.2.1 0.0.0.0 255.255.255.255 UH 0 0 0 vpn0
192.168.2.1 0.0.0.0 255.255.255.255 UH 0 0 0 wlan0
192.168.10.1 192.168.10.9 255.255.255.255 UGH 0 0 0 vpn0
192.168.10.9 0.0.0.0 255.255.255.255 UH 0 0 0 vpn0
Here the route to gateway in wlan0 192.168.2.1 via vpn0 is not
correct and it will prevent connections to 192.168.2.1
The correct routes should be:
Destination Gateway Genmask Flags Metric Ref Use Iface
0.0.0.0 192.168.10.9 0.0.0.0 UG 0 0 0 vpn0
192.168.2.0 0.0.0.0 255.255.255.0 U 0 0 0 wlan0
192.168.2.1 0.0.0.0 255.255.255.255 UH 0 0 0 wlan0
192.168.10.1 192.168.10.9 255.255.255.255 UGH 0 0 0 vpn0
192.168.10.9 0.0.0.0 255.255.255.255 UH 0 0 0 vpn0
Fixes MBC#25035
|
|
"The format modifier for size_t is %zd." (Marcel, 20/12/2011)
|
|
The 6to4 code checks that we can connect to ipv6.connman.net
host via tunnel. The check can be done only after we have the
tunnel up and running. The patch makes sure that we do the
checks only after we have got newlink message from rtnl.
|
|
These prints are useful when checking why network
connection failed.
|
|
In order to see what is the problem with web connection,
add debug print function.
|
|
The rtnl support functions are now in inet.c which is a
more logical place for them and now other files can also
use them.
|
|
This is useful if P-t-P link does not have a default route.
Fixes BMC#25027
|
|
Setting routes to nameservers need special setup if the
nameservers are behind point-to-point link, the gateway
must not be set in this case.
|
|
These functions are needed when we need to setup a route
to point-to-point link destination address. The route is
needed if P-t-P link does not have a default route.
|
|
|
|
If the new VPN gateway has split routing set, then do not
clear original default route because VPN will not set the
default route. Without this check we would not get any
proper default route set.
|
|
|
|
This is done as we might have changed the order of the services
so force update of the service list.
|
|
|
|
|
|
The split routing is done when user moves the services and it is only
done if there are routes defined for that specific VPN provider.
|
|
|
|
|
|
|
|
Allow user to add routes when setting up VPN. This is useful if
the VPN cannot be configured to setup additional routes itself.
|
|
The old one is not valid anymore.
|
|
oFono sends several ConnectionContext.PropertyChanged("Active", False)
after it was told to disconnect.
After studying the oFono part, it looks like that serveral CREGS updates
could trigger oFono to send us the same flag over and over again
(see ofono_gprs_status_notify()).
Even though oFono might missbehave, ConnMan should not crash so
easily. Luckely, the fix is very simple. We should just check if we still
have a valid network pointer before accessing it.
Fixes BMC#25026
|
|
Move common code into a function for destroying the request data.
|
|
Valgrind reports memory leak here.
|
|
The provider can be unreffed in vpn_died() or in vpn_disconnect().
We must do the unref only once.
|
|
This fixes a segfault in request_timeout when disabling tethering.
|
|
Setting socket option BINDTODEVICE requires CAP_NET_RAW capability.
|
|
|
|
Fixes BMC#24986
|