blob: 79381800877467582a2d3e7d69f27d10b51ed782 [file] [log] [blame]
Alex Deymoaea4c1c2015-08-19 20:24:43 -07001//
2// Copyright (C) 2014 The Android Open Source Project
3//
4// Licensed under the Apache License, Version 2.0 (the "License");
5// you may not use this file except in compliance with the License.
6// You may obtain a copy of the License at
7//
8// http://www.apache.org/licenses/LICENSE-2.0
9//
10// Unless required by applicable law or agreed to in writing, software
11// distributed under the License is distributed on an "AS IS" BASIS,
12// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13// See the License for the specific language governing permissions and
14// limitations under the License.
15//
Gilad Arnold55f39b72014-01-28 12:51:45 -080016
Alex Deymo63784a52014-05-28 10:46:14 -070017#include "update_engine/update_manager/real_shill_provider.h"
Gilad Arnold55f39b72014-01-28 12:51:45 -080018
Gilad Arnold5ef9c482014-03-03 13:51:02 -080019#include <string>
20
21#include <base/logging.h>
Alex Vakulenko75039d72014-03-25 12:36:28 -070022#include <base/strings/stringprintf.h>
Alex Vakulenko3f39d5c2015-10-13 09:27:13 -070023#include <brillo/type_name_undecorate.h>
Alex Deymod6deb1d2015-08-28 15:54:37 -070024#include <shill/dbus-constants.h>
25#include <shill/dbus-proxies.h>
Alex Deymob8803bb2015-08-19 23:14:49 -070026
Alex Deymo30534502015-07-20 15:06:33 -070027using org::chromium::flimflam::ManagerProxyInterface;
28using org::chromium::flimflam::ServiceProxyInterface;
Gilad Arnold5ef9c482014-03-03 13:51:02 -080029using std::string;
30
Alex Deymo63784a52014-05-28 10:46:14 -070031namespace chromeos_update_manager {
Gilad Arnold55f39b72014-01-28 12:51:45 -080032
Alex Deymo30534502015-07-20 15:06:33 -070033ConnectionType RealShillProvider::ParseConnectionType(const string& type_str) {
34 if (type_str == shill::kTypeEthernet) {
Gilad Arnoldef120fa2014-04-09 12:52:10 -070035 return ConnectionType::kEthernet;
Alex Deymo30534502015-07-20 15:06:33 -070036 } else if (type_str == shill::kTypeWifi) {
Gilad Arnoldef120fa2014-04-09 12:52:10 -070037 return ConnectionType::kWifi;
Alex Deymo30534502015-07-20 15:06:33 -070038 } else if (type_str == shill::kTypeWimax) {
Gilad Arnoldef120fa2014-04-09 12:52:10 -070039 return ConnectionType::kWimax;
Alex Deymo30534502015-07-20 15:06:33 -070040 } else if (type_str == shill::kTypeBluetooth) {
Gilad Arnoldef120fa2014-04-09 12:52:10 -070041 return ConnectionType::kBluetooth;
Alex Deymo30534502015-07-20 15:06:33 -070042 } else if (type_str == shill::kTypeCellular) {
Gilad Arnoldef120fa2014-04-09 12:52:10 -070043 return ConnectionType::kCellular;
Alex Deymo30534502015-07-20 15:06:33 -070044 }
Gilad Arnoldef120fa2014-04-09 12:52:10 -070045 return ConnectionType::kUnknown;
46}
47
48ConnectionTethering RealShillProvider::ParseConnectionTethering(
Alex Deymo30534502015-07-20 15:06:33 -070049 const string& tethering_str) {
50 if (tethering_str == shill::kTetheringNotDetectedState) {
Gilad Arnoldef120fa2014-04-09 12:52:10 -070051 return ConnectionTethering::kNotDetected;
Alex Deymo30534502015-07-20 15:06:33 -070052 } else if (tethering_str == shill::kTetheringSuspectedState) {
Gilad Arnoldef120fa2014-04-09 12:52:10 -070053 return ConnectionTethering::kSuspected;
Alex Deymo30534502015-07-20 15:06:33 -070054 } else if (tethering_str == shill::kTetheringConfirmedState) {
Gilad Arnoldef120fa2014-04-09 12:52:10 -070055 return ConnectionTethering::kConfirmed;
Alex Deymo30534502015-07-20 15:06:33 -070056 }
Gilad Arnoldef120fa2014-04-09 12:52:10 -070057 return ConnectionTethering::kUnknown;
58}
59
Alex Deymo42c30c32014-04-24 18:41:18 -070060bool RealShillProvider::Init() {
Alex Deymo30534502015-07-20 15:06:33 -070061 ManagerProxyInterface* manager_proxy = shill_proxy_->GetManagerProxy();
62 if (!manager_proxy)
Gilad Arnold5ef9c482014-03-03 13:51:02 -080063 return false;
Gilad Arnold55f39b72014-01-28 12:51:45 -080064
Gilad Arnoldbeb39e92014-03-11 11:34:50 -070065 // Subscribe to the manager's PropertyChanged signal.
Alex Deymo30534502015-07-20 15:06:33 -070066 manager_proxy->RegisterPropertyChangedSignalHandler(
67 base::Bind(&RealShillProvider::OnManagerPropertyChanged,
68 base::Unretained(this)),
69 base::Bind(&RealShillProvider::OnSignalConnected,
70 base::Unretained(this)));
Gilad Arnold5ef9c482014-03-03 13:51:02 -080071
Gilad Arnoldef120fa2014-04-09 12:52:10 -070072 // Attempt to read initial connection status. Even if this fails because shill
73 // is not responding (e.g. it is down) we'll be notified via "PropertyChanged"
74 // signal as soon as it comes up, so this is not a critical step.
Alex Vakulenko3f39d5c2015-10-13 09:27:13 -070075 brillo::VariantDictionary properties;
76 brillo::ErrorPtr error;
Alex Deymo30534502015-07-20 15:06:33 -070077 if (!manager_proxy->GetProperties(&properties, &error))
78 return true;
79
80 const auto& prop_default_service =
81 properties.find(shill::kDefaultServiceProperty);
82 if (prop_default_service != properties.end()) {
83 OnManagerPropertyChanged(prop_default_service->first,
84 prop_default_service->second);
Gilad Arnold5ef9c482014-03-03 13:51:02 -080085 }
86
Gilad Arnoldef120fa2014-04-09 12:52:10 -070087 return true;
Gilad Arnold5ef9c482014-03-03 13:51:02 -080088}
89
Alex Deymo30534502015-07-20 15:06:33 -070090void RealShillProvider::OnManagerPropertyChanged(const string& name,
Alex Vakulenko3f39d5c2015-10-13 09:27:13 -070091 const brillo::Any& value) {
Alex Deymo758dd532015-09-09 15:21:22 -070092 if (name == shill::kDefaultServiceProperty) {
93 dbus::ObjectPath service_path = value.TryGet<dbus::ObjectPath>();
94 if (!service_path.IsValid()) {
95 LOG(WARNING) << "Got an invalid DefaultService path. The property value "
96 "contains a "
Alex Vakulenkodf6d9f42015-10-23 11:24:46 -070097 << value.GetUndecoratedTypeName()
Alex Deymo758dd532015-09-09 15:21:22 -070098 << ", read as the object path: '" << service_path.value()
99 << "'";
100 }
101 ProcessDefaultService(service_path);
102 }
Gilad Arnold5ef9c482014-03-03 13:51:02 -0800103}
104
Alex Deymo30534502015-07-20 15:06:33 -0700105void RealShillProvider::OnSignalConnected(const string& interface_name,
106 const string& signal_name,
107 bool successful) {
108 if (!successful) {
109 LOG(ERROR) << "Couldn't connect to the signal " << interface_name << "."
110 << signal_name;
Gilad Arnold5ef9c482014-03-03 13:51:02 -0800111 }
Gilad Arnold5ef9c482014-03-03 13:51:02 -0800112}
113
Alex Deymo30534502015-07-20 15:06:33 -0700114bool RealShillProvider::ProcessDefaultService(
Alex Deymo758dd532015-09-09 15:21:22 -0700115 const dbus::ObjectPath& default_service_path) {
Alex Deymo30534502015-07-20 15:06:33 -0700116 // We assume that if the service path didn't change, then the connection
117 // type and the tethering status of it also didn't change.
118 if (default_service_path_ == default_service_path)
Gilad Arnoldef120fa2014-04-09 12:52:10 -0700119 return true;
120
Gilad Arnoldd3df25f2014-04-22 08:39:48 -0700121 // Update the connection status.
Alex Deymo30534502015-07-20 15:06:33 -0700122 default_service_path_ = default_service_path;
Alex Deymo758dd532015-09-09 15:21:22 -0700123 bool is_connected = (default_service_path_.IsValid() &&
124 default_service_path_.value() != "/");
Gilad Arnoldd3df25f2014-04-22 08:39:48 -0700125 var_is_connected_.SetValue(is_connected);
126 var_conn_last_changed_.SetValue(clock_->GetWallclockTime());
Gilad Arnoldef120fa2014-04-09 12:52:10 -0700127
Alex Deymo30534502015-07-20 15:06:33 -0700128 if (!is_connected) {
Gilad Arnoldd3df25f2014-04-22 08:39:48 -0700129 var_conn_type_.UnsetValue();
130 var_conn_tethering_.UnsetValue();
Alex Deymo30534502015-07-20 15:06:33 -0700131 return true;
132 }
133
134 // We create and dispose the ServiceProxyInterface on every request.
135 std::unique_ptr<ServiceProxyInterface> service =
136 shill_proxy_->GetServiceForPath(default_service_path_);
137
138 // Get the connection properties synchronously.
Alex Vakulenko3f39d5c2015-10-13 09:27:13 -0700139 brillo::VariantDictionary properties;
140 brillo::ErrorPtr error;
Alex Deymo30534502015-07-20 15:06:33 -0700141 if (!service->GetProperties(&properties, &error)) {
142 var_conn_type_.UnsetValue();
143 var_conn_tethering_.UnsetValue();
144 return false;
145 }
146
147 // Get the connection tethering mode.
148 const auto& prop_tethering = properties.find(shill::kTetheringProperty);
149 if (prop_tethering == properties.end()) {
150 // Remove the value if not present on the service. This most likely means an
151 // error in shill and the policy will handle it, but we will print a log
152 // message as well for accessing an unused variable.
153 var_conn_tethering_.UnsetValue();
Alex Deymo758dd532015-09-09 15:21:22 -0700154 LOG(ERROR) << "Could not find connection type (service: "
155 << default_service_path_.value() << ")";
Alex Deymo30534502015-07-20 15:06:33 -0700156 } else {
157 // If the property doesn't contain a string value, the empty string will
158 // become kUnknown.
159 var_conn_tethering_.SetValue(
160 ParseConnectionTethering(prop_tethering->second.TryGet<string>()));
161 }
162
163 // Get the connection type.
164 const auto& prop_type = properties.find(shill::kTypeProperty);
165 if (prop_type == properties.end()) {
166 var_conn_type_.UnsetValue();
Alex Deymo758dd532015-09-09 15:21:22 -0700167 LOG(ERROR) << "Could not find connection tethering mode (service: "
168 << default_service_path_.value() << ")";
Alex Deymo30534502015-07-20 15:06:33 -0700169 } else {
170 string type_str = prop_type->second.TryGet<string>();
171 if (type_str == shill::kTypeVPN) {
172 const auto& prop_physical =
173 properties.find(shill::kPhysicalTechnologyProperty);
174 if (prop_physical == properties.end()) {
175 LOG(ERROR) << "No PhysicalTechnology property found for a VPN"
Alex Deymo758dd532015-09-09 15:21:22 -0700176 << " connection (service: " << default_service_path_.value()
Alex Deymo30534502015-07-20 15:06:33 -0700177 << "). Using default kUnknown value.";
178 var_conn_type_.SetValue(ConnectionType::kUnknown);
179 } else {
180 var_conn_type_.SetValue(
181 ParseConnectionType(prop_physical->second.TryGet<string>()));
182 }
183 } else {
184 var_conn_type_.SetValue(ParseConnectionType(type_str));
185 }
Gilad Arnoldef120fa2014-04-09 12:52:10 -0700186 }
Gilad Arnolddf3dd242014-04-09 07:15:51 -0700187
Gilad Arnoldbeb39e92014-03-11 11:34:50 -0700188 return true;
189}
190
Alex Deymo63784a52014-05-28 10:46:14 -0700191} // namespace chromeos_update_manager