blob: 24d194a585e5c0dc9a77aa0a04989ca496010eb3 [file] [log] [blame]
// Copyright (c) 2012 The Chromium Authors. All rights reserved.
// Use of this source code is governed by a BSD-style license that can be
// found in the LICENSE file.
#include "chromeos/network/network_state.h"
#include "base/strings/stringprintf.h"
#include "chromeos/network/network_event_log.h"
#include "chromeos/network/network_profile_handler.h"
#include "chromeos/network/network_util.h"
#include "chromeos/network/onc/onc_utils.h"
#include "chromeos/network/shill_property_util.h"
#include "third_party/cros_system_api/dbus/service_constants.h"
namespace {
const char kErrorUnknown[] = "Unknown";
bool ConvertListValueToStringVector(const base::ListValue& string_list,
std::vector<std::string>* result) {
for (size_t i = 0; i < string_list.GetSize(); ++i) {
std::string str;
if (!string_list.GetString(i, &str))
return false;
result->push_back(str);
}
return true;
}
bool IsCaCertNssSet(const base::DictionaryValue& properties) {
std::string ca_cert_nss;
if (properties.GetStringWithoutPathExpansion(flimflam::kEapCaCertNssProperty,
&ca_cert_nss) &&
!ca_cert_nss.empty()) {
return true;
}
const base::DictionaryValue* provider = NULL;
properties.GetDictionaryWithoutPathExpansion(flimflam::kProviderProperty,
&provider);
if (!provider)
return false;
if (provider->GetStringWithoutPathExpansion(
flimflam::kL2tpIpsecCaCertNssProperty, &ca_cert_nss) &&
!ca_cert_nss.empty()) {
return true;
}
if (provider->GetStringWithoutPathExpansion(
flimflam::kOpenVPNCaCertNSSProperty, &ca_cert_nss) &&
!ca_cert_nss.empty()) {
return true;
}
return false;
}
} // namespace
namespace chromeos {
NetworkState::NetworkState(const std::string& path)
: ManagedState(MANAGED_TYPE_NETWORK, path),
connectable_(false),
prefix_length_(0),
signal_strength_(0),
activate_over_non_cellular_networks_(false),
cellular_out_of_credits_(false),
has_ca_cert_nss_(false) {
}
NetworkState::~NetworkState() {
}
bool NetworkState::PropertyChanged(const std::string& key,
const base::Value& value) {
// Keep care that these properties are the same as in |GetProperties|.
if (ManagedStatePropertyChanged(key, value))
return true;
if (key == flimflam::kSignalStrengthProperty) {
return GetIntegerValue(key, value, &signal_strength_);
} else if (key == flimflam::kStateProperty) {
return GetStringValue(key, value, &connection_state_);
} else if (key == flimflam::kConnectableProperty) {
return GetBooleanValue(key, value, &connectable_);
} else if (key == flimflam::kErrorProperty) {
if (!GetStringValue(key, value, &error_))
return false;
// Shill uses "Unknown" to indicate an unset error state.
if (error_ == kErrorUnknown)
error_.clear();
return true;
} else if (key == IPConfigProperty(flimflam::kAddressProperty)) {
return GetStringValue(key, value, &ip_address_);
} else if (key == IPConfigProperty(flimflam::kGatewayProperty)) {
return GetStringValue(key, value, &gateway_);
} else if (key == IPConfigProperty(flimflam::kNameServersProperty)) {
const base::ListValue* dns_servers;
if (!value.GetAsList(&dns_servers))
return false;
dns_servers_.clear();
ConvertListValueToStringVector(*dns_servers, &dns_servers_);
return true;
} else if (key == IPConfigProperty(flimflam::kPrefixlenProperty)) {
return GetIntegerValue(key, value, &prefix_length_);
} else if (key == IPConfigProperty(
shill::kWebProxyAutoDiscoveryUrlProperty)) {
std::string url_string;
if (!GetStringValue(key, value, &url_string))
return false;
if (url_string.empty()) {
web_proxy_auto_discovery_url_ = GURL();
} else {
GURL gurl(url_string);
if (!gurl.is_valid()) {
web_proxy_auto_discovery_url_ = gurl;
} else {
NET_LOG_ERROR("Invalid WebProxyAutoDiscoveryUrl: " + url_string,
path());
web_proxy_auto_discovery_url_ = GURL();
}
}
return true;
} else if (key == flimflam::kActivationStateProperty) {
return GetStringValue(key, value, &activation_state_);
} else if (key == flimflam::kRoamingStateProperty) {
return GetStringValue(key, value, &roaming_);
} else if (key == flimflam::kSecurityProperty) {
return GetStringValue(key, value, &security_);
} else if (key == flimflam::kProxyConfigProperty) {
std::string proxy_config_str;
if (!value.GetAsString(&proxy_config_str)) {
NET_LOG_ERROR("Failed to parse " + key, path());
return false;
}
proxy_config_.Clear();
if (proxy_config_str.empty())
return true;
scoped_ptr<base::DictionaryValue> proxy_config_dict(
onc::ReadDictionaryFromJson(proxy_config_str));
if (proxy_config_dict) {
// Warning: The DictionaryValue returned from
// ReadDictionaryFromJson/JSONParser is an optimized derived class that
// doesn't allow releasing ownership of nested values. A Swap in the wrong
// order leads to memory access errors.
proxy_config_.MergeDictionary(proxy_config_dict.get());
} else {
NET_LOG_ERROR("Failed to parse " + key, path());
}
return true;
} else if (key == flimflam::kUIDataProperty) {
scoped_ptr<NetworkUIData> new_ui_data =
shill_property_util::GetUIDataFromValue(value);
if (!new_ui_data) {
NET_LOG_ERROR("Failed to parse " + key, path());
return false;
}
ui_data_ = *new_ui_data;
return true;
} else if (key == flimflam::kNetworkTechnologyProperty) {
return GetStringValue(key, value, &network_technology_);
} else if (key == flimflam::kDeviceProperty) {
return GetStringValue(key, value, &device_path_);
} else if (key == flimflam::kGuidProperty) {
return GetStringValue(key, value, &guid_);
} else if (key == flimflam::kProfileProperty) {
return GetStringValue(key, value, &profile_path_);
} else if (key == shill::kActivateOverNonCellularNetworkProperty) {
return GetBooleanValue(key, value, &activate_over_non_cellular_networks_);
} else if (key == shill::kOutOfCreditsProperty) {
return GetBooleanValue(key, value, &cellular_out_of_credits_);
}
return false;
}
bool NetworkState::InitialPropertiesReceived(
const base::DictionaryValue& properties) {
NET_LOG_DEBUG("InitialPropertiesReceived", path());
bool changed = UpdateName(properties);
bool had_ca_cert_nss = has_ca_cert_nss_;
has_ca_cert_nss_ = IsCaCertNssSet(properties);
changed |= had_ca_cert_nss != has_ca_cert_nss_;
return changed;
}
void NetworkState::GetProperties(base::DictionaryValue* dictionary) const {
// Keep care that these properties are the same as in |PropertyChanged|.
dictionary->SetStringWithoutPathExpansion(flimflam::kNameProperty, name());
dictionary->SetStringWithoutPathExpansion(flimflam::kTypeProperty, type());
dictionary->SetIntegerWithoutPathExpansion(flimflam::kSignalStrengthProperty,
signal_strength_);
dictionary->SetStringWithoutPathExpansion(flimflam::kStateProperty,
connection_state_);
dictionary->SetBooleanWithoutPathExpansion(flimflam::kConnectableProperty,
connectable_);
dictionary->SetStringWithoutPathExpansion(flimflam::kErrorProperty,
error_);
// IPConfig properties
base::DictionaryValue* ipconfig_properties = new base::DictionaryValue;
ipconfig_properties->SetStringWithoutPathExpansion(flimflam::kAddressProperty,
ip_address_);
ipconfig_properties->SetStringWithoutPathExpansion(flimflam::kGatewayProperty,
gateway_);
base::ListValue* name_servers = new base::ListValue;
name_servers->AppendStrings(dns_servers_);
ipconfig_properties->SetWithoutPathExpansion(flimflam::kNameServersProperty,
name_servers);
ipconfig_properties->SetStringWithoutPathExpansion(
shill::kWebProxyAutoDiscoveryUrlProperty,
web_proxy_auto_discovery_url_.spec());
dictionary->SetWithoutPathExpansion(shill::kIPConfigProperty,
ipconfig_properties);
dictionary->SetStringWithoutPathExpansion(flimflam::kActivationStateProperty,
activation_state_);
dictionary->SetStringWithoutPathExpansion(flimflam::kRoamingStateProperty,
roaming_);
dictionary->SetStringWithoutPathExpansion(flimflam::kSecurityProperty,
security_);
// Proxy config and ONC source are intentionally omitted: These properties are
// placed in NetworkState to transition ProxyConfigServiceImpl from
// NetworkLibrary to the new network stack. The networking extension API
// shouldn't depend on this member. Once ManagedNetworkConfigurationHandler
// is used instead of NetworkLibrary, we can remove them again.
dictionary->SetStringWithoutPathExpansion(
flimflam::kNetworkTechnologyProperty,
network_technology_);
dictionary->SetStringWithoutPathExpansion(flimflam::kDeviceProperty,
device_path_);
dictionary->SetStringWithoutPathExpansion(flimflam::kGuidProperty, guid_);
dictionary->SetStringWithoutPathExpansion(flimflam::kProfileProperty,
profile_path_);
dictionary->SetBooleanWithoutPathExpansion(
shill::kActivateOverNonCellularNetworkProperty,
activate_over_non_cellular_networks_);
dictionary->SetBooleanWithoutPathExpansion(shill::kOutOfCreditsProperty,
cellular_out_of_credits_);
}
bool NetworkState::RequiresActivation() const {
return (type() == flimflam::kTypeCellular &&
activation_state() != flimflam::kActivationStateActivated &&
activation_state() != flimflam::kActivationStateUnknown);
}
bool NetworkState::IsConnectedState() const {
return StateIsConnected(connection_state_);
}
bool NetworkState::IsConnectingState() const {
return StateIsConnecting(connection_state_);
}
bool NetworkState::IsManaged() const {
return ui_data_.onc_source() == onc::ONC_SOURCE_DEVICE_POLICY ||
ui_data_.onc_source() == onc::ONC_SOURCE_USER_POLICY;
}
bool NetworkState::IsPrivate() const {
return !profile_path_.empty() &&
profile_path_ != NetworkProfileHandler::kSharedProfilePath;
}
std::string NetworkState::GetDnsServersAsString() const {
std::string result;
for (size_t i = 0; i < dns_servers_.size(); ++i) {
if (i != 0)
result += ",";
result += dns_servers_[i];
}
return result;
}
std::string NetworkState::GetNetmask() const {
return network_util::PrefixLengthToNetmask(prefix_length_);
}
bool NetworkState::UpdateName(const base::DictionaryValue& properties) {
std::string updated_name =
shill_property_util::GetNameFromProperties(path(), properties);
if (updated_name != name()) {
set_name(updated_name);
return true;
}
return false;
}
// static
bool NetworkState::StateIsConnected(const std::string& connection_state) {
return (connection_state == flimflam::kStateReady ||
connection_state == flimflam::kStateOnline ||
connection_state == flimflam::kStatePortal);
}
// static
bool NetworkState::StateIsConnecting(const std::string& connection_state) {
return (connection_state == flimflam::kStateAssociation ||
connection_state == flimflam::kStateConfiguration ||
connection_state == flimflam::kStateCarrier);
}
// static
std::string NetworkState::IPConfigProperty(const char* key) {
return base::StringPrintf("%s.%s", shill::kIPConfigProperty, key);
}
} // namespace chromeos