Implement read-only mode for SSIDs from the additional config (-I)
On NixOS[1] - a Linux distribution which allows to configure a full OS
declaratively - it's possible to configure SSIDs for `wpa_supplicant`
like this:
networking.wireless.networks = {
myssid = {
pskRaw = "<redacted>";
};
};
It's also possible to add networks "imperatively" using `wpa_gui` or
`wpa_cli`. However it's not possible to do both because if the first
option is used, NixOS creates a read-only symlink at
`/etc/wpa_supplicant.conf` and then it's not possible for
`wpa_supplicant` anymore to write to it.
This patch aims to help us changing this: while "declarative" SSID
configuration can be quite useful, it's a bad idea for e.g. sensitive
stuff like a WPA2 enterprise network.
The original idea was to use `-I`[2] for immutable configs (including
"declarative" networks) on NixOS and `-c /etc/wpa_supplicant.conf` for
anything "imperative".
However this doesn't really work out because if a wifi network from a
config file specified with `-I` is changed by e.g. `wpa_gui`, it's
silently overwritten in `/etc/wpa_supplicant.conf` (specified with
`-c`) which is IMHO unintuitive (in our case at least). This patch
basically declares each network defined in a config file passed via `-I`
to `wpa_supplicant` as "read-only" and doesn't write these "read-only"
networks to `/etc/wpa_supplicant.conf`.
A bit more context can be found on GitHub in the PR where I implemented
this[3].
[1] https://nixos.org/
[2] Added in e6304cad47
[3] https://github.com/NixOS/nixpkgs/pull/113716
Signed-off-by: Maximilian Bosch <maximilian@mbosch.me>
This commit is contained in:
parent
8de2881426
commit
d8d2b3a338
8 changed files with 33 additions and 11 deletions
|
@ -1840,6 +1840,7 @@ const char * wpa_config_get_global_field_name(unsigned int i, int *no_var);
|
||||||
* @name: Name of the configuration (e.g., path and file name for the
|
* @name: Name of the configuration (e.g., path and file name for the
|
||||||
* configuration file)
|
* configuration file)
|
||||||
* @cfgp: Pointer to previously allocated configuration data or %NULL if none
|
* @cfgp: Pointer to previously allocated configuration data or %NULL if none
|
||||||
|
* @ro: Whether to mark networks from this configuration as read-only
|
||||||
* Returns: Pointer to allocated configuration data or %NULL on failure
|
* Returns: Pointer to allocated configuration data or %NULL on failure
|
||||||
*
|
*
|
||||||
* This function reads configuration data, parses its contents, and allocates
|
* This function reads configuration data, parses its contents, and allocates
|
||||||
|
@ -1848,7 +1849,8 @@ const char * wpa_config_get_global_field_name(unsigned int i, int *no_var);
|
||||||
*
|
*
|
||||||
* Each configuration backend needs to implement this function.
|
* Each configuration backend needs to implement this function.
|
||||||
*/
|
*/
|
||||||
struct wpa_config * wpa_config_read(const char *name, struct wpa_config *cfgp);
|
struct wpa_config * wpa_config_read(const char *name, struct wpa_config *cfgp,
|
||||||
|
bool ro);
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* wpa_config_write - Write or update configuration data
|
* wpa_config_write - Write or update configuration data
|
||||||
|
|
|
@ -296,7 +296,8 @@ static int wpa_config_process_blob(struct wpa_config *config, FILE *f,
|
||||||
#endif /* CONFIG_NO_CONFIG_BLOBS */
|
#endif /* CONFIG_NO_CONFIG_BLOBS */
|
||||||
|
|
||||||
|
|
||||||
struct wpa_config * wpa_config_read(const char *name, struct wpa_config *cfgp)
|
struct wpa_config * wpa_config_read(const char *name, struct wpa_config *cfgp,
|
||||||
|
bool ro)
|
||||||
{
|
{
|
||||||
FILE *f;
|
FILE *f;
|
||||||
char buf[512], *pos;
|
char buf[512], *pos;
|
||||||
|
@ -338,6 +339,7 @@ struct wpa_config * wpa_config_read(const char *name, struct wpa_config *cfgp)
|
||||||
while (wpa_config_get_line(buf, sizeof(buf), f, &line, &pos)) {
|
while (wpa_config_get_line(buf, sizeof(buf), f, &line, &pos)) {
|
||||||
if (os_strcmp(pos, "network={") == 0) {
|
if (os_strcmp(pos, "network={") == 0) {
|
||||||
ssid = wpa_config_read_network(f, &line, id++);
|
ssid = wpa_config_read_network(f, &line, id++);
|
||||||
|
ssid->ro = ro;
|
||||||
if (ssid == NULL) {
|
if (ssid == NULL) {
|
||||||
wpa_printf(MSG_ERROR, "Line %d: failed to "
|
wpa_printf(MSG_ERROR, "Line %d: failed to "
|
||||||
"parse network block.", line);
|
"parse network block.", line);
|
||||||
|
@ -1653,7 +1655,8 @@ int wpa_config_write(const char *name, struct wpa_config *config)
|
||||||
}
|
}
|
||||||
|
|
||||||
for (ssid = config->ssid; ssid; ssid = ssid->next) {
|
for (ssid = config->ssid; ssid; ssid = ssid->next) {
|
||||||
if (ssid->key_mgmt == WPA_KEY_MGMT_WPS || ssid->temporary)
|
if (ssid->key_mgmt == WPA_KEY_MGMT_WPS || ssid->temporary ||
|
||||||
|
ssid->ro)
|
||||||
continue; /* do not save temporary networks */
|
continue; /* do not save temporary networks */
|
||||||
if (wpa_key_mgmt_wpa_psk_no_sae(ssid->key_mgmt) &&
|
if (wpa_key_mgmt_wpa_psk_no_sae(ssid->key_mgmt) &&
|
||||||
!ssid->psk_set && !ssid->passphrase)
|
!ssid->psk_set && !ssid->passphrase)
|
||||||
|
|
|
@ -17,7 +17,8 @@
|
||||||
#include "base64.h"
|
#include "base64.h"
|
||||||
|
|
||||||
|
|
||||||
struct wpa_config * wpa_config_read(const char *name, struct wpa_config *cfgp)
|
struct wpa_config * wpa_config_read(const char *name, struct wpa_config *cfgp,
|
||||||
|
bool ro)
|
||||||
{
|
{
|
||||||
struct wpa_config *config;
|
struct wpa_config *config;
|
||||||
|
|
||||||
|
|
|
@ -107,6 +107,21 @@ struct wpa_ssid {
|
||||||
*/
|
*/
|
||||||
int id;
|
int id;
|
||||||
|
|
||||||
|
/**
|
||||||
|
* ro - Whether a network is declared as read-only
|
||||||
|
*
|
||||||
|
* Every network which is defined in a config file that is passed to
|
||||||
|
* wpa_supplicant using the -I option will be marked as read-only
|
||||||
|
* using this flag. It has the effect that it won't be written to
|
||||||
|
* /etc/wpa_supplicant.conf (from -c argument) if, e.g., wpa_gui tells
|
||||||
|
* the daemon to save all changed configs.
|
||||||
|
*
|
||||||
|
* This is necessary because networks from /etc/wpa_supplicant.conf
|
||||||
|
* have a higher priority and changes from an alternative file would be
|
||||||
|
* silently overwritten without this.
|
||||||
|
*/
|
||||||
|
bool ro;
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* priority - Priority group
|
* priority - Priority group
|
||||||
*
|
*
|
||||||
|
|
|
@ -446,7 +446,8 @@ static int wpa_config_read_networks(struct wpa_config *config, HKEY hk)
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|
||||||
struct wpa_config * wpa_config_read(const char *name, struct wpa_config *cfgp)
|
struct wpa_config * wpa_config_read(const char *name, struct wpa_config *cfgp,
|
||||||
|
bool ro)
|
||||||
{
|
{
|
||||||
TCHAR buf[256];
|
TCHAR buf[256];
|
||||||
int errors = 0;
|
int errors = 0;
|
||||||
|
|
|
@ -1472,7 +1472,7 @@ int main(int argc, char *argv[])
|
||||||
dl_list_init(&wpa_s.bss);
|
dl_list_init(&wpa_s.bss);
|
||||||
dl_list_init(&wpa_s.bss_id);
|
dl_list_init(&wpa_s.bss_id);
|
||||||
if (conf)
|
if (conf)
|
||||||
wpa_s.conf = wpa_config_read(conf, NULL);
|
wpa_s.conf = wpa_config_read(conf, NULL, false);
|
||||||
else
|
else
|
||||||
wpa_s.conf = wpa_config_alloc_empty(ctrl_iface, NULL);
|
wpa_s.conf = wpa_config_alloc_empty(ctrl_iface, NULL);
|
||||||
if (wpa_s.conf == NULL) {
|
if (wpa_s.conf == NULL) {
|
||||||
|
|
|
@ -318,7 +318,7 @@ int main(int argc, char *argv[])
|
||||||
}
|
}
|
||||||
|
|
||||||
os_memset(&wpa_s, 0, sizeof(wpa_s));
|
os_memset(&wpa_s, 0, sizeof(wpa_s));
|
||||||
wpa_s.conf = wpa_config_read(argv[1], NULL);
|
wpa_s.conf = wpa_config_read(argv[1], NULL, false);
|
||||||
if (wpa_s.conf == NULL) {
|
if (wpa_s.conf == NULL) {
|
||||||
printf("Failed to parse configuration file '%s'.\n", argv[1]);
|
printf("Failed to parse configuration file '%s'.\n", argv[1]);
|
||||||
return -1;
|
return -1;
|
||||||
|
|
|
@ -1157,14 +1157,14 @@ int wpa_supplicant_reload_configuration(struct wpa_supplicant *wpa_s)
|
||||||
|
|
||||||
if (wpa_s->confname == NULL)
|
if (wpa_s->confname == NULL)
|
||||||
return -1;
|
return -1;
|
||||||
conf = wpa_config_read(wpa_s->confname, NULL);
|
conf = wpa_config_read(wpa_s->confname, NULL, false);
|
||||||
if (conf == NULL) {
|
if (conf == NULL) {
|
||||||
wpa_msg(wpa_s, MSG_ERROR, "Failed to parse the configuration "
|
wpa_msg(wpa_s, MSG_ERROR, "Failed to parse the configuration "
|
||||||
"file '%s' - exiting", wpa_s->confname);
|
"file '%s' - exiting", wpa_s->confname);
|
||||||
return -1;
|
return -1;
|
||||||
}
|
}
|
||||||
if (wpa_s->confanother &&
|
if (wpa_s->confanother &&
|
||||||
!wpa_config_read(wpa_s->confanother, conf)) {
|
!wpa_config_read(wpa_s->confanother, conf, true)) {
|
||||||
wpa_msg(wpa_s, MSG_ERROR,
|
wpa_msg(wpa_s, MSG_ERROR,
|
||||||
"Failed to parse the configuration file '%s' - exiting",
|
"Failed to parse the configuration file '%s' - exiting",
|
||||||
wpa_s->confanother);
|
wpa_s->confanother);
|
||||||
|
@ -6783,7 +6783,7 @@ static int wpa_supplicant_init_iface(struct wpa_supplicant *wpa_s,
|
||||||
#else /* CONFIG_BACKEND_FILE */
|
#else /* CONFIG_BACKEND_FILE */
|
||||||
wpa_s->confname = os_strdup(iface->confname);
|
wpa_s->confname = os_strdup(iface->confname);
|
||||||
#endif /* CONFIG_BACKEND_FILE */
|
#endif /* CONFIG_BACKEND_FILE */
|
||||||
wpa_s->conf = wpa_config_read(wpa_s->confname, NULL);
|
wpa_s->conf = wpa_config_read(wpa_s->confname, NULL, false);
|
||||||
if (wpa_s->conf == NULL) {
|
if (wpa_s->conf == NULL) {
|
||||||
wpa_printf(MSG_ERROR, "Failed to read or parse "
|
wpa_printf(MSG_ERROR, "Failed to read or parse "
|
||||||
"configuration '%s'.", wpa_s->confname);
|
"configuration '%s'.", wpa_s->confname);
|
||||||
|
@ -6791,7 +6791,7 @@ static int wpa_supplicant_init_iface(struct wpa_supplicant *wpa_s,
|
||||||
}
|
}
|
||||||
wpa_s->confanother = os_rel2abs_path(iface->confanother);
|
wpa_s->confanother = os_rel2abs_path(iface->confanother);
|
||||||
if (wpa_s->confanother &&
|
if (wpa_s->confanother &&
|
||||||
!wpa_config_read(wpa_s->confanother, wpa_s->conf)) {
|
!wpa_config_read(wpa_s->confanother, wpa_s->conf, true)) {
|
||||||
wpa_printf(MSG_ERROR,
|
wpa_printf(MSG_ERROR,
|
||||||
"Failed to read or parse configuration '%s'.",
|
"Failed to read or parse configuration '%s'.",
|
||||||
wpa_s->confanother);
|
wpa_s->confanother);
|
||||||
|
|
Loading…
Reference in a new issue