netifd: fix resource leak on error in netifd_add_dynamic()
[project/netifd.git] / proto-shell.c
1 /*
2 * netifd - network interface daemon
3 * Copyright (C) 2012 Felix Fietkau <nbd@openwrt.org>
4 *
5 * This program is free software; you can redistribute it and/or modify
6 * it under the terms of the GNU General Public License version 2
7 * as published by the Free Software Foundation
8 *
9 * This program is distributed in the hope that it will be useful,
10 * but WITHOUT ANY WARRANTY; without even the implied warranty of
11 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
12 * GNU General Public License for more details.
13 */
14 #define _GNU_SOURCE
15
16 #include <string.h>
17 #include <stdlib.h>
18 #include <stdio.h>
19 #include <signal.h>
20
21 #include <arpa/inet.h>
22 #include <netinet/in.h>
23
24
25 #include "netifd.h"
26 #include "interface.h"
27 #include "interface-ip.h"
28 #include "proto.h"
29 #include "system.h"
30 #include "handler.h"
31
32 static int proto_fd = -1;
33
34 enum proto_shell_sm {
35 S_IDLE,
36 S_SETUP,
37 S_SETUP_ABORT,
38 S_TEARDOWN,
39 };
40
41 struct proto_shell_handler {
42 struct list_head list;
43 struct proto_handler proto;
44 char *config_buf;
45 char *script_name;
46 bool init_available;
47
48 struct uci_blob_param_list config;
49 };
50
51 struct proto_shell_dependency {
52 struct list_head list;
53
54 struct proto_shell_state *proto;
55 struct interface_user dep;
56
57 union if_addr host;
58 bool v6;
59 bool any;
60
61 char interface[];
62 };
63
64 struct proto_shell_state {
65 struct interface_proto_state proto;
66 struct proto_shell_handler *handler;
67 struct blob_attr *config;
68
69 struct uloop_timeout teardown_timeout;
70
71 /*
72 * Teardown and setup interface again if it is still not up (IFS_UP)
73 * after checkup_interval seconds since previous attempt. This check
74 * will be disabled when the config option "checkup_interval" is
75 * missing or has a negative value
76 */
77 int checkup_interval;
78 struct uloop_timeout checkup_timeout;
79
80 struct netifd_process script_task;
81 struct netifd_process proto_task;
82
83 enum proto_shell_sm sm;
84 bool proto_task_killed;
85 bool renew_pending;
86
87 int last_error;
88
89 struct list_head deps;
90 };
91
92 static void
93 proto_shell_check_dependencies(struct proto_shell_state *state)
94 {
95 struct proto_shell_dependency *dep;
96 bool available = true;
97
98 list_for_each_entry(dep, &state->deps, list) {
99 if (dep->dep.iface)
100 continue;
101
102 available = false;
103 break;
104 }
105
106 interface_set_available(state->proto.iface, available);
107 }
108
109 static void
110 proto_shell_if_up_cb(struct interface_user *dep, struct interface *iface,
111 enum interface_event ev);
112 static void
113 proto_shell_if_down_cb(struct interface_user *dep, struct interface *iface,
114 enum interface_event ev);
115
116 static void
117 proto_shell_update_host_dep(struct proto_shell_dependency *dep)
118 {
119 struct interface *iface = NULL;
120
121 if (dep->dep.iface)
122 goto out;
123
124 if (dep->interface[0]) {
125 iface = vlist_find(&interfaces, dep->interface, iface, node);
126
127 if (!iface || iface->state != IFS_UP)
128 goto out;
129 }
130
131 if (!dep->any)
132 iface = interface_ip_add_target_route(&dep->host, dep->v6, iface);
133
134 if (!iface)
135 goto out;
136
137 interface_remove_user(&dep->dep);
138 dep->dep.cb = proto_shell_if_down_cb;
139 interface_add_user(&dep->dep, iface);
140
141 out:
142 proto_shell_check_dependencies(dep->proto);
143 }
144
145 static void
146 proto_shell_clear_host_dep(struct proto_shell_state *state)
147 {
148 struct proto_shell_dependency *dep, *tmp;
149
150 list_for_each_entry_safe(dep, tmp, &state->deps, list) {
151 interface_remove_user(&dep->dep);
152 list_del(&dep->list);
153 free(dep);
154 }
155 }
156
157 static int
158 proto_shell_handler(struct interface_proto_state *proto,
159 enum interface_proto_cmd cmd, bool force)
160 {
161 struct proto_shell_state *state;
162 struct proto_shell_handler *handler;
163 struct netifd_process *proc;
164 static char error_buf[32];
165 const char *argv[7];
166 char *envp[2];
167 const char *action;
168 char *config;
169 int ret, i = 0, j = 0;
170
171 state = container_of(proto, struct proto_shell_state, proto);
172 handler = state->handler;
173 proc = &state->script_task;
174
175 if (cmd == PROTO_CMD_SETUP) {
176 switch (state->sm) {
177 case S_IDLE:
178 action = "setup";
179 state->last_error = -1;
180 proto_shell_clear_host_dep(state);
181 state->sm = S_SETUP;
182 break;
183
184 case S_SETUP_ABORT:
185 case S_TEARDOWN:
186 case S_SETUP:
187 return 0;
188
189 default:
190 return -1;
191 }
192 } else if (cmd == PROTO_CMD_RENEW) {
193 if (!(handler->proto.flags & PROTO_FLAG_RENEW_AVAILABLE))
194 return 0;
195
196 if (state->script_task.uloop.pending) {
197 state->renew_pending = true;
198 return 0;
199 }
200
201 state->renew_pending = false;
202 action = "renew";
203 } else {
204 switch (state->sm) {
205 case S_SETUP:
206 if (state->script_task.uloop.pending) {
207 uloop_timeout_set(&state->teardown_timeout, 1000);
208 kill(state->script_task.uloop.pid, SIGTERM);
209 if (state->proto_task.uloop.pending)
210 kill(state->proto_task.uloop.pid, SIGTERM);
211 state->renew_pending = false;
212 state->sm = S_SETUP_ABORT;
213 return 0;
214 }
215 /* if no script task is running */
216 /* fall through */
217 case S_IDLE:
218 action = "teardown";
219 state->renew_pending = false;
220 state->sm = S_TEARDOWN;
221 if (state->last_error >= 0) {
222 snprintf(error_buf, sizeof(error_buf), "ERROR=%d", state->last_error);
223 envp[j++] = error_buf;
224 }
225 uloop_timeout_set(&state->teardown_timeout, 5000);
226 break;
227
228 case S_TEARDOWN:
229 return 0;
230
231 default:
232 return -1;
233 }
234 }
235
236 D(INTERFACE, "run %s for interface '%s'\n", action, proto->iface->name);
237 config = blobmsg_format_json(state->config, true);
238 if (!config)
239 return -1;
240
241 argv[i++] = handler->script_name;
242 argv[i++] = handler->proto.name;
243 argv[i++] = action;
244 argv[i++] = proto->iface->name;
245 argv[i++] = config;
246 if (proto->iface->main_dev.dev)
247 argv[i++] = proto->iface->main_dev.dev->ifname;
248 argv[i] = NULL;
249 envp[j] = NULL;
250
251 ret = netifd_start_process(argv, envp, proc);
252 free(config);
253
254 return ret;
255 }
256
257 static void
258 proto_shell_if_up_cb(struct interface_user *dep, struct interface *iface,
259 enum interface_event ev)
260 {
261 struct proto_shell_dependency *pdep;
262
263 if (ev != IFEV_UP && ev != IFEV_UPDATE)
264 return;
265
266 pdep = container_of(dep, struct proto_shell_dependency, dep);
267 proto_shell_update_host_dep(pdep);
268 }
269
270 static void
271 proto_shell_if_down_cb(struct interface_user *dep, struct interface *iface,
272 enum interface_event ev)
273 {
274 struct proto_shell_dependency *pdep;
275 struct proto_shell_state *state;
276
277 if (ev == IFEV_UP || ev == IFEV_UPDATE)
278 return;
279
280 pdep = container_of(dep, struct proto_shell_dependency, dep);
281 interface_remove_user(dep);
282 dep->cb = proto_shell_if_up_cb;
283 interface_add_user(dep, NULL);
284
285 state = pdep->proto;
286 if (state->sm == S_IDLE) {
287 state->proto.proto_event(&state->proto, IFPEV_LINK_LOST);
288 proto_shell_handler(&state->proto, PROTO_CMD_TEARDOWN, false);
289 }
290 }
291
292 static void
293 proto_shell_task_finish(struct proto_shell_state *state,
294 struct netifd_process *task)
295 {
296 switch (state->sm) {
297 case S_IDLE:
298 if (task == &state->proto_task)
299 state->proto.proto_event(&state->proto, IFPEV_LINK_LOST);
300 /* fall through */
301 case S_SETUP:
302 if (task == &state->proto_task)
303 proto_shell_handler(&state->proto, PROTO_CMD_TEARDOWN,
304 false);
305 else if (task == &state->script_task) {
306 if (state->renew_pending)
307 proto_shell_handler(&state->proto,
308 PROTO_CMD_RENEW, false);
309 else if (!(state->handler->proto.flags & PROTO_FLAG_NO_TASK) &&
310 !state->proto_task.uloop.pending &&
311 state->sm == S_SETUP)
312 proto_shell_handler(&state->proto,
313 PROTO_CMD_TEARDOWN,
314 false);
315
316 /* check up status after setup attempt by this script_task */
317 if (state->sm == S_SETUP && state->checkup_interval > 0) {
318 uloop_timeout_set(&state->checkup_timeout,
319 state->checkup_interval * 1000);
320 }
321 }
322 break;
323
324 case S_SETUP_ABORT:
325 if (state->script_task.uloop.pending ||
326 state->proto_task.uloop.pending)
327 break;
328
329 /* completed aborting all tasks, now idle */
330 uloop_timeout_cancel(&state->teardown_timeout);
331 uloop_timeout_cancel(&state->checkup_timeout);
332 state->sm = S_IDLE;
333 proto_shell_handler(&state->proto, PROTO_CMD_TEARDOWN, false);
334 break;
335
336 case S_TEARDOWN:
337 if (state->script_task.uloop.pending)
338 break;
339
340 if (state->proto_task.uloop.pending) {
341 if (!state->proto_task_killed)
342 kill(state->proto_task.uloop.pid, SIGTERM);
343 break;
344 }
345
346 /* completed tearing down all tasks, now idle */
347 uloop_timeout_cancel(&state->teardown_timeout);
348 uloop_timeout_cancel(&state->checkup_timeout);
349 state->sm = S_IDLE;
350 state->proto.proto_event(&state->proto, IFPEV_DOWN);
351 break;
352 }
353 }
354
355 static void
356 proto_shell_teardown_timeout_cb(struct uloop_timeout *timeout)
357 {
358 struct proto_shell_state *state;
359
360 state = container_of(timeout, struct proto_shell_state, teardown_timeout);
361
362 netifd_kill_process(&state->script_task);
363 netifd_kill_process(&state->proto_task);
364 proto_shell_task_finish(state, NULL);
365 }
366
367 static void
368 proto_shell_script_cb(struct netifd_process *p, int ret)
369 {
370 struct proto_shell_state *state;
371
372 state = container_of(p, struct proto_shell_state, script_task);
373 proto_shell_task_finish(state, p);
374 }
375
376 static void
377 proto_shell_task_cb(struct netifd_process *p, int ret)
378 {
379 struct proto_shell_state *state;
380
381 state = container_of(p, struct proto_shell_state, proto_task);
382
383 if (state->sm == S_IDLE || state->sm == S_SETUP)
384 state->last_error = WEXITSTATUS(ret);
385
386 proto_shell_task_finish(state, p);
387 }
388
389 static void
390 proto_shell_free(struct interface_proto_state *proto)
391 {
392 struct proto_shell_state *state;
393
394 state = container_of(proto, struct proto_shell_state, proto);
395 uloop_timeout_cancel(&state->teardown_timeout);
396 uloop_timeout_cancel(&state->checkup_timeout);
397 proto_shell_clear_host_dep(state);
398 netifd_kill_process(&state->script_task);
399 netifd_kill_process(&state->proto_task);
400 free(state->config);
401 free(state);
402 }
403
404 static void
405 proto_shell_parse_route_list(struct interface *iface, struct blob_attr *attr,
406 bool v6)
407 {
408 struct blob_attr *cur;
409 int rem;
410
411 blobmsg_for_each_attr(cur, attr, rem) {
412 if (blobmsg_type(cur) != BLOBMSG_TYPE_TABLE) {
413 DPRINTF("Ignore wrong route type: %d\n", blobmsg_type(cur));
414 continue;
415 }
416
417 interface_ip_add_route(iface, cur, v6);
418 }
419 }
420
421 static void
422 proto_shell_parse_data(struct interface *iface, struct blob_attr *attr)
423 {
424 struct blob_attr *cur;
425 int rem;
426
427 blobmsg_for_each_attr(cur, attr, rem)
428 interface_add_data(iface, cur);
429 }
430
431 static struct device *
432 proto_shell_create_tunnel(const char *name, struct blob_attr *attr)
433 {
434 struct device *dev;
435 struct blob_buf b;
436
437 memset(&b, 0, sizeof(b));
438 blob_buf_init(&b, 0);
439 blob_put(&b, 0, blobmsg_data(attr), blobmsg_data_len(attr));
440 dev = device_create(name, &tunnel_device_type, blob_data(b.head));
441 blob_buf_free(&b);
442
443 return dev;
444 }
445
446 enum {
447 NOTIFY_ACTION,
448 NOTIFY_ERROR,
449 NOTIFY_COMMAND,
450 NOTIFY_ENV,
451 NOTIFY_SIGNAL,
452 NOTIFY_AVAILABLE,
453 NOTIFY_LINK_UP,
454 NOTIFY_IFNAME,
455 NOTIFY_ADDR_EXT,
456 NOTIFY_ROUTES,
457 NOTIFY_ROUTES6,
458 NOTIFY_TUNNEL,
459 NOTIFY_DATA,
460 NOTIFY_KEEP,
461 NOTIFY_HOST,
462 NOTIFY_DNS,
463 NOTIFY_DNS_SEARCH,
464 __NOTIFY_LAST
465 };
466
467 static const struct blobmsg_policy notify_attr[__NOTIFY_LAST] = {
468 [NOTIFY_ACTION] = { .name = "action", .type = BLOBMSG_TYPE_INT32 },
469 [NOTIFY_ERROR] = { .name = "error", .type = BLOBMSG_TYPE_ARRAY },
470 [NOTIFY_COMMAND] = { .name = "command", .type = BLOBMSG_TYPE_ARRAY },
471 [NOTIFY_ENV] = { .name = "env", .type = BLOBMSG_TYPE_ARRAY },
472 [NOTIFY_SIGNAL] = { .name = "signal", .type = BLOBMSG_TYPE_INT32 },
473 [NOTIFY_AVAILABLE] = { .name = "available", .type = BLOBMSG_TYPE_BOOL },
474 [NOTIFY_LINK_UP] = { .name = "link-up", .type = BLOBMSG_TYPE_BOOL },
475 [NOTIFY_IFNAME] = { .name = "ifname", .type = BLOBMSG_TYPE_STRING },
476 [NOTIFY_ADDR_EXT] = { .name = "address-external", .type = BLOBMSG_TYPE_BOOL },
477 [NOTIFY_ROUTES] = { .name = "routes", .type = BLOBMSG_TYPE_ARRAY },
478 [NOTIFY_ROUTES6] = { .name = "routes6", .type = BLOBMSG_TYPE_ARRAY },
479 [NOTIFY_TUNNEL] = { .name = "tunnel", .type = BLOBMSG_TYPE_TABLE },
480 [NOTIFY_DATA] = { .name = "data", .type = BLOBMSG_TYPE_TABLE },
481 [NOTIFY_KEEP] = { .name = "keep", .type = BLOBMSG_TYPE_BOOL },
482 [NOTIFY_HOST] = { .name = "host", .type = BLOBMSG_TYPE_STRING },
483 [NOTIFY_DNS] = { .name = "dns", .type = BLOBMSG_TYPE_ARRAY },
484 [NOTIFY_DNS_SEARCH] = { .name = "dns_search", .type = BLOBMSG_TYPE_ARRAY },
485 };
486
487 static int
488 proto_shell_update_link(struct proto_shell_state *state, struct blob_attr *data, struct blob_attr **tb)
489 {
490 struct interface *iface = state->proto.iface;
491 struct blob_attr *cur;
492 struct device *dev;
493 const char *devname;
494 int dev_create = 1;
495 bool addr_ext = false;
496 bool keep = false;
497 bool up;
498
499 if (state->sm == S_TEARDOWN || state->sm == S_SETUP_ABORT)
500 return UBUS_STATUS_PERMISSION_DENIED;
501
502 if (!tb[NOTIFY_LINK_UP])
503 return UBUS_STATUS_INVALID_ARGUMENT;
504
505 up = blobmsg_get_bool(tb[NOTIFY_LINK_UP]);
506 if (!up) {
507 state->proto.proto_event(&state->proto, IFPEV_LINK_LOST);
508 return 0;
509 }
510
511 if ((cur = tb[NOTIFY_KEEP]) != NULL)
512 keep = blobmsg_get_bool(cur);
513
514 if ((cur = tb[NOTIFY_ADDR_EXT]) != NULL) {
515 addr_ext = blobmsg_get_bool(cur);
516 if (addr_ext)
517 dev_create = 2;
518 }
519
520 if (iface->state != IFS_UP || !iface->l3_dev.dev)
521 keep = false;
522
523 if (!keep) {
524 dev = iface->main_dev.dev;
525 if (tb[NOTIFY_IFNAME]) {
526 keep = false;
527 devname = blobmsg_data(tb[NOTIFY_IFNAME]);
528 if (tb[NOTIFY_TUNNEL])
529 dev = proto_shell_create_tunnel(devname, tb[NOTIFY_TUNNEL]);
530 else
531 dev = device_get(devname, dev_create);
532 }
533
534 if (!dev)
535 return UBUS_STATUS_INVALID_ARGUMENT;
536
537 interface_set_l3_dev(iface, dev);
538 if (device_claim(&iface->l3_dev) < 0)
539 return UBUS_STATUS_UNKNOWN_ERROR;
540
541 device_set_present(dev, true);
542 }
543
544 interface_update_start(iface, keep);
545
546 proto_apply_ip_settings(iface, data, addr_ext);
547
548 if ((cur = tb[NOTIFY_ROUTES]) != NULL)
549 proto_shell_parse_route_list(state->proto.iface, cur, false);
550
551 if ((cur = tb[NOTIFY_ROUTES6]) != NULL)
552 proto_shell_parse_route_list(state->proto.iface, cur, true);
553
554 if ((cur = tb[NOTIFY_DNS]))
555 interface_add_dns_server_list(&iface->proto_ip, cur);
556
557 if ((cur = tb[NOTIFY_DNS_SEARCH]))
558 interface_add_dns_search_list(&iface->proto_ip, cur);
559
560 if ((cur = tb[NOTIFY_DATA]))
561 proto_shell_parse_data(state->proto.iface, cur);
562
563 interface_update_complete(state->proto.iface);
564
565 if ((state->sm != S_SETUP_ABORT) && (state->sm != S_TEARDOWN)) {
566 state->proto.proto_event(&state->proto, IFPEV_UP);
567 state->sm = S_IDLE;
568 }
569
570 return 0;
571 }
572
573 static bool
574 fill_string_list(struct blob_attr *attr, char **argv, int max)
575 {
576 struct blob_attr *cur;
577 int argc = 0;
578 int rem;
579
580 if (!attr)
581 goto out;
582
583 blobmsg_for_each_attr(cur, attr, rem) {
584 if (blobmsg_type(cur) != BLOBMSG_TYPE_STRING)
585 return false;
586
587 if (!blobmsg_check_attr(cur, NULL))
588 return false;
589
590 argv[argc++] = blobmsg_data(cur);
591 if (argc == max - 1)
592 return false;
593 }
594
595 out:
596 argv[argc] = NULL;
597 return true;
598 }
599
600 static int
601 proto_shell_run_command(struct proto_shell_state *state, struct blob_attr **tb)
602 {
603 static char *argv[64];
604 static char *env[32];
605
606 if (state->sm == S_TEARDOWN || state->sm == S_SETUP_ABORT)
607 return UBUS_STATUS_PERMISSION_DENIED;
608
609 if (!tb[NOTIFY_COMMAND])
610 goto error;
611
612 if (!fill_string_list(tb[NOTIFY_COMMAND], argv, ARRAY_SIZE(argv)))
613 goto error;
614
615 if (!fill_string_list(tb[NOTIFY_ENV], env, ARRAY_SIZE(env)))
616 goto error;
617
618 netifd_start_process((const char **) argv, (char **) env, &state->proto_task);
619
620 return 0;
621
622 error:
623 return UBUS_STATUS_INVALID_ARGUMENT;
624 }
625
626 static int
627 proto_shell_kill_command(struct proto_shell_state *state, struct blob_attr **tb)
628 {
629 unsigned int signal = ~0;
630
631 if (tb[NOTIFY_SIGNAL])
632 signal = blobmsg_get_u32(tb[NOTIFY_SIGNAL]);
633
634 if (signal > 31)
635 signal = SIGTERM;
636
637 if (state->proto_task.uloop.pending) {
638 if (signal == SIGTERM || signal == SIGKILL)
639 state->proto_task_killed = true;
640 kill(state->proto_task.uloop.pid, signal);
641 }
642
643 return 0;
644 }
645
646 static int
647 proto_shell_notify_error(struct proto_shell_state *state, struct blob_attr **tb)
648 {
649 struct blob_attr *cur;
650 char *data[16];
651 int n_data = 0;
652 int rem;
653
654 if (!tb[NOTIFY_ERROR])
655 return UBUS_STATUS_INVALID_ARGUMENT;
656
657 blobmsg_for_each_attr(cur, tb[NOTIFY_ERROR], rem) {
658 if (n_data + 1 == ARRAY_SIZE(data))
659 goto error;
660
661 if (blobmsg_type(cur) != BLOBMSG_TYPE_STRING)
662 goto error;
663
664 if (!blobmsg_check_attr(cur, NULL))
665 goto error;
666
667 data[n_data++] = blobmsg_data(cur);
668 }
669
670 if (!n_data)
671 goto error;
672
673 interface_add_error(state->proto.iface, state->handler->proto.name,
674 data[0], (const char **) &data[1], n_data - 1);
675
676 return 0;
677
678 error:
679 return UBUS_STATUS_INVALID_ARGUMENT;
680 }
681
682 static int
683 proto_shell_block_restart(struct proto_shell_state *state, struct blob_attr **tb)
684 {
685 state->proto.iface->autostart = false;
686 return 0;
687 }
688
689 static int
690 proto_shell_set_available(struct proto_shell_state *state, struct blob_attr **tb)
691 {
692 if (!tb[NOTIFY_AVAILABLE])
693 return UBUS_STATUS_INVALID_ARGUMENT;
694
695 interface_set_available(state->proto.iface, blobmsg_get_bool(tb[NOTIFY_AVAILABLE]));
696 return 0;
697 }
698
699 static int
700 proto_shell_add_host_dependency(struct proto_shell_state *state, struct blob_attr **tb)
701 {
702 struct proto_shell_dependency *dep;
703 const char *ifname = tb[NOTIFY_IFNAME] ? blobmsg_data(tb[NOTIFY_IFNAME]) : "";
704 const char *host = tb[NOTIFY_HOST] ? blobmsg_data(tb[NOTIFY_HOST]) : "";
705
706 if (state->sm == S_TEARDOWN || state->sm == S_SETUP_ABORT)
707 return UBUS_STATUS_PERMISSION_DENIED;
708
709 dep = calloc(1, sizeof(*dep) + strlen(ifname) + 1);
710 if (!dep)
711 return UBUS_STATUS_UNKNOWN_ERROR;
712
713 if (!host[0] && ifname[0]) {
714 dep->any = true;
715 } else if (inet_pton(AF_INET, host, &dep->host) < 1) {
716 if (inet_pton(AF_INET6, host, &dep->host) < 1) {
717 free(dep);
718 return UBUS_STATUS_INVALID_ARGUMENT;
719 } else {
720 dep->v6 = true;
721 }
722 }
723
724 dep->proto = state;
725 strcpy(dep->interface, ifname);
726
727 dep->dep.cb = proto_shell_if_up_cb;
728 interface_add_user(&dep->dep, NULL);
729 list_add(&dep->list, &state->deps);
730 proto_shell_update_host_dep(dep);
731 if (!dep->dep.iface)
732 return UBUS_STATUS_NOT_FOUND;
733
734 return 0;
735 }
736
737 static int
738 proto_shell_setup_failed(struct proto_shell_state *state)
739 {
740 int ret = 0;
741
742 switch (state->sm) {
743 case S_IDLE:
744 state->proto.proto_event(&state->proto, IFPEV_LINK_LOST);
745 /* fall through */
746 case S_SETUP:
747 proto_shell_handler(&state->proto, PROTO_CMD_TEARDOWN, false);
748 break;
749 case S_SETUP_ABORT:
750 case S_TEARDOWN:
751 default:
752 ret = UBUS_STATUS_PERMISSION_DENIED;
753 break;
754 }
755 return ret;
756 }
757
758 static int
759 proto_shell_notify(struct interface_proto_state *proto, struct blob_attr *attr)
760 {
761 struct proto_shell_state *state;
762 struct blob_attr *tb[__NOTIFY_LAST];
763
764 state = container_of(proto, struct proto_shell_state, proto);
765
766 blobmsg_parse(notify_attr, __NOTIFY_LAST, tb, blob_data(attr), blob_len(attr));
767 if (!tb[NOTIFY_ACTION])
768 return UBUS_STATUS_INVALID_ARGUMENT;
769
770 switch(blobmsg_get_u32(tb[NOTIFY_ACTION])) {
771 case 0:
772 return proto_shell_update_link(state, attr, tb);
773 case 1:
774 return proto_shell_run_command(state, tb);
775 case 2:
776 return proto_shell_kill_command(state, tb);
777 case 3:
778 return proto_shell_notify_error(state, tb);
779 case 4:
780 return proto_shell_block_restart(state, tb);
781 case 5:
782 return proto_shell_set_available(state, tb);
783 case 6:
784 return proto_shell_add_host_dependency(state, tb);
785 case 7:
786 return proto_shell_setup_failed(state);
787 default:
788 return UBUS_STATUS_INVALID_ARGUMENT;
789 }
790 }
791
792 static void
793 proto_shell_checkup_timeout_cb(struct uloop_timeout *timeout)
794 {
795 struct proto_shell_state *state = container_of(timeout, struct
796 proto_shell_state, checkup_timeout);
797 struct interface_proto_state *proto = &state->proto;
798 struct interface *iface = proto->iface;
799
800 if (!iface->autostart)
801 return;
802
803 if (iface->state == IFS_UP)
804 return;
805
806 D(INTERFACE, "Interface '%s' is not up after %d sec\n",
807 iface->name, state->checkup_interval);
808 proto_shell_handler(proto, PROTO_CMD_TEARDOWN, false);
809 }
810
811 static void
812 proto_shell_checkup_attach(struct proto_shell_state *state,
813 const struct blob_attr *attr)
814 {
815 struct blob_attr *tb;
816 struct blobmsg_policy checkup_policy = {
817 .name = "checkup_interval",
818 .type = BLOBMSG_TYPE_INT32
819 };
820
821 blobmsg_parse(&checkup_policy, 1, &tb, blob_data(attr), blob_len(attr));
822 if (!tb) {
823 state->checkup_interval = -1;
824 state->checkup_timeout.cb = NULL;
825 } else {
826 state->checkup_interval = blobmsg_get_u32(tb);
827 state->checkup_timeout.cb = proto_shell_checkup_timeout_cb;
828 }
829 }
830
831 static struct interface_proto_state *
832 proto_shell_attach(const struct proto_handler *h, struct interface *iface,
833 struct blob_attr *attr)
834 {
835 struct proto_shell_state *state;
836
837 state = calloc(1, sizeof(*state));
838 if (!state)
839 return NULL;
840
841 INIT_LIST_HEAD(&state->deps);
842
843 state->config = malloc(blob_pad_len(attr));
844 if (!state->config)
845 goto error;
846
847 memcpy(state->config, attr, blob_pad_len(attr));
848 proto_shell_checkup_attach(state, state->config);
849 state->proto.free = proto_shell_free;
850 state->proto.notify = proto_shell_notify;
851 state->proto.cb = proto_shell_handler;
852 state->teardown_timeout.cb = proto_shell_teardown_timeout_cb;
853 state->script_task.cb = proto_shell_script_cb;
854 state->script_task.dir_fd = proto_fd;
855 state->script_task.log_prefix = iface->name;
856 state->proto_task.cb = proto_shell_task_cb;
857 state->proto_task.dir_fd = proto_fd;
858 state->proto_task.log_prefix = iface->name;
859 state->handler = container_of(h, struct proto_shell_handler, proto);
860
861 return &state->proto;
862
863 error:
864 free(state);
865 return NULL;
866 }
867
868 static void
869 proto_shell_add_handler(const char *script, const char *name, json_object *obj)
870 {
871 struct proto_shell_handler *handler;
872 struct proto_handler *proto;
873 json_object *config, *tmp;
874 char *proto_name, *script_name;
875
876 handler = calloc_a(sizeof(*handler),
877 &proto_name, strlen(name) + 1,
878 &script_name, strlen(script) + 1);
879 if (!handler)
880 return;
881
882 handler->script_name = strcpy(script_name, script);
883
884 proto = &handler->proto;
885 proto->name = strcpy(proto_name, name);
886 proto->config_params = &handler->config;
887 proto->attach = proto_shell_attach;
888
889 tmp = json_get_field(obj, "no-device", json_type_boolean);
890 if (tmp && json_object_get_boolean(tmp))
891 handler->proto.flags |= PROTO_FLAG_NODEV;
892
893 tmp = json_get_field(obj, "no-proto-task", json_type_boolean);
894 if (tmp && json_object_get_boolean(tmp))
895 handler->proto.flags |= PROTO_FLAG_NO_TASK;
896
897 tmp = json_get_field(obj, "available", json_type_boolean);
898 if (tmp && json_object_get_boolean(tmp))
899 handler->proto.flags |= PROTO_FLAG_INIT_AVAILABLE;
900
901 tmp = json_get_field(obj, "renew-handler", json_type_boolean);
902 if (tmp && json_object_get_boolean(tmp))
903 handler->proto.flags |= PROTO_FLAG_RENEW_AVAILABLE;
904
905 tmp = json_get_field(obj, "lasterror", json_type_boolean);
906 if (tmp && json_object_get_boolean(tmp))
907 handler->proto.flags |= PROTO_FLAG_LASTERROR;
908
909 tmp = json_get_field(obj, "teardown-on-l3-link-down", json_type_boolean);
910 if (tmp && json_object_get_boolean(tmp))
911 handler->proto.flags |= PROTO_FLAG_TEARDOWN_ON_L3_LINK_DOWN;
912
913 config = json_get_field(obj, "config", json_type_array);
914 if (config)
915 handler->config_buf = netifd_handler_parse_config(&handler->config, config);
916
917 DPRINTF("Add handler for script %s: %s\n", script, proto->name);
918 add_proto_handler(proto);
919 }
920
921 void proto_shell_init(void)
922 {
923 proto_fd = netifd_open_subdir("proto");
924 if (proto_fd < 0)
925 return;
926
927 netifd_init_script_handlers(proto_fd, proto_shell_add_handler);
928 }