Imported Upstream version 1.40
[platform/upstream/connman.git] / src / main.c
1 /*
2  *
3  *  Connection Manager
4  *
5  *  Copyright (C) 2007-2013  Intel Corporation. All rights reserved.
6  *
7  *  This program is free software; you can redistribute it and/or modify
8  *  it under the terms of the GNU General Public License version 2 as
9  *  published by the Free Software Foundation.
10  *
11  *  This program is distributed in the hope that it will be useful,
12  *  but WITHOUT ANY WARRANTY; without even the implied warranty of
13  *  MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
14  *  GNU General Public License for more details.
15  *
16  *  You should have received a copy of the GNU General Public License
17  *  along with this program; if not, write to the Free Software
18  *  Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA  02110-1301  USA
19  *
20  */
21
22 #ifdef HAVE_CONFIG_H
23 #include <config.h>
24 #endif
25
26 #include <errno.h>
27 #include <stdio.h>
28 #include <stdlib.h>
29 #include <unistd.h>
30 #include <string.h>
31 #include <signal.h>
32 #include <sys/signalfd.h>
33 #include <getopt.h>
34 #include <sys/stat.h>
35 #include <net/if.h>
36 #include <netdb.h>
37
38 #include <gdbus.h>
39
40 #include "connman.h"
41
42 #define CONF_ARRAY_SIZE(x) (sizeof(x)/sizeof(x[0]) - 1)
43
44 #define DEFAULT_INPUT_REQUEST_TIMEOUT (120 * 1000)
45 #define DEFAULT_BROWSER_LAUNCH_TIMEOUT (300 * 1000)
46
47 /*
48  * We set the integer to 1 sec so that we have a chance to get
49  * necessary IPv6 router advertisement messages that might have
50  * DNS data etc.
51  */
52 #define DEFAULT_ONLINE_CHECK_INITIAL_INTERVAL 1
53 #define DEFAULT_ONLINE_CHECK_MAX_INTERVAL 12
54
55 #define MAINFILE "main.conf"
56 #define CONFIGMAINFILE CONFIGDIR "/" MAINFILE
57
58 static char *default_auto_connect[] = {
59         "wifi",
60         "ethernet",
61         "cellular",
62         NULL
63 };
64
65 static char *default_favorite_techs[] = {
66         "ethernet",
67         NULL
68 };
69
70 static char *default_blacklist[] = {
71         "vmnet",
72         "vboxnet",
73         "virbr",
74         "ifb",
75         "ve-",
76         "vb-",
77         NULL
78 };
79
80 static struct {
81         bool bg_scan;
82         char **pref_timeservers;
83         unsigned int *auto_connect;
84         unsigned int *favorite_techs;
85         unsigned int *preferred_techs;
86         unsigned int *always_connected_techs;
87         char **fallback_nameservers;
88         unsigned int timeout_inputreq;
89         unsigned int timeout_browserlaunch;
90         char **blacklisted_interfaces;
91         bool allow_hostname_updates;
92         bool allow_domainname_updates;
93         bool single_tech;
94         char **tethering_technologies;
95         bool persistent_tethering_mode;
96         bool enable_6to4;
97         char *vendor_class_id;
98         bool enable_online_check;
99         bool enable_online_to_ready_transition;
100         unsigned int online_check_initial_interval;
101         unsigned int online_check_max_interval;
102         bool auto_connect_roaming_services;
103         bool acd;
104         bool use_gateways_as_timeservers;
105 } connman_settings  = {
106         .bg_scan = true,
107         .pref_timeservers = NULL,
108         .auto_connect = NULL,
109         .favorite_techs = NULL,
110         .preferred_techs = NULL,
111         .always_connected_techs = NULL,
112         .fallback_nameservers = NULL,
113         .timeout_inputreq = DEFAULT_INPUT_REQUEST_TIMEOUT,
114         .timeout_browserlaunch = DEFAULT_BROWSER_LAUNCH_TIMEOUT,
115         .blacklisted_interfaces = NULL,
116         .allow_hostname_updates = true,
117         .allow_domainname_updates = true,
118         .single_tech = false,
119         .tethering_technologies = NULL,
120         .persistent_tethering_mode = false,
121         .enable_6to4 = false,
122         .vendor_class_id = NULL,
123         .enable_online_check = true,
124         .enable_online_to_ready_transition = false,
125         .online_check_initial_interval = DEFAULT_ONLINE_CHECK_INITIAL_INTERVAL,
126         .online_check_max_interval = DEFAULT_ONLINE_CHECK_MAX_INTERVAL,
127         .auto_connect_roaming_services = false,
128         .acd = false,
129         .use_gateways_as_timeservers = false,
130 };
131
132 #define CONF_BG_SCAN                    "BackgroundScanning"
133 #define CONF_PREF_TIMESERVERS           "FallbackTimeservers"
134 #define CONF_AUTO_CONNECT_TECHS         "DefaultAutoConnectTechnologies"
135 #define CONF_FAVORITE_TECHS             "DefaultFavoriteTechnologies"
136 #define CONF_ALWAYS_CONNECTED_TECHS     "AlwaysConnectedTechnologies"
137 #define CONF_PREFERRED_TECHS            "PreferredTechnologies"
138 #define CONF_FALLBACK_NAMESERVERS       "FallbackNameservers"
139 #define CONF_TIMEOUT_INPUTREQ           "InputRequestTimeout"
140 #define CONF_TIMEOUT_BROWSERLAUNCH      "BrowserLaunchTimeout"
141 #define CONF_BLACKLISTED_INTERFACES     "NetworkInterfaceBlacklist"
142 #define CONF_ALLOW_HOSTNAME_UPDATES     "AllowHostnameUpdates"
143 #define CONF_ALLOW_DOMAINNAME_UPDATES   "AllowDomainnameUpdates"
144 #define CONF_SINGLE_TECH                "SingleConnectedTechnology"
145 #define CONF_TETHERING_TECHNOLOGIES      "TetheringTechnologies"
146 #define CONF_PERSISTENT_TETHERING_MODE  "PersistentTetheringMode"
147 #define CONF_ENABLE_6TO4                "Enable6to4"
148 #define CONF_VENDOR_CLASS_ID            "VendorClassID"
149 #define CONF_ENABLE_ONLINE_CHECK        "EnableOnlineCheck"
150 #define CONF_ENABLE_ONLINE_TO_READY_TRANSITION "EnableOnlineToReadyTransition"
151 #define CONF_ONLINE_CHECK_INITIAL_INTERVAL "OnlineCheckInitialInterval"
152 #define CONF_ONLINE_CHECK_MAX_INTERVAL     "OnlineCheckMaxInterval"
153 #define CONF_AUTO_CONNECT_ROAMING_SERVICES "AutoConnectRoamingServices"
154 #define CONF_ACD                        "AddressConflictDetection"
155 #define CONF_USE_GATEWAYS_AS_TIMESERVERS "UseGatewaysAsTimeservers"
156
157 static const char *supported_options[] = {
158         CONF_BG_SCAN,
159         CONF_PREF_TIMESERVERS,
160         CONF_AUTO_CONNECT_TECHS,
161         CONF_FAVORITE_TECHS,
162         CONF_ALWAYS_CONNECTED_TECHS,
163         CONF_PREFERRED_TECHS,
164         CONF_FALLBACK_NAMESERVERS,
165         CONF_TIMEOUT_INPUTREQ,
166         CONF_TIMEOUT_BROWSERLAUNCH,
167         CONF_BLACKLISTED_INTERFACES,
168         CONF_ALLOW_HOSTNAME_UPDATES,
169         CONF_ALLOW_DOMAINNAME_UPDATES,
170         CONF_SINGLE_TECH,
171         CONF_TETHERING_TECHNOLOGIES,
172         CONF_PERSISTENT_TETHERING_MODE,
173         CONF_ENABLE_6TO4,
174         CONF_VENDOR_CLASS_ID,
175         CONF_ENABLE_ONLINE_CHECK,
176         CONF_ENABLE_ONLINE_TO_READY_TRANSITION,
177         CONF_ONLINE_CHECK_INITIAL_INTERVAL,
178         CONF_ONLINE_CHECK_MAX_INTERVAL,
179         CONF_AUTO_CONNECT_ROAMING_SERVICES,
180         CONF_ACD,
181         CONF_USE_GATEWAYS_AS_TIMESERVERS,
182         NULL
183 };
184
185 static GKeyFile *load_config(const char *file)
186 {
187         GError *err = NULL;
188         GKeyFile *keyfile;
189
190         keyfile = g_key_file_new();
191
192         g_key_file_set_list_separator(keyfile, ',');
193
194         if (!g_key_file_load_from_file(keyfile, file, 0, &err)) {
195                 if (err->code != G_FILE_ERROR_NOENT) {
196                         connman_error("Parsing %s failed: %s", file,
197                                                                 err->message);
198                 }
199
200                 g_error_free(err);
201                 g_key_file_free(keyfile);
202                 return NULL;
203         }
204
205         return keyfile;
206 }
207
208 static uint *parse_service_types(char **str_list, gsize len)
209 {
210         unsigned int *type_list;
211         int i, j;
212         enum connman_service_type type;
213
214         type_list = g_try_new0(unsigned int, len + 1);
215         if (!type_list)
216                 return NULL;
217
218         i = 0;
219         j = 0;
220         while (str_list[i]) {
221                 type = __connman_service_string2type(str_list[i]);
222
223                 if (type != CONNMAN_SERVICE_TYPE_UNKNOWN) {
224                         type_list[j] = type;
225                         j += 1;
226                 }
227                 i += 1;
228         }
229
230         type_list[j] = CONNMAN_SERVICE_TYPE_UNKNOWN;
231
232         return type_list;
233 }
234
235 static char **parse_fallback_nameservers(char **nameservers, gsize len)
236 {
237         char **servers;
238         int i, j;
239
240         servers = g_try_new0(char *, len + 1);
241         if (!servers)
242                 return NULL;
243
244         i = 0;
245         j = 0;
246         while (nameservers[i]) {
247                 if (connman_inet_check_ipaddress(nameservers[i]) > 0) {
248                         servers[j] = g_strdup(nameservers[i]);
249                         j += 1;
250                 }
251                 i += 1;
252         }
253
254         return servers;
255 }
256
257 static void check_config(GKeyFile *config)
258 {
259         char **keys;
260         int j;
261
262         if (!config)
263                 return;
264
265         keys = g_key_file_get_groups(config, NULL);
266
267         for (j = 0; keys && keys[j]; j++) {
268                 if (g_strcmp0(keys[j], "General") != 0)
269                         connman_warn("Unknown group %s in %s",
270                                                 keys[j], MAINFILE);
271         }
272
273         g_strfreev(keys);
274
275         keys = g_key_file_get_keys(config, "General", NULL, NULL);
276
277         for (j = 0; keys && keys[j]; j++) {
278                 bool found;
279                 int i;
280
281                 found = false;
282                 for (i = 0; supported_options[i]; i++) {
283                         if (g_strcmp0(keys[j], supported_options[i]) == 0) {
284                                 found = true;
285                                 break;
286                         }
287                 }
288                 if (!found && !supported_options[i])
289                         connman_warn("Unknown option %s in %s",
290                                                 keys[j], MAINFILE);
291         }
292
293         g_strfreev(keys);
294 }
295
296 static void parse_config(GKeyFile *config)
297 {
298         GError *error = NULL;
299         bool boolean;
300         char **timeservers;
301         char **interfaces;
302         char **str_list;
303         char **tethering;
304         char *string;
305         gsize len;
306         int integer;
307
308         if (!config) {
309                 connman_settings.auto_connect =
310                         parse_service_types(default_auto_connect, CONF_ARRAY_SIZE(default_auto_connect));
311                 connman_settings.favorite_techs =
312                         parse_service_types(default_favorite_techs, CONF_ARRAY_SIZE(default_favorite_techs));
313                 connman_settings.blacklisted_interfaces =
314                         g_strdupv(default_blacklist);
315                 return;
316         }
317
318         DBG("parsing %s", MAINFILE);
319
320         boolean = g_key_file_get_boolean(config, "General",
321                                                 CONF_BG_SCAN, &error);
322         if (!error)
323                 connman_settings.bg_scan = boolean;
324
325         g_clear_error(&error);
326
327         timeservers = __connman_config_get_string_list(config, "General",
328                                         CONF_PREF_TIMESERVERS, NULL, &error);
329         if (!error)
330                 connman_settings.pref_timeservers = timeservers;
331
332         g_clear_error(&error);
333
334         str_list = __connman_config_get_string_list(config, "General",
335                         CONF_AUTO_CONNECT_TECHS, &len, &error);
336
337         if (!error)
338                 connman_settings.auto_connect =
339                         parse_service_types(str_list, len);
340         else
341                 connman_settings.auto_connect =
342                         parse_service_types(default_auto_connect, CONF_ARRAY_SIZE(default_auto_connect));
343
344         g_clear_error(&error);
345
346         str_list = __connman_config_get_string_list(config, "General",
347                         CONF_FAVORITE_TECHS, &len, &error);
348
349         if (!error)
350                 connman_settings.favorite_techs =
351                         parse_service_types(str_list, len);
352         else
353                 connman_settings.favorite_techs =
354                         parse_service_types(default_favorite_techs, CONF_ARRAY_SIZE(default_favorite_techs));
355
356         g_strfreev(str_list);
357
358         g_clear_error(&error);
359
360         str_list = __connman_config_get_string_list(config, "General",
361                         CONF_PREFERRED_TECHS, &len, &error);
362
363         if (!error)
364                 connman_settings.preferred_techs =
365                         parse_service_types(str_list, len);
366
367         g_strfreev(str_list);
368
369         g_clear_error(&error);
370
371         str_list = __connman_config_get_string_list(config, "General",
372                         CONF_ALWAYS_CONNECTED_TECHS, &len, &error);
373
374         if (!error)
375                 connman_settings.always_connected_techs =
376                         parse_service_types(str_list, len);
377
378         g_strfreev(str_list);
379
380         g_clear_error(&error);
381
382         str_list = __connman_config_get_string_list(config, "General",
383                         CONF_FALLBACK_NAMESERVERS, &len, &error);
384
385         if (!error)
386                 connman_settings.fallback_nameservers =
387                         parse_fallback_nameservers(str_list, len);
388
389         g_strfreev(str_list);
390
391         g_clear_error(&error);
392
393         integer = g_key_file_get_integer(config, "General",
394                         CONF_TIMEOUT_INPUTREQ, &error);
395         if (!error && integer >= 0)
396                 connman_settings.timeout_inputreq = integer * 1000;
397
398         g_clear_error(&error);
399
400         integer = g_key_file_get_integer(config, "General",
401                         CONF_TIMEOUT_BROWSERLAUNCH, &error);
402         if (!error && integer >= 0)
403                 connman_settings.timeout_browserlaunch = integer * 1000;
404
405         g_clear_error(&error);
406
407         interfaces = __connman_config_get_string_list(config, "General",
408                         CONF_BLACKLISTED_INTERFACES, &len, &error);
409
410         if (!error)
411                 connman_settings.blacklisted_interfaces = interfaces;
412         else
413                 connman_settings.blacklisted_interfaces =
414                         g_strdupv(default_blacklist);
415
416         g_clear_error(&error);
417
418         boolean = __connman_config_get_bool(config, "General",
419                                         CONF_ALLOW_HOSTNAME_UPDATES,
420                                         &error);
421         if (!error)
422                 connman_settings.allow_hostname_updates = boolean;
423
424         g_clear_error(&error);
425
426         boolean = __connman_config_get_bool(config, "General",
427                                         CONF_ALLOW_DOMAINNAME_UPDATES,
428                                         &error);
429         if (!error)
430                 connman_settings.allow_domainname_updates = boolean;
431
432         g_clear_error(&error);
433
434         boolean = __connman_config_get_bool(config, "General",
435                         CONF_SINGLE_TECH, &error);
436         if (!error)
437                 connman_settings.single_tech = boolean;
438
439         g_clear_error(&error);
440
441         tethering = __connman_config_get_string_list(config, "General",
442                         CONF_TETHERING_TECHNOLOGIES, &len, &error);
443
444         if (!error)
445                 connman_settings.tethering_technologies = tethering;
446
447         g_clear_error(&error);
448
449         boolean = __connman_config_get_bool(config, "General",
450                                         CONF_PERSISTENT_TETHERING_MODE,
451                                         &error);
452         if (!error)
453                 connman_settings.persistent_tethering_mode = boolean;
454
455         g_clear_error(&error);
456
457         boolean = __connman_config_get_bool(config, "General",
458                                         CONF_ENABLE_6TO4, &error);
459         if (!error)
460                 connman_settings.enable_6to4 = boolean;
461
462         g_clear_error(&error);
463
464         string = __connman_config_get_string(config, "General",
465                                         CONF_VENDOR_CLASS_ID, &error);
466         if (!error)
467                 connman_settings.vendor_class_id = string;
468
469         g_clear_error(&error);
470
471         boolean = __connman_config_get_bool(config, "General",
472                                         CONF_ENABLE_ONLINE_CHECK, &error);
473         if (!error) {
474                 connman_settings.enable_online_check = boolean;
475                 if (!boolean)
476                         connman_info("Online check disabled by main config.");
477         }
478
479         g_clear_error(&error);
480
481         boolean = __connman_config_get_bool(config, "General",
482                         CONF_ENABLE_ONLINE_TO_READY_TRANSITION, &error);
483         if (!error) {
484                 connman_settings.enable_online_to_ready_transition = boolean;
485         }
486
487         g_clear_error(&error);
488
489         integer = g_key_file_get_integer(config, "General",
490                         CONF_ONLINE_CHECK_INITIAL_INTERVAL, &error);
491         if (!error && integer >= 0)
492                 connman_settings.online_check_initial_interval = integer;
493
494         g_clear_error(&error);
495
496         integer = g_key_file_get_integer(config, "General",
497                         CONF_ONLINE_CHECK_MAX_INTERVAL, &error);
498         if (!error && integer >= 0)
499                 connman_settings.online_check_max_interval = integer;
500
501         g_clear_error(&error);
502
503         if (connman_settings.online_check_initial_interval < 1 ||
504                 connman_settings.online_check_initial_interval >
505                 connman_settings.online_check_max_interval) {
506                 connman_warn("Incorrect online check intervals [%u, %u]",
507                                 connman_settings.online_check_initial_interval,
508                                 connman_settings.online_check_max_interval);
509                 connman_settings.online_check_initial_interval =
510                         DEFAULT_ONLINE_CHECK_INITIAL_INTERVAL;
511                 connman_settings.online_check_max_interval =
512                         DEFAULT_ONLINE_CHECK_MAX_INTERVAL;
513         }
514
515         boolean = __connman_config_get_bool(config, "General",
516                                 CONF_AUTO_CONNECT_ROAMING_SERVICES, &error);
517         if (!error)
518                 connman_settings.auto_connect_roaming_services = boolean;
519
520         g_clear_error(&error);
521
522         boolean = __connman_config_get_bool(config, "General", CONF_ACD, &error);
523         if (!error)
524                 connman_settings.acd = boolean;
525
526         g_clear_error(&error);
527
528         boolean = __connman_config_get_bool(config, "General",
529                                 CONF_USE_GATEWAYS_AS_TIMESERVERS, &error);
530         if (!error)
531                 connman_settings.use_gateways_as_timeservers = boolean;
532
533         g_clear_error(&error);
534 }
535
536 static int config_init(const char *file)
537 {
538         GKeyFile *config;
539
540         config = load_config(file);
541         check_config(config);
542         parse_config(config);
543         if (config)
544                 g_key_file_free(config);
545
546         return 0;
547 }
548
549 static GMainLoop *main_loop = NULL;
550
551 static unsigned int __terminated = 0;
552
553 static gboolean signal_handler(GIOChannel *channel, GIOCondition cond,
554                                                         gpointer user_data)
555 {
556         struct signalfd_siginfo si;
557         ssize_t result;
558         int fd;
559
560         if (cond & (G_IO_NVAL | G_IO_ERR | G_IO_HUP))
561                 return FALSE;
562
563         fd = g_io_channel_unix_get_fd(channel);
564
565         result = read(fd, &si, sizeof(si));
566         if (result != sizeof(si))
567                 return FALSE;
568
569         switch (si.ssi_signo) {
570         case SIGINT:
571         case SIGTERM:
572                 if (__terminated == 0) {
573                         connman_info("Terminating");
574                         g_main_loop_quit(main_loop);
575                 }
576
577                 __terminated = 1;
578                 break;
579         }
580
581         return TRUE;
582 }
583
584 static guint setup_signalfd(void)
585 {
586         GIOChannel *channel;
587         guint source;
588         sigset_t mask;
589         int fd;
590
591         sigemptyset(&mask);
592         sigaddset(&mask, SIGINT);
593         sigaddset(&mask, SIGTERM);
594
595         if (sigprocmask(SIG_BLOCK, &mask, NULL) < 0) {
596                 perror("Failed to set signal mask");
597                 return 0;
598         }
599
600         fd = signalfd(-1, &mask, 0);
601         if (fd < 0) {
602                 perror("Failed to create signal descriptor");
603                 return 0;
604         }
605
606         channel = g_io_channel_unix_new(fd);
607
608         g_io_channel_set_close_on_unref(channel, TRUE);
609         g_io_channel_set_encoding(channel, NULL, NULL);
610         g_io_channel_set_buffered(channel, FALSE);
611
612         source = g_io_add_watch(channel,
613                                 G_IO_IN | G_IO_HUP | G_IO_ERR | G_IO_NVAL,
614                                 signal_handler, NULL);
615
616         g_io_channel_unref(channel);
617
618         return source;
619 }
620
621 static void disconnect_callback(DBusConnection *conn, void *user_data)
622 {
623         connman_error("D-Bus disconnect");
624
625         g_main_loop_quit(main_loop);
626 }
627
628 static gchar *option_config = NULL;
629 static gchar *option_debug = NULL;
630 static gchar *option_device = NULL;
631 static gchar *option_plugin = NULL;
632 static gchar *option_nodevice = NULL;
633 static gchar *option_noplugin = NULL;
634 static gchar *option_wifi = NULL;
635 static gboolean option_detach = TRUE;
636 static gboolean option_dnsproxy = TRUE;
637 static gboolean option_backtrace = TRUE;
638 static gboolean option_version = FALSE;
639
640 static bool parse_debug(const char *key, const char *value,
641                                         gpointer user_data, GError **error)
642 {
643         if (value) {
644                 if (option_debug) {
645                         char *prev = option_debug;
646
647                         option_debug = g_strconcat(prev, ",", value, NULL);
648                         g_free(prev);
649                 } else {
650                         option_debug = g_strdup(value);
651                 }
652         } else {
653                 g_free(option_debug);
654                 option_debug = g_strdup("*");
655         }
656
657         return true;
658 }
659
660 static bool parse_noplugin(const char *key, const char *value,
661                                         gpointer user_data, GError **error)
662 {
663         if (option_noplugin) {
664                 char *prev = option_noplugin;
665
666                 option_noplugin = g_strconcat(prev, ",", value, NULL);
667                 g_free(prev);
668         } else {
669                 option_noplugin = g_strdup(value);
670         }
671
672         return true;
673 }
674
675 static GOptionEntry options[] = {
676         { "config", 'c', 0, G_OPTION_ARG_STRING, &option_config,
677                                 "Load the specified configuration file "
678                                 "instead of " CONFIGMAINFILE, "FILE" },
679         { "debug", 'd', G_OPTION_FLAG_OPTIONAL_ARG,
680                                 G_OPTION_ARG_CALLBACK, parse_debug,
681                                 "Specify debug options to enable", "DEBUG" },
682         { "device", 'i', 0, G_OPTION_ARG_STRING, &option_device,
683                         "Specify networking devices or interfaces", "DEV,..." },
684         { "nodevice", 'I', 0, G_OPTION_ARG_STRING, &option_nodevice,
685                         "Specify networking interfaces to ignore", "DEV,..." },
686         { "plugin", 'p', 0, G_OPTION_ARG_STRING, &option_plugin,
687                                 "Specify plugins to load", "NAME,..." },
688         { "noplugin", 'P', 0, G_OPTION_ARG_CALLBACK, &parse_noplugin,
689                                 "Specify plugins not to load", "NAME,..." },
690         { "wifi", 'W', 0, G_OPTION_ARG_STRING, &option_wifi,
691                                 "Specify driver for WiFi/Supplicant", "NAME" },
692         { "nodaemon", 'n', G_OPTION_FLAG_REVERSE,
693                                 G_OPTION_ARG_NONE, &option_detach,
694                                 "Don't fork daemon to background" },
695         { "nodnsproxy", 'r', G_OPTION_FLAG_REVERSE,
696                                 G_OPTION_ARG_NONE, &option_dnsproxy,
697                                 "Don't support DNS resolving" },
698         { "nobacktrace", 0, G_OPTION_FLAG_REVERSE,
699                                 G_OPTION_ARG_NONE, &option_backtrace,
700                                 "Don't print out backtrace information" },
701         { "version", 'v', 0, G_OPTION_ARG_NONE, &option_version,
702                                 "Show version information and exit" },
703         { NULL },
704 };
705
706 char *connman_setting_get_string(const char *key)
707 {
708         if (g_str_equal(key, CONF_VENDOR_CLASS_ID))
709                 return connman_settings.vendor_class_id;
710
711         if (g_strcmp0(key, "wifi") == 0) {
712                 if (!option_wifi)
713                         return "nl80211,wext";
714                 else
715                         return option_wifi;
716         }
717
718         return NULL;
719 }
720
721 bool connman_setting_get_bool(const char *key)
722 {
723         if (g_str_equal(key, CONF_BG_SCAN))
724                 return connman_settings.bg_scan;
725
726         if (g_str_equal(key, CONF_ALLOW_HOSTNAME_UPDATES))
727                 return connman_settings.allow_hostname_updates;
728
729         if (g_str_equal(key, CONF_ALLOW_DOMAINNAME_UPDATES))
730                 return connman_settings.allow_domainname_updates;
731
732         if (g_str_equal(key, CONF_SINGLE_TECH))
733                 return connman_settings.single_tech;
734
735         if (g_str_equal(key, CONF_PERSISTENT_TETHERING_MODE))
736                 return connman_settings.persistent_tethering_mode;
737
738         if (g_str_equal(key, CONF_ENABLE_6TO4))
739                 return connman_settings.enable_6to4;
740
741         if (g_str_equal(key, CONF_ENABLE_ONLINE_CHECK))
742                 return connman_settings.enable_online_check;
743
744         if (g_str_equal(key, CONF_ENABLE_ONLINE_TO_READY_TRANSITION))
745                 return connman_settings.enable_online_to_ready_transition;
746
747         if (g_str_equal(key, CONF_AUTO_CONNECT_ROAMING_SERVICES))
748                 return connman_settings.auto_connect_roaming_services;
749
750         if (g_str_equal(key, CONF_ACD))
751                 return connman_settings.acd;
752
753         if (g_str_equal(key, CONF_USE_GATEWAYS_AS_TIMESERVERS))
754                 return connman_settings.use_gateways_as_timeservers;
755
756         return false;
757 }
758
759 unsigned int connman_setting_get_uint(const char *key)
760 {
761         if (g_str_equal(key, CONF_ONLINE_CHECK_INITIAL_INTERVAL))
762                 return connman_settings.online_check_initial_interval;
763
764         if (g_str_equal(key, CONF_ONLINE_CHECK_MAX_INTERVAL))
765                 return connman_settings.online_check_max_interval;
766
767         return 0;
768 }
769
770 char **connman_setting_get_string_list(const char *key)
771 {
772         if (g_str_equal(key, CONF_PREF_TIMESERVERS))
773                 return connman_settings.pref_timeservers;
774
775         if (g_str_equal(key, CONF_FALLBACK_NAMESERVERS))
776                 return connman_settings.fallback_nameservers;
777
778         if (g_str_equal(key, CONF_BLACKLISTED_INTERFACES))
779                 return connman_settings.blacklisted_interfaces;
780
781         if (g_str_equal(key, CONF_TETHERING_TECHNOLOGIES))
782                 return connman_settings.tethering_technologies;
783
784         return NULL;
785 }
786
787 unsigned int *connman_setting_get_uint_list(const char *key)
788 {
789         if (g_str_equal(key, CONF_AUTO_CONNECT_TECHS))
790                 return connman_settings.auto_connect;
791
792         if (g_str_equal(key, CONF_FAVORITE_TECHS))
793                 return connman_settings.favorite_techs;
794
795         if (g_str_equal(key, CONF_PREFERRED_TECHS))
796                 return connman_settings.preferred_techs;
797
798         if (g_str_equal(key, CONF_ALWAYS_CONNECTED_TECHS))
799                 return connman_settings.always_connected_techs;
800
801         return NULL;
802 }
803
804 unsigned int connman_timeout_input_request(void)
805 {
806         return connman_settings.timeout_inputreq;
807 }
808
809 unsigned int connman_timeout_browser_launch(void)
810 {
811         return connman_settings.timeout_browserlaunch;
812 }
813
814 int main(int argc, char *argv[])
815 {
816         GOptionContext *context;
817         GError *error = NULL;
818         DBusConnection *conn;
819         DBusError err;
820         guint signal;
821
822         context = g_option_context_new(NULL);
823         g_option_context_add_main_entries(context, options, NULL);
824
825         if (!g_option_context_parse(context, &argc, &argv, &error)) {
826                 if (error) {
827                         g_printerr("%s\n", error->message);
828                         g_error_free(error);
829                 } else
830                         g_printerr("An unknown error occurred\n");
831                 exit(1);
832         }
833
834         g_option_context_free(context);
835
836         if (option_version) {
837                 printf("%s\n", VERSION);
838                 exit(0);
839         }
840
841         if (option_detach) {
842                 if (daemon(0, 0)) {
843                         perror("Can't start daemon");
844                         exit(1);
845                 }
846         }
847
848         if (mkdir(STORAGEDIR, S_IRUSR | S_IWUSR | S_IXUSR |
849                                 S_IRGRP | S_IXGRP | S_IROTH | S_IXOTH) < 0) {
850                 if (errno != EEXIST)
851                         perror("Failed to create storage directory");
852         }
853
854         umask(0077);
855
856         main_loop = g_main_loop_new(NULL, FALSE);
857
858         signal = setup_signalfd();
859
860         dbus_error_init(&err);
861
862         conn = g_dbus_setup_bus(DBUS_BUS_SYSTEM, CONNMAN_SERVICE, &err);
863         if (!conn) {
864                 if (dbus_error_is_set(&err)) {
865                         fprintf(stderr, "%s\n", err.message);
866                         dbus_error_free(&err);
867                 } else
868                         fprintf(stderr, "Can't register with system bus\n");
869                 exit(1);
870         }
871
872         g_dbus_set_disconnect_function(conn, disconnect_callback, NULL, NULL);
873
874         __connman_log_init(argv[0], option_debug, option_detach,
875                         option_backtrace, "Connection Manager", VERSION);
876
877         __connman_dbus_init(conn);
878
879         if (!option_config)
880                 config_init(CONFIGMAINFILE);
881         else
882                 config_init(option_config);
883
884         __connman_util_init();
885         __connman_inotify_init();
886         __connman_technology_init();
887         __connman_notifier_init();
888         __connman_agent_init();
889         __connman_service_init();
890         __connman_peer_service_init();
891         __connman_peer_init();
892         __connman_provider_init();
893         __connman_network_init();
894         __connman_config_init();
895         __connman_device_init(option_device, option_nodevice);
896
897         __connman_ippool_init();
898         __connman_firewall_init();
899         __connman_nat_init();
900         __connman_tethering_init();
901         __connman_counter_init();
902         __connman_manager_init();
903         __connman_stats_init();
904         __connman_clock_init();
905
906         __connman_ipconfig_init();
907         __connman_rtnl_init();
908         __connman_task_init();
909         __connman_proxy_init();
910         __connman_detect_init();
911         __connman_session_init();
912         __connman_timeserver_init();
913         __connman_connection_init();
914
915         __connman_plugin_init(option_plugin, option_noplugin);
916
917         __connman_resolver_init(option_dnsproxy);
918         __connman_rtnl_start();
919         __connman_dhcp_init();
920         __connman_dhcpv6_init();
921         __connman_wpad_init();
922         __connman_wispr_init();
923         __connman_rfkill_init();
924         __connman_machine_init();
925
926         g_free(option_config);
927         g_free(option_device);
928         g_free(option_plugin);
929         g_free(option_nodevice);
930         g_free(option_noplugin);
931
932         g_main_loop_run(main_loop);
933
934         g_source_remove(signal);
935
936         __connman_machine_cleanup();
937         __connman_rfkill_cleanup();
938         __connman_wispr_cleanup();
939         __connman_wpad_cleanup();
940         __connman_dhcpv6_cleanup();
941         __connman_session_cleanup();
942         __connman_plugin_cleanup();
943         __connman_provider_cleanup();
944         __connman_connection_cleanup();
945         __connman_timeserver_cleanup();
946         __connman_detect_cleanup();
947         __connman_proxy_cleanup();
948         __connman_task_cleanup();
949         __connman_rtnl_cleanup();
950         __connman_resolver_cleanup();
951
952         __connman_clock_cleanup();
953         __connman_stats_cleanup();
954         __connman_config_cleanup();
955         __connman_manager_cleanup();
956         __connman_counter_cleanup();
957         __connman_tethering_cleanup();
958         __connman_nat_cleanup();
959         __connman_firewall_cleanup();
960         __connman_peer_service_cleanup();
961         __connman_peer_cleanup();
962         __connman_ippool_cleanup();
963         __connman_device_cleanup();
964         __connman_network_cleanup();
965         __connman_dhcp_cleanup();
966         __connman_service_cleanup();
967         __connman_agent_cleanup();
968         __connman_ipconfig_cleanup();
969         __connman_notifier_cleanup();
970         __connman_technology_cleanup();
971         __connman_inotify_cleanup();
972
973         __connman_util_cleanup();
974         __connman_dbus_cleanup();
975
976         __connman_log_cleanup(option_backtrace);
977
978         dbus_connection_unref(conn);
979
980         g_main_loop_unref(main_loop);
981
982         if (connman_settings.pref_timeservers)
983                 g_strfreev(connman_settings.pref_timeservers);
984
985         g_free(connman_settings.auto_connect);
986         g_free(connman_settings.favorite_techs);
987         g_free(connman_settings.preferred_techs);
988         g_strfreev(connman_settings.fallback_nameservers);
989         g_strfreev(connman_settings.blacklisted_interfaces);
990         g_strfreev(connman_settings.tethering_technologies);
991         g_free(connman_settings.vendor_class_id);
992
993         g_free(option_debug);
994         g_free(option_wifi);
995
996         return 0;
997 }