From patchwork Tue Aug 10 12:56:01 2021 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Howard Chung X-Patchwork-Id: 12428869 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-26.3 required=3.0 tests=BAYES_00,DKIMWL_WL_MED, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,HEADER_FROM_DIFFERENT_DOMAINS, INCLUDES_CR_TRAILER,INCLUDES_PATCH,MAILING_LIST_MULTI,SPF_HELO_NONE,SPF_PASS, URIBL_BLOCKED,USER_AGENT_GIT,USER_IN_DEF_DKIM_WL autolearn=ham autolearn_force=no version=3.4.0 Received: from mail.kernel.org (mail.kernel.org [198.145.29.99]) by smtp.lore.kernel.org (Postfix) with ESMTP id 249B8C4338F for ; Tue, 10 Aug 2021 12:56:11 +0000 (UTC) Received: from vger.kernel.org (vger.kernel.org [23.128.96.18]) by mail.kernel.org (Postfix) with ESMTP id 00D2D60E9B for ; Tue, 10 Aug 2021 12:56:10 +0000 (UTC) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S240840AbhHJM4c (ORCPT ); Tue, 10 Aug 2021 08:56:32 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:41872 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S237431AbhHJM4b (ORCPT ); Tue, 10 Aug 2021 08:56:31 -0400 Received: from mail-pj1-x1049.google.com (mail-pj1-x1049.google.com [IPv6:2607:f8b0:4864:20::1049]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id E4277C0613D3 for ; Tue, 10 Aug 2021 05:56:09 -0700 (PDT) Received: by mail-pj1-x1049.google.com with SMTP id ot9-20020a17090b3b49b02901788da7ea1aso2289457pjb.2 for ; Tue, 10 Aug 2021 05:56:09 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20161025; h=date:message-id:mime-version:subject:from:to:cc; bh=KtCVbHtDUdM6UuVJzk/1PydaXIHIB8v9kLUIgi00N3k=; b=lLEY77b11NwvSsPja7IA1b6GH/Eh7AyR5fM2Tabwcwa30gKlpY7HtZU+HFq9jGYy4a tc0emc9Z+M5S0F51GqGMquhCrUmwV1GND0XVD5cbB6U+iDGzZul7+fNqgFCeb+4baHpM VNSQb65hukRtgmPF30MZ0pdvPf00kV0JMvEVgyO9f6nUnyHDVyuzNevdHpEF1s3MWMr1 JbhLPxIrX7w5N2hPaQSmhhjXTO21hutDAshcbhPS2Ll4wBWkEmHDsTpxFXPEsnmWIlKi eIzQaglLBF3t+KUNETXD0DV8AgcobMbtS6l6WPRZ3x2fIrwkXP75tGez2DJWl5XWFNPA fi+g== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:date:message-id:mime-version:subject:from:to:cc; bh=KtCVbHtDUdM6UuVJzk/1PydaXIHIB8v9kLUIgi00N3k=; b=SbByJucDiSSiSIc36M0b8zyO+L+M+EmQt7Z4glxANPmgroO5JpWWQ3fQBk03vM0vUO /jNRqX57yq2APNhVL92P+1ViJyAEqBNVhF8RJnxpRF8+OfYNfnm9mKt6JP/lF3GdCDT5 7PHze69xcWnmnakKEce8n1/z7PEBvDiN6D6yP0BwBo82EMDP/zwspE/aU0OHQExVxUOf DmwNw3xz6jbDx4ZQoyyV2zt4RuFV743utBDNaVUtMBnqsDfP/FyZ2CX6XaK2oaM7tNZz l7kunw/6wo0gstaITPN1jjs7r2JrBJphzjf6TjjJEdDhkAMLOEmdA8TR6G1Yz2Rxxz/n szCg== X-Gm-Message-State: AOAM531Bx+oKaP1QtVGgwfx7LlEdFdkn92eZ9huyRiIePMnwVKpVDRAa WCF/Zhb2v8KTu/NnmZ79D/QF/DxcBtOvcRJDHUyvlXKdUlDVQGtmOjrWl8BUhdCYLW+znh0u0Ke PeXy3okwKJiswD6qskq+FpMtZGdUyLr4GmjU1WJByBMwLjNjNR/sKi/OafGSpQY9CNjtKA447dW cKWrQZxITnGIM= X-Google-Smtp-Source: ABdhPJyvneo9WM02dcG15ihYw0fh9zA6JppmwI33WxJL82EwEDDajk9SgkRHEaFJbmzozsugL8GicovcH3XiaCDq/g== X-Received: from howardchung-p920.tpe.corp.google.com ([2401:fa00:1:10:3ad5:58:f287:2aa7]) (user=howardchung job=sendgmr) by 2002:a17:90a:8b07:: with SMTP id y7mr4949072pjn.30.1628600169199; Tue, 10 Aug 2021 05:56:09 -0700 (PDT) Date: Tue, 10 Aug 2021 20:56:01 +0800 Message-Id: <20210810205522.v2.1.Ie7d876ad0b7defabfa86beb64e83f655f12be7ab@changeid> Mime-Version: 1.0 X-Mailer: git-send-email 2.32.0.605.g8dce9f2422-goog Subject: [PATCH v2 1/3] shared/shell: fix missing stdbool in shell.h From: Howard Chung To: linux-bluetooth@vger.kernel.org, luiz.dentz@gmail.com Cc: Yun-Hao Chung , Miao-chen Chou Precedence: bulk List-ID: X-Mailing-List: linux-bluetooth@vger.kernel.org From: Yun-Hao Chung bt_shell_menu_exists_t returns bool, but stdbool.h is not included. Reviewed-by: Miao-chen Chou --- Changes in v2: - refactor command to |allow| instead of |set-service-allowlist| and |get-service-allowlist| src/shared/shell.h | 1 + 1 file changed, 1 insertion(+) diff --git a/src/shared/shell.h b/src/shared/shell.h index 415194a40736..cc4f822fbf1d 100644 --- a/src/shared/shell.h +++ b/src/shared/shell.h @@ -8,6 +8,7 @@ * */ #include +#include #define COLOR_OFF "\001\x1B[0m\002" #define COLOR_RED "\001\x1B[0;91m\002" From patchwork Tue Aug 10 12:56:02 2021 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Howard Chung X-Patchwork-Id: 12428871 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-26.3 required=3.0 tests=BAYES_00,DKIMWL_WL_MED, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,HEADER_FROM_DIFFERENT_DOMAINS, INCLUDES_CR_TRAILER,INCLUDES_PATCH,MAILING_LIST_MULTI,SPF_HELO_NONE,SPF_PASS, URIBL_BLOCKED,USER_AGENT_GIT,USER_IN_DEF_DKIM_WL autolearn=ham autolearn_force=no version=3.4.0 Received: from mail.kernel.org (mail.kernel.org [198.145.29.99]) by smtp.lore.kernel.org (Postfix) with ESMTP id 7FED7C4338F for ; Tue, 10 Aug 2021 12:56:15 +0000 (UTC) Received: from vger.kernel.org (vger.kernel.org [23.128.96.18]) by mail.kernel.org (Postfix) with ESMTP id 6227A60EB9 for ; Tue, 10 Aug 2021 12:56:15 +0000 (UTC) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S237963AbhHJM4g (ORCPT ); Tue, 10 Aug 2021 08:56:36 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:41898 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S240970AbhHJM4g (ORCPT ); Tue, 10 Aug 2021 08:56:36 -0400 Received: from mail-yb1-xb49.google.com (mail-yb1-xb49.google.com [IPv6:2607:f8b0:4864:20::b49]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id DD299C061798 for ; Tue, 10 Aug 2021 05:56:13 -0700 (PDT) Received: by mail-yb1-xb49.google.com with SMTP id a62-20020a254d410000b0290592f360b0ccso20645837ybb.14 for ; Tue, 10 Aug 2021 05:56:13 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20161025; h=date:in-reply-to:message-id:mime-version:references:subject:from:to :cc; bh=TUOYD63vMEu13gQzGLkA1N/8KGNDykbuXAuXLx88TuY=; b=BoDeU27dFItjBitpeFp6/93xkPInGqiW5XZGHFA7Rot11/Ddz/4ZmSRWE66lTMayG8 JS/faTmnCgshTx8UEFoznAtplTsQVscjNKNwNMvNXZShJ+TJ6F9p2/h1OKE2hhI58ZSQ dJliOVxk7mgA/uJPQpwTa/bm5icgcY9Icmkrm4wpKmZq60x00OwIZcRbKBNmFle3P+wp e76C1w7ORIjRv9SqLZ8CarruaXpqheQUKEdg8naCUnjk+/IgxglCVOa/065k6lLiTU6l Wx0z46nsvt27zjdPxXxjHbImKZ0+0WY/6TBAqg3HR6zuGFOj2EjqCoxs+Ant5JfE6Mw4 eCyQ== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:date:in-reply-to:message-id:mime-version :references:subject:from:to:cc; bh=TUOYD63vMEu13gQzGLkA1N/8KGNDykbuXAuXLx88TuY=; b=iGQegTURF/3Uwyn+KexmloAzYV65g0JGAw0PjYEhgHxlYN5msUmcvyEC7EP5p/qyp/ LZVnpUXhSZ2j4ZyGmrVoMmlqtyJvi3m6NlH1yxOPWw0nCOZWLKT6Ed1uhPCqX8Pk6q5p o161rHjZUxwDQZtS54UezNgYSjyGNnShiRQRSbRWZucnClkphpGSVGcafyaKCewKnlv+ vkAebCQj3ckqoDFevdw5qHam03gnVgBjMrLSgndwDAnBloyE6prtyRiWl+NQ+qFYD1zq uD2t8wb27kp4TXQA495+R4Nfu6iDRPEOOLGgWZn/euxUMsD7L+XBvSg9QSLrPJqBwkX7 Xk6A== X-Gm-Message-State: AOAM5303G772oo+CjW/zufhjxqkDWGK/XQa2BkwQOD06Qsun1y8tzzfx nqu5tzaOwtQ2OvqXbQLZ2ajY6OcuHxiWXW8M1EiXS52rOTywxTD1d2i4FwQg2jJRM53zk6+0A6g mAVR/gsmQZv7hX1jIVSFyZ3YLyf//dW9KRshCh+OEsUNNZTtF+GeOtFXqPFLGUuOvgN9A6TIxKY XQM6bejcDDNPg= X-Google-Smtp-Source: ABdhPJyNSPpAAq8PRWNVrZolCmnJ7i7JgwUfP9FBzLbZ+frpES3PLaCg341RbpvBgvSSnBidA3UL34WIZxbqAcTj0g== X-Received: from howardchung-p920.tpe.corp.google.com ([2401:fa00:1:10:3ad5:58:f287:2aa7]) (user=howardchung job=sendgmr) by 2002:a25:4907:: with SMTP id w7mr38754565yba.393.1628600173078; Tue, 10 Aug 2021 05:56:13 -0700 (PDT) Date: Tue, 10 Aug 2021 20:56:02 +0800 In-Reply-To: <20210810205522.v2.1.Ie7d876ad0b7defabfa86beb64e83f655f12be7ab@changeid> Message-Id: <20210810205522.v2.2.I1d1cf4fbc02b11d62f186f0db23c2c537e296a64@changeid> Mime-Version: 1.0 References: <20210810205522.v2.1.Ie7d876ad0b7defabfa86beb64e83f655f12be7ab@changeid> X-Mailer: git-send-email 2.32.0.605.g8dce9f2422-goog Subject: [PATCH v2 2/3] client: add admin submenu and allow command From: Howard Chung To: linux-bluetooth@vger.kernel.org, luiz.dentz@gmail.com Cc: Yun-Hao Chung , Miao-chen Chou Precedence: bulk List-ID: X-Mailing-List: linux-bluetooth@vger.kernel.org From: Yun-Hao Chung This creates a menu - admin and add a commands to bluetoothctl - allow [clear/uuid1 uuid2 ...] Reviewed-by: Miao-chen Chou --- The following test steps were performed: 1. [bluetooth]# menu admin 2. [bluetooth]# allow 1124 180A 180F 1812 1801 3. [bluetooth]# allow Service AllowedList: 00001801-0000-1000-8000-00805f9b34fb 00001812-0000-1000-8000-00805f9b34fb 0000180f-0000-1000-8000-00805f9b34fb 0000180a-0000-1000-8000-00805f9b34fb 00001124-0000-1000-8000-00805f9b34fb 4. [bluetooth]# allow clear 5. [bluetooth]# allow Service AllowedList: Changes in v2: - Merge command set-service-allowlist and get-service-allowlist to allow - Update commit messages Makefile.tools | 4 +- client/admin_policy.c | 133 ++++++++++++++++++++++++++++++++++++++++++ client/admin_policy.h | 25 ++++++++ client/main.c | 71 ++++++++++++++++++++++ 4 files changed, 232 insertions(+), 1 deletion(-) create mode 100644 client/admin_policy.c create mode 100644 client/admin_policy.h diff --git a/Makefile.tools b/Makefile.tools index c836b5984934..1b493d4d0ed6 100644 --- a/Makefile.tools +++ b/Makefile.tools @@ -9,7 +9,9 @@ client_bluetoothctl_SOURCES = client/main.c \ client/advertising.c \ client/adv_monitor.h \ client/adv_monitor.c \ - client/gatt.h client/gatt.c + client/gatt.h client/gatt.c \ + client/admin_policy.h \ + client/admin_policy.c client_bluetoothctl_LDADD = gdbus/libgdbus-internal.la src/libshared-glib.la \ $(GLIB_LIBS) $(DBUS_LIBS) -lreadline endif diff --git a/client/admin_policy.c b/client/admin_policy.c new file mode 100644 index 000000000000..21062c4f6185 --- /dev/null +++ b/client/admin_policy.c @@ -0,0 +1,133 @@ +/* + * + * BlueZ - Bluetooth protocol stack for Linux + * + * Copyright (C) 2021 Google LLC + * + * + * This program is free software; you can redistribute it and/or modify + * it under the terms of the GNU General Public License as published by + * the Free Software Foundation; either version 2 of the License, or + * (at your option) any later version. + * + * This program is distributed in the hope that it will be useful, + * but WITHOUT ANY WARRANTY; without even the implied warranty of + * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the + * GNU General Public License for more details. + * + */ + +#ifdef HAVE_CONFIG_H +#include +#endif + +#include +#include +#include + +#include "gdbus/gdbus.h" +#include "src/shared/shell.h" + +#include "admin_policy.h" +#define _GNU_SOURCE + +static GDBusProxy *set_proxy; +static GDBusProxy *status_proxy; + +void admin_policy_set_set_proxy(GDBusProxy *proxy) +{ + set_proxy = proxy; +} + +void admin_policy_set_status_proxy(GDBusProxy *proxy) +{ + status_proxy = proxy; +} + +void admin_policy_read_service_allowlist(DBusConnection *dbus_conn) +{ + DBusMessageIter iter, subiter; + char *uuid = NULL; + + if (!status_proxy || !g_dbus_proxy_get_property(status_proxy, + "ServiceAllowList", &iter)) { + bt_shell_printf("Failed to get property\n"); + return bt_shell_noninteractive_quit(EXIT_FAILURE); + } + + if (dbus_message_iter_get_arg_type(&iter) != DBUS_TYPE_ARRAY) { + bt_shell_printf("Unexpected return type\n"); + return bt_shell_noninteractive_quit(EXIT_FAILURE); + } + + bt_shell_printf("Service AllowedList:\n"); + dbus_message_iter_recurse(&iter, &subiter); + while (dbus_message_iter_get_arg_type(&subiter) == + DBUS_TYPE_STRING) { + dbus_message_iter_get_basic(&subiter, &uuid); + bt_shell_printf("\t%s\n", uuid); + dbus_message_iter_next(&subiter); + } + + return bt_shell_noninteractive_quit(EXIT_SUCCESS); +} + +struct uuid_list_data { + char **uuid_list; + size_t num; +}; + +static void set_service_setup(DBusMessageIter *iter, void *user_data) +{ + struct uuid_list_data *data = user_data; + DBusMessageIter arr_iter; + size_t i; + + dbus_message_iter_open_container(iter, DBUS_TYPE_ARRAY, + DBUS_TYPE_STRING_AS_STRING, + &arr_iter); + + for (i = 0; i < data->num; i++) { + dbus_message_iter_append_basic(&arr_iter, DBUS_TYPE_STRING, + &data->uuid_list[i]); + } + + dbus_message_iter_close_container(iter, &arr_iter); +} + +static void set_service_reply(DBusMessage *message, void *user_data) +{ + DBusError error; + + dbus_error_init(&error); + + if (!dbus_set_error_from_message(&error, message)) { + bt_shell_printf("Set allowed service successfully\n"); + return bt_shell_noninteractive_quit(EXIT_SUCCESS); + } + + bt_shell_printf("Failed to set service allowed list: %s\n", error.name); + dbus_error_free(&error); + return bt_shell_noninteractive_quit(EXIT_FAILURE); +} + +void admin_policy_set_service_allowlist(DBusConnection *dbus_connd, + int argc, char *argv[]) +{ + struct uuid_list_data data; + + if (!set_proxy) { + bt_shell_printf("Set proxy not ready\n"); + return bt_shell_noninteractive_quit(EXIT_FAILURE); + } + + data.uuid_list = argv; + data.num = argc; + + if (!g_dbus_proxy_method_call(set_proxy, "SetServiceAllowList", + set_service_setup, set_service_reply, + &data, NULL)) { + bt_shell_printf("Failed to call method\n"); + return bt_shell_noninteractive_quit(EXIT_FAILURE); + } +} diff --git a/client/admin_policy.h b/client/admin_policy.h new file mode 100644 index 000000000000..1c8c2152d59d --- /dev/null +++ b/client/admin_policy.h @@ -0,0 +1,25 @@ +/* + * + * BlueZ - Bluetooth protocol stack for Linux + * + * Copyright (C) 2021 Google LLC + * + * + * This program is free software; you can redistribute it and/or modify + * it under the terms of the GNU General Public License as published by + * the Free Software Foundation; either version 2 of the License, or + * (at your option) any later version. + * + * This program is distributed in the hope that it will be useful, + * but WITHOUT ANY WARRANTY; without even the implied warranty of + * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the + * GNU General Public License for more details. + * + */ + +void admin_policy_set_set_proxy(GDBusProxy *proxy); +void admin_policy_set_status_proxy(GDBusProxy *proxy); + +void admin_policy_read_service_allowlist(DBusConnection *dbus_conn); +void admin_policy_set_service_allowlist(DBusConnection *dbus_conn, + int argc, char *argv[]); diff --git a/client/main.c b/client/main.c index c1a62edb7f99..142a2c08a07f 100644 --- a/client/main.c +++ b/client/main.c @@ -29,6 +29,7 @@ #include "gatt.h" #include "advertising.h" #include "adv_monitor.h" +#include "admin_policy.h" /* String display constants */ #define COLORED_NEW COLOR_GREEN "NEW" COLOR_OFF @@ -530,6 +531,23 @@ static void admon_manager_added(GDBusProxy *proxy) adv_monitor_register_app(dbus_conn); } +static void admin_policy_set_added(GDBusProxy *proxy) +{ + admin_policy_set_set_proxy(proxy); +} + +static void admin_policy_status_added(GDBusProxy *proxy) +{ + struct adapter *adapter; + + adapter = find_ctrl(ctrl_list, g_dbus_proxy_get_path(proxy)); + + if (!adapter) + return; + + admin_policy_set_status_proxy(proxy); +} + static void proxy_added(GDBusProxy *proxy, void *user_data) { const char *interface; @@ -565,6 +583,10 @@ static void proxy_added(GDBusProxy *proxy, void *user_data) } else if (!strcmp(interface, "org.bluez.AdvertisementMonitorManager1")) { admon_manager_added(proxy); + } else if (!strcmp(interface, "org.bluez.AdminPolicySet1")) { + admin_policy_set_added(proxy); + } else if (!strcmp(interface, "org.bluez.AdminPolicyStatus1")) { + admin_policy_status_added(proxy); } } @@ -621,6 +643,23 @@ static void adapter_removed(GDBusProxy *proxy) } } +static void admin_policy_set_removed(GDBusProxy *proxy) +{ + admin_policy_set_set_proxy(NULL); +} + +static void admin_policy_status_removed(GDBusProxy *proxy) +{ + struct adapter *adapter; + + adapter = find_ctrl(ctrl_list, g_dbus_proxy_get_path(proxy)); + + if (!adapter) + return; + + admin_policy_set_status_proxy(NULL); +} + static void proxy_removed(GDBusProxy *proxy, void *user_data) { const char *interface; @@ -661,6 +700,10 @@ static void proxy_removed(GDBusProxy *proxy, void *user_data) } else if (!strcmp(interface, "org.bluez.AdvertisementMonitorManager1")) { adv_monitor_remove_manager(dbus_conn); + } else if (!strcmp(interface, "org.bluez.AdminPolicySet1")) { + admin_policy_set_removed(proxy); + } else if (!strcmp(interface, "org.bluez.AdminPolicyStatus1")) { + admin_policy_status_removed(proxy); } } @@ -2824,6 +2867,24 @@ static void cmd_adv_monitor_get_supported_info(int argc, char *argv[]) adv_monitor_get_supported_info(); } +static void cmd_admin_allow(int argc, char *argv[]) +{ + if (check_default_ctrl() == FALSE) + return bt_shell_noninteractive_quit(EXIT_FAILURE); + + admin_policy_set_service_allowlist(dbus_conn, argc - 1, argv + 1); + + if (argc <= 1) { + admin_policy_read_service_allowlist(dbus_conn); + return; + } + + if (strcmp(argv[1], "clear") == 0) + argc--; + + admin_policy_set_service_allowlist(dbus_conn, argc - 1, argv + 1); +} + static const struct bt_shell_menu advertise_menu = { .name = "advertise", .desc = "Advertise Options Submenu", @@ -2978,6 +3039,15 @@ static const struct bt_shell_menu gatt_menu = { { } }, }; +static const struct bt_shell_menu admin_menu = { + .name = "admin", + .desc = "Admin Policy Submenu", + .entries = { + { "allow", "[clear/uuid1 uuid2 ...]", cmd_admin_allow, + "Allow service UUIDs and block rest of them"}, + {} }, +}; + static const struct bt_shell_menu main_menu = { .name = "main", .entries = { @@ -3075,6 +3145,7 @@ int main(int argc, char *argv[]) bt_shell_add_submenu(&advertise_monitor_menu); bt_shell_add_submenu(&scan_menu); bt_shell_add_submenu(&gatt_menu); + bt_shell_add_submenu(&admin_menu); bt_shell_set_prompt(PROMPT_OFF); if (agent_option) From patchwork Tue Aug 10 12:56:03 2021 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Howard Chung X-Patchwork-Id: 12428873 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-26.3 required=3.0 tests=BAYES_00,DKIMWL_WL_MED, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,HEADER_FROM_DIFFERENT_DOMAINS, INCLUDES_CR_TRAILER,INCLUDES_PATCH,MAILING_LIST_MULTI,SPF_HELO_NONE,SPF_PASS, URIBL_BLOCKED,USER_AGENT_GIT,USER_IN_DEF_DKIM_WL autolearn=ham autolearn_force=no version=3.4.0 Received: from mail.kernel.org (mail.kernel.org [198.145.29.99]) by smtp.lore.kernel.org (Postfix) with ESMTP id 3A834C4338F for ; Tue, 10 Aug 2021 12:56:19 +0000 (UTC) Received: from vger.kernel.org (vger.kernel.org [23.128.96.18]) by mail.kernel.org (Postfix) with ESMTP id 2332060EFF for ; Tue, 10 Aug 2021 12:56:19 +0000 (UTC) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S240970AbhHJM4k (ORCPT ); Tue, 10 Aug 2021 08:56:40 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:41912 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S240907AbhHJM4j (ORCPT ); Tue, 10 Aug 2021 08:56:39 -0400 Received: from mail-yb1-xb4a.google.com (mail-yb1-xb4a.google.com [IPv6:2607:f8b0:4864:20::b4a]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id B9D88C0613D3 for ; Tue, 10 Aug 2021 05:56:17 -0700 (PDT) Received: by mail-yb1-xb4a.google.com with SMTP id f3-20020a25cf030000b029055a2303fc2dso20872410ybg.11 for ; Tue, 10 Aug 2021 05:56:17 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20161025; h=date:in-reply-to:message-id:mime-version:references:subject:from:to :cc; bh=nbpf1YhaUP0VtoHewGY7WVFie2/jh/Ed6D+ftOWU5/E=; b=WravHOxbcHEZw698Y1E6f0+LuwG8GPIikhjELlDCnFnFwF0g+g0x+PmAIvQqZahWpy Jl3zTc9GfLcAIFnH7FKiiXKz1zaI22ZefEs3fm6Nl9gBdyL+BLqa0x2zeMovr9jCm9fP zvAKnUPRgJ688erv72G119w/f3fymShDvIZnE7Weud53SjqBajAVGxQcl2cHAdivOpH7 ko7vUMLvtZi4aWLNlQA4NUsR/qTW+LBslZXjjYn7E+9CSjZMPw19uhZKSbqUZAa41bkt WpjK9sthBYiE7ACuRRGItc4Sav/s3m9gMe/Bl9v50zv1KJV5SrsBaNK1EG6BHlDHj4rU 1T8w== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:date:in-reply-to:message-id:mime-version :references:subject:from:to:cc; bh=nbpf1YhaUP0VtoHewGY7WVFie2/jh/Ed6D+ftOWU5/E=; b=KSv0YKAd0ZFYdZa02cXWyQp9ZY0syyodg1mb111Txo20ncbG6v3EZAMvtW//brzTYt yMjKmnBu8jfWto9l7NrtfdF2Bsa/oYJetDwEym3W7yjzv6LAUYFuacHNBDgQNnVws0n6 aPy7kPAC4dYwRmOiZGdzmlc2K8gYvHI9tFj8ydkT+OBMlIJK6JgcUcG0uRHzTnthFejM 8C4Lewz+4lCnTP7cwiERHyXqyPI/pIzCNgn5j9XQD3ByW104U5M6ExfbFcMSlLxbbvdB yOKuXKDO5a+L1pmMRzNL4t0eMRokQy89I+ad3RDiMfsBD+Hrrv9iCnfvcpTnrmgMtG5r zOyw== X-Gm-Message-State: AOAM532q8gR1KVn1lZp9V+2K1oeqBMwEL13NUivaWgdKQOoAwt2F6FMY q/ssWgX+MB/chplY5Ln+o7OkPmzOCsDSJpDXzrUlqygn0Mk3g3mPloQ5vOL2Rc4qzxJH8RkMIZy Yj5adDVgJrXAIoGXNnyAoXgNXJ5qKO3Fpp57YNcmjVs+pohbomcImbqOVBAEoMJzIrvShwnfrZ+ T/joJt6aejVW0= X-Google-Smtp-Source: ABdhPJxeBO9b7ESSeNZqeooHHlMWkD8g9XyTkrdvXiGlb7iTXqQGtWb9nldnE0UxpElmSKWQ0v2ywxt4azRnHfvFsg== X-Received: from howardchung-p920.tpe.corp.google.com ([2401:fa00:1:10:3ad5:58:f287:2aa7]) (user=howardchung job=sendgmr) by 2002:a25:d450:: with SMTP id m77mr39407547ybf.412.1628600176981; Tue, 10 Aug 2021 05:56:16 -0700 (PDT) Date: Tue, 10 Aug 2021 20:56:03 +0800 In-Reply-To: <20210810205522.v2.1.Ie7d876ad0b7defabfa86beb64e83f655f12be7ab@changeid> Message-Id: <20210810205522.v2.3.I4f0ce40e36938756509ebe62a97929957936e648@changeid> Mime-Version: 1.0 References: <20210810205522.v2.1.Ie7d876ad0b7defabfa86beb64e83f655f12be7ab@changeid> X-Mailer: git-send-email 2.32.0.605.g8dce9f2422-goog Subject: [PATCH v2 3/3] client: add AffectedByPolicy property From: Howard Chung To: linux-bluetooth@vger.kernel.org, luiz.dentz@gmail.com Cc: Yun-Hao Chung , Miao-chen Chou Precedence: bulk List-ID: X-Mailing-List: linux-bluetooth@vger.kernel.org From: Yun-Hao Chung This prints property AffectedByPolicy in device info if org.bluez.AdminPolicyStatus1 exists. This also rename find_battery_by_path to find_proxies_by_path to reuse the function. Reviewed-by: Miao-chen Chou --- The following test steps were performed: 1. [bluetooth] menu admin 2. [bluetooth] allow 1124 180A 180F 1812 1801 3. Verify only HID devices are not `Affected by Policy` 4. [bluetooth] allow 1108 110A 110B 110C 110D 110E 110F 1112 111E 111F 1203 5. Verify only audio devices are not `Affected by Policy` devices are expected. (no changes since v1) client/main.c | 20 ++++++++++++++++---- 1 file changed, 16 insertions(+), 4 deletions(-) diff --git a/client/main.c b/client/main.c index 142a2c08a07f..eb8fa935397c 100644 --- a/client/main.c +++ b/client/main.c @@ -56,6 +56,7 @@ static GDBusProxy *default_dev; static GDBusProxy *default_attr; static GList *ctrl_list; static GList *battery_proxies; +static GList *admin_devices_proxies; static const char *agent_arguments[] = { "on", @@ -542,8 +543,11 @@ static void admin_policy_status_added(GDBusProxy *proxy) adapter = find_ctrl(ctrl_list, g_dbus_proxy_get_path(proxy)); - if (!adapter) + if (!adapter) { + admin_devices_proxies = g_list_append(admin_devices_proxies, + proxy); return; + } admin_policy_set_status_proxy(proxy); } @@ -654,8 +658,11 @@ static void admin_policy_status_removed(GDBusProxy *proxy) adapter = find_ctrl(ctrl_list, g_dbus_proxy_get_path(proxy)); - if (!adapter) + if (!adapter) { + admin_devices_proxies = g_list_remove(admin_devices_proxies, + proxy); return; + } admin_policy_set_status_proxy(NULL); } @@ -837,7 +844,7 @@ static struct adapter *find_ctrl_by_address(GList *source, const char *address) return NULL; } -static GDBusProxy *find_battery_by_path(GList *source, const char *path) +static GDBusProxy *find_proxies_by_path(GList *source, const char *path) { GList *list; @@ -1704,6 +1711,7 @@ static struct GDBusProxy *find_device(int argc, char *argv[]) static void cmd_info(int argc, char *argv[]) { GDBusProxy *proxy; + GDBusProxy *admin_proxy; GDBusProxy *battery_proxy; DBusMessageIter iter; const char *address; @@ -1747,10 +1755,14 @@ static void cmd_info(int argc, char *argv[]) print_property(proxy, "AdvertisingFlags"); print_property(proxy, "AdvertisingData"); - battery_proxy = find_battery_by_path(battery_proxies, + battery_proxy = find_proxies_by_path(battery_proxies, + g_dbus_proxy_get_path(proxy)); + admin_proxy = find_proxies_by_path(admin_devices_proxies, g_dbus_proxy_get_path(proxy)); print_property_with_label(battery_proxy, "Percentage", "Battery Percentage"); + print_property_with_label(admin_proxy, "AffectedByPolicy", + "Affected by Policy"); return bt_shell_noninteractive_quit(EXIT_SUCCESS); }