86 lines
		
	
	
		
			2.9 KiB
		
	
	
	
		
			Bash
		
	
	
		
			Executable File
		
	
	
	
	
			
		
		
	
	
			86 lines
		
	
	
		
			2.9 KiB
		
	
	
	
		
			Bash
		
	
	
		
			Executable File
		
	
	
	
	
#!/bin/sh
 | 
						|
 | 
						|
# Source Qubes library.
 | 
						|
# shellcheck disable=SC1091
 | 
						|
. /usr/lib/qubes/init/functions
 | 
						|
 | 
						|
have_qubesdb || exit 0
 | 
						|
 | 
						|
ip=$(/usr/bin/qubesdb-read /qubes-ip 2> /dev/null)
 | 
						|
if [ "x$ip" != x ]; then
 | 
						|
    #netmask=$(/usr/bin/qubesdb-read /qubes-netmask)
 | 
						|
    gateway=$(/usr/bin/qubesdb-read /qubes-gateway)
 | 
						|
    primary_dns=$(/usr/bin/qubesdb-read /qubes-primary-dns 2>/dev/null || echo "$gateway")
 | 
						|
    secondary_dns=$(/usr/bin/qubesdb-read /qubes-secondary-dns)
 | 
						|
    /sbin/ethtool -K "$INTERFACE" sg off
 | 
						|
    /sbin/ethtool -K "$INTERFACE" tx off
 | 
						|
    # If NetworkManager is enabled, let it configure the network
 | 
						|
    if qsvc network-manager ; then
 | 
						|
        nm_config=/etc/NetworkManager/system-connections/qubes-uplink-$INTERFACE
 | 
						|
        cat > "$nm_config" <<__EOF__
 | 
						|
[802-3-ethernet]
 | 
						|
duplex=full
 | 
						|
 | 
						|
[ethernet]
 | 
						|
mac-address=$(ip l show dev "$INTERFACE" |grep link|awk '{print $2}')
 | 
						|
 | 
						|
[connection]
 | 
						|
id=VM uplink $INTERFACE
 | 
						|
uuid=de85f79b-8c3d-405f-a652-cb4c10b4f9ef
 | 
						|
type=802-3-ethernet
 | 
						|
 | 
						|
[ipv6]
 | 
						|
method=ignore
 | 
						|
 | 
						|
[ipv4]
 | 
						|
method=manual
 | 
						|
may-fail=false
 | 
						|
__EOF__
 | 
						|
        if ! qsvc disable-dns-server ; then
 | 
						|
            echo "dns=$primary_dns;$secondary_dns" >> "$nm_config"
 | 
						|
        fi
 | 
						|
        if ! qsvc disable-default-route ; then
 | 
						|
            echo "addresses1=$ip;32;$gateway" >> "$nm_config"
 | 
						|
        else
 | 
						|
            echo "addresses1=$ip;32" >> "$nm_config"
 | 
						|
        fi
 | 
						|
        chmod 600 "$nm_config"
 | 
						|
        # reload connection
 | 
						|
        nmcli connection load "$nm_config" || :
 | 
						|
    else
 | 
						|
        # No NetworkManager enabled, configure the network manually
 | 
						|
        /sbin/ifconfig "$INTERFACE" "$ip" netmask 255.255.255.255
 | 
						|
        /sbin/ifconfig "$INTERFACE" up
 | 
						|
        /sbin/route add -host "$gateway" dev "$INTERFACE"
 | 
						|
        if ! qsvc disable-default-route ; then
 | 
						|
            /sbin/route add default gw "$gateway"
 | 
						|
        fi
 | 
						|
        if ! is_protected_file /etc/resolv.conf ; then
 | 
						|
            echo > /etc/resolv.conf
 | 
						|
            if ! qsvc disable-dns-server ; then
 | 
						|
                echo "nameserver $primary_dns" > /etc/resolv.conf
 | 
						|
                echo "nameserver $secondary_dns" >> /etc/resolv.conf
 | 
						|
            fi
 | 
						|
        fi
 | 
						|
    fi
 | 
						|
    network=$(qubesdb-read /qubes-netvm-network 2>/dev/null)
 | 
						|
    if [ "x$network" != "x" ] && ! qsvc disable-dns-server ; then
 | 
						|
        gateway=$(qubesdb-read /qubes-netvm-gateway)
 | 
						|
        #netmask=$(qubesdb-read /qubes-netvm-netmask)
 | 
						|
        primary_dns=$(qubesdb-read /qubes-netvm-primary-dns 2>/dev/null || echo "$gateway")
 | 
						|
        secondary_dns=$(qubesdb-read /qubes-netvm-secondary-dns)
 | 
						|
        echo "NS1=$primary_dns" > /var/run/qubes/qubes-ns
 | 
						|
        echo "NS2=$secondary_dns" >> /var/run/qubes/qubes-ns
 | 
						|
        /usr/lib/qubes/qubes-setup-dnat-to-ns
 | 
						|
    fi
 | 
						|
    if [ "x$network" != "x" ]; then
 | 
						|
        if [ -x /rw/config/qubes-ip-change-hook ]; then
 | 
						|
            /rw/config/qubes-ip-change-hook
 | 
						|
        fi
 | 
						|
        # XXX: Backward compatibility
 | 
						|
        if [ -x /rw/config/qubes_ip_change_hook ]; then
 | 
						|
            /rw/config/qubes_ip_change_hook
 | 
						|
        fi
 | 
						|
    fi
 | 
						|
fi
 |