1
/* -*- Mode: C; tab-width: 4; indent-tabs-mode: t; c-basic-offset: 4 -*- */
2
/* NetworkManager -- Network link manager
4
* This program is free software; you can redistribute it and/or modify
5
* it under the terms of the GNU General Public License as published by
6
* the Free Software Foundation; either version 2 of the License, or
7
* (at your option) any later version.
9
* This program is distributed in the hope that it will be useful,
10
* but WITHOUT ANY WARRANTY; without even the implied warranty of
11
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
12
* GNU General Public License for more details.
14
* You should have received a copy of the GNU General Public License along
15
* with this program; if not, write to the Free Software Foundation, Inc.,
16
* 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA.
18
* Copyright (C) 2005 - 2012 Red Hat, Inc.
19
* Copyright (C) 2005 - 2008 Novell, Inc.
25
#include <dbus/dbus.h>
26
#include <sys/types.h>
31
#include "nm-vpn-service.h"
32
#include "nm-dbus-manager.h"
33
#include "nm-logging.h"
34
#include "nm-posix-signals.h"
35
#include "nm-vpn-manager.h"
36
#include "nm-glib-compat.h"
38
G_DEFINE_TYPE (NMVPNService, nm_vpn_service, G_TYPE_OBJECT)
43
NMDBusManager *dbus_mgr;
55
} NMVPNServicePrivate;
57
#define NM_VPN_SERVICE_GET_PRIVATE(o) (G_TYPE_INSTANCE_GET_PRIVATE ((o), NM_TYPE_VPN_SERVICE, NMVPNServicePrivate))
60
nm_vpn_service_new (const char *namefile, GError **error)
62
NMVPNService *self = NULL;
64
char *dbus_service = NULL, *program = NULL, *name = NULL;
66
g_return_val_if_fail (namefile != NULL, NULL);
67
g_return_val_if_fail (g_path_is_absolute (namefile), NULL);
69
kf = g_key_file_new ();
70
if (!g_key_file_load_from_file (kf, namefile, G_KEY_FILE_NONE, error)) {
75
dbus_service = g_key_file_get_string (kf, VPN_CONNECTION_GROUP, "service", NULL);
77
g_set_error (error, 0, 0, "VPN service file %s had no 'service' key", namefile);
81
program = g_key_file_get_string (kf, VPN_CONNECTION_GROUP, "program", NULL);
83
g_set_error (error, 0, 0, "VPN service file %s had no 'program' key", namefile);
87
name = g_key_file_get_string (kf, VPN_CONNECTION_GROUP, "name", NULL);
89
g_set_error (error, 0, 0, "VPN service file %s had no 'name' key", namefile);
93
self = (NMVPNService *) g_object_new (NM_TYPE_VPN_SERVICE, NULL);
95
g_set_error (error, 0, 0, "out of memory creating VPN service object");
99
NM_VPN_SERVICE_GET_PRIVATE (self)->name = g_strdup (name);
100
NM_VPN_SERVICE_GET_PRIVATE (self)->dbus_service = g_strdup (dbus_service);
101
NM_VPN_SERVICE_GET_PRIVATE (self)->program = g_strdup (program);
102
NM_VPN_SERVICE_GET_PRIVATE (self)->namefile = g_strdup (namefile);
105
g_key_file_free (kf);
106
g_free (dbus_service);
113
nm_vpn_service_get_dbus_service (NMVPNService *service)
115
g_return_val_if_fail (NM_IS_VPN_SERVICE (service), NULL);
117
return NM_VPN_SERVICE_GET_PRIVATE (service)->dbus_service;
121
nm_vpn_service_get_name_file (NMVPNService *service)
123
g_return_val_if_fail (NM_IS_VPN_SERVICE (service), NULL);
125
return NM_VPN_SERVICE_GET_PRIVATE (service)->namefile;
129
nm_vpn_service_connections_stop (NMVPNService *service,
131
NMVPNConnectionStateReason reason)
133
NMVPNServicePrivate *priv = NM_VPN_SERVICE_GET_PRIVATE (service);
136
/* Copy because stopping the connection may remove it from the list
137
* in the the NMVPNService objects' VPN connection state handler.
139
copy = g_slist_copy (priv->connections);
140
for (iter = copy; iter; iter = iter->next) {
142
nm_vpn_connection_fail (NM_VPN_CONNECTION (iter->data), reason);
144
nm_vpn_connection_disconnect (NM_VPN_CONNECTION (iter->data), reason);
150
clear_quit_timeout (NMVPNService *self)
152
NMVPNServicePrivate *priv = NM_VPN_SERVICE_GET_PRIVATE (self);
154
if (priv->quit_timeout) {
155
g_source_remove (priv->quit_timeout);
156
priv->quit_timeout = 0;
161
* nm_vpn_service_child_setup
163
* Set the process group ID of the newly forked process
167
nm_vpn_service_child_setup (gpointer user_data G_GNUC_UNUSED)
169
/* We are in the child process at this point */
170
pid_t pid = getpid ();
174
* We blocked signals in main(). We need to restore original signal
175
* mask for VPN service here so that it can receive signals.
177
nm_unblock_posix_signals (NULL);
181
vpn_service_watch_cb (GPid pid, gint status, gpointer user_data)
183
NMVPNService *service = NM_VPN_SERVICE (user_data);
184
NMVPNServicePrivate *priv = NM_VPN_SERVICE_GET_PRIVATE (service);
186
if (WIFEXITED (status)) {
187
guint err = WEXITSTATUS (status);
190
nm_log_warn (LOGD_VPN, "VPN service '%s' exited with error: %d",
191
priv->name, WSTOPSIG (status));
193
} else if (WIFSTOPPED (status)) {
194
nm_log_warn (LOGD_VPN, "VPN service '%s' stopped unexpectedly with signal %d",
195
priv->name, WSTOPSIG (status));
196
} else if (WIFSIGNALED (status)) {
197
nm_log_warn (LOGD_VPN, "VPN service '%s' died with signal %d",
198
priv->name, WTERMSIG (status));
200
nm_log_warn (LOGD_VPN, "VPN service '%s' died from an unknown cause",
205
priv->child_watch = 0;
206
clear_quit_timeout (service);
208
nm_vpn_service_connections_stop (service, TRUE, NM_VPN_CONNECTION_STATE_REASON_SERVICE_STOPPED);
212
nm_vpn_service_timeout (gpointer data)
214
NMVPNService *self = NM_VPN_SERVICE (data);
215
NMVPNServicePrivate *priv = NM_VPN_SERVICE_GET_PRIVATE (self);
217
nm_log_warn (LOGD_VPN, "VPN service '%s' start timed out", priv->name);
218
priv->start_timeout = 0;
219
nm_vpn_service_connections_stop (self, TRUE, NM_VPN_CONNECTION_STATE_REASON_SERVICE_START_TIMEOUT);
224
nm_vpn_service_daemon_exec (NMVPNService *service, GError **error)
226
NMVPNServicePrivate *priv = NM_VPN_SERVICE_GET_PRIVATE (service);
228
gboolean success = FALSE;
229
GError *spawn_error = NULL;
231
g_return_val_if_fail (NM_IS_VPN_SERVICE (service), FALSE);
232
g_return_val_if_fail (error != NULL, FALSE);
233
g_return_val_if_fail (*error == NULL, FALSE);
235
vpn_argv[0] = priv->program;
238
success = g_spawn_async (NULL, vpn_argv, NULL, G_SPAWN_DO_NOT_REAP_CHILD,
239
nm_vpn_service_child_setup, NULL, &priv->pid,
242
nm_log_info (LOGD_VPN, "VPN service '%s' started (%s), PID %d",
243
priv->name, priv->dbus_service, priv->pid);
245
priv->child_watch = g_child_watch_add (priv->pid, vpn_service_watch_cb, service);
246
priv->start_timeout = g_timeout_add_seconds (5, nm_vpn_service_timeout, service);
248
nm_log_warn (LOGD_VPN, "VPN service '%s': could not launch the VPN service. error: (%d) %s.",
250
spawn_error ? spawn_error->code : -1,
251
spawn_error && spawn_error->message ? spawn_error->message : "(unknown)");
254
NM_VPN_MANAGER_ERROR, NM_VPN_MANAGER_ERROR_SERVICE_START_FAILED,
255
"%s", spawn_error ? spawn_error->message : "unknown g_spawn_async() error");
257
nm_vpn_service_connections_stop (service, TRUE, NM_VPN_CONNECTION_STATE_REASON_SERVICE_START_FAILED);
259
g_error_free (spawn_error);
266
ensure_killed (gpointer data)
268
int pid = GPOINTER_TO_INT (data);
270
if (kill (pid, 0) == 0)
273
/* ensure the child is reaped */
274
nm_log_dbg (LOGD_VPN, "waiting for VPN service pid %d to exit", pid);
275
waitpid (pid, NULL, 0);
276
nm_log_dbg (LOGD_VPN, "VPN service pid %d cleaned up", pid);
282
service_quit (gpointer user_data)
284
NMVPNServicePrivate *priv = NM_VPN_SERVICE_GET_PRIVATE (user_data);
287
if (kill (priv->pid, SIGTERM) == 0)
288
g_timeout_add_seconds (2, ensure_killed, GINT_TO_POINTER (priv->pid));
290
kill (priv->pid, SIGKILL);
292
/* ensure the child is reaped */
293
nm_log_dbg (LOGD_VPN, "waiting for VPN service pid %d to exit", priv->pid);
294
waitpid (priv->pid, NULL, 0);
295
nm_log_dbg (LOGD_VPN, "VPN service pid %d cleaned up", priv->pid);
299
priv->quit_timeout = 0;
305
connection_vpn_state_changed (NMVPNConnection *connection,
306
NMVPNConnectionState new_state,
307
NMVPNConnectionState old_state,
308
NMVPNConnectionStateReason reason,
311
NMVPNServicePrivate *priv = NM_VPN_SERVICE_GET_PRIVATE (user_data);
314
case NM_VPN_CONNECTION_STATE_FAILED:
315
case NM_VPN_CONNECTION_STATE_DISCONNECTED:
316
/* Remove the connection from our list */
317
priv->connections = g_slist_remove (priv->connections, connection);
318
g_object_unref (connection);
320
if (priv->connections == NULL) {
321
/* Tell the service to quit in a few seconds */
322
if (!priv->quit_timeout)
323
priv->quit_timeout = g_timeout_add_seconds (5, service_quit, user_data);
332
nm_vpn_service_activate (NMVPNService *service,
333
NMConnection *connection,
335
const char *specific_object,
336
gboolean user_requested,
340
NMVPNConnection *vpn;
341
NMVPNServicePrivate *priv;
343
g_return_val_if_fail (NM_IS_VPN_SERVICE (service), NULL);
344
g_return_val_if_fail (NM_IS_CONNECTION (connection), NULL);
345
g_return_val_if_fail (NM_IS_DEVICE (device), NULL);
346
g_return_val_if_fail (error != NULL, NULL);
347
g_return_val_if_fail (*error == NULL, NULL);
349
priv = NM_VPN_SERVICE_GET_PRIVATE (service);
351
clear_quit_timeout (service);
353
vpn = nm_vpn_connection_new (connection, device, specific_object, user_requested, user_uid);
354
g_signal_connect (vpn, NM_VPN_CONNECTION_INTERNAL_STATE_CHANGED,
355
G_CALLBACK (connection_vpn_state_changed),
358
priv->connections = g_slist_prepend (priv->connections, g_object_ref (vpn));
360
if (nm_dbus_manager_name_has_owner (priv->dbus_mgr, priv->dbus_service)) {
361
// FIXME: fill in error when errors happen
362
nm_vpn_connection_activate (vpn);
363
} else if (priv->start_timeout == 0) {
364
nm_log_info (LOGD_VPN, "Starting VPN service '%s'...", priv->name);
365
if (!nm_vpn_service_daemon_exec (service, error))
373
nm_vpn_service_get_active_connections (NMVPNService *service)
375
g_return_val_if_fail (NM_IS_VPN_SERVICE (service), NULL);
377
return NM_VPN_SERVICE_GET_PRIVATE (service)->connections;
381
nm_vpn_service_name_owner_changed (NMDBusManager *mgr,
387
NMVPNService *service = NM_VPN_SERVICE (user_data);
388
NMVPNServicePrivate *priv = NM_VPN_SERVICE_GET_PRIVATE (service);
389
gboolean old_owner_good;
390
gboolean new_owner_good;
393
if (strcmp (name, priv->dbus_service))
396
/* Service changed, no need to wait for the timeout any longer */
397
if (priv->start_timeout) {
398
g_source_remove (priv->start_timeout);
399
priv->start_timeout = 0;
402
old_owner_good = (old && (strlen (old) > 0));
403
new_owner_good = (new && (strlen (new) > 0));
405
if (!old_owner_good && new_owner_good) {
406
/* service just appeared */
407
nm_log_info (LOGD_VPN, "VPN service '%s' appeared; activating connections", priv->name);
408
clear_quit_timeout (service);
410
for (iter = priv->connections; iter; iter = iter->next)
411
nm_vpn_connection_activate (NM_VPN_CONNECTION (iter->data));
412
} else if (old_owner_good && !new_owner_good) {
413
/* service went away */
414
nm_log_info (LOGD_VPN, "VPN service '%s' disappeared", priv->name);
415
nm_vpn_service_connections_stop (service, TRUE, NM_VPN_CONNECTION_STATE_REASON_SERVICE_STOPPED);
419
/******************************************************************************/
422
nm_vpn_service_init (NMVPNService *self)
424
NMVPNServicePrivate *priv = NM_VPN_SERVICE_GET_PRIVATE (self);
426
priv->dbus_mgr = nm_dbus_manager_get ();
427
priv->name_owner_id = g_signal_connect (priv->dbus_mgr,
428
NM_DBUS_MANAGER_NAME_OWNER_CHANGED,
429
G_CALLBACK (nm_vpn_service_name_owner_changed),
434
dispose (GObject *object)
436
NMVPNService *self = NM_VPN_SERVICE (object);
437
NMVPNServicePrivate *priv = NM_VPN_SERVICE_GET_PRIVATE (self);
441
priv->disposed = TRUE;
443
if (priv->start_timeout)
444
g_source_remove (priv->start_timeout);
446
nm_vpn_service_connections_stop (NM_VPN_SERVICE (object),
448
NM_VPN_CONNECTION_STATE_REASON_SERVICE_STOPPED);
450
g_signal_handler_disconnect (priv->dbus_mgr, priv->name_owner_id);
452
if (priv->child_watch)
453
g_source_remove (priv->child_watch);
455
clear_quit_timeout (self);
458
g_object_unref (priv->dbus_mgr);
461
g_free (priv->dbus_service);
462
g_free (priv->program);
463
g_free (priv->namefile);
466
G_OBJECT_CLASS (nm_vpn_service_parent_class)->dispose (object);
470
nm_vpn_service_class_init (NMVPNServiceClass *service_class)
472
GObjectClass *object_class = G_OBJECT_CLASS (service_class);
474
g_type_class_add_private (service_class, sizeof (NMVPNServicePrivate));
476
/* virtual methods */
477
object_class->dispose = dispose;