blob: f9ab0355e481c820f407bdb8359f3babe5ff4dbf [file] [log] [blame]
//
// Copyright (C) 2015 The Android Open Source Project
//
// Licensed under the Apache License, Version 2.0 (the "License");
// you may not use this file except in compliance with the License.
// You may obtain a copy of the License at
//
// http://www.apache.org/licenses/LICENSE-2.0
//
// Unless required by applicable law or agreed to in writing, software
// distributed under the License is distributed on an "AS IS" BASIS,
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
// See the License for the specific language governing permissions and
// limitations under the License.
//
#include "apmanager/dbus/firewalld_dbus_proxy.h"
#include <base/bind.h>
#include <brillo/errors/error.h>
#include "apmanager/event_dispatcher.h"
using std::string;
namespace apmanager {
FirewalldDBusProxy::FirewalldDBusProxy(
const scoped_refptr<dbus::Bus>& bus,
const base::Closure& service_appeared_callback,
const base::Closure& service_vanished_callback)
: proxy_(new org::chromium::FirewalldProxy(bus)),
dispatcher_(EventDispatcher::GetInstance()),
service_appeared_callback_(service_appeared_callback),
service_vanished_callback_(service_vanished_callback),
service_available_(false) {
// Monitor service owner changes. This callback lives for the lifetime of
// the ObjectProxy.
proxy_->GetObjectProxy()->SetNameOwnerChangedCallback(
base::Bind(&FirewalldDBusProxy::OnServiceOwnerChanged,
weak_factory_.GetWeakPtr()));
// One time callback when service becomes available.
proxy_->GetObjectProxy()->WaitForServiceToBeAvailable(
base::Bind(&FirewalldDBusProxy::OnServiceAvailable,
weak_factory_.GetWeakPtr()));
}
FirewalldDBusProxy::~FirewalldDBusProxy() {}
bool FirewalldDBusProxy::RequestUdpPortAccess(const string& interface,
uint16_t port) {
if (!service_available_) {
LOG(ERROR) << "firewalld service not available";
return false;
}
bool success = false;
brillo::ErrorPtr error;
if (!proxy_->PunchUdpHole(port, interface, &success, &error)) {
LOG(ERROR) << "Failed to request UDP port access: "
<< error->GetCode() << " " << error->GetMessage();
return false;
}
if (!success) {
LOG(ERROR) << "Access request for UDP port " << port
<< " on interface " << interface << " is denied";
return false;
}
LOG(INFO) << "Access granted for UDP port " << port
<< " on interface " << interface;
return true;
}
bool FirewalldDBusProxy::ReleaseUdpPortAccess(const string& interface,
uint16_t port) {
if (!service_available_) {
LOG(ERROR) << "firewalld service not available";
return false;
}
brillo::ErrorPtr error;
bool success;
if (!proxy_->PlugUdpHole(port, interface, &success, &error)) {
LOG(ERROR) << "Failed to release UDP port access: "
<< error->GetCode() << " " << error->GetMessage();
return false;
}
if (!success) {
LOG(ERROR) << "Release request for UDP port " << port
<< " on interface " << interface << " is denied";
return false;
}
LOG(INFO) << "Access released for UDP port " << port
<< " on interface " << interface;
return true;
}
void FirewalldDBusProxy::OnServiceAvailable(bool available) {
LOG(INFO) << __func__ << ": " << available;
// The callback might invoke calls to the ObjectProxy, so defer the callback
// to event loop.
if (available && !service_appeared_callback_.is_null()) {
dispatcher_->PostTask(service_appeared_callback_);
} else if (!available && !service_vanished_callback_.is_null()) {
dispatcher_->PostTask(service_vanished_callback_);
}
service_available_ = available;
}
void FirewalldDBusProxy::OnServiceOwnerChanged(const string& old_owner,
const string& new_owner) {
LOG(INFO) << __func__ << " old: " << old_owner << " new: " << new_owner;
if (new_owner.empty()) {
OnServiceAvailable(false);
} else {
OnServiceAvailable(true);
}
}
} // namespace apmanager