| /* |
| * |
| * ConnMan VPN daemon |
| * |
| * Copyright (C) 2012-2013 Intel Corporation. All rights reserved. |
| * |
| * This program is free software; you can redistribute it and/or modify |
| * it under the terms of the GNU General Public License version 2 as |
| * published by the Free Software Foundation. |
| * |
| * This program is distributed in the hope that it will be useful, |
| * but WITHOUT ANY WARRANTY; without even the implied warranty of |
| * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the |
| * GNU General Public License for more details. |
| * |
| * You should have received a copy of the GNU General Public License |
| * along with this program; if not, write to the Free Software |
| * Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA |
| * |
| */ |
| |
| #ifdef HAVE_CONFIG_H |
| #include <config.h> |
| #endif |
| |
| #include <errno.h> |
| #include <stdio.h> |
| #include <stdlib.h> |
| #include <unistd.h> |
| #include <string.h> |
| #include <signal.h> |
| #include <sys/signalfd.h> |
| #include <getopt.h> |
| #include <sys/stat.h> |
| #include <net/if.h> |
| #include <netdb.h> |
| |
| #include <gdbus.h> |
| |
| #include "../src/connman.h" |
| #include "vpn.h" |
| |
| #include "connman/vpn-dbus.h" |
| |
| #define CONFIGMAINFILE CONFIGDIR "/connman-vpn.conf" |
| |
| #define DEFAULT_INPUT_REQUEST_TIMEOUT 300 * 1000 |
| |
| static GMainLoop *main_loop = NULL; |
| |
| static unsigned int __terminated = 0; |
| |
| static struct { |
| unsigned int timeout_inputreq; |
| } connman_vpn_settings = { |
| .timeout_inputreq = DEFAULT_INPUT_REQUEST_TIMEOUT, |
| }; |
| |
| static GKeyFile *load_config(const char *file) |
| { |
| GError *err = NULL; |
| GKeyFile *keyfile; |
| |
| keyfile = g_key_file_new(); |
| |
| g_key_file_set_list_separator(keyfile, ','); |
| |
| if (!g_key_file_load_from_file(keyfile, file, 0, &err)) { |
| if (err->code != G_FILE_ERROR_NOENT) { |
| connman_error("Parsing %s failed: %s", file, |
| err->message); |
| } |
| |
| g_error_free(err); |
| g_key_file_free(keyfile); |
| return NULL; |
| } |
| |
| return keyfile; |
| } |
| |
| static void parse_config(GKeyFile *config, const char *file) |
| { |
| GError *error = NULL; |
| int timeout; |
| |
| if (!config) |
| return; |
| |
| DBG("parsing %s", file); |
| |
| timeout = g_key_file_get_integer(config, "General", |
| "InputRequestTimeout", &error); |
| if (!error && timeout >= 0) |
| connman_vpn_settings.timeout_inputreq = timeout * 1000; |
| |
| g_clear_error(&error); |
| } |
| |
| static int config_init(const char *file) |
| { |
| GKeyFile *config; |
| |
| config = load_config(file); |
| parse_config(config, file); |
| if (config) |
| g_key_file_free(config); |
| |
| return 0; |
| } |
| |
| static gboolean signal_handler(GIOChannel *channel, GIOCondition cond, |
| gpointer user_data) |
| { |
| struct signalfd_siginfo si; |
| ssize_t result; |
| int fd; |
| |
| if (cond & (G_IO_NVAL | G_IO_ERR | G_IO_HUP)) |
| return FALSE; |
| |
| fd = g_io_channel_unix_get_fd(channel); |
| |
| result = read(fd, &si, sizeof(si)); |
| if (result != sizeof(si)) |
| return FALSE; |
| |
| switch (si.ssi_signo) { |
| case SIGINT: |
| case SIGTERM: |
| if (__terminated == 0) { |
| connman_info("Terminating"); |
| g_main_loop_quit(main_loop); |
| } |
| |
| __terminated = 1; |
| break; |
| } |
| |
| return TRUE; |
| } |
| |
| static guint setup_signalfd(void) |
| { |
| GIOChannel *channel; |
| guint source; |
| sigset_t mask; |
| int fd; |
| |
| sigemptyset(&mask); |
| sigaddset(&mask, SIGINT); |
| sigaddset(&mask, SIGTERM); |
| |
| if (sigprocmask(SIG_BLOCK, &mask, NULL) < 0) { |
| perror("Failed to set signal mask"); |
| return 0; |
| } |
| |
| fd = signalfd(-1, &mask, 0); |
| if (fd < 0) { |
| perror("Failed to create signal descriptor"); |
| return 0; |
| } |
| |
| channel = g_io_channel_unix_new(fd); |
| |
| g_io_channel_set_close_on_unref(channel, TRUE); |
| g_io_channel_set_encoding(channel, NULL, NULL); |
| g_io_channel_set_buffered(channel, FALSE); |
| |
| source = g_io_add_watch(channel, |
| G_IO_IN | G_IO_HUP | G_IO_ERR | G_IO_NVAL, |
| signal_handler, NULL); |
| |
| g_io_channel_unref(channel); |
| |
| return source; |
| } |
| |
| static void disconnect_callback(DBusConnection *conn, void *user_data) |
| { |
| connman_error("D-Bus disconnect"); |
| |
| g_main_loop_quit(main_loop); |
| } |
| |
| static gchar *option_config = NULL; |
| static gchar *option_debug = NULL; |
| static gchar *option_plugin = NULL; |
| static gchar *option_noplugin = NULL; |
| static bool option_detach = true; |
| static bool option_version = false; |
| static bool option_routes = false; |
| |
| static bool parse_debug(const char *key, const char *value, |
| gpointer user_data, GError **error) |
| { |
| if (value) |
| option_debug = g_strdup(value); |
| else |
| option_debug = g_strdup("*"); |
| |
| return true; |
| } |
| |
| static GOptionEntry options[] = { |
| { "config", 'c', 0, G_OPTION_ARG_STRING, &option_config, |
| "Load the specified configuration file " |
| "instead of " CONFIGMAINFILE, "FILE" }, |
| { "debug", 'd', G_OPTION_FLAG_OPTIONAL_ARG, |
| G_OPTION_ARG_CALLBACK, parse_debug, |
| "Specify debug options to enable", "DEBUG" }, |
| { "plugin", 'p', 0, G_OPTION_ARG_STRING, &option_plugin, |
| "Specify plugins to load", "NAME,..." }, |
| { "noplugin", 'P', 0, G_OPTION_ARG_STRING, &option_noplugin, |
| "Specify plugins not to load", "NAME,..." }, |
| { "nodaemon", 'n', G_OPTION_FLAG_REVERSE, |
| G_OPTION_ARG_NONE, &option_detach, |
| "Don't fork daemon to background" }, |
| { "routes", 'r', 0, G_OPTION_ARG_NONE, &option_routes, |
| "Create/delete VPN routes" }, |
| { "version", 'v', 0, G_OPTION_ARG_NONE, &option_version, |
| "Show version information and exit" }, |
| { NULL }, |
| }; |
| |
| /* |
| * This function will be called from generic src/agent.c code so we have |
| * to use connman_ prefix instead of vpn_ one. |
| */ |
| unsigned int connman_timeout_input_request(void) |
| { |
| return connman_vpn_settings.timeout_inputreq; |
| } |
| |
| int main(int argc, char *argv[]) |
| { |
| GOptionContext *context; |
| GError *error = NULL; |
| DBusConnection *conn; |
| DBusError err; |
| guint signal; |
| |
| context = g_option_context_new(NULL); |
| g_option_context_add_main_entries(context, options, NULL); |
| |
| if (!g_option_context_parse(context, &argc, &argv, &error)) { |
| if (error) { |
| g_printerr("%s\n", error->message); |
| g_error_free(error); |
| } else |
| g_printerr("An unknown error occurred\n"); |
| exit(1); |
| } |
| |
| g_option_context_free(context); |
| |
| if (option_version) { |
| printf("%s\n", VERSION); |
| exit(0); |
| } |
| |
| if (option_detach) { |
| if (daemon(0, 0)) { |
| perror("Can't start daemon"); |
| exit(1); |
| } |
| } |
| |
| if (mkdir(VPN_STATEDIR, S_IRUSR | S_IWUSR | S_IXUSR | |
| S_IRGRP | S_IXGRP | S_IROTH | S_IXOTH) < 0) { |
| if (errno != EEXIST) |
| perror("Failed to create state directory"); |
| } |
| |
| /* |
| * At some point the VPN stuff is migrated into VPN_STORAGEDIR |
| * and this mkdir() call can be removed. |
| */ |
| if (mkdir(STORAGEDIR, S_IRUSR | S_IWUSR | S_IXUSR | |
| S_IRGRP | S_IXGRP | S_IROTH | S_IXOTH) < 0) { |
| if (errno != EEXIST) |
| perror("Failed to create storage directory"); |
| } |
| |
| if (mkdir(VPN_STORAGEDIR, S_IRUSR | S_IWUSR | S_IXUSR | |
| S_IRGRP | S_IXGRP | S_IROTH | S_IXOTH) < 0) { |
| if (errno != EEXIST) |
| perror("Failed to create VPN storage directory"); |
| } |
| |
| umask(0077); |
| |
| main_loop = g_main_loop_new(NULL, FALSE); |
| |
| signal = setup_signalfd(); |
| |
| dbus_error_init(&err); |
| |
| conn = g_dbus_setup_bus(DBUS_BUS_SYSTEM, VPN_SERVICE, &err); |
| if (!conn) { |
| if (dbus_error_is_set(&err)) { |
| fprintf(stderr, "%s\n", err.message); |
| dbus_error_free(&err); |
| } else |
| fprintf(stderr, "Can't register with system bus\n"); |
| exit(1); |
| } |
| |
| g_dbus_set_disconnect_function(conn, disconnect_callback, NULL, NULL); |
| |
| __connman_log_init(argv[0], option_debug, option_detach, false, |
| "Connection Manager VPN daemon", VERSION); |
| __connman_dbus_init(conn); |
| |
| if (!option_config) |
| config_init(CONFIGMAINFILE); |
| else |
| config_init(option_config); |
| |
| __connman_inotify_init(); |
| __connman_agent_init(); |
| __vpn_provider_init(option_routes); |
| __vpn_manager_init(); |
| __vpn_ipconfig_init(); |
| __vpn_rtnl_init(); |
| __connman_task_init(); |
| __connman_plugin_init(option_plugin, option_noplugin); |
| __vpn_config_init(); |
| |
| __vpn_rtnl_start(); |
| |
| g_free(option_plugin); |
| g_free(option_noplugin); |
| |
| g_main_loop_run(main_loop); |
| |
| g_source_remove(signal); |
| |
| __vpn_config_cleanup(); |
| __connman_plugin_cleanup(); |
| __connman_task_cleanup(); |
| __vpn_rtnl_cleanup(); |
| __vpn_ipconfig_cleanup(); |
| __vpn_manager_cleanup(); |
| __vpn_provider_cleanup(); |
| __connman_agent_cleanup(); |
| __connman_inotify_cleanup(); |
| __connman_dbus_cleanup(); |
| __connman_log_cleanup(false); |
| |
| dbus_connection_unref(conn); |
| |
| g_main_loop_unref(main_loop); |
| |
| g_free(option_debug); |
| |
| return 0; |
| } |