1234567891011121314151617181920212223242526272829303132333435363738394041424344454647484950515253545556575859606162636465666768697071727374757677787980 |
- #!/bin/sh
- # setup-ip is potentially invoked before qubes-sysinit.sh is done, therefore
- # we perform our qubesdb reads here instead of relying on qvm-service
- # files under /var/run/qubes-service/
- disablegw=`qubesdb-read /qubes-service/disable-default-route 2> /dev/null`
- disabledns=`qubesdb-read /qubes-service/disable-dns-server 2> /dev/null`
- # Location of files which contains list of protected files
- PROTECTED_FILE_LIST='/etc/qubes/protected-files.d'
- ip=`/usr/bin/qubesdb-read /qubes-ip 2> /dev/null`
- if [ x$ip != x ]; then
- netmask=`/usr/bin/qubesdb-read /qubes-netmask`
- gateway=`/usr/bin/qubesdb-read /qubes-gateway`
- secondary_dns=`/usr/bin/qubesdb-read /qubes-secondary-dns`
- /sbin/ifconfig $INTERFACE $ip netmask 255.255.255.255
- /sbin/ifconfig $INTERFACE up
- /sbin/route add -host $gateway dev $INTERFACE
- if [ "x$disablegw" != "x1" ]; then
- /sbin/route add default gw $gateway
- fi
- /sbin/ethtool -K $INTERFACE sg off
- /sbin/ethtool -K $INTERFACE tx off
- if ! grep -rq "^/etc/resolv[.]conf$" "${PROTECTED_FILE_LIST}" 2>/dev/null; then
- echo > /etc/resolv.conf
- if [ "x$disabledns" != "x1" ]; then
- echo "nameserver $gateway" > /etc/resolv.conf
- echo "nameserver $secondary_dns" >> /etc/resolv.conf
- fi
- fi
- if [ -f /var/run/qubes-service/network-manager ]; then
- nm_config=/etc/NetworkManager/system-connections/qubes-uplink-$INTERFACE
- cat > $nm_config <<__EOF__
- ## This file is automatically generated by Qubes OS
- ## Changes in this file will be overriden by /usr/lib/qubes/setup-ip script.
- [802-3-ethernet]
- duplex=full
- [ethernet]
- mac-address=`ip l show dev $INTERFACE |grep link|awk '{print $2}'`
- [connection]
- id=VM uplink $INTERFACE
- uuid=de85f79b-8c3d-405f-a652-cb4c10b4f9ef
- type=802-3-ethernet
- [ipv6]
- method=ignore
- [ipv4]
- method=manual
- may-fail=false
- __EOF__
- if [ "x$disabledns" != "x1" ]; then
- echo "dns=$gateway;$secondary_dns" >> $nm_config
- fi
- if [ "x$disablegw" != "x1" ]; then
- echo "addresses1=$ip;32;$gateway" >> $nm_config
- else
- echo "addresses1=$ip;32" >> $nm_config
- fi
- chmod 600 $nm_config
- fi
- network=$(qubesdb-read /qubes-netvm-network 2>/dev/null)
- if [ "x$network" != "x" ] && [ "x$disabledns" != "x1" ]; then
- gateway=$(qubesdb-read /qubes-netvm-gateway)
- netmask=$(qubesdb-read /qubes-netvm-netmask)
- secondary_dns=$(qubesdb-read /qubes-netvm-secondary-dns)
- echo "NS1=$gateway" > /var/run/qubes/qubes-ns
- echo "NS2=$secondary_dns" >> /var/run/qubes/qubes-ns
- /usr/lib/qubes/qubes-setup-dnat-to-ns
- fi
- if [ "x$network" != "x" ]; then
- [ -x /rw/config/qubes-ip-change-hook ] && /rw/config/qubes-ip-change-hook
- # XXX: Backward compatibility
- [ -x /rw/config/qubes_ip_change_hook ] && /rw/config/qubes_ip_change_hook
- fi
- fi
|