blob: daacfbbcc5b1f0c2e85ce6174979733cbdd27bc6 [file] [log] [blame]
// Copyright (C) 2012 The Android Open Source Project
// Licensed under the Apache License, Version 2.0 (the "License");
// you may not use this file except in compliance with the License.
// You may obtain a copy of the License at
// Unless required by applicable law or agreed to in writing, software
// distributed under the License is distributed on an "AS IS" BASIS,
// See the License for the specific language governing permissions and
// limitations under the License.
#include <map>
#include <memory>
#include <string>
#include <vector>
#include <base/cancelable_callback.h>
#include <base/files/file_path.h>
#include <base/macros.h>
#include <base/memory/ref_counted.h>
#include <base/memory/weak_ptr.h>
#include <chromeos/dbus/service_constants.h>
#include <gtest/gtest_prod.h> // for FRIEND_TEST
#include <policy/device_policy.h>
#include <policy/libpolicy.h>
#include "shill/cellular/modem_info.h"
#include "shill/crypto_util_proxy.h"
#include "shill/dhcp/dhcp_properties.h"
#include "shill/device.h"
#include "shill/device_info.h"
#include "shill/event_dispatcher.h"
#include "shill/geolocation_info.h"
#include "shill/hook_table.h"
#include "shill/metrics.h"
#include "shill/net/ip_address.h"
#include "shill/power_manager.h"
#include "shill/profile.h"
#include "shill/property_store.h"
#include "shill/service.h"
#include "shill/upstart/upstart.h"
#include "shill/wimax/wimax_provider.h"
namespace shill {
class ControlInterface;
class DeviceClaimer;
class DefaultProfile;
class Error;
class EventDispatcher;
class IPAddressStore;
class ManagerAdaptorInterface;
class Resolver;
class VPNProvider;
class Throttler;
#if !defined(DISABLE_WIFI)
class WiFiProvider;
#endif // DISABLE_WIFI
#if !defined(DISABLE_WIRED_8021X)
class EthernetEapProvider;
#endif // DISABLE_WIRED_8021X
class Manager : public base::SupportsWeakPtr<Manager> {
using ServiceCallback = base::Callback<void(const ServiceRefPtr& service)>;
struct Properties {
: offline_mode(false),
jail_vpn_clients(false) {}
bool offline_mode;
std::string check_portal_list;
std::string country;
int32_t portal_check_interval_seconds;
std::string portal_url;
std::string host_name;
// Whether to ARP for the default gateway in the DHCP client after
// acquiring a lease.
bool arp_gateway;
// Comma-separated list of technologies for which link-monitoring is
// enabled.
std::string link_monitor_technologies;
// Comma-separated list of technologies for which auto-connect is disabled.
std::string no_auto_connect_technologies;
// Comma-separated list of technologies that should never be enabled.
std::string prohibited_technologies;
// Comma-separated list of DNS search paths to be ignored.
std::string ignored_dns_search_paths;
// Comma-separated list of DNS servers to prepend to resolver list.
std::string prepend_dns_servers;
// Salt value use for calculating network connection ID.
int connection_id_salt;
// The minimum MTU value that will be respected in DHCP responses.
int minimum_mtu;
// Whether to run third party VPN client programs in a minijail.
bool jail_vpn_clients;
// Name of Android VPN package that should be enforced for browser traffic.
// Empty string if the lockdown feature is not enabled.
std::string always_on_vpn_package;
Manager(ControlInterface* control_interface,
EventDispatcher* dispatcher,
Metrics* metrics,
const std::string& run_directory,
const std::string& storage_directory,
const std::string& user_storage_directory);
virtual ~Manager();
void RegisterAsync(const base::Callback<void(bool)>& completion_callback);
virtual void SetBlacklistedDevices(
const std::vector<std::string>& blacklisted_devices);
virtual void SetWhitelistedDevices(
const std::vector<std::string>& whitelisted_devices);
virtual void SetArcDevice(const std::string& arc_device);
const std::string& arc_device() const { return arc_device_; }
// Returns true if |device_name| is either not in the blacklist, or in the
// whitelist, depending on which list was supplied in startup settings.
virtual bool DeviceManagementAllowed(const std::string& device_name);
virtual void Start();
virtual void Stop();
bool running() const { return running_; }
const ProfileRefPtr& ActiveProfile() const;
bool IsActiveProfile(const ProfileRefPtr& profile) const;
bool MoveServiceToProfile(const ServiceRefPtr& to_move,
const ProfileRefPtr& destination);
ProfileRefPtr LookupProfileByRpcIdentifier(const std::string& profile_rpcid);
// Called via RPC call on Service (|to_set|) to set the "Profile" property.
virtual void SetProfileForService(const ServiceRefPtr& to_set,
const std::string& profile,
Error* error);
virtual void RegisterDevice(const DeviceRefPtr& to_manage);
virtual void DeregisterDevice(const DeviceRefPtr& to_forget);
virtual bool HasService(const ServiceRefPtr& service);
// Register a Service with the Manager. Manager may choose to
// connect to it immediately.
virtual void RegisterService(const ServiceRefPtr& to_manage);
// Deregister a Service from the Manager. Caller is responsible
// for disconnecting the Service before-hand.
virtual void DeregisterService(const ServiceRefPtr& to_forget);
virtual void UpdateService(const ServiceRefPtr& to_update);
// Called when any service's state changes. Informs other services
// (e.g. VPNs) if the default physical service's state has changed.
virtual void NotifyServiceStateChanged(const ServiceRefPtr& to_update);
// Persists |to_update| into an appropriate profile.
virtual void UpdateDevice(const DeviceRefPtr& to_update);
#if !defined(DISABLE_WIFI)
virtual void UpdateWiFiProvider();
#endif // DISABLE_WIFI
FilterByTechnology(Technology::Identifier tech) const;
ServiceRefPtr FindService(const std::string& name);
RpcIdentifiers EnumerateAvailableServices(Error* error);
// Return the complete list of services, including those that are not visible.
RpcIdentifiers EnumerateCompleteServices(Error* error);
// called via RPC (e.g., from ManagerDBusAdaptor)
std::map<std::string, std::string> GetLoadableProfileEntriesForService(
const ServiceConstRefPtr& service);
ServiceRefPtr GetService(const KeyValueStore& args, Error* error);
ServiceRefPtr ConfigureService(const KeyValueStore& args, Error* error);
ServiceRefPtr ConfigureServiceForProfile(
const std::string& profile_rpcid,
const KeyValueStore& args,
Error* error);
ServiceRefPtr FindMatchingService(const KeyValueStore& args, Error* error);
// Retrieve geolocation data from the Manager.
std::map<std::string, std::vector<GeolocationInfo>>
GetNetworksForGeolocation() const;
// Called by Device when its geolocation data has been updated.
virtual void OnDeviceGeolocationInfoUpdated(const DeviceRefPtr& device);
void ConnectToBestServices(Error* error);
// Method to create connectivity report for connected services.
void CreateConnectivityReport(Error* error);
// Request portal detection checks on each registered device until a portal
// detection attempt starts on one of them.
void RecheckPortal(Error* error);
// Request portal detection be restarted on the device connected to
// |service|.
virtual void RecheckPortalOnService(const ServiceRefPtr& service);
virtual void RequestScan(const std::string& technology, Error* error);
// Configure scheduled scan for wifi devices.
virtual void SetSchedScan(bool enable, Error* error);
std::string GetTechnologyOrder();
virtual void SetTechnologyOrder(const std::string& order, Error* error);
// Set up the profile list starting with a default profile along with
// an (optional) list of startup profiles.
void InitializeProfiles();
// Create a profile. This does not affect the profile stack. Returns
// the RPC path of the created profile in |path|.
void CreateProfile(const std::string& name, std::string* path, Error* error);
// Pushes existing profile with name |name| onto stack of managed profiles.
// Returns the RPC path of the pushed profile in |path|.
void PushProfile(const std::string& name, std::string* path, Error* error);
// Insert an existing user profile with name |name| into the stack of
// managed profiles. Associate |user_hash| with this profile entry.
// Returns the RPC path of the pushed profile in |path|.
void InsertUserProfile(const std::string& name,
const std::string& user_hash,
std::string* path,
Error* error);
// Pops profile named |name| off the top of the stack of managed profiles.
void PopProfile(const std::string& name, Error* error);
// Remove the active profile.
void PopAnyProfile(Error* error);
// Remove all user profiles from the stack of managed profiles leaving only
// default profiles.
void PopAllUserProfiles(Error* error);
// Remove the underlying persistent storage for a profile.
void RemoveProfile(const std::string& name, Error* error);
// Give the ownership of the device with name |device_name| to claimer with
// name |claimer_name|. This will cause shill to stop managing this device.
virtual void ClaimDevice(const std::string& claimer_name,
const std::string& interface_name,
Error* error);
// Claimer |claimer_name| release the ownership of the device with
// |interface_name| back to shill. This method will set |claimer_removed|
// to true iff Claimer |claimer_name| is not the default claimer and no
// longer claims any devices.
virtual void ReleaseDevice(const std::string& claimer_name,
const std::string& interface_name,
bool* claimer_removed,
Error* error);
// Called by a service to remove its associated configuration. If |service|
// is associated with a non-ephemeral profile, this configuration entry
// will be removed and the manager will search for another matching profile.
// If the service ends up with no matching profile, it is unloaded (which
// may also remove the service from the manager's list, e.g. WiFi services
// that are not visible)..
void RemoveService(const ServiceRefPtr& service);
// Handle the event where a profile is about to remove a profile entry.
// Any Services that are dependent on this storage identifier will need
// to find new profiles. Return true if any service has been moved to a new
// profile. Any such services will have had the profile group removed from
// the profile.
virtual bool HandleProfileEntryDeletion(const ProfileRefPtr& profile,
const std::string& entry_name);
// Find a registered service that contains a GUID property that
// matches |guid|.
virtual ServiceRefPtr GetServiceWithGUID(const std::string& guid,
Error* error);
// Find a service that is both the member of |profile| and has a
// storage identifier that matches |entry_name|. This function is
// called by the Profile in order to return a profile entry's properties.
virtual ServiceRefPtr GetServiceWithStorageIdentifier(
const ProfileRefPtr& profile,
const std::string& entry_name,
Error* error);
// Create a temporary service for an entry |entry_name| within |profile|.
// Callers must not register this service with the Manager or connect it
// since it was never added to the provider's service list.
virtual ServiceRefPtr CreateTemporaryServiceFromProfile(
const ProfileRefPtr& profile,
const std::string& entry_name,
Error* error);
// Return a reference to the Service associated with the default connection.
// If there is no such connection, this function returns a reference to NULL.
virtual ServiceRefPtr GetDefaultService() const;
RpcIdentifier GetDefaultServiceRpcIdentifier(Error* error);
// Set enabled state of all |technology_name| devices to |enabled_state|.
// Persist the state to storage is |persist| is true.
void SetEnabledStateForTechnology(const std::string& technology_name,
bool enabled_state,
bool persist,
Error* error,
const ResultCallback& callback);
// Return whether a technology is marked as enabled for portal detection.
virtual bool IsPortalDetectionEnabled(Technology::Identifier tech);
// Set the start-up value for the portal detection list. This list will
// be used until a value set explicitly over the control API. Until
// then, we ignore but do not overwrite whatever value is stored in the
// profile.
virtual void SetStartupPortalList(const std::string& portal_list);
// Returns true if profile |a| has been pushed on the Manager's
// |profiles_| stack before profile |b|.
virtual bool IsProfileBefore(const ProfileRefPtr& a,
const ProfileRefPtr& b) const;
// Return whether a service belongs to the ephemeral profile.
virtual bool IsServiceEphemeral(const ServiceConstRefPtr& service) const;
// Return whether a Technology has any connected Services.
virtual bool IsTechnologyConnected(Technology::Identifier technology) const;
// Return whether a technology is enabled for link monitoring.
virtual bool IsTechnologyLinkMonitorEnabled(
Technology::Identifier technology) const;
// Return whether the Wake on LAN feature is enabled.
virtual bool IsWakeOnLanEnabled() const { return is_wake_on_lan_enabled_; }
// Return whether a technology is disabled for auto-connect.
virtual bool IsTechnologyAutoConnectDisabled(
Technology::Identifier technology) const;
// Report whether |technology| is prohibited from being enabled.
virtual bool IsTechnologyProhibited(Technology::Identifier technology) const;
// Called by Profile when a |storage| completes initialization.
void OnProfileStorageInitialized(Profile* storage);
// Return a Device with technology |technology| in the enabled state.
virtual DeviceRefPtr GetEnabledDeviceWithTechnology(
Technology::Identifier technology) const;
// Return a Device with link_name |link_name| in the enabled state.
virtual DeviceRefPtr GetEnabledDeviceByLinkName(
const std::string& link_name) const;
// Returns true if at least one connection exists, and false if there's no
// connected service.
virtual bool IsConnected() const;
// Returns true if at least one connection exists that have Internet
// connectivity, and false if there's no such service.
virtual bool IsOnline() const;
std::string CalculateState(Error* error);
// Recalculate the |connected_state_| string and emit a singal if it has
// changed.
void RefreshConnectionState();
virtual int GetPortalCheckInterval() const {
return props_.portal_check_interval_seconds;
virtual const std::string& GetPortalCheckURL() const {
return props_.portal_url;
virtual DeviceInfo* device_info() { return &device_info_; }
#if !defined(DISABLE_CELLULAR)
virtual ModemInfo* modem_info() { return &modem_info_; }
PowerManager* power_manager() const { return power_manager_.get(); }
#if !defined(DISABLE_WIRED_8021X)
virtual EthernetEapProvider* ethernet_eap_provider() const {
return ethernet_eap_provider_.get();
#endif // DISABLE_WIRED_8021X
VPNProvider* vpn_provider() const { return vpn_provider_.get(); }
#if !defined(DISABLE_WIFI)
WiFiProvider* wifi_provider() const { return wifi_provider_.get(); }
#endif // DISABLE_WIFI
#if !defined(DISABLE_WIMAX)
virtual WiMaxProvider* wimax_provider() { return wimax_provider_.get(); }
PropertyStore* mutable_store() { return &store_; }
virtual const PropertyStore& store() const { return store_; }
virtual const base::FilePath& run_path() const { return run_path_; }
const base::FilePath& storage_path() const { return storage_path_; }
IPAddressStore* health_checker_remote_ips() const {
return health_checker_remote_ips_.get();
virtual int64_t GetSuspendDurationUsecs() const {
return power_manager_->suspend_duration_us(); }
bool GetArpGateway() const { return props_.arp_gateway; }
virtual int GetMinimumMTU() const { return props_.minimum_mtu; }
virtual void SetMinimumMTU(const int mtu) { props_.minimum_mtu = mtu; }
virtual bool GetJailVpnClients() const { return props_.jail_vpn_clients; }
virtual void SetJailVpnClients(bool jail_vpn_clients)
{ props_.jail_vpn_clients = jail_vpn_clients; }
virtual void UpdateEnabledTechnologies();
virtual void UpdateUninitializedTechnologies();
const DhcpProperties& dhcp_properties() const {
return *dhcp_properties_;
// Writes the service |to_update| to persistant storage. If the service's is
// ephemeral, it is moved to the current profile.
void SaveServiceToProfile(const ServiceRefPtr& to_update);
// Adds a closure to be executed when ChromeOS suspends or shill terminates.
// |name| should be unique; otherwise, a previous closure by the same name
// will be replaced. |start| will be called when RunTerminationActions() is
// called. When an action completed, TerminationActionComplete() must be
// called.
void AddTerminationAction(const std::string& name,
const base::Closure& start);
// Users call this function to report the completion of an action |name|.
// This function should be called once for each action.
void TerminationActionComplete(const std::string& name);
// Removes the action associtated with |name|.
void RemoveTerminationAction(const std::string& name);
// Runs the termination actions and notifies the metrics framework
// that the termination actions started running, only if any termination
// actions have been registered. If all actions complete within
// |kTerminationActionsTimeoutMilliseconds|, |done_callback| is called with a
// value of Error::kSuccess. Otherwise, it is called with
// Error::kOperationTimeout.
// Returns true, if termination actions were run.
bool RunTerminationActionsAndNotifyMetrics(
const ResultCallback& done_callback);
// Registers a |callback| that's invoked whenever the default service
// changes. Returns a unique tag that can be used to deregister the
// callback. A tag equal to 0 is invalid.
virtual int RegisterDefaultServiceCallback(const ServiceCallback& callback);
virtual void DeregisterDefaultServiceCallback(int tag);
#if !defined(DISABLE_WIFI)
// Verifies that the destination described by certificate is valid, and that
// we're currently connected to that destination. A full description of the
// rules being enforced is in doc/manager-api.txt. Returns true iff all
// checks pass, false otherwise. On false, error is filled with a
// descriptive error code and message.
// |certificate| is a PEM encoded x509 certificate, |public_key| is a base64
// encoded public half of an RSA key, |nonce| is a random string, and
// |signed_data| is a base64 encoded string as described in
// doc/manager-api.txt.
void VerifyDestination(const std::string& certificate,
const std::string& public_key,
const std::string& nonce,
const std::string& signed_data,
const std::string& destination_udn,
const std::string& hotspot_ssid,
const std::string& hotspot_bssid,
const ResultBoolCallback& cb,
Error* error);
// After verifying the destination, encrypt the string data with
// |public_key|, the base64 encoded public half of an RSA key pair. Returns
// the base64 encoded result if successful, or an empty string on failure.
// On failure, |error| will be filled with an appropriately descriptive
// message and error code.
void VerifyAndEncryptData(const std::string& certificate,
const std::string& public_key,
const std::string& nonce,
const std::string& signed_data,
const std::string& destination_udn,
const std::string& hotspot_ssid,
const std::string& hotspot_bssid,
const std::string& data,
const ResultStringCallback& cb,
Error* error);
// After verifying the destination, encrypt the password for |network_path|
// under |public_key|. Similar to EncryptData above except that the
// information being encrypted is implicitly the authentication credentials
// of the given network.
void VerifyAndEncryptCredentials(const std::string& certificate,
const std::string& public_key,
const std::string& nonce,
const std::string& signed_data,
const std::string& destination_udn,
const std::string& hotspot_ssid,
const std::string& hotspot_bssid,
const std::string& network_path,
const ResultStringCallback& cb,
Error* error);
#endif // DISABLE_WIFI
// Calculate connection identifier, which is hash of salt value, gateway IP
// address, and gateway MAC address.
int CalcConnectionId(const std::string& gateway_ip,
const std::string& gateway_mac);
// Report the number of services associated with given connection
// |connection_id|.
void ReportServicesOnSameNetwork(int connection_id);
// Running in passive mode, manager will not manage any devices (all devices
// are blacklisted) by default. Remote application can specify devices for
// shill to manage through ReleaseInterface/ClaimInterface DBus API using
// default claimer (with "" as claimer_name).
virtual void SetPassiveMode();
// Decides whether Ethernet-like devices are treated as unknown devices
// if they do not indicate a driver name.
virtual void SetIgnoreUnknownEthernet(bool ignore);
virtual bool ignore_unknown_ethernet() const {
return ignore_unknown_ethernet_;
// Set the list of prepended DNS servers to |prepend_dns_servers|.
virtual void SetPrependDNSServers(const std::string& prepend_dns_servers);
// Accept hostname from DHCP server for devices matching |hostname_from|.
virtual void SetAcceptHostnameFrom(const std::string& hostname_from);
virtual bool ShouldAcceptHostnameFrom(const std::string& device_name) const;
// Set DHCPv6 enabled device list.
virtual void SetDHCPv6EnabledDevices(
const std::vector<std::string>& device_list);
// Return true if DHCPv6 is enabled for the given device with |device_name|.
virtual bool IsDHCPv6EnabledForDevice(const std::string& device_name) const;
// Filter the list of prepended DNS servers, copying only those that match
// |family| into |dns_servers|. |dns_servers| is cleared, regardless of
// whether or not there are any addresses that match |family|.
virtual std::vector<std::string> FilterPrependDNSServersByFamily(
IPAddress::Family family) const;
// Returns true iff |power_manager_| exists and is suspending (i.e.
// power_manager->suspending() is true), false otherwise.
virtual bool IsSuspending();
void RecordDarkResumeWakeReason(const std::string& wake_reason);
// Called when service's inner device changed.
virtual void OnInnerDevicesChanged();
void set_suppress_autoconnect(bool val) { suppress_autoconnect_ = val; }
bool suppress_autoconnect() { return suppress_autoconnect_; }
// Called when remote device claimer vanishes.
virtual void OnDeviceClaimerVanished();
RpcIdentifiers EnumerateDevices(Error* error);
bool SetNetworkThrottlingStatus(const ResultCallback& callback,
bool enabled,
uint32_t upload_rate_kbits,
uint32_t download_rate_kbits);
// Returns the interface names associated with 'real' devices
// on the system e.g. eth0, wlan0.
virtual std::vector<std::string> GetDeviceInterfaceNames();
bool ShouldBlackholeBrowserTraffic(const std::string& device_name) const;
const std::vector<uint32_t>& browser_traffic_uids() const {
return browser_traffic_uids_;
friend class ArcVpnDriverTest;
friend class CellularTest;
friend class DeviceInfoTest;
friend class L2TPIPSecDriverTest;
friend class ManagerAdaptorInterface;
friend class ManagerTest;
friend class ModemInfoTest;
friend class ModemManagerTest;
friend class OpenVPNDriverTest;
friend class ServiceTest;
friend class VPNServiceTest;
friend class WiFiObjectTest;
friend class WiMaxProviderTest;
FRIEND_TEST(CellularCapabilityUniversalMainTest, TerminationAction);
FRIEND_TEST(CellularTest, LinkEventWontDestroyService);
FRIEND_TEST(DefaultProfileTest, LoadManagerDefaultProperties);
FRIEND_TEST(DefaultProfileTest, LoadManagerProperties);
FRIEND_TEST(DefaultProfileTest, Save);
FRIEND_TEST(DeviceTest, AcquireIPConfigWithoutSelectedService);
FRIEND_TEST(DeviceTest, AcquireIPConfigWithSelectedService);
FRIEND_TEST(DeviceTest, StartProhibited);
FRIEND_TEST(ManagerTest, AvailableTechnologies);
FRIEND_TEST(ManagerTest, ClaimBlacklistedDevice);
FRIEND_TEST(ManagerTest, ClaimDeviceWithoutClaimer);
FRIEND_TEST(ManagerTest, ConnectedTechnologies);
FRIEND_TEST(ManagerTest, ConnectionStatusCheck);
FRIEND_TEST(ManagerTest, ConnectToBestServices);
FRIEND_TEST(ManagerTest, CreateConnectivityReport);
FRIEND_TEST(ManagerTest, DefaultTechnology);
FRIEND_TEST(ManagerTest, DefaultServiceStateChange);
FRIEND_TEST(ManagerTest, DetectMultiHomedDevices);
FRIEND_TEST(ManagerTest, DevicePresenceStatusCheck);
FRIEND_TEST(ManagerTest, DeviceRegistrationAndStart);
FRIEND_TEST(ManagerTest, DeviceRegistrationTriggersThrottler);
FRIEND_TEST(ManagerTest, EnumerateProfiles);
FRIEND_TEST(ManagerTest, EnumerateServiceInnerDevices);
FRIEND_TEST(ManagerTest, HandleProfileEntryDeletionWithUnload);
FRIEND_TEST(ManagerTest, InitializeProfilesInformsProviders);
FRIEND_TEST(ManagerTest, InitializeProfilesHandlesDefaults);
FRIEND_TEST(ManagerTest, IsTechnologyAutoConnectDisabled);
FRIEND_TEST(ManagerTest, IsTechnologyProhibited);
FRIEND_TEST(ManagerTest, IsWifiIdle);
FRIEND_TEST(ManagerTest, LinkMonitorEnabled);
FRIEND_TEST(ManagerTest, MoveService);
FRIEND_TEST(ManagerTest, UpdateDefaultServices);
FRIEND_TEST(ManagerTest, PopProfileWithUnload);
FRIEND_TEST(ManagerTest, RefreshIPConfig);
FRIEND_TEST(ManagerTest, RegisterKnownService);
FRIEND_TEST(ManagerTest, RegisterUnknownService);
FRIEND_TEST(ManagerTest, ReleaseBlacklistedDevice);
FRIEND_TEST(ManagerTest, ReleaseDevice);
FRIEND_TEST(ManagerTest, RunTerminationActions);
FRIEND_TEST(ManagerTest, ServiceRegistration);
FRIEND_TEST(ManagerTest, SetAlwaysOnVpnPackage);
FRIEND_TEST(ManagerTest, ShouldBlackholeBrowserTraffic);
FRIEND_TEST(ManagerTest, SortServicesWithConnection);
FRIEND_TEST(ManagerTest, StartupPortalList);
FRIEND_TEST(ServiceTest, IsAutoConnectable);
FRIEND_TEST(ThirdPartyVpnDriverTest, SetParameters);
FRIEND_TEST(VPNProviderTest, SetDefaultRoutingPolicy);
struct DeviceClaim {
DeviceClaim() {}
DeviceClaim(const std::string& in_device_name,
const ResultCallback& in_result_callback)
: device_name(in_device_name),
result_callback(in_result_callback) {}
std::string device_name;
ResultCallback result_callback;
void ApplyPolicies();
void AutoConnect();
std::vector<std::string> AvailableTechnologies(Error* error);
std::vector<std::string> ConnectedTechnologies(Error* error);
std::string DefaultTechnology(Error* error);
std::vector<std::string> EnabledTechnologies(Error* error);
std::vector<std::string> UninitializedTechnologies(Error* error);
RpcIdentifiers EnumerateProfiles(Error* error);
RpcIdentifiers EnumerateWatchedServices(Error* error);
std::string GetActiveProfileRpcIdentifier(Error* error);
std::string GetCheckPortalList(Error* error);
std::string GetIgnoredDNSSearchPaths(Error* error);
ServiceRefPtr GetServiceInner(const KeyValueStore& args, Error* error);
bool SetAlwaysOnVpnPackage(const std::string& package_name, Error* error);
bool SetCheckPortalList(const std::string& portal_list, Error* error);
bool SetIgnoredDNSSearchPaths(const std::string& ignored_paths, Error* error);
void EmitDefaultService();
bool IsTechnologyInList(const std::string& technology_list,
Technology::Identifier tech) const;
void EmitDeviceProperties();
#if !defined(DISABLE_WIFI)
bool SetDisableWiFiVHT(const bool& disable_wifi_vht, Error* error);
bool GetDisableWiFiVHT(Error* error);
#endif // DISABLE_WIFI
bool SetProhibitedTechnologies(const std::string& prohibited_technologies,
Error* error);
std::string GetProhibitedTechnologies(Error* error);
void OnTechnologyProhibited(Technology::Identifier technology,
const Error& error);
// For every device instance that is sharing the same connectivity with
// another device, enable the multi-home flag.
void DetectMultiHomedDevices();
// Unload a service while iterating through |services_|. Returns true if
// service was erased (which means the caller loop should not increment
// |service_iterator|), false otherwise (meaning the caller should
// increment |service_iterator|).
bool UnloadService(std::vector<ServiceRefPtr>::iterator* service_iterator);
// Load Manager default properties from |profile|.
void LoadProperties(const scoped_refptr<DefaultProfile>& profile);
// Configure the device with profile data from all current profiles.
void LoadDeviceFromProfiles(const DeviceRefPtr& device);
void HelpRegisterConstDerivedRpcIdentifier(
const std::string& name,
void HelpRegisterConstDerivedRpcIdentifiers(
const std::string& name,
void HelpRegisterDerivedString(
const std::string& name,
std::string(Manager::*get)(Error* error),
bool(Manager::*set)(const std::string&, Error*));
void HelpRegisterConstDerivedStrings(
const std::string& name,
void HelpRegisterDerivedBool(
const std::string& name,
bool(Manager::*get)(Error* error),
bool(Manager::*set)(const bool& value, Error* error));
bool HasProfile(const Profile::Identifier& ident);
void PushProfileInternal(const Profile::Identifier& ident,
std::string* path,
Error* error);
void PopProfileInternal();
void OnProfilesChanged();
void SortServices();
void SortServicesTask();
void DeviceStatusCheckTask();
void ConnectionStatusCheck();
void DevicePresenceStatusCheck();
bool MatchProfileWithService(const ServiceRefPtr& service);
// Sets the profile of |service| to |profile|, without notifying its
// previous profile. Configures a |service| with |args|, then saves
// the resulting configuration to |profile|. This method is useful
// when copying a service configuration from one profile to another,
// or writing a newly created service config to a specific profile.
static void SetupServiceInProfile(ServiceRefPtr service,
ProfileRefPtr profile,
const KeyValueStore& args,
Error* error);
// For each technology present, connect to the "best" service available,
// as determined by sorting all services independent of their current state.
void ConnectToBestServicesTask();
void UpdateDefaultServices(const ServiceRefPtr& logical_service,
const ServiceRefPtr& physical_service);
// Runs the termination actions. If all actions complete within
// |kTerminationActionsTimeoutMilliseconds|, |done_callback| is called with a
// value of Error::kSuccess. Otherwise, it is called with
// Error::kOperationTimeout.
void RunTerminationActions(const ResultCallback& done_callback);
// Called when the system is about to be suspended. Each call will be
// followed by a call to OnSuspendDone().
void OnSuspendImminent();
// Called when the system has completed a suspend attempt (possibly without
// actually suspending, in the event of the user canceling the attempt).
void OnSuspendDone();
// Called when the system is entering a dark resume phase (and hence a dark
// suspend is imminent).
void OnDarkSuspendImminent();
void OnSuspendActionsComplete(const Error& error);
void OnDarkResumeActionsComplete(const Error& error);
#if !defined(DISABLE_WIFI)
void VerifyToEncryptLink(const std::string& public_key,
const std::string& data,
ResultStringCallback cb,
const Error& error,
bool success);
#endif // DISABLE_WIFI
// Return true if wifi device is enabled with no existing connection (pending
// or connected).
bool IsWifiIdle();
// For unit testing.
void set_metrics(Metrics* metrics) { metrics_ = metrics; }
void UpdateProviderMapping();
// Used by tests to set a mock PowerManager. Takes ownership of
// power_manager.
void set_power_manager(PowerManager* power_manager) {
DeviceRefPtr GetDeviceConnectedToService(ServiceRefPtr service);
void DeregisterDeviceByLinkName(const std::string& link_name);
std::string GetAlwaysOnVpnPackage(Error* error);
void UpdateBlackholeBrowserTraffic();
void ComputeBrowserTrafficUids();
// Returns the names of all of the devices that have been claimed by the
// current DeviceClaimer. Returns an empty vector if no DeviceClaimer is set.
std::vector<std::string> ClaimedDevices(Error* error);
EventDispatcher* dispatcher_;
const base::FilePath run_path_;
const base::FilePath storage_path_;
const base::FilePath user_storage_path_;
base::FilePath user_profile_list_path_; // Changed in tests.
std::unique_ptr<ManagerAdaptorInterface> adaptor_;
DeviceInfo device_info_;
#if !defined(DISABLE_CELLULAR)
ModemInfo modem_info_;
#if !defined(DISABLE_WIRED_8021X)
std::unique_ptr<EthernetEapProvider> ethernet_eap_provider_;
#endif // DISABLE_WIRED_8021X
// To fetch network policies from
std::unique_ptr<policy::PolicyProvider> policy_provider_;
std::unique_ptr<VPNProvider> vpn_provider_;
#if !defined(DISABLE_WIFI)
std::unique_ptr<WiFiProvider> wifi_provider_;
#endif // DISABLE_WIFI
#if !defined(DISABLE_WIMAX)
std::unique_ptr<WiMaxProvider> wimax_provider_;
// Entity that calls kernel commands ('tc') to throttle network bandwidth.
std::unique_ptr<Throttler> throttler_;
// Hold pointer to singleton Resolver instance for testing purposes.
Resolver* resolver_;
bool running_;
// Used to facilitate unit tests which can't use RPC.
bool connect_profiles_to_rpc_;
std::vector<DeviceRefPtr> devices_;
// We store Services in a vector, because we want to keep them sorted.
// Services that are connected appear first in the vector. See
// Service::Compare() for details of the sorting criteria.
std::vector<ServiceRefPtr> services_;
// Last known default physical service (i.e. not a VPN). Used to figure
// out when to send the DefaultServiceChanged notification.
ServiceRefPtr last_default_physical_service_;
bool last_default_physical_service_connected_;
// Map of technologies to Provider instances. These pointers are owned
// by the respective scoped_reptr objects that are held over the lifetime
// of the Manager object.
std::map<Technology::Identifier, ProviderInterface*> providers_;
// List of startup profile names to push on the profile stack on startup.
std::vector<ProfileRefPtr> profiles_;
ProfileRefPtr ephemeral_profile_;
ControlInterface* control_interface_;
Metrics* metrics_;
std::unique_ptr<PowerManager> power_manager_;
std::unique_ptr<Upstart> upstart_;
// The priority order of technologies
std::vector<Technology::Identifier> technology_order_;
// This is the last Service RPC Identifier for which we emitted a
// "DefaultService" signal for.
RpcIdentifier default_service_rpc_identifier_;
// Manager can be optionally configured with a list of technologies to
// do portal detection on at startup. We need to keep track of that list
// as well as a flag that tells us whether we should continue using it
// instead of the configured portal list.
std::string startup_portal_list_;
bool use_startup_portal_list_;
// Properties to be get/set via PropertyStore calls.
Properties props_;
PropertyStore store_;
// Accept hostname supplied by the DHCP server from the specified devices.
// eg. eth0 or eth*
std::string accept_hostname_from_;
base::CancelableClosure sort_services_task_;
// Task for periodically checking various device status.
base::CancelableClosure device_status_check_task_;
// TODO(petkov): Currently this handles both terminate and suspend
// actions. Rename all relevant identifiers to capture this.
HookTable termination_actions_;
// Is a suspend delay currently registered with the power manager?
bool suspend_delay_registered_;
// Whether Wake on LAN should be enabled for all Ethernet devices.
bool is_wake_on_lan_enabled_;
// Whether to ignore Ethernet-like devices that don't have an assigned driver.
bool ignore_unknown_ethernet_;
// Maps tags to callbacks for monitoring default service changes.
std::map<int, ServiceCallback> default_service_callbacks_;
int default_service_callback_tag_;
// Delegate to handle destination verification operations for the manager.
std::unique_ptr<CryptoUtilProxy> crypto_util_proxy_;
// Stores IP addresses of some remote hosts that accept port 80 TCP
// connections. ConnectionHealthChecker uses these IPs.
// The store resides in Manager so that it persists across Device reset.
std::unique_ptr<IPAddressStore> health_checker_remote_ips_;
// Stores the most recent copy of geolocation information for each
// device the manager is keeping track of.
std::map<DeviceRefPtr, std::vector<GeolocationInfo>> device_geolocation_info_;
// Stores the state of the highest ranked connected service.
std::string connection_state_;
// Stores the most recent state of all watched services.
std::map<std::string, Service::ConnectState> watched_service_states_;
// Device claimer is a remote application/service that claim/release devices
// from/to shill. To reduce complexity, only allow one device claimer at a
// time.
std::unique_ptr<DeviceClaimer> device_claimer_;
// When true, suppresses autoconnects in Manager::AutoConnect.
bool suppress_autoconnect_;
// Whether any of the services is in connected state or not.
bool is_connected_state_;
// Set to true if there is a user session, which is inferred based on calls
// to Manager::InsertUserProfile() and Manager::PopAllUserProfiles().
bool has_user_session_;
// List of blacklisted devices specified from command line.
std::vector<std::string> blacklisted_devices_;
// List of whitelisted devices specified from command line.
std::vector<std::string> whitelisted_devices_;
// List of DHCPv6 enabled devices.
std::vector<std::string> dhcpv6_enabled_devices_;
// ARC network device.
std::string arc_device_;
// DhcpProperties stored for the default profile.
std::unique_ptr<DhcpProperties> dhcp_properties_;
// Cache for bandwidth throttling policy variables, until Throttler class
// is called.
bool network_throttling_enabled_;
uint32_t download_rate_kbits_;
uint32_t upload_rate_kbits_;
// "Browser traffic" refers to traffic from processes under the chronos and
// debugd users, which includes everything going through chrome and nacl
// application, but not e.g. Android apps or system processes like the
// update engine.
bool should_blackhole_browser_traffic_;
std::vector<uint32_t> browser_traffic_uids_;
} // namespace shill
#endif // SHILL_MANAGER_H_