setup-ip 2.5 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172
  1. #!/bin/sh
  2. # setup-ip is potentially invoked before qubes-sysinit.sh is done, therefore
  3. # we perform our qubesdb reads here instead of relying on qvm-service
  4. # files under /var/run/qubes-service/
  5. disablegw=`qubesdb-read /qubes-service/disable-default-route 2> /dev/null`
  6. disabledns=`qubesdb-read /qubes-service/disable-dns-server 2> /dev/null`
  7. ip=`/usr/bin/qubesdb-read /qubes-ip 2> /dev/null`
  8. if [ x$ip != x ]; then
  9. netmask=`/usr/bin/qubesdb-read /qubes-netmask`
  10. gateway=`/usr/bin/qubesdb-read /qubes-gateway`
  11. secondary_dns=`/usr/bin/qubesdb-read /qubes-secondary-dns`
  12. /sbin/ifconfig $INTERFACE $ip netmask 255.255.255.255
  13. /sbin/ifconfig $INTERFACE up
  14. /sbin/route add -host $gateway dev $INTERFACE
  15. if [ "x$disablegw" != "x1" ]; then
  16. /sbin/route add default gw $gateway
  17. fi
  18. /sbin/ethtool -K $INTERFACE sg off
  19. /sbin/ethtool -K $INTERFACE tx off
  20. echo > /etc/resolv.conf
  21. if [ "x$disabledns" != "x1" ]; then
  22. echo "nameserver $gateway" > /etc/resolv.conf
  23. echo "nameserver $secondary_dns" >> /etc/resolv.conf
  24. fi
  25. if [ -f /var/run/qubes-service/network-manager ]; then
  26. nm_config=/etc/NetworkManager/system-connections/qubes-uplink-$INTERFACE
  27. cat > $nm_config <<__EOF__
  28. [802-3-ethernet]
  29. duplex=full
  30. [ethernet]
  31. mac-address=`ip l show dev $INTERFACE |grep link|awk '{print $2}'`
  32. [connection]
  33. id=VM uplink $INTERFACE
  34. uuid=de85f79b-8c3d-405f-a652-cb4c10b4f9ef
  35. type=802-3-ethernet
  36. [ipv6]
  37. method=ignore
  38. [ipv4]
  39. method=manual
  40. may-fail=false
  41. __EOF__
  42. if [ "x$disabledns" != "x1" ]; then
  43. echo "dns=$gateway;$secondary_dns" >> $nm_config
  44. fi
  45. if [ "x$disablegw" != "x1" ]; then
  46. echo "address1=$ip/32,$gateway" >> $nm_config
  47. else
  48. echo "address1=$ip/32" >> $nm_config
  49. fi
  50. chmod 600 $nm_config
  51. fi
  52. network=$(qubesdb-read /qubes-netvm-network 2>/dev/null)
  53. if [ "x$network" != "x" ] && [ "x$disabledns" != "x1" ]; then
  54. gateway=$(qubesdb-read /qubes-netvm-gateway)
  55. netmask=$(qubesdb-read /qubes-netvm-netmask)
  56. secondary_dns=$(qubesdb-read /qubes-netvm-secondary-dns)
  57. echo "NS1=$gateway" > /var/run/qubes/qubes-ns
  58. echo "NS2=$secondary_dns" >> /var/run/qubes/qubes-ns
  59. /usr/lib/qubes/qubes-setup-dnat-to-ns
  60. fi
  61. if [ "x$network" != "x" ]; then
  62. [ -x /rw/config/qubes-ip-change-hook ] && /rw/config/qubes-ip-change-hook
  63. # XXX: Backward compatibility
  64. [ -x /rw/config/qubes_ip_change_hook ] && /rw/config/qubes_ip_change_hook
  65. fi
  66. fi