4 * Copyright (c) 2017 Samsung Electronics Co., Ltd.
6 * Licensed under the Apache License, Version 2.0 (the "License");
7 * you may not use this file except in compliance with the License.
8 * You may obtain a copy of the License at
10 * http://www.apache.org/licenses/LICENSE-2.0
12 * Unless required by applicable law or agreed to in writing, software
13 * distributed under the License is distributed on an "AS IS" BASIS,
14 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
15 * See the License for the specific language governing permissions and
16 * limitations under the License.
20 #include "server_channel_handler.h"
22 #include <sensor_log.h>
23 #include <sensor_info.h>
24 #include <sensor_handler.h>
25 #include <sensor_utils.h>
26 #include <sensor_types_private.h>
27 #include <command_types.h>
29 #include "permission_checker.h"
30 #include "application_sensor_handler.h"
32 using namespace sensor;
36 std::unordered_map<uint32_t, sensor_listener_proxy *> server_channel_handler::m_listeners;
37 std::unordered_map<ipc::channel *, uint32_t> server_channel_handler::m_listener_ids;
38 std::unordered_map<ipc::channel *, application_sensor_handler *> server_channel_handler::m_app_sensors;
40 server_channel_handler::server_channel_handler(sensor_manager *manager)
45 server_channel_handler::~server_channel_handler()
49 void server_channel_handler::connected(channel *ch)
53 void server_channel_handler::disconnected(channel *ch)
55 m_manager->deregister_channel(ch);
57 auto it_asensor = m_app_sensors.find(ch);
58 if (it_asensor != m_app_sensors.end()) {
59 sensor_info info = it_asensor->second->get_sensor_info();
61 _I("Disconnected provider[%s]", info.get_uri().c_str());
63 m_manager->deregister_sensor(info.get_uri());
64 m_app_sensors.erase(ch);
67 auto it_listener = m_listener_ids.find(ch);
68 if (it_listener != m_listener_ids.end()) {
69 _I("Disconnected listener[%u]", it_listener->second);
71 delete m_listeners[it_listener->second];
72 m_listeners.erase(it_listener->second);
73 m_listener_ids.erase(ch);
77 void server_channel_handler::read(channel *ch, message &msg)
82 case CMD_MANAGER_CONNECT:
83 err = manager_connect(ch, msg); break;
84 case CMD_MANAGER_SENSOR_LIST:
85 err = manager_get_sensor_list(ch, msg); break;
86 case CMD_LISTENER_CONNECT:
87 err = listener_connect(ch, msg); break;
88 case CMD_LISTENER_START:
89 err = listener_start(ch, msg); break;
90 case CMD_LISTENER_STOP:
91 err = listener_stop(ch, msg); break;
92 case CMD_LISTENER_ATTR_INT:
93 err = listener_attr_int(ch, msg); break;
94 case CMD_LISTENER_ATTR_STR:
95 err = listener_attr_str(ch, msg); break;
96 case CMD_LISTENER_GET_DATA:
97 err = listener_get_data(ch, msg); break;
98 case CMD_PROVIDER_CONNECT:
99 err = provider_connect(ch, msg); break;
100 case CMD_PROVIDER_PUBLISH:
101 err = provider_publish(ch, msg); break;
102 case CMD_HAS_PRIVILEGE:
103 err = has_privileges(ch, msg); break;
109 ch->send_sync(&reply);
113 int server_channel_handler::manager_connect(channel *ch, message &msg)
115 m_manager->register_channel(ch);
119 int server_channel_handler::manager_get_sensor_list(channel *ch, message &msg)
125 size = m_manager->serialize(ch->get_fd(), &bytes);
126 retv_if(size < 0, size);
128 reply.enclose((const char *)bytes, size);
129 reply.header()->err = OP_SUCCESS;
130 ch->send_sync(&reply);
137 int server_channel_handler::listener_connect(channel *ch, message &msg)
139 static uint32_t listener_id = 1;
140 cmd_listener_connect_t buf;
142 msg.disclose((char *)&buf);
144 sensor_listener_proxy *listener = NULL;
145 listener = new(std::nothrow) sensor_listener_proxy(listener_id,
146 buf.sensor, m_manager, ch);
147 retvm_if(!listener, OP_ERROR, "Failed to allocate memory");
149 if (!has_privileges(ch->get_fd(), listener->get_required_privileges())) {
152 _E("Permission denied[%d, %s]", listener_id,
153 m_listeners[listener_id]->get_required_privileges().c_str());
157 buf.listener_id = listener_id;
160 reply.enclose((const char *)&buf, sizeof(buf));
161 reply.header()->err = OP_SUCCESS;
163 if (!ch->send_sync(&reply)) {
168 _I("Connected sensor_listener[fd(%d) -> id(%u)]", ch->get_fd(), listener_id);
169 m_listeners[listener_id] = listener;
170 m_listener_ids[ch] = listener_id;
176 int server_channel_handler::listener_start(channel *ch, message &msg)
178 cmd_listener_start_t buf;
179 msg.disclose((char *)&buf);
180 uint32_t id = buf.listener_id;
182 auto it = m_listeners.find(id);
183 retv_if(it == m_listeners.end(), -EINVAL);
184 retvm_if(!has_privileges(ch->get_fd(), m_listeners[id]->get_required_privileges()),
185 -EACCES, "Permission denied[%d, %s]",
186 id, m_listeners[id]->get_required_privileges().c_str());
188 int ret = m_listeners[id]->start();
189 retvm_if(ret < 0, ret, "Failed to start listener[%d]", id);
191 return send_reply(ch, OP_SUCCESS);
194 int server_channel_handler::listener_stop(channel *ch, message &msg)
196 cmd_listener_stop_t buf;
197 msg.disclose((char *)&buf);
198 uint32_t id = buf.listener_id;
200 auto it = m_listeners.find(id);
201 retv_if(it == m_listeners.end(), -EINVAL);
202 retvm_if(!has_privileges(ch->get_fd(), m_listeners[id]->get_required_privileges()),
203 -EACCES, "Permission denied[%d, %s]",
204 id, m_listeners[id]->get_required_privileges().c_str());
206 int ret = m_listeners[id]->stop();
207 retvm_if(ret < 0, ret, "Failed to stop listener[%d]", id);
209 return send_reply(ch, OP_SUCCESS);
212 int server_channel_handler::listener_attr_int(channel *ch, message &msg)
214 cmd_listener_attr_int_t buf;
215 msg.disclose((char *)&buf);
216 uint32_t id = buf.listener_id;
218 int ret = OP_SUCCESS;
220 auto it = m_listeners.find(id);
221 retv_if(it == m_listeners.end(), -EINVAL);
222 retvm_if(!has_privileges(ch->get_fd(), m_listeners[id]->get_required_privileges()),
223 -EACCES, "Permission denied[%d, %s]",
224 id, m_listeners[id]->get_required_privileges().c_str());
226 switch (buf.attribute) {
227 case SENSORD_ATTRIBUTE_INTERVAL:
228 ret = m_listeners[id]->set_interval(buf.value); break;
229 case SENSORD_ATTRIBUTE_MAX_BATCH_LATENCY:
230 ret = m_listeners[id]->set_max_batch_latency(buf.value); break;
231 case SENSORD_ATTRIBUTE_PASSIVE_MODE:
232 ret = m_listeners[id]->set_passive_mode(buf.value); break;
233 case SENSORD_ATTRIBUTE_PAUSE_POLICY:
234 case SENSORD_ATTRIBUTE_AXIS_ORIENTATION:
236 ret = m_listeners[id]->set_attribute(buf.attribute, buf.value);
238 /* TODO : check return value */
240 _W("Return : %d", ret);
242 return send_reply(ch, OP_SUCCESS);
245 int server_channel_handler::listener_attr_str(channel *ch, message &msg)
248 cmd_listener_attr_str_t *buf;
250 buf = (cmd_listener_attr_str_t *) new(std::nothrow) char[msg.size()];
251 retvm_if(!buf, -ENOMEM, "Failed to allocate memory");
253 msg.disclose((char *)buf);
255 id = buf->listener_id;
256 auto it = m_listeners.find(id);
257 if (it == m_listeners.end()) {
262 if (!has_privileges(ch->get_fd(), m_listeners[id]->get_required_privileges())) {
263 _E("Permission denied[%d, %s]", id, m_listeners[id]->get_required_privileges().c_str());
268 int ret = m_listeners[id]->set_attribute(buf->attribute, (char *)&buf->value, buf->len);
275 return send_reply(ch, OP_SUCCESS);
278 int server_channel_handler::listener_get_data(channel *ch, message &msg)
281 cmd_listener_get_data_t buf;
286 msg.disclose((char *)&buf);
287 id = buf.listener_id;
289 auto it = m_listeners.find(id);
290 retv_if(it == m_listeners.end(), -EINVAL);
291 retvm_if(!has_privileges(ch->get_fd(), m_listeners[id]->get_required_privileges()),
292 -EACCES, "Permission denied[%d, %s]",
293 id, m_listeners[id]->get_required_privileges().c_str());
295 int ret = m_listeners[id]->get_data(&data, &len);
296 retv_if(ret < 0, ret);
298 memcpy(&buf.data, data, sizeof(sensor_data_t));
299 buf.len = sizeof(sensor_data_t);
301 reply.enclose((const char *)&buf, sizeof(cmd_listener_get_data_t));
302 reply.header()->err = OP_SUCCESS;
303 reply.header()->type = CMD_LISTENER_GET_DATA;
305 ch->send_sync(&reply);
312 int server_channel_handler::provider_connect(channel *ch, message &msg)
316 info.deserialize(msg.body(), msg.size());
320 application_sensor_handler *sensor;
321 sensor = new(std::nothrow) application_sensor_handler(info, ch);
322 retvm_if(!sensor, -ENOMEM, "Failed to allocate memory");
324 if (!m_manager->register_sensor(sensor)) {
330 m_app_sensors[ch] = sensor;
332 return send_reply(ch, OP_SUCCESS);
335 int server_channel_handler::provider_publish(channel *ch, message &msg)
337 auto it = m_app_sensors.find(ch);
338 retv_if(it == m_app_sensors.end(), -EINVAL);
340 sensor_data_t *data = (sensor_data_t *)malloc(sizeof(sensor_data_t));
341 retvm_if(!data, -ENOMEM, "Failed to allocate memory");
343 msg.disclose((char *)data);
345 it->second->publish(data, sizeof(sensor_data_t));
350 int server_channel_handler::has_privileges(channel *ch, message &msg)
352 sensor_handler *sensor;
353 cmd_has_privilege_t buf;
354 msg.disclose((char *)&buf);
356 sensor = m_manager->get_sensor(buf.sensor);
357 retv_if(!sensor, OP_ERROR);
359 sensor_info info = sensor->get_sensor_info();
361 if (!has_privileges(ch->get_fd(), info.get_privilege()))
364 return send_reply(ch, OP_SUCCESS);
367 int server_channel_handler::send_reply(channel *ch, int error)
369 message reply(error);
370 retvm_if(!ch->send_sync(&reply), OP_ERROR, "Failed to send reply");
374 bool server_channel_handler::has_privilege(int fd, std::string &priv)
376 static permission_checker checker;
377 return checker.has_permission(fd, priv);
380 bool server_channel_handler::has_privileges(int fd, std::string priv)
382 std::vector<std::string> privileges;
383 privileges = utils::tokenize(priv, PRIV_DELIMITER);
385 for (auto it = privileges.begin(); it != privileges.end(); ++it) {
386 if (!has_privilege(fd, *it))