blob: e6e4c8e0c5ed2fe2d56de27fd7312fdfcc5aa098 [file] [log] [blame]
/*
*
* Connection Manager
*
* Copyright (C) 2012-2013 Intel Corporation. All rights reserved.
*
* This program is free software; you can redistribute it and/or modify
* it under the terms of the GNU General Public License version 2 as
* published by the Free Software Foundation.
*
* This program is distributed in the hope that it will be useful,
* but WITHOUT ANY WARRANTY; without even the implied warranty of
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
* GNU General Public License for more details.
*
* You should have received a copy of the GNU General Public License
* along with this program; if not, write to the Free Software
* Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA
*
*/
#ifdef HAVE_CONFIG_H
#include <config.h>
#endif
#include <string.h>
#include <errno.h>
#include <sys/socket.h>
#include <stdlib.h>
#include <glib.h>
#include <gdbus.h>
#define CONNMAN_API_SUBJECT_TO_CHANGE
#include <connman/technology.h>
#include <connman/plugin.h>
#include <connman/log.h>
#include <connman/dbus.h>
#include <connman/provider.h>
#include <connman/ipaddress.h>
#include <connman/vpn-dbus.h>
#include <connman/inet.h>
#include <gweb/gresolv.h>
#define DBUS_TIMEOUT 10000
static DBusConnection *connection;
static GHashTable *vpn_connections = NULL;
static guint watch;
static guint added_watch;
static guint removed_watch;
static guint property_watch;
struct vpn_route {
int family;
char *network;
char *netmask;
char *gateway;
};
struct config_create_data {
connection_ready_cb callback;
DBusMessage *message;
char *path;
};
struct connection_data {
char *path;
char *ident;
struct connman_provider *provider;
int index;
DBusPendingCall *call;
bool connect_pending;
struct config_create_data *cb_data;
char *state;
char *type;
char *name;
char *host;
char **host_ip;
char *domain;
char **nameservers;
bool immutable;
GHashTable *server_routes;
GHashTable *user_routes;
GHashTable *setting_strings;
struct connman_ipaddress *ip;
GResolv *resolv;
guint resolv_id;
};
static int set_string(struct connman_provider *provider,
const char *key, const char *value)
{
struct connection_data *data;
data = connman_provider_get_data(provider);
if (!data)
return -EINVAL;
DBG("data %p provider %p key %s value %s", data, provider, key, value);
if (g_str_equal(key, "Type")) {
g_free(data->type);
data->type = g_strdup(value);
} else if (g_str_equal(key, "Name")) {
g_free(data->name);
data->name = g_strdup(value);
} else if (g_str_equal(key, "Host")) {
g_free(data->host);
data->host = g_strdup(value);
} else if (g_str_equal(key, "VPN.Domain") ||
g_str_equal(key, "Domain")) {
g_free(data->domain);
data->domain = g_strdup(value);
} else
g_hash_table_replace(data->setting_strings,
g_strdup(key), g_strdup(value));
return 0;
}
static const char *get_string(struct connman_provider *provider,
const char *key)
{
struct connection_data *data;
data = connman_provider_get_data(provider);
if (!data)
return NULL;
DBG("data %p provider %p key %s", data, provider, key);
if (g_str_equal(key, "Type"))
return data->type;
else if (g_str_equal(key, "Name"))
return data->name;
else if (g_str_equal(key, "Host"))
return data->host;
else if (g_str_equal(key, "HostIP")) {
if (!data->host_ip ||
!data->host_ip[0])
return data->host;
else
return data->host_ip[0];
} else if (g_str_equal(key, "VPN.Domain"))
return data->domain;
return g_hash_table_lookup(data->setting_strings, key);
}
static char *get_ident(const char *path)
{
char *pos;
if (*path != '/')
return NULL;
pos = strrchr(path, '/');
if (!pos)
return NULL;
return pos + 1;
}
static void cancel_host_resolv(struct connection_data *data)
{
if (data->resolv_id != 0)
g_resolv_cancel_lookup(data->resolv, data->resolv_id);
data->resolv_id = 0;
g_resolv_unref(data->resolv);
data->resolv = NULL;
}
static gboolean remove_resolv(gpointer user_data)
{
struct connection_data *data = user_data;
cancel_host_resolv(data);
return FALSE;
}
static void resolv_result(GResolvResultStatus status,
char **results, gpointer user_data)
{
struct connection_data *data = user_data;
DBG("status %d", status);
if (status == G_RESOLV_RESULT_STATUS_SUCCESS && results &&
g_strv_length(results) > 0) {
g_strfreev(data->host_ip);
data->host_ip = g_strdupv(results);
}
/*
* We cannot unref the resolver here as resolv struct is manipulated
* by gresolv.c after we return from this callback.
*/
g_timeout_add_seconds(0, remove_resolv, data);
data->resolv_id = 0;
}
static void resolv_host_addr(struct connection_data *data)
{
if (!data->host)
return;
if (connman_inet_check_ipaddress(data->host) > 0)
return;
if (data->host_ip)
return;
data->resolv = g_resolv_new(0);
if (!data->resolv) {
DBG("Cannot resolv %s", data->host);
return;
}
DBG("Trying to resolv %s", data->host);
data->resolv_id = g_resolv_lookup_hostname(data->resolv, data->host,
resolv_result, data);
}
static void free_config_cb_data(struct config_create_data *cb_data)
{
if (!cb_data)
return;
g_free(cb_data->path);
cb_data->path = NULL;
if (cb_data->message) {
dbus_message_unref(cb_data->message);
cb_data->message = NULL;
}
cb_data->callback = NULL;
g_free(cb_data);
}
static void set_provider_state(struct connection_data *data)
{
enum connman_provider_state state = CONNMAN_PROVIDER_STATE_UNKNOWN;
int err = 0;
DBG("provider %p new state %s", data->provider, data->state);
if (g_str_equal(data->state, "ready")) {
state = CONNMAN_PROVIDER_STATE_READY;
goto set;
} else if (g_str_equal(data->state, "configuration")) {
state = CONNMAN_PROVIDER_STATE_CONNECT;
} else if (g_str_equal(data->state, "idle")) {
state = CONNMAN_PROVIDER_STATE_IDLE;
} else if (g_str_equal(data->state, "disconnect")) {
err = ECONNREFUSED;
state = CONNMAN_PROVIDER_STATE_DISCONNECT;
goto set;
} else if (g_str_equal(data->state, "failure")) {
err = ECONNREFUSED;
state = CONNMAN_PROVIDER_STATE_FAILURE;
goto set;
}
connman_provider_set_state(data->provider, state);
return;
set:
if (data->cb_data)
data->cb_data->callback(data->cb_data->message,
err, data->ident);
connman_provider_set_state(data->provider, state);
free_config_cb_data(data->cb_data);
data->cb_data = NULL;
}
static int create_provider(struct connection_data *data, void *user_data)
{
struct connman_provider_driver *driver = user_data;
int err;
DBG("%s", data->path);
data->provider = connman_provider_get(data->ident);
if (!data->provider)
return -ENOMEM;
DBG("provider %p name %s", data->provider, data->name);
connman_provider_set_data(data->provider, data);
connman_provider_set_driver(data->provider, driver);
err = connman_provider_create_service(data->provider);
if (err == 0) {
connman_provider_set_immutable(data->provider, data->immutable);
if (g_str_equal(data->state, "ready")) {
connman_provider_set_index(data->provider,
data->index);
if (data->ip)
connman_provider_set_ipaddress(data->provider,
data->ip);
}
set_provider_state(data);
}
return 0;
}
static void destroy_route(gpointer user_data)
{
struct vpn_route *route = user_data;
g_free(route->network);
g_free(route->netmask);
g_free(route->gateway);
g_free(route);
}
static struct connection_data *create_connection_data(const char *path)
{
struct connection_data *data;
data = g_try_new0(struct connection_data, 1);
if (!data)
return NULL;
DBG("path %s", path);
data->path = g_strdup(path);
data->ident = g_strdup(get_ident(path));
data->index = -1;
data->setting_strings = g_hash_table_new_full(g_str_hash,
g_str_equal, g_free, g_free);
data->server_routes = g_hash_table_new_full(g_direct_hash,
g_str_equal, g_free, destroy_route);
data->user_routes = g_hash_table_new_full(g_str_hash,
g_str_equal, g_free, destroy_route);
return data;
}
static int extract_ip(DBusMessageIter *array, int family,
struct connection_data *data)
{
DBusMessageIter dict;
char *address = NULL, *gateway = NULL, *netmask = NULL, *peer = NULL;
unsigned char prefix_len;
if (dbus_message_iter_get_arg_type(array) != DBUS_TYPE_ARRAY)
return -EINVAL;
dbus_message_iter_recurse(array, &dict);
while (dbus_message_iter_get_arg_type(&dict) == DBUS_TYPE_DICT_ENTRY) {
DBusMessageIter entry, value;
const char *key;
dbus_message_iter_recurse(&dict, &entry);
dbus_message_iter_get_basic(&entry, &key);
dbus_message_iter_next(&entry);
dbus_message_iter_recurse(&entry, &value);
if (g_str_equal(key, "Address")) {
dbus_message_iter_get_basic(&value, &address);
DBG("address %s", address);
} else if (g_str_equal(key, "Netmask")) {
dbus_message_iter_get_basic(&value, &netmask);
DBG("netmask %s", netmask);
} else if (g_str_equal(key, "PrefixLength")) {
dbus_message_iter_get_basic(&value, &netmask);
DBG("prefix length %s", netmask);
} else if (g_str_equal(key, "Peer")) {
dbus_message_iter_get_basic(&value, &peer);
DBG("peer %s", peer);
} else if (g_str_equal(key, "Gateway")) {
dbus_message_iter_get_basic(&value, &gateway);
DBG("gateway %s", gateway);
}
dbus_message_iter_next(&dict);
}
connman_ipaddress_free(data->ip);
data->ip = connman_ipaddress_alloc(family);
if (!data->ip)
return -ENOMEM;
switch (family) {
case AF_INET:
connman_ipaddress_set_ipv4(data->ip, address, netmask,
gateway);
break;
case AF_INET6:
prefix_len = atoi(netmask);
connman_ipaddress_set_ipv6(data->ip, address, prefix_len,
gateway);
break;
default:
return -EINVAL;
}
connman_ipaddress_set_peer(data->ip, peer);
return 0;
}
static int extract_nameservers(DBusMessageIter *array,
struct connection_data *data)
{
DBusMessageIter entry;
char **nameservers = NULL;
int i = 0;
dbus_message_iter_recurse(array, &entry);
while (dbus_message_iter_get_arg_type(&entry) == DBUS_TYPE_STRING) {
const char *nameserver;
dbus_message_iter_get_basic(&entry, &nameserver);
nameservers = g_try_renew(char *, nameservers, i + 2);
if (!nameservers)
return -ENOMEM;
DBG("[%d] %s", i, nameserver);
nameservers[i] = g_strdup(nameserver);
if (!nameservers[i])
return -ENOMEM;
nameservers[++i] = NULL;
dbus_message_iter_next(&entry);
}
g_strfreev(data->nameservers);
data->nameservers = nameservers;
return 0;
}
static int errorstr2val(const char *error) {
if (g_strcmp0(error, CONNMAN_ERROR_INTERFACE ".InProgress") == 0)
return -EINPROGRESS;
if (g_strcmp0(error, CONNMAN_ERROR_INTERFACE ".AlreadyConnected") == 0)
return -EISCONN;
return -ECONNREFUSED;
}
static void connect_reply(DBusPendingCall *call, void *user_data)
{
DBusMessage *reply;
DBusError error;
struct connection_data *data = user_data;
struct config_create_data *cb_data = data->cb_data;
if (!dbus_pending_call_get_completed(call))
return;
DBG("user_data %p path %s", user_data, cb_data ? cb_data->path : NULL);
reply = dbus_pending_call_steal_reply(call);
dbus_error_init(&error);
if (dbus_set_error_from_message(&error, reply)) {
int err = errorstr2val(error.name);
if (err != -EINPROGRESS) {
connman_error("Connect reply: %s (%s)", error.message,
error.name);
dbus_error_free(&error);
DBG("data %p cb_data %p", data, cb_data);
if (cb_data) {
cb_data->callback(cb_data->message, err, NULL);
free_config_cb_data(cb_data);
data->cb_data = NULL;
}
goto done;
}
dbus_error_free(&error);
}
/*
* The vpn connection is up when we get a "ready" state
* property so at this point we do nothing for the provider
* state.
*/
done:
dbus_message_unref(reply);
dbus_pending_call_unref(call);
}
static int connect_provider(struct connection_data *data, void *user_data)
{
DBusPendingCall *call;
DBusMessage *message;
struct config_create_data *cb_data = user_data;
DBG("data %p user %p path %s", data, cb_data, data->path);
data->connect_pending = false;
message = dbus_message_new_method_call(VPN_SERVICE, data->path,
VPN_CONNECTION_INTERFACE,
VPN_CONNECT);
if (!message)
return -ENOMEM;
if (!dbus_connection_send_with_reply(connection, message,
&call, DBUS_TIMEOUT)) {
connman_error("Unable to call %s.%s()",
VPN_CONNECTION_INTERFACE, VPN_CONNECT);
dbus_message_unref(message);
return -EINVAL;
}
if (!call) {
dbus_message_unref(message);
return -EINVAL;
}
if (cb_data) {
g_free(cb_data->path);
cb_data->path = g_strdup(data->path);
}
dbus_pending_call_set_notify(call, connect_reply, data, NULL);
dbus_message_unref(message);
return -EINPROGRESS;
}
static void add_connection(const char *path, DBusMessageIter *properties,
void *user_data)
{
struct connection_data *data;
int err;
char *ident = get_ident(path);
bool found = false;
data = g_hash_table_lookup(vpn_connections, ident);
if (data) {
/*
* We might have a dummy connection struct here that
* was created by configuration_create_reply() so in
* that case just continue.
*/
if (!data->connect_pending)
return;
found = true;
} else {
data = create_connection_data(path);
if (!data)
return;
}
DBG("data %p path %s", data, path);
while (dbus_message_iter_get_arg_type(properties) ==
DBUS_TYPE_DICT_ENTRY) {
DBusMessageIter entry, value;
const char *key;
char *str;
dbus_message_iter_recurse(properties, &entry);
dbus_message_iter_get_basic(&entry, &key);
dbus_message_iter_next(&entry);
dbus_message_iter_recurse(&entry, &value);
if (g_str_equal(key, "State")) {
dbus_message_iter_get_basic(&value, &str);
DBG("state %s -> %s", data->state, str);
data->state = g_strdup(str);
} else if (g_str_equal(key, "IPv4")) {
extract_ip(&value, AF_INET, data);
} else if (g_str_equal(key, "IPv6")) {
extract_ip(&value, AF_INET6, data);
} else if (g_str_equal(key, "Name")) {
dbus_message_iter_get_basic(&value, &str);
data->name = g_strdup(str);
} else if (g_str_equal(key, "Type")) {
dbus_message_iter_get_basic(&value, &str);
data->type = g_strdup(str);
} else if (g_str_equal(key, "Immutable")) {
dbus_bool_t immutable;
dbus_message_iter_get_basic(&value, &immutable);
data->immutable = immutable;
} else if (g_str_equal(key, "Host")) {
dbus_message_iter_get_basic(&value, &str);
data->host = g_strdup(str);
} else if (g_str_equal(key, "Domain")) {
dbus_message_iter_get_basic(&value, &str);
g_free(data->domain);
data->domain = g_strdup(str);
} else if (g_str_equal(key, "Nameservers")) {
extract_nameservers(&value, data);
} else if (g_str_equal(key, "Index")) {
dbus_message_iter_get_basic(&value, &data->index);
} else if (g_str_equal(key, "ServerRoutes")) {
/* Ignored */
} else if (g_str_equal(key, "UserRoutes")) {
/* Ignored */
} else {
if (dbus_message_iter_get_arg_type(&value) ==
DBUS_TYPE_STRING) {
dbus_message_iter_get_basic(&value, &str);
g_hash_table_replace(data->setting_strings,
g_strdup(key), g_strdup(str));
} else {
DBG("unknown key %s", key);
}
}
dbus_message_iter_next(properties);
}
if (!found)
g_hash_table_insert(vpn_connections, g_strdup(data->ident),
data);
err = create_provider(data, user_data);
if (err < 0)
goto out;
resolv_host_addr(data);
if (data->nameservers)
connman_provider_set_nameservers(data->provider,
data->nameservers);
if (data->domain)
connman_provider_set_domain(data->provider,
data->domain);
if (data->connect_pending)
connect_provider(data, data->cb_data);
return;
out:
DBG("removing %s", data->ident);
g_hash_table_remove(vpn_connections, data->ident);
}
static void get_connections_reply(DBusPendingCall *call, void *user_data)
{
DBusMessage *reply;
DBusError error;
DBusMessageIter array, dict;
const char *signature = DBUS_TYPE_ARRAY_AS_STRING
DBUS_STRUCT_BEGIN_CHAR_AS_STRING
DBUS_TYPE_OBJECT_PATH_AS_STRING
DBUS_TYPE_ARRAY_AS_STRING
DBUS_DICT_ENTRY_BEGIN_CHAR_AS_STRING
DBUS_TYPE_STRING_AS_STRING
DBUS_TYPE_VARIANT_AS_STRING
DBUS_DICT_ENTRY_END_CHAR_AS_STRING
DBUS_STRUCT_END_CHAR_AS_STRING;
if (!dbus_pending_call_get_completed(call))
return;
DBG("");
reply = dbus_pending_call_steal_reply(call);
dbus_error_init(&error);
if (dbus_set_error_from_message(&error, reply)) {
connman_error("%s", error.message);
dbus_error_free(&error);
goto done;
}
if (!dbus_message_has_signature(reply, signature)) {
connman_error("vpnd signature \"%s\" does not match "
"expected \"%s\"",
dbus_message_get_signature(reply), signature);
goto done;
}
if (!dbus_message_iter_init(reply, &array))
goto done;
dbus_message_iter_recurse(&array, &dict);
while (dbus_message_iter_get_arg_type(&dict) == DBUS_TYPE_STRUCT) {
DBusMessageIter value, properties;
const char *path;
dbus_message_iter_recurse(&dict, &value);
dbus_message_iter_get_basic(&value, &path);
dbus_message_iter_next(&value);
dbus_message_iter_recurse(&value, &properties);
add_connection(path, &properties, user_data);
dbus_message_iter_next(&dict);
}
done:
dbus_message_unref(reply);
dbus_pending_call_unref(call);
}
static int get_connections(void *user_data)
{
DBusPendingCall *call;
DBusMessage *message;
DBG("");
message = dbus_message_new_method_call(VPN_SERVICE, "/",
VPN_MANAGER_INTERFACE,
GET_CONNECTIONS);
if (!message)
return -ENOMEM;
if (!dbus_connection_send_with_reply(connection, message,
&call, DBUS_TIMEOUT)) {
connman_error("Unable to call %s.%s()", VPN_MANAGER_INTERFACE,
GET_CONNECTIONS);
dbus_message_unref(message);
return -EINVAL;
}
if (!call) {
dbus_message_unref(message);
return -EINVAL;
}
dbus_pending_call_set_notify(call, get_connections_reply,
user_data, NULL);
dbus_message_unref(message);
return -EINPROGRESS;
}
static int provider_probe(struct connman_provider *provider)
{
return 0;
}
static void remove_connection_reply(DBusPendingCall *call, void *user_data)
{
DBusMessage *reply;
DBusError error;
if (!dbus_pending_call_get_completed(call))
return;
DBG("");
reply = dbus_pending_call_steal_reply(call);
dbus_error_init(&error);
if (dbus_set_error_from_message(&error, reply)) {
/*
* If the returned error is NotFound, it means that we
* have actually removed the provider in vpnd already.
*/
if (!dbus_error_has_name(&error,
CONNMAN_ERROR_INTERFACE".NotFound"))
connman_error("%s", error.message);
dbus_error_free(&error);
}
dbus_message_unref(reply);
dbus_pending_call_unref(call);
}
static int provider_remove(struct connman_provider *provider)
{
DBusPendingCall *call;
DBusMessage *message;
struct connection_data *data;
data = connman_provider_get_data(provider);
DBG("provider %p data %p", provider, data);
if (!data) {
/*
* This means the provider is already removed,
* just ignore the dbus in this case.
*/
return -EALREADY;
}
/*
* When provider.c:provider_remove() calls this function,
* it will remove the provider itself after the call.
* This means that we cannot use the provider pointer later
* as it is no longer valid.
*/
data->provider = NULL;
message = dbus_message_new_method_call(VPN_SERVICE, "/",
VPN_MANAGER_INTERFACE,
VPN_REMOVE);
if (!message)
return -ENOMEM;
dbus_message_append_args(message, DBUS_TYPE_OBJECT_PATH, &data->path,
NULL);
if (!dbus_connection_send_with_reply(connection, message,
&call, DBUS_TIMEOUT)) {
connman_error("Unable to call %s.%s()", VPN_MANAGER_INTERFACE,
VPN_REMOVE);
dbus_message_unref(message);
return -EINVAL;
}
if (!call) {
dbus_message_unref(message);
return -EINVAL;
}
dbus_pending_call_set_notify(call, remove_connection_reply,
NULL, NULL);
dbus_message_unref(message);
return 0;
}
static int provider_connect(struct connman_provider *provider)
{
struct connection_data *data;
data = connman_provider_get_data(provider);
if (!data)
return -EINVAL;
return connect_provider(data, NULL);
}
static void disconnect_reply(DBusPendingCall *call, void *user_data)
{
DBusMessage *reply;
DBusError error;
if (!dbus_pending_call_get_completed(call))
return;
DBG("user %p", user_data);
reply = dbus_pending_call_steal_reply(call);
dbus_error_init(&error);
if (dbus_set_error_from_message(&error, reply)) {
connman_error("%s", error.message);
dbus_error_free(&error);
goto done;
}
done:
dbus_message_unref(reply);
dbus_pending_call_unref(call);
}
static int disconnect_provider(struct connection_data *data)
{
DBusPendingCall *call;
DBusMessage *message;
DBG("data %p path %s", data, data->path);
message = dbus_message_new_method_call(VPN_SERVICE, data->path,
VPN_CONNECTION_INTERFACE,
VPN_DISCONNECT);
if (!message)
return -ENOMEM;
if (!dbus_connection_send_with_reply(connection, message,
&call, DBUS_TIMEOUT)) {
connman_error("Unable to call %s.%s()",
VPN_CONNECTION_INTERFACE, VPN_DISCONNECT);
dbus_message_unref(message);
return -EINVAL;
}
if (!call) {
dbus_message_unref(message);
return -EINVAL;
}
dbus_pending_call_set_notify(call, disconnect_reply, NULL, NULL);
dbus_message_unref(message);
connman_provider_set_state(data->provider,
CONNMAN_PROVIDER_STATE_DISCONNECT);
/*
* We return 0 here instead of -EINPROGRESS because
* __connman_service_disconnect() needs to return something
* to gdbus so that gdbus will not call Disconnect() more
* than once. This way we do not need to pass the dbus reply
* message around the code.
*/
return 0;
}
static int provider_disconnect(struct connman_provider *provider)
{
struct connection_data *data;
DBG("provider %p", provider);
data = connman_provider_get_data(provider);
if (!data)
return -EINVAL;
if (g_str_equal(data->state, "ready") ||
g_str_equal(data->state, "configuration"))
return disconnect_provider(data);
return 0;
}
static void configuration_create_reply(DBusPendingCall *call, void *user_data)
{
DBusMessage *reply;
DBusError error;
DBusMessageIter iter;
const char *signature = DBUS_TYPE_OBJECT_PATH_AS_STRING;
const char *path;
char *ident;
struct connection_data *data;
struct config_create_data *cb_data = user_data;
if (!dbus_pending_call_get_completed(call))
return;
DBG("user %p", cb_data);
reply = dbus_pending_call_steal_reply(call);
dbus_error_init(&error);
if (dbus_set_error_from_message(&error, reply)) {
connman_error("dbus error: %s", error.message);
dbus_error_free(&error);
goto done;
}
if (!dbus_message_has_signature(reply, signature)) {
connman_error("vpn configuration signature \"%s\" does not "
"match expected \"%s\"",
dbus_message_get_signature(reply), signature);
goto done;
}
if (!dbus_message_iter_init(reply, &iter))
goto done;
dbus_message_iter_get_basic(&iter, &path);
/*
* Then try to connect the VPN as expected by ConnectProvider API
*/
ident = get_ident(path);
data = g_hash_table_lookup(vpn_connections, ident);
if (!data) {
/*
* Someone removed the data. We cannot really continue.
*/
DBG("Pending data not found for %s, cannot continue!", ident);
} else {
data->call = NULL;
data->connect_pending = true;
if (!data->cb_data)
data->cb_data = cb_data;
else
DBG("Connection callback data already in use!");
/*
* Connection is created in add_connections() after
* we have received the ConnectionAdded signal.
*/
DBG("cb %p msg %p", data->cb_data,
data->cb_data ? data->cb_data->message : NULL);
}
done:
dbus_message_unref(reply);
dbus_pending_call_unref(call);
}
static void set_dbus_ident(char *ident)
{
int i, len = strlen(ident);
for (i = 0; i < len; i++) {
if (ident[i] >= '0' && ident[i] <= '9')
continue;
if (ident[i] >= 'a' && ident[i] <= 'z')
continue;
if (ident[i] >= 'A' && ident[i] <= 'Z')
continue;
ident[i] = '_';
}
}
static struct vpn_route *parse_user_route(const char *user_route)
{
char *network, *netmask;
struct vpn_route *route = NULL;
int family = PF_UNSPEC;
char **elems = g_strsplit(user_route, "/", 0);
if (!elems)
return NULL;
network = elems[0];
if (!network || *network == '\0') {
DBG("no network/netmask set");
goto out;
}
netmask = elems[1];
if (netmask && *netmask == '\0') {
DBG("no netmask set");
goto out;
}
if (g_strrstr(network, ":"))
family = AF_INET6;
else if (g_strrstr(network, ".")) {
family = AF_INET;
if (!g_strrstr(netmask, ".")) {
/* We have netmask length */
in_addr_t addr;
struct in_addr netmask_in;
unsigned char prefix_len = 32;
if (netmask) {
char *ptr;
long int value = strtol(netmask, &ptr, 10);
if (ptr != netmask && *ptr == '\0' &&
value && value <= 32)
prefix_len = value;
}
addr = 0xffffffff << (32 - prefix_len);
netmask_in.s_addr = htonl(addr);
netmask = inet_ntoa(netmask_in);
DBG("network %s netmask %s", network, netmask);
}
}
route = g_try_new(struct vpn_route, 1);
if (!route)
goto out;
route->network = g_strdup(network);
route->netmask = g_strdup(netmask);
route->gateway = NULL;
route->family = family;
out:
g_strfreev(elems);
return route;
}
static GSList *get_user_networks(DBusMessageIter *array)
{
DBusMessageIter entry;
GSList *list = NULL;
dbus_message_iter_recurse(array, &entry);
while (dbus_message_iter_get_arg_type(&entry) == DBUS_TYPE_STRING) {
const char *val;
struct vpn_route *route;
dbus_message_iter_get_basic(&entry, &val);
route = parse_user_route(val);
if (route)
list = g_slist_prepend(list, route);
dbus_message_iter_next(&entry);
}
return list;
}
static void append_route(DBusMessageIter *iter, void *user_data)
{
struct vpn_route *route = user_data;
DBusMessageIter item;
int family = 0;
connman_dbus_dict_open(iter, &item);
if (!route)
goto empty_dict;
if (route->family == AF_INET)
family = 4;
else if (route->family == AF_INET6)
family = 6;
if (family != 0)
connman_dbus_dict_append_basic(&item, "ProtocolFamily",
DBUS_TYPE_INT32, &family);
if (route->network)
connman_dbus_dict_append_basic(&item, "Network",
DBUS_TYPE_STRING, &route->network);
if (route->netmask)
connman_dbus_dict_append_basic(&item, "Netmask",
DBUS_TYPE_STRING, &route->netmask);
if (route->gateway)
connman_dbus_dict_append_basic(&item, "Gateway",
DBUS_TYPE_STRING, &route->gateway);
empty_dict:
connman_dbus_dict_close(iter, &item);
}
static void append_routes(DBusMessageIter *iter, void *user_data)
{
GSList *list, *routes = user_data;
DBG("routes %p", routes);
for (list = routes; list; list = g_slist_next(list)) {
DBusMessageIter dict;
struct vpn_route *route = list->data;
dbus_message_iter_open_container(iter, DBUS_TYPE_STRUCT, NULL,
&dict);
append_route(&dict, route);
dbus_message_iter_close_container(iter, &dict);
}
}
static int create_configuration(DBusMessage *msg, connection_ready_cb callback)
{
DBusMessage *new_msg = NULL;
DBusPendingCall *call;
DBusMessageIter iter, array, new_iter, new_dict;
const char *type = NULL, *name = NULL;
const char *host = NULL, *domain = NULL;
char *ident, *me = NULL;
int err = 0;
dbus_bool_t result;
struct connection_data *data;
struct config_create_data *user_data = NULL;
GSList *networks = NULL;
/*
* We copy the old message data into new message. We cannot
* just use the old message as is because the user route
* information is not in the same format in vpnd.
*/
new_msg = dbus_message_new(DBUS_MESSAGE_TYPE_METHOD_CALL);
dbus_message_iter_init_append(new_msg, &new_iter);
connman_dbus_dict_open(&new_iter, &new_dict);
dbus_message_iter_init(msg, &iter);
dbus_message_iter_recurse(&iter, &array);
while (dbus_message_iter_get_arg_type(&array) == DBUS_TYPE_DICT_ENTRY) {
DBusMessageIter entry, value;
void *item_value;
const char *key;
int value_type;
dbus_message_iter_recurse(&array, &entry);
dbus_message_iter_get_basic(&entry, &key);
dbus_message_iter_next(&entry);
dbus_message_iter_recurse(&entry, &value);
value_type = dbus_message_iter_get_arg_type(&value);
item_value = NULL;
switch (value_type) {
case DBUS_TYPE_STRING:
dbus_message_iter_get_basic(&value, &item_value);
if (g_str_equal(key, "Type"))
type = (const char *)item_value;
else if (g_str_equal(key, "Name"))
name = (const char *)item_value;
else if (g_str_equal(key, "Host"))
host = (const char *)item_value;
else if (g_str_equal(key, "VPN.Domain"))
domain = (const char *)item_value;
DBG("%s %s", key, (char *)item_value);
if (item_value)
connman_dbus_dict_append_basic(&new_dict, key,
value_type, &item_value);
break;
case DBUS_TYPE_ARRAY:
if (g_str_equal(key, "Networks")) {
networks = get_user_networks(&value);
connman_dbus_dict_append_array(&new_dict,
"UserRoutes",
DBUS_TYPE_DICT_ENTRY,
append_routes,
networks);
}
break;
}
dbus_message_iter_next(&array);
}
connman_dbus_dict_close(&new_iter, &new_dict);
DBG("VPN type %s name %s host %s domain %s networks %p",
type, name, host, domain, networks);
if (!host || !domain) {
err = -EINVAL;
goto done;
}
if (!type || !name) {
err = -EOPNOTSUPP;
goto done;
}
ident = g_strdup_printf("%s_%s", host, domain);
set_dbus_ident(ident);
DBG("ident %s", ident);
data = g_hash_table_lookup(vpn_connections, ident);
if (data) {
if (data->call || data->cb_data) {
DBG("create configuration call already pending");
err = -EINPROGRESS;
goto done;
}
} else {
char *path = g_strdup_printf("%s/connection/%s", VPN_PATH,
ident);
data = create_connection_data(path);
g_free(path);
if (!data) {
err = -ENOMEM;
goto done;
}
g_hash_table_insert(vpn_connections, g_strdup(ident), data);
}
/*
* User called net.connman.Manager.ConnectProvider if we are here.
* So use the data from original message in the new msg.
*/
me = g_strdup(dbus_message_get_destination(msg));
dbus_message_set_interface(new_msg, VPN_MANAGER_INTERFACE);
dbus_message_set_path(new_msg, "/");
dbus_message_set_destination(new_msg, VPN_SERVICE);
dbus_message_set_sender(new_msg, me);
dbus_message_set_member(new_msg, "Create");
user_data = g_try_new0(struct config_create_data, 1);
if (!user_data) {
err = -ENOMEM;
goto done;
}
user_data->callback = callback;
user_data->message = dbus_message_ref(msg);
user_data->path = NULL;
DBG("cb %p msg %p", user_data, msg);
result = dbus_connection_send_with_reply(connection, new_msg,
&call, DBUS_TIMEOUT);
if (!result || !call) {
err = -EIO;
goto done;
}
dbus_pending_call_set_notify(call, configuration_create_reply,
user_data, NULL);
data->call = call;
done:
if (new_msg)
dbus_message_unref(new_msg);
if (networks)
g_slist_free_full(networks, destroy_route);
g_free(me);
return err;
}
static bool check_host(char **hosts, char *host)
{
int i;
if (!hosts)
return false;
for (i = 0; hosts[i]; i++) {
if (g_strcmp0(hosts[i], host) == 0)
return true;
}
return false;
}
static void set_route(struct connection_data *data, struct vpn_route *route)
{
/*
* If the VPN administrator/user has given a route to
* VPN server, then we must discard that because the
* server cannot be contacted via VPN tunnel.
*/
if (check_host(data->host_ip, route->network)) {
DBG("Discarding VPN route to %s via %s at index %d",
route->network, route->gateway, data->index);
return;
}
if (route->family == AF_INET6) {
unsigned char prefix_len = atoi(route->netmask);
connman_inet_add_ipv6_network_route(data->index,
route->network,
route->gateway,
prefix_len);
} else {
connman_inet_add_network_route(data->index, route->network,
route->gateway,
route->netmask);
}
}
static int set_routes(struct connman_provider *provider,
enum connman_provider_route_type type)
{
struct connection_data *data;
GHashTableIter iter;
gpointer value, key;
DBG("provider %p", provider);
data = connman_provider_get_data(provider);
if (!data)
return -EINVAL;
if (type == CONNMAN_PROVIDER_ROUTE_ALL ||
type == CONNMAN_PROVIDER_ROUTE_USER) {
g_hash_table_iter_init(&iter, data->user_routes);
while (g_hash_table_iter_next(&iter, &key, &value))
set_route(data, value);
}
if (type == CONNMAN_PROVIDER_ROUTE_ALL ||
type == CONNMAN_PROVIDER_ROUTE_SERVER) {
g_hash_table_iter_init(&iter, data->server_routes);
while (g_hash_table_iter_next(&iter, &key, &value))
set_route(data, value);
}
return 0;
}
static bool check_routes(struct connman_provider *provider)
{
struct connection_data *data;
DBG("provider %p", provider);
data = connman_provider_get_data(provider);
if (!data)
return false;
if (data->user_routes &&
g_hash_table_size(data->user_routes) > 0)
return true;
if (data->server_routes &&
g_hash_table_size(data->server_routes) > 0)
return true;
return false;
}
static struct connman_provider_driver provider_driver = {
.name = "VPN",
.type = CONNMAN_PROVIDER_TYPE_VPN,
.probe = provider_probe,
.remove = provider_remove,
.connect = provider_connect,
.disconnect = provider_disconnect,
.set_property = set_string,
.get_property = get_string,
.create = create_configuration,
.set_routes = set_routes,
.check_routes = check_routes,
};
static void destroy_provider(struct connection_data *data)
{
DBG("data %p", data);
if (g_str_equal(data->state, "ready") ||
g_str_equal(data->state, "configuration"))
connman_provider_disconnect(data->provider);
if (data->call)
dbus_pending_call_cancel(data->call);
connman_provider_set_data(data->provider, NULL);
connman_provider_remove(data->provider);
data->provider = NULL;
}
static void connection_destroy(gpointer hash_data)
{
struct connection_data *data = hash_data;
DBG("data %p", data);
if (data->provider)
destroy_provider(data);
g_free(data->path);
g_free(data->ident);
g_free(data->state);
g_free(data->type);
g_free(data->name);
g_free(data->host);
g_free(data->host_ip);
g_free(data->domain);
g_hash_table_destroy(data->server_routes);
g_hash_table_destroy(data->user_routes);
g_strfreev(data->nameservers);
g_hash_table_destroy(data->setting_strings);
connman_ipaddress_free(data->ip);
cancel_host_resolv(data);
g_free(data);
}
static void vpnd_created(DBusConnection *conn, void *user_data)
{
DBG("connection %p", conn);
get_connections(user_data);
}
static void vpnd_removed(DBusConnection *conn, void *user_data)
{
DBG("connection %p", conn);
g_hash_table_remove_all(vpn_connections);
}
static void remove_connection(DBusConnection *conn, const char *path)
{
DBG("path %s", path);
g_hash_table_remove(vpn_connections, get_ident(path));
}
static gboolean connection_removed(DBusConnection *conn, DBusMessage *message,
void *user_data)
{
const char *path;
const char *signature = DBUS_TYPE_OBJECT_PATH_AS_STRING;
struct connection_data *data;
if (!dbus_message_has_signature(message, signature)) {
connman_error("vpn removed signature \"%s\" does not match "
"expected \"%s\"",
dbus_message_get_signature(message), signature);
return TRUE;
}
dbus_message_get_args(message, NULL, DBUS_TYPE_OBJECT_PATH, &path,
DBUS_TYPE_INVALID);
data = g_hash_table_lookup(vpn_connections, get_ident(path));
if (data)
remove_connection(conn, path);
return TRUE;
}
static gboolean connection_added(DBusConnection *conn, DBusMessage *message,
void *user_data)
{
DBusMessageIter iter, properties;
const char *path;
const char *signature = DBUS_TYPE_OBJECT_PATH_AS_STRING
DBUS_TYPE_ARRAY_AS_STRING
DBUS_DICT_ENTRY_BEGIN_CHAR_AS_STRING
DBUS_TYPE_STRING_AS_STRING
DBUS_TYPE_VARIANT_AS_STRING
DBUS_DICT_ENTRY_END_CHAR_AS_STRING;
if (!dbus_message_has_signature(message, signature)) {
connman_error("vpn ConnectionAdded signature \"%s\" does not "
"match expected \"%s\"",
dbus_message_get_signature(message), signature);
return TRUE;
}
DBG("");
if (!dbus_message_iter_init(message, &iter))
return TRUE;
dbus_message_iter_get_basic(&iter, &path);
dbus_message_iter_next(&iter);
dbus_message_iter_recurse(&iter, &properties);
add_connection(path, &properties, user_data);
return TRUE;
}
static int save_route(GHashTable *routes, int family, const char *network,
const char *netmask, const char *gateway)
{
struct vpn_route *route;
char *key = g_strdup_printf("%d/%s/%s", family, network, netmask);
DBG("family %d network %s netmask %s", family, network, netmask);
route = g_hash_table_lookup(routes, key);
if (!route) {
route = g_try_new0(struct vpn_route, 1);
if (!route) {
connman_error("out of memory");
return -ENOMEM;
}
route->family = family;
route->network = g_strdup(network);
route->netmask = g_strdup(netmask);
route->gateway = g_strdup(gateway);
g_hash_table_replace(routes, key, route);
} else
g_free(key);
return 0;
}
static int read_route_dict(GHashTable *routes, DBusMessageIter *dicts)
{
DBusMessageIter dict;
const char *network, *netmask, *gateway;
int family;
dbus_message_iter_recurse(dicts, &dict);
network = netmask = gateway = NULL;
family = PF_UNSPEC;
while (dbus_message_iter_get_arg_type(&dict) == DBUS_TYPE_DICT_ENTRY) {
DBusMessageIter entry, value;
const char *key;
dbus_message_iter_recurse(&dict, &entry);
dbus_message_iter_get_basic(&entry, &key);
dbus_message_iter_next(&entry);
dbus_message_iter_recurse(&entry, &value);
if (g_str_equal(key, "ProtocolFamily")) {
int pf;
dbus_message_iter_get_basic(&value, &pf);
switch (pf) {
case 4:
family = AF_INET;
break;
case 6:
family = AF_INET6;
break;
}
DBG("family %d", family);
} else if (g_str_equal(key, "Netmask")) {
dbus_message_iter_get_basic(&value, &netmask);
DBG("netmask %s", netmask);
} else if (g_str_equal(key, "Network")) {
dbus_message_iter_get_basic(&value, &network);
DBG("host %s", network);
} else if (g_str_equal(key, "Gateway")) {
dbus_message_iter_get_basic(&value, &gateway);
DBG("gateway %s", gateway);
}
dbus_message_iter_next(&dict);
}
if (!netmask || !network || !gateway) {
DBG("Value missing.");
return -EINVAL;
}
return save_route(routes, family, network, netmask, gateway);
}
static int routes_changed(DBusMessageIter *array, GHashTable *routes)
{
DBusMessageIter entry;
int ret = -EINVAL;
if (dbus_message_iter_get_arg_type(array) != DBUS_TYPE_ARRAY) {
DBG("Expecting array, ignoring routes.");
return -EINVAL;
}
while (dbus_message_iter_get_arg_type(array) == DBUS_TYPE_ARRAY) {
dbus_message_iter_recurse(array, &entry);
while (dbus_message_iter_get_arg_type(&entry) ==
DBUS_TYPE_STRUCT) {
DBusMessageIter dicts;
dbus_message_iter_recurse(&entry, &dicts);
while (dbus_message_iter_get_arg_type(&dicts) ==
DBUS_TYPE_ARRAY) {
int err = read_route_dict(routes, &dicts);
if (ret != 0)
ret = err;
dbus_message_iter_next(&dicts);
}
dbus_message_iter_next(&entry);
}
dbus_message_iter_next(array);
}
return ret;
}
static gboolean property_changed(DBusConnection *conn,
DBusMessage *message,
void *user_data)
{
const char *path = dbus_message_get_path(message);
struct connection_data *data = NULL;
DBusMessageIter iter, value;
bool ip_set = false;
int err;
char *str;
const char *key;
const char *signature = DBUS_TYPE_STRING_AS_STRING
DBUS_TYPE_VARIANT_AS_STRING;
if (!dbus_message_has_signature(message, signature)) {
connman_error("vpn property signature \"%s\" does not match "
"expected \"%s\"",
dbus_message_get_signature(message), signature);
return TRUE;
}
data = g_hash_table_lookup(vpn_connections, get_ident(path));
if (!data)
return TRUE;
if (!dbus_message_iter_init(message, &iter))
return TRUE;
dbus_message_iter_get_basic(&iter, &key);
dbus_message_iter_next(&iter);
dbus_message_iter_recurse(&iter, &value);
DBG("key %s", key);
if (g_str_equal(key, "State")) {
dbus_message_iter_get_basic(&value, &str);
DBG("%s %s -> %s", data->path, data->state, str);
if (g_str_equal(data->state, str))
return TRUE;
g_free(data->state);
data->state = g_strdup(str);
set_provider_state(data);
} else if (g_str_equal(key, "Index")) {
dbus_message_iter_get_basic(&value, &data->index);
connman_provider_set_index(data->provider, data->index);
} else if (g_str_equal(key, "IPv4")) {
err = extract_ip(&value, AF_INET, data);
ip_set = true;
} else if (g_str_equal(key, "IPv6")) {
err = extract_ip(&value, AF_INET6, data);
ip_set = true;
} else if (g_str_equal(key, "ServerRoutes")) {
err = routes_changed(&value, data->server_routes);
/*
* Note that the vpnd will delay the route sending a bit
* (in order to collect the routes from VPN client),
* so we might have got the State changed property before
* we got ServerRoutes. This means that we must try to set
* the routes here because they would be left unset otherwise.
*/
if (err == 0)
set_routes(data->provider,
CONNMAN_PROVIDER_ROUTE_SERVER);
} else if (g_str_equal(key, "UserRoutes")) {
err = routes_changed(&value, data->user_routes);
if (err == 0)
set_routes(data->provider,
CONNMAN_PROVIDER_ROUTE_USER);
} else if (g_str_equal(key, "Nameservers")) {
if (extract_nameservers(&value, data) == 0 &&
data->nameservers)
connman_provider_set_nameservers(data->provider,
data->nameservers);
} else if (g_str_equal(key, "Domain")) {
dbus_message_iter_get_basic(&value, &str);
g_free(data->domain);
data->domain = g_strdup(str);
connman_provider_set_domain(data->provider, data->domain);
}
if (ip_set && err == 0) {
err = connman_provider_set_ipaddress(data->provider, data->ip);
if (err < 0)
DBG("setting provider IP address failed (%s/%d)",
strerror(-err), -err);
}
return TRUE;
}
static int vpn_init(void)
{
int err;
connection = connman_dbus_get_connection();
if (!connection)
return -EIO;
watch = g_dbus_add_service_watch(connection, VPN_SERVICE,
vpnd_created, vpnd_removed, &provider_driver, NULL);
added_watch = g_dbus_add_signal_watch(connection, VPN_SERVICE, NULL,
VPN_MANAGER_INTERFACE,
CONNECTION_ADDED, connection_added,
&provider_driver, NULL);
removed_watch = g_dbus_add_signal_watch(connection, VPN_SERVICE, NULL,
VPN_MANAGER_INTERFACE,
CONNECTION_REMOVED, connection_removed,
NULL, NULL);
property_watch = g_dbus_add_signal_watch(connection, VPN_SERVICE, NULL,
VPN_CONNECTION_INTERFACE,
PROPERTY_CHANGED, property_changed,
NULL, NULL);
if (added_watch == 0 || removed_watch == 0 || property_watch == 0) {
err = -EIO;
goto remove;
}
err = connman_provider_driver_register(&provider_driver);
if (err == 0) {
vpn_connections = g_hash_table_new_full(g_str_hash,
g_str_equal,
g_free, connection_destroy);
vpnd_created(connection, &provider_driver);
}
return err;
remove:
g_dbus_remove_watch(connection, watch);
g_dbus_remove_watch(connection, added_watch);
g_dbus_remove_watch(connection, removed_watch);
g_dbus_remove_watch(connection, property_watch);
dbus_connection_unref(connection);
return err;
}
static void vpn_exit(void)
{
g_dbus_remove_watch(connection, watch);
g_dbus_remove_watch(connection, added_watch);
g_dbus_remove_watch(connection, removed_watch);
g_dbus_remove_watch(connection, property_watch);
connman_provider_driver_unregister(&provider_driver);
if (vpn_connections)
g_hash_table_destroy(vpn_connections);
dbus_connection_unref(connection);
}
CONNMAN_PLUGIN_DEFINE(vpn, "VPN plugin", VERSION,
CONNMAN_PLUGIN_PRIORITY_DEFAULT, vpn_init, vpn_exit)