5 * Copyright (C) 2012 Intel Corporation. All rights reserved.
7 * This program is free software; you can redistribute it and/or modify
8 * it under the terms of the GNU General Public License version 2 as
9 * published by the Free Software Foundation.
11 * This program is distributed in the hope that it will be useful,
12 * but WITHOUT ANY WARRANTY; without even the implied warranty of
13 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
14 * GNU General Public License for more details.
16 * You should have received a copy of the GNU General Public License
17 * along with this program; if not, write to the Free Software
18 * Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA
28 #include <sys/socket.h>
34 #define CONNMAN_API_SUBJECT_TO_CHANGE
35 #include <connman/technology.h>
36 #include <connman/plugin.h>
37 #include <connman/log.h>
38 #include <connman/dbus.h>
39 #include <connman/provider.h>
40 #include <connman/ipaddress.h>
41 #include <connman/vpn-dbus.h>
43 #define DBUS_TIMEOUT 10000
45 static DBusConnection *connection;
47 static GHashTable *vpn_connections = NULL;
48 static gboolean starting_vpnd = TRUE;
50 static guint added_watch;
51 static guint removed_watch;
52 static guint property_watch;
54 struct connection_data {
56 struct connman_provider *provider;
58 DBusPendingCall *call;
67 GHashTable *setting_strings;
69 struct connman_ipaddress *ip;
72 static int set_string(struct connman_provider *provider,
73 const char *key, const char *value)
75 struct connection_data *data;
77 data = connman_provider_get_data(provider);
81 DBG("data %p provider %p key %s value %s", data, provider, key, value);
83 if (g_str_equal(key, "Type") == TRUE) {
85 data->type = g_strdup(value);
86 } else if (g_str_equal(key, "Name") == TRUE) {
88 data->name = g_strdup(value);
89 } else if (g_str_equal(key, "Host") == TRUE) {
91 data->host = g_strdup(value);
92 } else if (g_str_equal(key, "VPN.Domain") == TRUE ||
93 g_str_equal(key, "Domain") == TRUE) {
95 data->domain = g_strdup(value);
97 g_hash_table_replace(data->setting_strings,
98 g_strdup(key), g_strdup(value));
102 static const char *get_string(struct connman_provider *provider,
105 struct connection_data *data;
107 data = connman_provider_get_data(provider);
111 DBG("data %p provider %p key %s", data, provider, key);
113 if (g_str_equal(key, "Type") == TRUE)
115 else if (g_str_equal(key, "Name") == TRUE)
117 else if (g_str_equal(key, "Host") == TRUE)
119 else if (g_str_equal(key, "VPN.Domain") == TRUE)
122 return g_hash_table_lookup(data->setting_strings, key);
125 static char *get_ident(const char *path)
132 pos = strrchr(path, '/');
139 static void set_provider_state(struct connection_data *data)
141 if (g_str_equal(data->state, "ready") == TRUE)
142 connman_provider_set_state(data->provider,
143 CONNMAN_PROVIDER_STATE_READY);
144 else if (g_str_equal(data->state, "configuration") == TRUE)
145 connman_provider_set_state(data->provider,
146 CONNMAN_PROVIDER_STATE_CONNECT);
147 else if (g_str_equal(data->state, "idle") == TRUE)
148 connman_provider_set_state(data->provider,
149 CONNMAN_PROVIDER_STATE_IDLE);
150 else if (g_str_equal(data->state, "disconnect") == TRUE)
151 connman_provider_set_state(data->provider,
152 CONNMAN_PROVIDER_STATE_DISCONNECT);
153 else if (g_str_equal(data->state, "failure") == TRUE)
154 connman_provider_set_state(data->provider,
155 CONNMAN_PROVIDER_STATE_FAILURE);
157 connman_provider_set_state(data->provider,
158 CONNMAN_PROVIDER_STATE_UNKNOWN);
161 static int create_provider(struct connection_data *data, void *user_data)
163 struct connman_provider_driver *driver = user_data;
167 DBG("%s", data->path);
169 ident = g_strdup(get_ident(data->path));
171 data->provider = connman_provider_get(ident);
172 if (data->provider == NULL) {
177 DBG("provider %p name %s", data->provider, data->name);
179 connman_provider_set_data(data->provider, data);
180 connman_provider_set_driver(data->provider, driver);
182 err = connman_provider_create_service(data->provider);
184 if (g_str_equal(data->state, "ready") == TRUE) {
185 connman_provider_set_index(data->provider,
187 if (data->ip != NULL)
188 connman_provider_set_ipaddress(data->provider,
192 set_provider_state(data);
200 static struct connection_data *create_connection_data(const char *path)
202 struct connection_data *data;
204 data = g_try_new0(struct connection_data, 1);
208 DBG("path %s", path);
210 data->path = g_strdup(path);
213 data->setting_strings = g_hash_table_new_full(g_str_hash,
214 g_str_equal, g_free, g_free);
219 static int extract_ip(DBusMessageIter *array, int family,
220 struct connection_data *data)
222 DBusMessageIter dict;
223 char *address = NULL, *gateway = NULL, *netmask = NULL, *peer = NULL;
224 unsigned char prefix_len;
226 if (dbus_message_iter_get_arg_type(array) != DBUS_TYPE_ARRAY)
229 dbus_message_iter_recurse(array, &dict);
231 while (dbus_message_iter_get_arg_type(&dict) == DBUS_TYPE_DICT_ENTRY) {
232 DBusMessageIter entry, value;
235 dbus_message_iter_recurse(&dict, &entry);
236 dbus_message_iter_get_basic(&entry, &key);
238 dbus_message_iter_next(&entry);
239 dbus_message_iter_recurse(&entry, &value);
241 if (g_str_equal(key, "Address") == TRUE) {
242 dbus_message_iter_get_basic(&value, &address);
243 DBG("address %s", address);
244 } else if (g_str_equal(key, "Netmask") == TRUE) {
245 dbus_message_iter_get_basic(&value, &netmask);
246 DBG("netmask %s", netmask);
247 } else if (g_str_equal(key, "PrefixLength") == TRUE) {
248 dbus_message_iter_get_basic(&value, &netmask);
249 DBG("prefix length %s", netmask);
250 } else if (g_str_equal(key, "Peer") == TRUE) {
251 dbus_message_iter_get_basic(&value, &peer);
252 DBG("peer %s", peer);
253 } else if (g_str_equal(key, "Gateway") == TRUE) {
254 dbus_message_iter_get_basic(&value, &gateway);
255 DBG("gateway %s", gateway);
258 dbus_message_iter_next(&dict);
261 data->ip = connman_ipaddress_alloc(family);
262 if (data->ip == NULL)
267 connman_ipaddress_set_ipv4(data->ip, address, netmask,
271 prefix_len = atoi(netmask);
272 connman_ipaddress_set_ipv6(data->ip, address, prefix_len,
279 connman_ipaddress_set_peer(data->ip, peer);
284 static int extract_nameservers(DBusMessageIter *array,
285 struct connection_data *data)
287 DBusMessageIter entry;
288 char **nameservers = NULL;
291 dbus_message_iter_recurse(array, &entry);
293 while (dbus_message_iter_get_arg_type(&entry) == DBUS_TYPE_STRING) {
294 const char *nameserver;
296 dbus_message_iter_get_basic(&entry, &nameserver);
298 nameservers = g_try_renew(char *, nameservers, i + 2);
299 if (nameservers == NULL)
302 DBG("[%d] %s", i, nameserver);
304 nameservers[i] = g_strdup(nameserver);
305 if (nameservers[i] == NULL)
308 nameservers[++i] = NULL;
310 dbus_message_iter_next(&entry);
313 g_strfreev(data->nameservers);
314 data->nameservers = nameservers;
319 static void connect_reply(DBusPendingCall *call, void *user_data)
324 if (dbus_pending_call_get_completed(call) == FALSE)
327 DBG("user_data %p", user_data);
329 reply = dbus_pending_call_steal_reply(call);
331 dbus_error_init(&error);
333 if (dbus_set_error_from_message(&error, reply) == TRUE) {
334 if (dbus_error_has_name(&error, CONNMAN_ERROR_INTERFACE
335 ".InProgress") == FALSE) {
336 connman_error("Connect reply: %s (%s)", error.message,
338 dbus_error_free(&error);
341 dbus_error_free(&error);
345 * The vpn connection is up when we get a "ready" state
346 * property so at this point we do nothing for the provider
351 dbus_message_unref(reply);
353 dbus_pending_call_unref(call);
356 static int connect_provider(struct connection_data *data, void *user_data)
358 DBusPendingCall *call;
359 DBusMessage *message;
361 DBG("data %p", data);
363 message = dbus_message_new_method_call(VPN_SERVICE, data->path,
364 VPN_CONNECTION_INTERFACE,
369 if (dbus_connection_send_with_reply(connection, message,
370 &call, DBUS_TIMEOUT) == FALSE) {
371 connman_error("Unable to call %s.%s()",
372 VPN_CONNECTION_INTERFACE, VPN_CONNECT);
373 dbus_message_unref(message);
378 dbus_message_unref(message);
382 dbus_pending_call_set_notify(call, connect_reply, NULL, NULL);
384 dbus_message_unref(message);
389 static void add_connection(const char *path, DBusMessageIter *properties,
392 struct connection_data *data;
395 data = g_hash_table_lookup(vpn_connections, path);
399 data = create_connection_data(path);
403 DBG("data %p path %s", data, path);
405 while (dbus_message_iter_get_arg_type(properties) ==
406 DBUS_TYPE_DICT_ENTRY) {
407 DBusMessageIter entry, value;
411 dbus_message_iter_recurse(properties, &entry);
412 dbus_message_iter_get_basic(&entry, &key);
414 dbus_message_iter_next(&entry);
415 dbus_message_iter_recurse(&entry, &value);
417 if (g_str_equal(key, "State") == TRUE) {
418 dbus_message_iter_get_basic(&value, &str);
419 DBG("state %s -> %s", data->state, str);
420 data->state = g_strdup(str);
421 } else if (g_str_equal(key, "IPv4") == TRUE) {
422 extract_ip(&value, AF_INET, data);
423 } else if (g_str_equal(key, "IPv6") == TRUE) {
424 extract_ip(&value, AF_INET6, data);
425 } else if (g_str_equal(key, "Name") == TRUE) {
426 dbus_message_iter_get_basic(&value, &str);
427 data->name = g_strdup(str);
428 } else if (g_str_equal(key, "Type") == TRUE) {
429 dbus_message_iter_get_basic(&value, &str);
430 data->type = g_strdup(str);
431 } else if (g_str_equal(key, "Host") == TRUE) {
432 dbus_message_iter_get_basic(&value, &str);
433 data->host = g_strdup(str);
434 } else if (g_str_equal(key, "Domain") == TRUE) {
435 dbus_message_iter_get_basic(&value, &str);
436 data->domain = g_strdup(str);
437 } else if (g_str_equal(key, "Nameservers") == TRUE) {
438 extract_nameservers(&value, data);
439 } else if (g_str_equal(key, "Index") == TRUE) {
440 dbus_message_iter_get_basic(&value, &data->index);
442 if (dbus_message_iter_get_arg_type(&value) ==
444 dbus_message_iter_get_basic(&value, &str);
445 g_hash_table_replace(data->setting_strings,
446 g_strdup(key), g_strdup(str));
448 DBG("unknown key %s", key);
452 dbus_message_iter_next(properties);
455 g_hash_table_insert(vpn_connections, g_strdup(path), data);
457 err = create_provider(data, user_data);
464 DBG("removing %s", path);
465 g_hash_table_remove(vpn_connections, path);
468 static void get_connections_reply(DBusPendingCall *call, void *user_data)
472 DBusMessageIter array, dict;
473 const char *signature = DBUS_TYPE_ARRAY_AS_STRING
474 DBUS_STRUCT_BEGIN_CHAR_AS_STRING
475 DBUS_TYPE_OBJECT_PATH_AS_STRING
476 DBUS_TYPE_ARRAY_AS_STRING
477 DBUS_DICT_ENTRY_BEGIN_CHAR_AS_STRING
478 DBUS_TYPE_STRING_AS_STRING
479 DBUS_TYPE_VARIANT_AS_STRING
480 DBUS_DICT_ENTRY_END_CHAR_AS_STRING
481 DBUS_STRUCT_END_CHAR_AS_STRING;
485 reply = dbus_pending_call_steal_reply(call);
487 if (dbus_message_has_signature(reply, signature) == FALSE) {
488 connman_error("vpnd signature \"%s\" does not match "
490 dbus_message_get_signature(reply), signature);
494 dbus_error_init(&error);
496 if (dbus_set_error_from_message(&error, reply) == TRUE) {
497 connman_error("%s", error.message);
498 dbus_error_free(&error);
502 if (dbus_message_iter_init(reply, &array) == FALSE)
505 dbus_message_iter_recurse(&array, &dict);
507 while (dbus_message_iter_get_arg_type(&dict) == DBUS_TYPE_STRUCT) {
508 DBusMessageIter value, properties;
511 dbus_message_iter_recurse(&dict, &value);
512 dbus_message_iter_get_basic(&value, &path);
514 dbus_message_iter_next(&value);
515 dbus_message_iter_recurse(&value, &properties);
517 add_connection(path, &properties, user_data);
519 dbus_message_iter_next(&dict);
523 dbus_message_unref(reply);
525 dbus_pending_call_unref(call);
528 static int get_connections(void *user_data)
530 DBusPendingCall *call;
531 DBusMessage *message;
535 message = dbus_message_new_method_call(VPN_SERVICE, "/",
536 VPN_MANAGER_INTERFACE,
541 if (dbus_connection_send_with_reply(connection, message,
542 &call, DBUS_TIMEOUT) == FALSE) {
543 connman_error("Unable to call %s.%s()", VPN_MANAGER_INTERFACE,
545 dbus_message_unref(message);
550 dbus_message_unref(message);
554 dbus_pending_call_set_notify(call, get_connections_reply,
557 dbus_message_unref(message);
562 static int provider_probe(struct connman_provider *provider)
567 static void remove_connection_reply(DBusPendingCall *call, void *user_data)
574 reply = dbus_pending_call_steal_reply(call);
576 dbus_error_init(&error);
578 if (dbus_set_error_from_message(&error, reply) == TRUE) {
580 * If the returned error is NotFound, it means that we
581 * have actually removed the provider in vpnd already.
583 if (dbus_error_has_name(&error, CONNMAN_ERROR_INTERFACE
584 ".NotFound") == FALSE)
585 connman_error("%s", error.message);
587 dbus_error_free(&error);
590 dbus_message_unref(reply);
592 dbus_pending_call_unref(call);
595 static int provider_remove(struct connman_provider *provider)
597 DBusPendingCall *call;
598 DBusMessage *message;
599 struct connection_data *data;
601 data = connman_provider_get_data(provider);
603 DBG("provider %p data %p", provider, data);
606 * When provider.c:provider_remove() calls this function,
607 * it will remove the provider itself after the call.
608 * This means that we cannot use the provider pointer later
609 * as it is no longer valid.
611 data->provider = NULL;
613 message = dbus_message_new_method_call(VPN_SERVICE, "/",
614 VPN_MANAGER_INTERFACE,
619 dbus_message_append_args(message, DBUS_TYPE_OBJECT_PATH, &data->path,
622 if (dbus_connection_send_with_reply(connection, message,
623 &call, DBUS_TIMEOUT) == FALSE) {
624 connman_error("Unable to call %s.%s()", VPN_MANAGER_INTERFACE,
626 dbus_message_unref(message);
631 dbus_message_unref(message);
635 dbus_pending_call_set_notify(call, remove_connection_reply,
638 dbus_message_unref(message);
643 static int provider_connect(struct connman_provider *provider)
645 struct connection_data *data;
647 data = connman_provider_get_data(provider);
651 return connect_provider(data, NULL);
655 static void disconnect_reply(DBusPendingCall *call, void *user_data)
662 reply = dbus_pending_call_steal_reply(call);
664 dbus_error_init(&error);
666 if (dbus_set_error_from_message(&error, reply) == TRUE) {
667 connman_error("%s", error.message);
668 dbus_error_free(&error);
673 dbus_message_unref(reply);
675 dbus_pending_call_unref(call);
678 static int disconnect_provider(struct connection_data *data)
680 DBusPendingCall *call;
681 DBusMessage *message;
683 DBG("data %p path %s", data, data->path);
685 message = dbus_message_new_method_call(VPN_SERVICE, data->path,
686 VPN_CONNECTION_INTERFACE,
691 if (dbus_connection_send_with_reply(connection, message,
692 &call, DBUS_TIMEOUT) == FALSE) {
693 connman_error("Unable to call %s.%s()",
694 VPN_CONNECTION_INTERFACE, VPN_DISCONNECT);
695 dbus_message_unref(message);
700 dbus_message_unref(message);
704 dbus_pending_call_set_notify(call, disconnect_reply, NULL, NULL);
706 dbus_message_unref(message);
708 connman_provider_set_state(data->provider,
709 CONNMAN_PROVIDER_STATE_DISCONNECT);
711 * We return 0 here instead of -EINPROGRESS because
712 * __connman_service_disconnect() needs to return something
713 * to gdbus so that gdbus will not call Disconnect() more
714 * than once. This way we do not need to pass the dbus reply
715 * message around the code.
720 static int provider_disconnect(struct connman_provider *provider)
722 struct connection_data *data;
724 DBG("provider %p", provider);
726 data = connman_provider_get_data(provider);
730 if (g_str_equal(data->state, "ready") == TRUE ||
731 g_str_equal(data->state, "configuration") == TRUE)
732 return disconnect_provider(data);
737 static void configuration_create_reply(DBusPendingCall *call, void *user_data)
741 DBusMessageIter iter;
742 const char *signature = DBUS_TYPE_OBJECT_PATH_AS_STRING;
745 DBG("user %p", user_data);
747 reply = dbus_pending_call_steal_reply(call);
749 if (dbus_message_has_signature(reply, signature) == FALSE) {
750 connman_error("vpn configuration signature \"%s\" does not "
751 "match expected \"%s\"",
752 dbus_message_get_signature(reply), signature);
756 dbus_error_init(&error);
758 if (dbus_set_error_from_message(&error, reply) == TRUE) {
759 connman_error("dbus error: %s", error.message);
760 dbus_error_free(&error);
764 if (dbus_message_iter_init(reply, &iter) == FALSE)
767 dbus_message_iter_get_basic(&iter, &path);
770 * Then try to connect the VPN as expected by ConnectProvider API
775 dbus_message_unref(reply);
777 dbus_pending_call_unref(call);
780 static void set_dbus_ident(char *ident)
782 int i, len = strlen(ident);
784 for (i = 0; i < len; i++) {
785 if (ident[i] >= '0' && ident[i] <= '9')
787 if (ident[i] >= 'a' && ident[i] <= 'z')
789 if (ident[i] >= 'A' && ident[i] <= 'Z')
795 static int create_configuration(DBusMessage *msg)
797 DBusMessage *new_msg;
798 DBusPendingCall *call;
799 DBusMessageIter iter, array;
800 const char *type = NULL, *name = NULL;
801 const char *host = NULL, *domain = NULL;
805 struct connection_data *data;
807 dbus_message_iter_init(msg, &iter);
808 dbus_message_iter_recurse(&iter, &array);
810 while (dbus_message_iter_get_arg_type(&array) == DBUS_TYPE_DICT_ENTRY) {
811 DBusMessageIter entry, value;
814 dbus_message_iter_recurse(&array, &entry);
815 dbus_message_iter_get_basic(&entry, &key);
817 dbus_message_iter_next(&entry);
818 dbus_message_iter_recurse(&entry, &value);
820 switch (dbus_message_iter_get_arg_type(&value)) {
821 case DBUS_TYPE_STRING:
822 if (g_str_equal(key, "Type") == TRUE)
823 dbus_message_iter_get_basic(&value, &type);
824 else if (g_str_equal(key, "Name") == TRUE)
825 dbus_message_iter_get_basic(&value, &name);
826 else if (g_str_equal(key, "Host") == TRUE)
827 dbus_message_iter_get_basic(&value, &host);
828 else if (g_str_equal(key, "VPN.Domain") == TRUE)
829 dbus_message_iter_get_basic(&value, &domain);
833 dbus_message_iter_next(&array);
836 DBG("VPN type %s name %s host %s domain %s", type, name, host, domain);
838 if (host == NULL || domain == NULL)
841 if (type == NULL || name == NULL)
844 ident = g_strdup_printf("%s_%s", host, domain);
845 set_dbus_ident(ident);
847 DBG("ident %s", ident);
849 data = g_hash_table_lookup(vpn_connections, ident);
851 if (data->call != NULL) {
852 connman_error("Dbus call already pending");
856 data = create_connection_data(ident);
860 g_hash_table_insert(vpn_connections, g_strdup(ident), data);
864 * User called net.connman.Manager.ConnectProvider if we are here.
865 * The config dict is already there in the original message so use it.
867 me = g_strdup(dbus_message_get_destination(msg));
869 new_msg = dbus_message_copy(msg);
871 dbus_message_set_interface(new_msg, VPN_MANAGER_INTERFACE);
872 dbus_message_set_path(new_msg, "/");
873 dbus_message_set_destination(new_msg, VPN_SERVICE);
874 dbus_message_set_sender(new_msg, me);
875 dbus_message_set_member(new_msg, "Create");
877 result = dbus_connection_send_with_reply(connection, new_msg,
878 &call, DBUS_TIMEOUT);
879 if (result == FALSE || call == NULL) {
884 dbus_pending_call_set_notify(call, configuration_create_reply,
889 dbus_message_unref(new_msg);
895 static struct connman_provider_driver provider_driver = {
897 .type = CONNMAN_PROVIDER_TYPE_VPN,
898 .probe = provider_probe,
899 .remove = provider_remove,
900 .connect = provider_connect,
901 .disconnect = provider_disconnect,
902 .set_property = set_string,
903 .get_property = get_string,
904 .create = create_configuration,
907 static void destroy_provider(struct connection_data *data)
909 DBG("data %p", data);
911 if (g_str_equal(data->state, "ready") == TRUE ||
912 g_str_equal(data->state, "configuration") == TRUE)
913 connman_provider_disconnect(data->provider);
915 if (data->call != NULL)
916 dbus_pending_call_cancel(data->call);
918 connman_provider_put(data->provider);
920 data->provider = NULL;
923 static void connection_destroy(gpointer hash_data)
925 struct connection_data *data = hash_data;
927 DBG("data %p", data);
929 if (data->provider != NULL)
930 destroy_provider(data);
937 g_free(data->domain);
938 g_strfreev(data->nameservers);
939 g_hash_table_destroy(data->setting_strings);
940 connman_ipaddress_free(data->ip);
945 static void vpnd_created(DBusConnection *conn, void *user_data)
947 DBG("connection %p", conn);
949 if (starting_vpnd == TRUE) {
950 vpn_connections = g_hash_table_new_full(g_str_hash,
952 g_free, connection_destroy);
953 get_connections(user_data);
954 starting_vpnd = FALSE;
958 static void vpnd_removed(DBusConnection *conn, void *user_data)
960 DBG("connection %p", conn);
962 g_hash_table_destroy(vpn_connections);
963 vpn_connections = NULL;
964 starting_vpnd = TRUE;
967 static void remove_connection(DBusConnection *conn, const char *path)
969 DBG("path %s", path);
971 g_hash_table_remove(vpn_connections, path);
974 static gboolean connection_removed(DBusConnection *conn, DBusMessage *message,
978 const char *signature = DBUS_TYPE_OBJECT_PATH_AS_STRING;
980 if (dbus_message_has_signature(message, signature) == FALSE) {
981 connman_error("vpn removed signature \"%s\" does not match "
983 dbus_message_get_signature(message), signature);
987 dbus_message_get_args(message, NULL, DBUS_TYPE_OBJECT_PATH, &path,
989 remove_connection(conn, path);
993 static gboolean connection_added(DBusConnection *conn, DBusMessage *message,
996 DBusMessageIter iter, properties;
998 const char *signature = DBUS_TYPE_OBJECT_PATH_AS_STRING
999 DBUS_TYPE_ARRAY_AS_STRING
1000 DBUS_DICT_ENTRY_BEGIN_CHAR_AS_STRING
1001 DBUS_TYPE_STRING_AS_STRING
1002 DBUS_TYPE_VARIANT_AS_STRING
1003 DBUS_DICT_ENTRY_END_CHAR_AS_STRING;
1005 if (dbus_message_has_signature(message, signature) == FALSE) {
1006 connman_error("vpn ConnectionAdded signature \"%s\" does not "
1007 "match expected \"%s\"",
1008 dbus_message_get_signature(message), signature);
1014 if (dbus_message_iter_init(message, &iter) == FALSE)
1017 dbus_message_iter_get_basic(&iter, &path);
1019 dbus_message_iter_next(&iter);
1020 dbus_message_iter_recurse(&iter, &properties);
1022 add_connection(path, &properties, user_data);
1027 static gboolean property_changed(DBusConnection *conn,
1028 DBusMessage *message,
1031 const char *path = dbus_message_get_path(message);
1032 struct connection_data *data = NULL;
1033 DBusMessageIter iter, value;
1034 connman_bool_t ip_set = FALSE;
1038 const char *signature = DBUS_TYPE_STRING_AS_STRING
1039 DBUS_TYPE_VARIANT_AS_STRING;
1041 if (dbus_message_has_signature(message, signature) == FALSE) {
1042 connman_error("vpn property signature \"%s\" does not match "
1044 dbus_message_get_signature(message), signature);
1048 data = g_hash_table_lookup(vpn_connections, path);
1052 if (dbus_message_iter_init(message, &iter) == FALSE)
1055 dbus_message_iter_get_basic(&iter, &key);
1057 dbus_message_iter_next(&iter);
1058 dbus_message_iter_recurse(&iter, &value);
1062 if (g_str_equal(key, "State") == TRUE) {
1063 dbus_message_iter_get_basic(&value, &str);
1065 DBG("%s %s -> %s", data->path, data->state, str);
1067 if (g_str_equal(data->state, str) == TRUE)
1070 g_free(data->state);
1071 data->state = g_strdup(str);
1073 set_provider_state(data);
1074 } else if (g_str_equal(key, "Index") == TRUE) {
1075 dbus_message_iter_get_basic(&value, &data->index);
1076 connman_provider_set_index(data->provider, data->index);
1077 } else if (g_str_equal(key, "IPv4") == TRUE) {
1078 err = extract_ip(&value, AF_INET, data);
1080 } else if (g_str_equal(key, "IPv6") == TRUE) {
1081 err = extract_ip(&value, AF_INET6, data);
1083 } else if (g_str_equal(key, "ServerRoutes") == TRUE) {
1085 } else if (g_str_equal(key, "UserRoutes") == TRUE) {
1087 } else if (g_str_equal(key, "Nameservers") == TRUE) {
1088 extract_nameservers(&value, data);
1091 if (ip_set == TRUE && err == 0) {
1092 err = connman_provider_set_ipaddress(data->provider, data->ip);
1094 DBG("setting provider IP address failed (%s/%d)",
1095 strerror(-err), -err);
1101 static int vpn_init(void)
1105 connection = connman_dbus_get_connection();
1106 if (connection == NULL)
1109 watch = g_dbus_add_service_watch(connection, VPN_SERVICE,
1110 vpnd_created, vpnd_removed, &provider_driver, NULL);
1112 added_watch = g_dbus_add_signal_watch(connection, VPN_SERVICE, NULL,
1113 VPN_MANAGER_INTERFACE,
1114 CONNECTION_ADDED, connection_added,
1115 &provider_driver, NULL);
1117 removed_watch = g_dbus_add_signal_watch(connection, VPN_SERVICE, NULL,
1118 VPN_MANAGER_INTERFACE,
1119 CONNECTION_REMOVED, connection_removed,
1122 property_watch = g_dbus_add_signal_watch(connection, VPN_SERVICE, NULL,
1123 VPN_CONNECTION_INTERFACE,
1124 PROPERTY_CHANGED, property_changed,
1127 if (added_watch == 0 || removed_watch == 0 || property_watch == 0) {
1132 err = connman_provider_driver_register(&provider_driver);
1134 vpnd_created(connection, &provider_driver);
1139 g_dbus_remove_watch(connection, watch);
1140 g_dbus_remove_watch(connection, added_watch);
1141 g_dbus_remove_watch(connection, removed_watch);
1142 g_dbus_remove_watch(connection, property_watch);
1144 dbus_connection_unref(connection);
1149 static void vpn_exit(void)
1151 g_dbus_remove_watch(connection, watch);
1152 g_dbus_remove_watch(connection, added_watch);
1153 g_dbus_remove_watch(connection, removed_watch);
1154 g_dbus_remove_watch(connection, property_watch);
1156 connman_provider_driver_unregister(&provider_driver);
1158 g_hash_table_destroy(vpn_connections);
1160 dbus_connection_unref(connection);
1163 CONNMAN_PLUGIN_DEFINE(vpn, "VPN plugin", VERSION,
1164 CONNMAN_PLUGIN_PRIORITY_DEFAULT, vpn_init, vpn_exit)