blob: 4c1beba7e2171e1762ca50a2bc1e09bcb609bf26 [file] [log] [blame]
mukesh agrawal8a3188d2011-12-01 20:56:44 +00001// Copyright (c) 2012 The Chromium OS Authors. All rights reserved.
Paul Stewart75897df2011-04-27 09:05:53 -07002// Use of this source code is governed by a BSD-style license that can be
3// found in the LICENSE file.
4
Darin Petkov002c58e2012-06-19 02:56:05 +02005#ifndef SHILL_MANAGER_H_
6#define SHILL_MANAGER_H_
Paul Stewart75897df2011-04-27 09:05:53 -07007
Darin Petkova5e07ef2012-07-09 14:27:57 +02008#include <map>
Chris Masone9be4a9d2011-05-16 15:44:09 -07009#include <string>
Paul Stewart75897df2011-04-27 09:05:53 -070010#include <vector>
Chris Masone487b8bf2011-05-13 16:27:57 -070011
Paul Stewartdfa46052012-06-26 09:44:14 -070012#include <base/cancelable_callback.h>
Paul Stewarte6132022011-08-16 09:11:02 -070013#include <base/file_path.h>
Chris Masone9be4a9d2011-05-16 15:44:09 -070014#include <base/memory/ref_counted.h>
Chris Masone487b8bf2011-05-13 16:27:57 -070015#include <base/memory/scoped_ptr.h>
Eric Shienbrood3e20a232012-02-16 11:35:56 -050016#include <base/memory/weak_ptr.h>
Chris Masone88cbd5f2011-07-03 14:30:04 -070017#include <chromeos/dbus/service_constants.h>
Liam McLoughlin0fec81c2013-02-28 10:31:47 -050018#include <base/gtest_prod_util.h> // for FRIEND_TEST_ALL_PREFIXES
Paul Stewart22aa71b2011-09-16 12:15:11 -070019#include <gtest/gtest_prod.h> // for FRIEND_TEST
Paul Stewart75897df2011-04-27 09:05:53 -070020
Paul Stewart75897df2011-04-27 09:05:53 -070021#include "shill/device.h"
Paul Stewart0af98bf2011-05-10 17:38:08 -070022#include "shill/device_info.h"
Paul Stewart26b327e2011-10-19 11:38:09 -070023#include "shill/event_dispatcher.h"
Gaurav Shahb790aa22012-10-23 12:51:12 -070024#include "shill/geolocation_info.h"
Gary Moraina9fb3252012-05-31 12:05:31 -070025#include "shill/hook_table.h"
Arman Ugurayab22c162012-10-08 19:08:38 -070026#include "shill/metrics.h"
Darin Petkov887f2982011-07-14 16:10:17 -070027#include "shill/modem_info.h"
Gary Morainac1bdb42012-02-16 17:42:29 -080028#include "shill/power_manager.h"
Chris Masoneb925cc82011-06-22 15:39:57 -070029#include "shill/property_store.h"
Chris Masone9be4a9d2011-05-16 15:44:09 -070030#include "shill/service.h"
Darin Petkov33af05c2012-02-28 10:10:30 +010031#include "shill/vpn_provider.h"
mukesh agrawal7a4e4002011-09-06 11:26:05 -070032#include "shill/wifi.h"
Darin Petkovb72b62e2012-05-15 16:55:36 +020033#include "shill/wimax_provider.h"
Paul Stewart75897df2011-04-27 09:05:53 -070034
35namespace shill {
36
Chris Masoned0ceb8c2011-06-02 10:05:39 -070037class ControlInterface;
Darin Petkov002c58e2012-06-19 02:56:05 +020038class DBusManager;
Paul Stewart4d5efb72012-09-17 12:24:34 -070039class DefaultProfile;
Chris Masone8fe2c7e2011-06-09 15:51:19 -070040class Error;
Chris Masoned0ceb8c2011-06-02 10:05:39 -070041class EventDispatcher;
Thieu Le3426c8f2012-01-11 17:35:11 -080042class ManagerAdaptorInterface;
Paul Stewart4d5efb72012-09-17 12:24:34 -070043class Resolver;
Paul Stewart85aea152013-01-22 09:31:56 -080044class StoreInterface;
Paul Stewart3c504012013-01-17 17:49:58 -080045class WiFiProvider;
Chris Masoned0ceb8c2011-06-02 10:05:39 -070046
Eric Shienbrood3e20a232012-02-16 11:35:56 -050047class Manager : public base::SupportsWeakPtr<Manager> {
Paul Stewart75897df2011-04-27 09:05:53 -070048 public:
Darin Petkova5e07ef2012-07-09 14:27:57 +020049 typedef base::Callback<void(const ServiceRefPtr &service)> ServiceCallback;
50
Chris Masone88cbd5f2011-07-03 14:30:04 -070051 struct Properties {
52 public:
Paul Stewartc681fa02012-03-02 19:40:04 -080053 Properties()
Paul Stewartd408fdf2012-05-07 17:15:57 -070054 : offline_mode(false),
55 portal_check_interval_seconds(0),
56 arp_gateway(true) {}
Chris Masone88cbd5f2011-07-03 14:30:04 -070057 bool offline_mode;
58 std::string check_portal_list;
59 std::string country;
Paul Stewartc681fa02012-03-02 19:40:04 -080060 int32 portal_check_interval_seconds;
Chris Masone88cbd5f2011-07-03 14:30:04 -070061 std::string portal_url;
Paul Stewartd32f4842012-01-11 16:08:13 -080062 std::string host_name;
Paul Stewartd408fdf2012-05-07 17:15:57 -070063 // Whether to ARP for the default gateway in the DHCP client after
64 // acquiring a lease.
65 bool arp_gateway;
Paul Stewartbf667612012-06-29 14:49:54 -070066 // Comma separated list of technologies on which to use a short DNS
67 // timeout to improve performance.
68 std::string short_dns_timeout_technologies;
Paul Stewart036dba02012-08-07 12:34:41 -070069 // Comma-separated list of technologies for which link-monitoring is
70 // enabled.
71 std::string link_monitor_technologies;
Paul Stewart4d5efb72012-09-17 12:24:34 -070072 // Comma-separated list of DNS search paths to be ignored.
73 std::string ignored_dns_search_paths;
Chris Masone88cbd5f2011-07-03 14:30:04 -070074 };
75
Chris Masone9be4a9d2011-05-16 15:44:09 -070076 Manager(ControlInterface *control_interface,
Darin Petkov887f2982011-07-14 16:10:17 -070077 EventDispatcher *dispatcher,
Thieu Le3426c8f2012-01-11 17:35:11 -080078 Metrics *metrics,
Chris Masone2ae797d2011-08-23 20:41:00 -070079 GLib *glib,
80 const std::string &run_directory,
81 const std::string &storage_directory,
82 const std::string &user_storage_format);
Chris Masone3bd3c8c2011-06-13 08:20:26 -070083 virtual ~Manager();
mukesh agrawal8f317b62011-07-15 11:53:23 -070084
85 void AddDeviceToBlackList(const std::string &device_name);
Gary Morainac1bdb42012-02-16 17:42:29 -080086
Thieu Lefb46caf2012-03-08 11:57:15 -080087 virtual void Start();
Thieu Le6c1e3bb2013-02-06 15:20:35 -080088 virtual void Stop();
Darin Petkovcb0b5662012-12-13 09:59:44 +010089 bool running() const { return running_; }
Paul Stewart75897df2011-04-27 09:05:53 -070090
Paul Stewart1b253142012-01-26 14:05:52 -080091 const ProfileRefPtr &ActiveProfile() const;
92 bool IsActiveProfile(const ProfileRefPtr &profile) const;
Chris Masone6515aab2011-10-12 16:19:09 -070093 bool MoveServiceToProfile(const ServiceRefPtr &to_move,
94 const ProfileRefPtr &destination);
Paul Stewart7f61e522012-03-22 11:13:45 -070095 ProfileRefPtr LookupProfileByRpcIdentifier(const std::string &profile_rpcid);
Chris Masone7aa5f902011-07-11 11:13:35 -070096
Paul Stewart1b1a7f22012-01-06 16:24:06 -080097 // Called via RPC call on Service (|to_set|) to set the "Profile" property.
98 void SetProfileForService(const ServiceRefPtr &to_set,
99 const std::string &profile,
100 Error *error);
101
Paul Stewart8c116a92012-05-02 18:30:03 -0700102 virtual void RegisterDevice(const DeviceRefPtr &to_manage);
103 virtual void DeregisterDevice(const DeviceRefPtr &to_forget);
Chris Masone9be4a9d2011-05-16 15:44:09 -0700104
mukesh agrawal4eb4d782011-12-05 17:34:37 +0000105 virtual bool HasService(const ServiceRefPtr &service);
mukesh agrawal8a3188d2011-12-01 20:56:44 +0000106 // Register a Service with the Manager. Manager may choose to
107 // connect to it immediately.
mukesh agrawal32399322011-09-01 10:53:43 -0700108 virtual void RegisterService(const ServiceRefPtr &to_manage);
mukesh agrawal8a3188d2011-12-01 20:56:44 +0000109 // Deregister a Service from the Manager. Caller is responsible
110 // for disconnecting the Service before-hand.
Chris Masone6515aab2011-10-12 16:19:09 -0700111 virtual void DeregisterService(const ServiceRefPtr &to_forget);
mukesh agrawal00917ce2011-11-22 23:56:55 +0000112 virtual void UpdateService(const ServiceRefPtr &to_update);
Chris Masone9be4a9d2011-05-16 15:44:09 -0700113
Darin Petkove7c6ad32012-06-29 10:22:09 +0200114 // Persists |to_update| into an appropriate profile.
115 virtual void UpdateDevice(const DeviceRefPtr &to_update);
116
Paul Stewartfdd16072011-09-16 12:41:35 -0700117 void FilterByTechnology(Technology::Identifier tech,
Paul Stewart3c504012013-01-17 17:49:58 -0800118 std::vector<DeviceRefPtr> *found) const;
Chris Masone9be4a9d2011-05-16 15:44:09 -0700119
Chris Masonee0dea762011-06-09 09:06:03 -0700120 ServiceRefPtr FindService(const std::string& name);
Gaurav Shah1b7a6162011-11-09 11:41:01 -0800121 std::vector<std::string> EnumerateAvailableServices(Error *error);
Chris Masone9be4a9d2011-05-16 15:44:09 -0700122
Paul Stewart3c504012013-01-17 17:49:58 -0800123 // Return the complete list of services, including those that are not visible.
124 std::vector<std::string> EnumerateCompleteServices(Error *error);
125
mukesh agrawal32399322011-09-01 10:53:43 -0700126 // called via RPC (e.g., from ManagerDBusAdaptor)
Darin Petkovb65c2452012-02-23 15:17:06 +0100127 ServiceRefPtr GetService(const KeyValueStore &args, Error *error);
Paul Stewart7f5ad572012-06-04 15:18:54 -0700128 ServiceRefPtr ConfigureService(const KeyValueStore &args, Error *error);
Paul Stewart7a20aa42013-01-17 12:21:41 -0800129 ServiceRefPtr FindMatchingService(const KeyValueStore &args, Error *error);
Gaurav Shahb790aa22012-10-23 12:51:12 -0700130 std::map<std::string, GeolocationInfos> GetNetworksForGeolocation();
Paul Stewart7f61e522012-03-22 11:13:45 -0700131
Paul Stewartc681fa02012-03-02 19:40:04 -0800132 // Request portal detection checks on each registered device until a portal
133 // detection attempt starts on one of them.
134 void RecheckPortal(Error *error);
Paul Stewartd215af62012-04-24 23:25:50 -0700135 // Request portal detection be restarted on the device connected to
136 // |service|.
137 virtual void RecheckPortalOnService(const ServiceRefPtr &service);
138
Paul Stewart3c504012013-01-17 17:49:58 -0800139 virtual void RequestScan(const std::string &technology, Error *error);
Paul Stewart22aa71b2011-09-16 12:15:11 -0700140 std::string GetTechnologyOrder();
141 void SetTechnologyOrder(const std::string &order, Error *error);
Gaurav Shah71354762011-11-28 19:22:49 -0800142 // Set up the profile list starting with a default profile along with
143 // an (optional) list of startup profiles.
144 void InitializeProfiles();
Paul Stewart19c871d2011-12-15 16:10:13 -0800145 // Create a profile. This does not affect the profile stack. Returns
146 // the RPC path of the created profile in |path|.
147 void CreateProfile(const std::string &name, std::string *path, Error *error);
Paul Stewart5dc40aa2011-10-28 19:43:43 -0700148 // Pushes existing profile with name |name| onto stack of managed profiles.
Paul Stewart19c871d2011-12-15 16:10:13 -0800149 // Returns the RPC path of the pushed profile in |path|.
150 void PushProfile(const std::string &name, std::string *path, Error *error);
Paul Stewart5dc40aa2011-10-28 19:43:43 -0700151 // Pops profile named |name| off the top of the stack of managed profiles.
152 void PopProfile(const std::string &name, Error *error);
153 // Remove the active profile.
154 void PopAnyProfile(Error *error);
Paul Stewarte73d05c2012-03-29 16:26:05 -0700155 // Remove the underlying persistent storage for a profile.
156 void RemoveProfile(const std::string &name, Error *error);
Paul Stewart75225512012-01-26 22:51:33 -0800157 // Handle the event where a profile is about to remove a profile entry.
158 // Any Services that are dependent on this storage identifier will need
159 // to find new profiles. Return true if any service has been moved to a new
160 // profile. Any such services will have had the profile group removed from
161 // the profile.
162 virtual bool HandleProfileEntryDeletion(const ProfileRefPtr &profile,
163 const std::string &entry_name);
Paul Stewart13ed2252012-03-21 12:52:46 -0700164 // Find a registered service that contains a GUID property that
165 // matches |guid|.
166 virtual ServiceRefPtr GetServiceWithGUID(const std::string &guid,
167 Error *error);
Paul Stewart0756db92012-01-27 08:34:47 -0800168 // Find a service that is both the member of |profile| and has a
169 // storage identifier that matches |entry_name|. This function is
170 // called by the Profile in order to return a profile entry's properties.
171 virtual ServiceRefPtr GetServiceWithStorageIdentifier(
172 const ProfileRefPtr &profile,
173 const std::string &entry_name,
174 Error *error);
Paul Stewarte2bad7c2012-03-14 08:55:33 -0700175 // Return a reference to the Service associated with the default connection.
176 // If there is no such connection, this function returns a reference to NULL.
177 virtual ServiceRefPtr GetDefaultService() const;
Paul Stewart0756db92012-01-27 08:34:47 -0800178
Eric Shienbrood9a245532012-03-07 14:20:39 -0500179 // Enable all devices for the named technology.
180 void EnableTechnology(const std::string &technology_name,
181 Error *error,
182 const ResultCallback &callback);
183 // Disable all devices for the named technology.
184 void DisableTechnology(const std::string &technology_name,
185 Error *error,
186 const ResultCallback &callback);
Paul Stewart20088d82012-02-16 06:58:55 -0800187 // Return whether a technology is marked as enabled for portal detection.
188 virtual bool IsPortalDetectionEnabled(Technology::Identifier tech);
Paul Stewart10e9e4e2012-04-26 19:46:28 -0700189 // Set the start-up value for the portal detection list. This list will
190 // be used until a value set explicitly over the control API. Until
191 // then, we ignore but do not overwrite whatever value is stored in the
192 // profile.
193 void SetStartupPortalList(const std::string &portal_list);
Paul Stewart20088d82012-02-16 06:58:55 -0800194
Paul Stewart10ccbb32012-04-26 15:59:30 -0700195 // Return whether a service belongs to the ephemeral profile.
196 virtual bool IsServiceEphemeral(const ServiceConstRefPtr &service) const;
197
Paul Stewart3c504012013-01-17 17:49:58 -0800198 // Return whether a Technology has any connected Services.
199 virtual bool IsTechnologyConnected(Technology::Identifier technology) const;
200
Paul Stewartbf667612012-06-29 14:49:54 -0700201 // Return whether a technology is enabled for using short DNS timeouts.
202 bool IsTechnologyShortDNSTimeoutEnabled(Technology::Identifier tech) const;
203
Paul Stewart036dba02012-08-07 12:34:41 -0700204 // Return whether a technology is enabled for link monitoring.
205 virtual bool IsTechnologyLinkMonitorEnabled(
206 Technology::Identifier technology) const;
207
Paul Stewart3c504012013-01-17 17:49:58 -0800208 // Called by Profile when a |storage| completes initialization.
209 void OnProfileStorageInitialized(StoreInterface *storage);
210
211 // Return a Device with technology |technology| in the enabled state.
212 DeviceRefPtr GetEnabledDeviceWithTechnology(
213 Technology::Identifier technology) const;
Paul Stewart85aea152013-01-22 09:31:56 -0800214
Darin Petkov4cbff5b2013-01-29 16:29:05 +0100215 // Returns true if at least one connection exists, and false if there's no
216 // connected service.
217 virtual bool IsOnline() const;
Paul Stewart38fd24c2012-04-25 14:06:29 -0700218 std::string CalculateState(Error *error);
219
Paul Stewartc681fa02012-03-02 19:40:04 -0800220 virtual int GetPortalCheckInterval() const {
221 return props_.portal_check_interval_seconds;
222 }
Paul Stewart20088d82012-02-16 06:58:55 -0800223 virtual const std::string &GetPortalCheckURL() const {
224 return props_.portal_url;
225 }
mukesh agrawal32399322011-09-01 10:53:43 -0700226
Darin Petkov2b8e44e2012-06-25 15:13:26 +0200227 DBusManager *dbus_manager() const { return dbus_manager_.get(); }
Chris Masone626719f2011-08-18 16:58:48 -0700228 virtual DeviceInfo *device_info() { return &device_info_; }
Paul Stewart8c116a92012-05-02 18:30:03 -0700229 virtual ModemInfo *modem_info() { return &modem_info_; }
Darin Petkovcb0b5662012-12-13 09:59:44 +0100230 PowerManager *power_manager() const { return power_manager_.get(); }
Paul Stewart8c116a92012-05-02 18:30:03 -0700231 virtual VPNProvider *vpn_provider() { return &vpn_provider_; }
Paul Stewart3c504012013-01-17 17:49:58 -0800232 virtual WiFiProvider *wifi_provider() { return wifi_provider_.get(); }
Darin Petkovb72b62e2012-05-15 16:55:36 +0200233 virtual WiMaxProvider *wimax_provider() { return &wimax_provider_; }
mukesh agrawalde29fa82011-09-16 16:16:36 -0700234 PropertyStore *mutable_store() { return &store_; }
235 virtual const PropertyStore &store() const { return store_; }
Darin Petkov36a3ace2012-03-06 17:22:14 +0100236 GLib *glib() const { return glib_; }
Albert Chaulk0e1cdea2013-02-27 15:32:55 -0800237 virtual const base::FilePath &run_path() const { return run_path_; }
238 const base::FilePath &storage_path() const { return storage_path_; }
Chris Masoneb925cc82011-06-22 15:39:57 -0700239
Gaurav Shah71354762011-11-28 19:22:49 -0800240 void set_startup_profiles(const std::vector<std::string> &startup_profiles) {
241 startup_profiles_ = startup_profiles;
242 }
Paul Stewartd408fdf2012-05-07 17:15:57 -0700243 bool GetArpGateway() const { return props_.arp_gateway; }
244 const std::string &GetHostName() const { return props_.host_name; }
Chris Masone877ff982011-09-21 16:18:24 -0700245
Daniel Erat0818cca2012-12-14 10:16:21 -0800246 int suspend_delay_id_for_testing() const { return suspend_delay_id_; }
247
Eric Shienbrood9a245532012-03-07 14:20:39 -0500248 virtual void UpdateEnabledTechnologies();
Ben Chan5086b972013-01-15 21:51:38 -0800249 virtual void UpdateUninitializedTechnologies();
Gary Morainac1bdb42012-02-16 17:42:29 -0800250
Gary Moraind93615e2012-04-27 11:50:03 -0700251 // Writes the service |to_update| to persistant storage. If the service's is
252 // ephemeral, it is moved to the current profile.
253 void SaveServiceToProfile(const ServiceRefPtr &to_update);
254
Gary Moraina9fb3252012-05-31 12:05:31 -0700255 // Adds a closure to be executed when ChromeOS suspends or shill terminates.
256 // |name| should be unique; otherwise, a previous closure by the same name
257 // will be replaced. |start| will be called when RunTerminationActions() is
258 // called. When an action completed, TerminationActionComplete() must be
259 // called.
260 void AddTerminationAction(const std::string &name,
261 const base::Closure &start);
262
263 // Users call this function to report the completion of an action |name|.
264 // This function should be called once for each action.
265 void TerminationActionComplete(const std::string &name);
266
267 // Removes the action associtated with |name|.
268 void RemoveTerminationAction(const std::string &name);
269
Arman Ugurayab22c162012-10-08 19:08:38 -0700270 // Runs the termination actions and notifies the metrics framework
271 // that the termination actions started running, only if any termination
272 // actions have been registered. |reason| specifies whether this method was
273 // called due to termination or suspend. If all actions complete within
Darin Petkov3ec55342012-09-28 14:04:44 +0200274 // |kTerminationActionsTimeoutMilliseconds|, |done| is called with a value of
Arman Ugurayab22c162012-10-08 19:08:38 -0700275 // Error::kSuccess. Otherwise, it is called with Error::kOperationTimeout.
276 //
277 // Returns true, if termination actions were run.
278 bool RunTerminationActionsAndNotifyMetrics(
279 const base::Callback<void(const Error &)> &done,
280 Metrics::TerminationActionReason reason);
Gary Moraina9fb3252012-05-31 12:05:31 -0700281
Darin Petkova5e07ef2012-07-09 14:27:57 +0200282 // Registers a |callback| that's invoked whenever the default service
283 // changes. Returns a unique tag that can be used to deregister the
284 // callback. A tag equal to 0 is invalid.
285 virtual int RegisterDefaultServiceCallback(const ServiceCallback &callback);
286 virtual void DeregisterDefaultServiceCallback(int tag);
287
Christopher Wiley0d9cf0c2013-02-19 19:24:57 -0800288 // Verifies that the destination described by certificate is valid, and that
289 // we're currently connected to that destination. A full description of the
290 // rules being enforced is in doc/manager-api.txt. Returns true iff all
291 // checks pass, false otherwise. On false, error is filled with a
292 // descriptive error code and message.
293 //
294 // |certificate| is a PEM encoded x509 certificate, |public_key| is a base64
295 // encoded public half of an RSA key, |nonce| is a random string, and
296 // |signed_data| is a base64 encoded string as described in
297 // doc/manager-api.txt.
298 void VerifyDestination(const std::string &certificate,
299 const std::string &public_key,
300 const std::string &nonce,
301 const std::string &signed_data,
302 const std::string &destination_udn,
303 const ResultBoolCallback &cb,
304 Error *error);
305
306 // After verifying the destination, encrypt the string data with
307 // |public_key|, the base64 encoded public half of an RSA key pair. Returns
308 // the base64 encoded result if successful, or an empty string on failure.
309 // On failure, |error| will be filled with an appropriately descriptive
310 // message and error code.
311 void VerifyAndEncryptData(const std::string &certificate,
312 const std::string &public_key,
313 const std::string &nonce,
314 const std::string &signed_data,
315 const std::string &destination_udn,
316 const std::string &data,
317 const ResultStringCallback &cb,
318 Error *error);
319
320 // After verifying the destination, encrypt the password for |network_path|
321 // under |public_key|. Similar to EncryptData above except that the
322 // information being encrypted is implicitly the authentication credentials
323 // of the given network.
324 void VerifyAndEncryptCredentials(const std::string &certificate,
325 const std::string &public_key,
326 const std::string &nonce,
327 const std::string &signed_data,
328 const std::string &destination_udn,
329 const std::string &network_path,
330 const ResultStringCallback &cb,
331 Error *error);
332
Paul Stewart75897df2011-04-27 09:05:53 -0700333 private:
Arman Ugurayab22c162012-10-08 19:08:38 -0700334 friend class CellularTest;
Darin Petkov6f9eaa32011-08-09 15:26:44 -0700335 friend class ManagerAdaptorInterface;
Paul Stewart22aa71b2011-09-16 12:15:11 -0700336 friend class ManagerTest;
Darin Petkovcb0b5662012-12-13 09:59:44 +0100337 friend class ServiceTest;
Paul Stewarte369ece2012-05-22 09:11:03 -0700338 friend class WiFiObjectTest;
Darin Petkovb501ad22012-07-03 12:50:52 +0200339 friend class WiMaxProviderTest;
Arman Ugurayab22c162012-10-08 19:08:38 -0700340
Liam McLoughlin0fec81c2013-02-28 10:31:47 -0500341 FRIEND_TEST_ALL_PREFIXES(CellularTest, ConnectAddsTerminationAction);
Arman Uguray32c76402012-11-27 14:01:13 -0800342 FRIEND_TEST(CellularTest, LinkEventWontDestroyService);
Gaurav Shah435de2c2011-11-17 19:01:07 -0800343 FRIEND_TEST(ManagerTest, AvailableTechnologies);
344 FRIEND_TEST(ManagerTest, ConnectedTechnologies);
345 FRIEND_TEST(ManagerTest, DefaultTechnology);
Paul Stewart1b253142012-01-26 14:05:52 -0800346 FRIEND_TEST(ManagerTest, DeviceRegistrationAndStart);
Darin Petkova5e07ef2012-07-09 14:27:57 +0200347 FRIEND_TEST(ManagerTest, DisableTechnology);
348 FRIEND_TEST(ManagerTest, EnableTechnology);
Paul Stewart1b253142012-01-26 14:05:52 -0800349 FRIEND_TEST(ManagerTest, EnumerateProfiles);
Paul Stewart65512e12012-03-26 18:01:08 -0700350 FRIEND_TEST(ManagerTest, HandleProfileEntryDeletionWithUnload);
Paul Stewart3c504012013-01-17 17:49:58 -0800351 FRIEND_TEST(ManagerTest, IsDefaultProfile);
Paul Stewart036dba02012-08-07 12:34:41 -0700352 FRIEND_TEST(ManagerTest, LinkMonitorEnabled);
Darin Petkova5e07ef2012-07-09 14:27:57 +0200353 FRIEND_TEST(ManagerTest, NotifyDefaultServiceChanged);
Paul Stewart65512e12012-03-26 18:01:08 -0700354 FRIEND_TEST(ManagerTest, PopProfileWithUnload);
Arman Ugurayab22c162012-10-08 19:08:38 -0700355 FRIEND_TEST(ManagerTest, RunTerminationActions);
Paul Stewart1b253142012-01-26 14:05:52 -0800356 FRIEND_TEST(ManagerTest, SortServices);
357 FRIEND_TEST(ManagerTest, SortServicesWithConnection);
Paul Stewart10e9e4e2012-04-26 19:46:28 -0700358 FRIEND_TEST(ManagerTest, StartupPortalList);
Darin Petkov6f9eaa32011-08-09 15:26:44 -0700359
Darin Petkovb65c2452012-02-23 15:17:06 +0100360 static const char kErrorNoDevice[];
361 static const char kErrorTypeRequired[];
362 static const char kErrorUnsupportedServiceType[];
363
Darin Petkov3ec55342012-09-28 14:04:44 +0200364 // Time to wait for termination actions to complete.
365 static const int kTerminationActionsTimeoutMilliseconds;
366
367 static const char kPowerManagerKey[];
368
mukesh agrawal8a3188d2011-12-01 20:56:44 +0000369 void AutoConnect();
Gaurav Shah1b7a6162011-11-09 11:41:01 -0800370 std::vector<std::string> AvailableTechnologies(Error *error);
371 std::vector<std::string> ConnectedTechnologies(Error *error);
372 std::string DefaultTechnology(Error *error);
373 std::vector<std::string> EnabledTechnologies(Error *error);
Ben Chan5086b972013-01-15 21:51:38 -0800374 std::vector<std::string> UninitializedTechnologies(Error *error);
Paul Stewartcb3eb892012-06-07 14:24:46 -0700375 RpcIdentifiers EnumerateDevices(Error *error);
376 RpcIdentifiers EnumerateProfiles(Error *error);
Chris Masone6791a432011-07-12 13:23:19 -0700377 // TODO(cmasone): This should be implemented by filtering |services_|.
Paul Stewartcb3eb892012-06-07 14:24:46 -0700378 RpcIdentifiers EnumerateWatchedServices(Error *error);
Paul Stewart1b253142012-01-26 14:05:52 -0800379 std::string GetActiveProfileRpcIdentifier(Error *error);
Paul Stewart10e9e4e2012-04-26 19:46:28 -0700380 std::string GetCheckPortalList(Error *error);
Paul Stewart49739c02012-08-08 17:24:03 -0700381 RpcIdentifier GetDefaultServiceRpcIdentifier(Error *error);
Paul Stewart4d5efb72012-09-17 12:24:34 -0700382 std::string GetIgnoredDNSSearchPaths(Error *error);
Paul Stewart7f5ad572012-06-04 15:18:54 -0700383 ServiceRefPtr GetServiceInner(const KeyValueStore &args, Error *error);
Paul Stewart10e9e4e2012-04-26 19:46:28 -0700384 void SetCheckPortalList(const std::string &portal_list, Error *error);
Paul Stewart4d5efb72012-09-17 12:24:34 -0700385 void SetIgnoredDNSSearchPaths(const std::string &ignored_paths, Error *error);
Paul Stewart49739c02012-08-08 17:24:03 -0700386 void EmitDefaultService();
Paul Stewart036dba02012-08-07 12:34:41 -0700387 bool IsTechnologyInList(const std::string &technology_list,
388 Technology::Identifier tech) const;
Paul Stewart3c504012013-01-17 17:49:58 -0800389 bool IsDefaultProfile(StoreInterface *storage);
Eric Shienbrood8839a892012-03-29 10:33:48 -0400390 void EmitDeviceProperties();
Chris Masoneb925cc82011-06-22 15:39:57 -0700391
Paul Stewart65512e12012-03-26 18:01:08 -0700392 // Unload a service while iterating through |services_|. Returns true if
393 // service was erased (which means the caller loop should not increment
394 // |service_iterator|), false otherwise (meaning the caller should
395 // increment |service_iterator|).
396 bool UnloadService(std::vector<ServiceRefPtr>::iterator *service_iterator);
397
Paul Stewart4d5efb72012-09-17 12:24:34 -0700398 // Load Manager default properties from |profile|.
399 bool LoadProperties(const scoped_refptr<DefaultProfile> &profile);
400
Paul Stewart3c504012013-01-17 17:49:58 -0800401 // Configure the device with profile data from all current profiles.
402 void LoadDeviceFromProfiles(const DeviceRefPtr &device);
403
Paul Stewart49739c02012-08-08 17:24:03 -0700404 void HelpRegisterConstDerivedRpcIdentifier(
405 const std::string &name,
406 RpcIdentifier(Manager::*get)(Error *));
mukesh agrawal2366eed2012-03-20 18:21:50 -0700407 void HelpRegisterConstDerivedRpcIdentifiers(
408 const std::string &name,
409 RpcIdentifiers(Manager::*get)(Error *));
mukesh agrawalffa3d042011-10-06 15:26:10 -0700410 void HelpRegisterDerivedString(
411 const std::string &name,
Gaurav Shah1b7a6162011-11-09 11:41:01 -0800412 std::string(Manager::*get)(Error *),
mukesh agrawalffa3d042011-10-06 15:26:10 -0700413 void(Manager::*set)(const std::string&, Error *));
414 void HelpRegisterDerivedStrings(
415 const std::string &name,
Gaurav Shah1b7a6162011-11-09 11:41:01 -0800416 Strings(Manager::*get)(Error *),
mukesh agrawalffa3d042011-10-06 15:26:10 -0700417 void(Manager::*set)(const Strings&, Error *));
Chris Masone27c4aa52011-07-02 13:10:14 -0700418
Paul Stewart5dc40aa2011-10-28 19:43:43 -0700419 void PopProfileInternal();
Paul Stewart22aa71b2011-09-16 12:15:11 -0700420 void SortServices();
Paul Stewartdfa46052012-06-26 09:44:14 -0700421 void SortServicesTask();
Paul Stewart75225512012-01-26 22:51:33 -0800422 bool MatchProfileWithService(const ServiceRefPtr &service);
Paul Stewart22aa71b2011-09-16 12:15:11 -0700423
Darin Petkova5e07ef2012-07-09 14:27:57 +0200424 void NotifyDefaultServiceChanged(const ServiceRefPtr &service);
425
Arman Ugurayab22c162012-10-08 19:08:38 -0700426 // Runs the termination actions. If all actions complete within
427 // |kTerminationActionsTimeoutMilliseconds|, |done| is called with a value of
428 // Error::kSuccess. Otherwise, it is called with Error::kOperationTimeout.
429 void RunTerminationActions(const base::Callback<void(const Error &)> &done);
430
Darin Petkovca621542012-07-25 14:25:56 +0200431 void OnPowerStateChanged(PowerManagerProxyDelegate::SuspendState power_state);
Daniel Erat0818cca2012-12-14 10:16:21 -0800432 void OnSuspendImminent(int suspend_id);
Darin Petkov3ec55342012-09-28 14:04:44 +0200433
Daniel Erat0818cca2012-12-14 10:16:21 -0800434 void OnSuspendActionsComplete(int suspend_id, const Error &error);
Darin Petkovca621542012-07-25 14:25:56 +0200435
Thieu Lea20cbc22012-01-09 22:01:43 +0000436 // For unit testing.
437 void set_metrics(Metrics *metrics) { metrics_ = metrics; }
438
Gary Morainac1bdb42012-02-16 17:42:29 -0800439 // Used by tests to set a mock PowerManager. Takes ownership of
440 // power_manager.
441 void set_power_manager(PowerManager *power_manager) {
442 power_manager_.reset(power_manager);
443 }
444
mukesh agrawal8a3188d2011-12-01 20:56:44 +0000445 EventDispatcher *dispatcher_;
Albert Chaulk0e1cdea2013-02-27 15:32:55 -0800446 const base::FilePath run_path_;
447 const base::FilePath storage_path_;
Chris Masone2ae797d2011-08-23 20:41:00 -0700448 const std::string user_storage_format_;
Paul Stewart0af98bf2011-05-10 17:38:08 -0700449 scoped_ptr<ManagerAdaptorInterface> adaptor_;
Darin Petkov002c58e2012-06-19 02:56:05 +0200450 scoped_ptr<DBusManager> dbus_manager_;
Paul Stewart0af98bf2011-05-10 17:38:08 -0700451 DeviceInfo device_info_;
Darin Petkov887f2982011-07-14 16:10:17 -0700452 ModemInfo modem_info_;
Darin Petkov33af05c2012-02-28 10:10:30 +0100453 VPNProvider vpn_provider_;
Paul Stewart3c504012013-01-17 17:49:58 -0800454 scoped_ptr<WiFiProvider> wifi_provider_;
Darin Petkovb72b62e2012-05-15 16:55:36 +0200455 WiMaxProvider wimax_provider_;
Paul Stewart4d5efb72012-09-17 12:24:34 -0700456 // Hold pointer to singleton Resolver instance for testing purposes.
457 Resolver *resolver_;
Paul Stewart75897df2011-04-27 09:05:53 -0700458 bool running_;
Paul Stewart5dc40aa2011-10-28 19:43:43 -0700459 // Used to facilitate unit tests which can't use RPC.
460 bool connect_profiles_to_rpc_;
Chris Masonec1e50412011-06-07 13:04:53 -0700461 std::vector<DeviceRefPtr> devices_;
Chris Masone6791a432011-07-12 13:23:19 -0700462 // We store Services in a vector, because we want to keep them sorted.
Gary Morain028545d2012-04-07 14:55:52 -0700463 // Services that are connected appear first in the vector. See
464 // Service::Compare() for details of the sorting criteria.
Chris Masonec1e50412011-06-07 13:04:53 -0700465 std::vector<ServiceRefPtr> services_;
Gaurav Shah71354762011-11-28 19:22:49 -0800466 // List of startup profile names to push on the profile stack on startup.
467 std::vector<std::string> startup_profiles_;
Chris Masone7aa5f902011-07-11 11:13:35 -0700468 std::vector<ProfileRefPtr> profiles_;
469 ProfileRefPtr ephemeral_profile_;
Chris Masone2ae797d2011-08-23 20:41:00 -0700470 ControlInterface *control_interface_;
Thieu Le3426c8f2012-01-11 17:35:11 -0800471 Metrics *metrics_;
Chris Masone2ae797d2011-08-23 20:41:00 -0700472 GLib *glib_;
Gary Morainac1bdb42012-02-16 17:42:29 -0800473 scoped_ptr<PowerManager> power_manager_;
Chris Masone3bd3c8c2011-06-13 08:20:26 -0700474
Paul Stewart22aa71b2011-09-16 12:15:11 -0700475 // The priority order of technologies
476 std::vector<Technology::Identifier> technology_order_;
477
Paul Stewart49739c02012-08-08 17:24:03 -0700478 // This is the last Service RPC Identifier for which we emitted a
479 // "DefaultService" signal for.
480 RpcIdentifier default_service_rpc_identifier_;
481
Paul Stewart10e9e4e2012-04-26 19:46:28 -0700482 // Manager can be optionally configured with a list of technologies to
483 // do portal detection on at startup. We need to keep track of that list
484 // as well as a flag that tells us whether we should continue using it
485 // instead of the configured portal list.
486 std::string startup_portal_list_;
487 bool use_startup_portal_list_;
488
Chris Masoneb925cc82011-06-22 15:39:57 -0700489 // Properties to be get/set via PropertyStore calls.
Chris Masone88cbd5f2011-07-03 14:30:04 -0700490 Properties props_;
Chris Masone27c4aa52011-07-02 13:10:14 -0700491 PropertyStore store_;
Gary Moraina9fb3252012-05-31 12:05:31 -0700492
Paul Stewartdfa46052012-06-26 09:44:14 -0700493 base::CancelableClosure sort_services_task_;
Darin Petkov3ec55342012-09-28 14:04:44 +0200494
495 // TODO(petkov): Currently this handles both terminate and suspend
496 // actions. Rename all relevant identifiers to capture this.
Gary Moraina9fb3252012-05-31 12:05:31 -0700497 HookTable termination_actions_;
Darin Petkova5e07ef2012-07-09 14:27:57 +0200498
Daniel Erat0818cca2012-12-14 10:16:21 -0800499 // Is a suspend delay currently registered with the power manager?
500 bool suspend_delay_registered_;
501
502 // If |suspend_delay_registered_| is true, contains the unique ID
503 // corresponding to the suspend delay.
504 int suspend_delay_id_;
505
Darin Petkova5e07ef2012-07-09 14:27:57 +0200506 // Maps tags to callbacks for monitoring default service changes.
507 std::map<int, ServiceCallback> default_service_callbacks_;
508 int default_service_callback_tag_;
Paul Stewart75897df2011-04-27 09:05:53 -0700509};
510
511} // namespace shill
512
Darin Petkov002c58e2012-06-19 02:56:05 +0200513#endif // SHILL_MANAGER_H_