Copyright | Will Thompson and Iñaki García Etxebarria |
---|---|
License | LGPL-2.1 |
Maintainer | Iñaki García Etxebarria |
Safe Haskell | None |
Language | Haskell2010 |
GI.NM.Flags
Contents
- Flags
- ActivationStateFlags
- BluetoothCapabilities
- CheckpointCreateFlags
- ClientInstanceFlags
- ConnectionSerializationFlags
- DeviceCapabilities
- DeviceInterfaceFlags
- DeviceModemCapabilities
- DeviceReapplyFlags
- DeviceWifiCapabilities
- DhcpHostnameFlags
- IPAddressCmpFlags
- IPRoutingRuleAsStringFlags
- IPTunnelFlags
- KeyfileHandlerFlags
- ManagerReloadFlags
- MptcpFlags
- NM80211ApFlags
- NM80211ApSecurityFlags
- RadioFlags
- SecretAgentCapabilities
- SecretAgentGetSecretsFlags
- Setting8021xAuthFlags
- SettingDcbFlags
- SettingSecretFlags
- SettingWiredWakeOnLan
- SettingWirelessSecurityWpsMethod
- SettingWirelessWakeOnWLan
- SettingsAddConnection2Flags
- SettingsConnectionFlags
- SettingsUpdate2Flags
- TeamLinkWatcherArpPingFlags
- VlanFlags
- VpnEditorPluginCapability
Description
Synopsis
- data ActivationStateFlags
- = ActivationStateFlagsNone
- | ActivationStateFlagsIsController
- | ActivationStateFlagsIsPort
- | ActivationStateFlagsLayer2Ready
- | ActivationStateFlagsIp4Ready
- | ActivationStateFlagsIp6Ready
- | ActivationStateFlagsControllerHasPorts
- | ActivationStateFlagsLifetimeBoundToProfileVisibility
- | ActivationStateFlagsExternal
- | AnotherActivationStateFlags Int
- data BluetoothCapabilities
- data CheckpointCreateFlags
- = CheckpointCreateFlagsNone
- | CheckpointCreateFlagsDestroyAll
- | CheckpointCreateFlagsDeleteNewConnections
- | CheckpointCreateFlagsDisconnectNewDevices
- | CheckpointCreateFlagsAllowOverlapping
- | CheckpointCreateFlagsNoPreserveExternalPorts
- | CheckpointCreateFlagsTrackInternalGlobalDns
- | AnotherCheckpointCreateFlags Int
- data ClientInstanceFlags
- data ConnectionSerializationFlags
- = ConnectionSerializationFlagsAll
- | ConnectionSerializationFlagsWithNonSecret
- | ConnectionSerializationFlagsNoSecrets
- | ConnectionSerializationFlagsWithSecrets
- | ConnectionSerializationFlagsOnlySecrets
- | ConnectionSerializationFlagsWithSecretsAgentOwned
- | ConnectionSerializationFlagsWithSecretsSystemOwned
- | ConnectionSerializationFlagsWithSecretsNotSaved
- | AnotherConnectionSerializationFlags Int
- data DeviceCapabilities
- data DeviceInterfaceFlags
- data DeviceModemCapabilities
- data DeviceReapplyFlags
- data DeviceWifiCapabilities
- = DeviceWifiCapabilitiesNone
- | DeviceWifiCapabilitiesCipherWep40
- | DeviceWifiCapabilitiesCipherWep104
- | DeviceWifiCapabilitiesCipherTkip
- | DeviceWifiCapabilitiesCipherCcmp
- | DeviceWifiCapabilitiesWpa
- | DeviceWifiCapabilitiesRsn
- | DeviceWifiCapabilitiesAp
- | DeviceWifiCapabilitiesAdhoc
- | DeviceWifiCapabilitiesFreqValid
- | DeviceWifiCapabilitiesFreq2ghz
- | DeviceWifiCapabilitiesFreq5ghz
- | DeviceWifiCapabilitiesFreq6ghz
- | DeviceWifiCapabilitiesMesh
- | DeviceWifiCapabilitiesIbssRsn
- | AnotherDeviceWifiCapabilities Int
- data DhcpHostnameFlags
- data IPAddressCmpFlags
- data IPRoutingRuleAsStringFlags
- data IPTunnelFlags
- data KeyfileHandlerFlags
- data ManagerReloadFlags
- data MptcpFlags
- data NM80211ApFlags
- data NM80211ApSecurityFlags
- = NM80211ApSecurityFlagsNone
- | NM80211ApSecurityFlagsPairWep40
- | NM80211ApSecurityFlagsPairWep104
- | NM80211ApSecurityFlagsPairTkip
- | NM80211ApSecurityFlagsPairCcmp
- | NM80211ApSecurityFlagsGroupWep40
- | NM80211ApSecurityFlagsGroupWep104
- | NM80211ApSecurityFlagsGroupTkip
- | NM80211ApSecurityFlagsGroupCcmp
- | NM80211ApSecurityFlagsKeyMgmtPsk
- | NM80211ApSecurityFlagsKeyMgmt8021x
- | NM80211ApSecurityFlagsKeyMgmtSae
- | NM80211ApSecurityFlagsKeyMgmtOwe
- | NM80211ApSecurityFlagsKeyMgmtOweTm
- | NM80211ApSecurityFlagsKeyMgmtEapSuiteB192
- | AnotherNM80211ApSecurityFlags Int
- data RadioFlags
- data SecretAgentCapabilities
- data SecretAgentGetSecretsFlags
- = SecretAgentGetSecretsFlagsNone
- | SecretAgentGetSecretsFlagsAllowInteraction
- | SecretAgentGetSecretsFlagsRequestNew
- | SecretAgentGetSecretsFlagsUserRequested
- | SecretAgentGetSecretsFlagsWpsPbcActive
- | SecretAgentGetSecretsFlagsOnlySystem
- | SecretAgentGetSecretsFlagsNoErrors
- | AnotherSecretAgentGetSecretsFlags Int
- data Setting8021xAuthFlags
- = Setting8021xAuthFlagsNone
- | Setting8021xAuthFlagsTls10Disable
- | Setting8021xAuthFlagsTls11Disable
- | Setting8021xAuthFlagsTls12Disable
- | Setting8021xAuthFlagsTlsDisableTimeChecks
- | Setting8021xAuthFlagsTls13Disable
- | Setting8021xAuthFlagsTls10Enable
- | Setting8021xAuthFlagsTls11Enable
- | Setting8021xAuthFlagsTls12Enable
- | Setting8021xAuthFlagsTls13Enable
- | Setting8021xAuthFlagsAll
- | AnotherSetting8021xAuthFlags Int
- data SettingDcbFlags
- data SettingSecretFlags
- data SettingWiredWakeOnLan
- data SettingWirelessSecurityWpsMethod
- data SettingWirelessWakeOnWLan
- = SettingWirelessWakeOnWLanAny
- | SettingWirelessWakeOnWLanDisconnect
- | SettingWirelessWakeOnWLanMagic
- | SettingWirelessWakeOnWLanGtkRekeyFailure
- | SettingWirelessWakeOnWLanEapIdentityRequest
- | SettingWirelessWakeOnWLan4wayHandshake
- | SettingWirelessWakeOnWLanRfkillRelease
- | SettingWirelessWakeOnWLanTcp
- | SettingWirelessWakeOnWLanAll
- | SettingWirelessWakeOnWLanDefault
- | SettingWirelessWakeOnWLanIgnore
- | AnotherSettingWirelessWakeOnWLan Int
- data SettingsAddConnection2Flags
- data SettingsConnectionFlags
- data SettingsUpdate2Flags
- data TeamLinkWatcherArpPingFlags
- data VlanFlags
- data VpnEditorPluginCapability
Flags
ActivationStateFlags
data ActivationStateFlags Source #
Flags describing the current activation state.
Since: 1.10
Constructors
ActivationStateFlagsNone | an alias for numeric zero, no flags set. |
ActivationStateFlagsIsController | the device is a controller. |
ActivationStateFlagsIsPort | the device is a port. |
ActivationStateFlagsLayer2Ready | layer2 is activated and ready. |
ActivationStateFlagsIp4Ready | IPv4 setting is completed. |
ActivationStateFlagsIp6Ready | IPv6 setting is completed. |
ActivationStateFlagsControllerHasPorts | The controller has any port devices attached. This only makes sense if the device is a controller. |
ActivationStateFlagsLifetimeBoundToProfileVisibility | the lifetime of the activation is bound to the visibility of the connection profile, which in turn depends on "connection.permissions" and whether a session for the user exists. Since: 1.16. |
ActivationStateFlagsExternal | the active connection was generated to represent an external configuration of a networking device. Since: 1.26. |
AnotherActivationStateFlags Int | Catch-all for unknown values |
Instances
BluetoothCapabilities
data BluetoothCapabilities Source #
BluetoothCapabilities
values indicate the usable capabilities of a
Bluetooth device.
Constructors
BluetoothCapabilitiesNone | device has no usable capabilities |
BluetoothCapabilitiesDun | device provides Dial-Up Networking capability |
BluetoothCapabilitiesNap | device provides Network Access Point capability |
AnotherBluetoothCapabilities Int | Catch-all for unknown values |
Instances
CheckpointCreateFlags
data CheckpointCreateFlags Source #
The flags for CheckpointCreate call
Since: 1.12
Constructors
CheckpointCreateFlagsNone | no flags |
CheckpointCreateFlagsDestroyAll | when creating a new checkpoint, destroy all existing ones. |
CheckpointCreateFlagsDeleteNewConnections | upon rollback, delete any new connection added after the checkpoint. Since: 1.6. |
CheckpointCreateFlagsDisconnectNewDevices | upon rollback, disconnect any new device appeared after the checkpoint. Since: 1.6. |
CheckpointCreateFlagsAllowOverlapping | by default, creating a checkpoint fails if there are already existing checkpoints that reference the same devices. With this flag, creation of such checkpoints is allowed, however, if an older checkpoint that references overlapping devices gets rolled back, it will automatically destroy this checkpoint during rollback. This allows to create several overlapping checkpoints in parallel, and rollback to them at will. With the special case that rolling back to an older checkpoint will invalidate all overlapping younger checkpoints. This opts-in that the checkpoint can be automatically destroyed by the rollback of an older checkpoint. Since: 1.12. |
CheckpointCreateFlagsNoPreserveExternalPorts | during rollback, by default externally added ports attached to bridge devices are preserved. With this flag, the rollback detaches all external ports. This only has an effect for bridge ports. Before 1.38, this was the default behavior. Since: 1.38. |
CheckpointCreateFlagsTrackInternalGlobalDns | during rollback, by default changes to global DNS via D-BUS interface are preserved. With this flag, the rollback reverts the global DNS changes made via D-Bus interface. Global DNS defined in [global-dns] section of NetworkManager.conf is not impacted by this flag. Since: 1.48. |
AnotherCheckpointCreateFlags Int | Catch-all for unknown values |
Instances
ClientInstanceFlags
data ClientInstanceFlags Source #
No description available in the introspection data.
Since: 1.24
Constructors
ClientInstanceFlagsNone | special value to indicate no flags. |
ClientInstanceFlagsNoAutoFetchPermissions | by default, NMClient
will fetch the permissions via "GetPermissions" and refetch them when
"CheckPermissions" signal gets received. By setting this flag, this behavior
can be disabled. You can toggle this flag to enable and disable automatic
fetching of the permissions. Watch also |
ClientInstanceFlagsInitializedGood | as |
ClientInstanceFlagsInitializedBad | like |
AnotherClientInstanceFlags Int | Catch-all for unknown values |
Instances
ConnectionSerializationFlags
data ConnectionSerializationFlags Source #
These flags determine which properties are serialized when calling
connectionToDbus
.
Constructors
ConnectionSerializationFlagsAll | serialize all properties (including secrets) |
ConnectionSerializationFlagsWithNonSecret | serialize properties that are not secrets. Since 1.32. |
ConnectionSerializationFlagsNoSecrets | this is a deprecated alias for
|
ConnectionSerializationFlagsWithSecrets | serialize all secrets. This flag is
ignored if any of |
ConnectionSerializationFlagsOnlySecrets | a deprecated alias for
|
ConnectionSerializationFlagsWithSecretsAgentOwned | serialize agent-owned secrets. Since: 1.20. |
ConnectionSerializationFlagsWithSecretsSystemOwned | serialize system-owned secrets. Since: 1.32. |
ConnectionSerializationFlagsWithSecretsNotSaved | serialize secrets that are marked as never saved. Since: 1.32. |
AnotherConnectionSerializationFlags Int | Catch-all for unknown values |
Instances
DeviceCapabilities
data DeviceCapabilities Source #
General device capability flags.
Constructors
DeviceCapabilitiesNone | device has no special capabilities |
DeviceCapabilitiesNmSupported | NetworkManager supports this device |
DeviceCapabilitiesCarrierDetect | this device can indicate carrier status |
DeviceCapabilitiesIsSoftware | this device is a software device |
DeviceCapabilitiesSriov | this device supports single-root I/O virtualization |
AnotherDeviceCapabilities Int | Catch-all for unknown values |
Instances
DeviceInterfaceFlags
data DeviceInterfaceFlags Source #
Flags for a network interface.
Since: 1.22
Constructors
DeviceInterfaceFlagsUp | the interface is enabled from the administrative point of view. Corresponds to kernel IFF_UP. |
DeviceInterfaceFlagsLowerUp | the physical link is up. Corresponds to kernel IFF_LOWER_UP. |
DeviceInterfaceFlagsPromisc | receive all packets. Corresponds to kernel IFF_PROMISC. Since: 1.32. |
DeviceInterfaceFlagsCarrier | the interface has carrier. In most
cases this is equal to the value of |
DeviceInterfaceFlagsLldpClientEnabled | the flag to indicate device LLDP status. Since: 1.32. |
AnotherDeviceInterfaceFlags Int | Catch-all for unknown values |
Instances
DeviceModemCapabilities
data DeviceModemCapabilities Source #
DeviceModemCapabilities
values indicate the generic radio access
technology families a modem device supports. For more information on the
specific access technologies the device supports use the ModemManager D-Bus
API.
Constructors
DeviceModemCapabilitiesNone | modem has no usable capabilities |
DeviceModemCapabilitiesPots | modem uses the analog wired telephone network and is not a wireless/cellular device |
DeviceModemCapabilitiesCdmaEvdo | modem supports at least one of CDMA 1xRTT, EVDO revision 0, EVDO revision A, or EVDO revision B |
DeviceModemCapabilitiesGsmUmts | modem supports at least one of GSM, GPRS, EDGE, UMTS, HSDPA, HSUPA, or HSPA+ packet switched data capability |
DeviceModemCapabilitiesLte | modem has LTE data capability |
DeviceModemCapabilities5gnr | modem has 5GNR data capability. Since: 1.36. |
AnotherDeviceModemCapabilities Int | Catch-all for unknown values |
Instances
DeviceReapplyFlags
data DeviceReapplyFlags Source #
Flags for the Reapply()
D-Bus call of a device and
deviceReapplyAsync
.
Since: 1.42
Constructors
DeviceReapplyFlagsNone | no flag set. |
DeviceReapplyFlagsPreserveExternalIp | during reapply, preserve external IP addresses and routes. |
AnotherDeviceReapplyFlags Int | Catch-all for unknown values |
Instances
DeviceWifiCapabilities
data DeviceWifiCapabilities Source #
- 11 specific device encryption and authentication capabilities.
Constructors
DeviceWifiCapabilitiesNone | device has no encryption/authentication capabilities |
DeviceWifiCapabilitiesCipherWep40 | device supports 40/64-bit WEP encryption |
DeviceWifiCapabilitiesCipherWep104 | device supports 104/128-bit WEP encryption |
DeviceWifiCapabilitiesCipherTkip | device supports TKIP encryption |
DeviceWifiCapabilitiesCipherCcmp | device supports AES/CCMP encryption |
DeviceWifiCapabilitiesWpa | device supports WPA1 authentication |
DeviceWifiCapabilitiesRsn | device supports WPA2/RSN authentication |
DeviceWifiCapabilitiesAp | device supports Access Point mode |
DeviceWifiCapabilitiesAdhoc | device supports Ad-Hoc mode |
DeviceWifiCapabilitiesFreqValid | device reports frequency capabilities |
DeviceWifiCapabilitiesFreq2ghz | device supports 2.4GHz frequencies |
DeviceWifiCapabilitiesFreq5ghz | device supports 5GHz frequencies |
DeviceWifiCapabilitiesFreq6ghz | device supports 6GHz frequencies. Since: 1.46. |
DeviceWifiCapabilitiesMesh | device supports acting as a mesh point. Since: 1.20. |
DeviceWifiCapabilitiesIbssRsn | device supports WPA2/RSN in an IBSS network. Since: 1.22. |
AnotherDeviceWifiCapabilities Int | Catch-all for unknown values |
Instances
DhcpHostnameFlags
data DhcpHostnameFlags Source #
DhcpHostnameFlags
describe flags related to the DHCP hostname and
FQDN.
Since: 1.22
Constructors
DhcpHostnameFlagsNone | no flag set. The default value from
Networkmanager global configuration is used. If such value is unset
or still zero, the DHCP request will use standard FQDN flags, i.e.
|
DhcpHostnameFlagsFqdnServUpdate | whether the server should do the A RR (FQDN-to-address) DNS updates. |
DhcpHostnameFlagsFqdnEncoded | if set, the FQDN is encoded using canonical wire format. Otherwise it uses the deprecated ASCII encoding. This flag is allowed only for DHCPv4. |
DhcpHostnameFlagsFqdnNoUpdate | when not set, request the
server to perform updates (the PTR RR and possibly the A RR
based on the |
DhcpHostnameFlagsFqdnClearFlags | when set, no FQDN flags are sent in the DHCP FQDN option. When cleared and all other FQDN flags are zero, standard FQDN flags are sent. This flag is incompatible with any other FQDN flag. |
AnotherDhcpHostnameFlags Int | Catch-all for unknown values |
Instances
IPAddressCmpFlags
data IPAddressCmpFlags Source #
Compare flags for iPAddressCmpFull
.
Since: 1.22
Constructors
IPAddressCmpFlagsNone | no flags. |
IPAddressCmpFlagsWithAttrs | when comparing two addresses, also consider their attributes. Warning: note that attributes are GVariants and they don't have a total order. In other words, if the address differs only by their attributes, the returned compare order is not total. In that case, the return value merely indicates equality (zero) or inequality. |
AnotherIPAddressCmpFlags Int | Catch-all for unknown values |
Instances
IPRoutingRuleAsStringFlags
data IPRoutingRuleAsStringFlags Source #
No description available in the introspection data.
Since: 1.18
Constructors
IPRoutingRuleAsStringFlagsNone | no flags selected. |
IPRoutingRuleAsStringFlagsAfInet | whether to allow parsing IPv4 addresses. |
IPRoutingRuleAsStringFlagsAfInet6 | whether to allow parsing
IPv6 addresses. If both |
IPRoutingRuleAsStringFlagsValidate | if set, ensure that the rule verfies or fail. |
AnotherIPRoutingRuleAsStringFlags Int | Catch-all for unknown values |
Instances
IPTunnelFlags
data IPTunnelFlags Source #
IP tunnel flags.
Since: 1.12
Constructors
IPTunnelFlagsNone | no flag |
IPTunnelFlagsIp6IgnEncapLimit | don't add encapsulation limit if one isn't present in inner packet |
IPTunnelFlagsIp6UseOrigTclass | copy the traffic class field from the inner packet |
IPTunnelFlagsIp6UseOrigFlowlabel | copy the flowlabel from the inner packet |
IPTunnelFlagsIp6Mip6Dev | used for Mobile IPv6 |
IPTunnelFlagsIp6RcvDscpCopy | copy DSCP from the outer packet |
IPTunnelFlagsIp6UseOrigFwmark | copy fwmark from inner packet |
AnotherIPTunnelFlags Int | Catch-all for unknown values |
Instances
KeyfileHandlerFlags
data KeyfileHandlerFlags Source #
Constructors
KeyfileHandlerFlagsNone | no flags set. |
AnotherKeyfileHandlerFlags Int | Catch-all for unknown values |
Instances
ManagerReloadFlags
data ManagerReloadFlags Source #
Flags for the manager Reload()
call.
Since: 1.22
Constructors
ManagerReloadFlagsConf | reload the NetworkManager.conf configuration
from disk. Note that this does not include connections, which can be
reloaded via Setting's |
ManagerReloadFlagsDnsRc | update DNS configuration, which usually involves writing /etc/resolv.conf anew. |
ManagerReloadFlagsDnsFull | means to restart the DNS plugin. This is for example useful when using dnsmasq plugin, which uses additional configuration in /etc/NetworkManager/dnsmasq.d. If you edit those files, you can restart the DNS plugin. This action shortly interrupts name resolution. |
AnotherManagerReloadFlags Int | Catch-all for unknown values |
Instances
MptcpFlags
data MptcpFlags Source #
No description available in the introspection data.
Since: 1.40
Constructors
MptcpFlagsNone | The default, meaning that no MPTCP flags are set. |
MptcpFlagsDisabled | don't configure MPTCP endpoints on the device. |
MptcpFlagsEnabled | MPTCP is enabled and endpoints will be configured. This flag is implied if any of the other flags indicate that MPTCP is enabled and therefore in most cases unnecessary. Note that if "/proc/sys/net/mptcp/enabled" sysctl is disabled, MPTCP handling is disabled despite this flag. This can be overruled with the "also-without-sysctl" flag. Note that by default interfaces that don't have a default route are excluded from having MPTCP endpoints configured. This can be overruled with the "also-without-default-route" and this affects endpoints per address family. |
MptcpFlagsAlsoWithoutSysctl | even if MPTCP handling is enabled via the "enabled" flag, it is ignored unless "/proc/sys/net/mptcp/enabled" is on. With this flag, MPTCP endpoints will be configured regardless of the sysctl setting. |
MptcpFlagsAlsoWithoutDefaultRoute | even if MPTCP handling is enabled via the "enabled" flag, it is ignored per-address family unless NetworkManager configures a default route. With this flag, NetworkManager will also configure MPTCP endpoints if there is no default route. This takes effect per-address family. |
MptcpFlagsSignal | Flag for the MPTCP endpoint. The endpoint will be announced/signaled to each peer via an MPTCP ADD_ADDR sub-option. |
MptcpFlagsSubflow | Flag for the MPTCP endpoint. If additional subflow creation is allowed by the MPTCP limits, the MPTCP path manager will try to create an additional subflow using this endpoint as the source address after the MPTCP connection is established. |
MptcpFlagsBackup | Flag for the MPTCP endpoint. If this is a subflow endpoint, the subflows created using this endpoint will have the backup flag set during the connection process. This flag instructs the peer to only send data on a given subflow when all non-backup subflows are unavailable. This does not affect outgoing data, where subflow priority is determined by the backup/non-backup flag received from the peer |
MptcpFlagsFullmesh | Flag for the MPTCP endpoint. If this is a subflow endpoint and additional subflow creation is allowed by the MPTCP limits, the MPTCP path manager will try to create an additional subflow for each known peer address, using this endpoint as the source address. This will occur after the MPTCP connection is established. If the peer did not announce any additional addresses using the MPTCP ADD_ADDR sub-option, this will behave the same as a plain subflow endpoint. When the peer does announce addresses, each received ADD_ADDR sub-option will trigger creation of an additional subflow to generate a full mesh topology. |
AnotherMptcpFlags Int | Catch-all for unknown values |
Instances
NM80211ApFlags
data NM80211ApFlags Source #
- 11 access point flags.
Constructors
NM80211ApFlagsNone | access point has no special capabilities |
NM80211ApFlagsPrivacy | access point requires authentication and encryption (usually means WEP) |
NM80211ApFlagsWps | access point supports some WPS method |
NM80211ApFlagsWpsPbc | access point supports push-button WPS |
NM80211ApFlagsWpsPin | access point supports PIN-based WPS |
AnotherNM80211ApFlags Int | Catch-all for unknown values |
Instances
NM80211ApSecurityFlags
data NM80211ApSecurityFlags Source #
- 11 access point security and authentication flags. These flags describe the current security requirements of an access point as determined from the access point's beacon.
Constructors
NM80211ApSecurityFlagsNone | the access point has no special security requirements |
NM80211ApSecurityFlagsPairWep40 | 40/64-bit WEP is supported for pairwise/unicast encryption |
NM80211ApSecurityFlagsPairWep104 | 104/128-bit WEP is supported for pairwise/unicast encryption |
NM80211ApSecurityFlagsPairTkip | TKIP is supported for pairwise/unicast encryption |
NM80211ApSecurityFlagsPairCcmp | AES/CCMP is supported for pairwise/unicast encryption |
NM80211ApSecurityFlagsGroupWep40 | 40/64-bit WEP is supported for group/broadcast encryption |
NM80211ApSecurityFlagsGroupWep104 | 104/128-bit WEP is supported for group/broadcast encryption |
NM80211ApSecurityFlagsGroupTkip | TKIP is supported for group/broadcast encryption |
NM80211ApSecurityFlagsGroupCcmp | AES/CCMP is supported for group/broadcast encryption |
NM80211ApSecurityFlagsKeyMgmtPsk | WPA/RSN Pre-Shared Key encryption is supported |
NM80211ApSecurityFlagsKeyMgmt8021x |
|
NM80211ApSecurityFlagsKeyMgmtSae | WPA/RSN Simultaneous Authentication of Equals is supported |
NM80211ApSecurityFlagsKeyMgmtOwe | WPA/RSN Opportunistic Wireless Encryption is supported |
NM80211ApSecurityFlagsKeyMgmtOweTm | WPA/RSN Opportunistic Wireless Encryption transition mode is supported. Since: 1.26. |
NM80211ApSecurityFlagsKeyMgmtEapSuiteB192 | WPA3 Enterprise Suite-B 192 bit mode is supported. Since: 1.30. |
AnotherNM80211ApSecurityFlags Int | Catch-all for unknown values |
Instances
RadioFlags
data RadioFlags Source #
Flags related to radio interfaces.
Since: 1.38
Constructors
RadioFlagsNone | an alias for numeric zero, no flags set. |
RadioFlagsWlanAvailable | A Wireless LAN device or rfkill switch is detected in the system. |
RadioFlagsWwanAvailable | A Wireless WAN device or rfkill switch is detected in the system. |
AnotherRadioFlags Int | Catch-all for unknown values |
Instances
SecretAgentCapabilities
data SecretAgentCapabilities Source #
SecretAgentCapabilities
indicate various capabilities of the agent.
Constructors
SecretAgentCapabilitiesNone | the agent supports no special capabilities |
SecretAgentCapabilitiesVpnHints | the agent supports passing hints to VPN plugin authentication dialogs. |
SecretAgentCapabilitiesLast | bounds checking value; should not be used. |
AnotherSecretAgentCapabilities Int | Catch-all for unknown values |
Instances
SecretAgentGetSecretsFlags
data SecretAgentGetSecretsFlags Source #
SecretAgentGetSecretsFlags
values modify the behavior of a GetSecrets request.
Constructors
SecretAgentGetSecretsFlagsNone | no special behavior; by default no user interaction is allowed and requests for secrets are fulfilled from persistent storage, or if no secrets are available an error is returned. |
SecretAgentGetSecretsFlagsAllowInteraction | allows the request to interact with the user, possibly prompting via UI for secrets if any are required, or if none are found in persistent storage. |
SecretAgentGetSecretsFlagsRequestNew | explicitly prompt for new secrets from the user. This flag signals that NetworkManager thinks any existing secrets are invalid or wrong. This flag implies that interaction is allowed. |
SecretAgentGetSecretsFlagsUserRequested | set if the request was initiated by user-requested action via the D-Bus interface, as opposed to automatically initiated by NetworkManager in response to (for example) scan results or carrier changes. |
SecretAgentGetSecretsFlagsWpsPbcActive | indicates that WPS enrollment is active with PBC method. The agent may suggest that the user pushes a button on the router instead of supplying a PSK. |
SecretAgentGetSecretsFlagsOnlySystem | Internal flag, not part of the D-Bus API. |
SecretAgentGetSecretsFlagsNoErrors | Internal flag, not part of the D-Bus API. |
AnotherSecretAgentGetSecretsFlags Int | Catch-all for unknown values |
Instances
Setting8021xAuthFlags
data Setting8021xAuthFlags Source #
Setting8021xAuthFlags
values indicate which authentication settings
should be used.
Before 1.22, this was wrongly marked as a enum and not as a flags type.
Since: 1.8
Constructors
Setting8021xAuthFlagsNone | No flags |
Setting8021xAuthFlagsTls10Disable | Disable TLSv1.0 |
Setting8021xAuthFlagsTls11Disable | Disable TLSv1.1 |
Setting8021xAuthFlagsTls12Disable | Disable TLSv1.2 |
Setting8021xAuthFlagsTlsDisableTimeChecks | Disable TLS time checks. Since 1.42. |
Setting8021xAuthFlagsTls13Disable | Disable TLSv1.3. Since 1.42. |
Setting8021xAuthFlagsTls10Enable | Enable TLSv1.0. Since 1.42. |
Setting8021xAuthFlagsTls11Enable | Enable TLSv1.1. Since 1.42. |
Setting8021xAuthFlagsTls12Enable | Enable TLSv1.2. Since 1.42. |
Setting8021xAuthFlagsTls13Enable | Enable TLSv1.3. Since 1.42. |
Setting8021xAuthFlagsAll | All supported flags |
AnotherSetting8021xAuthFlags Int | Catch-all for unknown values |
Instances
SettingDcbFlags
data SettingDcbFlags Source #
DCB feature flags.
Constructors
SettingDcbFlagsNone | no flag |
SettingDcbFlagsEnable | the feature is enabled |
SettingDcbFlagsAdvertise | the feature is advertised |
SettingDcbFlagsWilling | the feature is willing to change based on peer configuration advertisements |
AnotherSettingDcbFlags Int | Catch-all for unknown values |
Instances
SettingSecretFlags
data SettingSecretFlags Source #
These flags indicate specific behavior related to handling of a secret. Each secret has a corresponding set of these flags which indicate how the secret is to be stored and/or requested when it is needed.
Constructors
SettingSecretFlagsNone | the system is responsible for providing and storing this secret (default) |
SettingSecretFlagsAgentOwned | a user secret agent is responsible for providing and storing this secret; when it is required agents will be asked to retrieve it |
SettingSecretFlagsNotSaved | this secret should not be saved, but should be requested from the user each time it is needed |
SettingSecretFlagsNotRequired | in situations where it cannot be automatically determined that the secret is required (some VPNs and PPP providers don't require all secrets) this flag indicates that the specific secret is not required |
AnotherSettingSecretFlags Int | Catch-all for unknown values |
Instances
SettingWiredWakeOnLan
data SettingWiredWakeOnLan Source #
Options for SettingWired:wakeOnLan. Note that not all options are supported by all devices.
Since: 1.2
Constructors
SettingWiredWakeOnLanPhy | Wake on PHY activity |
SettingWiredWakeOnLanUnicast | Wake on unicast messages |
SettingWiredWakeOnLanMulticast | Wake on multicast messages |
SettingWiredWakeOnLanBroadcast | Wake on broadcast messages |
SettingWiredWakeOnLanArp | Wake on ARP |
SettingWiredWakeOnLanMagic | Wake on magic packet |
SettingWiredWakeOnLanDefault | Use the default value |
SettingWiredWakeOnLanIgnore | Don't change configured settings |
AnotherSettingWiredWakeOnLan Int | Catch-all for unknown values |
Instances
SettingWirelessSecurityWpsMethod
data SettingWirelessSecurityWpsMethod Source #
Configure the use of WPS by a connection while it activates.
Note: prior to 1.16, this was a GEnum type instead of a GFlags type although, with the same numeric values.
Since: 1.10
Constructors
SettingWirelessSecurityWpsMethodDefault | Attempt whichever method AP supports |
SettingWirelessSecurityWpsMethodDisabled | WPS can not be used. |
SettingWirelessSecurityWpsMethodAuto | Use WPS, any method |
SettingWirelessSecurityWpsMethodPbc | use WPS push-button method |
SettingWirelessSecurityWpsMethodPin | use PIN method |
AnotherSettingWirelessSecurityWpsMethod Int | Catch-all for unknown values |
Instances
SettingWirelessWakeOnWLan
data SettingWirelessWakeOnWLan Source #
Options for SettingWireless:wakeOnWlan. Note that not all options are supported by all devices.
Since: 1.12
Constructors
SettingWirelessWakeOnWLanAny | Wake on any activity |
SettingWirelessWakeOnWLanDisconnect | Wake on disconnect |
SettingWirelessWakeOnWLanMagic | Wake on magic packet |
SettingWirelessWakeOnWLanGtkRekeyFailure | Wake on GTK rekey failure |
SettingWirelessWakeOnWLanEapIdentityRequest | Wake on EAP identity request |
SettingWirelessWakeOnWLan4wayHandshake | Wake on 4way handshake |
SettingWirelessWakeOnWLanRfkillRelease | Wake on rfkill release |
SettingWirelessWakeOnWLanTcp | No description available in the introspection data. |
SettingWirelessWakeOnWLanAll | Wake on all events. This does not
include the exclusive flags |
SettingWirelessWakeOnWLanDefault | Use the default value |
SettingWirelessWakeOnWLanIgnore | Don't change configured settings |
AnotherSettingWirelessWakeOnWLan Int | Catch-all for unknown values |
Instances
SettingsAddConnection2Flags
data SettingsAddConnection2Flags Source #
Numeric flags for the "flags" argument of AddConnection2()
D-Bus API.
Since: 1.20
Constructors
SettingsAddConnection2FlagsNone | an alias for numeric zero, no flags set. |
SettingsAddConnection2FlagsToDisk | to persist the connection to disk. |
SettingsAddConnection2FlagsInMemory | to make the connection in-memory only. |
SettingsAddConnection2FlagsBlockAutoconnect | usually, when the connection has autoconnect enabled and gets added, it becomes eligible to autoconnect right away. Setting this flag, disables autoconnect until the connection is manually activated. |
AnotherSettingsAddConnection2Flags Int | Catch-all for unknown values |
Instances
SettingsConnectionFlags
data SettingsConnectionFlags Source #
Flags describing the current activation state.
Since: 1.12
Constructors
SettingsConnectionFlagsNone | an alias for numeric zero, no flags set. |
SettingsConnectionFlagsUnsaved | the connection is not saved to disk. That either means, that the connection is in-memory only and currently is not backed by a file. Or, that the connection is backed by a file, but has modifications in-memory that were not persisted to disk. |
SettingsConnectionFlagsNmGenerated | A connection is "nm-generated" if it was generated by NetworkManger. If the connection gets modified or saved by the user, the flag gets cleared. A nm-generated is also unsaved and has no backing file as it is in-memory only. |
SettingsConnectionFlagsVolatile | The connection will be deleted when it disconnects. That is for in-memory connections (unsaved), which are currently active but deleted on disconnect. Volatile connections are always unsaved, but they are also no backing file on disk and are entirely in-memory only. |
SettingsConnectionFlagsExternal | the profile was generated to represent an external configuration of a networking device. Since: 1.26. |
AnotherSettingsConnectionFlags Int | Catch-all for unknown values |
Instances
SettingsUpdate2Flags
data SettingsUpdate2Flags Source #
No description available in the introspection data.
Since: 1.12
Constructors
SettingsUpdate2FlagsNone | an alias for numeric zero, no flags set. |
SettingsUpdate2FlagsToDisk | to persist the connection to disk. |
SettingsUpdate2FlagsInMemory | makes the profile in-memory. Note that such profiles are stored in keyfile format under /run. If the file is already in-memory, the file in /run is updated in-place. Otherwise, the previous storage for the profile is left unchanged on disk, and the in-memory copy shadows it. Note that the original filename of the previous persistent storage (if any) is remembered. That means, when later persisting the profile again to disk, the file on disk will be overwritten again. Likewise, when finally deleting the profile, both the storage from /run and persistent storage are deleted (or if the persistent storage does not allow deletion, and nmmeta file is written to mark the UUID as deleted). |
SettingsUpdate2FlagsInMemoryDetached | this is almost the same
as |
SettingsUpdate2FlagsInMemoryOnly | this is like |
SettingsUpdate2FlagsVolatile | This can be specified with either
|
SettingsUpdate2FlagsBlockAutoconnect | usually, when the connection has autoconnect enabled and is modified, it becomes eligible to autoconnect right away. Setting this flag, disables autoconnect until the connection is manually activated. |
SettingsUpdate2FlagsNoReapply | when a profile gets modified that is currently active, then these changes don't take effect for the active device unless the profile gets reactivated or the configuration reapplied. There are two exceptions: by default "connection.zone" and "connection.metered" properties take effect immediately. Specify this flag to prevent these properties to take effect, so that the change is restricted to modify the profile. Since: 1.20. |
AnotherSettingsUpdate2Flags Int | Catch-all for unknown values |
Instances
TeamLinkWatcherArpPingFlags
data TeamLinkWatcherArpPingFlags Source #
No description available in the introspection data.
Since: 1.12
Constructors
TeamLinkWatcherArpPingFlagsValidateActive | the arp_ping link watcher option 'validate_active' is enabled (set to true). |
TeamLinkWatcherArpPingFlagsValidateInactive | the arp_ping link watcher option 'validate_inactive' is enabled (set to true). |
TeamLinkWatcherArpPingFlagsSendAlways | the arp_ping link watcher option 'send_always' is enabled (set to true). |
AnotherTeamLinkWatcherArpPingFlags Int | Catch-all for unknown values |
Instances
VlanFlags
VlanFlags
values control the behavior of the VLAN interface.
Constructors
VlanFlagsReorderHeaders | indicates that this interface should reorder outgoing packet headers to look more like a non-VLAN Ethernet interface |
VlanFlagsGvrp | indicates that this interface should use GVRP to register itself with its switch |
VlanFlagsLooseBinding | indicates that this interface's operating state is tied to the underlying network interface but other details (like routing) are not. |
VlanFlagsMvrp | indicates that this interface should use MVRP to register itself with its switch |
AnotherVlanFlags Int | Catch-all for unknown values |
Instances
Enum VlanFlags Source # | |
Defined in GI.NM.Flags Methods succ :: VlanFlags -> VlanFlags # pred :: VlanFlags -> VlanFlags # fromEnum :: VlanFlags -> Int # enumFrom :: VlanFlags -> [VlanFlags] # enumFromThen :: VlanFlags -> VlanFlags -> [VlanFlags] # enumFromTo :: VlanFlags -> VlanFlags -> [VlanFlags] # enumFromThenTo :: VlanFlags -> VlanFlags -> VlanFlags -> [VlanFlags] # | |
Show VlanFlags Source # | |
Eq VlanFlags Source # | |
Ord VlanFlags Source # | |
BoxedFlags VlanFlags Source # | |
Defined in GI.NM.Flags | |
IsGFlag VlanFlags Source # | |
Defined in GI.NM.Flags | |
TypedObject VlanFlags Source # | |
Defined in GI.NM.Flags | |
HasParentTypes VlanFlags Source # | |
Defined in GI.NM.Flags | |
type ParentTypes VlanFlags Source # | |
Defined in GI.NM.Flags |
VpnEditorPluginCapability
data VpnEditorPluginCapability Source #
Flags that indicate certain capabilities of the plugin to editor programs.
Constructors
VpnEditorPluginCapabilityNone | unknown or no capability |
VpnEditorPluginCapabilityImport | the plugin can import new connections |
VpnEditorPluginCapabilityExport | the plugin can export connections |
VpnEditorPluginCapabilityIpv6 | the plugin supports IPv6 addressing |
AnotherVpnEditorPluginCapability Int | Catch-all for unknown values |