blob: 61bb20ad00ed722b937ed9309cbe36ef45e47b48 [file] [log] [blame]
mukesh agrawal8a3188d2011-12-01 20:56:44 +00001// Copyright (c) 2012 The Chromium OS Authors. All rights reserved.
Paul Stewart75897df2011-04-27 09:05:53 -07002// Use of this source code is governed by a BSD-style license that can be
3// found in the LICENSE file.
4
Darin Petkov002c58e2012-06-19 02:56:05 +02005#ifndef SHILL_MANAGER_H_
6#define SHILL_MANAGER_H_
Paul Stewart75897df2011-04-27 09:05:53 -07007
Darin Petkova5e07ef2012-07-09 14:27:57 +02008#include <map>
Ben Chancd477322014-10-17 14:19:30 -07009#include <memory>
Chris Masone9be4a9d2011-05-16 15:44:09 -070010#include <string>
Paul Stewart75897df2011-04-27 09:05:53 -070011#include <vector>
Chris Masone487b8bf2011-05-13 16:27:57 -070012
Paul Stewartdfa46052012-06-26 09:44:14 -070013#include <base/cancelable_callback.h>
Ben Chana0ddf462014-02-06 11:32:42 -080014#include <base/files/file_path.h>
Ben Chancc67c522014-09-03 07:19:18 -070015#include <base/macros.h>
Chris Masone9be4a9d2011-05-16 15:44:09 -070016#include <base/memory/ref_counted.h>
Eric Shienbrood3e20a232012-02-16 11:35:56 -050017#include <base/memory/weak_ptr.h>
Chris Masone88cbd5f2011-07-03 14:30:04 -070018#include <chromeos/dbus/service_constants.h>
Paul Stewart22aa71b2011-09-16 12:15:11 -070019#include <gtest/gtest_prod.h> // for FRIEND_TEST
Paul Stewart75897df2011-04-27 09:05:53 -070020
Ben Chanc54afe52014-11-05 10:28:08 -080021#include "shill/cellular/modem_info.h"
Christopher Wiley1057cd72013-02-28 15:21:29 -080022#include "shill/crypto_util_proxy.h"
Paul Stewart75897df2011-04-27 09:05:53 -070023#include "shill/device.h"
Paul Stewart0af98bf2011-05-10 17:38:08 -070024#include "shill/device_info.h"
Paul Stewart26b327e2011-10-19 11:38:09 -070025#include "shill/event_dispatcher.h"
Gaurav Shahb790aa22012-10-23 12:51:12 -070026#include "shill/geolocation_info.h"
Gary Moraina9fb3252012-05-31 12:05:31 -070027#include "shill/hook_table.h"
Arman Ugurayab22c162012-10-08 19:08:38 -070028#include "shill/metrics.h"
Garret Kellyc5f89d12015-02-18 14:39:36 -050029#include "shill/net/ip_address.h"
Gary Morainac1bdb42012-02-16 17:42:29 -080030#include "shill/power_manager.h"
Paul Stewartf3eced92013-04-17 12:18:22 -070031#include "shill/profile.h"
Chris Masoneb925cc82011-06-22 15:39:57 -070032#include "shill/property_store.h"
Chris Masone9be4a9d2011-05-16 15:44:09 -070033#include "shill/service.h"
Paul Stewart59a8cba2015-01-09 15:48:19 -080034#include "shill/upstart/upstart.h"
Ben Chand6a8b512014-11-18 10:45:15 -080035#include "shill/wifi/wifi.h"
Ben Chanc3d707d2014-10-31 08:56:05 -070036#include "shill/wimax/wimax_provider.h"
Paul Stewart75897df2011-04-27 09:05:53 -070037
38namespace shill {
39
Chris Masoned0ceb8c2011-06-02 10:05:39 -070040class ControlInterface;
Darin Petkov002c58e2012-06-19 02:56:05 +020041class DBusManager;
Peter Qiu7e8b8ee2014-11-25 13:55:57 -080042class DeviceClaimer;
Paul Stewart4d5efb72012-09-17 12:24:34 -070043class DefaultProfile;
Chris Masone8fe2c7e2011-06-09 15:51:19 -070044class Error;
Paul Stewart35eff132013-04-12 12:08:40 -070045class EthernetEapProvider;
Chris Masoned0ceb8c2011-06-02 10:05:39 -070046class EventDispatcher;
Prathmesh Prabhuba99b592013-04-17 15:13:14 -070047class IPAddressStore;
Thieu Le3426c8f2012-01-11 17:35:11 -080048class ManagerAdaptorInterface;
Paul Stewart4d5efb72012-09-17 12:24:34 -070049class Resolver;
Paul Stewart85aea152013-01-22 09:31:56 -080050class StoreInterface;
Darin Petkovc3505a52013-03-18 15:13:29 +010051class VPNProvider;
Paul Stewart3c504012013-01-17 17:49:58 -080052class WiFiProvider;
Chris Masoned0ceb8c2011-06-02 10:05:39 -070053
Eric Shienbrood3e20a232012-02-16 11:35:56 -050054class Manager : public base::SupportsWeakPtr<Manager> {
Paul Stewart75897df2011-04-27 09:05:53 -070055 public:
Darin Petkova5e07ef2012-07-09 14:27:57 +020056 typedef base::Callback<void(const ServiceRefPtr &service)> ServiceCallback;
57
Chris Masone88cbd5f2011-07-03 14:30:04 -070058 struct Properties {
59 public:
Paul Stewartc681fa02012-03-02 19:40:04 -080060 Properties()
Paul Stewartd408fdf2012-05-07 17:15:57 -070061 : offline_mode(false),
62 portal_check_interval_seconds(0),
Peter Qiu9d581932014-04-14 16:37:37 -070063 arp_gateway(true),
64 connection_id_salt(0) {}
Chris Masone88cbd5f2011-07-03 14:30:04 -070065 bool offline_mode;
66 std::string check_portal_list;
67 std::string country;
Ben Chan7fab8972014-08-10 17:14:46 -070068 int32_t portal_check_interval_seconds;
Chris Masone88cbd5f2011-07-03 14:30:04 -070069 std::string portal_url;
Paul Stewartd32f4842012-01-11 16:08:13 -080070 std::string host_name;
Paul Stewartd408fdf2012-05-07 17:15:57 -070071 // Whether to ARP for the default gateway in the DHCP client after
72 // acquiring a lease.
73 bool arp_gateway;
Paul Stewart036dba02012-08-07 12:34:41 -070074 // Comma-separated list of technologies for which link-monitoring is
75 // enabled.
76 std::string link_monitor_technologies;
Ben Chan8e6b8ef2014-07-14 21:50:18 -070077 // Comma-separated list of technologies for which auto-connect is disabled.
78 std::string no_auto_connect_technologies;
Paul Stewartff6be292014-11-24 17:05:03 -080079 // Comma-separated list of technologies that should never be enabled.
80 std::string prohibited_technologies;
Paul Stewart4d5efb72012-09-17 12:24:34 -070081 // Comma-separated list of DNS search paths to be ignored.
82 std::string ignored_dns_search_paths;
Garret Kellyc5f89d12015-02-18 14:39:36 -050083 // Comma-separated list of DNS servers to prepend to resolver list.
84 std::string prepend_dns_servers;
Peter Qiu9d581932014-04-14 16:37:37 -070085 // Salt value use for calculating network connection ID.
86 int connection_id_salt;
Chris Masone88cbd5f2011-07-03 14:30:04 -070087 };
88
Chris Masone9be4a9d2011-05-16 15:44:09 -070089 Manager(ControlInterface *control_interface,
Darin Petkov887f2982011-07-14 16:10:17 -070090 EventDispatcher *dispatcher,
Thieu Le3426c8f2012-01-11 17:35:11 -080091 Metrics *metrics,
Chris Masone2ae797d2011-08-23 20:41:00 -070092 GLib *glib,
93 const std::string &run_directory,
94 const std::string &storage_directory,
Jason Simmons5a2097c2015-02-10 18:03:08 -080095 const std::string &user_storage_directory,
96 const std::vector<Technology::Identifier> &default_technology_order);
Chris Masone3bd3c8c2011-06-13 08:20:26 -070097 virtual ~Manager();
mukesh agrawal8f317b62011-07-15 11:53:23 -070098
99 void AddDeviceToBlackList(const std::string &device_name);
Gary Morainac1bdb42012-02-16 17:42:29 -0800100
Thieu Lefb46caf2012-03-08 11:57:15 -0800101 virtual void Start();
Thieu Le6c1e3bb2013-02-06 15:20:35 -0800102 virtual void Stop();
Darin Petkovcb0b5662012-12-13 09:59:44 +0100103 bool running() const { return running_; }
Paul Stewart75897df2011-04-27 09:05:53 -0700104
Paul Stewart1b253142012-01-26 14:05:52 -0800105 const ProfileRefPtr &ActiveProfile() const;
106 bool IsActiveProfile(const ProfileRefPtr &profile) const;
Chris Masone6515aab2011-10-12 16:19:09 -0700107 bool MoveServiceToProfile(const ServiceRefPtr &to_move,
108 const ProfileRefPtr &destination);
Paul Stewart7f61e522012-03-22 11:13:45 -0700109 ProfileRefPtr LookupProfileByRpcIdentifier(const std::string &profile_rpcid);
Chris Masone7aa5f902011-07-11 11:13:35 -0700110
Paul Stewart1b1a7f22012-01-06 16:24:06 -0800111 // Called via RPC call on Service (|to_set|) to set the "Profile" property.
Paul Stewartad0e5982013-07-02 08:47:47 -0700112 virtual void SetProfileForService(const ServiceRefPtr &to_set,
113 const std::string &profile,
114 Error *error);
Paul Stewart1b1a7f22012-01-06 16:24:06 -0800115
Paul Stewart8c116a92012-05-02 18:30:03 -0700116 virtual void RegisterDevice(const DeviceRefPtr &to_manage);
117 virtual void DeregisterDevice(const DeviceRefPtr &to_forget);
Chris Masone9be4a9d2011-05-16 15:44:09 -0700118
mukesh agrawal4eb4d782011-12-05 17:34:37 +0000119 virtual bool HasService(const ServiceRefPtr &service);
mukesh agrawal8a3188d2011-12-01 20:56:44 +0000120 // Register a Service with the Manager. Manager may choose to
121 // connect to it immediately.
mukesh agrawal32399322011-09-01 10:53:43 -0700122 virtual void RegisterService(const ServiceRefPtr &to_manage);
mukesh agrawal8a3188d2011-12-01 20:56:44 +0000123 // Deregister a Service from the Manager. Caller is responsible
124 // for disconnecting the Service before-hand.
Chris Masone6515aab2011-10-12 16:19:09 -0700125 virtual void DeregisterService(const ServiceRefPtr &to_forget);
mukesh agrawal00917ce2011-11-22 23:56:55 +0000126 virtual void UpdateService(const ServiceRefPtr &to_update);
Chris Masone9be4a9d2011-05-16 15:44:09 -0700127
Darin Petkove7c6ad32012-06-29 10:22:09 +0200128 // Persists |to_update| into an appropriate profile.
129 virtual void UpdateDevice(const DeviceRefPtr &to_update);
130
Wade Guthrie60a37062013-04-02 11:39:09 -0700131 virtual void UpdateWiFiProvider();
132
mukesh agrawala9f5dfe2014-12-16 12:56:36 -0800133 std::vector<DeviceRefPtr>
134 FilterByTechnology(Technology::Identifier tech) const;
Chris Masone9be4a9d2011-05-16 15:44:09 -0700135
Chris Masonee0dea762011-06-09 09:06:03 -0700136 ServiceRefPtr FindService(const std::string& name);
Paul Stewart19a14db2014-05-30 11:31:26 -0700137 RpcIdentifiers EnumerateAvailableServices(Error *error);
Chris Masone9be4a9d2011-05-16 15:44:09 -0700138
Paul Stewart3c504012013-01-17 17:49:58 -0800139 // Return the complete list of services, including those that are not visible.
Paul Stewart19a14db2014-05-30 11:31:26 -0700140 RpcIdentifiers EnumerateCompleteServices(Error *error);
Paul Stewart3c504012013-01-17 17:49:58 -0800141
mukesh agrawal32399322011-09-01 10:53:43 -0700142 // called via RPC (e.g., from ManagerDBusAdaptor)
Paul Stewart967eaeb2013-04-25 19:53:07 -0700143 std::map<std::string, std::string> GetLoadableProfileEntriesForService(
144 const ServiceConstRefPtr &service);
Darin Petkovb65c2452012-02-23 15:17:06 +0100145 ServiceRefPtr GetService(const KeyValueStore &args, Error *error);
Paul Stewart7f5ad572012-06-04 15:18:54 -0700146 ServiceRefPtr ConfigureService(const KeyValueStore &args, Error *error);
Paul Stewartd2e1c362013-03-03 19:06:07 -0800147 ServiceRefPtr ConfigureServiceForProfile(
148 const std::string &profile_rpcid,
149 const KeyValueStore &args,
150 Error *error);
Paul Stewart7a20aa42013-01-17 12:21:41 -0800151 ServiceRefPtr FindMatchingService(const KeyValueStore &args, Error *error);
Paul Stewart7de7e022013-08-28 09:42:50 -0700152
153 // Retrieve geolocation data from the Manager.
154 const std::map<std::string, GeolocationInfos>
155 &GetNetworksForGeolocation() const;
156
157 // Called by Device when its geolocation data has been updated.
158 virtual void OnDeviceGeolocationInfoUpdated(const DeviceRefPtr &device);
159
Paul Stewart39db5ca2013-03-18 14:15:17 -0700160 void ConnectToBestServices(Error *error);
Paul Stewart7f61e522012-03-22 11:13:45 -0700161
Rebecca Silberstein6862b382014-09-11 08:24:51 -0700162 // Method to create connectivity report for connected services.
163 void CreateConnectivityReport(Error *error);
164
Paul Stewartc681fa02012-03-02 19:40:04 -0800165 // Request portal detection checks on each registered device until a portal
166 // detection attempt starts on one of them.
167 void RecheckPortal(Error *error);
Paul Stewartd215af62012-04-24 23:25:50 -0700168 // Request portal detection be restarted on the device connected to
169 // |service|.
170 virtual void RecheckPortalOnService(const ServiceRefPtr &service);
171
Wade Guthrie68d41092013-04-02 12:56:02 -0700172 virtual void RequestScan(Device::ScanType scan_type,
173 const std::string &technology, Error *error);
Paul Stewart22aa71b2011-09-16 12:15:11 -0700174 std::string GetTechnologyOrder();
175 void SetTechnologyOrder(const std::string &order, Error *error);
Gaurav Shah71354762011-11-28 19:22:49 -0800176 // Set up the profile list starting with a default profile along with
177 // an (optional) list of startup profiles.
178 void InitializeProfiles();
Paul Stewart19c871d2011-12-15 16:10:13 -0800179 // Create a profile. This does not affect the profile stack. Returns
180 // the RPC path of the created profile in |path|.
181 void CreateProfile(const std::string &name, std::string *path, Error *error);
Paul Stewart5dc40aa2011-10-28 19:43:43 -0700182 // Pushes existing profile with name |name| onto stack of managed profiles.
Paul Stewart19c871d2011-12-15 16:10:13 -0800183 // Returns the RPC path of the pushed profile in |path|.
184 void PushProfile(const std::string &name, std::string *path, Error *error);
Paul Stewartf3eced92013-04-17 12:18:22 -0700185 // Insert an existing user profile with name |name| into the stack of
186 // managed profiles. Associate |user_hash| with this profile entry.
187 // Returns the RPC path of the pushed profile in |path|.
188 void InsertUserProfile(const std::string &name,
189 const std::string &user_hash,
190 std::string *path,
191 Error *error);
Paul Stewart5dc40aa2011-10-28 19:43:43 -0700192 // Pops profile named |name| off the top of the stack of managed profiles.
193 void PopProfile(const std::string &name, Error *error);
194 // Remove the active profile.
195 void PopAnyProfile(Error *error);
Paul Stewart307c2502013-03-23 12:32:10 -0700196 // Remove all user profiles from the stack of managed profiles leaving only
197 // default profiles.
198 void PopAllUserProfiles(Error *error);
Paul Stewarte73d05c2012-03-29 16:26:05 -0700199 // Remove the underlying persistent storage for a profile.
200 void RemoveProfile(const std::string &name, Error *error);
Peter Qiu1d499ed2015-01-30 16:01:27 -0800201 // Give the ownership of the device with name |device_name| to claimer with
202 // name |claimer_name|. This will cause shill to stop managing this device.
203 void ClaimDevice(const std::string &claimer_name,
Peter Qiu7e8b8ee2014-11-25 13:55:57 -0800204 const std::string &interface_name,
205 Error *error,
206 const ResultCallback &callback);
Peter Qiu1d499ed2015-01-30 16:01:27 -0800207 // Claimer |claimer_name| release the ownership of the device with
208 // |interface_name| back to shill.
209 void ReleaseDevice(const std::string &claimer_name,
210 const std::string &interface_name,
211 Error *error);
Paul Stewartd3d03882013-08-29 15:43:42 -0700212 // Called by a service to remove its associated configuration. If |service|
213 // is associated with a non-ephemeral profile, this configuration entry
214 // will be removed and the manager will search for another matching profile.
215 // If the service ends up with no matching profile, it is unloaded (which
216 // may also remove the service from the manager's list, e.g. WiFi services
217 // that are not visible)..
218 void RemoveService(const ServiceRefPtr &service);
Paul Stewart75225512012-01-26 22:51:33 -0800219 // Handle the event where a profile is about to remove a profile entry.
220 // Any Services that are dependent on this storage identifier will need
221 // to find new profiles. Return true if any service has been moved to a new
222 // profile. Any such services will have had the profile group removed from
223 // the profile.
224 virtual bool HandleProfileEntryDeletion(const ProfileRefPtr &profile,
225 const std::string &entry_name);
Paul Stewart13ed2252012-03-21 12:52:46 -0700226 // Find a registered service that contains a GUID property that
227 // matches |guid|.
228 virtual ServiceRefPtr GetServiceWithGUID(const std::string &guid,
229 Error *error);
Paul Stewart0756db92012-01-27 08:34:47 -0800230 // Find a service that is both the member of |profile| and has a
231 // storage identifier that matches |entry_name|. This function is
232 // called by the Profile in order to return a profile entry's properties.
233 virtual ServiceRefPtr GetServiceWithStorageIdentifier(
234 const ProfileRefPtr &profile,
235 const std::string &entry_name,
236 Error *error);
Paul Stewarte2bad7c2012-03-14 08:55:33 -0700237 // Return a reference to the Service associated with the default connection.
238 // If there is no such connection, this function returns a reference to NULL.
239 virtual ServiceRefPtr GetDefaultService() const;
Paul Stewart0756db92012-01-27 08:34:47 -0800240
mukesh agrawal46c27cc2013-07-10 16:39:10 -0700241 // Set enabled state of all |technology_name| devices to |enabled_state|.
242 void SetEnabledStateForTechnology(const std::string &technology_name,
243 bool enabled_state,
244 Error *error,
245 const ResultCallback &callback);
Paul Stewart20088d82012-02-16 06:58:55 -0800246 // Return whether a technology is marked as enabled for portal detection.
247 virtual bool IsPortalDetectionEnabled(Technology::Identifier tech);
Paul Stewart10e9e4e2012-04-26 19:46:28 -0700248 // Set the start-up value for the portal detection list. This list will
249 // be used until a value set explicitly over the control API. Until
250 // then, we ignore but do not overwrite whatever value is stored in the
251 // profile.
252 void SetStartupPortalList(const std::string &portal_list);
Paul Stewart20088d82012-02-16 06:58:55 -0800253
Paul Stewartd2e1c362013-03-03 19:06:07 -0800254 // Returns true if profile |a| has been pushed on the Manager's
255 // |profiles_| stack before profile |b|.
Paul Stewart22ce7652014-10-15 21:26:44 -0700256 virtual bool IsProfileBefore(const ProfileRefPtr &a,
257 const ProfileRefPtr &b) const;
Paul Stewartd2e1c362013-03-03 19:06:07 -0800258
Paul Stewart10ccbb32012-04-26 15:59:30 -0700259 // Return whether a service belongs to the ephemeral profile.
260 virtual bool IsServiceEphemeral(const ServiceConstRefPtr &service) const;
261
Paul Stewart3c504012013-01-17 17:49:58 -0800262 // Return whether a Technology has any connected Services.
263 virtual bool IsTechnologyConnected(Technology::Identifier technology) const;
264
Paul Stewart036dba02012-08-07 12:34:41 -0700265 // Return whether a technology is enabled for link monitoring.
266 virtual bool IsTechnologyLinkMonitorEnabled(
267 Technology::Identifier technology) const;
268
Paul Stewart8e9e41c2014-08-07 14:55:47 -0700269 // Return whether the Wake on LAN feature is enabled.
270 virtual bool IsWakeOnLanEnabled() const { return is_wake_on_lan_enabled_; }
271
Ben Chan8e6b8ef2014-07-14 21:50:18 -0700272 // Return whether a technology is disabled for auto-connect.
273 virtual bool IsTechnologyAutoConnectDisabled(
274 Technology::Identifier technology) const;
275
Paul Stewartff6be292014-11-24 17:05:03 -0800276 // Report whether |technology| is prohibited from being enabled.
277 virtual bool IsTechnologyProhibited(Technology::Identifier technology) const;
278
Paul Stewart3c504012013-01-17 17:49:58 -0800279 // Called by Profile when a |storage| completes initialization.
mukesh agrawal98424412014-09-30 15:21:52 -0700280 void OnProfileStorageInitialized(Profile *storage);
Paul Stewart3c504012013-01-17 17:49:58 -0800281
282 // Return a Device with technology |technology| in the enabled state.
283 DeviceRefPtr GetEnabledDeviceWithTechnology(
284 Technology::Identifier technology) const;
Paul Stewart85aea152013-01-22 09:31:56 -0800285
Darin Petkov4cbff5b2013-01-29 16:29:05 +0100286 // Returns true if at least one connection exists, and false if there's no
287 // connected service.
Peter Qiu700de642014-07-14 16:31:30 -0700288 virtual bool IsConnected() const;
289 // Returns true if at least one connection exists that have Internet
290 // connectivity, and false if there's no such service.
Darin Petkov4cbff5b2013-01-29 16:29:05 +0100291 virtual bool IsOnline() const;
Paul Stewart38fd24c2012-04-25 14:06:29 -0700292 std::string CalculateState(Error *error);
293
Paul Stewart03e29f72013-09-26 00:49:48 -0700294 // Recalculate the |connected_state_| string and emit a singal if it has
295 // changed.
296 void RefreshConnectionState();
297
Paul Stewartc681fa02012-03-02 19:40:04 -0800298 virtual int GetPortalCheckInterval() const {
299 return props_.portal_check_interval_seconds;
300 }
Paul Stewart20088d82012-02-16 06:58:55 -0800301 virtual const std::string &GetPortalCheckURL() const {
302 return props_.portal_url;
303 }
mukesh agrawal32399322011-09-01 10:53:43 -0700304
Darin Petkov2b8e44e2012-06-25 15:13:26 +0200305 DBusManager *dbus_manager() const { return dbus_manager_.get(); }
Chris Masone626719f2011-08-18 16:58:48 -0700306 virtual DeviceInfo *device_info() { return &device_info_; }
Ben Chan5742b242013-12-18 16:25:43 -0800307#if !defined(DISABLE_CELLULAR)
Paul Stewart8c116a92012-05-02 18:30:03 -0700308 virtual ModemInfo *modem_info() { return &modem_info_; }
Ben Chan5742b242013-12-18 16:25:43 -0800309#endif // DISABLE_CELLULAR
Darin Petkovcb0b5662012-12-13 09:59:44 +0100310 PowerManager *power_manager() const { return power_manager_.get(); }
Paul Stewart35eff132013-04-12 12:08:40 -0700311 virtual EthernetEapProvider *ethernet_eap_provider() const {
312 return ethernet_eap_provider_.get();
313 }
Darin Petkovc3505a52013-03-18 15:13:29 +0100314 VPNProvider *vpn_provider() const { return vpn_provider_.get(); }
315 WiFiProvider *wifi_provider() const { return wifi_provider_.get(); }
Ben Chan520eb172013-10-30 20:51:04 -0700316#if !defined(DISABLE_WIMAX)
Paul Stewartb87d22b2013-07-29 11:11:37 -0700317 virtual WiMaxProvider *wimax_provider() { return wimax_provider_.get(); }
Ben Chan520eb172013-10-30 20:51:04 -0700318#endif // DISABLE_WIMAX
mukesh agrawalde29fa82011-09-16 16:16:36 -0700319 PropertyStore *mutable_store() { return &store_; }
320 virtual const PropertyStore &store() const { return store_; }
Darin Petkov36a3ace2012-03-06 17:22:14 +0100321 GLib *glib() const { return glib_; }
Albert Chaulk0e1cdea2013-02-27 15:32:55 -0800322 virtual const base::FilePath &run_path() const { return run_path_; }
323 const base::FilePath &storage_path() const { return storage_path_; }
Prathmesh Prabhuba99b592013-04-17 15:13:14 -0700324 IPAddressStore * health_checker_remote_ips() const {
325 return health_checker_remote_ips_.get();
326 }
Chris Masoneb925cc82011-06-22 15:39:57 -0700327
Paul Stewartd408fdf2012-05-07 17:15:57 -0700328 bool GetArpGateway() const { return props_.arp_gateway; }
329 const std::string &GetHostName() const { return props_.host_name; }
Chris Masone877ff982011-09-21 16:18:24 -0700330
Eric Shienbrood9a245532012-03-07 14:20:39 -0500331 virtual void UpdateEnabledTechnologies();
Ben Chan5086b972013-01-15 21:51:38 -0800332 virtual void UpdateUninitializedTechnologies();
Gary Morainac1bdb42012-02-16 17:42:29 -0800333
Gary Moraind93615e2012-04-27 11:50:03 -0700334 // Writes the service |to_update| to persistant storage. If the service's is
335 // ephemeral, it is moved to the current profile.
336 void SaveServiceToProfile(const ServiceRefPtr &to_update);
337
Gary Moraina9fb3252012-05-31 12:05:31 -0700338 // Adds a closure to be executed when ChromeOS suspends or shill terminates.
339 // |name| should be unique; otherwise, a previous closure by the same name
340 // will be replaced. |start| will be called when RunTerminationActions() is
341 // called. When an action completed, TerminationActionComplete() must be
342 // called.
343 void AddTerminationAction(const std::string &name,
344 const base::Closure &start);
345
346 // Users call this function to report the completion of an action |name|.
347 // This function should be called once for each action.
348 void TerminationActionComplete(const std::string &name);
349
350 // Removes the action associtated with |name|.
351 void RemoveTerminationAction(const std::string &name);
352
Arman Ugurayab22c162012-10-08 19:08:38 -0700353 // Runs the termination actions and notifies the metrics framework
354 // that the termination actions started running, only if any termination
Samuel Tanfbe8d2b2014-09-15 20:23:59 -0700355 // actions have been registered. If all actions complete within
Ben Chan3fbf8bd2014-06-07 20:49:52 -0700356 // |kTerminationActionsTimeoutMilliseconds|, |done_callback| is called with a
357 // value of Error::kSuccess. Otherwise, it is called with
358 // Error::kOperationTimeout.
Arman Ugurayab22c162012-10-08 19:08:38 -0700359 //
360 // Returns true, if termination actions were run.
361 bool RunTerminationActionsAndNotifyMetrics(
Samuel Tanfbe8d2b2014-09-15 20:23:59 -0700362 const ResultCallback &done_callback);
Gary Moraina9fb3252012-05-31 12:05:31 -0700363
Darin Petkova5e07ef2012-07-09 14:27:57 +0200364 // Registers a |callback| that's invoked whenever the default service
365 // changes. Returns a unique tag that can be used to deregister the
366 // callback. A tag equal to 0 is invalid.
367 virtual int RegisterDefaultServiceCallback(const ServiceCallback &callback);
368 virtual void DeregisterDefaultServiceCallback(int tag);
369
Christopher Wiley0d9cf0c2013-02-19 19:24:57 -0800370 // Verifies that the destination described by certificate is valid, and that
371 // we're currently connected to that destination. A full description of the
372 // rules being enforced is in doc/manager-api.txt. Returns true iff all
373 // checks pass, false otherwise. On false, error is filled with a
374 // descriptive error code and message.
375 //
376 // |certificate| is a PEM encoded x509 certificate, |public_key| is a base64
377 // encoded public half of an RSA key, |nonce| is a random string, and
378 // |signed_data| is a base64 encoded string as described in
379 // doc/manager-api.txt.
380 void VerifyDestination(const std::string &certificate,
381 const std::string &public_key,
382 const std::string &nonce,
383 const std::string &signed_data,
384 const std::string &destination_udn,
Christopher Wileycdde79f2013-05-01 14:26:56 -0700385 const std::string &hotspot_ssid,
386 const std::string &hotspot_bssid,
Christopher Wiley0d9cf0c2013-02-19 19:24:57 -0800387 const ResultBoolCallback &cb,
388 Error *error);
389
390 // After verifying the destination, encrypt the string data with
391 // |public_key|, the base64 encoded public half of an RSA key pair. Returns
392 // the base64 encoded result if successful, or an empty string on failure.
393 // On failure, |error| will be filled with an appropriately descriptive
394 // message and error code.
395 void VerifyAndEncryptData(const std::string &certificate,
396 const std::string &public_key,
397 const std::string &nonce,
398 const std::string &signed_data,
399 const std::string &destination_udn,
Christopher Wileycdde79f2013-05-01 14:26:56 -0700400 const std::string &hotspot_ssid,
401 const std::string &hotspot_bssid,
Christopher Wiley0d9cf0c2013-02-19 19:24:57 -0800402 const std::string &data,
403 const ResultStringCallback &cb,
404 Error *error);
405
406 // After verifying the destination, encrypt the password for |network_path|
407 // under |public_key|. Similar to EncryptData above except that the
408 // information being encrypted is implicitly the authentication credentials
409 // of the given network.
410 void VerifyAndEncryptCredentials(const std::string &certificate,
411 const std::string &public_key,
412 const std::string &nonce,
413 const std::string &signed_data,
414 const std::string &destination_udn,
Christopher Wileycdde79f2013-05-01 14:26:56 -0700415 const std::string &hotspot_ssid,
416 const std::string &hotspot_bssid,
Christopher Wiley0d9cf0c2013-02-19 19:24:57 -0800417 const std::string &network_path,
418 const ResultStringCallback &cb,
419 Error *error);
420
Peter Qiu9d581932014-04-14 16:37:37 -0700421 // Calculate connection identifier, which is hash of salt value, gateway IP
422 // address, and gateway MAC address.
423 int CalcConnectionId(std::string gateway_ip, std::string gateway_mac);
424
425 // Report the number of services associated with given connection
426 // |connection_id|.
427 void ReportServicesOnSameNetwork(int connection_id);
428
Peter Qiu1d499ed2015-01-30 16:01:27 -0800429 // Running in passive mode, manager will not manage any devices (all devices
430 // are blacklisted) by default. Remote application can specify devices for
431 // shill to manage through ReleaseInterface/ClaimInterface DBus API using
432 // default claimer (with "" as claimer_name).
433 void SetPassiveMode();
434
Paul Stewart83d62562015-02-09 19:57:47 -0800435 // Decides whether Ethernet-like devices are treated as unknown devices
436 // if they do not indicate a driver name.
437 void SetIgnoreUnknownEthernet(bool ignore);
438 bool ignore_unknown_ethernet() const { return ignore_unknown_ethernet_; }
439
Garret Kellyc5f89d12015-02-18 14:39:36 -0500440 // Set the list of prepended DNS servers to |prepend_dns_servers|.
441 void SetPrependDNSServers(const std::string &prepend_dns_servers);
442
443 // Filter the list of prepended DNS servers, copying only those that match
444 // |family| into |dns_servers|. |dns_servers| is cleared, regardless of
445 // whether or not there are any addresses that match |family|.
446 virtual void FilterPrependDNSServersByFamily(
447 const IPAddress::Family family,
448 std::vector<std::string> *dns_servers);
449
Paul Stewart75897df2011-04-27 09:05:53 -0700450 private:
Arman Ugurayab22c162012-10-08 19:08:38 -0700451 friend class CellularTest;
Darin Petkovc3505a52013-03-18 15:13:29 +0100452 friend class DeviceInfoTest;
Darin Petkov6f9eaa32011-08-09 15:26:44 -0700453 friend class ManagerAdaptorInterface;
Paul Stewart22aa71b2011-09-16 12:15:11 -0700454 friend class ManagerTest;
Ben Chan66174a12014-01-08 21:27:00 -0800455 friend class ModemInfoTest;
456 friend class ModemManagerTest;
Darin Petkovcb0b5662012-12-13 09:59:44 +0100457 friend class ServiceTest;
Darin Petkovc3505a52013-03-18 15:13:29 +0100458 friend class VPNServiceTest;
Paul Stewarte369ece2012-05-22 09:11:03 -0700459 friend class WiFiObjectTest;
Darin Petkovb501ad22012-07-03 12:50:52 +0200460 friend class WiMaxProviderTest;
Arman Ugurayab22c162012-10-08 19:08:38 -0700461
Ben Chan9f3dcf82013-09-25 18:04:58 -0700462 FRIEND_TEST(CellularCapabilityUniversalMainTest, TerminationAction);
463 FRIEND_TEST(CellularCapabilityUniversalMainTest,
464 TerminationActionRemovedByStopModem);
Arman Uguray32c76402012-11-27 14:01:13 -0800465 FRIEND_TEST(CellularTest, LinkEventWontDestroyService);
Paul Stewartff6be292014-11-24 17:05:03 -0800466 FRIEND_TEST(DeviceTest, StartProhibited);
Gaurav Shah435de2c2011-11-17 19:01:07 -0800467 FRIEND_TEST(ManagerTest, AvailableTechnologies);
Peter Qiu7e8b8ee2014-11-25 13:55:57 -0800468 FRIEND_TEST(ManagerTest, ClaimDeviceWhenClaimerNotVerified);
469 FRIEND_TEST(ManagerTest, ClaimDeviceWithoutClaimer);
Gaurav Shah435de2c2011-11-17 19:01:07 -0800470 FRIEND_TEST(ManagerTest, ConnectedTechnologies);
Prathmesh Prabhu9fdb84b2014-08-21 18:41:58 -0700471 FRIEND_TEST(ManagerTest, ConnectionStatusCheck);
Paul Stewart39db5ca2013-03-18 14:15:17 -0700472 FRIEND_TEST(ManagerTest, ConnectToBestServices);
Rebecca Silberstein6862b382014-09-11 08:24:51 -0700473 FRIEND_TEST(ManagerTest, CreateConnectivityReport);
Gaurav Shah435de2c2011-11-17 19:01:07 -0800474 FRIEND_TEST(ManagerTest, DefaultTechnology);
Paul Stewart2cb3fa72014-11-13 01:43:12 -0800475 FRIEND_TEST(ManagerTest, DetectMultiHomedDevices);
Peter Qiu7e8b8ee2014-11-25 13:55:57 -0800476 FRIEND_TEST(ManagerTest, DeviceClaimerVanishedTask);
Peter Qiu94d18af2014-09-11 15:54:15 -0700477 FRIEND_TEST(ManagerTest, DevicePresenceStatusCheck);
Paul Stewart1b253142012-01-26 14:05:52 -0800478 FRIEND_TEST(ManagerTest, DeviceRegistrationAndStart);
Darin Petkova5e07ef2012-07-09 14:27:57 +0200479 FRIEND_TEST(ManagerTest, DisableTechnology);
480 FRIEND_TEST(ManagerTest, EnableTechnology);
Paul Stewart1b253142012-01-26 14:05:52 -0800481 FRIEND_TEST(ManagerTest, EnumerateProfiles);
Paul Stewart65512e12012-03-26 18:01:08 -0700482 FRIEND_TEST(ManagerTest, HandleProfileEntryDeletionWithUnload);
mukesh agrawal00752532013-05-03 15:46:55 -0700483 FRIEND_TEST(ManagerTest, InitializeProfilesInformsProviders);
484 FRIEND_TEST(ManagerTest, InitializeProfilesHandlesDefaults);
Paul Stewart3c504012013-01-17 17:49:58 -0800485 FRIEND_TEST(ManagerTest, IsDefaultProfile);
Ben Chan8e6b8ef2014-07-14 21:50:18 -0700486 FRIEND_TEST(ManagerTest, IsTechnologyAutoConnectDisabled);
Paul Stewartff6be292014-11-24 17:05:03 -0800487 FRIEND_TEST(ManagerTest, IsTechnologyProhibited);
Prathmesh Prabhu9fdb84b2014-08-21 18:41:58 -0700488 FRIEND_TEST(ManagerTest, IsWifiIdle);
Paul Stewart036dba02012-08-07 12:34:41 -0700489 FRIEND_TEST(ManagerTest, LinkMonitorEnabled);
Prathmesh Prabhu9fdb84b2014-08-21 18:41:58 -0700490 FRIEND_TEST(ManagerTest, MoveService);
Darin Petkova5e07ef2012-07-09 14:27:57 +0200491 FRIEND_TEST(ManagerTest, NotifyDefaultServiceChanged);
Peter Qiu7e8b8ee2014-11-25 13:55:57 -0800492 FRIEND_TEST(ManagerTest, OnDeviceClaimerAppeared);
Paul Stewart65512e12012-03-26 18:01:08 -0700493 FRIEND_TEST(ManagerTest, PopProfileWithUnload);
Prathmesh Prabhu9fdb84b2014-08-21 18:41:58 -0700494 FRIEND_TEST(ManagerTest, RegisterKnownService);
495 FRIEND_TEST(ManagerTest, RegisterUnknownService);
Peter Qiu7e8b8ee2014-11-25 13:55:57 -0800496 FRIEND_TEST(ManagerTest, ReleaseDevice);
Arman Ugurayab22c162012-10-08 19:08:38 -0700497 FRIEND_TEST(ManagerTest, RunTerminationActions);
Prathmesh Prabhu9fdb84b2014-08-21 18:41:58 -0700498 FRIEND_TEST(ManagerTest, ServiceRegistration);
Paul Stewart1b253142012-01-26 14:05:52 -0800499 FRIEND_TEST(ManagerTest, SortServicesWithConnection);
Paul Stewart10e9e4e2012-04-26 19:46:28 -0700500 FRIEND_TEST(ManagerTest, StartupPortalList);
Ben Chan8e6b8ef2014-07-14 21:50:18 -0700501 FRIEND_TEST(ServiceTest, IsAutoConnectable);
Darin Petkov6f9eaa32011-08-09 15:26:44 -0700502
Peter Qiu7e8b8ee2014-11-25 13:55:57 -0800503 struct DeviceClaim {
504 DeviceClaim() {}
505 DeviceClaim(const std::string &in_device_name,
506 const ResultCallback &in_result_callback)
507 : device_name(in_device_name),
508 result_callback(in_result_callback) {}
509 std::string device_name;
510 ResultCallback result_callback;
511 };
512
Darin Petkovb65c2452012-02-23 15:17:06 +0100513 static const char kErrorNoDevice[];
514 static const char kErrorTypeRequired[];
515 static const char kErrorUnsupportedServiceType[];
516
Peter Qiu94d18af2014-09-11 15:54:15 -0700517 // Technologies to probe for.
518 static const char *kProbeTechnologies[];
519
Peter Qiu1d499ed2015-01-30 16:01:27 -0800520 // Name of the default claimer.
521 static const char kDefaultClaimerName[];
522
Peter Qiu94d18af2014-09-11 15:54:15 -0700523 // Timeout interval for probing various device status, and report them to
524 // UMA stats.
525 static const int kDeviceStatusCheckIntervalMilliseconds;
Darin Petkov3ec55342012-09-28 14:04:44 +0200526 // Time to wait for termination actions to complete.
Prathmesh Prabhu9fdb84b2014-08-21 18:41:58 -0700527 static const int kTerminationActionsTimeoutMilliseconds;
Darin Petkov3ec55342012-09-28 14:04:44 +0200528
mukesh agrawal8a3188d2011-12-01 20:56:44 +0000529 void AutoConnect();
Gaurav Shah1b7a6162011-11-09 11:41:01 -0800530 std::vector<std::string> AvailableTechnologies(Error *error);
531 std::vector<std::string> ConnectedTechnologies(Error *error);
532 std::string DefaultTechnology(Error *error);
533 std::vector<std::string> EnabledTechnologies(Error *error);
Ben Chan5086b972013-01-15 21:51:38 -0800534 std::vector<std::string> UninitializedTechnologies(Error *error);
Paul Stewartcb3eb892012-06-07 14:24:46 -0700535 RpcIdentifiers EnumerateDevices(Error *error);
536 RpcIdentifiers EnumerateProfiles(Error *error);
Paul Stewartcb3eb892012-06-07 14:24:46 -0700537 RpcIdentifiers EnumerateWatchedServices(Error *error);
Paul Stewart1b253142012-01-26 14:05:52 -0800538 std::string GetActiveProfileRpcIdentifier(Error *error);
Paul Stewart10e9e4e2012-04-26 19:46:28 -0700539 std::string GetCheckPortalList(Error *error);
Paul Stewart49739c02012-08-08 17:24:03 -0700540 RpcIdentifier GetDefaultServiceRpcIdentifier(Error *error);
Paul Stewart4d5efb72012-09-17 12:24:34 -0700541 std::string GetIgnoredDNSSearchPaths(Error *error);
Paul Stewart7f5ad572012-06-04 15:18:54 -0700542 ServiceRefPtr GetServiceInner(const KeyValueStore &args, Error *error);
mukesh agrawalbebf1b82013-04-23 15:06:33 -0700543 bool SetCheckPortalList(const std::string &portal_list, Error *error);
544 bool SetIgnoredDNSSearchPaths(const std::string &ignored_paths, Error *error);
Paul Stewart49739c02012-08-08 17:24:03 -0700545 void EmitDefaultService();
Paul Stewart036dba02012-08-07 12:34:41 -0700546 bool IsTechnologyInList(const std::string &technology_list,
547 Technology::Identifier tech) const;
Eric Shienbrood8839a892012-03-29 10:33:48 -0400548 void EmitDeviceProperties();
Paul Stewart9d97b7d2014-03-13 21:47:03 -0700549 bool SetDisableWiFiVHT(const bool &disable_wifi_vht, Error *error);
550 bool GetDisableWiFiVHT(Error *error);
Paul Stewartff6be292014-11-24 17:05:03 -0800551 bool SetProhibitedTechnologies(const std::string &prohibited_technologies,
552 Error *error);
553 std::string GetProhibitedTechnologies(Error *error);
554 void OnTechnologyProhibited(Technology::Identifier technology,
555 const Error &error);
Chris Masoneb925cc82011-06-22 15:39:57 -0700556
Paul Stewart2cb3fa72014-11-13 01:43:12 -0800557 // For every device instance that is sharing the same connectivity with
558 // another device, enable the multi-home flag.
559 void DetectMultiHomedDevices();
560
Paul Stewart65512e12012-03-26 18:01:08 -0700561 // Unload a service while iterating through |services_|. Returns true if
562 // service was erased (which means the caller loop should not increment
563 // |service_iterator|), false otherwise (meaning the caller should
564 // increment |service_iterator|).
565 bool UnloadService(std::vector<ServiceRefPtr>::iterator *service_iterator);
566
Paul Stewart4d5efb72012-09-17 12:24:34 -0700567 // Load Manager default properties from |profile|.
mukesh agrawal92496a42014-04-08 16:04:43 -0700568 void LoadProperties(const scoped_refptr<DefaultProfile> &profile);
Paul Stewart4d5efb72012-09-17 12:24:34 -0700569
Paul Stewart3c504012013-01-17 17:49:58 -0800570 // Configure the device with profile data from all current profiles.
571 void LoadDeviceFromProfiles(const DeviceRefPtr &device);
572
Paul Stewart49739c02012-08-08 17:24:03 -0700573 void HelpRegisterConstDerivedRpcIdentifier(
574 const std::string &name,
575 RpcIdentifier(Manager::*get)(Error *));
mukesh agrawal2366eed2012-03-20 18:21:50 -0700576 void HelpRegisterConstDerivedRpcIdentifiers(
577 const std::string &name,
578 RpcIdentifiers(Manager::*get)(Error *));
mukesh agrawalffa3d042011-10-06 15:26:10 -0700579 void HelpRegisterDerivedString(
580 const std::string &name,
Alex Vakulenko8a532292014-06-16 17:18:44 -0700581 std::string(Manager::*get)(Error *error),
mukesh agrawalbebf1b82013-04-23 15:06:33 -0700582 bool(Manager::*set)(const std::string&, Error *));
583 void HelpRegisterConstDerivedStrings(
mukesh agrawalffa3d042011-10-06 15:26:10 -0700584 const std::string &name,
mukesh agrawalbebf1b82013-04-23 15:06:33 -0700585 Strings(Manager::*get)(Error *));
Paul Stewart9d97b7d2014-03-13 21:47:03 -0700586 void HelpRegisterDerivedBool(
587 const std::string &name,
588 bool(Manager::*get)(Error *error),
589 bool(Manager::*set)(const bool &value, Error *error));
Chris Masone27c4aa52011-07-02 13:10:14 -0700590
Paul Stewartf3eced92013-04-17 12:18:22 -0700591 bool HasProfile(const Profile::Identifier &ident);
592 void PushProfileInternal(const Profile::Identifier &ident,
593 std::string *path,
594 Error *error);
Paul Stewart5dc40aa2011-10-28 19:43:43 -0700595 void PopProfileInternal();
Paul Stewart78af94c2013-04-17 16:02:06 -0700596 void OnProfilesChanged();
597
Paul Stewart22aa71b2011-09-16 12:15:11 -0700598 void SortServices();
Paul Stewartdfa46052012-06-26 09:44:14 -0700599 void SortServicesTask();
Peter Qiu94d18af2014-09-11 15:54:15 -0700600 void DeviceStatusCheckTask();
601 void ConnectionStatusCheck();
602 void DevicePresenceStatusCheck();
603
Paul Stewart75225512012-01-26 22:51:33 -0800604 bool MatchProfileWithService(const ServiceRefPtr &service);
Paul Stewart22aa71b2011-09-16 12:15:11 -0700605
Paul Stewartd2e1c362013-03-03 19:06:07 -0800606 // Sets the profile of |service| to |profile|, without notifying its
607 // previous profile. Configures a |service| with |args|, then saves
608 // the resulting configuration to |profile|. This method is useful
609 // when copying a service configuration from one profile to another,
610 // or writing a newly created service config to a specific profile.
611 static void SetupServiceInProfile(ServiceRefPtr service,
612 ProfileRefPtr profile,
613 const KeyValueStore &args,
614 Error *error);
615
Paul Stewart39db5ca2013-03-18 14:15:17 -0700616 // For each technology present, connect to the "best" service available,
617 // as determined by sorting all services independent of their current state.
618 void ConnectToBestServicesTask();
619
Darin Petkova5e07ef2012-07-09 14:27:57 +0200620 void NotifyDefaultServiceChanged(const ServiceRefPtr &service);
621
Arman Ugurayab22c162012-10-08 19:08:38 -0700622 // Runs the termination actions. If all actions complete within
Ben Chan3fbf8bd2014-06-07 20:49:52 -0700623 // |kTerminationActionsTimeoutMilliseconds|, |done_callback| is called with a
624 // value of Error::kSuccess. Otherwise, it is called with
625 // Error::kOperationTimeout.
626 void RunTerminationActions(const ResultCallback &done_callback);
Arman Ugurayab22c162012-10-08 19:08:38 -0700627
Daniel Eratfac09532014-04-17 20:25:59 -0700628 // Called when the system is about to be suspended. Each call will be
629 // followed by a call to OnSuspendDone().
Prathmesh Prabhu9fdb84b2014-08-21 18:41:58 -0700630 void OnSuspendImminent();
Darin Petkov3ec55342012-09-28 14:04:44 +0200631
Daniel Eratfac09532014-04-17 20:25:59 -0700632 // Called when the system has completed a suspend attempt (possibly without
633 // actually suspending, in the event of the user canceling the attempt).
Prathmesh Prabhu9fdb84b2014-08-21 18:41:58 -0700634 void OnSuspendDone();
Daniel Eratfac09532014-04-17 20:25:59 -0700635
Prathmesh Prabhu64ad2382014-08-26 11:19:30 -0700636 // Called when the system is entering a dark resume phase (and hence a dark
637 // suspend is imminent).
638 void OnDarkSuspendImminent();
639
Prathmesh Prabhu9fdb84b2014-08-21 18:41:58 -0700640 void OnSuspendActionsComplete(const Error &error);
Samuel Tan68b73d22014-10-28 17:00:56 -0700641 void OnDarkResumeActionsComplete(const Error &error);
Christopher Wiley1057cd72013-02-28 15:21:29 -0800642 void VerifyToEncryptLink(std::string public_key, std::string data,
643 ResultStringCallback cb, const Error &error,
644 bool success);
Darin Petkovca621542012-07-25 14:25:56 +0200645
Peter Qiu574996a2014-04-04 10:55:47 -0700646 // Return true if wifi device is enabled with no existing connection (pending
647 // or connected).
648 bool IsWifiIdle();
649
Thieu Lea20cbc22012-01-09 22:01:43 +0000650 // For unit testing.
651 void set_metrics(Metrics *metrics) { metrics_ = metrics; }
Paul Stewartb87d22b2013-07-29 11:11:37 -0700652 void UpdateProviderMapping();
Thieu Lea20cbc22012-01-09 22:01:43 +0000653
Gary Morainac1bdb42012-02-16 17:42:29 -0800654 // Used by tests to set a mock PowerManager. Takes ownership of
655 // power_manager.
656 void set_power_manager(PowerManager *power_manager) {
657 power_manager_.reset(power_manager);
658 }
659
Samuel Tanfe734672014-08-07 15:50:48 -0700660 DeviceRefPtr GetDeviceConnectedToService(ServiceRefPtr service);
661
Peter Qiu7e8b8ee2014-11-25 13:55:57 -0800662 // Called when the DBus service that claimed ownership of devices from shill
663 // appear/vanish from the DBus connection.
664 void OnDeviceClaimerAppeared(const std::string &/*name*/,
665 const std::string &owner);
666 void OnDeviceClaimerVanished(const std::string &/*name*/);
667 // Task for cleanup device claimer when it is vanished.
668 void DeviceClaimerVanishedTask();
669
670 void DeregisterDeviceByLinkName(const std::string &link_name);
671
mukesh agrawal8a3188d2011-12-01 20:56:44 +0000672 EventDispatcher *dispatcher_;
Albert Chaulk0e1cdea2013-02-27 15:32:55 -0800673 const base::FilePath run_path_;
674 const base::FilePath storage_path_;
mukesh agrawal0a59a5a2014-04-24 19:10:46 -0700675 const std::string user_storage_path_;
mukesh agrawald142fd62013-05-01 16:50:57 -0700676 base::FilePath user_profile_list_path_; // Changed in tests.
Ben Chancd477322014-10-17 14:19:30 -0700677 std::unique_ptr<ManagerAdaptorInterface> adaptor_;
678 std::unique_ptr<DBusManager> dbus_manager_;
Paul Stewart0af98bf2011-05-10 17:38:08 -0700679 DeviceInfo device_info_;
Ben Chan5742b242013-12-18 16:25:43 -0800680#if !defined(DISABLE_CELLULAR)
Darin Petkov887f2982011-07-14 16:10:17 -0700681 ModemInfo modem_info_;
Ben Chan5742b242013-12-18 16:25:43 -0800682#endif // DISABLE_CELLULAR
Ben Chancd477322014-10-17 14:19:30 -0700683 std::unique_ptr<EthernetEapProvider> ethernet_eap_provider_;
684 std::unique_ptr<VPNProvider> vpn_provider_;
685 std::unique_ptr<WiFiProvider> wifi_provider_;
Ben Chan520eb172013-10-30 20:51:04 -0700686#if !defined(DISABLE_WIMAX)
Ben Chancd477322014-10-17 14:19:30 -0700687 std::unique_ptr<WiMaxProvider> wimax_provider_;
Ben Chan520eb172013-10-30 20:51:04 -0700688#endif // DISABLE_WIMAX
Paul Stewart4d5efb72012-09-17 12:24:34 -0700689 // Hold pointer to singleton Resolver instance for testing purposes.
690 Resolver *resolver_;
Paul Stewart75897df2011-04-27 09:05:53 -0700691 bool running_;
Paul Stewart5dc40aa2011-10-28 19:43:43 -0700692 // Used to facilitate unit tests which can't use RPC.
693 bool connect_profiles_to_rpc_;
Chris Masonec1e50412011-06-07 13:04:53 -0700694 std::vector<DeviceRefPtr> devices_;
Chris Masone6791a432011-07-12 13:23:19 -0700695 // We store Services in a vector, because we want to keep them sorted.
Gary Morain028545d2012-04-07 14:55:52 -0700696 // Services that are connected appear first in the vector. See
697 // Service::Compare() for details of the sorting criteria.
Chris Masonec1e50412011-06-07 13:04:53 -0700698 std::vector<ServiceRefPtr> services_;
Paul Stewartb87d22b2013-07-29 11:11:37 -0700699 // Map of technologies to Provider instances. These pointers are owned
700 // by the respective scoped_reptr objects that are held over the lifetime
701 // of the Manager object.
Paul Stewartbc14fb72013-07-30 08:21:58 -0700702 std::map<Technology::Identifier, ProviderInterface *> providers_;
Gaurav Shah71354762011-11-28 19:22:49 -0800703 // List of startup profile names to push on the profile stack on startup.
Chris Masone7aa5f902011-07-11 11:13:35 -0700704 std::vector<ProfileRefPtr> profiles_;
705 ProfileRefPtr ephemeral_profile_;
Chris Masone2ae797d2011-08-23 20:41:00 -0700706 ControlInterface *control_interface_;
Thieu Le3426c8f2012-01-11 17:35:11 -0800707 Metrics *metrics_;
Chris Masone2ae797d2011-08-23 20:41:00 -0700708 GLib *glib_;
Ben Chancd477322014-10-17 14:19:30 -0700709 std::unique_ptr<PowerManager> power_manager_;
Paul Stewart59a8cba2015-01-09 15:48:19 -0800710 std::unique_ptr<Upstart> upstart_;
Chris Masone3bd3c8c2011-06-13 08:20:26 -0700711
Paul Stewart22aa71b2011-09-16 12:15:11 -0700712 // The priority order of technologies
713 std::vector<Technology::Identifier> technology_order_;
714
Paul Stewart49739c02012-08-08 17:24:03 -0700715 // This is the last Service RPC Identifier for which we emitted a
716 // "DefaultService" signal for.
717 RpcIdentifier default_service_rpc_identifier_;
718
Paul Stewart10e9e4e2012-04-26 19:46:28 -0700719 // Manager can be optionally configured with a list of technologies to
720 // do portal detection on at startup. We need to keep track of that list
721 // as well as a flag that tells us whether we should continue using it
722 // instead of the configured portal list.
723 std::string startup_portal_list_;
724 bool use_startup_portal_list_;
725
Chris Masoneb925cc82011-06-22 15:39:57 -0700726 // Properties to be get/set via PropertyStore calls.
Chris Masone88cbd5f2011-07-03 14:30:04 -0700727 Properties props_;
Chris Masone27c4aa52011-07-02 13:10:14 -0700728 PropertyStore store_;
Gary Moraina9fb3252012-05-31 12:05:31 -0700729
Paul Stewartdfa46052012-06-26 09:44:14 -0700730 base::CancelableClosure sort_services_task_;
Darin Petkov3ec55342012-09-28 14:04:44 +0200731
Peter Qiu94d18af2014-09-11 15:54:15 -0700732 // Task for periodically checking various device status.
733 base::CancelableClosure device_status_check_task_;
Peter Qiu700de642014-07-14 16:31:30 -0700734
Darin Petkov3ec55342012-09-28 14:04:44 +0200735 // TODO(petkov): Currently this handles both terminate and suspend
736 // actions. Rename all relevant identifiers to capture this.
Gary Moraina9fb3252012-05-31 12:05:31 -0700737 HookTable termination_actions_;
Darin Petkova5e07ef2012-07-09 14:27:57 +0200738
Daniel Erat0818cca2012-12-14 10:16:21 -0800739 // Is a suspend delay currently registered with the power manager?
740 bool suspend_delay_registered_;
741
Paul Stewart8e9e41c2014-08-07 14:55:47 -0700742 // Whether Wake on LAN should be enabled for all Ethernet devices.
743 bool is_wake_on_lan_enabled_;
744
Paul Stewart83d62562015-02-09 19:57:47 -0800745 // Whether to ignore Ethernet-like devices that don't have an assigned driver.
746 bool ignore_unknown_ethernet_;
747
Darin Petkova5e07ef2012-07-09 14:27:57 +0200748 // Maps tags to callbacks for monitoring default service changes.
749 std::map<int, ServiceCallback> default_service_callbacks_;
750 int default_service_callback_tag_;
Christopher Wiley1057cd72013-02-28 15:21:29 -0800751
752 // Delegate to handle destination verification operations for the manager.
Ben Chancd477322014-10-17 14:19:30 -0700753 std::unique_ptr<CryptoUtilProxy> crypto_util_proxy_;
Prathmesh Prabhuba99b592013-04-17 15:13:14 -0700754
755 // Stores IP addresses of some remote hosts that accept port 80 TCP
756 // connections. ConnectionHealthChecker uses these IPs.
757 // The store resides in Manager so that it persists across Device reset.
Ben Chancd477322014-10-17 14:19:30 -0700758 std::unique_ptr<IPAddressStore> health_checker_remote_ips_;
Paul Stewart7de7e022013-08-28 09:42:50 -0700759
760 // Stores the most recent copy of geolocation information for each
761 // technology type.
762 std::map<std::string, GeolocationInfos> networks_for_geolocation_;
Paul Stewart03e29f72013-09-26 00:49:48 -0700763
764 // Stores the state of the highest ranked connected service.
765 std::string connection_state_;
mukesh agrawal92496a42014-04-08 16:04:43 -0700766
Paul Stewart220ae4e2015-02-12 13:04:36 -0800767 // Stores the most recent state of all watched services.
768 std::map<std::string, Service::ConnectState> watched_service_states_;
769
Peter Qiu1d499ed2015-01-30 16:01:27 -0800770 // Device claimer is a remote application/service that claim/release devices
771 // from/to shill. To reduce complexity, only allow one device claimer at a
772 // time.
Peter Qiu7e8b8ee2014-11-25 13:55:57 -0800773 std::unique_ptr<DeviceClaimer> device_claimer_;
774 std::vector<DeviceClaim> pending_device_claims_;
775
mukesh agrawal92496a42014-04-08 16:04:43 -0700776 DISALLOW_COPY_AND_ASSIGN(Manager);
Paul Stewart75897df2011-04-27 09:05:53 -0700777};
778
779} // namespace shill
780
Darin Petkov002c58e2012-06-19 02:56:05 +0200781#endif // SHILL_MANAGER_H_