blob: cefeddc8c6d475bbfa1a6cfce4cdace6d8731ff6 [file] [log] [blame]
Garrick Evans08843932019-09-17 14:41:08 +09001// Copyright 2019 The Chromium OS Authors. All rights reserved.
2// Use of this source code is governed by a BSD-style license that can be
3// found in the LICENSE file.
4
Jason Jeremy Imanadffbcb2020-08-31 13:21:36 +09005#ifndef PATCHPANEL_DBUS_CLIENT_H_
6#define PATCHPANEL_DBUS_CLIENT_H_
Garrick Evans08843932019-09-17 14:41:08 +09007
8#include <memory>
Jason Jeremy Imanadffbcb2020-08-31 13:21:36 +09009#include <set>
Jason Jeremy Iman6f1f3e72020-07-06 13:04:03 +090010#include <string>
Garrick Evans08843932019-09-17 14:41:08 +090011#include <utility>
12#include <vector>
13
Hugo Benichicc6850f2020-01-17 13:26:06 +090014#include "base/files/scoped_file.h"
Garrick Evans08843932019-09-17 14:41:08 +090015#include <brillo/brillo_export.h>
16#include <dbus/bus.h>
17#include <dbus/object_proxy.h>
Hugo Benichi8135e562019-12-12 15:56:36 +090018#include <patchpanel/proto_bindings/patchpanel_service.pb.h>
Garrick Evans08843932019-09-17 14:41:08 +090019
20namespace patchpanel {
21
Hugo Benichi51ff71b2020-08-19 00:55:15 +090022// Simple wrapper around patchpanel DBus API. All public functions are blocking
23// DBus calls to patchpaneld. The method names and protobuf schema used by
24// patchpanel DBus API are defined in platform2/system_api/dbus/patchpanel.
25// Access control for clients is defined in platform2/patchpanel/dbus.
Garrick Evans08843932019-09-17 14:41:08 +090026class BRILLO_EXPORT Client {
27 public:
28 static std::unique_ptr<Client> New();
29
Garrick Evans93a83fc2020-03-31 15:16:55 +090030 Client(const scoped_refptr<dbus::Bus>& bus, dbus::ObjectProxy* proxy)
Garrick Evans08843932019-09-17 14:41:08 +090031 : bus_(std::move(bus)), proxy_(proxy) {}
Garrick Evans93a83fc2020-03-31 15:16:55 +090032 ~Client();
Garrick Evans08843932019-09-17 14:41:08 +090033
34 bool NotifyArcStartup(pid_t pid);
Garrick Evansca2b41b2019-12-02 09:06:11 +090035 bool NotifyArcShutdown();
Garrick Evans27b74032019-11-19 13:33:47 +090036
Garrick Evans3388a032020-03-24 11:25:55 +090037 std::vector<NetworkDevice> NotifyArcVmStartup(uint32_t cid);
Garrick Evans0a189372020-02-07 08:55:27 +090038 bool NotifyArcVmShutdown(uint32_t cid);
Garrick Evans08843932019-09-17 14:41:08 +090039
Garrick Evans0a189372020-02-07 08:55:27 +090040 bool NotifyTerminaVmStartup(uint32_t cid,
Garrick Evans3388a032020-03-24 11:25:55 +090041 NetworkDevice* device,
42 IPv4Subnet* container_subnet);
Garrick Evans0a189372020-02-07 08:55:27 +090043 bool NotifyTerminaVmShutdown(uint32_t cid);
Garrick Evans27b74032019-11-19 13:33:47 +090044
Garrick Evans376f0672020-01-07 15:31:50 +090045 bool NotifyPluginVmStartup(uint64_t vm_id,
46 int subnet_index,
Garrick Evans3388a032020-03-24 11:25:55 +090047 NetworkDevice* device);
Garrick Evans376f0672020-01-07 15:31:50 +090048 bool NotifyPluginVmShutdown(uint64_t vm_id);
49
Hugo Benichi7d9d8db2020-03-30 15:56:56 +090050 // Reset the VPN routing intent mark on a socket to the default policy for
51 // the current uid. This is in general incorrect to call this method for
52 // a socket that is already connected.
53 bool DefaultVpnRouting(int socket);
54
55 // Mark a socket to be always routed through a VPN if there is one.
56 // Must be called before the socket is connected.
57 bool RouteOnVpn(int socket);
58
59 // Mark a socket to be always routed through the physical network.
60 // Must be called before the socket is connected.
61 bool BypassVpn(int socket);
62
Hugo Benichicc6850f2020-01-17 13:26:06 +090063 // Sends a ConnectNamespaceRequest for the given namespace pid. Returns a
64 // pair with a valid ScopedFD and the ConnectNamespaceResponse proto message
65 // received if the request succeeded. Closing the ScopedFD will teardown the
66 // veth and routing setup and free the allocated IPv4 subnet.
67 std::pair<base::ScopedFD, patchpanel::ConnectNamespaceResponse>
68 ConnectNamespace(pid_t pid,
69 const std::string& outbound_ifname,
70 bool forward_user_traffic);
71
Jie Jiange02d1202020-07-27 16:57:04 +090072 // Gets the traffic counters kept by patchpanel. |devices| is the set of
73 // interfaces (shill devices) for which counters should be returned, any
74 // unknown interfaces will be ignored. If |devices| is empty, counters for all
75 // known interfaces will be returned.
76 std::vector<TrafficCounter> GetTrafficCounters(
77 const std::set<std::string>& devices);
78
Jason Jeremy Iman6f1f3e72020-07-06 13:04:03 +090079 // Sends a ModifyPortRuleRequest to modify iptables ingress rules.
80 // This should only be called by permission_broker's 'devbroker'.
81 bool ModifyPortRule(patchpanel::ModifyPortRuleRequest::Operation op,
82 patchpanel::ModifyPortRuleRequest::RuleType type,
83 patchpanel::ModifyPortRuleRequest::Protocol proto,
84 const std::string& input_ifname,
85 const std::string& input_dst_ip,
86 uint32_t input_dst_port,
87 const std::string& dst_ip,
88 uint32_t dst_port);
89
Garrick Evans08843932019-09-17 14:41:08 +090090 private:
91 scoped_refptr<dbus::Bus> bus_;
92 dbus::ObjectProxy* proxy_ = nullptr; // owned by bus_
93
Hugo Benichi7d9d8db2020-03-30 15:56:56 +090094 bool SendSetVpnIntentRequest(int socket,
95 SetVpnIntentRequest::VpnRoutingPolicy policy);
96
Garrick Evans08843932019-09-17 14:41:08 +090097 DISALLOW_COPY_AND_ASSIGN(Client);
98};
99
100} // namespace patchpanel
101
Jason Jeremy Imanadffbcb2020-08-31 13:21:36 +0900102#endif // PATCHPANEL_DBUS_CLIENT_H_