4 * Copyright (c) 2017 Samsung Electronics Co., Ltd.
6 * Licensed under the Apache License, Version 2.0 (the "License");
7 * you may not use this file except in compliance with the License.
8 * You may obtain a copy of the License at
10 * http://www.apache.org/licenses/LICENSE-2.0
12 * Unless required by applicable law or agreed to in writing, software
13 * distributed under the License is distributed on an "AS IS" BASIS,
14 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
15 * See the License for the specific language governing permissions and
16 * limitations under the License.
20 #include "server_channel_handler.h"
22 #include <sensor_log.h>
23 #include <sensor_info.h>
24 #include <sensor_handler.h>
25 #include <sensor_utils.h>
26 #include <sensor_types_private.h>
27 #include <command_types.h>
28 #include <event_loop.h>
30 #include "permission_checker.h"
31 #include "application_sensor_handler.h"
33 using namespace sensor;
37 std::unordered_map<uint32_t, sensor_listener_proxy *> server_channel_handler::m_listeners;
38 std::unordered_map<ipc::channel *, uint32_t> server_channel_handler::m_listener_ids;
39 std::unordered_map<ipc::channel *, application_sensor_handler *> server_channel_handler::m_app_sensors;
41 server_channel_handler::server_channel_handler(sensor_manager *manager)
44 _I("Create[%p]", this);
47 server_channel_handler::~server_channel_handler()
49 _I("Destroy[%p]", this);
52 void server_channel_handler::connected(channel *ch)
56 void server_channel_handler::disconnected(channel *ch)
58 _I("Disconnect[%p] using channel[%p]", this, ch);
59 m_manager->deregister_channel(ch);
61 auto it_asensor = m_app_sensors.find(ch);
62 if (it_asensor != m_app_sensors.end()) {
63 sensor_info info = it_asensor->second->get_sensor_info();
65 _I("Disconnected provider[%s]", info.get_uri().c_str());
67 m_manager->deregister_sensor(info.get_uri());
68 m_app_sensors.erase(ch);
71 auto it_listener = m_listener_ids.find(ch);
72 if (it_listener != m_listener_ids.end()) {
73 _I("Disconnected listener[%u]", it_listener->second);
75 delete m_listeners[it_listener->second];
76 m_listeners.erase(it_listener->second);
77 m_listener_ids.erase(ch);
81 _D("Should not be here : channel[%p]", ch);
84 void server_channel_handler::read(channel *ch, message &msg)
89 case CMD_MANAGER_CONNECT:
90 err = manager_connect(ch, msg); break;
91 case CMD_MANAGER_SENSOR_LIST:
92 err = manager_get_sensor_list(ch, msg); break;
93 case CMD_LISTENER_CONNECT:
94 err = listener_connect(ch, msg); break;
95 case CMD_LISTENER_START:
96 err = listener_start(ch, msg); break;
97 case CMD_LISTENER_STOP:
98 err = listener_stop(ch, msg); break;
99 case CMD_LISTENER_SET_ATTR_INT:
100 err = listener_set_attr_int(ch, msg); break;
101 case CMD_LISTENER_SET_ATTR_STR:
102 err = listener_set_attr_str(ch, msg); break;
103 case CMD_LISTENER_GET_DATA:
104 err = listener_get_data(ch, msg); break;
105 case CMD_LISTENER_GET_ATTR_INT:
106 err = listener_get_attr_int(ch, msg); break;
107 case CMD_LISTENER_GET_ATTR_STR:
108 err = listener_get_attr_str(ch, msg); break;
109 case CMD_LISTENER_GET_DATA_LIST:
110 err = listener_get_data_list(ch, msg); break;
111 case CMD_PROVIDER_CONNECT:
112 err = provider_connect(ch, msg); break;
113 case CMD_PROVIDER_PUBLISH:
114 err = provider_publish(ch, msg); break;
115 case CMD_HAS_PRIVILEGE:
116 err = has_privileges(ch, msg); break;
122 ch->send_sync(reply);
126 int server_channel_handler::manager_connect(channel *ch, message &msg)
128 m_manager->register_channel(ch);
132 int server_channel_handler::manager_get_sensor_list(channel *ch, message &msg)
138 size = m_manager->serialize(ch->get_fd(), &bytes);
139 retv_if(size < 0, size);
141 reply.enclose((const char *)bytes, size);
142 reply.header()->err = OP_SUCCESS;
143 ch->send_sync(reply);
150 int server_channel_handler::listener_connect(channel *ch, message &msg)
152 static uint32_t listener_id = 1;
153 cmd_listener_connect_t buf;
155 msg.disclose((char *)&buf, sizeof(buf));
157 sensor_listener_proxy *listener;
158 listener = new(std::nothrow) sensor_listener_proxy(listener_id,
159 buf.sensor, m_manager, ch);
160 retvm_if(!listener, OP_ERROR, "Failed to allocate memory");
161 retvm_if(!has_privileges(ch->get_fd(), listener->get_required_privileges()),
162 -EACCES, "Permission denied[%d, %s]",
163 listener_id, m_listeners[listener_id]->get_required_privileges().c_str());
165 buf.listener_id = listener_id;
168 reply.set_type(CMD_LISTENER_CONNECTED);
169 reply.enclose((const char *)&buf, sizeof(buf));
170 reply.header()->err = OP_SUCCESS;
172 if (!ch->send_sync(reply))
175 _I("Connected sensor_listener[fd(%d) -> id(%u)]", ch->get_fd(), listener_id);
176 m_listeners[listener_id] = listener;
177 m_listener_ids[ch] = listener_id;
183 int server_channel_handler::listener_start(channel *ch, message &msg)
185 cmd_listener_start_t buf;
186 msg.disclose((char *)&buf, sizeof(buf));
187 uint32_t id = buf.listener_id;
189 auto it = m_listeners.find(id);
190 retv_if(it == m_listeners.end(), -EINVAL);
191 retvm_if(!has_privileges(ch->get_fd(), m_listeners[id]->get_required_privileges()),
192 -EACCES, "Permission denied[%d, %s]",
193 id, m_listeners[id]->get_required_privileges().c_str());
195 int ret = m_listeners[id]->start();
196 retvm_if(ret < 0, ret, "Failed to start listener[%d]", id);
198 return send_reply(ch, OP_SUCCESS);
201 int server_channel_handler::listener_stop(channel *ch, message &msg)
203 cmd_listener_stop_t buf;
204 msg.disclose((char *)&buf, sizeof(buf));
205 uint32_t id = buf.listener_id;
207 auto it = m_listeners.find(id);
208 retv_if(it == m_listeners.end(), -EINVAL);
209 retvm_if(!has_privileges(ch->get_fd(), m_listeners[id]->get_required_privileges()),
210 -EACCES, "Permission denied[%d, %s]",
211 id, m_listeners[id]->get_required_privileges().c_str());
213 int ret = m_listeners[id]->stop();
214 retvm_if(ret < 0, ret, "Failed to stop listener[%d]", id);
216 return send_reply(ch, OP_SUCCESS);
219 int server_channel_handler::listener_set_attr_int(channel *ch, message &msg)
221 cmd_listener_attr_int_t buf;
222 msg.disclose((char *)&buf, sizeof(buf));
223 uint32_t id = buf.listener_id;
225 int ret = OP_SUCCESS;
227 auto it = m_listeners.find(id);
228 retv_if(it == m_listeners.end(), -EINVAL);
229 retvm_if(!has_privileges(ch->get_fd(), m_listeners[id]->get_required_privileges()),
230 -EACCES, "Permission denied[%d, %s]",
231 id, m_listeners[id]->get_required_privileges().c_str());
233 switch (buf.attribute) {
234 case SENSORD_ATTRIBUTE_INTERVAL:
235 ret = m_listeners[id]->set_interval(buf.value); break;
236 case SENSORD_ATTRIBUTE_MAX_BATCH_LATENCY:
237 ret = m_listeners[id]->set_max_batch_latency(buf.value); break;
238 case SENSORD_ATTRIBUTE_PASSIVE_MODE:
239 ret = m_listeners[id]->set_passive_mode(buf.value); break;
240 case SENSORD_ATTRIBUTE_PAUSE_POLICY:
241 case SENSORD_ATTRIBUTE_AXIS_ORIENTATION:
243 ret = m_listeners[id]->set_attribute(buf.attribute, buf.value);
245 /* TODO : check return value */
247 _D("Return : %d", ret);
249 ret = send_reply(ch, OP_SUCCESS);
251 if (m_listeners[id]->need_to_notify_attribute_changed()) {
252 m_listeners[id]->notify_attribute_changed(buf.attribute, buf.value);
253 m_listeners[id]->set_need_to_notify_attribute_changed(false);
259 int server_channel_handler::listener_set_attr_str(channel *ch, message &msg)
262 cmd_listener_attr_str_t *buf;
264 buf = (cmd_listener_attr_str_t *) new(std::nothrow) char[msg.size()];
265 retvm_if(!buf, -ENOMEM, "Failed to allocate memory");
267 msg.disclose((char *)buf, msg.size());
269 id = buf->listener_id;
270 auto it = m_listeners.find(id);
271 if (it == m_listeners.end()) {
276 if (!has_privileges(ch->get_fd(), m_listeners[id]->get_required_privileges())) {
277 _E("Permission denied[%d, %s]", id, m_listeners[id]->get_required_privileges().c_str());
282 int ret = m_listeners[id]->set_attribute(buf->attribute, buf->value, buf->len);
288 ret = send_reply(ch, OP_SUCCESS);
290 if (m_listeners[id]->need_to_notify_attribute_changed()) {
291 m_listeners[id]->notify_attribute_changed(buf->attribute, buf->value, buf->len);
292 m_listeners[id]->set_need_to_notify_attribute_changed(false);
299 int server_channel_handler::listener_get_attr_int(ipc::channel *ch, ipc::message &msg)
301 cmd_listener_attr_int_t buf;
302 msg.disclose((char *)&buf, sizeof(buf));
303 uint32_t id = buf.listener_id;
304 int attr = buf.attribute;
306 int ret = OP_SUCCESS;
308 auto it = m_listeners.find(id);
309 retv_if(it == m_listeners.end(), -EINVAL);
310 retvm_if(!has_privileges(ch->get_fd(), m_listeners[id]->get_required_privileges()),
311 -EACCES, "Permission denied[%d, %s]",
312 id, m_listeners[id]->get_required_privileges().c_str());
315 case SENSORD_ATTRIBUTE_INTERVAL:
316 ret = m_listeners[id]->get_interval(value); break;
317 case SENSORD_ATTRIBUTE_MAX_BATCH_LATENCY:
318 ret = m_listeners[id]->get_max_batch_latency(value); break;
319 case SENSORD_ATTRIBUTE_PASSIVE_MODE:
320 // TODO : Are these features required?
323 case SENSORD_ATTRIBUTE_PAUSE_POLICY:
324 case SENSORD_ATTRIBUTE_AXIS_ORIENTATION:
326 ret = m_listeners[id]->get_attribute(attr, &value);
329 if (ret != OP_SUCCESS) {
330 _E("Failed to listener_get_attr_int");
334 cmd_listener_attr_int_t ret_buf;
336 ret_buf.listener_id = id;
337 ret_buf.attribute = attr;
338 ret_buf.value = value;
340 reply.enclose((char *)&ret_buf, sizeof(ret_buf));
341 reply.header()->err = OP_SUCCESS;
342 reply.set_type(CMD_LISTENER_GET_ATTR_INT);
343 ret = ch->send_sync(reply);
348 int server_channel_handler::listener_get_attr_str(ipc::channel *ch, ipc::message &msg)
351 cmd_listener_attr_str_t *buf;
353 buf = (cmd_listener_attr_str_t *) new(std::nothrow) char[msg.size()];
354 retvm_if(!buf, -ENOMEM, "Failed to allocate memory");
356 msg.disclose((char *)buf, msg.size());
358 id = buf->listener_id;
359 auto it = m_listeners.find(id);
360 auto attr = buf->attribute;
363 if (it == m_listeners.end()) {
367 if (!has_privileges(ch->get_fd(), m_listeners[id]->get_required_privileges())) {
368 _E("Permission denied[%d, %s]", id, m_listeners[id]->get_required_privileges().c_str());
374 int ret = m_listeners[id]->get_attribute(attr, &value, &len);
376 if (ret != OP_SUCCESS) {
377 _E("Failed to listener_get_attr_str");
381 cmd_listener_attr_str_t *reply_buf;
382 size_t size = sizeof(cmd_listener_attr_str_t) + len;
383 reply_buf = (cmd_listener_attr_str_t *) new(std::nothrow) char[size];
384 retvm_if(!reply_buf, -ENOMEM, "Failed to allocate memory");
386 reply_buf->attribute = attr;
387 memcpy(reply_buf->value, value, len);
388 reply_buf->len = len;
392 reply.enclose((char *)reply_buf, size);
393 reply.set_type(CMD_LISTENER_GET_ATTR_STR);
395 ret = ch->send_sync(reply);
401 int server_channel_handler::listener_get_data(channel *ch, message &msg)
404 cmd_listener_get_data_t buf;
409 msg.disclose((char *)&buf, sizeof(buf));
410 id = buf.listener_id;
412 auto it = m_listeners.find(id);
413 retv_if(it == m_listeners.end(), -EINVAL);
414 retvm_if(!has_privileges(ch->get_fd(), m_listeners[id]->get_required_privileges()),
415 -EACCES, "Permission denied[%d, %s]",
416 id, m_listeners[id]->get_required_privileges().c_str());
418 int ret = m_listeners[id]->get_data(&data, &len);
419 retv_if(ret < 0, ret);
421 memcpy(&buf.data, data, sizeof(sensor_data_t));
422 buf.len = sizeof(sensor_data_t);
424 reply.enclose((const char *)&buf, sizeof(cmd_listener_get_data_t));
425 reply.header()->err = OP_SUCCESS;
426 reply.header()->type = CMD_LISTENER_GET_DATA;
428 ch->send_sync(reply);
435 int server_channel_handler::listener_get_data_list(ipc::channel *ch, ipc::message &msg)
438 cmd_listener_get_data_list_t buf;
443 msg.disclose((char *)&buf, sizeof(buf));
444 id = buf.listener_id;
446 auto it = m_listeners.find(id);
447 retv_if(it == m_listeners.end(), -EINVAL);
448 retvm_if(!has_privileges(ch->get_fd(), m_listeners[id]->get_required_privileges()),
449 -EACCES, "Permission denied[%d, %s]",
450 id, m_listeners[id]->get_required_privileges().c_str());
452 int ret = m_listeners[id]->get_data(&data, &len);
453 retv_if(ret < 0, ret);
455 size_t reply_size = sizeof(cmd_listener_get_data_list_t) + len;
456 cmd_listener_get_data_list_t* reply_buf = (cmd_listener_get_data_list_t *) malloc(reply_size);
458 _E("Failed to allocate memory");
463 memcpy(reply_buf->data, data, len);
464 reply_buf->len = len;
465 reply_buf->data_count = len / sizeof(sensor_data_t);
466 reply.enclose((const char *)reply_buf, reply_size);
467 reply.header()->err = OP_SUCCESS;
468 reply.header()->type = CMD_LISTENER_GET_DATA_LIST;
470 ch->send_sync(reply);
479 int server_channel_handler::provider_connect(channel *ch, message &msg)
483 info.deserialize(msg.body(), msg.size());
487 application_sensor_handler *sensor;
488 sensor = new(std::nothrow) application_sensor_handler(info, ch);
489 retvm_if(!sensor, -ENOMEM, "Failed to allocate memory");
491 if (!m_manager->register_sensor(sensor)) {
497 m_app_sensors[ch] = sensor;
499 return send_reply(ch, OP_SUCCESS);
502 int server_channel_handler::provider_publish(channel *ch, message &msg)
504 auto it = m_app_sensors.find(ch);
505 retv_if(it == m_app_sensors.end(), -EINVAL);
507 size_t size = msg.header()->length;
508 void *data = (void *)malloc(size);
509 retvm_if(!data, -ENOMEM, "Failed to allocate memory");
511 msg.disclose(data, size);
513 it->second->publish((sensor_data_t*)data, size);
517 int server_channel_handler::has_privileges(channel *ch, message &msg)
519 sensor_handler *sensor;
520 cmd_has_privilege_t buf;
521 msg.disclose((char *)&buf, sizeof(buf));
523 sensor = m_manager->get_sensor(buf.sensor);
524 retv_if(!sensor, OP_ERROR);
526 sensor_info info = sensor->get_sensor_info();
528 if (!has_privileges(ch->get_fd(), info.get_privilege()))
531 return send_reply(ch, OP_SUCCESS);
534 int server_channel_handler::send_reply(channel *ch, int error)
536 message reply(error);
537 retvm_if(!ch->send_sync(reply), OP_ERROR, "Failed to send reply");
541 bool server_channel_handler::has_privilege(int fd, std::string &priv)
543 static permission_checker checker;
544 return checker.has_permission(fd, priv);
547 bool server_channel_handler::has_privileges(int fd, std::string priv)
549 std::vector<std::string> privileges;
550 privileges = utils::tokenize(priv, PRIV_DELIMITER);
552 for (auto it = privileges.begin(); it != privileges.end(); ++it) {
553 if (!has_privilege(fd, *it))