X-Git-Url: http://review.tizen.org/git/?a=blobdiff_plain;ds=sidebyside;f=src%2Fconnection.c;h=d40f4281e78ff6eb785ac64ac14f3fcef657e42e;hb=6df0c9192a3dd6cfcc5108ec8f08f928902c8716;hp=01a84cc0ab18b6368f0404e4111e54477f84e51b;hpb=9de932200a6f5b7bce5015bd2faee005da77e225;p=framework%2Fconnectivity%2Fconnman.git diff --git a/src/connection.c b/src/connection.c index 01a84cc..d40f428 100644 --- a/src/connection.c +++ b/src/connection.c @@ -2,7 +2,8 @@ * * Connection Manager * - * Copyright (C) 2007-2009 Intel Corporation. All rights reserved. + * Copyright (C) 2007-2012 Intel Corporation. All rights reserved. + * Copyright (C) 2011 BMW Car IT GmbH. All rights reserved. * * This program is free software; you can redistribute it and/or modify * it under the terms of the GNU General Public License version 2 as @@ -24,404 +25,1100 @@ #endif #include -#include #include -#include -#include #include -#include #include #include "connman.h" +struct gateway_config { + gboolean active; + char *gateway; + + /* VPN extra data */ + gboolean vpn; + char *vpn_ip; + int vpn_phy_index; + char *vpn_phy_ip; +}; + struct gateway_data { int index; - char *gateway; + struct connman_service *service; + unsigned int order; + struct gateway_config *ipv4_gateway; + struct gateway_config *ipv6_gateway; + connman_bool_t default_checked; }; -static GSList *gateway_list = NULL; +static GHashTable *gateway_hash = NULL; -static struct gateway_data *find_gateway(int index, const char *gateway) +static struct gateway_config *find_gateway(int index, const char *gateway) { - GSList *list; + GHashTableIter iter; + gpointer value, key; if (gateway == NULL) return NULL; - for (list = gateway_list; list; list = list->next) { - struct gateway_data *data = list->data; + g_hash_table_iter_init(&iter, gateway_hash); - if (data->gateway == NULL) - continue; + while (g_hash_table_iter_next(&iter, &key, &value) == TRUE) { + struct gateway_data *data = value; + + if (data->ipv4_gateway != NULL && data->index == index && + g_str_equal(data->ipv4_gateway->gateway, + gateway) == TRUE) + return data->ipv4_gateway; + + if (data->ipv6_gateway != NULL && data->index == index && + g_str_equal(data->ipv6_gateway->gateway, + gateway) == TRUE) + return data->ipv6_gateway; + } + + return NULL; +} + +static struct gateway_data *lookup_gateway_data(struct gateway_config *config) +{ + GHashTableIter iter; + gpointer value, key; + + if (config == NULL) + return NULL; + + g_hash_table_iter_init(&iter, gateway_hash); + + while (g_hash_table_iter_next(&iter, &key, &value) == TRUE) { + struct gateway_data *data = value; + + if (data->ipv4_gateway != NULL && + data->ipv4_gateway == config) + return data; - if (data->index == index && - g_str_equal(data->gateway, gateway) == TRUE) + if (data->ipv6_gateway != NULL && + data->ipv6_gateway == config) return data; } return NULL; } -static void connection_newgateway(int index, const char *gateway) +/* + * Find the gateway that is serving the VPN link + */ +static struct gateway_data *find_phy_gateway(int index, const char *gateway) { - struct gateway_data *data; + GHashTableIter iter; + gpointer value, key; - DBG("index %d gateway %s", index, gateway); + if (gateway == NULL) + return NULL; - data = find_gateway(index, gateway); - if (data != NULL) - return; + g_hash_table_iter_init(&iter, gateway_hash); - data = g_try_new0(struct gateway_data, 1); - if (data == NULL) - return; + while (g_hash_table_iter_next(&iter, &key, &value) == TRUE) { + struct gateway_data *data = value; - data->index = index; - data->gateway = g_strdup(gateway); + if (data->ipv4_gateway != NULL && data->index != index && + g_str_equal(data->ipv4_gateway->gateway, + gateway) == TRUE) + return data; - gateway_list = g_slist_append(gateway_list, data); + if (data->ipv6_gateway != NULL && data->index != index && + g_str_equal(data->ipv6_gateway->gateway, + gateway) == TRUE) + return data; + } + + return NULL; } -static void connection_delgateway(int index, const char *gateway) +static void set_vpn_routes(struct gateway_data *new_gateway, + struct connman_service *service, + const char *gateway, + enum connman_ipconfig_type type, + const char *peer, + struct gateway_data *active_gateway) { + struct gateway_config *config; struct gateway_data *data; + struct connman_ipconfig *ipconfig; + char *dest; + int index; - DBG("index %d gateway %s", index, gateway); + if (type == CONNMAN_IPCONFIG_TYPE_IPV4) { + ipconfig = __connman_service_get_ip4config(service); + config = new_gateway->ipv4_gateway; + } else if (type == CONNMAN_IPCONFIG_TYPE_IPV6) { + ipconfig = __connman_service_get_ip6config(service); + config = new_gateway->ipv6_gateway; + } else + return; + + if (config == NULL) + goto done; + + config->vpn = TRUE; + if (peer != NULL) + config->vpn_ip = g_strdup(peer); + else if (gateway != NULL) + config->vpn_ip = g_strdup(gateway); + + index = __connman_ipconfig_get_index(ipconfig); + data = find_phy_gateway(index, gateway); - data = find_gateway(index, gateway); if (data == NULL) + goto done; + + /* + * data->service points now to original + * service that is serving the VPN link + */ + if (type == CONNMAN_IPCONFIG_TYPE_IPV4) + ipconfig = __connman_service_get_ip4config(data->service); + else if (type == CONNMAN_IPCONFIG_TYPE_IPV6) + ipconfig = __connman_service_get_ip6config(data->service); + else return; - gateway_list = g_slist_remove(gateway_list, data); + if (ipconfig != NULL) { + const char *address; - g_free(data->gateway); - g_free(data); + address = __connman_ipconfig_get_local(ipconfig); + config->vpn_phy_ip = g_strdup(address); + } + + config->vpn_phy_index = data->index; + + DBG("vpn %s phy %s index %d", config->vpn_ip, + config->vpn_phy_ip, config->vpn_phy_index); + +done: + if (active_gateway == NULL) + return; + + if (type == CONNMAN_IPCONFIG_TYPE_IPV4) { + /* + * Special route to VPN server via gateway. This + * is needed so that we can access hosts behind + * the VPN. The route might already exist depending + * on network topology. + */ + if (active_gateway->ipv4_gateway == NULL) + return; + + if (g_strcmp0(active_gateway->ipv4_gateway->gateway, + "0.0.0.0") != 0) + dest = active_gateway->ipv4_gateway->gateway; + else + dest = NULL; + + connman_inet_add_host_route(active_gateway->index, gateway, + dest); + + } else if (type == CONNMAN_IPCONFIG_TYPE_IPV6) { + + if (active_gateway->ipv6_gateway == NULL) + return; + + if (g_strcmp0(active_gateway->ipv6_gateway->gateway, + "::") != 0) + dest = active_gateway->ipv6_gateway->gateway; + else + dest = NULL; + + connman_inet_add_ipv6_host_route(active_gateway->index, + gateway, dest); + } } -static struct connman_rtnl connection_rtnl = { - .name = "connection", - .newgateway = connection_newgateway, - .delgateway = connection_delgateway, -}; +static int del_routes(struct gateway_data *data, + enum connman_ipconfig_type type) +{ + int status4 = 0, status6 = 0; + int do_ipv4 = FALSE, do_ipv6 = FALSE; + + if (type == CONNMAN_IPCONFIG_TYPE_IPV4) + do_ipv4 = TRUE; + else if (type == CONNMAN_IPCONFIG_TYPE_IPV6) + do_ipv6 = TRUE; + else + do_ipv4 = do_ipv6 = TRUE; + + if (do_ipv4 == TRUE && data->ipv4_gateway != NULL) { + if (data->ipv4_gateway->vpn == TRUE) { + status4 = connman_inet_clear_gateway_address( + data->index, + data->ipv4_gateway->vpn_ip); + + } else if (g_strcmp0(data->ipv4_gateway->gateway, + "0.0.0.0") == 0) { + status4 = connman_inet_clear_gateway_interface( + data->index); + } else { + connman_inet_del_host_route(data->index, + data->ipv4_gateway->gateway); + status4 = connman_inet_clear_gateway_address( + data->index, + data->ipv4_gateway->gateway); + } + } + + if (do_ipv6 == TRUE && data->ipv6_gateway != NULL) { + if (data->ipv6_gateway->vpn == TRUE) { + status6 = connman_inet_clear_ipv6_gateway_address( + data->index, + data->ipv6_gateway->vpn_ip); + + } else if (g_strcmp0(data->ipv6_gateway->gateway, "::") == 0) { + status6 = connman_inet_clear_ipv6_gateway_interface( + data->index); + } else { + connman_inet_del_ipv6_host_route(data->index, + data->ipv6_gateway->gateway); + status6 = connman_inet_clear_ipv6_gateway_address( + data->index, + data->ipv6_gateway->gateway); + } + } + + return (status4 < 0 ? status4 : status6); +} -static int set_route(struct connman_element *element, const char *gateway) +static int disable_gateway(struct gateway_data *data, + enum connman_ipconfig_type type) { - struct ifreq ifr; - struct rtentry rt; - struct sockaddr_in *addr; - int sk, err; + gboolean active = FALSE; + + if (type == CONNMAN_IPCONFIG_TYPE_IPV4) { + if (data->ipv4_gateway != NULL) + active = data->ipv4_gateway->active; + } else if (type == CONNMAN_IPCONFIG_TYPE_IPV6) { + if (data->ipv6_gateway != NULL) + active = data->ipv6_gateway->active; + } else + active = TRUE; - DBG("element %p", element); + DBG("type %d active %d", type, active); - sk = socket(PF_INET, SOCK_DGRAM, 0); - if (sk < 0) - return -1; + if (active == TRUE) + return del_routes(data, type); - memset(&ifr, 0, sizeof(ifr)); - ifr.ifr_ifindex = element->index; + return 0; +} - if (ioctl(sk, SIOCGIFNAME, &ifr) < 0) { - close(sk); - return -1; +static struct gateway_data *add_gateway(struct connman_service *service, + int index, const char *gateway, + enum connman_ipconfig_type type) +{ + struct gateway_data *data, *old; + struct gateway_config *config; + + if (gateway == NULL || strlen(gateway) == 0) + return NULL; + + data = g_try_new0(struct gateway_data, 1); + if (data == NULL) + return NULL; + + data->index = index; + + config = g_try_new0(struct gateway_config, 1); + if (config == NULL) { + g_free(data); + return NULL; } - DBG("ifname %s", ifr.ifr_name); + config->gateway = g_strdup(gateway); + config->vpn_ip = NULL; + config->vpn_phy_ip = NULL; + config->vpn = FALSE; + config->vpn_phy_index = -1; + config->active = FALSE; + + if (type == CONNMAN_IPCONFIG_TYPE_IPV4) + data->ipv4_gateway = config; + else if (type == CONNMAN_IPCONFIG_TYPE_IPV6) + data->ipv6_gateway = config; + else { + g_free(config->gateway); + g_free(config); + g_free(data); + return NULL; + } - memset(&rt, 0, sizeof(rt)); - rt.rt_flags = RTF_UP | RTF_GATEWAY; + data->service = service; + + data->order = __connman_service_get_order(service); + + /* + * If the service is already in the hash, then we + * must not replace it blindly but disable the gateway + * of the type we are replacing and take the other type + * from old gateway settings. + */ + old = g_hash_table_lookup(gateway_hash, service); + if (old != NULL) { + DBG("Replacing gw %p ipv4 %p ipv6 %p", old, + old->ipv4_gateway, old->ipv6_gateway); + disable_gateway(old, type); + if (type == CONNMAN_IPCONFIG_TYPE_IPV4) { + data->ipv6_gateway = old->ipv6_gateway; + old->ipv6_gateway = NULL; + } else if (type == CONNMAN_IPCONFIG_TYPE_IPV6) { + data->ipv4_gateway = old->ipv4_gateway; + old->ipv4_gateway = NULL; + } + } else { + /* + * Only take a ref if we are adding new stuff to hash. + */ + connman_service_ref(service); + } - addr = (struct sockaddr_in *) &rt.rt_dst; - addr->sin_family = AF_INET; - addr->sin_addr.s_addr = INADDR_ANY; + g_hash_table_replace(gateway_hash, service, data); - addr = (struct sockaddr_in *) &rt.rt_gateway; - addr->sin_family = AF_INET; - addr->sin_addr.s_addr = inet_addr(gateway); + return data; +} - addr = (struct sockaddr_in *) &rt.rt_genmask; - addr->sin_family = AF_INET; - addr->sin_addr.s_addr = INADDR_ANY; +static void set_default_gateway(struct gateway_data *data, + enum connman_ipconfig_type type) +{ + int index; + int status4 = 0, status6 = 0; + int do_ipv4 = FALSE, do_ipv6 = FALSE; + + if (type == CONNMAN_IPCONFIG_TYPE_IPV4) + do_ipv4 = TRUE; + else if (type == CONNMAN_IPCONFIG_TYPE_IPV6) + do_ipv6 = TRUE; + else + do_ipv4 = do_ipv6 = TRUE; + + DBG("type %d gateway ipv4 %p ipv6 %p", type, data->ipv4_gateway, + data->ipv6_gateway); + + if (do_ipv4 == TRUE && data->ipv4_gateway != NULL && + data->ipv4_gateway->vpn == TRUE) { + connman_inet_set_gateway_address(data->index, + data->ipv4_gateway->vpn_ip); + connman_inet_add_host_route(data->index, + data->ipv4_gateway->vpn_ip, NULL); + data->ipv4_gateway->active = TRUE; + + DBG("set %p index %d vpn %s index %d phy %s", + data, data->index, data->ipv4_gateway->vpn_ip, + data->ipv4_gateway->vpn_phy_index, + data->ipv4_gateway->vpn_phy_ip); + + __connman_service_indicate_default(data->service); - err = ioctl(sk, SIOCADDRT, &rt); - if (err < 0) - DBG("default route setting failed (%s)", strerror(errno)); + return; + } - close(sk); + if (do_ipv6 == TRUE && data->ipv6_gateway != NULL && + data->ipv6_gateway->vpn == TRUE) { + connman_inet_set_ipv6_gateway_address(data->index, + data->ipv6_gateway->vpn_ip); + connman_inet_add_ipv6_host_route(data->index, + data->ipv6_gateway->vpn_ip, NULL); + data->ipv6_gateway->active = TRUE; - return err; + DBG("set %p index %d vpn %s index %d phy %s", + data, data->index, data->ipv6_gateway->vpn_ip, + data->ipv6_gateway->vpn_phy_index, + data->ipv6_gateway->vpn_phy_ip); + + __connman_service_indicate_default(data->service); + + return; + } + + index = __connman_service_get_index(data->service); + + if (do_ipv4 == TRUE && data->ipv4_gateway != NULL && + g_strcmp0(data->ipv4_gateway->gateway, + "0.0.0.0") == 0) { + if (connman_inet_set_gateway_interface(index) < 0) + return; + goto done; + } + + if (do_ipv6 == TRUE && data->ipv6_gateway != NULL && + g_strcmp0(data->ipv6_gateway->gateway, + "::") == 0) { + if (connman_inet_set_ipv6_gateway_interface(index) < 0) + return; + goto done; + } + + if (do_ipv6 == TRUE && data->ipv6_gateway != NULL) + status6 = connman_inet_set_ipv6_gateway_address(index, + data->ipv6_gateway->gateway); + + if (do_ipv4 == TRUE && data->ipv4_gateway != NULL) + status4 = connman_inet_set_gateway_address(index, + data->ipv4_gateway->gateway); + + if (status4 < 0 || status6 < 0) + return; + +done: + __connman_service_indicate_default(data->service); } -static int del_route(struct connman_element *element, const char *gateway) +static void unset_default_gateway(struct gateway_data *data, + enum connman_ipconfig_type type) { - struct ifreq ifr; - struct rtentry rt; - struct sockaddr_in *addr; - int sk, err; + int index; + int do_ipv4 = FALSE, do_ipv6 = FALSE; + + if (type == CONNMAN_IPCONFIG_TYPE_IPV4) + do_ipv4 = TRUE; + else if (type == CONNMAN_IPCONFIG_TYPE_IPV6) + do_ipv6 = TRUE; + else + do_ipv4 = do_ipv6 = TRUE; + + DBG("type %d gateway ipv4 %p ipv6 %p", type, data->ipv4_gateway, + data->ipv6_gateway); + + if (do_ipv4 == TRUE && data->ipv4_gateway != NULL && + data->ipv4_gateway->vpn == TRUE) { + connman_inet_del_host_route(data->index, + data->ipv4_gateway->vpn_ip); + connman_inet_clear_gateway_address(data->index, + data->ipv4_gateway->vpn_ip); + data->ipv4_gateway->active = FALSE; + + DBG("unset %p index %d vpn %s index %d phy %s", + data, data->index, data->ipv4_gateway->vpn_ip, + data->ipv4_gateway->vpn_phy_index, + data->ipv4_gateway->vpn_phy_ip); - DBG("element %p", element); + return; + } - sk = socket(PF_INET, SOCK_DGRAM, 0); - if (sk < 0) - return -1; + if (do_ipv6 == TRUE && data->ipv6_gateway != NULL && + data->ipv6_gateway->vpn == TRUE) { + connman_inet_del_ipv6_host_route(data->index, + data->ipv6_gateway->vpn_ip); + connman_inet_clear_ipv6_gateway_address(data->index, + data->ipv6_gateway->vpn_ip); + data->ipv6_gateway->active = FALSE; - memset(&ifr, 0, sizeof(ifr)); - ifr.ifr_ifindex = element->index; + DBG("unset %p index %d vpn %s index %d phy %s", + data, data->index, data->ipv6_gateway->vpn_ip, + data->ipv6_gateway->vpn_phy_index, + data->ipv6_gateway->vpn_phy_ip); - if (ioctl(sk, SIOCGIFNAME, &ifr) < 0) { - close(sk); - return -1; + return; } - DBG("ifname %s", ifr.ifr_name); + index = __connman_service_get_index(data->service); + + if (do_ipv4 == TRUE && data->ipv4_gateway != NULL && + g_strcmp0(data->ipv4_gateway->gateway, + "0.0.0.0") == 0) { + connman_inet_clear_gateway_interface(index); + return; + } - memset(&rt, 0, sizeof(rt)); - rt.rt_flags = RTF_UP | RTF_GATEWAY; + if (do_ipv6 == TRUE && data->ipv6_gateway != NULL && + g_strcmp0(data->ipv6_gateway->gateway, + "::") == 0) { + connman_inet_clear_ipv6_gateway_interface(index); + return; + } - addr = (struct sockaddr_in *) &rt.rt_dst; - addr->sin_family = AF_INET; - addr->sin_addr.s_addr = INADDR_ANY; + if (do_ipv6 == TRUE && data->ipv6_gateway != NULL) + connman_inet_clear_ipv6_gateway_address(index, + data->ipv6_gateway->gateway); - addr = (struct sockaddr_in *) &rt.rt_gateway; - addr->sin_family = AF_INET; - addr->sin_addr.s_addr = inet_addr(gateway); + if (do_ipv4 == TRUE && data->ipv4_gateway != NULL) + connman_inet_clear_gateway_address(index, + data->ipv4_gateway->gateway); +} - addr = (struct sockaddr_in *) &rt.rt_genmask; - addr->sin_family = AF_INET; - addr->sin_addr.s_addr = INADDR_ANY; +static struct gateway_data *find_default_gateway(void) +{ + struct gateway_data *found = NULL; + unsigned int order = 0; + GHashTableIter iter; + gpointer value, key; - err = ioctl(sk, SIOCDELRT, &rt); - if (err < 0) - DBG("default route removal failed (%s)", strerror(errno)); + g_hash_table_iter_init(&iter, gateway_hash); - close(sk); + while (g_hash_table_iter_next(&iter, &key, &value) == TRUE) { + struct gateway_data *data = value; - return err; + if (found == NULL || data->order > order) { + found = data; + order = data->order; + + DBG("default %p order %d", found, order); + } + } + + return found; } -static DBusMessage *get_properties(DBusConnection *conn, - DBusMessage *msg, void *data) +static gboolean choose_default_gateway(struct gateway_data *data, + struct gateway_data *candidate) { - struct connman_element *element = data; - DBusMessage *reply; - DBusMessageIter array, dict; - const char *method = NULL; - const char *address = NULL, *netmask = NULL, *gateway = NULL; + gboolean downgraded = FALSE; + + /* + * If the current default is not active, then we mark + * this one as default. If the other one is already active + * we mark this one as non default. + */ + if (data->ipv4_gateway != NULL) { + if (candidate->ipv4_gateway != NULL && + candidate->ipv4_gateway->active == FALSE) { + DBG("ipv4 downgrading %p", candidate); + unset_default_gateway(candidate, + CONNMAN_IPCONFIG_TYPE_IPV4); + } + if (candidate->ipv4_gateway != NULL && + candidate->ipv4_gateway->active == TRUE && + candidate->order > data->order) { + DBG("ipv4 downgrading this %p", data); + unset_default_gateway(data, + CONNMAN_IPCONFIG_TYPE_IPV4); + downgraded = TRUE; + } + } - DBG("conn %p", conn); + if (data->ipv6_gateway != NULL) { + if (candidate->ipv6_gateway != NULL && + candidate->ipv6_gateway->active == FALSE) { + DBG("ipv6 downgrading %p", candidate); + unset_default_gateway(candidate, + CONNMAN_IPCONFIG_TYPE_IPV6); + } + + if (candidate->ipv6_gateway != NULL && + candidate->ipv6_gateway->active == TRUE && + candidate->order > data->order) { + DBG("ipv6 downgrading this %p", data); + unset_default_gateway(data, + CONNMAN_IPCONFIG_TYPE_IPV6); + downgraded = TRUE; + } + } - reply = dbus_message_new_method_return(msg); - if (reply == NULL) - return NULL; + return downgraded; +} - dbus_message_iter_init_append(reply, &array); +static void connection_newgateway(int index, const char *gateway) +{ + struct gateway_config *config; + struct gateway_data *data; + GHashTableIter iter; + gpointer value, key; + gboolean found = FALSE; - dbus_message_iter_open_container(&array, DBUS_TYPE_ARRAY, - DBUS_DICT_ENTRY_BEGIN_CHAR_AS_STRING - DBUS_TYPE_STRING_AS_STRING DBUS_TYPE_VARIANT_AS_STRING - DBUS_DICT_ENTRY_END_CHAR_AS_STRING, &dict); + DBG("index %d gateway %s", index, gateway); - if (element->devname != NULL) - connman_dbus_dict_append_variant(&dict, "Interface", - DBUS_TYPE_STRING, &element->devname); + config = find_gateway(index, gateway); + if (config == NULL) + return; - connman_dbus_dict_append_variant(&dict, "Default", - DBUS_TYPE_BOOLEAN, &element->enabled); + config->active = TRUE; - connman_element_get_value(element, - CONNMAN_PROPERTY_ID_IPV4_METHOD, &method); + /* + * It is possible that we have two default routes atm + * if there are two gateways waiting rtnl activation at the + * same time. + */ + data = lookup_gateway_data(config); + if (data == NULL) + return; - connman_element_get_value(element, - CONNMAN_PROPERTY_ID_IPV4_ADDRESS, &address); - connman_element_get_value(element, - CONNMAN_PROPERTY_ID_IPV4_NETMASK, &netmask); - connman_element_get_value(element, - CONNMAN_PROPERTY_ID_IPV4_GATEWAY, &gateway); + if (data->default_checked == TRUE) + return; - if (method != NULL) - connman_dbus_dict_append_variant(&dict, "IPv4.Method", - DBUS_TYPE_STRING, &method); + /* + * The next checks are only done once, otherwise setting + * the default gateway could lead into rtnl forever loop. + */ - if (address != NULL) - connman_dbus_dict_append_variant(&dict, "IPv4.Address", - DBUS_TYPE_STRING, &address); + g_hash_table_iter_init(&iter, gateway_hash); - if (netmask != NULL) - connman_dbus_dict_append_variant(&dict, "IPv4.Netmask", - DBUS_TYPE_STRING, &netmask); + while (g_hash_table_iter_next(&iter, &key, &value) == TRUE) { + struct gateway_data *candidate = value; - if (gateway != NULL) - connman_dbus_dict_append_variant(&dict, "IPv4.Gateway", - DBUS_TYPE_STRING, &gateway); + if (candidate == data) + continue; + + found = choose_default_gateway(data, candidate); + if (found == TRUE) + break; + } - dbus_message_iter_close_container(&array, &dict); + if (found == FALSE) { + if (data->ipv4_gateway != NULL) + set_default_gateway(data, CONNMAN_IPCONFIG_TYPE_IPV4); - return reply; + if (data->ipv6_gateway != NULL) + set_default_gateway(data, CONNMAN_IPCONFIG_TYPE_IPV6); + } + + data->default_checked = TRUE; } -static DBusMessage *set_property(DBusConnection *conn, - DBusMessage *msg, void *data) +static void remove_gateway(gpointer user_data) { - DBusMessageIter iter, value; - const char *name; + struct gateway_data *data = user_data; + + DBG("gateway ipv4 %p ipv6 %p", data->ipv4_gateway, data->ipv6_gateway); + + if (data->ipv4_gateway != NULL) { + g_free(data->ipv4_gateway->gateway); + g_free(data->ipv4_gateway->vpn_ip); + g_free(data->ipv4_gateway->vpn_phy_ip); + g_free(data->ipv4_gateway); + } - DBG("conn %p", conn); + if (data->ipv6_gateway != NULL) { + g_free(data->ipv6_gateway->gateway); + g_free(data->ipv6_gateway->vpn_ip); + g_free(data->ipv6_gateway->vpn_phy_ip); + g_free(data->ipv6_gateway); + } - if (dbus_message_iter_init(msg, &iter) == FALSE) - return __connman_error_invalid_arguments(msg); + g_free(data); +} + +static void connection_delgateway(int index, const char *gateway) +{ + struct gateway_config *config; + struct gateway_data *data; - dbus_message_iter_get_basic(&iter, &name); - dbus_message_iter_next(&iter); - dbus_message_iter_recurse(&iter, &value); + DBG("index %d gateway %s", index, gateway); - if (__connman_security_check_privileges(msg) < 0) - return __connman_error_permission_denied(msg); + config = find_gateway(index, gateway); + if (config != NULL) + config->active = FALSE; - return g_dbus_create_reply(msg, DBUS_TYPE_INVALID); + data = find_default_gateway(); + if (data != NULL) + set_default_gateway(data, CONNMAN_IPCONFIG_TYPE_ALL); } -static GDBusMethodTable connection_methods[] = { - { "GetProperties", "", "a{sv}", get_properties }, - { "SetProperty", "sv", "", set_property }, - { }, +static struct connman_rtnl connection_rtnl = { + .name = "connection", + .newgateway = connection_newgateway, + .delgateway = connection_delgateway, }; -static GDBusSignalTable connection_signals[] = { - { "PropertyChanged", "sv" }, - { }, -}; +static struct gateway_data *find_active_gateway(void) +{ + GHashTableIter iter; + gpointer value, key; + + DBG(""); -static DBusConnection *connection; + g_hash_table_iter_init(&iter, gateway_hash); -static void emit_connections_signal(void) -{ + while (g_hash_table_iter_next(&iter, &key, &value) == TRUE) { + struct gateway_data *data = value; + + if (data->ipv4_gateway != NULL && + data->ipv4_gateway->active == TRUE) + return data; + + if (data->ipv6_gateway != NULL && + data->ipv6_gateway->active == TRUE) + return data; + } + + return NULL; } -static int register_interface(struct connman_element *element) +static void update_order(void) { - DBG("element %p name %s", element, element->name); + GHashTableIter iter; + gpointer value, key; - if (g_dbus_register_interface(connection, element->path, - CONNMAN_CONNECTION_INTERFACE, - connection_methods, connection_signals, - NULL, element, NULL) == FALSE) { - connman_error("Failed to register %s connection", element->path); - return -EIO; - } + DBG(""); - emit_connections_signal(); + g_hash_table_iter_init(&iter, gateway_hash); - return 0; + while (g_hash_table_iter_next(&iter, &key, &value) == TRUE) { + struct gateway_data *data = value; + + data->order = __connman_service_get_order(data->service); + } } -static void unregister_interface(struct connman_element *element) +void __connman_connection_gateway_activate(struct connman_service *service, + enum connman_ipconfig_type type) { - DBG("element %p name %s", element, element->name); + struct gateway_data *data = NULL; - emit_connections_signal(); + data = g_hash_table_lookup(gateway_hash, service); + if (data == NULL) + return; + + DBG("gateway %p/%p type %d", data->ipv4_gateway, + data->ipv6_gateway, type); + + if (type == CONNMAN_IPCONFIG_TYPE_IPV4) + data->ipv4_gateway->active = TRUE; + else if (type == CONNMAN_IPCONFIG_TYPE_IPV6) + data->ipv6_gateway->active = TRUE; +} - g_dbus_unregister_interface(connection, element->path, - CONNMAN_CONNECTION_INTERFACE); +static void add_host_route(int family, int index, const char *gateway, + enum connman_service_type service_type) +{ + switch (family) { + case AF_INET: + if (g_strcmp0(gateway, "0.0.0.0") != 0) { + /* + * We must not set route to the phy dev gateway in + * VPN link. The packets to VPN link might be routed + * back to itself and not routed into phy link gateway. + */ + if (service_type != CONNMAN_SERVICE_TYPE_VPN) + connman_inet_add_host_route(index, gateway, + NULL); + } else { + /* + * Add host route to P-t-P link so that services can + * be moved around and we can have some link to P-t-P + * network (although those P-t-P links have limited + * usage if default route is not directed to them) + */ + char *dest; + if (connman_inet_get_dest_addr(index, &dest) == 0) { + connman_inet_add_host_route(index, dest, NULL); + g_free(dest); + } + } + break; + + case AF_INET6: + if (g_strcmp0(gateway, "::") != 0) { + if (service_type != CONNMAN_SERVICE_TYPE_VPN) + connman_inet_add_ipv6_host_route(index, + gateway, NULL); + } else { + /* P-t-P link, add route to destination */ + char *dest; + if (connman_inet_ipv6_get_dest_addr(index, + &dest) == 0) { + connman_inet_add_ipv6_host_route(index, dest, + NULL); + g_free(dest); + } + } + break; + } } -static int connection_probe(struct connman_element *element) +int __connman_connection_gateway_add(struct connman_service *service, + const char *gateway, + enum connman_ipconfig_type type, + const char *peer) { - const char *gateway = NULL; + struct gateway_data *active_gateway = NULL; + struct gateway_data *new_gateway = NULL; + enum connman_ipconfig_type type4 = CONNMAN_IPCONFIG_TYPE_UNKNOWN, + type6 = CONNMAN_IPCONFIG_TYPE_UNKNOWN; + enum connman_service_type service_type = + connman_service_get_type(service); + int index; - DBG("element %p name %s", element, element->name); + index = __connman_service_get_index(service); - if (element->parent == NULL) - return -ENODEV; + /* + * If gateway is NULL, it's a point to point link and the default + * gateway for ipv4 is 0.0.0.0 and for ipv6 is ::, meaning the + * interface + */ + if (gateway == NULL && type == CONNMAN_IPCONFIG_TYPE_IPV4) + gateway = "0.0.0.0"; - if (element->parent->type != CONNMAN_ELEMENT_TYPE_IPV4) - return -ENODEV; + if (gateway == NULL && type == CONNMAN_IPCONFIG_TYPE_IPV6) + gateway = "::"; - connman_element_get_value(element, - CONNMAN_PROPERTY_ID_IPV4_GATEWAY, &gateway); + DBG("service %p index %d gateway %s vpn ip %s type %d", + service, index, gateway, peer, type); - DBG("gateway %s", gateway); + new_gateway = add_gateway(service, index, gateway, type); + if (new_gateway == NULL) + return -EINVAL; - if (register_interface(element) < 0) - return -ENODEV; + active_gateway = find_active_gateway(); - if (gateway == NULL) - return 0; + DBG("active %p index %d new %p", active_gateway, + active_gateway ? active_gateway->index : -1, new_gateway); - if (g_slist_length(gateway_list) > 0) { - DBG("default gateway already present"); - return 0; + if (type == CONNMAN_IPCONFIG_TYPE_IPV4 && + new_gateway->ipv4_gateway != NULL) { + add_host_route(AF_INET, index, gateway, service_type); + __connman_service_nameserver_add_routes(service, + new_gateway->ipv4_gateway->gateway); + type4 = CONNMAN_IPCONFIG_TYPE_IPV4; } - set_route(element, gateway); + if (type == CONNMAN_IPCONFIG_TYPE_IPV6 && + new_gateway->ipv6_gateway != NULL) { + add_host_route(AF_INET6, index, gateway, service_type); + __connman_service_nameserver_add_routes(service, + new_gateway->ipv6_gateway->gateway); + type6 = CONNMAN_IPCONFIG_TYPE_IPV6; + } + + if (service_type == CONNMAN_SERVICE_TYPE_VPN) { + + set_vpn_routes(new_gateway, service, gateway, type, peer, + active_gateway); + + } else { + if (type == CONNMAN_IPCONFIG_TYPE_IPV4 && + new_gateway->ipv4_gateway != NULL) + new_gateway->ipv4_gateway->vpn = FALSE; - connman_element_set_enabled(element, TRUE); + if (type == CONNMAN_IPCONFIG_TYPE_IPV6 && + new_gateway->ipv6_gateway != NULL) + new_gateway->ipv6_gateway->vpn = FALSE; + } + + if (active_gateway == NULL) { + set_default_gateway(new_gateway, type); + goto done; + } + + if (type == CONNMAN_IPCONFIG_TYPE_IPV4 && + new_gateway->ipv4_gateway != NULL && + new_gateway->ipv4_gateway->vpn == TRUE) { + if (__connman_service_is_split_routing(new_gateway->service) == + FALSE) + connman_inet_clear_gateway_address( + active_gateway->index, + active_gateway->ipv4_gateway->gateway); + } + + if (type == CONNMAN_IPCONFIG_TYPE_IPV6 && + new_gateway->ipv6_gateway != NULL && + new_gateway->ipv6_gateway->vpn == TRUE) { + if (__connman_service_is_split_routing(new_gateway->service) == + FALSE) + connman_inet_clear_ipv6_gateway_address( + active_gateway->index, + active_gateway->ipv6_gateway->gateway); + } +done: + if (type4 == CONNMAN_IPCONFIG_TYPE_IPV4) + __connman_service_ipconfig_indicate_state(service, + CONNMAN_SERVICE_STATE_READY, + CONNMAN_IPCONFIG_TYPE_IPV4); + + if (type6 == CONNMAN_IPCONFIG_TYPE_IPV6) + __connman_service_ipconfig_indicate_state(service, + CONNMAN_SERVICE_STATE_READY, + CONNMAN_IPCONFIG_TYPE_IPV6); return 0; } -static void connection_remove(struct connman_element *element) +void __connman_connection_gateway_remove(struct connman_service *service, + enum connman_ipconfig_type type) { - const char *gateway = NULL; - - DBG("element %p name %s", element, element->name); + struct gateway_data *data = NULL; + gboolean set_default4 = FALSE, set_default6 = FALSE; + int do_ipv4 = FALSE, do_ipv6 = FALSE; + int err; - unregister_interface(element); + DBG("service %p type %d", service, type); - connman_element_get_value(element, - CONNMAN_PROPERTY_ID_IPV4_GATEWAY, &gateway); + if (type == CONNMAN_IPCONFIG_TYPE_IPV4) + do_ipv4 = TRUE; + else if (type == CONNMAN_IPCONFIG_TYPE_IPV6) + do_ipv6 = TRUE; + else + do_ipv4 = do_ipv6 = TRUE; - DBG("gateway %s", gateway); + __connman_service_nameserver_del_routes(service, type); - if (gateway == NULL) + data = g_hash_table_lookup(gateway_hash, service); + if (data == NULL) return; - del_route(element, gateway); + if (do_ipv4 == TRUE && data->ipv4_gateway != NULL) + set_default4 = data->ipv4_gateway->vpn; + + if (do_ipv6 == TRUE && data->ipv6_gateway != NULL) + set_default6 = data->ipv6_gateway->vpn; + + DBG("ipv4 gateway %s ipv6 gateway %s vpn %d/%d", + data->ipv4_gateway ? data->ipv4_gateway->gateway : "", + data->ipv6_gateway ? data->ipv6_gateway->gateway : "", + set_default4, set_default6); + + if (do_ipv4 == TRUE && data->ipv4_gateway != NULL && + data->ipv4_gateway->vpn == TRUE && data->index >= 0) + connman_inet_del_host_route(data->index, + data->ipv4_gateway->gateway); + + if (do_ipv6 == TRUE && data->ipv6_gateway != NULL && + data->ipv6_gateway->vpn == TRUE && data->index >= 0) + connman_inet_del_ipv6_host_route(data->index, + data->ipv6_gateway->gateway); + + err = disable_gateway(data, type); + + /* + * We remove the service from the hash only if all the gateway + * settings are to be removed. + */ + if (do_ipv4 == do_ipv6 || + (data->ipv4_gateway != NULL && data->ipv6_gateway == NULL + && do_ipv4 == TRUE) || + (data->ipv6_gateway != NULL && data->ipv4_gateway == NULL + && do_ipv6 == TRUE) + ) { + connman_service_unref(service); + g_hash_table_remove(gateway_hash, service); + } else + DBG("Not yet removing gw ipv4 %p/%d ipv6 %p/%d", + data->ipv4_gateway, do_ipv4, + data->ipv6_gateway, do_ipv6); + + /* with vpn this will be called after the network was deleted, + * we need to call set_default here because we will not recieve any + * gateway delete notification. + * We hit the same issue if remove_gateway() fails. + */ + if (set_default4 || set_default6 || err < 0) { + data = find_default_gateway(); + if (data != NULL) + set_default_gateway(data, type); + } } -static struct connman_driver connection_driver = { - .name = "connection", - .type = CONNMAN_ELEMENT_TYPE_CONNECTION, - .priority = CONNMAN_DRIVER_PRIORITY_LOW, - .probe = connection_probe, - .remove = connection_remove, -}; +gboolean __connman_connection_update_gateway(void) +{ + struct gateway_data *default_gateway; + gboolean updated = FALSE; + GHashTableIter iter; + gpointer value, key; + + if (gateway_hash == NULL) + return updated; + + update_order(); + + default_gateway = find_default_gateway(); + + __connman_service_update_ordering(); + + DBG("default %p", default_gateway); + + /* + * There can be multiple active gateways so we need to + * check them all. + */ + g_hash_table_iter_init(&iter, gateway_hash); + + while (g_hash_table_iter_next(&iter, &key, &value) == TRUE) { + struct gateway_data *active_gateway = value; + + if (active_gateway == default_gateway) + continue; + + if (active_gateway->ipv4_gateway != NULL && + active_gateway->ipv4_gateway->active == TRUE) { + + unset_default_gateway(active_gateway, + CONNMAN_IPCONFIG_TYPE_IPV4); + updated = TRUE; + } + + if (active_gateway->ipv6_gateway != NULL && + active_gateway->ipv6_gateway->active == TRUE) { + + unset_default_gateway(active_gateway, + CONNMAN_IPCONFIG_TYPE_IPV6); + updated = TRUE; + } + } + + if (updated && default_gateway != NULL) { + if (default_gateway->ipv4_gateway) + set_default_gateway(default_gateway, + CONNMAN_IPCONFIG_TYPE_IPV4); + + if (default_gateway->ipv6_gateway) + set_default_gateway(default_gateway, + CONNMAN_IPCONFIG_TYPE_IPV6); + } + + return updated; +} + +int __connman_connection_get_vpn_index(int phy_index) +{ + GHashTableIter iter; + gpointer value, key; + + g_hash_table_iter_init(&iter, gateway_hash); + + while (g_hash_table_iter_next(&iter, &key, &value) == TRUE) { + struct gateway_data *data = value; + + if (data->ipv4_gateway != NULL && + data->ipv4_gateway->vpn_phy_index == phy_index) + return data->index; + + if (data->ipv6_gateway != NULL && + data->ipv6_gateway->vpn_phy_index == phy_index) + return data->index; + } + + return -1; +} int __connman_connection_init(void) { + int err; + DBG(""); - connection = connman_dbus_get_connection(); + gateway_hash = g_hash_table_new_full(g_direct_hash, g_direct_equal, + NULL, remove_gateway); - if (connman_rtnl_register(&connection_rtnl) < 0) + err = connman_rtnl_register(&connection_rtnl); + if (err < 0) connman_error("Failed to setup RTNL gateway driver"); - connman_rtnl_send_getroute(); - - return connman_driver_register(&connection_driver); + return err; } void __connman_connection_cleanup(void) { - GSList *list; + GHashTableIter iter; + gpointer value, key; DBG(""); - connman_driver_unregister(&connection_driver); - connman_rtnl_unregister(&connection_rtnl); - for (list = gateway_list; list; list = list->next) { - struct gateway_data *data = list->data; + g_hash_table_iter_init(&iter, gateway_hash); - DBG("index %d gateway %s", data->index, data->gateway); + while (g_hash_table_iter_next(&iter, &key, &value) == TRUE) { + struct gateway_data *data = value; - g_free(data->gateway); - g_free(data); - list->data = NULL; + disable_gateway(data, CONNMAN_IPCONFIG_TYPE_ALL); } - g_slist_free(gateway_list); - gateway_list = NULL; - - dbus_connection_unref(connection); + g_hash_table_destroy(gateway_hash); + gateway_hash = NULL; }