blob: f801b45af5c3ed7d4df68c580203577b50b18bf3 [file] [log] [blame]
//
// Copyright (C) 2012 The Android Open Source Project
//
// Licensed under the Apache License, Version 2.0 (the "License");
// you may not use this file except in compliance with the License.
// You may obtain a copy of the License at
//
// http://www.apache.org/licenses/LICENSE-2.0
//
// Unless required by applicable law or agreed to in writing, software
// distributed under the License is distributed on an "AS IS" BASIS,
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
// See the License for the specific language governing permissions and
// limitations under the License.
//
#include "shill/manager.h"
#include <pwd.h>
#include <stdio.h>
#include <sys/types.h>
#include <time.h>
#include <algorithm>
#include <iterator>
#include <set>
#include <string>
#include <vector>
#include <base/bind.h>
#include <base/callback.h>
#include <base/files/file_util.h>
#include <base/memory/ref_counted.h>
#include <base/stl_util.h>
#include <base/strings/pattern.h>
#include <base/strings/stringprintf.h>
#include <base/strings/string_split.h>
#include <base/strings/string_util.h>
#include <chromeos/dbus/service_constants.h>
#include "shill/adaptor_interfaces.h"
#include "shill/callbacks.h"
#include "shill/connection.h"
#include "shill/control_interface.h"
#include "shill/default_profile.h"
#include "shill/device.h"
#include "shill/device_claimer.h"
#include "shill/device_info.h"
#include "shill/ephemeral_profile.h"
#include "shill/error.h"
#include "shill/ethernet/ethernet_temporary_service.h"
#include "shill/event_dispatcher.h"
#include "shill/geolocation_info.h"
#include "shill/hook_table.h"
#include "shill/ip_address_store.h"
#include "shill/logging.h"
#include "shill/profile.h"
#include "shill/property_accessor.h"
#include "shill/resolver.h"
#include "shill/result_aggregator.h"
#include "shill/service.h"
#include "shill/service_sorter.h"
#include "shill/technology.h"
#include "shill/throttler.h"
#include "shill/vpn/vpn_provider.h"
#include "shill/vpn/vpn_service.h"
#include "shill/wimax/wimax_service.h"
#if !defined(DISABLE_WIFI)
#include "shill/wifi/wifi.h"
#include "shill/wifi/wifi_provider.h"
#include "shill/wifi/wifi_service.h"
#endif // DISABLE_WIFI
#if !defined(DISABLE_WIRED_8021X)
#include "shill/ethernet/ethernet_eap_provider.h"
#include "shill/ethernet/ethernet_eap_service.h"
#endif // DISABLE_WIRED_8021X
using base::Bind;
using base::Callback;
using base::FilePath;
using base::StringPrintf;
using base::Unretained;
using std::map;
using std::set;
using std::string;
using std::vector;
namespace shill {
namespace Logging {
static auto kModuleLogScope = ScopeLogger::kManager;
static string ObjectID(const Manager* m) { return "manager"; }
}
namespace {
constexpr char kErrorTypeRequired[] = "must specify service type";
constexpr char kErrorUnsupportedServiceType[] = "service type is unsupported";
// Time to wait for termination actions to complete, which should be less than
// the upstart job timeout, or otherwise stats for termination actions might be
// lost.
constexpr int kTerminationActionsTimeoutMilliseconds = 19500;
// Interval for probing various device status, and report them to UMA stats.
constexpr int kDeviceStatusCheckIntervalMilliseconds =
180000; // every 3 minutes
// Technologies to probe for.
const char* const kProbeTechnologies[] = {
kTypeEthernet,
kTypeWifi,
kTypeWimax,
kTypeCellular,
};
// Technologies for which auto-connect is temporarily disabled before a user
// session has started.
//
// shill may manage multiple user profiles and a service may be configured in
// one of the user profiles, or in the default profile, or in a few of them.
// However, the AutoConnect property of the same service is not synchronized
// across multiple profiles, and thus may have a different value depending on
// which profile is used at a given moment. If one user enables auto-connect on
// a service while another user disables auto-connect on the same service, it
// becomes less clear whether auto-connect should be enabled or not before any
// user has logged in. This is particularly problematic for cellular services,
// which may incur data cost. To err on the side of caution, we temporarily
// disable auto-connect for cellular before a user session has started.
const Technology::Identifier kNoAutoConnectTechnologiesBeforeLoggedIn[] = {
Technology::kCellular,
};
// Name of the default claimer.
constexpr char kDefaultClaimerName[] = "";
// For VPN drivers that only want to pass traffic for specific users,
// these are the usernames that will be used to create the routing policy
// rules. Also, when an AlwaysOnVpnPackage is set and a corresponding VPN
// service is not active, traffic from these users will blackholed.
const char* const kBrowserTrafficUsernames[] = {"chronos", "debugd"};
} // namespace
Manager::Manager(ControlInterface* control_interface,
EventDispatcher* dispatcher,
Metrics* metrics,
const string& run_directory,
const string& storage_directory,
const string& user_storage_directory)
: dispatcher_(dispatcher),
run_path_(run_directory),
storage_path_(storage_directory),
user_storage_path_(user_storage_directory),
user_profile_list_path_(Profile::kUserProfileListPathname),
adaptor_(control_interface->CreateManagerAdaptor(this)),
device_info_(control_interface, dispatcher, metrics, this),
#if !defined(DISABLE_CELLULAR)
modem_info_(control_interface, dispatcher, metrics, this),
#endif // DISABLE_CELLULAR
#if !defined(DISABLE_WIRED_8021X)
ethernet_eap_provider_(
new EthernetEapProvider(
control_interface, dispatcher, metrics, this)),
#endif // DISABLE_WIRED_8021X
vpn_provider_(
new VPNProvider(control_interface, dispatcher, metrics, this)),
#if !defined(DISABLE_WIFI)
wifi_provider_(
new WiFiProvider(control_interface, dispatcher, metrics, this)),
#endif // DISABLE_WIFI
#if !defined(DISABLE_WIMAX)
wimax_provider_(
new WiMaxProvider(control_interface, dispatcher, metrics, this)),
#endif // DISABLE_WIMAX
throttler_(new Throttler(dispatcher, this)),
resolver_(Resolver::GetInstance()),
running_(false),
connect_profiles_to_rpc_(true),
last_default_physical_service_(nullptr),
ephemeral_profile_(
new EphemeralProfile(control_interface, metrics, this)),
control_interface_(control_interface),
metrics_(metrics),
use_startup_portal_list_(false),
device_status_check_task_(Bind(&Manager::DeviceStatusCheckTask,
base::Unretained(this))),
termination_actions_(dispatcher),
suspend_delay_registered_(false),
is_wake_on_lan_enabled_(true),
ignore_unknown_ethernet_(false),
default_service_callback_tag_(0),
crypto_util_proxy_(new CryptoUtilProxy(dispatcher)),
health_checker_remote_ips_(new IPAddressStore()),
suppress_autoconnect_(false),
is_connected_state_(false),
has_user_session_(false),
dhcp_properties_(new DhcpProperties()),
network_throttling_enabled_(false),
download_rate_kbits_(0),
upload_rate_kbits_(0),
should_blackhole_browser_traffic_(false) {
HelpRegisterDerivedString(kActiveProfileProperty,
&Manager::GetActiveProfileRpcIdentifier,
nullptr);
HelpRegisterDerivedString(kAlwaysOnVpnPackageProperty,
&Manager::GetAlwaysOnVpnPackage,
&Manager::SetAlwaysOnVpnPackage);
store_.RegisterBool(kArpGatewayProperty, &props_.arp_gateway);
HelpRegisterConstDerivedStrings(kAvailableTechnologiesProperty,
&Manager::AvailableTechnologies);
HelpRegisterDerivedString(kCheckPortalListProperty,
&Manager::GetCheckPortalList,
&Manager::SetCheckPortalList);
HelpRegisterConstDerivedStrings(kConnectedTechnologiesProperty,
&Manager::ConnectedTechnologies);
store_.RegisterConstString(kConnectionStateProperty, &connection_state_);
store_.RegisterString(kCountryProperty, &props_.country);
HelpRegisterDerivedString(kDefaultTechnologyProperty,
&Manager::DefaultTechnology,
nullptr);
HelpRegisterConstDerivedRpcIdentifier(
kDefaultServiceProperty, &Manager::GetDefaultServiceRpcIdentifier);
HelpRegisterConstDerivedRpcIdentifiers(kDevicesProperty,
&Manager::EnumerateDevices);
#if !defined(DISABLE_WIFI)
HelpRegisterDerivedBool(kDisableWiFiVHTProperty,
&Manager::GetDisableWiFiVHT,
&Manager::SetDisableWiFiVHT);
#endif // DISABLE_WIFI
HelpRegisterConstDerivedStrings(kEnabledTechnologiesProperty,
&Manager::EnabledTechnologies);
HelpRegisterDerivedString(kIgnoredDNSSearchPathsProperty,
&Manager::GetIgnoredDNSSearchPaths,
&Manager::SetIgnoredDNSSearchPaths);
store_.RegisterString(kDhcpPropertyHostnameProperty, &props_.host_name);
store_.RegisterString(kLinkMonitorTechnologiesProperty,
&props_.link_monitor_technologies);
store_.RegisterString(kNoAutoConnectTechnologiesProperty,
&props_.no_auto_connect_technologies);
store_.RegisterBool(kOfflineModeProperty, &props_.offline_mode);
store_.RegisterConstString(kPortalURLProperty, &props_.portal_url);
store_.RegisterInt32(kPortalCheckIntervalProperty,
&props_.portal_check_interval_seconds);
HelpRegisterConstDerivedRpcIdentifiers(kProfilesProperty,
&Manager::EnumerateProfiles);
HelpRegisterDerivedString(kProhibitedTechnologiesProperty,
&Manager::GetProhibitedTechnologies,
&Manager::SetProhibitedTechnologies);
HelpRegisterDerivedString(kStateProperty,
&Manager::CalculateState,
nullptr);
HelpRegisterConstDerivedRpcIdentifiers(kServicesProperty,
&Manager::EnumerateAvailableServices);
HelpRegisterConstDerivedRpcIdentifiers(kServiceCompleteListProperty,
&Manager::EnumerateCompleteServices);
HelpRegisterConstDerivedRpcIdentifiers(kServiceWatchListProperty,
&Manager::EnumerateWatchedServices);
HelpRegisterConstDerivedStrings(kUninitializedTechnologiesProperty,
&Manager::UninitializedTechnologies);
store_.RegisterBool(kWakeOnLanEnabledProperty, &is_wake_on_lan_enabled_);
HelpRegisterConstDerivedStrings(kClaimedDevicesProperty,
&Manager::ClaimedDevices);
UpdateProviderMapping();
dhcp_properties_->InitPropertyStore(&store_);
SLOG(this, 2) << "Manager initialized.";
}
Manager::~Manager() {}
void Manager::RegisterAsync(const Callback<void(bool)>& completion_callback) {
adaptor_->RegisterAsync(completion_callback);
}
void Manager::SetBlacklistedDevices(const vector<string>& blacklisted_devices) {
blacklisted_devices_ = blacklisted_devices;
}
void Manager::SetWhitelistedDevices(const vector<string>& whitelisted_devices) {
whitelisted_devices_ = whitelisted_devices;
}
void Manager::SetArcDevice(const string& arc_device) {
arc_device_ = arc_device;
}
void Manager::ApplyPolicies() {
if (!policy_provider_.get())
policy_provider_.reset(new policy::PolicyProvider());
policy_provider_->Reload();
SLOG(this, 2) << "Reloaded policies";
if (policy_provider_->device_policy_is_loaded()) {
// TODO(kirtika): Blocked on Chrome providing throttling policy.
// crbug.com/634529
// Read from the policy here instead of using dummy values
// network_throttling_enabled_ = true;
// download_rate_kbits_ = 1000;
// upload_rate_kbits_ = 1000;
}
}
void Manager::Start() {
LOG(INFO) << "Manager started.";
ComputeBrowserTrafficUids();
ApplyPolicies();
power_manager_.reset(
new PowerManager(dispatcher_, control_interface_));
power_manager_->Start(base::TimeDelta::FromMilliseconds(
kTerminationActionsTimeoutMilliseconds),
Bind(&Manager::OnSuspendImminent, AsWeakPtr()),
Bind(&Manager::OnSuspendDone, AsWeakPtr()),
Bind(&Manager::OnDarkSuspendImminent, AsWeakPtr()));
upstart_.reset(new Upstart(control_interface_));
CHECK(base::CreateDirectory(run_path_)) << run_path_.value();
resolver_->set_path(run_path_.Append("resolv.conf"));
InitializeProfiles();
running_ = true;
device_info_.Start();
#if !defined(DISABLE_CELLULAR)
modem_info_.Start();
#endif // DISABLE_CELLULAR
for (const auto& provider_mapping : providers_) {
provider_mapping.second->Start();
}
// Start task for checking connection status.
dispatcher_->PostDelayedTask(FROM_HERE, device_status_check_task_.callback(),
kDeviceStatusCheckIntervalMilliseconds);
}
void Manager::Stop() {
running_ = false;
// Persist device information to disk;
for (const auto& device : devices_) {
UpdateDevice(device);
}
#if !defined(DISABLE_WIFI)
UpdateWiFiProvider();
#endif // DISABLE_WIFI
// Persist profile, service information to disk.
for (const auto& profile : profiles_) {
// Since this happens in a loop, the current manager state is stored to
// all default profiles in the stack. This is acceptable because the
// only time multiple default profiles are loaded are during autotests.
profile->Save();
}
Error e;
for (const auto& service : services_) {
service->Disconnect(&e, __func__);
}
for (const auto& device : devices_) {
device->SetEnabled(false);
}
for (const auto& provider_mapping : providers_) {
provider_mapping.second->Stop();
}
#if !defined(DISABLE_CELLULAR)
modem_info_.Stop();
#endif // DISABLE_CELLULAR
device_info_.Stop();
device_status_check_task_.Cancel();
sort_services_task_.Cancel();
power_manager_->Stop();
power_manager_.reset();
}
void Manager::InitializeProfiles() {
DCHECK(profiles_.empty()); // The default profile must go first on stack.
CHECK(base::CreateDirectory(storage_path_)) << storage_path_.value();
// Ensure that we have storage for the default profile, and that
// the persistent copy of the default profile is not corrupt.
scoped_refptr<DefaultProfile>
default_profile(new DefaultProfile(control_interface_,
metrics_,
this,
storage_path_,
DefaultProfile::kDefaultId,
props_));
// The default profile may fail to initialize if it's corrupted.
// If so, recreate the default profile.
if (!default_profile->InitStorage(Profile::kCreateOrOpenExisting, nullptr))
CHECK(default_profile->InitStorage(Profile::kCreateNew, nullptr));
// In case we created a new profile, initialize its default values,
// and then save. This is required for properties such as
// PortalDetector::kDefaultCheckPortalList to be initialized correctly.
LoadProperties(default_profile);
default_profile->Save();
default_profile = nullptr; // PushProfileInternal will re-create.
// Read list of user profiles. This must be done before pushing the
// default profile, because modifying the profile stack updates the
// user profile list.
vector<Profile::Identifier> identifiers =
Profile::LoadUserProfileList(user_profile_list_path_);
// Push the default profile onto the stack.
Error error;
string path;
Profile::Identifier default_profile_id;
CHECK(Profile::ParseIdentifier(
DefaultProfile::kDefaultId, &default_profile_id));
PushProfileInternal(default_profile_id, &path, &error);
CHECK(!profiles_.empty()); // Must have a default profile.
// Push user profiles onto the stack.
for (const auto& profile_id : identifiers) {
PushProfileInternal(profile_id, &path, &error);
}
}
void Manager::CreateProfile(const string& name, string* path, Error* error) {
SLOG(this, 2) << __func__ << " " << name;
Profile::Identifier ident;
if (!Profile::ParseIdentifier(name, &ident)) {
Error::PopulateAndLog(FROM_HERE, error, Error::kInvalidArguments,
"Invalid profile name " + name);
return;
}
if (HasProfile(ident)) {
Error::PopulateAndLog(FROM_HERE, error, Error::kAlreadyExists,
"Profile name " + name + " is already on stack");
return;
}
ProfileRefPtr profile;
if (ident.user.empty()) {
profile = new DefaultProfile(control_interface_,
metrics_,
this,
storage_path_,
ident.identifier,
props_);
} else {
profile = new Profile(control_interface_,
metrics_,
this,
ident,
user_storage_path_,
true);
}
if (!profile->InitStorage(Profile::kCreateNew, error)) {
// |error| will have been populated by InitStorage().
return;
}
// Save profile data out, and then let the scoped pointer fall out of scope.
if (!profile->Save()) {
Error::PopulateAndLog(FROM_HERE, error, Error::kInternalError,
"Profile name " + name + " could not be saved");
return;
}
*path = profile->GetRpcIdentifier();
}
bool Manager::HasProfile(const Profile::Identifier& ident) {
for (const auto& profile : profiles_) {
if (profile->MatchesIdentifier(ident)) {
return true;
}
}
return false;
}
void Manager::PushProfileInternal(
const Profile::Identifier& ident, string* path, Error* error) {
if (HasProfile(ident)) {
Error::PopulateAndLog(FROM_HERE, error, Error::kAlreadyExists,
"Profile name " + Profile::IdentifierToString(ident) +
" is already on stack");
return;
}
ProfileRefPtr profile;
if (ident.user.empty()) {
// Allow a machine-wide-profile to be pushed on the stack only if the
// profile stack is empty, or if the topmost profile on the stack is
// also a machine-wide (non-user) profile.
if (!profiles_.empty() && !profiles_.back()->GetUser().empty()) {
Error::PopulateAndLog(FROM_HERE, error, Error::kInvalidArguments,
"Cannot load non-default global profile " +
Profile::IdentifierToString(ident) +
" on top of a user profile");
return;
}
scoped_refptr<DefaultProfile>
default_profile(new DefaultProfile(control_interface_,
metrics_,
this,
storage_path_,
ident.identifier,
props_));
if (!default_profile->InitStorage(Profile::kOpenExisting, nullptr)) {
LOG(ERROR) << "Failed to open default profile.";
// Try to continue anyway, so that we can be useful in cases
// where the disk is full.
default_profile->InitStubStorage();
}
LoadProperties(default_profile);
profile = default_profile;
} else {
profile = new Profile(control_interface_,
metrics_,
this,
ident,
user_storage_path_,
connect_profiles_to_rpc_);
if (!profile->InitStorage(Profile::kOpenExisting, error)) {
// |error| will have been populated by InitStorage().
return;
}
}
profiles_.push_back(profile);
for (ServiceRefPtr& service : services_) {
service->ClearExplicitlyDisconnected();
// Offer each registered Service the opportunity to join this new Profile.
if (profile->ConfigureService(service)) {
LOG(INFO) << "(Re-)configured service " << service->unique_name()
<< " from new profile.";
}
}
// Shop the Profile contents around to Devices which may have configuration
// stored in these profiles.
for (DeviceRefPtr& device : devices_) {
profile->ConfigureDevice(device);
}
// Offer the Profile contents to the service providers which will
// create new services if necessary.
for (const auto& provider_mapping : providers_) {
provider_mapping.second->CreateServicesFromProfile(profile);
}
*path = profile->GetRpcIdentifier();
SortServices();
OnProfilesChanged();
LOG(INFO) << __func__ << " finished; " << profiles_.size()
<< " profile(s) now present.";
}
void Manager::PushProfile(const string& name, string* path, Error* error) {
SLOG(this, 2) << __func__ << " " << name;
Profile::Identifier ident;
if (!Profile::ParseIdentifier(name, &ident)) {
Error::PopulateAndLog(FROM_HERE, error, Error::kInvalidArguments,
"Invalid profile name " + name);
return;
}
PushProfileInternal(ident, path, error);
}
void Manager::InsertUserProfile(const string& name,
const string& user_hash,
string* path,
Error* error) {
SLOG(this, 2) << __func__ << " " << name;
Profile::Identifier ident;
if (!Profile::ParseIdentifier(name, &ident) ||
ident.user.empty()) {
Error::PopulateAndLog(FROM_HERE, error, Error::kInvalidArguments,
"Invalid user profile name " + name);
return;
}
ident.user_hash = user_hash;
PushProfileInternal(ident, path, error);
has_user_session_ = true;
}
void Manager::PopProfileInternal() {
CHECK(!profiles_.empty());
ProfileRefPtr active_profile = profiles_.back();
profiles_.pop_back();
for (auto it = services_.begin(); it != services_.end();) {
(*it)->ClearExplicitlyDisconnected();
if (IsServiceEphemeral(*it)) {
// Not affected, since the EphemeralProfile isn't on the stack.
// Not logged, since ephemeral services aren't that interesting.
++it;
continue;
}
if ((*it)->profile().get() != active_profile.get()) {
LOG(INFO) << "Skipping unload of service " << (*it)->unique_name()
<< ": wasn't using this profile.";
++it;
continue;
}
if (MatchProfileWithService(*it)) {
LOG(INFO) << "Skipping unload of service " << (*it)->unique_name()
<< ": re-configured from another profile.";
++it;
continue;
}
if (!UnloadService(&it)) {
LOG(INFO) << "Service " << (*it)->unique_name()
<< " not completely unloaded.";
++it;
continue;
}
// Service was totally unloaded. No advance of iterator in this
// case, as UnloadService has updated the iterator for us.
}
SortServices();
OnProfilesChanged();
LOG(INFO) << __func__ << " finished; " << profiles_.size()
<< " profile(s) still present.";
}
void Manager::OnProfilesChanged() {
Error unused_error;
adaptor_->EmitStringsChanged(kProfilesProperty,
EnumerateProfiles(&unused_error));
Profile::SaveUserProfileList(user_profile_list_path_, profiles_);
}
void Manager::PopProfile(const string& name, Error* error) {
SLOG(this, 2) << __func__ << " " << name;
Profile::Identifier ident;
if (profiles_.empty()) {
Error::PopulateAndLog(
FROM_HERE, error, Error::kNotFound, "Profile stack is empty");
return;
}
ProfileRefPtr active_profile = profiles_.back();
if (!Profile::ParseIdentifier(name, &ident)) {
Error::PopulateAndLog(FROM_HERE, error, Error::kInvalidArguments,
"Invalid profile name " + name);
return;
}
if (!active_profile->MatchesIdentifier(ident)) {
Error::PopulateAndLog(FROM_HERE, error, Error::kNotSupported,
name + " is not the active profile");
return;
}
PopProfileInternal();
}
void Manager::PopAnyProfile(Error* error) {
SLOG(this, 2) << __func__;
Profile::Identifier ident;
if (profiles_.empty()) {
Error::PopulateAndLog(
FROM_HERE, error, Error::kNotFound, "Profile stack is empty");
return;
}
PopProfileInternal();
}
void Manager::PopAllUserProfiles(Error* /*error*/) {
SLOG(this, 2) << __func__;
while (!profiles_.empty() && !profiles_.back()->GetUser().empty()) {
PopProfileInternal();
}
has_user_session_ = false;
}
void Manager::RemoveProfile(const string& name, Error* error) {
Profile::Identifier ident;
if (!Profile::ParseIdentifier(name, &ident)) {
Error::PopulateAndLog(FROM_HERE, error, Error::kInvalidArguments,
"Invalid profile name " + name);
return;
}
if (HasProfile(ident)) {
Error::PopulateAndLog(FROM_HERE, error, Error::kInvalidArguments,
"Cannot remove profile name " + name +
" since it is on stack");
return;
}
ProfileRefPtr profile;
if (ident.user.empty()) {
profile = new DefaultProfile(control_interface_,
metrics_,
this,
storage_path_,
ident.identifier,
props_);
} else {
profile = new Profile(control_interface_,
metrics_,
this,
ident,
user_storage_path_,
false);
}
// |error| will have been populated if RemoveStorage fails.
profile->RemoveStorage(error);
return;
}
bool Manager::DeviceManagementAllowed(const string& device_name) {
if (std::find(blacklisted_devices_.begin(),
blacklisted_devices_.end(),
device_name) != blacklisted_devices_.end()) {
return false;
}
if (!whitelisted_devices_.size()) {
// If no whitelist is specified, all devices are considered whitelisted.
return true;
}
if (std::find(whitelisted_devices_.begin(),
whitelisted_devices_.end(),
device_name) != whitelisted_devices_.end()) {
return true;
}
return false;
}
void Manager::ClaimDevice(const string& claimer_name,
const string& device_name,
Error* error) {
SLOG(this, 2) << __func__;
// Basic check for device name.
if (device_name.empty()) {
Error::PopulateAndLog(FROM_HERE, error, Error::kInvalidArguments,
"Empty device name");
return;
}
if (!DeviceManagementAllowed(device_name)) {
Error::PopulateAndLog(FROM_HERE, error, Error::kInvalidArguments,
"Not allowed to claim unmanaged device");
return;
}
// Verify default claimer.
if (claimer_name.empty() &&
(!device_claimer_ || !device_claimer_->default_claimer())) {
Error::PopulateAndLog(FROM_HERE, error, Error::kInvalidArguments,
"No default claimer");
return;
}
// Create a new device claimer if one doesn't exist yet.
if (!device_claimer_) {
// Start a device claimer. No need to verify the existence of the claimer,
// since we are using message sender as the claimer name.
device_claimer_.reset(
new DeviceClaimer(claimer_name, &device_info_, false));
}
// Verify claimer's name, since we only allow one claimer to exist at a time.
if (device_claimer_->name() != claimer_name) {
Error::PopulateAndLog(FROM_HERE, error, Error::kInvalidArguments,
"Invalid claimer name " + claimer_name +
". Claimer " + device_claimer_->name() +
" already exist");
return;
}
// Error will be populated by the claimer if failed to claim the device.
if (!device_claimer_->Claim(device_name, error)) {
return;
}
// Deregister the device from manager if it is registered.
DeregisterDeviceByLinkName(device_name);
}
void Manager::ReleaseDevice(const string& claimer_name,
const string& device_name,
bool* claimer_removed,
Error* error) {
SLOG(this, 2) << __func__;
*claimer_removed = false;
if (!DeviceManagementAllowed(device_name)) {
Error::PopulateAndLog(FROM_HERE, error, Error::kInvalidArguments,
"Not allowed to release unmanaged device");
return;
}
if (!device_claimer_) {
Error::PopulateAndLog(FROM_HERE, error, Error::kInvalidArguments,
"Device claimer doesn't exist");
return;
}
// Verify claimer's name, since we only allow one claimer to exist at a time.
if (device_claimer_->name() != claimer_name) {
Error::PopulateAndLog(FROM_HERE, error, Error::kInvalidArguments,
"Invalid claimer name " + claimer_name +
". Claimer " + device_claimer_->name() +
" already exist");
return;
}
// Release the device from the claimer. Error should be populated by the
// claimer if it failed to release the given device.
device_claimer_->Release(device_name, error);
// Reset claimer if this is not the default claimer and no more devices are
// claimed by this claimer.
if (!device_claimer_->default_claimer() &&
!device_claimer_->DevicesClaimed()) {
device_claimer_.reset();
*claimer_removed = true;
}
}
void Manager::RemoveService(const ServiceRefPtr& service) {
LOG(INFO) << __func__ << " for service " << service->unique_name();
if (!IsServiceEphemeral(service)) {
service->profile()->AbandonService(service);
if (MatchProfileWithService(service)) {
// We found another profile to adopt the service; no need to unload.
UpdateService(service);
return;
}
}
auto service_it = std::find(services_.begin(), services_.end(), service);
CHECK(service_it != services_.end());
if (!UnloadService(&service_it)) {
UpdateService(service);
}
SortServices();
}
bool Manager::HandleProfileEntryDeletion(const ProfileRefPtr& profile,
const std::string& entry_name) {
bool moved_services = false;
for (auto it = services_.begin(); it != services_.end();) {
if ((*it)->profile().get() == profile.get() &&
(*it)->GetStorageIdentifier() == entry_name) {
profile->AbandonService(*it);
if (MatchProfileWithService(*it) ||
!UnloadService(&it)) {
++it;
}
moved_services = true;
} else {
++it;
}
}
if (moved_services) {
SortServices();
}
return moved_services;
}
map<string, string> Manager::GetLoadableProfileEntriesForService(
const ServiceConstRefPtr& service) {
map<string, string> profile_entries;
for (const auto& profile : profiles_) {
string entry_name = service->GetLoadableStorageIdentifier(
*profile->GetConstStorage());
if (!entry_name.empty()) {
profile_entries[profile->GetRpcIdentifier()] = entry_name;
}
}
return profile_entries;
}
ServiceRefPtr Manager::GetServiceWithStorageIdentifier(
const ProfileRefPtr& profile, const std::string& entry_name, Error* error) {
for (const auto& service : services_) {
if (service->profile().get() == profile.get() &&
service->GetStorageIdentifier() == entry_name) {
return service;
}
}
SLOG(this, 2) << "Entry " << entry_name
<< " is not registered in the manager";
return nullptr;
}
ServiceRefPtr Manager::CreateTemporaryServiceFromProfile(
const ProfileRefPtr& profile, const std::string& entry_name, Error* error) {
Technology::Identifier technology =
Technology::IdentifierFromStorageGroup(entry_name);
if (technology == Technology::kUnknown) {
Error::PopulateAndLog(
FROM_HERE, error, Error::kInternalError,
"Could not determine technology for entry: " + entry_name);
return nullptr;
}
ServiceRefPtr service = nullptr;
// Since there is no provider for Ethernet services (Ethernet services are
// created/provided by the Ethernet device), we will explicitly create
// temporary Ethernet services for loading Ethernet entries.
if (technology == Technology::kEthernet) {
service = new EthernetTemporaryService(control_interface_,
dispatcher_,
metrics_,
this,
entry_name);
} else if (base::ContainsKey(providers_, technology)) {
service =
providers_[technology]->CreateTemporaryServiceFromProfile(
profile, entry_name, error);
}
if (!service) {
Error::PopulateAndLog(FROM_HERE, error, Error::kNotSupported,
kErrorUnsupportedServiceType);
return nullptr;
}
profile->LoadService(service);
return service;
}
ServiceRefPtr Manager::GetServiceWithGUID(
const std::string& guid, Error* error) {
for (const auto& service : services_) {
if (service->guid() == guid) {
return service;
}
}
string error_string(
StringPrintf("Service wth GUID %s is not registered in the manager",
guid.c_str()));
if (error) {
error->Populate(Error::kNotFound, error_string);
}
SLOG(this, 2) << error_string;
return nullptr;
}
ServiceRefPtr Manager::GetDefaultService() const {
SLOG(this, 2) << __func__;
if (services_.empty() || !services_[0]->connection().get()) {
SLOG(this, 2) << "In " << __func__ << ": No default connection exists.";
return nullptr;
}
return services_[0];
}
RpcIdentifier Manager::GetDefaultServiceRpcIdentifier(Error* /*error*/) {
ServiceRefPtr default_service = GetDefaultService();
return default_service ? default_service->GetRpcIdentifier() :
control_interface_->NullRPCIdentifier();
}
bool Manager::IsTechnologyInList(const string& technology_list,
Technology::Identifier tech) const {
if (technology_list.empty())
return false;
Error error;
vector<Technology::Identifier> technologies;
return Technology::GetTechnologyVectorFromString(technology_list,
&technologies,
&error) &&
std::find(technologies.begin(), technologies.end(), tech) !=
technologies.end();
}
bool Manager::IsPortalDetectionEnabled(Technology::Identifier tech) {
return IsTechnologyInList(GetCheckPortalList(nullptr), tech);
}
void Manager::SetStartupPortalList(const string& portal_list) {
startup_portal_list_ = portal_list;
use_startup_portal_list_ = true;
}
bool Manager::IsProfileBefore(const ProfileRefPtr& a,
const ProfileRefPtr& b) const {
DCHECK(a != b);
for (const auto& profile : profiles_) {
if (profile == a) {
return true;
}
if (profile == b) {
return false;
}
}
NOTREACHED() << "We should have found both profiles in the profiles_ list!";
return false;
}
bool Manager::IsServiceEphemeral(const ServiceConstRefPtr& service) const {
return service->profile() == ephemeral_profile_;
}
bool Manager::IsTechnologyLinkMonitorEnabled(
Technology::Identifier technology) const {
return IsTechnologyInList(props_.link_monitor_technologies, technology);
}
bool Manager::IsTechnologyAutoConnectDisabled(
Technology::Identifier technology) const {
if (!has_user_session_) {
for (auto disabled_technology : kNoAutoConnectTechnologiesBeforeLoggedIn) {
if (technology == disabled_technology)
return true;
}
}
return IsTechnologyInList(props_.no_auto_connect_technologies, technology);
}
bool Manager::IsTechnologyProhibited(
Technology::Identifier technology) const {
return IsTechnologyInList(props_.prohibited_technologies, technology);
}
void Manager::OnProfileStorageInitialized(Profile* profile) {
#if !defined(DISABLE_WIFI)
wifi_provider_->LoadAndFixupServiceEntries(profile);
#endif // DISABLE_WIFI
}
DeviceRefPtr Manager::GetEnabledDeviceWithTechnology(
Technology::Identifier technology) const {
for (const auto& device : FilterByTechnology(technology)) {
if (device->enabled()) {
return device;
}
}
return nullptr;
}
DeviceRefPtr Manager::GetEnabledDeviceByLinkName(
const string& link_name) const {
for (const auto& device : devices_) {
if (device->link_name() == link_name) {
if (!device->enabled()) {
return nullptr;
}
return device;
}
}
return nullptr;
}
const ProfileRefPtr& Manager::ActiveProfile() const {
DCHECK_NE(profiles_.size(), 0U);
return profiles_.back();
}
bool Manager::IsActiveProfile(const ProfileRefPtr& profile) const {
return (profiles_.size() > 0 &&
ActiveProfile().get() == profile.get());
}
bool Manager::MoveServiceToProfile(const ServiceRefPtr& to_move,
const ProfileRefPtr& destination) {
const ProfileRefPtr from = to_move->profile();
SLOG(this, 2) << "Moving service "
<< to_move->unique_name()
<< " to profile "
<< destination->GetFriendlyName()
<< " from "
<< from->GetFriendlyName();
return destination->AdoptService(to_move) && from->AbandonService(to_move);
}
ProfileRefPtr Manager::LookupProfileByRpcIdentifier(
const string& profile_rpcid) {
for (const auto& profile : profiles_) {
if (profile_rpcid == profile->GetRpcIdentifier()) {
return profile;
}
}
return nullptr;
}
void Manager::SetProfileForService(const ServiceRefPtr& to_set,
const string& profile_rpcid,
Error* error) {
ProfileRefPtr profile = LookupProfileByRpcIdentifier(profile_rpcid);
if (!profile) {
Error::PopulateAndLog(FROM_HERE, error, Error::kInvalidArguments,
StringPrintf("Unknown Profile %s requested for "
"Service", profile_rpcid.c_str()));
return;
}
if (!to_set->profile()) {
// We are being asked to set the profile property of a service that
// has never been registered. Now is a good time to register it.
RegisterService(to_set);
}
if (to_set->profile().get() == profile.get()) {
Error::PopulateAndLog(FROM_HERE, error, Error::kInvalidArguments,
"Service is already connected to this profile");
} else if (!MoveServiceToProfile(to_set, profile)) {
Error::PopulateAndLog(FROM_HERE, error, Error::kInternalError,
"Unable to move service to profile");
}
}
void Manager::SetEnabledStateForTechnology(const std::string& technology_name,
bool enabled_state,
bool persist,
Error* error,
const ResultCallback& callback) {
CHECK(error);
DCHECK(error->IsOngoing());
Technology::Identifier id = Technology::IdentifierFromName(technology_name);
if (id == Technology::kUnknown) {
error->Populate(Error::kInvalidArguments, "Unknown technology");
return;
}
if (enabled_state && IsTechnologyProhibited(id)) {
error->Populate(Error::kPermissionDenied,
"The " + technology_name + " technology is prohibited");
return;
}
bool deferred = false;
auto result_aggregator(make_scoped_refptr(new ResultAggregator(callback)));
for (auto& device : devices_) {
if (device->technology() != id)
continue;
Error device_error(Error::kOperationInitiated);
ResultCallback aggregator_callback(
Bind(&ResultAggregator::ReportResult, result_aggregator));
if (persist) {
device->SetEnabledPersistent(
enabled_state, &device_error, aggregator_callback);
} else {
device->SetEnabledNonPersistent(
enabled_state, &device_error, aggregator_callback);
}
if (device_error.IsOngoing()) {
deferred = true;
} else if (!error->IsFailure()) { // Report first failure.
error->CopyFrom(device_error);
}
}
if (deferred) {
// Some device is handling this change asynchronously. Clobber any error
// from another device, so that we can indicate the operation is still in
// progress.
error->Populate(Error::kOperationInitiated);
} else if (error->IsOngoing()) {
// |error| IsOngoing at entry to this method, but no device
// |deferred|. Reset |error|, to indicate we're done.
error->Reset();
}
}
void Manager::UpdateEnabledTechnologies() {
Error error;
adaptor_->EmitStringsChanged(kEnabledTechnologiesProperty,
EnabledTechnologies(&error));
}
void Manager::UpdateUninitializedTechnologies() {
Error error;
adaptor_->EmitStringsChanged(kUninitializedTechnologiesProperty,
UninitializedTechnologies(&error));
}
void Manager::SetPassiveMode() {
CHECK(!device_claimer_);
// Create a default device claimer to claim devices from shill as they're
// detected. Devices will be managed by remote application, which will use
// the default claimer to specify the devices for shill to manage.
device_claimer_.reset(
new DeviceClaimer(kDefaultClaimerName, &device_info_, true));
}
void Manager::SetIgnoreUnknownEthernet(bool ignore) {
LOG(INFO) << __func__ << "(" << ignore << ")";
ignore_unknown_ethernet_ = ignore;
}
void Manager::SetPrependDNSServers(const std::string& prepend_dns_servers) {
props_.prepend_dns_servers = prepend_dns_servers;
}
void Manager::SetAcceptHostnameFrom(const string& hostname_from) {
accept_hostname_from_ = hostname_from;
}
bool Manager::ShouldAcceptHostnameFrom(const string& device_name) const {
return base::MatchPattern(device_name, accept_hostname_from_);
}
void Manager::SetDHCPv6EnabledDevices(const vector<string>& device_list) {
dhcpv6_enabled_devices_ = device_list;
}
bool Manager::IsDHCPv6EnabledForDevice(const string& device_name) const {
return std::find(dhcpv6_enabled_devices_.begin(),
dhcpv6_enabled_devices_.end(),
device_name) != dhcpv6_enabled_devices_.end();
}
vector<string> Manager::FilterPrependDNSServersByFamily(
IPAddress::Family family) const {
vector<string> dns_servers;
vector<string> split_servers = base::SplitString(
props_.prepend_dns_servers, ",", base::TRIM_WHITESPACE,
base::SPLIT_WANT_ALL);
for (const auto& server : split_servers) {
const IPAddress address(server);
if (address.family() == family) {
dns_servers.push_back(server);
}
}
return dns_servers;
}
bool Manager::IsSuspending() {
if (power_manager_ && power_manager_->suspending()) {
return true;
}
return false;
}
void Manager::RecordDarkResumeWakeReason(const string& wake_reason) {
power_manager_->RecordDarkResumeWakeReason(wake_reason);
}
void Manager::RegisterDevice(const DeviceRefPtr& to_manage) {
LOG(INFO) << "Device " << to_manage->link_name() << " registered.";
// Manager is running in passive mode when default claimer is created, which
// means devices are being managed by remote application. Only manage the
// device if it was explicitly released by remote application through
// default claimer.
if (device_claimer_ && device_claimer_->default_claimer()) {
if (!device_claimer_->IsDeviceReleased(to_manage->link_name())) {
Error error;
device_claimer_->Claim(to_manage->link_name(), &error);
return;
}
}
for (const auto& device : devices_) {
if (to_manage == device)
return;
}
devices_.push_back(to_manage);
LoadDeviceFromProfiles(to_manage);
if (IsTechnologyProhibited(to_manage->technology())) {
Error unused_error;
to_manage->SetEnabledNonPersistent(false, &unused_error, ResultCallback());
}
// If |to_manage| is new, it needs to be persisted.
UpdateDevice(to_manage);
if (network_throttling_enabled_ &&
Technology::IsPrimaryConnectivityTechnology(to_manage->technology())) {
if (devices_.size() == 1) {
ResultCallback dummy;
throttler_->ThrottleInterfaces(dummy, upload_rate_kbits_,
download_rate_kbits_);
} else {
// Apply any existing network bandwidth throttling policy
throttler_->ApplyThrottleToNewInterface(to_manage->link_name());
}
}
// In normal usage, running_ will always be true when we are here, however
// unit tests sometimes do things in otherwise invalid states.
if (running_ && (to_manage->enabled_persistent() ||
to_manage->IsUnderlyingDeviceEnabled()))
to_manage->SetEnabled(true);
EmitDeviceProperties();
}
void Manager::DeregisterDevice(const DeviceRefPtr& to_forget) {
SLOG(this, 2) << __func__ << "(" << to_forget->link_name() << ")";
for (auto it = devices_.begin(); it != devices_.end(); ++it) {
if (to_forget.get() == it->get()) {
SLOG(this, 2) << "Deregistered device: " << to_forget->link_name();
UpdateDevice(to_forget);
to_forget->SetEnabled(false);
device_geolocation_info_.erase(to_forget);
devices_.erase(it);
EmitDeviceProperties();
return;
}
}
SLOG(this, 2) << __func__ << " unknown device: " << to_forget->link_name();
}
void Manager::DeregisterDeviceByLinkName(const string& link_name) {
for (const auto& device : devices_) {
if (device->link_name() == link_name) {
DeregisterDevice(device);
break;
}
}
}
vector<string> Manager::ClaimedDevices(Error* error) {
vector<string> results;
if (!device_claimer_) {
return results;
}
const auto& devices = device_claimer_->claimed_device_names();
results.resize(devices.size());
std::copy(devices.begin(), devices.end(), results.begin());
return results;
}
void Manager::LoadDeviceFromProfiles(const DeviceRefPtr& device) {
// We are applying device properties from the DefaultProfile, and adding the
// union of hidden services in all loaded profiles to the device.
for (const auto& profile : profiles_) {
// Load device configuration, if any exists, as well as hidden services.
profile->ConfigureDevice(device);
}
}
void Manager::EmitDeviceProperties() {
Error error;
vector<string> device_paths = EnumerateDevices(&error);
adaptor_->EmitRpcIdentifierArrayChanged(kDevicesProperty,
device_paths);
adaptor_->EmitStringsChanged(kAvailableTechnologiesProperty,
AvailableTechnologies(&error));
adaptor_->EmitStringsChanged(kEnabledTechnologiesProperty,
EnabledTechnologies(&error));
adaptor_->EmitStringsChanged(kUninitializedTechnologiesProperty,
UninitializedTechnologies(&error));
}
void Manager::OnInnerDevicesChanged() {
EmitDeviceProperties();
}
void Manager::OnDeviceClaimerVanished() {
// Reset device claimer.
device_claimer_.reset();
}
RpcIdentifiers Manager::EnumerateDevices(Error* /*error*/) {
RpcIdentifiers device_rpc_ids;
for (const auto& device : devices_) {
device_rpc_ids.push_back(device->GetRpcIdentifier());
}
// Enumerate devices that are internal to the services, such as PPPoE devices.
for (const auto& service : services_) {
if (!service->GetInnerDeviceRpcIdentifier().empty()) {
device_rpc_ids.push_back(service->GetInnerDeviceRpcIdentifier());
}
}
return device_rpc_ids;
}
#if !defined(DISABLE_WIFI)
bool Manager::SetDisableWiFiVHT(const bool& disable_wifi_vht, Error* error) {
if (disable_wifi_vht == wifi_provider_->disable_vht()) {
return false;
}
wifi_provider_->set_disable_vht(disable_wifi_vht);
return true;
}
bool Manager::GetDisableWiFiVHT(Error* error) {
return wifi_provider_->disable_vht();
}
#endif // DISABLE_WIFI
bool Manager::SetProhibitedTechnologies(const string& prohibited_technologies,
Error* error) {
vector<Technology::Identifier> technology_vector;
if (!Technology::GetTechnologyVectorFromString(prohibited_technologies,
&technology_vector,
error)) {
return false;
}
for (const auto& technology : technology_vector) {
Error unused_error(Error::kOperationInitiated);
ResultCallback result_callback(Bind(
&Manager::OnTechnologyProhibited, Unretained(this), technology));
const bool kPersistentSave = false;
SetEnabledStateForTechnology(Technology::NameFromIdentifier(technology),
false,
kPersistentSave,
&unused_error,
result_callback);
}
props_.prohibited_technologies = prohibited_technologies;
return true;
}
void Manager::OnTechnologyProhibited(Technology::Identifier technology,
const Error& error) {
SLOG(this, 2) << __func__ << " for "
<< Technology::NameFromIdentifier(technology);
}
string Manager::GetProhibitedTechnologies(Error* error) {
return props_.prohibited_technologies;
}
bool Manager::HasService(const ServiceRefPtr& service) {
for (const auto& manager_service : services_) {
if (manager_service->unique_name() == service->unique_name())
return true;
}
return false;
}
void Manager::RegisterService(const ServiceRefPtr& to_manage) {
SLOG(this, 2) << "Registering service " << to_manage->unique_name();
MatchProfileWithService(to_manage);
// Now add to OUR list.
for (const auto& service : services_) {
CHECK(to_manage->unique_name() != service->unique_name());
}
services_.push_back(to_manage);
SortServices();
}
void Manager::DeregisterService(const ServiceRefPtr& to_forget) {
for (auto it = services_.begin(); it != services_.end(); ++it) {
if (to_forget->unique_name() == (*it)->unique_name()) {
DLOG_IF(FATAL, (*it)->connection())
<< "Service " << (*it)->unique_name()
<< " still has a connection (in call to " << __func__ << ")";
(*it)->Unload();
(*it)->SetProfile(nullptr);
// We expect the service being deregistered to be destroyed here as well,
// so need to remove any remaining reference to it.
if (*it == last_default_physical_service_) {
last_default_physical_service_ = nullptr;
last_default_physical_service_connected_ = false;
}
services_.erase(it);
SortServices();
return;
}
}
}
bool Manager::UnloadService(vector<ServiceRefPtr>::iterator* service_iterator) {
if (!(**service_iterator)->Unload()) {
return false;
}
DCHECK(!(**service_iterator)->connection());
(**service_iterator)->SetProfile(nullptr);
*service_iterator = services_.erase(*service_iterator);
return true;
}
void Manager::UpdateService(const ServiceRefPtr& to_update) {
CHECK(to_update);
bool is_interesting_state_change = false;
const auto& state_it = watched_service_states_.find(to_update->unique_name());
if (state_it != watched_service_states_.end()) {
is_interesting_state_change = (to_update->state() != state_it->second);
} else {
is_interesting_state_change = to_update->IsActive(nullptr);
}
string log_message = StringPrintf(
"Service %s updated; state: %s failure %s",
to_update->unique_name().c_str(),
Service::ConnectStateToString(to_update->state()),
Service::ConnectFailureToString(to_update->failure()));
if (is_interesting_state_change) {
LOG(INFO) << log_message;
} else {
SLOG(this, 2) << log_message;
}
SLOG(this, 2) << "IsConnected(): " << to_update->IsConnected();
SLOG(this, 2) << "IsConnecting(): " << to_update->IsConnecting();
if (to_update->IsConnected()) {
to_update->EnableAndRetainAutoConnect();
// Persists the updated auto_connect setting in the profile.
SaveServiceToProfile(to_update);
}
SortServices();
}
void Manager::NotifyServiceStateChanged(const ServiceRefPtr& to_update) {
UpdateService(to_update);
if (to_update != last_default_physical_service_) {
return;
}
for (const auto& service : services_) {
service->OnDefaultServiceStateChanged(to_update);
}
}
void Manager::UpdateDevice(const DeviceRefPtr& to_update) {
LOG(INFO) << "Device " << to_update->link_name() << " updated: "
<< (to_update->enabled_persistent() ? "enabled" : "disabled");
// Saves the device to the topmost profile that accepts it (ordinary
// profiles don't update but default profiles do). Normally, the topmost
// updating profile would be the DefaultProfile at the bottom of the stack.
// Autotests, differ from the normal scenario, however, in that they push a
// second test-only DefaultProfile.
for (auto rit = profiles_.rbegin(); rit != profiles_.rend(); ++rit) {
if ((*rit)->UpdateDevice(to_update)) {
return;
}
}
}
#if !defined(DISABLE_WIFI)
void Manager::UpdateWiFiProvider() {
// Saves |wifi_provider_| to the topmost profile that accepts it (ordinary
// profiles don't update but default profiles do). Normally, the topmost
// updating profile would be the DefaultProfile at the bottom of the stack.
// Autotests, differ from the normal scenario, however, in that they push a
// second test-only DefaultProfile.
for (auto rit = profiles_.rbegin(); rit != profiles_.rend(); ++rit) {
if ((*rit)->UpdateWiFiProvider(*wifi_provider_)) {
return;
}
}
}
#endif // DISABLE_WIFI
void Manager::SaveServiceToProfile(const ServiceRefPtr& to_update) {
if (IsServiceEphemeral(to_update)) {
if (profiles_.empty()) {
LOG(ERROR) << "Cannot assign profile to service: no profiles exist!";
} else {
MoveServiceToProfile(to_update, profiles_.back());
}
} else {
to_update->profile()->UpdateService(to_update);
}
}
void Manager::LoadProperties(const scoped_refptr<DefaultProfile>& profile) {
profile->LoadManagerProperties(&props_, dhcp_properties_.get());
SetIgnoredDNSSearchPaths(props_.ignored_dns_search_paths, nullptr);
}
void Manager::AddTerminationAction(const string& name,
const base::Closure& start) {
termination_actions_.Add(name, start);
}
void Manager::TerminationActionComplete(const string& name) {
SLOG(this, 2) << __func__;
termination_actions_.ActionComplete(name);
}
void Manager::RemoveTerminationAction(const string& name) {
SLOG(this, 2) << __func__;
termination_actions_.Remove(name);
}
void Manager::RunTerminationActions(const ResultCallback& done_callback) {
LOG(INFO) << "Running termination actions.";
termination_actions_.Run(kTerminationActionsTimeoutMilliseconds,
done_callback);
}
bool Manager::RunTerminationActionsAndNotifyMetrics(
const ResultCallback& done_callback) {
if (termination_actions_.IsEmpty())
return false;
metrics_->NotifyTerminationActionsStarted();
RunTerminationActions(done_callback);
return true;
}
int Manager::RegisterDefaultServiceCallback(const ServiceCallback& callback) {
default_service_callbacks_[++default_service_callback_tag_] = callback;
return default_service_callback_tag_;
}
void Manager::DeregisterDefaultServiceCallback(int tag) {
default_service_callbacks_.erase(tag);
}
#if !defined(DISABLE_WIFI)
void Manager::VerifyDestination(const string& certificate,
const string& public_key,
const string& nonce,
const string& signed_data,
const string& destination_udn,
const string& hotspot_ssid,
const string& hotspot_bssid,
const ResultBoolCallback& cb,
Error* error) {
if (hotspot_bssid.length() > 32) {
error->Populate(Error::kOperationFailed,
"Invalid SSID given for verification.");
return;
}
vector<uint8_t> ssid;
string bssid;
if (hotspot_ssid.length() || hotspot_bssid.length()) {
// If Chrome thinks this destination is already configured, service
// will be an AP that both we and the destination are connected
// to, and not the thing we should verify against.
ssid.assign(hotspot_ssid.begin(), hotspot_ssid.end());
bssid = hotspot_bssid;
} else {
// For now, we only support a single connected WiFi service. If we change
// that, we'll need to revisit this.
bool found_one = false;
for (const auto& service : services_) {
if (service->technology() == Technology::kWifi &&
service->IsConnected()) {
WiFiService* wifi = reinterpret_cast<WiFiService*>(&(*service));
bssid = wifi->bssid();
ssid = wifi->ssid();
found_one = true;
break;
}
}
if (!found_one) {
error->Populate(Error::kOperationFailed,
"Unable to find connected WiFi service.");
return;
}
}
crypto_util_proxy_->VerifyDestination(certificate, public_key, nonce,
signed_data, destination_udn,
ssid, bssid, cb, error);
}
void Manager::VerifyToEncryptLink(const string& public_key,
const string& data,
ResultStringCallback cb,
const Error& error,
bool success) {
if (!success || !error.IsSuccess()) {
CHECK(error.IsFailure()) << "Return code from CryptoUtilProxy "
<< "inconsistent with error code.";
cb.Run(error, "");
return;
}
Error encrypt_error;
if (!crypto_util_proxy_->EncryptData(public_key, data, cb, &encrypt_error)) {
CHECK(encrypt_error.IsFailure()) << "CryptoUtilProxy::EncryptData returned "
<< "inconsistently.";
cb.Run(encrypt_error, "");
}
}
void Manager::VerifyAndEncryptData(const string& certificate,
const string& public_key,
const string& nonce,
const string& signed_data,
const string& destination_udn,
const string& hotspot_ssid,
const string& hotspot_bssid,
const string& data,
const ResultStringCallback& cb,
Error* error) {
ResultBoolCallback on_verification_success = Bind(
&Manager::VerifyToEncryptLink, AsWeakPtr(), public_key, data, cb);
VerifyDestination(certificate, public_key, nonce, signed_data,
destination_udn, hotspot_ssid, hotspot_bssid,
on_verification_success, error);
}
void Manager::VerifyAndEncryptCredentials(const string& certificate,
const string& public_key,
const string& nonce,
const string& signed_data,
const string& destination_udn,
const string& hotspot_ssid,
const string& hotspot_bssid,
const string& network_path,
const ResultStringCallback& cb,
Error* error) {
// This is intentionally left unimplemented until we have a security review.
error->Populate(Error::kNotImplemented, "Not implemented");
}
#endif // DISABLE_WIFI
int Manager::CalcConnectionId(const string& gateway_ip,
const string& gateway_mac) {
return static_cast<int>(std::hash<std::string>()(
gateway_ip + gateway_mac + std::to_string(props_.connection_id_salt)));
}
void Manager::ReportServicesOnSameNetwork(int connection_id) {
int num_services = 0;
for (const auto& service : services_) {
if (service->connection_id() == connection_id) {
num_services++;
}
}
metrics_->NotifyServicesOnSameNetwork(num_services);
}
void Manager::UpdateDefaultServices(
const ServiceRefPtr& logical_service,
const ServiceRefPtr& physical_service) {
metrics_->NotifyDefaultServiceChanged(logical_service.get());
EmitDefaultService();
bool physical_service_connected =
physical_service && physical_service->connection();
if (physical_service == last_default_physical_service_ &&
physical_service_connected == last_default_physical_service_connected_) {
return;
}
last_default_physical_service_ = physical_service;
last_default_physical_service_connected_ = physical_service_connected;
if (physical_service) {
if (!physical_service->connection()) {
LOG(INFO) << "Default physical service: "
<< physical_service->unique_name()
<< " (not connected)";
} else {
LOG(INFO) << "Default physical service: "
<< physical_service->unique_name()
<< " (connected)";
}
} else {
LOG(INFO) << "Default physical service: NONE";
}
for (auto it = default_service_callbacks_.cbegin();
it != default_service_callbacks_.cend();
/* no increment */) {
// Increment early, because |callback| might delete the current element.
const ServiceCallback& callback = (*it++).second;
callback.Run(physical_service);
}
}
void Manager::EmitDefaultService() {
RpcIdentifier rpc_identifier = GetDefaultServiceRpcIdentifier(nullptr);
if (rpc_identifier != default_service_rpc_identifier_) {
adaptor_->EmitRpcIdentifierChanged(kDefaultServiceProperty, rpc_identifier);
default_service_rpc_identifier_ = rpc_identifier;
}
}
void Manager::OnSuspendImminent() {
metrics_->NotifySuspendActionsStarted();
if (devices_.empty()) {
// If there are no devices, then suspend actions succeeded synchronously.
// Make a call to the Manager::OnSuspendActionsComplete directly, since
// result_aggregator will not.
OnSuspendActionsComplete(Error(Error::kSuccess));
return;
}
auto result_aggregator(make_scoped_refptr(new ResultAggregator(
Bind(&Manager::OnSuspendActionsComplete, AsWeakPtr()), dispatcher_,
kTerminationActionsTimeoutMilliseconds)));
for (const auto& service : services_) {
ResultCallback aggregator_callback(
Bind(&ResultAggregator::ReportResult, result_aggregator));
service->OnBeforeSuspend(aggregator_callback);
}
for (const auto& device : devices_) {
ResultCallback aggregator_callback(
Bind(&ResultAggregator::ReportResult, result_aggregator));
device->OnBeforeSuspend(aggregator_callback);
}
}
void Manager::OnSuspendDone() {
metrics_->NotifySuspendDone();
// Un-suppress auto-connect in case this flag was left set in dark resume.
set_suppress_autoconnect(false);
for (const auto& service : services_) {
service->OnAfterResume();
}
SortServices();
for (const auto& device : devices_) {
device->OnAfterResume();
}
}
void Manager::OnDarkSuspendImminent() {
metrics_->NotifyDarkResumeActionsStarted();
if (devices_.empty()) {
// If there are no devices, then suspend actions succeeded synchronously.
// Make a call to the Manager::OnDarkResumeActionsComplete directly, since
// result_aggregator will not.
OnDarkResumeActionsComplete(Error(Error::kSuccess));
return;
}
auto result_aggregator(make_scoped_refptr(new ResultAggregator(
Bind(&Manager::OnDarkResumeActionsComplete, AsWeakPtr()), dispatcher_,
kTerminationActionsTimeoutMilliseconds)));
for (const auto& device : devices_) {
ResultCallback aggregator_callback(
Bind(&ResultAggregator::ReportResult, result_aggregator));
device->OnDarkResume(aggregator_callback);
}
}
void Manager::OnSuspendActionsComplete(const Error& error) {
LOG(INFO) << "Finished suspend actions. Result: " << error;
metrics_->NotifySuspendActionsCompleted(error.IsSuccess());
power_manager_->ReportSuspendReadiness();
}
void Manager::OnDarkResumeActionsComplete(const Error& error) {
LOG(INFO) << "Finished dark resume actions. Result: " << error;
metrics_->NotifyDarkResumeActionsCompleted(error.IsSuccess());
power_manager_->ReportDarkSuspendReadiness();
}
vector<DeviceRefPtr>
Manager::FilterByTechnology(Technology::Identifier tech) const {
vector<DeviceRefPtr> found;
for (const auto& device : devices_) {
if (device->technology() == tech)
found.push_back(device);
}
return found;
}
ServiceRefPtr Manager::FindService(const string& name) {
for (const auto& service : services_) {
if (name == service->unique_name())
return service;
}
return nullptr;
}
void Manager::HelpRegisterConstDerivedRpcIdentifier(
const string& name,
RpcIdentifier(Manager::*get)(Error* error)) {
store_.RegisterDerivedRpcIdentifier(
name,
RpcIdentifierAccessor(
new CustomAccessor<Manager, RpcIdentifier>(this, get, nullptr)));
}
void Manager::HelpRegisterConstDerivedRpcIdentifiers(
const string& name,
RpcIdentifiers(Manager::*get)(Error* error)) {
store_.RegisterDerivedRpcIdentifiers(
name,
RpcIdentifiersAccessor(
new CustomAccessor<Manager, RpcIdentifiers>(this, get, nullptr)));
}
void Manager::HelpRegisterDerivedString(
const string& name,
string(Manager::*get)(Error* error),
bool(Manager::*set)(const string&, Error*)) {
store_.RegisterDerivedString(
name,
StringAccessor(new CustomAccessor<Manager, string>(this, get, set)));
}
void Manager::HelpRegisterConstDerivedStrings(
const string& name,
Strings(Manager::*get)(Error*)) {
store_.RegisterDerivedStrings(
name, StringsAccessor(
new CustomAccessor<Manager, Strings>(this, get, nullptr)));
}
void Manager::HelpRegisterDerivedBool(
const string& name,
bool(Manager::*get)(Error* error),
bool(Manager::*set)(const bool&, Error*)) {
store_.RegisterDerivedBool(
name,
BoolAccessor(new CustomAccessor<Manager, bool>(this, get, set, nullptr)));
}
void Manager::SortServices() {
// We might be called in the middle of a series of events that
// may result in multiple calls to Manager::SortServices, or within
// an outer loop that may also be traversing the services_ list.
// Defer this work to the event loop.
if (sort_services_task_.IsCancelled()) {
sort_services_task_.Reset(Bind(&Manager::SortServicesTask, AsWeakPtr()));
dispatcher_->PostTask(FROM_HERE, sort_services_task_.callback());
}
}
void Manager::SortServicesTask() {
SLOG(this, 4) << "In " << __func__;
sort_services_task_.Cancel();
const bool kCompareConnectivityState = true;
sort(services_.begin(), services_.end(),
ServiceSorter(this, kCompareConnectivityState, technology_order_));
int metric = Connection::kNonDefaultMetricBase;
bool found_dns = false;
ServiceRefPtr old_logical;
int old_logical_metric;
ServiceRefPtr new_logical;
ServiceRefPtr new_physical;
for (const auto& service : services_) {
ConnectionRefPtr conn = service->connection();
if (conn) {
int new_metric;
if (!found_dns && !conn->dns_servers().empty()) {
found_dns = true;
conn->SetUseDNS(true);
} else {
conn->SetUseDNS(false);
}
if (!new_logical) {
new_logical = service;
new_metric = Connection::kNewDefaultMetric;
} else {
new_metric = metric++;
}
if (conn->IsDefault()) {
old_logical = service;
old_logical_metric = new_metric;
} else {
conn->SetMetric(new_metric);
}
}
if (!new_physical && service->technology() != Technology::kVPN)
new_physical = service;
}
if (old_logical && old_logical != new_logical)
old_logical->connection()->SetMetric(old_logical_metric);
if (new_logical)
new_logical->connection()->SetMetric(Connection::kDefaultMetric);
Error error;
adaptor_->EmitRpcIdentifierArrayChanged(kServiceCompleteListProperty,
EnumerateCompleteServices(nullptr));
adaptor_->EmitRpcIdentifierArrayChanged(kServicesProperty,
EnumerateAvailableServices(nullptr));
adaptor_->EmitRpcIdentifierArrayChanged(kServiceWatchListProperty,
EnumerateWatchedServices(nullptr));
adaptor_->EmitStringsChanged(kConnectedTechnologiesProperty,
ConnectedTechnologies(&error));
adaptor_->EmitStringChanged(kDefaultTechnologyProperty,
DefaultTechnology(&error));
UpdateBlackholeBrowserTraffic();
UpdateDefaultServices(new_logical, new_physical);
RefreshConnectionState();
DetectMultiHomedDevices();
AutoConnect();
}
void Manager::DeviceStatusCheckTask() {
SLOG(this, 4) << "In " << __func__;
ConnectionStatusCheck();
DevicePresenceStatusCheck();
dispatcher_->PostDelayedTask(FROM_HERE, device_status_check_task_.callback(),
kDeviceStatusCheckIntervalMilliseconds);
}
void Manager::ConnectionStatusCheck() {
SLOG(this, 4) << "In " << __func__;
// Report current connection status.
Metrics::ConnectionStatus status = Metrics::kConnectionStatusOffline;
if (IsConnected()) {
status = Metrics::kConnectionStatusConnected;
// Check if device is online as well.
if (IsOnline()) {
metrics_->NotifyDeviceConnectionStatus(Metrics::kConnectionStatusOnline);
}
}
metrics_->NotifyDeviceConnectionStatus(status);
}
void Manager::DevicePresenceStatusCheck() {
Error error;
vector<string> available_technologies = AvailableTechnologies(&error);
for (const auto& technology : kProbeTechnologies) {
bool presence = std::find(available_technologies.begin(),
available_technologies.end(),
technology) != available_technologies.end();
metrics_->NotifyDevicePresenceStatus(
Technology::IdentifierFromName(technology), presence);
}
}
bool Manager::MatchProfileWithService(const ServiceRefPtr& service) {
vector<ProfileRefPtr>::reverse_iterator it;
for (it = profiles_.rbegin(); it != profiles_.rend(); ++it) {
if ((*it)->ConfigureService(service)) {
break;
}
}
if (it == profiles_.rend()) {
ephemeral_profile_->AdoptService(service);
return false;
}
return true;
}
void Manager::AutoConnect() {
if (suppress_autoconnect_) {
LOG(INFO) << "Auto-connect suppressed -- explicitly suppressed.";
return;
}
if (!running_) {
LOG(INFO) << "Auto-connect suppressed -- not running.";
return;
}
if (power_manager_ && power_manager_->suspending() &&
!power_manager_->in_dark_resume()) {
LOG(INFO) << "Auto-connect suppressed -- system is suspending.";
return;
}
if (services_.empty()) {
LOG(INFO) << "Auto-connect suppressed -- no services.";
return;
}
if (SLOG_IS_ON(Manager, 4)) {
SLOG(this, 4) << "Sorted service list for AutoConnect: ";
for (size_t i = 0; i < services_.size(); ++i) {
ServiceRefPtr service = services_[i];
const char* compare_reason = nullptr;
if (i + 1 < services_.size()) {
const bool kCompareConnectivityState = true;
Service::Compare(
this, service, services_[i+1], kCompareConnectivityState,
technology_order_, &compare_reason);
} else {
compare_reason = "last";
}
SLOG(this, 4) << "Service " << service->unique_name()
<< " Profile: " << service->profile()->GetFriendlyName()
<< " IsConnected: " << service->IsConnected()
<< " IsConnecting: " << service->IsConnecting()
<< " HasEverConnected: " << service->has_ever_connected()
<< " IsFailed: " << service->IsFailed()
<< " connectable: " << service->connectable()
<< " auto_connect: " << service->auto_connect()
<< " retain_auto_connect: "
<< service->retain_auto_connect()
<< " priority: " << service->priority()
<< " crypto_algorithm: " << service->crypto_algorithm()
<< " key_rotation: " << service->key_rotation()
<< " endpoint_auth: " << service->endpoint_auth()
<< " strength: " << service->strength()
<< " sorted: " << compare_reason;
}
}
#if !defined(DISABLE_WIFI)
// Report the number of auto-connectable wifi services available when wifi is
// idle (no active or pending connection), which will trigger auto connect
// for wifi services.
if (IsWifiIdle()) {
wifi_provider_->ReportAutoConnectableServices();
}
#endif // DISABLE_WIFI
// Perform auto-connect.
for (const auto& service : services_) {
if (service->auto_connect()) {
service->AutoConnect();
}
}
}
void Manager::ConnectToBestServices(Error* /*error*/) {
dispatcher_->PostTask(FROM_HERE,
Bind(&Manager::ConnectToBestServicesTask, AsWeakPtr()));
}
void Manager::ConnectToBestServicesTask() {
vector<ServiceRefPtr> services_copy = services_;
const bool kCompareConnectivityState = false;
sort(services_copy.begin(), services_copy.end(),
ServiceSorter(this, kCompareConnectivityState, technology_order_));
set<Technology::Identifier> connecting_technologies;
for (const auto& service : services_copy) {
if (!service->connectable()) {
// Due to service sort order, it is guaranteed that no services beyond
// this one will be connectable either.
break;
}
if (!service->auto_connect() || !service->IsVisible()) {
continue;
}
Technology::Identifier technology = service->technology();
if (!Technology::IsPrimaryConnectivityTechnology(technology) &&
!IsConnected()) {
// Non-primary services need some other service connected first.
continue;
}
if (base::ContainsKey(connecting_technologies, technology)) {
// We have already started a connection for this technology.
continue;
}
if (service->explicitly_disconnected())
continue;
connecting_technologies.insert(technology);
if (!service->IsConnected() && !service->IsConnecting()) {
// At first blush, it may seem that using Service::AutoConnect might
// be the right choice, however Service::IsAutoConnectable and its
// overridden implementations consider a host of conditions which
// prevent it from attempting a connection which we'd like to ignore
// for the purposes of this user-initiated action.
Error error;
service->Connect(&error, __func__);
if (error.IsFailure()) {
LOG(ERROR) << "Connection failed: " << error.message();
}
}
}
if (SLOG_IS_ON(Manager, 4)) {
SLOG(this, 4) << "Sorted service list for ConnectToBestServicesTask: ";
for (size_t i = 0; i < services_copy.size(); ++i) {
ServiceRefPtr service = services_copy[i];
const char* compare_reason = nullptr;
if (i + 1 < services_copy.size()) {
if (!service->connectable()) {
// Due to service sort order, it is guaranteed that no services beyond
// this one are connectable either.
break;
}
Service::Compare(
this, service, services_copy[i+1],
kCompareConnectivityState, technology_order_,
&compare_reason);
} else {
compare_reason = "last";
}
SLOG(this, 4) << "Service " << service->unique_name()
<< " Profile: " << service->profile()->GetFriendlyName()
<< " IsConnected: " << service->IsConnected()
<< " IsConnecting: " << service->IsConnecting()
<< " HasEverConnected: " << service->has_ever_connected()
<< " IsFailed: " << service->IsFailed()
<< " connectable: " << service->connectable()
<< " auto_connect: " << service->auto_connect()
<< " retain_auto_connect: "
<< service->retain_auto_connect()
<< " priority: " << service->priority()
<< " crypto_algorithm: " << service->crypto_algorithm()
<< " key_rotation: " << service->key_rotation()
<< " endpoint_auth: " << service->endpoint_auth()
<< " strength: " << service->strength()
<< " sorted: " << compare_reason;
}
}
}
void Manager::CreateConnectivityReport(Error* /*error*/) {
LOG(INFO) << "Creating Connectivity Report";
// For each of the connected services, perform a single portal detection
// test to assess connectivity. The results should be written to the log.
for (const auto& service : services_) {
if (!service->IsConnected()) {
// Service sort order guarantees that no service beyond this one will be
// connected either.
break;
}
// Get the underlying device for this service and perform connectivity test.
for (const auto& device : devices_) {
if (device->IsConnectedToService(service)) {
if (device->StartConnectivityTest()) {
SLOG(this, 3) << "Started connectivity test for service "
<< service->unique_name();
} else {
SLOG(this, 3) << "Failed to start connectivity test for service "
<< service->unique_name()
<< " device not reporting IsConnected.";
}
break;
}
}
}
}
bool Manager::IsConnected() const {
// |services_| is sorted such that connected services are first.
return !services_.empty() && services_.front()->IsConnected();
}
bool Manager::IsOnline() const {
// |services_| is sorted such that online services are first.
return !services_.empty() && services_.front()->IsOnline();
}
string Manager::CalculateState(Error* /*error*/) {
return IsConnected() ? kStateOnline : kStateOffline;
}
void Manager::RefreshConnectionState() {
const ServiceRefPtr& service = GetDefaultService();
string connection_state = service ? service->GetStateString() : kStateIdle;
if (connection_state_ == connection_state) {
return;
}
connection_state_ = connection_state;
adaptor_->EmitStringChanged(kConnectionStateProperty, connection_state_);
// Send upstart notifications for the initial idle state
// and when we transition in/out of connected states.
if ((!is_connected_state_) && (IsConnected())) {
is_connected_state_ = true;
upstart_->NotifyConnected();
} else if ((is_connected_state_) && (!IsConnected())) {
is_connected_state_ = false;
upstart_->NotifyDisconnected();
} else if (connection_state_ == kStateIdle) {
upstart_->NotifyDisconnected();
}
}
vector<string> Manager::AvailableTechnologies(Error* /*error*/) {
set<string> unique_technologies;
for (const auto& device : devices_) {
unique_technologies.insert(
Technology::NameFromIdentifier(device->technology()));
}
return vector<string>(unique_technologies.begin(), unique_technologies.end());
}
vector<string> Manager::ConnectedTechnologies(Error* /*error*/) {
set<string> unique_technologies;
for (const auto& device : devices_) {
if (device->IsConnected())
unique_technologies.insert(
Technology::NameFromIdentifier(device->technology()));
}
return vector<string>(unique_technologies.begin(), unique_technologies.end());
}
bool Manager::IsTechnologyConnected(Technology::Identifier technology) const {
for (const auto& device : devices_) {
if (device->technology() == technology && device->IsConnected())
return true;
}
return false;
}
string Manager::DefaultTechnology(Error* /*error*/) {
return (!services_.empty() && services_[0]->IsConnected()) ?
services_[0]->GetTechnologyString() : "";
}
vector<string> Manager::EnabledTechnologies(Error* /*error*/) {
set<string> unique_technologies;
for (const auto& device : devices_) {
if (device->enabled())
unique_technologies.insert(
Technology::NameFromIdentifier(device->technology()));
}
return vector<string>(unique_technologies.begin(), unique_technologies.end());
}
vector<string> Manager::UninitializedTechnologies(Error* /*error*/) {
return device_info_.GetUninitializedTechnologies();
}
RpcIdentifiers Manager::EnumerateProfiles(Error* /*error*/) {
RpcIdentifiers profile_rpc_ids;
for (const auto& profile : profiles_) {
profile_rpc_ids.push_back(profile->GetRpcIdentifier());
}
return profile_rpc_ids;
}
RpcIdentifiers Manager::EnumerateAvailableServices(Error* /*error*/) {
RpcIdentifiers service_rpc_ids;
for (const auto& service : services_) {
if (service->IsVisible()) {
service_rpc_ids.push_back(service->GetRpcIdentifier());
}
}
return service_rpc_ids;
}
RpcIdentifiers Manager::EnumerateCompleteServices(Error* /*error*/) {
RpcIdentifiers service_rpc_ids;
for (const auto& service : services_) {
service_rpc_ids.push_back(service->GetRpcIdentifier());
}
return service_rpc_ids;
}
RpcIdentifiers Manager::EnumerateWatchedServices(Error* /*error*/) {
RpcIdentifiers service_rpc_ids;
watched_service_states_.clear();
for (const auto& service : services_) {
if (service->IsVisible() && service->IsActive(nullptr)) {
service_rpc_ids.push_back(service->GetRpcIdentifier());
watched_service_states_[service->unique_name()] = service->state();
}
}
return service_rpc_ids;
}
string Manager::GetActiveProfileRpcIdentifier(Error* /*error*/) {
return ActiveProfile()->GetRpcIdentifier();
}
string Manager::GetCheckPortalList(Error* /*error*/) {
return use_startup_portal_list_ ? startup_portal_list_ :
props_.check_portal_list;
}
bool Manager::SetCheckPortalList(const string& portal_list, Error* error) {
use_startup_portal_list_ = false;
if (props_.check_portal_list == portal_list) {
return false;
}
props_.check_portal_list = portal_list;
return true;
}
string Manager::GetIgnoredDNSSearchPaths(Error* /*error*/) {
return props_.ignored_dns_search_paths;
}
bool Manager::SetIgnoredDNSSearchPaths(const string& ignored_paths,
Error* /*error*/) {
if (props_.ignored_dns_search_paths == ignored_paths) {
return false;
}
vector<string> ignored_path_list;
if (!ignored_paths.empty()) {
ignored_path_list = base::SplitString(
ignored_paths, ",", base::TRIM_WHITESPACE, base::SPLIT_WANT_ALL);
}
props_.ignored_dns_search_paths = ignored_paths;
resolver_->set_ignored_search_list(ignored_path_list);
return true;
}
// called via RPC (e.g., from ManagerDBusAdaptor)
ServiceRefPtr Manager::GetService(const KeyValueStore& args, Error* error) {
if (args.ContainsString(kTypeProperty) &&
args.GetString(kTypeProperty) == kTypeVPN) {
// GetService on a VPN service should actually perform ConfigureService.
// TODO(pstew): Remove this hack and change Chrome to use ConfigureService
// instead, when we no longer need to support flimflam. crbug.com/213802
return ConfigureService(args, error);
}
ServiceRefPtr service = GetServiceInner(args, error);
if (service) {
// Configures the service using the rest of the passed-in arguments.
service->Configure(args, error);
}
return service;
}
ServiceRefPtr Manager::GetServiceInner(const KeyValueStore& args,
Error* error) {
if (args.ContainsString(kGuidProperty)) {
SLOG(this, 2) << __func__ << ": searching by GUID";
ServiceRefPtr service =
GetServiceWithGUID(args.GetString(kGuidProperty), nullptr);
if (service) {
return service;
}
}
if (!args.ContainsString(kTypeProperty)) {
Error::PopulateAndLog(
FROM_HERE, error, Error::kInvalidArguments, kErrorTypeRequired);
return nullptr;
}
string type = args.GetString(kTypeProperty);
Technology::Identifier technology = Technology::IdentifierFromName(type);
if (!base::ContainsKey(providers_, technology)) {
Error::PopulateAndLog(FROM_HERE, error, Error::kNotSupported,
kErrorUnsupportedServiceType);
return nullptr;
}
SLOG(this, 2) << __func__ << ": getting " << type << " Service";
return providers_[technology]->GetService(args, error);
}
// called via RPC (e.g., from ManagerDBusAdaptor)
ServiceRefPtr Manager::ConfigureService(const KeyValueStore& args,
Error* error) {
ProfileRefPtr profile = ActiveProfile();
bool profile_specified = args.ContainsString(kProfileProperty);
if (profile_specified) {
string profile_rpcid = args.GetString(kProfileProperty);
profile = LookupProfileByRpcIdentifier(profile_rpcid);
if (!profile) {
Error::PopulateAndLog(FROM_HERE, error, Error::kInvalidArguments,
"Invalid profile name " + profile_rpcid);
return nullptr;
}
}
ServiceRefPtr service = GetServiceInner(args, error);
if (error->IsFailure() || !service) {
LOG(ERROR) << "GetService failed; returning upstream error.";
return nullptr;
}
// First pull in any stored configuration associated with the service.
if (service->profile() == profile) {
SLOG(this, 2) << __func__ << ": service " << service->unique_name()
<< " is already a member of profile "
<< profile->GetFriendlyName()
<< " so a load is not necessary.";
} else if (profile->LoadService(service)) {
SLOG(this, 2) << __func__ << ": applied stored information from profile "
<< profile->GetFriendlyName()
<< " into service "
<< service->unique_name();
} else {
SLOG(this, 2) << __func__ << ": no previous information in profile "
<< profile->GetFriendlyName()
<< " exists for service "
<< service->unique_name();
}
// Overlay this with the passed-in configuration parameters.
service->Configure(args, error);
// Overwrite the profile data with the resulting configured service.
if (!profile->UpdateService(service)) {
Error::PopulateAndLog(FROM_HERE, error, Error::kInternalError,
"Unable to save service to profile");
return nullptr;
}
if (HasService(service)) {
// If the service has been registered (it may not be -- as is the case
// with invisible WiFi networks), we can now transfer the service between
// profiles.
if (IsServiceEphemeral(service) ||
(profile_specified && service->profile() != profile)) {
SLOG(this, 2) << "Moving service to profile "
<< profile->GetFriendlyName();
if (!MoveServiceToProfile(service, profile)) {
Error::PopulateAndLog(FROM_HERE, error, Error::kInternalError,
"Unable to move service to profile");
}
}
}
// Notify the service that a profile has been configured for it.
service->OnProfileConfigured();
return service;
}
// called via RPC (e.g., from ManagerDBusAdaptor)
ServiceRefPtr Manager::ConfigureServiceForProfile(
const string& profile_rpcid, const KeyValueStore& args, Error* error) {
if (!args.ContainsString(kTypeProperty)) {
Error::PopulateAndLog(
FROM_HERE, error, Error::kInvalidArguments, kErrorTypeRequired);
return nullptr;
}
string type = args.GetString(kTypeProperty);
Technology::Identifier technology = Technology::IdentifierFromName(type);
if (!base::ContainsKey(providers_, technology)) {
Error::PopulateAndLog(FROM_HERE, error, Error::kNotSupported,
kErrorUnsupportedServiceType);
return nullptr;
}
ProviderInterface* provider = providers_[technology];
ProfileRefPtr profile = LookupProfileByRpcIdentifier(profile_rpcid);
if (!profile) {
Error::PopulateAndLog(FROM_HERE, error, Error::kNotFound,
"Profile specified was not found");
return nullptr;
}
if (args.LookupString(kProfileProperty, profile_rpcid) != profile_rpcid) {
Error::PopulateAndLog(FROM_HERE, error, Error::kInvalidArguments,
"Profile argument does not match that in "
"the configuration arguments");
return nullptr;
}
ServiceRefPtr service;
if (args.ContainsString(kGuidProperty)) {
SLOG(this, 2) << __func__ << ": searching by GUID";
service = GetServiceWithGUID(args.GetString(kGuidProperty), nullptr);
if (service && service->technology() != technology) {
Error::PopulateAndLog(FROM_HERE, error, Error::kNotSupported,
StringPrintf("This GUID matches a non-%s service",
type.c_str()));
return nullptr;
}
}
if (!service) {
Error find_error;
service = provider->FindSimilarService(args, &find_error);
}
// If no matching service exists, create a new service in the specified
// profile using ConfigureService().
if (!service) {
KeyValueStore configure_args;
configure_args.CopyFrom(args);
configure_args.SetString(kProfileProperty, profile_rpcid);
return ConfigureService(configure_args, error);
}
// The service already exists and is set to the desired profile,
// the service is in the ephemeral profile, or the current profile
// for the service appears before the desired profile, we need to
// reassign the service to the new profile if necessary, leaving
// the old profile intact (i.e, not calling Profile::AbandonService()).
// Then, configure the properties on the service as well as its newly
// associated profile.
if (service->profile() == profile ||
IsServiceEphemeral(service) ||
IsProfileBefore(service->profile(), profile)) {
SetupServiceInProfile(service, profile, args, error);
return service;
}
// The current profile for the service appears after the desired
// profile. We must create a temporary service specifically for
// the task of creating configuration data. This service will
// neither inherit properties from the visible service, nor will
// it exist after this function returns.
service = provider->CreateTemporaryService(args, error);
if (!service || !error->IsSuccess()) {
// Service::CreateTemporaryService() failed, and has set the error
// appropriately.
return nullptr;
}
// The profile may already have configuration for this service.
profile->ConfigureService(service);
SetupServiceInProfile(service, profile, args, error);
// If we encountered an error when configuring the temporary service, we
// report the error as it is. Otherwise, we still need to report an error as
// the temporary service won't be usable by the caller.
DCHECK(service->HasOneRef());
if (error->IsSuccess()) {
Error::PopulateAndLog(FROM_HERE,
error,
Error::kNotFound,
"Temporary service configured but not usable");
}
return nullptr;
}
void Manager::SetupServiceInProfile(ServiceRefPtr service,
ProfileRefPtr profile,
const KeyValueStore& args,
Error* error) {
service->SetProfile(profile);
service->Configure(args, error);
profile->UpdateService(service);
}
ServiceRefPtr Manager::FindMatchingService(const KeyValueStore& args,
Error* error) {
for (const auto& service : services_) {
if (service->DoPropertiesMatch(args)) {
return service;
}
}
error->Populate(Error::kNotFound, "Matching service was not found");
return nullptr;
}
map<string, vector<GeolocationInfo>> Manager::GetNetworksForGeolocation()
const {
map<string, vector<GeolocationInfo>> geolocation_infos;
for (const auto& entry : device_geolocation_info_) {
const DeviceRefPtr& device = entry.first;
const vector<GeolocationInfo>& device_info = entry.second;
vector<GeolocationInfo>* network_geolocation_info = nullptr;
if (device->technology() == Technology::kWifi) {
network_geolocation_info =
&geolocation_infos[kGeoWifiAccessPointsProperty];
} else if (device->technology() == Technology::kCellular) {
network_geolocation_info =
&geolocation_infos[kGeoCellTowersProperty];
} else {
// Ignore other technologies.
continue;
}
// Insert new info objects, but ensure that the last seen field is
// replaced with an age field, if it exists.
DCHECK(network_geolocation_info);
std::transform(device_info.begin(), device_info.end(),
std::back_inserter(*network_geolocation_info),
&PrepareGeolocationInfoForExport);
}
return geolocation_infos;
}
void Manager::OnDeviceGeolocationInfoUpdated(const DeviceRefPtr& device) {
SLOG(this, 2) << __func__ << " for device " << device->UniqueName();
device_geolocation_info_[device] = device->GetGeolocationObjects();
}
void Manager::RecheckPortal(Error* /*error*/) {
for (const auto& device : devices_) {
if (device->RequestPortalDetection()) {
// Only start Portal Detection on the device with the default connection.
// We will get a "true" return value when we've found that device, and
// can end our loop early as a result.
break;
}
}
}
void Manager::RecheckPortalOnService(const ServiceRefPtr& service) {
for (const auto& device : devices_) {
if (device->IsConnectedToService(service)) {
// As opposed to RecheckPortal() above, we explicitly stop and then
// restart portal detection, since the service to recheck was explicitly
// specified.
device->RestartPortalDetection();
break;
}
}
}
void Manager::RequestScan(const string& technology, Error* error) {
Technology::Identifier technology_identifier;
// TODO(benchan): To maintain backward compatibility, we treat an unspecified
// technology as WiFi. We should remove this special handling and treat an
// unspecified technology as an error after we update existing clients of
// this API to specify a valid technology when calling this method.
if (technology.empty()) {
technology_identifier = Technology::kWifi;
} else {
technology_identifier = Technology::IdentifierFromName(technology);
}
switch (technology_identifier) {
case Technology::kCellular:
for (const auto& device : FilterByTechnology(technology_identifier)) {
// TODO(benchan): Add a metric to track user-initiated scan for cellular
// technology.
device->Scan(error, __func__);
}
break;
case Technology::kWifi:
for (const auto& device : FilterByTechnology(technology_identifier)) {
metrics_->NotifyUserInitiatedEvent(
Metrics::kUserInitiatedEventWifiScan);
device->Scan(error, __func__);
}
break;
case Technology::kUnknown:
Error::PopulateAndLog(FROM_HERE,
error,
Error::kInvalidArguments,
"Unrecognized technology " + technology);
break;
default:
Error::PopulateAndLog(FROM_HERE,
error,
Error::kInvalidArguments,
"Scan unsupported for technology " + technology);
break;
}
}
void Manager::SetSchedScan(bool enable, Error* error) {
for (const auto& wifi_device : FilterByTechnology(Technology::kWifi)) {
wifi_device->SetSchedScan(enable, error);
}
}
string Manager::GetTechnologyOrder() {
vector<string> technology_names;
for (const auto& technology : technology_order_) {
technology_names.push_back(Technology::NameFromIdentifier(technology));
}
return base::JoinString(technology_names, ",");
}
void Manager::SetTechnologyOrder(const string& order, Error* error) {
vector<Technology::Identifier> new_order;
SLOG(this, 2) << "Setting technology order to " << order;
if (!Technology::GetTechnologyVectorFromString(order, &new_order, error)) {
return;
}
technology_order_ = new_order;
if (running_) {
SortServices();
}
}
bool Manager::IsWifiIdle() {
bool ret = false;
// Since services are sorted by connection state, status of the wifi device
// can be determine by examing the connection state of the first wifi service.
for (const auto& service : services_) {
if (service->technology() == Technology::kWifi) {
if (!service->IsConnecting() && !service->IsConnected()) {
ret = true;
}
break;
}
}
return ret;
}
void Manager::UpdateProviderMapping() {
#if !defined(DISABLE_WIRED_8021X)
providers_[Technology::kEthernetEap] = ethernet_eap_provider_.get();
#endif // DISABLE_WIRED_8021X
providers_[Technology::kVPN] = vpn_provider_.get();
#if !defined(DISABLE_WIFI)
providers_[Technology::kWifi] = wifi_provider_.get();
#endif // DISABLE_WIFI
#if !defined(DISABLE_WIMAX)
providers_[Technology::kWiMax] = wimax_provider_.get();
#endif // DISABLE_WIMAX
}
std::vector<std::string> Manager::GetDeviceInterfaceNames() {
std::vector<std::string> interfaces;
for (const auto& device : devices_) {
Technology::Identifier technology = device->technology();
if (Technology::IsPrimaryConnectivityTechnology(technology)) {
interfaces.push_back(device->link_name());
SLOG(this, 4) << "Adding device: " << device->link_name();
}
}
return interfaces;
}
bool Manager::ShouldBlackholeBrowserTraffic(const std::string& device_name)
const {
if (!should_blackhole_browser_traffic_) {
return false;
}
for (const auto& device : devices_) {
if (device->UniqueName() == device_name)
return true;
}
return false;
}
void Manager::UpdateBlackholeBrowserTraffic() {
bool before_update = should_blackhole_browser_traffic_;
if (props_.always_on_vpn_package.empty()) {
should_blackhole_browser_traffic_ = false;
} else {
should_blackhole_browser_traffic_ = true;
for (const auto& service : services_) {
if (service->IsOnline() &&
service->IsAlwaysOnVpn(props_.always_on_vpn_package)) {
should_blackhole_browser_traffic_ = false;
break;
}
}
}
if (should_blackhole_browser_traffic_ == before_update) {
return;
}
for (const auto& device : devices_) {
device->RefreshIPConfig();
}
}
void Manager::ComputeBrowserTrafficUids() {
for (const auto& username : kBrowserTrafficUsernames) {
struct passwd* entry = getpwnam(username); // NOLINT(runtime/threadsafe_fn)
if (!entry) {
LOG(WARNING) << "Unable to look up UID for " << username << ", skipping";
} else {
browser_traffic_uids_.push_back(
static_cast<uint32_t>(entry->pw_uid));
}
}
}
string Manager::GetAlwaysOnVpnPackage(Error* /*error*/) {
return props_.always_on_vpn_package;
}
bool Manager::SetAlwaysOnVpnPackage(const string& package_name,
Error* error) {
if (props_.always_on_vpn_package == package_name)
return false;
props_.always_on_vpn_package = package_name;
UpdateBlackholeBrowserTraffic();
return true;
}
bool Manager::SetNetworkThrottlingStatus(const ResultCallback& callback,
bool enabled,
uint32_t upload_rate_kbits,
uint32_t download_rate_kbits) {
SLOG(this, 2) << __func__;
LOG(INFO) << "Received command for network throttling "
<< (enabled ? "enabling" : "disabling");
bool result = false;
network_throttling_enabled_ = enabled;
if (enabled) {
upload_rate_kbits_ = upload_rate_kbits;
download_rate_kbits_ = download_rate_kbits;
LOG(INFO) << "Asked for upload rate (kbits/s) : " << upload_rate_kbits_
<< " download rate (kbits/s) : " << download_rate_kbits_;
result = throttler_->ThrottleInterfaces(callback, upload_rate_kbits_,
download_rate_kbits_);
} else {
result = throttler_->DisableThrottlingOnAllInterfaces(callback);
}
return result;
}
DeviceRefPtr Manager::GetDeviceConnectedToService(ServiceRefPtr service) {
for (DeviceRefPtr device : devices_) {
if (device->IsConnectedToService(service)) {
return device;
}
}
return nullptr;
}
void Manager::DetectMultiHomedDevices() {
map<string, vector<DeviceRefPtr>> subnet_buckets;
for (const auto& device : devices_) {
const auto& connection = device->connection();
string subnet_name;
if (connection) {
subnet_name = connection->GetSubnetName();
}
if (subnet_name.empty()) {
device->SetIsMultiHomed(false);
} else {
subnet_buckets[subnet_name].push_back(device);
}
}
for (const auto& subnet_bucket : subnet_buckets) {
const auto& device_list = subnet_bucket.second;
if (device_list.size() > 1) {
for (const auto& device : device_list) {
device->SetIsMultiHomed(true);
}
} else {
DCHECK_EQ(1U, device_list.size());
device_list.back()->SetIsMultiHomed(false);
}
}
}
} // namespace shill