blob: d2471bf6c5cc03c2aa9ed4389b1a9094d8056510 [file] [log] [blame]
// Copyright (c) 2012 The Chromium OS Authors. All rights reserved.
// Use of this source code is governed by a BSD-style license that can be
// found in the LICENSE file.
#include <errno.h>
#include <glib-unix.h>
#include <stdio.h>
#include <time.h>
#include <unistd.h>
#include <string>
#include <vector>
#include <base/at_exit.h>
#include <base/command_line.h>
#include <base/file_path.h>
#include <base/string_number_conversions.h>
#include <base/string_split.h>
#include <chromeos/syslog_logging.h>
#include "shill/dbus_control.h"
#include "shill/logging.h"
#include "shill/minijail.h"
#include "shill/shill_config.h"
#include "shill/shill_daemon.h"
using base::FilePath;
using std::string;
using std::vector;
namespace switches {
// Don't daemon()ize; run in foreground.
static const char kForeground[] = "foreground";
// Directory to read confguration settings.
static const char kConfigDir[] = "config-dir";
// Directory to read default configuration settings (Read Only).
static const char kDefaultConfigDir[] = "default-config-dir";
// Don't attempt to manage these devices.
static const char kDeviceBlackList[] = "device-black-list";
// Technologies to enable for portal check at startup.
static const char kPortalList[] = "portal-list";
// Flag to specify specific profiles to be pushed.
static const char kPushProfiles[] = "push";
// Flag that causes shill to show the help message and exit.
static const char kHelp[] = "help";
// Logging level:
// 0 = LOG(INFO), 1 = LOG(WARNING), 2 = LOG(ERROR),
// -1 = SLOG(..., 1), -2 = SLOG(..., 2), etc.
static const char kLogLevel[] = "log-level";
// Scopes to enable for SLOG()-based logging.
static const char kLogScopes[] = "log-scopes";
// Use the same directories flimflam uses (profiles, run dir...)
static const char kUseFlimflamDirs[] = "use-flimflam-dirs";
// The help message shown if help flag is passed to the program.
static const char kHelpMessage[] = "\n"
"Available Switches: \n"
" --foreground\n"
" Don\'t daemon()ize; run in foreground.\n"
" --config-dir\n"
" Directory to read confguration settings.\n"
" --default-config-dir\n"
" Directory to read default configuration settings (Read Only).\n"
" --device-black-list=device1,device2\n"
" Do not manage devices named device1 or device2\n"
" --log-level=N\n"
" Logging level:\n"
" 0 = LOG(INFO), 1 = LOG(WARNING), 2 = LOG(ERROR),\n"
" -1 = SLOG(..., 1), -2 = SLOG(..., 2), etc.\n"
" --log-scopes=\"*scope1+scope2\".\n"
" Scopes to enable for SLOG()-based logging.\n"
" --portal-list=technology1,technology2\n"
" Specify technologies to perform portal detection on at startup.\n"
" --push=profile1,profile2\n"
" Specify profiles to push on startup.\n"
" --use-flimflam-dirs\n"
" Use the same directories flimflam uses (profiles, run dir...).\n";
} // namespace switches
namespace {
const char *kLoggerCommand = "/usr/bin/logger";
const char *kLoggerUser = "syslog";
} // namespace
// Always logs to the syslog and logs to stderr if
// we are running in the foreground.
void SetupLogging(bool foreground, char *daemon_name) {
int log_flags = 0;
log_flags |= chromeos::kLogToSyslog;
log_flags |= chromeos::kLogHeader;
if (foreground) {
log_flags |= chromeos::kLogToStderr;
}
chromeos::InitLog(log_flags);
if (!foreground) {
vector<char *> logger_command_line;
int logger_stdin_fd;
logger_command_line.push_back(const_cast<char *>(kLoggerCommand));
logger_command_line.push_back(const_cast<char *>("--priority"));
logger_command_line.push_back(const_cast<char *>("daemon.err"));
logger_command_line.push_back(const_cast<char *>("--tag"));
logger_command_line.push_back(daemon_name);
logger_command_line.push_back(NULL);
shill::Minijail *minijail = shill::Minijail::GetInstance();
struct minijail *jail = minijail->New();
minijail->DropRoot(jail, kLoggerUser);
if (!minijail->RunPipeAndDestroy(jail, logger_command_line,
NULL, &logger_stdin_fd)) {
LOG(ERROR) << "Unable to spawn logger. "
<< "Writes to stderr will be discarded.";
return;
}
// Note that we don't set O_CLOEXEC here. This means that stderr
// from any child processes will, by default, be logged to syslog.
if (dup2(logger_stdin_fd, fileno(stderr)) != fileno(stderr)) {
LOG(ERROR) << "Failed to redirect stderr to syslog: "
<< strerror(errno);
}
close(logger_stdin_fd);
}
}
void DeleteDBusControl(void* param) {
SLOG(DBus, 2) << __func__;
shill::DBusControl* dbus_control =
reinterpret_cast<shill::DBusControl*>(param);
delete dbus_control;
}
gboolean ExitSigHandler(gpointer data) {
LOG(INFO) << "Shutting down due to received signal.";
shill::Daemon* daemon = reinterpret_cast<shill::Daemon*>(data);
daemon->Quit();
return TRUE;
}
int main(int argc, char** argv) {
base::AtExitManager exit_manager;
CommandLine::Init(argc, argv);
CommandLine* cl = CommandLine::ForCurrentProcess();
if (cl->HasSwitch(switches::kHelp)) {
LOG(INFO) << switches::kHelpMessage;
return 0;
}
const int nochdir = 0, noclose = 0;
if (!cl->HasSwitch(switches::kForeground))
PLOG_IF(FATAL, daemon(nochdir, noclose) == -1 ) << "Failed to daemonize";
SetupLogging(cl->HasSwitch(switches::kForeground), argv[0]);
if (cl->HasSwitch(switches::kLogLevel)) {
string log_level = cl->GetSwitchValueASCII(switches::kLogLevel);
int level = 0;
if (base::StringToInt(log_level, &level) &&
level < logging::LOG_NUM_SEVERITIES) {
logging::SetMinLogLevel(level);
// Like VLOG, SLOG uses negative verbose level.
shill::ScopeLogger::GetInstance()->set_verbose_level(-level);
} else {
LOG(WARNING) << "Bad log level: " << log_level;
}
}
if (cl->HasSwitch(switches::kLogScopes)) {
string log_scopes = cl->GetSwitchValueASCII(switches::kLogScopes);
shill::ScopeLogger::GetInstance()->EnableScopesByName(log_scopes);
}
FilePath config_dir(cl->GetSwitchValueASCII(switches::kConfigDir));
FilePath default_config_dir(
!cl->HasSwitch(switches::kDefaultConfigDir) ?
shill::Config::kShillDefaultPrefsDir :
cl->GetSwitchValueASCII(switches::kDefaultConfigDir));
shill::Config config; /* (config_dir, default_config_dir) */
if (cl->HasSwitch(switches::kUseFlimflamDirs))
config.UseFlimflamDirs();
// TODO(pstew): This should be chosen based on config
// Make sure we delete the DBusControl object AFTER the LazyInstances
// since some LazyInstances destructors rely on D-Bus being around.
shill::DBusControl* dbus_control = new shill::DBusControl();
exit_manager.RegisterCallback(DeleteDBusControl, dbus_control);
dbus_control->Init();
shill::Daemon daemon(&config, dbus_control);
if (cl->HasSwitch(switches::kPushProfiles)) {
vector<string> profile_list;
base::SplitString(cl->GetSwitchValueASCII(switches::kPushProfiles),
',', &profile_list);
daemon.SetStartupProfiles(profile_list);
}
if (cl->HasSwitch(switches::kDeviceBlackList)) {
vector<string> device_list;
base::SplitString(cl->GetSwitchValueASCII(switches::kDeviceBlackList),
',', &device_list);
vector<string>::iterator i;
for (i = device_list.begin(); i != device_list.end(); ++i) {
daemon.AddDeviceToBlackList(*i);
}
}
if (cl->HasSwitch(switches::kPortalList)) {
daemon.SetStartupPortalList(cl->GetSwitchValueASCII(switches::kPortalList));
}
g_unix_signal_add(SIGINT, ExitSigHandler, &daemon);
g_unix_signal_add(SIGTERM, ExitSigHandler, &daemon);
daemon.Run();
return 0;
}