blob: c76dd9e9ed705a3132d29fdc02180ed1efa210b6 [file] [log] [blame]
Peter Qiuc0beca52015-09-03 11:25:46 -07001//
2// Copyright (C) 2012 The Android Open Source Project
3//
4// Licensed under the Apache License, Version 2.0 (the "License");
5// you may not use this file except in compliance with the License.
6// You may obtain a copy of the License at
7//
8// http://www.apache.org/licenses/LICENSE-2.0
9//
10// Unless required by applicable law or agreed to in writing, software
11// distributed under the License is distributed on an "AS IS" BASIS,
12// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13// See the License for the specific language governing permissions and
14// limitations under the License.
15//
Paul Stewart75897df2011-04-27 09:05:53 -070016
Darin Petkov002c58e2012-06-19 02:56:05 +020017#ifndef SHILL_MANAGER_H_
18#define SHILL_MANAGER_H_
Paul Stewart75897df2011-04-27 09:05:53 -070019
Darin Petkova5e07ef2012-07-09 14:27:57 +020020#include <map>
Ben Chancd477322014-10-17 14:19:30 -070021#include <memory>
Chris Masone9be4a9d2011-05-16 15:44:09 -070022#include <string>
Paul Stewart75897df2011-04-27 09:05:53 -070023#include <vector>
Chris Masone487b8bf2011-05-13 16:27:57 -070024
Paul Stewartdfa46052012-06-26 09:44:14 -070025#include <base/cancelable_callback.h>
Ben Chana0ddf462014-02-06 11:32:42 -080026#include <base/files/file_path.h>
Ben Chancc67c522014-09-03 07:19:18 -070027#include <base/macros.h>
Chris Masone9be4a9d2011-05-16 15:44:09 -070028#include <base/memory/ref_counted.h>
Eric Shienbrood3e20a232012-02-16 11:35:56 -050029#include <base/memory/weak_ptr.h>
Samuel Tan289a5a52015-09-21 11:35:20 -070030#if defined(__ANDROID__)
31#include <dbus/service_constants.h>
32#else
Chris Masone88cbd5f2011-07-03 14:30:04 -070033#include <chromeos/dbus/service_constants.h>
Samuel Tan289a5a52015-09-21 11:35:20 -070034#endif // __ANDROID__
Paul Stewart22aa71b2011-09-16 12:15:11 -070035#include <gtest/gtest_prod.h> // for FRIEND_TEST
Paul Stewart75897df2011-04-27 09:05:53 -070036
Ben Chanc54afe52014-11-05 10:28:08 -080037#include "shill/cellular/modem_info.h"
Christopher Wiley1057cd72013-02-28 15:21:29 -080038#include "shill/crypto_util_proxy.h"
Rebecca Silberstein15d54312015-10-08 15:02:59 -070039#include "shill/dhcp_properties.h"
Paul Stewart75897df2011-04-27 09:05:53 -070040#include "shill/device.h"
Paul Stewart0af98bf2011-05-10 17:38:08 -070041#include "shill/device_info.h"
Paul Stewart26b327e2011-10-19 11:38:09 -070042#include "shill/event_dispatcher.h"
Gaurav Shahb790aa22012-10-23 12:51:12 -070043#include "shill/geolocation_info.h"
Gary Moraina9fb3252012-05-31 12:05:31 -070044#include "shill/hook_table.h"
Arman Ugurayab22c162012-10-08 19:08:38 -070045#include "shill/metrics.h"
Garret Kellyc5f89d12015-02-18 14:39:36 -050046#include "shill/net/ip_address.h"
Gary Morainac1bdb42012-02-16 17:42:29 -080047#include "shill/power_manager.h"
Paul Stewartf3eced92013-04-17 12:18:22 -070048#include "shill/profile.h"
Chris Masoneb925cc82011-06-22 15:39:57 -070049#include "shill/property_store.h"
Chris Masone9be4a9d2011-05-16 15:44:09 -070050#include "shill/service.h"
Paul Stewart59a8cba2015-01-09 15:48:19 -080051#include "shill/upstart/upstart.h"
Ben Chanc3d707d2014-10-31 08:56:05 -070052#include "shill/wimax/wimax_provider.h"
Paul Stewart75897df2011-04-27 09:05:53 -070053
54namespace shill {
55
Chris Masoned0ceb8c2011-06-02 10:05:39 -070056class ControlInterface;
Peter Qiu7e8b8ee2014-11-25 13:55:57 -080057class DeviceClaimer;
Paul Stewart4d5efb72012-09-17 12:24:34 -070058class DefaultProfile;
Chris Masone8fe2c7e2011-06-09 15:51:19 -070059class Error;
Chris Masoned0ceb8c2011-06-02 10:05:39 -070060class EventDispatcher;
Prathmesh Prabhuba99b592013-04-17 15:13:14 -070061class IPAddressStore;
Thieu Le3426c8f2012-01-11 17:35:11 -080062class ManagerAdaptorInterface;
Paul Stewart4d5efb72012-09-17 12:24:34 -070063class Resolver;
Paul Stewart85aea152013-01-22 09:31:56 -080064class StoreInterface;
Darin Petkovc3505a52013-03-18 15:13:29 +010065class VPNProvider;
Peter Qiu1a72f542015-04-14 16:31:36 -070066
67#if !defined(DISABLE_WIFI)
Paul Stewart3c504012013-01-17 17:49:58 -080068class WiFiProvider;
Peter Qiud13249c2015-10-27 14:42:32 -070069#if defined(__BRILLO__)
70class RPCServiceWatcherInterface;
71class WiFiDriverHal;
72#endif // __BRILLO__
Peter Qiu1a72f542015-04-14 16:31:36 -070073#endif // DISABLE_WIFI
74
75#if !defined(DISABLE_WIRED_8021X)
76class EthernetEapProvider;
77#endif // DISABLE_WIRED_8021X
Chris Masoned0ceb8c2011-06-02 10:05:39 -070078
Eric Shienbrood3e20a232012-02-16 11:35:56 -050079class Manager : public base::SupportsWeakPtr<Manager> {
Paul Stewart75897df2011-04-27 09:05:53 -070080 public:
Paul Stewart8ae18742015-06-16 13:13:10 -070081 typedef base::Callback<void(const ServiceRefPtr& service)> ServiceCallback;
Darin Petkova5e07ef2012-07-09 14:27:57 +020082
Chris Masone88cbd5f2011-07-03 14:30:04 -070083 struct Properties {
84 public:
Paul Stewartc681fa02012-03-02 19:40:04 -080085 Properties()
Paul Stewartd408fdf2012-05-07 17:15:57 -070086 : offline_mode(false),
87 portal_check_interval_seconds(0),
Peter Qiu9d581932014-04-14 16:37:37 -070088 arp_gateway(true),
Garret Kelly782cdce2015-04-01 16:39:16 -040089 connection_id_salt(0),
90 minimum_mtu(IPConfig::kUndefinedMTU) {}
Chris Masone88cbd5f2011-07-03 14:30:04 -070091 bool offline_mode;
92 std::string check_portal_list;
93 std::string country;
Ben Chan7fab8972014-08-10 17:14:46 -070094 int32_t portal_check_interval_seconds;
Chris Masone88cbd5f2011-07-03 14:30:04 -070095 std::string portal_url;
Paul Stewartd32f4842012-01-11 16:08:13 -080096 std::string host_name;
Paul Stewartd408fdf2012-05-07 17:15:57 -070097 // Whether to ARP for the default gateway in the DHCP client after
98 // acquiring a lease.
99 bool arp_gateway;
Paul Stewart036dba02012-08-07 12:34:41 -0700100 // Comma-separated list of technologies for which link-monitoring is
101 // enabled.
102 std::string link_monitor_technologies;
Ben Chan8e6b8ef2014-07-14 21:50:18 -0700103 // Comma-separated list of technologies for which auto-connect is disabled.
104 std::string no_auto_connect_technologies;
Paul Stewartff6be292014-11-24 17:05:03 -0800105 // Comma-separated list of technologies that should never be enabled.
106 std::string prohibited_technologies;
Paul Stewart4d5efb72012-09-17 12:24:34 -0700107 // Comma-separated list of DNS search paths to be ignored.
108 std::string ignored_dns_search_paths;
Garret Kellyc5f89d12015-02-18 14:39:36 -0500109 // Comma-separated list of DNS servers to prepend to resolver list.
110 std::string prepend_dns_servers;
Peter Qiu9d581932014-04-14 16:37:37 -0700111 // Salt value use for calculating network connection ID.
112 int connection_id_salt;
Garret Kelly782cdce2015-04-01 16:39:16 -0400113 // The minimum MTU value that will be respected in DHCP responses.
114 int minimum_mtu;
Chris Masone88cbd5f2011-07-03 14:30:04 -0700115 };
116
Paul Stewart8ae18742015-06-16 13:13:10 -0700117 Manager(ControlInterface* control_interface,
118 EventDispatcher* dispatcher,
119 Metrics* metrics,
Paul Stewart8ae18742015-06-16 13:13:10 -0700120 const std::string& run_directory,
121 const std::string& storage_directory,
122 const std::string& user_storage_directory);
Chris Masone3bd3c8c2011-06-13 08:20:26 -0700123 virtual ~Manager();
mukesh agrawal8f317b62011-07-15 11:53:23 -0700124
Peter Qiuc00d1fa2015-08-13 15:00:55 -0700125 void RegisterAsync(const base::Callback<void(bool)>& completion_callback);
Peter Qiu69b6a952015-07-01 16:09:49 -0700126
Peter Qiu91b71502015-11-09 13:55:18 -0800127 virtual void SetBlacklistedDevices(
128 const std::vector<std::string>& blacklisted_devices);
Christopher Grantc1d44732016-01-15 10:54:45 -0500129 virtual void SetWhitelistedDevices(
130 const std::vector<std::string>& whitelisted_devices);
131
132 // Returns true if |device_name| is either not in the blacklist, or in the
133 // whitelist, depending on which list was supplied in startup settings.
134 virtual bool DeviceManagementAllowed(const std::string& device_name);
Gary Morainac1bdb42012-02-16 17:42:29 -0800135
Thieu Lefb46caf2012-03-08 11:57:15 -0800136 virtual void Start();
Thieu Le6c1e3bb2013-02-06 15:20:35 -0800137 virtual void Stop();
Darin Petkovcb0b5662012-12-13 09:59:44 +0100138 bool running() const { return running_; }
Paul Stewart75897df2011-04-27 09:05:53 -0700139
Paul Stewart8ae18742015-06-16 13:13:10 -0700140 const ProfileRefPtr& ActiveProfile() const;
141 bool IsActiveProfile(const ProfileRefPtr& profile) const;
142 bool MoveServiceToProfile(const ServiceRefPtr& to_move,
143 const ProfileRefPtr& destination);
144 ProfileRefPtr LookupProfileByRpcIdentifier(const std::string& profile_rpcid);
Chris Masone7aa5f902011-07-11 11:13:35 -0700145
Paul Stewart1b1a7f22012-01-06 16:24:06 -0800146 // Called via RPC call on Service (|to_set|) to set the "Profile" property.
Paul Stewart8ae18742015-06-16 13:13:10 -0700147 virtual void SetProfileForService(const ServiceRefPtr& to_set,
148 const std::string& profile,
149 Error* error);
Paul Stewart1b1a7f22012-01-06 16:24:06 -0800150
Paul Stewart8ae18742015-06-16 13:13:10 -0700151 virtual void RegisterDevice(const DeviceRefPtr& to_manage);
152 virtual void DeregisterDevice(const DeviceRefPtr& to_forget);
Chris Masone9be4a9d2011-05-16 15:44:09 -0700153
Paul Stewart8ae18742015-06-16 13:13:10 -0700154 virtual bool HasService(const ServiceRefPtr& service);
mukesh agrawal8a3188d2011-12-01 20:56:44 +0000155 // Register a Service with the Manager. Manager may choose to
156 // connect to it immediately.
Paul Stewart8ae18742015-06-16 13:13:10 -0700157 virtual void RegisterService(const ServiceRefPtr& to_manage);
mukesh agrawal8a3188d2011-12-01 20:56:44 +0000158 // Deregister a Service from the Manager. Caller is responsible
159 // for disconnecting the Service before-hand.
Paul Stewart8ae18742015-06-16 13:13:10 -0700160 virtual void DeregisterService(const ServiceRefPtr& to_forget);
161 virtual void UpdateService(const ServiceRefPtr& to_update);
Chris Masone9be4a9d2011-05-16 15:44:09 -0700162
Darin Petkove7c6ad32012-06-29 10:22:09 +0200163 // Persists |to_update| into an appropriate profile.
Paul Stewart8ae18742015-06-16 13:13:10 -0700164 virtual void UpdateDevice(const DeviceRefPtr& to_update);
Darin Petkove7c6ad32012-06-29 10:22:09 +0200165
Peter Qiu1a72f542015-04-14 16:31:36 -0700166#if !defined(DISABLE_WIFI)
Wade Guthrie60a37062013-04-02 11:39:09 -0700167 virtual void UpdateWiFiProvider();
Peter Qiu1a72f542015-04-14 16:31:36 -0700168#endif // DISABLE_WIFI
Wade Guthrie60a37062013-04-02 11:39:09 -0700169
mukesh agrawala9f5dfe2014-12-16 12:56:36 -0800170 std::vector<DeviceRefPtr>
171 FilterByTechnology(Technology::Identifier tech) const;
Chris Masone9be4a9d2011-05-16 15:44:09 -0700172
Chris Masonee0dea762011-06-09 09:06:03 -0700173 ServiceRefPtr FindService(const std::string& name);
Paul Stewart8ae18742015-06-16 13:13:10 -0700174 RpcIdentifiers EnumerateAvailableServices(Error* error);
Chris Masone9be4a9d2011-05-16 15:44:09 -0700175
Paul Stewart3c504012013-01-17 17:49:58 -0800176 // Return the complete list of services, including those that are not visible.
Paul Stewart8ae18742015-06-16 13:13:10 -0700177 RpcIdentifiers EnumerateCompleteServices(Error* error);
Paul Stewart3c504012013-01-17 17:49:58 -0800178
mukesh agrawal32399322011-09-01 10:53:43 -0700179 // called via RPC (e.g., from ManagerDBusAdaptor)
Paul Stewart967eaeb2013-04-25 19:53:07 -0700180 std::map<std::string, std::string> GetLoadableProfileEntriesForService(
Paul Stewart8ae18742015-06-16 13:13:10 -0700181 const ServiceConstRefPtr& service);
182 ServiceRefPtr GetService(const KeyValueStore& args, Error* error);
183 ServiceRefPtr ConfigureService(const KeyValueStore& args, Error* error);
Paul Stewartd2e1c362013-03-03 19:06:07 -0800184 ServiceRefPtr ConfigureServiceForProfile(
Paul Stewart8ae18742015-06-16 13:13:10 -0700185 const std::string& profile_rpcid,
186 const KeyValueStore& args,
187 Error* error);
188 ServiceRefPtr FindMatchingService(const KeyValueStore& args, Error* error);
Paul Stewart7de7e022013-08-28 09:42:50 -0700189
190 // Retrieve geolocation data from the Manager.
191 const std::map<std::string, GeolocationInfos>
192 &GetNetworksForGeolocation() const;
193
194 // Called by Device when its geolocation data has been updated.
Paul Stewart8ae18742015-06-16 13:13:10 -0700195 virtual void OnDeviceGeolocationInfoUpdated(const DeviceRefPtr& device);
Paul Stewart7de7e022013-08-28 09:42:50 -0700196
Paul Stewart8ae18742015-06-16 13:13:10 -0700197 void ConnectToBestServices(Error* error);
Paul Stewart7f61e522012-03-22 11:13:45 -0700198
Rebecca Silberstein6862b382014-09-11 08:24:51 -0700199 // Method to create connectivity report for connected services.
Paul Stewart8ae18742015-06-16 13:13:10 -0700200 void CreateConnectivityReport(Error* error);
Rebecca Silberstein6862b382014-09-11 08:24:51 -0700201
Paul Stewartc681fa02012-03-02 19:40:04 -0800202 // Request portal detection checks on each registered device until a portal
203 // detection attempt starts on one of them.
Paul Stewart8ae18742015-06-16 13:13:10 -0700204 void RecheckPortal(Error* error);
Paul Stewartd215af62012-04-24 23:25:50 -0700205 // Request portal detection be restarted on the device connected to
206 // |service|.
Paul Stewart8ae18742015-06-16 13:13:10 -0700207 virtual void RecheckPortalOnService(const ServiceRefPtr& service);
Paul Stewartd215af62012-04-24 23:25:50 -0700208
Wade Guthrie68d41092013-04-02 12:56:02 -0700209 virtual void RequestScan(Device::ScanType scan_type,
Paul Stewart8ae18742015-06-16 13:13:10 -0700210 const std::string& technology, Error* error);
Peter Qiud51b2442015-02-23 10:41:38 -0800211 // Configure scheduled scan for wifi devices.
Paul Stewart8ae18742015-06-16 13:13:10 -0700212 virtual void SetSchedScan(bool enable, Error* error);
Paul Stewart22aa71b2011-09-16 12:15:11 -0700213 std::string GetTechnologyOrder();
Paul Stewart8ae18742015-06-16 13:13:10 -0700214 virtual void SetTechnologyOrder(const std::string& order, Error* error);
Gaurav Shah71354762011-11-28 19:22:49 -0800215 // Set up the profile list starting with a default profile along with
216 // an (optional) list of startup profiles.
217 void InitializeProfiles();
Paul Stewart19c871d2011-12-15 16:10:13 -0800218 // Create a profile. This does not affect the profile stack. Returns
219 // the RPC path of the created profile in |path|.
Paul Stewart8ae18742015-06-16 13:13:10 -0700220 void CreateProfile(const std::string& name, std::string* path, Error* error);
Paul Stewart5dc40aa2011-10-28 19:43:43 -0700221 // Pushes existing profile with name |name| onto stack of managed profiles.
Paul Stewart19c871d2011-12-15 16:10:13 -0800222 // Returns the RPC path of the pushed profile in |path|.
Paul Stewart8ae18742015-06-16 13:13:10 -0700223 void PushProfile(const std::string& name, std::string* path, Error* error);
Paul Stewartf3eced92013-04-17 12:18:22 -0700224 // Insert an existing user profile with name |name| into the stack of
225 // managed profiles. Associate |user_hash| with this profile entry.
226 // Returns the RPC path of the pushed profile in |path|.
Paul Stewart8ae18742015-06-16 13:13:10 -0700227 void InsertUserProfile(const std::string& name,
228 const std::string& user_hash,
229 std::string* path,
230 Error* error);
Paul Stewart5dc40aa2011-10-28 19:43:43 -0700231 // Pops profile named |name| off the top of the stack of managed profiles.
Paul Stewart8ae18742015-06-16 13:13:10 -0700232 void PopProfile(const std::string& name, Error* error);
Paul Stewart5dc40aa2011-10-28 19:43:43 -0700233 // Remove the active profile.
Paul Stewart8ae18742015-06-16 13:13:10 -0700234 void PopAnyProfile(Error* error);
Paul Stewart307c2502013-03-23 12:32:10 -0700235 // Remove all user profiles from the stack of managed profiles leaving only
236 // default profiles.
Paul Stewart8ae18742015-06-16 13:13:10 -0700237 void PopAllUserProfiles(Error* error);
Paul Stewarte73d05c2012-03-29 16:26:05 -0700238 // Remove the underlying persistent storage for a profile.
Paul Stewart8ae18742015-06-16 13:13:10 -0700239 void RemoveProfile(const std::string& name, Error* error);
Peter Qiu1d499ed2015-01-30 16:01:27 -0800240 // Give the ownership of the device with name |device_name| to claimer with
241 // name |claimer_name|. This will cause shill to stop managing this device.
Samuel Tan8a3f68e2016-01-11 09:39:32 -0800242 virtual void ClaimDevice(const std::string& claimer_name,
243 const std::string& interface_name,
244 Error* error);
Peter Qiu1d499ed2015-01-30 16:01:27 -0800245 // Claimer |claimer_name| release the ownership of the device with
Samuel Tan8a3f68e2016-01-11 09:39:32 -0800246 // |interface_name| back to shill. This method will set |claimer_removed|
247 // to true iff Claimer |claimer_name| is not the default claimer and no
248 // longer claims any devices.
249 virtual void ReleaseDevice(const std::string& claimer_name,
250 const std::string& interface_name,
251 bool* claimer_removed,
252 Error* error);
Samuel Tane569b212016-01-15 10:05:50 -0800253#if !defined(DISABLE_WIFI) && defined(__BRILLO__)
Peter Qiu95522af2015-09-29 09:12:57 -0700254 // Setup an AP mode interface using WiFi driver HAL. The driver
255 // may or may not teardown the station mode interface as a result
256 // of this call. This behavior will be driver specific.
257 // Returns true and sets |interface_name| on success, false otherwise.
Samuel Tan8a3f68e2016-01-11 09:39:32 -0800258 virtual bool SetupApModeInterface(std::string* out_interface_name,
259 Error* error);
Peter Qiu95522af2015-09-29 09:12:57 -0700260
261 // Setup a station mode interface using WiFi driver HAL. The driver
262 // may or may not teardown the AP mode interface as a result of this
263 // call. This behavior will be driver specific.
264 // Returns true and sets |interface_name| on success, false otherwise.
Samuel Tan8a3f68e2016-01-11 09:39:32 -0800265 virtual bool SetupStationModeInterface(std::string* out_interface_name,
266 Error* error);
267
268 virtual void OnApModeSetterVanished();
Samuel Tane569b212016-01-15 10:05:50 -0800269#endif // !DISABLE_WIFI && __BRILLO__
Peter Qiu95522af2015-09-29 09:12:57 -0700270
Paul Stewartd3d03882013-08-29 15:43:42 -0700271 // Called by a service to remove its associated configuration. If |service|
272 // is associated with a non-ephemeral profile, this configuration entry
273 // will be removed and the manager will search for another matching profile.
274 // If the service ends up with no matching profile, it is unloaded (which
275 // may also remove the service from the manager's list, e.g. WiFi services
276 // that are not visible)..
Paul Stewart8ae18742015-06-16 13:13:10 -0700277 void RemoveService(const ServiceRefPtr& service);
Paul Stewart75225512012-01-26 22:51:33 -0800278 // Handle the event where a profile is about to remove a profile entry.
279 // Any Services that are dependent on this storage identifier will need
280 // to find new profiles. Return true if any service has been moved to a new
281 // profile. Any such services will have had the profile group removed from
282 // the profile.
Paul Stewart8ae18742015-06-16 13:13:10 -0700283 virtual bool HandleProfileEntryDeletion(const ProfileRefPtr& profile,
284 const std::string& entry_name);
Paul Stewart13ed2252012-03-21 12:52:46 -0700285 // Find a registered service that contains a GUID property that
286 // matches |guid|.
Paul Stewart8ae18742015-06-16 13:13:10 -0700287 virtual ServiceRefPtr GetServiceWithGUID(const std::string& guid,
288 Error* error);
Paul Stewart0756db92012-01-27 08:34:47 -0800289 // Find a service that is both the member of |profile| and has a
290 // storage identifier that matches |entry_name|. This function is
291 // called by the Profile in order to return a profile entry's properties.
292 virtual ServiceRefPtr GetServiceWithStorageIdentifier(
Paul Stewart8ae18742015-06-16 13:13:10 -0700293 const ProfileRefPtr& profile,
294 const std::string& entry_name,
295 Error* error);
Peter Qiu18213652015-04-21 16:01:51 -0700296 // Create a temporary service for an entry |entry_name| within |profile|.
297 // Callers must not register this service with the Manager or connect it
298 // since it was never added to the provider's service list.
299 virtual ServiceRefPtr CreateTemporaryServiceFromProfile(
Paul Stewart8ae18742015-06-16 13:13:10 -0700300 const ProfileRefPtr& profile,
301 const std::string& entry_name,
302 Error* error);
Paul Stewarte2bad7c2012-03-14 08:55:33 -0700303 // Return a reference to the Service associated with the default connection.
304 // If there is no such connection, this function returns a reference to NULL.
305 virtual ServiceRefPtr GetDefaultService() const;
Paul Stewart0756db92012-01-27 08:34:47 -0800306
mukesh agrawal46c27cc2013-07-10 16:39:10 -0700307 // Set enabled state of all |technology_name| devices to |enabled_state|.
Rebecca Silbersteinb0d2f642015-09-18 13:35:30 -0700308 // Persist the state to storage is |persist| is true.
Paul Stewart8ae18742015-06-16 13:13:10 -0700309 void SetEnabledStateForTechnology(const std::string& technology_name,
mukesh agrawal46c27cc2013-07-10 16:39:10 -0700310 bool enabled_state,
Rebecca Silbersteinb0d2f642015-09-18 13:35:30 -0700311 bool persist,
Paul Stewart8ae18742015-06-16 13:13:10 -0700312 Error* error,
313 const ResultCallback& callback);
Paul Stewart20088d82012-02-16 06:58:55 -0800314 // Return whether a technology is marked as enabled for portal detection.
315 virtual bool IsPortalDetectionEnabled(Technology::Identifier tech);
Paul Stewart10e9e4e2012-04-26 19:46:28 -0700316 // Set the start-up value for the portal detection list. This list will
317 // be used until a value set explicitly over the control API. Until
318 // then, we ignore but do not overwrite whatever value is stored in the
319 // profile.
Paul Stewart8ae18742015-06-16 13:13:10 -0700320 virtual void SetStartupPortalList(const std::string& portal_list);
Paul Stewart20088d82012-02-16 06:58:55 -0800321
Paul Stewartd2e1c362013-03-03 19:06:07 -0800322 // Returns true if profile |a| has been pushed on the Manager's
323 // |profiles_| stack before profile |b|.
Paul Stewart8ae18742015-06-16 13:13:10 -0700324 virtual bool IsProfileBefore(const ProfileRefPtr& a,
325 const ProfileRefPtr& b) const;
Paul Stewartd2e1c362013-03-03 19:06:07 -0800326
Paul Stewart10ccbb32012-04-26 15:59:30 -0700327 // Return whether a service belongs to the ephemeral profile.
Paul Stewart8ae18742015-06-16 13:13:10 -0700328 virtual bool IsServiceEphemeral(const ServiceConstRefPtr& service) const;
Paul Stewart10ccbb32012-04-26 15:59:30 -0700329
Paul Stewart3c504012013-01-17 17:49:58 -0800330 // Return whether a Technology has any connected Services.
331 virtual bool IsTechnologyConnected(Technology::Identifier technology) const;
332
Paul Stewart036dba02012-08-07 12:34:41 -0700333 // Return whether a technology is enabled for link monitoring.
334 virtual bool IsTechnologyLinkMonitorEnabled(
335 Technology::Identifier technology) const;
336
Paul Stewart8e9e41c2014-08-07 14:55:47 -0700337 // Return whether the Wake on LAN feature is enabled.
338 virtual bool IsWakeOnLanEnabled() const { return is_wake_on_lan_enabled_; }
339
Ben Chan8e6b8ef2014-07-14 21:50:18 -0700340 // Return whether a technology is disabled for auto-connect.
341 virtual bool IsTechnologyAutoConnectDisabled(
342 Technology::Identifier technology) const;
343
Paul Stewartff6be292014-11-24 17:05:03 -0800344 // Report whether |technology| is prohibited from being enabled.
345 virtual bool IsTechnologyProhibited(Technology::Identifier technology) const;
346
Paul Stewart3c504012013-01-17 17:49:58 -0800347 // Called by Profile when a |storage| completes initialization.
Paul Stewart8ae18742015-06-16 13:13:10 -0700348 void OnProfileStorageInitialized(Profile* storage);
Paul Stewart3c504012013-01-17 17:49:58 -0800349
350 // Return a Device with technology |technology| in the enabled state.
Peter Qiua900f4a2015-03-19 09:36:40 -0700351 virtual DeviceRefPtr GetEnabledDeviceWithTechnology(
Paul Stewart3c504012013-01-17 17:49:58 -0800352 Technology::Identifier technology) const;
Paul Stewart85aea152013-01-22 09:31:56 -0800353
Peter Qiua900f4a2015-03-19 09:36:40 -0700354 // Return a Device with link_name |link_name| in the enabled state.
355 virtual DeviceRefPtr GetEnabledDeviceByLinkName(
Paul Stewart8ae18742015-06-16 13:13:10 -0700356 const std::string& link_name) const;
Peter Qiua900f4a2015-03-19 09:36:40 -0700357
Darin Petkov4cbff5b2013-01-29 16:29:05 +0100358 // Returns true if at least one connection exists, and false if there's no
359 // connected service.
Peter Qiu700de642014-07-14 16:31:30 -0700360 virtual bool IsConnected() const;
361 // Returns true if at least one connection exists that have Internet
362 // connectivity, and false if there's no such service.
Darin Petkov4cbff5b2013-01-29 16:29:05 +0100363 virtual bool IsOnline() const;
Paul Stewart8ae18742015-06-16 13:13:10 -0700364 std::string CalculateState(Error* error);
Paul Stewart38fd24c2012-04-25 14:06:29 -0700365
Paul Stewart03e29f72013-09-26 00:49:48 -0700366 // Recalculate the |connected_state_| string and emit a singal if it has
367 // changed.
368 void RefreshConnectionState();
369
Paul Stewartc681fa02012-03-02 19:40:04 -0800370 virtual int GetPortalCheckInterval() const {
371 return props_.portal_check_interval_seconds;
372 }
Paul Stewart8ae18742015-06-16 13:13:10 -0700373 virtual const std::string& GetPortalCheckURL() const {
Paul Stewart20088d82012-02-16 06:58:55 -0800374 return props_.portal_url;
375 }
mukesh agrawal32399322011-09-01 10:53:43 -0700376
Paul Stewart8ae18742015-06-16 13:13:10 -0700377 virtual DeviceInfo* device_info() { return &device_info_; }
Ben Chan5742b242013-12-18 16:25:43 -0800378#if !defined(DISABLE_CELLULAR)
Paul Stewart8ae18742015-06-16 13:13:10 -0700379 virtual ModemInfo* modem_info() { return &modem_info_; }
Ben Chan5742b242013-12-18 16:25:43 -0800380#endif // DISABLE_CELLULAR
Paul Stewart8ae18742015-06-16 13:13:10 -0700381 PowerManager* power_manager() const { return power_manager_.get(); }
Peter Qiu1a72f542015-04-14 16:31:36 -0700382#if !defined(DISABLE_WIRED_8021X)
Paul Stewart8ae18742015-06-16 13:13:10 -0700383 virtual EthernetEapProvider* ethernet_eap_provider() const {
Paul Stewart35eff132013-04-12 12:08:40 -0700384 return ethernet_eap_provider_.get();
385 }
Peter Qiu1a72f542015-04-14 16:31:36 -0700386#endif // DISABLE_WIRED_8021X
Paul Stewart8ae18742015-06-16 13:13:10 -0700387 VPNProvider* vpn_provider() const { return vpn_provider_.get(); }
Peter Qiu1a72f542015-04-14 16:31:36 -0700388#if !defined(DISABLE_WIFI)
Paul Stewart8ae18742015-06-16 13:13:10 -0700389 WiFiProvider* wifi_provider() const { return wifi_provider_.get(); }
Peter Qiu1a72f542015-04-14 16:31:36 -0700390#endif // DISABLE_WIFI
Ben Chan520eb172013-10-30 20:51:04 -0700391#if !defined(DISABLE_WIMAX)
Paul Stewart8ae18742015-06-16 13:13:10 -0700392 virtual WiMaxProvider* wimax_provider() { return wimax_provider_.get(); }
Ben Chan520eb172013-10-30 20:51:04 -0700393#endif // DISABLE_WIMAX
Paul Stewart8ae18742015-06-16 13:13:10 -0700394 PropertyStore* mutable_store() { return &store_; }
395 virtual const PropertyStore& store() const { return store_; }
Paul Stewart8ae18742015-06-16 13:13:10 -0700396 virtual const base::FilePath& run_path() const { return run_path_; }
397 const base::FilePath& storage_path() const { return storage_path_; }
398 IPAddressStore* health_checker_remote_ips() const {
Prathmesh Prabhuba99b592013-04-17 15:13:14 -0700399 return health_checker_remote_ips_.get();
400 }
Chris Masoneb925cc82011-06-22 15:39:57 -0700401
Paul Stewartd408fdf2012-05-07 17:15:57 -0700402 bool GetArpGateway() const { return props_.arp_gateway; }
Chris Masone877ff982011-09-21 16:18:24 -0700403
Garret Kelly782cdce2015-04-01 16:39:16 -0400404 virtual int GetMinimumMTU() const { return props_.minimum_mtu; }
Paul Stewart1ce231c2015-06-12 19:44:22 -0700405 virtual void SetMinimumMTU(const int mtu) { props_.minimum_mtu = mtu; }
Garret Kelly782cdce2015-04-01 16:39:16 -0400406
Eric Shienbrood9a245532012-03-07 14:20:39 -0500407 virtual void UpdateEnabledTechnologies();
Ben Chan5086b972013-01-15 21:51:38 -0800408 virtual void UpdateUninitializedTechnologies();
Gary Morainac1bdb42012-02-16 17:42:29 -0800409
Rebecca Silberstein15d54312015-10-08 15:02:59 -0700410 const DhcpProperties& dhcp_properties() const {
411 return *dhcp_properties_;
412 }
413
Gary Moraind93615e2012-04-27 11:50:03 -0700414 // Writes the service |to_update| to persistant storage. If the service's is
415 // ephemeral, it is moved to the current profile.
Paul Stewart8ae18742015-06-16 13:13:10 -0700416 void SaveServiceToProfile(const ServiceRefPtr& to_update);
Gary Moraind93615e2012-04-27 11:50:03 -0700417
Gary Moraina9fb3252012-05-31 12:05:31 -0700418 // Adds a closure to be executed when ChromeOS suspends or shill terminates.
419 // |name| should be unique; otherwise, a previous closure by the same name
420 // will be replaced. |start| will be called when RunTerminationActions() is
421 // called. When an action completed, TerminationActionComplete() must be
422 // called.
Paul Stewart8ae18742015-06-16 13:13:10 -0700423 void AddTerminationAction(const std::string& name,
424 const base::Closure& start);
Gary Moraina9fb3252012-05-31 12:05:31 -0700425
426 // Users call this function to report the completion of an action |name|.
427 // This function should be called once for each action.
Paul Stewart8ae18742015-06-16 13:13:10 -0700428 void TerminationActionComplete(const std::string& name);
Gary Moraina9fb3252012-05-31 12:05:31 -0700429
430 // Removes the action associtated with |name|.
Paul Stewart8ae18742015-06-16 13:13:10 -0700431 void RemoveTerminationAction(const std::string& name);
Gary Moraina9fb3252012-05-31 12:05:31 -0700432
Arman Ugurayab22c162012-10-08 19:08:38 -0700433 // Runs the termination actions and notifies the metrics framework
434 // that the termination actions started running, only if any termination
Samuel Tanfbe8d2b2014-09-15 20:23:59 -0700435 // actions have been registered. If all actions complete within
Ben Chan3fbf8bd2014-06-07 20:49:52 -0700436 // |kTerminationActionsTimeoutMilliseconds|, |done_callback| is called with a
437 // value of Error::kSuccess. Otherwise, it is called with
438 // Error::kOperationTimeout.
Arman Ugurayab22c162012-10-08 19:08:38 -0700439 //
440 // Returns true, if termination actions were run.
441 bool RunTerminationActionsAndNotifyMetrics(
Paul Stewart8ae18742015-06-16 13:13:10 -0700442 const ResultCallback& done_callback);
Gary Moraina9fb3252012-05-31 12:05:31 -0700443
Darin Petkova5e07ef2012-07-09 14:27:57 +0200444 // Registers a |callback| that's invoked whenever the default service
445 // changes. Returns a unique tag that can be used to deregister the
446 // callback. A tag equal to 0 is invalid.
Paul Stewart8ae18742015-06-16 13:13:10 -0700447 virtual int RegisterDefaultServiceCallback(const ServiceCallback& callback);
Darin Petkova5e07ef2012-07-09 14:27:57 +0200448 virtual void DeregisterDefaultServiceCallback(int tag);
449
Peter Qiu1a72f542015-04-14 16:31:36 -0700450#if !defined(DISABLE_WIFI)
Christopher Wiley0d9cf0c2013-02-19 19:24:57 -0800451 // Verifies that the destination described by certificate is valid, and that
452 // we're currently connected to that destination. A full description of the
453 // rules being enforced is in doc/manager-api.txt. Returns true iff all
454 // checks pass, false otherwise. On false, error is filled with a
455 // descriptive error code and message.
456 //
457 // |certificate| is a PEM encoded x509 certificate, |public_key| is a base64
458 // encoded public half of an RSA key, |nonce| is a random string, and
459 // |signed_data| is a base64 encoded string as described in
460 // doc/manager-api.txt.
Paul Stewart8ae18742015-06-16 13:13:10 -0700461 void VerifyDestination(const std::string& certificate,
462 const std::string& public_key,
463 const std::string& nonce,
464 const std::string& signed_data,
465 const std::string& destination_udn,
466 const std::string& hotspot_ssid,
467 const std::string& hotspot_bssid,
468 const ResultBoolCallback& cb,
469 Error* error);
Christopher Wiley0d9cf0c2013-02-19 19:24:57 -0800470
471 // After verifying the destination, encrypt the string data with
472 // |public_key|, the base64 encoded public half of an RSA key pair. Returns
473 // the base64 encoded result if successful, or an empty string on failure.
474 // On failure, |error| will be filled with an appropriately descriptive
475 // message and error code.
Paul Stewart8ae18742015-06-16 13:13:10 -0700476 void VerifyAndEncryptData(const std::string& certificate,
477 const std::string& public_key,
478 const std::string& nonce,
479 const std::string& signed_data,
480 const std::string& destination_udn,
481 const std::string& hotspot_ssid,
482 const std::string& hotspot_bssid,
483 const std::string& data,
484 const ResultStringCallback& cb,
485 Error* error);
Christopher Wiley0d9cf0c2013-02-19 19:24:57 -0800486
487 // After verifying the destination, encrypt the password for |network_path|
488 // under |public_key|. Similar to EncryptData above except that the
489 // information being encrypted is implicitly the authentication credentials
490 // of the given network.
Paul Stewart8ae18742015-06-16 13:13:10 -0700491 void VerifyAndEncryptCredentials(const std::string& certificate,
492 const std::string& public_key,
493 const std::string& nonce,
494 const std::string& signed_data,
495 const std::string& destination_udn,
496 const std::string& hotspot_ssid,
497 const std::string& hotspot_bssid,
498 const std::string& network_path,
499 const ResultStringCallback& cb,
500 Error* error);
Peter Qiu1a72f542015-04-14 16:31:36 -0700501#endif // DISABLE_WIFI
Christopher Wiley0d9cf0c2013-02-19 19:24:57 -0800502
Peter Qiu9d581932014-04-14 16:37:37 -0700503 // Calculate connection identifier, which is hash of salt value, gateway IP
504 // address, and gateway MAC address.
505 int CalcConnectionId(std::string gateway_ip, std::string gateway_mac);
506
507 // Report the number of services associated with given connection
508 // |connection_id|.
509 void ReportServicesOnSameNetwork(int connection_id);
510
Peter Qiu1d499ed2015-01-30 16:01:27 -0800511 // Running in passive mode, manager will not manage any devices (all devices
512 // are blacklisted) by default. Remote application can specify devices for
513 // shill to manage through ReleaseInterface/ClaimInterface DBus API using
514 // default claimer (with "" as claimer_name).
Paul Stewart1ce231c2015-06-12 19:44:22 -0700515 virtual void SetPassiveMode();
Peter Qiu1d499ed2015-01-30 16:01:27 -0800516
Paul Stewart83d62562015-02-09 19:57:47 -0800517 // Decides whether Ethernet-like devices are treated as unknown devices
518 // if they do not indicate a driver name.
Paul Stewart1ce231c2015-06-12 19:44:22 -0700519 virtual void SetIgnoreUnknownEthernet(bool ignore);
520 virtual bool ignore_unknown_ethernet() const {
521 return ignore_unknown_ethernet_;
522 }
Paul Stewart83d62562015-02-09 19:57:47 -0800523
Garret Kellyc5f89d12015-02-18 14:39:36 -0500524 // Set the list of prepended DNS servers to |prepend_dns_servers|.
Paul Stewart8ae18742015-06-16 13:13:10 -0700525 virtual void SetPrependDNSServers(const std::string& prepend_dns_servers);
Garret Kellyc5f89d12015-02-18 14:39:36 -0500526
Matthew Wein08add482015-04-20 13:26:48 -0700527 // Accept hostname from DHCP server for devices matching |hostname_from|.
Paul Stewart8ae18742015-06-16 13:13:10 -0700528 virtual void SetAcceptHostnameFrom(const std::string& hostname_from);
529 virtual bool ShouldAcceptHostnameFrom(const std::string& device_name) const;
Matthew Wein08add482015-04-20 13:26:48 -0700530
Peter Qiud48fa0c2015-06-10 12:20:48 -0700531 // Set DHCPv6 enabled device list.
Paul Stewart1ce231c2015-06-12 19:44:22 -0700532 virtual void SetDHCPv6EnabledDevices(
Paul Stewart8ae18742015-06-16 13:13:10 -0700533 const std::vector<std::string>& device_list);
Paul Stewart1ce231c2015-06-12 19:44:22 -0700534
Peter Qiud48fa0c2015-06-10 12:20:48 -0700535 // Return true if DHCPv6 is enabled for the given device with |device_name|.
Paul Stewart8ae18742015-06-16 13:13:10 -0700536 virtual bool IsDHCPv6EnabledForDevice(const std::string& device_name) const;
Peter Qiud48fa0c2015-06-10 12:20:48 -0700537
Garret Kellyc5f89d12015-02-18 14:39:36 -0500538 // Filter the list of prepended DNS servers, copying only those that match
539 // |family| into |dns_servers|. |dns_servers| is cleared, regardless of
540 // whether or not there are any addresses that match |family|.
Paul Stewart1ce231c2015-06-12 19:44:22 -0700541 virtual std::vector<std::string> FilterPrependDNSServersByFamily(
542 IPAddress::Family family) const;
Garret Kellyc5f89d12015-02-18 14:39:36 -0500543
Samuel Tan2d36a6e2015-02-18 17:12:59 -0800544 // Returns true iff |power_manager_| exists and is suspending (i.e.
545 // power_manager->suspending() is true), false otherwise.
546 virtual bool IsSuspending();
547
Peter Qiu9b6f8b82015-08-26 09:50:47 -0700548 void RecordDarkResumeWakeReason(const std::string& wake_reason);
549
550 // Called when service's inner device changed.
551 virtual void OnInnerDevicesChanged();
552
Samuel Tan381a0bb2015-02-19 15:26:09 -0800553 void set_suppress_autoconnect(bool val) { suppress_autoconnect_ = val; }
554 bool suppress_autoconnect() { return suppress_autoconnect_; }
555
Samuel Tan8a3f68e2016-01-11 09:39:32 -0800556 // Called when remote device claimer vanishes.
557 virtual void OnDeviceClaimerVanished();
558
Paul Stewart75897df2011-04-27 09:05:53 -0700559 private:
Arman Ugurayab22c162012-10-08 19:08:38 -0700560 friend class CellularTest;
Darin Petkovc3505a52013-03-18 15:13:29 +0100561 friend class DeviceInfoTest;
Darin Petkov6f9eaa32011-08-09 15:26:44 -0700562 friend class ManagerAdaptorInterface;
Paul Stewart22aa71b2011-09-16 12:15:11 -0700563 friend class ManagerTest;
Ben Chan66174a12014-01-08 21:27:00 -0800564 friend class ModemInfoTest;
565 friend class ModemManagerTest;
Darin Petkovcb0b5662012-12-13 09:59:44 +0100566 friend class ServiceTest;
Darin Petkovc3505a52013-03-18 15:13:29 +0100567 friend class VPNServiceTest;
Paul Stewarte369ece2012-05-22 09:11:03 -0700568 friend class WiFiObjectTest;
Darin Petkovb501ad22012-07-03 12:50:52 +0200569 friend class WiMaxProviderTest;
Arman Ugurayab22c162012-10-08 19:08:38 -0700570
Ben Chan9f3dcf82013-09-25 18:04:58 -0700571 FRIEND_TEST(CellularCapabilityUniversalMainTest, TerminationAction);
572 FRIEND_TEST(CellularCapabilityUniversalMainTest,
573 TerminationActionRemovedByStopModem);
Arman Uguray32c76402012-11-27 14:01:13 -0800574 FRIEND_TEST(CellularTest, LinkEventWontDestroyService);
Rebecca Silberstein15d54312015-10-08 15:02:59 -0700575 FRIEND_TEST(DefaultProfileTest, LoadManagerDefaultProperties);
576 FRIEND_TEST(DefaultProfileTest, LoadManagerProperties);
577 FRIEND_TEST(DefaultProfileTest, Save);
578 FRIEND_TEST(DeviceTest, AcquireIPConfigWithoutSelectedService);
579 FRIEND_TEST(DeviceTest, AcquireIPConfigWithSelectedService);
Paul Stewartff6be292014-11-24 17:05:03 -0800580 FRIEND_TEST(DeviceTest, StartProhibited);
Gaurav Shah435de2c2011-11-17 19:01:07 -0800581 FRIEND_TEST(ManagerTest, AvailableTechnologies);
Peter Qiu91b71502015-11-09 13:55:18 -0800582 FRIEND_TEST(ManagerTest, ClaimBlacklistedDevice);
Peter Qiu7e8b8ee2014-11-25 13:55:57 -0800583 FRIEND_TEST(ManagerTest, ClaimDeviceWhenClaimerNotVerified);
584 FRIEND_TEST(ManagerTest, ClaimDeviceWithoutClaimer);
Gaurav Shah435de2c2011-11-17 19:01:07 -0800585 FRIEND_TEST(ManagerTest, ConnectedTechnologies);
Prathmesh Prabhu9fdb84b2014-08-21 18:41:58 -0700586 FRIEND_TEST(ManagerTest, ConnectionStatusCheck);
Paul Stewart39db5ca2013-03-18 14:15:17 -0700587 FRIEND_TEST(ManagerTest, ConnectToBestServices);
Rebecca Silberstein6862b382014-09-11 08:24:51 -0700588 FRIEND_TEST(ManagerTest, CreateConnectivityReport);
Gaurav Shah435de2c2011-11-17 19:01:07 -0800589 FRIEND_TEST(ManagerTest, DefaultTechnology);
Paul Stewart2cb3fa72014-11-13 01:43:12 -0800590 FRIEND_TEST(ManagerTest, DetectMultiHomedDevices);
Peter Qiu7e8b8ee2014-11-25 13:55:57 -0800591 FRIEND_TEST(ManagerTest, DeviceClaimerVanishedTask);
Peter Qiu94d18af2014-09-11 15:54:15 -0700592 FRIEND_TEST(ManagerTest, DevicePresenceStatusCheck);
Paul Stewart1b253142012-01-26 14:05:52 -0800593 FRIEND_TEST(ManagerTest, DeviceRegistrationAndStart);
Darin Petkova5e07ef2012-07-09 14:27:57 +0200594 FRIEND_TEST(ManagerTest, DisableTechnology);
595 FRIEND_TEST(ManagerTest, EnableTechnology);
Paul Stewart1b253142012-01-26 14:05:52 -0800596 FRIEND_TEST(ManagerTest, EnumerateProfiles);
Peter Qiu8e60d612015-08-21 10:29:15 -0700597 FRIEND_TEST(ManagerTest, EnumerateServiceInnerDevices);
Paul Stewart65512e12012-03-26 18:01:08 -0700598 FRIEND_TEST(ManagerTest, HandleProfileEntryDeletionWithUnload);
mukesh agrawal00752532013-05-03 15:46:55 -0700599 FRIEND_TEST(ManagerTest, InitializeProfilesInformsProviders);
600 FRIEND_TEST(ManagerTest, InitializeProfilesHandlesDefaults);
Paul Stewart3c504012013-01-17 17:49:58 -0800601 FRIEND_TEST(ManagerTest, IsDefaultProfile);
Ben Chan8e6b8ef2014-07-14 21:50:18 -0700602 FRIEND_TEST(ManagerTest, IsTechnologyAutoConnectDisabled);
Paul Stewartff6be292014-11-24 17:05:03 -0800603 FRIEND_TEST(ManagerTest, IsTechnologyProhibited);
Prathmesh Prabhu9fdb84b2014-08-21 18:41:58 -0700604 FRIEND_TEST(ManagerTest, IsWifiIdle);
Paul Stewart036dba02012-08-07 12:34:41 -0700605 FRIEND_TEST(ManagerTest, LinkMonitorEnabled);
Prathmesh Prabhu9fdb84b2014-08-21 18:41:58 -0700606 FRIEND_TEST(ManagerTest, MoveService);
Darin Petkova5e07ef2012-07-09 14:27:57 +0200607 FRIEND_TEST(ManagerTest, NotifyDefaultServiceChanged);
Peter Qiud13249c2015-10-27 14:42:32 -0700608 FRIEND_TEST(ManagerTest, OnApModeSetterVanished);
Peter Qiu7e8b8ee2014-11-25 13:55:57 -0800609 FRIEND_TEST(ManagerTest, OnDeviceClaimerAppeared);
Paul Stewart65512e12012-03-26 18:01:08 -0700610 FRIEND_TEST(ManagerTest, PopProfileWithUnload);
Prathmesh Prabhu9fdb84b2014-08-21 18:41:58 -0700611 FRIEND_TEST(ManagerTest, RegisterKnownService);
612 FRIEND_TEST(ManagerTest, RegisterUnknownService);
Peter Qiu91b71502015-11-09 13:55:18 -0800613 FRIEND_TEST(ManagerTest, ReleaseBlacklistedDevice);
Peter Qiu7e8b8ee2014-11-25 13:55:57 -0800614 FRIEND_TEST(ManagerTest, ReleaseDevice);
Arman Ugurayab22c162012-10-08 19:08:38 -0700615 FRIEND_TEST(ManagerTest, RunTerminationActions);
Prathmesh Prabhu9fdb84b2014-08-21 18:41:58 -0700616 FRIEND_TEST(ManagerTest, ServiceRegistration);
Peter Qiud13249c2015-10-27 14:42:32 -0700617 FRIEND_TEST(ManagerTest, SetupApModeInterface);
618 FRIEND_TEST(ManagerTest, SetupStationModeInterface);
Paul Stewart1b253142012-01-26 14:05:52 -0800619 FRIEND_TEST(ManagerTest, SortServicesWithConnection);
Paul Stewart10e9e4e2012-04-26 19:46:28 -0700620 FRIEND_TEST(ManagerTest, StartupPortalList);
Ben Chan8e6b8ef2014-07-14 21:50:18 -0700621 FRIEND_TEST(ServiceTest, IsAutoConnectable);
Darin Petkov6f9eaa32011-08-09 15:26:44 -0700622
Peter Qiu7e8b8ee2014-11-25 13:55:57 -0800623 struct DeviceClaim {
624 DeviceClaim() {}
Paul Stewart8ae18742015-06-16 13:13:10 -0700625 DeviceClaim(const std::string& in_device_name,
626 const ResultCallback& in_result_callback)
Peter Qiu7e8b8ee2014-11-25 13:55:57 -0800627 : device_name(in_device_name),
628 result_callback(in_result_callback) {}
629 std::string device_name;
630 ResultCallback result_callback;
631 };
632
Darin Petkovb65c2452012-02-23 15:17:06 +0100633 static const char kErrorNoDevice[];
634 static const char kErrorTypeRequired[];
635 static const char kErrorUnsupportedServiceType[];
636
Peter Qiu94d18af2014-09-11 15:54:15 -0700637 // Technologies to probe for.
Paul Stewart8ae18742015-06-16 13:13:10 -0700638 static const char* kProbeTechnologies[];
Peter Qiu94d18af2014-09-11 15:54:15 -0700639
Peter Qiu1d499ed2015-01-30 16:01:27 -0800640 // Name of the default claimer.
641 static const char kDefaultClaimerName[];
642
Peter Qiu94d18af2014-09-11 15:54:15 -0700643 // Timeout interval for probing various device status, and report them to
644 // UMA stats.
645 static const int kDeviceStatusCheckIntervalMilliseconds;
Darin Petkov3ec55342012-09-28 14:04:44 +0200646 // Time to wait for termination actions to complete.
Prathmesh Prabhu9fdb84b2014-08-21 18:41:58 -0700647 static const int kTerminationActionsTimeoutMilliseconds;
Darin Petkov3ec55342012-09-28 14:04:44 +0200648
mukesh agrawal8a3188d2011-12-01 20:56:44 +0000649 void AutoConnect();
Paul Stewart8ae18742015-06-16 13:13:10 -0700650 std::vector<std::string> AvailableTechnologies(Error* error);
651 std::vector<std::string> ConnectedTechnologies(Error* error);
652 std::string DefaultTechnology(Error* error);
653 std::vector<std::string> EnabledTechnologies(Error* error);
654 std::vector<std::string> UninitializedTechnologies(Error* error);
655 RpcIdentifiers EnumerateDevices(Error* error);
656 RpcIdentifiers EnumerateProfiles(Error* error);
657 RpcIdentifiers EnumerateWatchedServices(Error* error);
658 std::string GetActiveProfileRpcIdentifier(Error* error);
659 std::string GetCheckPortalList(Error* error);
660 RpcIdentifier GetDefaultServiceRpcIdentifier(Error* error);
661 std::string GetIgnoredDNSSearchPaths(Error* error);
662 ServiceRefPtr GetServiceInner(const KeyValueStore& args, Error* error);
663 bool SetCheckPortalList(const std::string& portal_list, Error* error);
664 bool SetIgnoredDNSSearchPaths(const std::string& ignored_paths, Error* error);
Paul Stewart49739c02012-08-08 17:24:03 -0700665 void EmitDefaultService();
Paul Stewart8ae18742015-06-16 13:13:10 -0700666 bool IsTechnologyInList(const std::string& technology_list,
Paul Stewart036dba02012-08-07 12:34:41 -0700667 Technology::Identifier tech) const;
Eric Shienbrood8839a892012-03-29 10:33:48 -0400668 void EmitDeviceProperties();
Peter Qiu1a72f542015-04-14 16:31:36 -0700669#if !defined(DISABLE_WIFI)
Paul Stewart8ae18742015-06-16 13:13:10 -0700670 bool SetDisableWiFiVHT(const bool& disable_wifi_vht, Error* error);
671 bool GetDisableWiFiVHT(Error* error);
Peter Qiu1a72f542015-04-14 16:31:36 -0700672#endif // DISABLE_WIFI
Paul Stewart8ae18742015-06-16 13:13:10 -0700673 bool SetProhibitedTechnologies(const std::string& prohibited_technologies,
674 Error* error);
675 std::string GetProhibitedTechnologies(Error* error);
Paul Stewartff6be292014-11-24 17:05:03 -0800676 void OnTechnologyProhibited(Technology::Identifier technology,
Paul Stewart8ae18742015-06-16 13:13:10 -0700677 const Error& error);
Chris Masoneb925cc82011-06-22 15:39:57 -0700678
Paul Stewart2cb3fa72014-11-13 01:43:12 -0800679 // For every device instance that is sharing the same connectivity with
680 // another device, enable the multi-home flag.
681 void DetectMultiHomedDevices();
682
Paul Stewart65512e12012-03-26 18:01:08 -0700683 // Unload a service while iterating through |services_|. Returns true if
684 // service was erased (which means the caller loop should not increment
685 // |service_iterator|), false otherwise (meaning the caller should
686 // increment |service_iterator|).
Paul Stewart8ae18742015-06-16 13:13:10 -0700687 bool UnloadService(std::vector<ServiceRefPtr>::iterator* service_iterator);
Paul Stewart65512e12012-03-26 18:01:08 -0700688
Paul Stewart4d5efb72012-09-17 12:24:34 -0700689 // Load Manager default properties from |profile|.
Paul Stewart8ae18742015-06-16 13:13:10 -0700690 void LoadProperties(const scoped_refptr<DefaultProfile>& profile);
Paul Stewart4d5efb72012-09-17 12:24:34 -0700691
Paul Stewart3c504012013-01-17 17:49:58 -0800692 // Configure the device with profile data from all current profiles.
Paul Stewart8ae18742015-06-16 13:13:10 -0700693 void LoadDeviceFromProfiles(const DeviceRefPtr& device);
Paul Stewart3c504012013-01-17 17:49:58 -0800694
Paul Stewart49739c02012-08-08 17:24:03 -0700695 void HelpRegisterConstDerivedRpcIdentifier(
Paul Stewart8ae18742015-06-16 13:13:10 -0700696 const std::string& name,
697 RpcIdentifier(Manager::*get)(Error*));
mukesh agrawal2366eed2012-03-20 18:21:50 -0700698 void HelpRegisterConstDerivedRpcIdentifiers(
Paul Stewart8ae18742015-06-16 13:13:10 -0700699 const std::string& name,
700 RpcIdentifiers(Manager::*get)(Error*));
mukesh agrawalffa3d042011-10-06 15:26:10 -0700701 void HelpRegisterDerivedString(
Paul Stewart8ae18742015-06-16 13:13:10 -0700702 const std::string& name,
703 std::string(Manager::*get)(Error* error),
704 bool(Manager::*set)(const std::string&, Error*));
mukesh agrawalbebf1b82013-04-23 15:06:33 -0700705 void HelpRegisterConstDerivedStrings(
Paul Stewart8ae18742015-06-16 13:13:10 -0700706 const std::string& name,
707 Strings(Manager::*get)(Error*));
Paul Stewart9d97b7d2014-03-13 21:47:03 -0700708 void HelpRegisterDerivedBool(
Paul Stewart8ae18742015-06-16 13:13:10 -0700709 const std::string& name,
710 bool(Manager::*get)(Error* error),
711 bool(Manager::*set)(const bool& value, Error* error));
Chris Masone27c4aa52011-07-02 13:10:14 -0700712
Paul Stewart8ae18742015-06-16 13:13:10 -0700713 bool HasProfile(const Profile::Identifier& ident);
714 void PushProfileInternal(const Profile::Identifier& ident,
715 std::string* path,
716 Error* error);
Paul Stewart5dc40aa2011-10-28 19:43:43 -0700717 void PopProfileInternal();
Paul Stewart78af94c2013-04-17 16:02:06 -0700718 void OnProfilesChanged();
719
Paul Stewart22aa71b2011-09-16 12:15:11 -0700720 void SortServices();
Paul Stewartdfa46052012-06-26 09:44:14 -0700721 void SortServicesTask();
Peter Qiu94d18af2014-09-11 15:54:15 -0700722 void DeviceStatusCheckTask();
723 void ConnectionStatusCheck();
724 void DevicePresenceStatusCheck();
725
Paul Stewart8ae18742015-06-16 13:13:10 -0700726 bool MatchProfileWithService(const ServiceRefPtr& service);
Paul Stewart22aa71b2011-09-16 12:15:11 -0700727
Paul Stewartd2e1c362013-03-03 19:06:07 -0800728 // Sets the profile of |service| to |profile|, without notifying its
729 // previous profile. Configures a |service| with |args|, then saves
730 // the resulting configuration to |profile|. This method is useful
731 // when copying a service configuration from one profile to another,
732 // or writing a newly created service config to a specific profile.
733 static void SetupServiceInProfile(ServiceRefPtr service,
734 ProfileRefPtr profile,
Paul Stewart8ae18742015-06-16 13:13:10 -0700735 const KeyValueStore& args,
736 Error* error);
Paul Stewartd2e1c362013-03-03 19:06:07 -0800737
Paul Stewart39db5ca2013-03-18 14:15:17 -0700738 // For each technology present, connect to the "best" service available,
739 // as determined by sorting all services independent of their current state.
740 void ConnectToBestServicesTask();
741
Paul Stewart8ae18742015-06-16 13:13:10 -0700742 void NotifyDefaultServiceChanged(const ServiceRefPtr& service);
Darin Petkova5e07ef2012-07-09 14:27:57 +0200743
Arman Ugurayab22c162012-10-08 19:08:38 -0700744 // Runs the termination actions. If all actions complete within
Ben Chan3fbf8bd2014-06-07 20:49:52 -0700745 // |kTerminationActionsTimeoutMilliseconds|, |done_callback| is called with a
746 // value of Error::kSuccess. Otherwise, it is called with
747 // Error::kOperationTimeout.
Paul Stewart8ae18742015-06-16 13:13:10 -0700748 void RunTerminationActions(const ResultCallback& done_callback);
Arman Ugurayab22c162012-10-08 19:08:38 -0700749
Daniel Eratfac09532014-04-17 20:25:59 -0700750 // Called when the system is about to be suspended. Each call will be
751 // followed by a call to OnSuspendDone().
Prathmesh Prabhu9fdb84b2014-08-21 18:41:58 -0700752 void OnSuspendImminent();
Darin Petkov3ec55342012-09-28 14:04:44 +0200753
Daniel Eratfac09532014-04-17 20:25:59 -0700754 // Called when the system has completed a suspend attempt (possibly without
755 // actually suspending, in the event of the user canceling the attempt).
Prathmesh Prabhu9fdb84b2014-08-21 18:41:58 -0700756 void OnSuspendDone();
Daniel Eratfac09532014-04-17 20:25:59 -0700757
Prathmesh Prabhu64ad2382014-08-26 11:19:30 -0700758 // Called when the system is entering a dark resume phase (and hence a dark
759 // suspend is imminent).
760 void OnDarkSuspendImminent();
761
Paul Stewart8ae18742015-06-16 13:13:10 -0700762 void OnSuspendActionsComplete(const Error& error);
763 void OnDarkResumeActionsComplete(const Error& error);
Peter Qiu1a72f542015-04-14 16:31:36 -0700764
765#if !defined(DISABLE_WIFI)
Christopher Wiley1057cd72013-02-28 15:21:29 -0800766 void VerifyToEncryptLink(std::string public_key, std::string data,
Paul Stewart8ae18742015-06-16 13:13:10 -0700767 ResultStringCallback cb, const Error& error,
Christopher Wiley1057cd72013-02-28 15:21:29 -0800768 bool success);
Peter Qiu1a72f542015-04-14 16:31:36 -0700769#endif // DISABLE_WIFI
Darin Petkovca621542012-07-25 14:25:56 +0200770
Peter Qiu574996a2014-04-04 10:55:47 -0700771 // Return true if wifi device is enabled with no existing connection (pending
772 // or connected).
773 bool IsWifiIdle();
774
Thieu Lea20cbc22012-01-09 22:01:43 +0000775 // For unit testing.
Paul Stewart8ae18742015-06-16 13:13:10 -0700776 void set_metrics(Metrics* metrics) { metrics_ = metrics; }
Paul Stewartb87d22b2013-07-29 11:11:37 -0700777 void UpdateProviderMapping();
Thieu Lea20cbc22012-01-09 22:01:43 +0000778
Gary Morainac1bdb42012-02-16 17:42:29 -0800779 // Used by tests to set a mock PowerManager. Takes ownership of
780 // power_manager.
Paul Stewart8ae18742015-06-16 13:13:10 -0700781 void set_power_manager(PowerManager* power_manager) {
Gary Morainac1bdb42012-02-16 17:42:29 -0800782 power_manager_.reset(power_manager);
783 }
784
Samuel Tanfe734672014-08-07 15:50:48 -0700785 DeviceRefPtr GetDeviceConnectedToService(ServiceRefPtr service);
786
Paul Stewart8ae18742015-06-16 13:13:10 -0700787 void DeregisterDeviceByLinkName(const std::string& link_name);
Peter Qiu7e8b8ee2014-11-25 13:55:57 -0800788
Garret Kellybabfe5a2015-04-14 16:32:33 -0400789 // Returns the names of all of the devices that have been claimed by the
790 // current DeviceClaimer. Returns an empty vector if no DeviceClaimer is set.
Paul Stewart8ae18742015-06-16 13:13:10 -0700791 std::vector<std::string> ClaimedDevices(Error* error);
Garret Kellybabfe5a2015-04-14 16:32:33 -0400792
Paul Stewart8ae18742015-06-16 13:13:10 -0700793 EventDispatcher* dispatcher_;
Albert Chaulk0e1cdea2013-02-27 15:32:55 -0800794 const base::FilePath run_path_;
795 const base::FilePath storage_path_;
mukesh agrawald48e8142015-09-21 17:05:06 -0700796 const base::FilePath user_storage_path_;
mukesh agrawald142fd62013-05-01 16:50:57 -0700797 base::FilePath user_profile_list_path_; // Changed in tests.
Ben Chancd477322014-10-17 14:19:30 -0700798 std::unique_ptr<ManagerAdaptorInterface> adaptor_;
Paul Stewart0af98bf2011-05-10 17:38:08 -0700799 DeviceInfo device_info_;
Ben Chan5742b242013-12-18 16:25:43 -0800800#if !defined(DISABLE_CELLULAR)
Darin Petkov887f2982011-07-14 16:10:17 -0700801 ModemInfo modem_info_;
Ben Chan5742b242013-12-18 16:25:43 -0800802#endif // DISABLE_CELLULAR
Peter Qiu1a72f542015-04-14 16:31:36 -0700803#if !defined(DISABLE_WIRED_8021X)
Ben Chancd477322014-10-17 14:19:30 -0700804 std::unique_ptr<EthernetEapProvider> ethernet_eap_provider_;
Peter Qiu1a72f542015-04-14 16:31:36 -0700805#endif // DISABLE_WIRED_8021X
Ben Chancd477322014-10-17 14:19:30 -0700806 std::unique_ptr<VPNProvider> vpn_provider_;
Peter Qiu1a72f542015-04-14 16:31:36 -0700807#if !defined(DISABLE_WIFI)
Ben Chancd477322014-10-17 14:19:30 -0700808 std::unique_ptr<WiFiProvider> wifi_provider_;
Peter Qiud13249c2015-10-27 14:42:32 -0700809#if defined(__BRILLO__)
810 WiFiDriverHal* wifi_driver_hal_;
Peter Qiud13249c2015-10-27 14:42:32 -0700811#endif // __BRILLO__
Peter Qiu1a72f542015-04-14 16:31:36 -0700812#endif // DISABLE_WIFI
Ben Chan520eb172013-10-30 20:51:04 -0700813#if !defined(DISABLE_WIMAX)
Ben Chancd477322014-10-17 14:19:30 -0700814 std::unique_ptr<WiMaxProvider> wimax_provider_;
Ben Chan520eb172013-10-30 20:51:04 -0700815#endif // DISABLE_WIMAX
Paul Stewart4d5efb72012-09-17 12:24:34 -0700816 // Hold pointer to singleton Resolver instance for testing purposes.
Paul Stewart8ae18742015-06-16 13:13:10 -0700817 Resolver* resolver_;
Paul Stewart75897df2011-04-27 09:05:53 -0700818 bool running_;
Paul Stewart5dc40aa2011-10-28 19:43:43 -0700819 // Used to facilitate unit tests which can't use RPC.
820 bool connect_profiles_to_rpc_;
Chris Masonec1e50412011-06-07 13:04:53 -0700821 std::vector<DeviceRefPtr> devices_;
Chris Masone6791a432011-07-12 13:23:19 -0700822 // We store Services in a vector, because we want to keep them sorted.
Gary Morain028545d2012-04-07 14:55:52 -0700823 // Services that are connected appear first in the vector. See
824 // Service::Compare() for details of the sorting criteria.
Chris Masonec1e50412011-06-07 13:04:53 -0700825 std::vector<ServiceRefPtr> services_;
Paul Stewartb87d22b2013-07-29 11:11:37 -0700826 // Map of technologies to Provider instances. These pointers are owned
827 // by the respective scoped_reptr objects that are held over the lifetime
828 // of the Manager object.
Paul Stewart8ae18742015-06-16 13:13:10 -0700829 std::map<Technology::Identifier, ProviderInterface*> providers_;
Gaurav Shah71354762011-11-28 19:22:49 -0800830 // List of startup profile names to push on the profile stack on startup.
Chris Masone7aa5f902011-07-11 11:13:35 -0700831 std::vector<ProfileRefPtr> profiles_;
832 ProfileRefPtr ephemeral_profile_;
Paul Stewart8ae18742015-06-16 13:13:10 -0700833 ControlInterface* control_interface_;
834 Metrics* metrics_;
Ben Chancd477322014-10-17 14:19:30 -0700835 std::unique_ptr<PowerManager> power_manager_;
Paul Stewart59a8cba2015-01-09 15:48:19 -0800836 std::unique_ptr<Upstart> upstart_;
Chris Masone3bd3c8c2011-06-13 08:20:26 -0700837
Paul Stewart22aa71b2011-09-16 12:15:11 -0700838 // The priority order of technologies
839 std::vector<Technology::Identifier> technology_order_;
840
Paul Stewart49739c02012-08-08 17:24:03 -0700841 // This is the last Service RPC Identifier for which we emitted a
842 // "DefaultService" signal for.
843 RpcIdentifier default_service_rpc_identifier_;
844
Paul Stewart10e9e4e2012-04-26 19:46:28 -0700845 // Manager can be optionally configured with a list of technologies to
846 // do portal detection on at startup. We need to keep track of that list
847 // as well as a flag that tells us whether we should continue using it
848 // instead of the configured portal list.
849 std::string startup_portal_list_;
850 bool use_startup_portal_list_;
851
Chris Masoneb925cc82011-06-22 15:39:57 -0700852 // Properties to be get/set via PropertyStore calls.
Chris Masone88cbd5f2011-07-03 14:30:04 -0700853 Properties props_;
Chris Masone27c4aa52011-07-02 13:10:14 -0700854 PropertyStore store_;
Gary Moraina9fb3252012-05-31 12:05:31 -0700855
Matthew Wein08add482015-04-20 13:26:48 -0700856 // Accept hostname supplied by the DHCP server from the specified devices.
857 // eg. eth0 or eth*
858 std::string accept_hostname_from_;
859
Paul Stewartdfa46052012-06-26 09:44:14 -0700860 base::CancelableClosure sort_services_task_;
Darin Petkov3ec55342012-09-28 14:04:44 +0200861
Peter Qiu94d18af2014-09-11 15:54:15 -0700862 // Task for periodically checking various device status.
863 base::CancelableClosure device_status_check_task_;
Peter Qiu700de642014-07-14 16:31:30 -0700864
Darin Petkov3ec55342012-09-28 14:04:44 +0200865 // TODO(petkov): Currently this handles both terminate and suspend
866 // actions. Rename all relevant identifiers to capture this.
Gary Moraina9fb3252012-05-31 12:05:31 -0700867 HookTable termination_actions_;
Darin Petkova5e07ef2012-07-09 14:27:57 +0200868
Daniel Erat0818cca2012-12-14 10:16:21 -0800869 // Is a suspend delay currently registered with the power manager?
870 bool suspend_delay_registered_;
871
Paul Stewart8e9e41c2014-08-07 14:55:47 -0700872 // Whether Wake on LAN should be enabled for all Ethernet devices.
873 bool is_wake_on_lan_enabled_;
874
Paul Stewart83d62562015-02-09 19:57:47 -0800875 // Whether to ignore Ethernet-like devices that don't have an assigned driver.
876 bool ignore_unknown_ethernet_;
877
Darin Petkova5e07ef2012-07-09 14:27:57 +0200878 // Maps tags to callbacks for monitoring default service changes.
879 std::map<int, ServiceCallback> default_service_callbacks_;
880 int default_service_callback_tag_;
Christopher Wiley1057cd72013-02-28 15:21:29 -0800881
882 // Delegate to handle destination verification operations for the manager.
Ben Chancd477322014-10-17 14:19:30 -0700883 std::unique_ptr<CryptoUtilProxy> crypto_util_proxy_;
Prathmesh Prabhuba99b592013-04-17 15:13:14 -0700884
885 // Stores IP addresses of some remote hosts that accept port 80 TCP
886 // connections. ConnectionHealthChecker uses these IPs.
887 // The store resides in Manager so that it persists across Device reset.
Ben Chancd477322014-10-17 14:19:30 -0700888 std::unique_ptr<IPAddressStore> health_checker_remote_ips_;
Paul Stewart7de7e022013-08-28 09:42:50 -0700889
890 // Stores the most recent copy of geolocation information for each
891 // technology type.
892 std::map<std::string, GeolocationInfos> networks_for_geolocation_;
Paul Stewart03e29f72013-09-26 00:49:48 -0700893
894 // Stores the state of the highest ranked connected service.
895 std::string connection_state_;
mukesh agrawal92496a42014-04-08 16:04:43 -0700896
Paul Stewart220ae4e2015-02-12 13:04:36 -0800897 // Stores the most recent state of all watched services.
898 std::map<std::string, Service::ConnectState> watched_service_states_;
899
Peter Qiu1d499ed2015-01-30 16:01:27 -0800900 // Device claimer is a remote application/service that claim/release devices
901 // from/to shill. To reduce complexity, only allow one device claimer at a
902 // time.
Peter Qiu7e8b8ee2014-11-25 13:55:57 -0800903 std::unique_ptr<DeviceClaimer> device_claimer_;
Peter Qiu7e8b8ee2014-11-25 13:55:57 -0800904
Samuel Tan381a0bb2015-02-19 15:26:09 -0800905 // When true, suppresses autoconnects in Manager::AutoConnect.
906 bool suppress_autoconnect_;
907
Roshan Pius2b35cfb2015-05-01 14:15:27 -0700908 // Whether any of the services is in connected state or not.
909 bool is_connected_state_;
910
Peter Qiu91b71502015-11-09 13:55:18 -0800911 // List of blacklisted devices specified from command line.
912 std::vector<std::string> blacklisted_devices_;
913
Christopher Grantc1d44732016-01-15 10:54:45 -0500914 // List of whitelisted devices specified from command line.
915 std::vector<std::string> whitelisted_devices_;
916
Peter Qiud48fa0c2015-06-10 12:20:48 -0700917 // List of DHCPv6 enabled devices.
918 std::vector<std::string> dhcpv6_enabled_devices_;
919
Rebecca Silberstein15d54312015-10-08 15:02:59 -0700920 // DhcpProperties stored for the default profile.
921 std::unique_ptr<DhcpProperties> dhcp_properties_;
922
mukesh agrawal92496a42014-04-08 16:04:43 -0700923 DISALLOW_COPY_AND_ASSIGN(Manager);
Paul Stewart75897df2011-04-27 09:05:53 -0700924};
925
926} // namespace shill
927
Darin Petkov002c58e2012-06-19 02:56:05 +0200928#endif // SHILL_MANAGER_H_