4 * Copyright (c) 2017 Samsung Electronics Co., Ltd.
6 * Licensed under the Apache License, Version 2.0 (the "License");
7 * you may not use this file except in compliance with the License.
8 * You may obtain a copy of the License at
10 * http://www.apache.org/licenses/LICENSE-2.0
12 * Unless required by applicable law or agreed to in writing, software
13 * distributed under the License is distributed on an "AS IS" BASIS,
14 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
15 * See the License for the specific language governing permissions and
16 * limitations under the License.
20 #include "server_channel_handler.h"
22 #include <sensor_log.h>
23 #include <sensor_info.h>
24 #include <sensor_handler.h>
25 #include <sensor_utils.h>
26 #include <command_types.h>
28 #include "permission_checker.h"
29 #include "application_sensor_handler.h"
31 #define PRIV_DELIMINATOR ";"
33 using namespace sensor;
37 std::unordered_map<uint32_t, sensor_listener_proxy *> server_channel_handler::m_listeners;
38 std::unordered_map<ipc::channel *, uint32_t> server_channel_handler::m_listener_ids;
39 std::unordered_map<ipc::channel *, application_sensor_handler *> server_channel_handler::m_app_sensors;
41 server_channel_handler::server_channel_handler(sensor_manager *manager)
46 server_channel_handler::~server_channel_handler()
50 void server_channel_handler::connected(channel *ch)
54 void server_channel_handler::disconnected(channel *ch)
56 m_manager->deregister_channel(ch);
58 auto it_asensor = m_app_sensors.find(ch);
59 if (it_asensor != m_app_sensors.end()) {
60 sensor_info info = it_asensor->second->get_sensor_info();
62 _I("Disconnected provider[%s]", info.get_uri().c_str());
64 m_manager->deregister_sensor(info.get_uri());
65 m_app_sensors.erase(ch);
68 auto it_listener = m_listener_ids.find(ch);
69 if (it_listener != m_listener_ids.end()) {
70 _I("Disconnected listener[%u]", it_listener->second);
72 delete m_listeners[it_listener->second];
73 m_listeners.erase(it_listener->second);
74 m_listener_ids.erase(ch);
78 void server_channel_handler::read(channel *ch, message &msg)
83 case CMD_MANAGER_CONNECT:
84 err = manager_connect(ch, msg); break;
85 case CMD_MANAGER_DISCONNECT:
86 err = manager_disconnect(ch, msg); break;
87 case CMD_MANAGER_SENSOR_LIST:
88 err = manager_get_sensor_list(ch, msg); break;
89 case CMD_LISTENER_CONNECT:
90 err = listener_connect(ch, msg); break;
91 case CMD_LISTENER_DISCONNECT:
92 err = listener_disconnect(ch, msg); break;
93 case CMD_LISTENER_START:
94 err = listener_start(ch, msg); break;
95 case CMD_LISTENER_STOP:
96 err = listener_stop(ch, msg); break;
97 case CMD_LISTENER_ATTR_INT:
98 err = listener_attr_int(ch, msg); break;
99 case CMD_LISTENER_ATTR_STR:
100 err = listener_attr_str(ch, msg); break;
101 case CMD_LISTENER_GET_DATA:
102 err = listener_get_data(ch, msg); break;
103 case CMD_PROVIDER_CONNECT:
104 err = provider_connect(ch, msg); break;
105 case CMD_PROVIDER_DISCONNECT:
106 err = provider_disconnect(ch, msg); break;
107 case CMD_PROVIDER_PUBLISH:
108 err = provider_publish(ch, msg); break;
109 case CMD_HAS_PRIVILEGE:
110 err = has_privileges(ch, msg); break;
116 ch->send_sync(&reply);
120 int server_channel_handler::manager_connect(channel *ch, message &msg)
122 m_manager->register_channel(ch);
126 int server_channel_handler::manager_disconnect(channel *ch, message &msg)
128 m_manager->deregister_channel(ch);
129 return send_reply(ch, OP_SUCCESS);
132 int server_channel_handler::manager_get_sensor_list(channel *ch, message &msg)
138 size = m_manager->serialize(ch->get_fd(), &bytes);
139 retv_if(size < 0, size);
141 reply.enclose((const char *)bytes, size);
142 reply.header()->err = OP_SUCCESS;
143 ch->send_sync(&reply);
150 int server_channel_handler::listener_connect(channel *ch, message &msg)
152 static uint32_t listener_id = 1;
153 cmd_listener_connect_t buf;
155 msg.disclose((char *)&buf);
157 sensor_listener_proxy *listener;
158 listener = new(std::nothrow) sensor_listener_proxy(listener_id,
159 buf.sensor, m_manager, ch);
160 retvm_if(!listener, OP_ERROR, "Failed to allocate memory");
161 retvm_if(!has_privileges(ch->get_fd(), listener->get_required_privileges()),
162 -EACCES, "Permission denied");
164 buf.listener_id = listener_id;
167 reply.enclose((const char *)&buf, sizeof(buf));
168 reply.header()->err = OP_SUCCESS;
170 if (!ch->send_sync(&reply))
173 _I("Connected sensor_listener[fd(%d) -> id(%u)]", ch->get_fd(), listener_id);
174 m_listeners[listener_id] = listener;
175 m_listener_ids[ch] = listener_id;
181 int server_channel_handler::listener_disconnect(channel *ch, message &msg)
183 auto it = m_listener_ids.find(ch);
184 retv_if(it == m_listener_ids.end(), -EINVAL);
186 uint32_t id = it->second;
188 retvm_if(!has_privileges(ch->get_fd(), m_listeners[id]->get_required_privileges()),
189 -EACCES, "Permission denied");
191 delete m_listeners[id];
192 m_listeners.erase(id);
193 m_listener_ids.erase(ch);
195 _D("Disconnected sensor_listener[%u]", id);
197 return send_reply(ch, OP_SUCCESS);
200 int server_channel_handler::listener_start(channel *ch, message &msg)
202 cmd_listener_start_t buf;
203 msg.disclose((char *)&buf);
204 uint32_t id = buf.listener_id;
206 auto it = m_listeners.find(id);
207 retv_if(it == m_listeners.end(), -EINVAL);
208 retvm_if(!has_privileges(ch->get_fd(), m_listeners[id]->get_required_privileges()),
209 -EACCES, "Permission denied");
211 int ret = m_listeners[id]->start();
212 retv_if(ret < 0, ret);
214 return send_reply(ch, OP_SUCCESS);
217 int server_channel_handler::listener_stop(channel *ch, message &msg)
219 cmd_listener_stop_t buf;
220 msg.disclose((char *)&buf);
221 uint32_t id = buf.listener_id;
223 auto it = m_listeners.find(id);
224 retv_if(it == m_listeners.end(), -EINVAL);
225 retvm_if(!has_privileges(ch->get_fd(), m_listeners[id]->get_required_privileges()),
226 -EACCES, "Permission denied");
228 int ret = m_listeners[id]->stop();
229 retv_if(ret < 0, ret);
231 return send_reply(ch, OP_SUCCESS);
234 int server_channel_handler::listener_attr_int(channel *ch, message &msg)
236 cmd_listener_attr_int_t buf;
237 msg.disclose((char *)&buf);
238 uint32_t id = buf.listener_id;
240 int ret = OP_SUCCESS;
242 auto it = m_listeners.find(id);
243 retv_if(it == m_listeners.end(), -EINVAL);
244 retvm_if(!has_privileges(ch->get_fd(), m_listeners[id]->get_required_privileges()),
245 -EACCES, "Permission denied");
247 switch (buf.attribute) {
248 case SENSORD_ATTRIBUTE_INTERVAL:
249 ret = m_listeners[id]->set_interval(buf.value); break;
250 case SENSORD_ATTRIBUTE_MAX_BATCH_LATENCY:
251 ret = m_listeners[id]->set_max_batch_latency(buf.value); break;
252 case SENSORD_ATTRIBUTE_PASSIVE_MODE:
253 ret = m_listeners[id]->set_passive_mode(buf.value); break;
254 case SENSORD_ATTRIBUTE_PAUSE_POLICY:
255 case SENSORD_ATTRIBUTE_AXIS_ORIENTATION:
257 ret = m_listeners[id]->set_attribute(buf.attribute, buf.value);
259 /* TODO : check return value */
261 _W("Return : %d", ret);
263 return send_reply(ch, OP_SUCCESS);
266 int server_channel_handler::listener_attr_str(channel *ch, message &msg)
268 cmd_listener_attr_str_t buf;
269 msg.disclose((char *)&buf);
270 uint32_t id = buf.listener_id;
272 auto it = m_listeners.find(id);
273 retv_if(it == m_listeners.end(), -EINVAL);
274 retvm_if(!has_privileges(ch->get_fd(), m_listeners[id]->get_required_privileges()),
275 -EACCES, "Permission denied");
277 int ret = m_listeners[id]->set_attribute(buf.attribute, buf.value, buf.len);
278 retv_if(ret < 0, ret);
280 return send_reply(ch, OP_SUCCESS);
283 int server_channel_handler::listener_get_data(channel *ch, message &msg)
286 cmd_listener_get_data_t buf;
291 msg.disclose((char *)&buf);
292 id = buf.listener_id;
294 auto it = m_listeners.find(id);
295 retv_if(it == m_listeners.end(), -EINVAL);
296 retvm_if(!has_privileges(ch->get_fd(), m_listeners[id]->get_required_privileges()),
297 -EACCES, "Permission denied");
299 int ret = m_listeners[id]->get_data(&data, &len);
300 retv_if(ret < 0, ret);
302 memcpy(&buf.data, data, sizeof(sensor_data_t));
303 buf.len = sizeof(sensor_data_t);
305 reply.enclose((const char *)&buf, sizeof(cmd_listener_get_data_t));
306 reply.header()->err = OP_SUCCESS;
307 reply.header()->type = CMD_LISTENER_GET_DATA;
309 ch->send_sync(&reply);
316 int server_channel_handler::provider_connect(channel *ch, message &msg)
320 info.deserialize(msg.body(), msg.size());
324 application_sensor_handler *sensor;
325 sensor = new(std::nothrow) application_sensor_handler(info, ch);
326 retvm_if(!sensor, -ENOMEM, "Failed to allocate memory");
328 if (!m_manager->register_sensor(sensor)) {
334 m_app_sensors[ch] = sensor;
336 return send_reply(ch, OP_SUCCESS);
339 int server_channel_handler::provider_disconnect(channel *ch, message &msg)
341 auto it = m_app_sensors.find(ch);
342 retv_if(it == m_app_sensors.end(), -EINVAL);
344 sensor_info info = it->second->get_sensor_info();
346 m_manager->deregister_sensor(info.get_uri());
347 m_app_sensors.erase(ch);
349 return send_reply(ch, OP_SUCCESS);
352 int server_channel_handler::provider_publish(channel *ch, message &msg)
354 auto it = m_app_sensors.find(ch);
355 retv_if(it == m_app_sensors.end(), -EINVAL);
357 sensor_data_t *data = (sensor_data_t *)malloc(sizeof(sensor_data_t));
358 retvm_if(!data, -ENOMEM, "Failed to allocate memory");
360 msg.disclose((char *)data);
362 it->second->publish(data, sizeof(sensor_data_t));
367 int server_channel_handler::has_privileges(channel *ch, message &msg)
369 sensor_handler *sensor;
370 cmd_has_privilege_t buf;
371 msg.disclose((char *)&buf);
373 sensor = m_manager->get_sensor(buf.sensor);
374 retv_if(!sensor, OP_ERROR);
376 sensor_info info = sensor->get_sensor_info();
378 if (!has_privileges(ch->get_fd(), info.get_privilege()))
381 return send_reply(ch, OP_SUCCESS);
384 int server_channel_handler::send_reply(channel *ch, int error)
386 message reply(error);
387 retvm_if(!ch->send_sync(&reply), OP_ERROR, "Failed to send reply");
391 bool server_channel_handler::has_privilege(int fd, std::string &priv)
393 static permission_checker checker;
394 return checker.has_permission(fd, priv);
397 bool server_channel_handler::has_privileges(int fd, std::string priv)
399 std::vector<std::string> privileges;
400 privileges = utils::tokenize(priv, PRIV_DELIMINATOR);
402 for (auto it = privileges.begin(); it != privileges.end(); ++it) {
403 if (!has_privilege(fd, *it))