4 * Copyright (c) 2017 Samsung Electronics Co., Ltd.
6 * Licensed under the Apache License, Version 2.0 (the "License");
7 * you may not use this file except in compliance with the License.
8 * You may obtain a copy of the License at
10 * http://www.apache.org/licenses/LICENSE-2.0
12 * Unless required by applicable law or agreed to in writing, software
13 * distributed under the License is distributed on an "AS IS" BASIS,
14 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
15 * See the License for the specific language governing permissions and
16 * limitations under the License.
20 #include "server_channel_handler.h"
22 #include <sensor_log.h>
23 #include <sensor_info.h>
24 #include <sensor_handler.h>
25 #include <sensor_utils.h>
26 #include <sensor_types_private.h>
27 #include <command_types.h>
28 #include <event_loop.h>
30 #include "permission_checker.h"
31 #include "application_sensor_handler.h"
33 #define CONVERT_ATTR_TYPE(attr) ((attr) >> 8)
35 using namespace sensor;
39 std::unordered_map<uint32_t, sensor_listener_proxy *> server_channel_handler::m_listeners;
40 std::unordered_map<ipc::channel *, uint32_t> server_channel_handler::m_listener_ids;
41 std::unordered_map<ipc::channel *, application_sensor_handler *> server_channel_handler::m_app_sensors;
43 server_channel_handler::server_channel_handler(sensor_manager *manager)
46 _I("Create[%p]", this);
49 server_channel_handler::~server_channel_handler()
51 _I("Destroy[%p]", this);
54 void server_channel_handler::connected(channel *ch)
58 void server_channel_handler::disconnected(channel *ch)
60 _I("Disconnect[%p] using channel[%p]", this, ch);
61 m_manager->deregister_channel(ch);
63 auto it_asensor = m_app_sensors.find(ch);
64 if (it_asensor != m_app_sensors.end()) {
65 sensor_info info = it_asensor->second->get_sensor_info();
67 _I("Disconnected provider[%s]", info.get_uri().c_str());
69 m_manager->deregister_sensor(info.get_uri());
70 m_app_sensors.erase(ch);
73 auto it_listener = m_listener_ids.find(ch);
74 if (it_listener != m_listener_ids.end()) {
75 _I("Disconnected listener[%u]", it_listener->second);
77 delete m_listeners[it_listener->second];
78 m_listeners.erase(it_listener->second);
79 m_listener_ids.erase(ch);
83 _D("Should not be here : channel[%p]", ch);
86 void server_channel_handler::read(channel *ch, message &msg)
91 case CMD_MANAGER_CONNECT:
92 err = manager_connect(ch, msg); break;
93 case CMD_MANAGER_SENSOR_LIST:
94 err = manager_get_sensor_list(ch, msg); break;
95 case CMD_MANAGER_SET_ATTR_INT:
96 err = manager_set_attr_int(ch, msg); break;
97 case CMD_MANAGER_GET_ATTR_INT:
98 err = manager_get_attr_int(ch, msg); break;
99 case CMD_LISTENER_CONNECT:
100 err = listener_connect(ch, msg); break;
101 case CMD_LISTENER_START:
102 err = listener_start(ch, msg); break;
103 case CMD_LISTENER_STOP:
104 err = listener_stop(ch, msg); break;
105 case CMD_LISTENER_SET_ATTR_INT:
106 err = listener_set_attr_int(ch, msg); break;
107 case CMD_LISTENER_SET_ATTR_STR:
108 err = listener_set_attr_str(ch, msg); break;
109 case CMD_LISTENER_GET_DATA:
110 err = listener_get_data(ch, msg); break;
111 case CMD_LISTENER_GET_ATTR_INT:
112 err = listener_get_attr_int(ch, msg); break;
113 case CMD_LISTENER_GET_ATTR_STR:
114 err = listener_get_attr_str(ch, msg); break;
115 case CMD_LISTENER_GET_DATA_LIST:
116 err = listener_get_data_list(ch, msg); break;
117 case CMD_PROVIDER_CONNECT:
118 err = provider_connect(ch, msg); break;
119 case CMD_PROVIDER_PUBLISH:
120 err = provider_publish(ch, msg); break;
121 case CMD_HAS_PRIVILEGE:
122 err = has_privileges(ch, msg); break;
128 ch->send_sync(reply);
132 int server_channel_handler::manager_connect(channel *ch, message &msg)
134 m_manager->register_channel(ch);
138 int server_channel_handler::manager_get_sensor_list(channel *ch, message &msg)
144 size = m_manager->serialize(ch->get_fd(), &bytes);
145 retv_if(size < 0, size);
147 reply.enclose((const char *)bytes, size);
148 reply.header()->err = OP_SUCCESS;
149 ch->send_sync(reply);
156 int server_channel_handler::manager_preprocess_attr(channel *ch, cmd_manager_attr_int_t &buf, sensor_handler **sensor)
161 sensor_handler *find_sensor = m_manager->get_sensor(buf.sensor);
163 _E("Failed to find sensor");
167 sensor_info info = find_sensor->get_sensor_info();
168 sensor_type_t type = (sensor_type_t) CONVERT_ATTR_TYPE(buf.attribute);
169 if (type != info.get_type()) {
170 _E("Invalid attribute with sensor type");
174 std::string privilege = info.get_privilege();
175 int ret = has_privileges(ch->get_fd(), privilege);
177 _E("Permission denied[%s]", privilege.c_str());
180 *sensor = find_sensor;
185 int server_channel_handler::manager_set_attr_int(channel *ch, message &msg)
187 cmd_manager_attr_int_t buf;
188 msg.disclose((char *)&buf, sizeof(buf));
190 sensor_handler *sensor;
191 int ret = manager_preprocess_attr(ch, buf, &sensor);
195 ret = sensor->set_attribute(NULL, buf.attribute, buf.value);
197 _E("Failed to set attribute");
201 return send_reply(ch, OP_SUCCESS);
204 int server_channel_handler::manager_get_attr_int(channel *ch, message &msg)
206 cmd_manager_attr_int_t buf;
207 msg.disclose((char *)&buf, sizeof(buf));
209 sensor_handler *sensor;
210 int ret = manager_preprocess_attr(ch, buf, &sensor);
215 ret = sensor->get_attribute(buf.attribute, &value);
217 _E("Failed to get attribute");
222 cmd_manager_attr_int_t ret_buf;
224 ret_buf.attribute = buf.attribute;
225 ret_buf.value = value;
227 reply.enclose((char *)&ret_buf, sizeof(ret_buf));
228 reply.header()->err = OP_SUCCESS;
229 reply.set_type(CMD_MANAGER_GET_ATTR_INT);
230 ret = ch->send_sync(reply);
237 int server_channel_handler::listener_connect(channel *ch, message &msg)
239 static uint32_t listener_id = 1;
240 cmd_listener_connect_t buf;
242 msg.disclose((char *)&buf, sizeof(buf));
244 sensor_listener_proxy *listener;
245 listener = new(std::nothrow) sensor_listener_proxy(listener_id,
246 buf.sensor, m_manager, ch);
247 retvm_if(!listener, OP_ERROR, "Failed to allocate memory");
248 retvm_if(!has_privileges(ch->get_fd(), listener->get_required_privileges()),
249 -EACCES, "Permission denied[%d, %s]",
250 listener_id, m_listeners[listener_id]->get_required_privileges().c_str());
252 buf.listener_id = listener_id;
255 reply.set_type(CMD_LISTENER_CONNECTED);
256 reply.enclose((const char *)&buf, sizeof(buf));
257 reply.header()->err = OP_SUCCESS;
259 if (!ch->send_sync(reply))
262 _I("Connected sensor_listener[fd(%d) -> id(%u)]", ch->get_fd(), listener_id);
263 m_listeners[listener_id] = listener;
264 m_listener_ids[ch] = listener_id;
270 int server_channel_handler::listener_start(channel *ch, message &msg)
272 cmd_listener_start_t buf;
273 msg.disclose((char *)&buf, sizeof(buf));
274 uint32_t id = buf.listener_id;
276 auto it = m_listeners.find(id);
277 retv_if(it == m_listeners.end(), -EINVAL);
278 retvm_if(!has_privileges(ch->get_fd(), m_listeners[id]->get_required_privileges()),
279 -EACCES, "Permission denied[%d, %s]",
280 id, m_listeners[id]->get_required_privileges().c_str());
282 int ret = m_listeners[id]->start();
283 retvm_if(ret < 0, ret, "Failed to start listener[%d]", id);
285 return send_reply(ch, OP_SUCCESS);
288 int server_channel_handler::listener_stop(channel *ch, message &msg)
290 cmd_listener_stop_t buf;
291 msg.disclose((char *)&buf, sizeof(buf));
292 uint32_t id = buf.listener_id;
294 auto it = m_listeners.find(id);
295 retv_if(it == m_listeners.end(), -EINVAL);
296 retvm_if(!has_privileges(ch->get_fd(), m_listeners[id]->get_required_privileges()),
297 -EACCES, "Permission denied[%d, %s]",
298 id, m_listeners[id]->get_required_privileges().c_str());
300 int ret = m_listeners[id]->stop();
301 retvm_if(ret < 0, ret, "Failed to stop listener[%d]", id);
303 return send_reply(ch, OP_SUCCESS);
306 int server_channel_handler::listener_set_attr_int(channel *ch, message &msg)
308 cmd_listener_attr_int_t buf;
309 msg.disclose((char *)&buf, sizeof(buf));
310 uint32_t id = buf.listener_id;
312 int ret = OP_SUCCESS;
314 auto it = m_listeners.find(id);
315 retv_if(it == m_listeners.end(), -EINVAL);
316 retvm_if(!has_privileges(ch->get_fd(), m_listeners[id]->get_required_privileges()),
317 -EACCES, "Permission denied[%d, %s]",
318 id, m_listeners[id]->get_required_privileges().c_str());
320 switch (buf.attribute) {
321 case SENSORD_ATTRIBUTE_INTERVAL:
322 ret = m_listeners[id]->set_interval(buf.value); break;
323 case SENSORD_ATTRIBUTE_MAX_BATCH_LATENCY:
324 ret = m_listeners[id]->set_max_batch_latency(buf.value); break;
325 case SENSORD_ATTRIBUTE_PASSIVE_MODE:
326 ret = m_listeners[id]->set_passive_mode(buf.value); break;
327 case SENSORD_ATTRIBUTE_PAUSE_POLICY:
328 case SENSORD_ATTRIBUTE_AXIS_ORIENTATION:
330 ret = m_listeners[id]->set_attribute(buf.attribute, buf.value);
332 /* TODO : check return value */
334 _D("Return : %d", ret);
336 ret = send_reply(ch, OP_SUCCESS);
338 if (m_listeners[id]->need_to_notify_attribute_changed()) {
339 m_listeners[id]->notify_attribute_changed(buf.attribute, buf.value);
340 m_listeners[id]->set_need_to_notify_attribute_changed(false);
346 int server_channel_handler::listener_set_attr_str(channel *ch, message &msg)
349 cmd_listener_attr_str_t *buf;
351 buf = (cmd_listener_attr_str_t *) new(std::nothrow) char[msg.size()];
352 retvm_if(!buf, -ENOMEM, "Failed to allocate memory");
354 msg.disclose((char *)buf, msg.size());
356 id = buf->listener_id;
357 auto it = m_listeners.find(id);
358 if (it == m_listeners.end()) {
363 if (!has_privileges(ch->get_fd(), m_listeners[id]->get_required_privileges())) {
364 _E("Permission denied[%d, %s]", id, m_listeners[id]->get_required_privileges().c_str());
369 int ret = m_listeners[id]->set_attribute(buf->attribute, buf->value, buf->len);
375 ret = send_reply(ch, OP_SUCCESS);
377 if (m_listeners[id]->need_to_notify_attribute_changed()) {
378 m_listeners[id]->notify_attribute_changed(buf->attribute, buf->value, buf->len);
379 m_listeners[id]->set_need_to_notify_attribute_changed(false);
386 int server_channel_handler::listener_get_attr_int(ipc::channel *ch, ipc::message &msg)
388 cmd_listener_attr_int_t buf;
389 msg.disclose((char *)&buf, sizeof(buf));
390 uint32_t id = buf.listener_id;
391 int attr = buf.attribute;
393 int ret = OP_SUCCESS;
395 auto it = m_listeners.find(id);
396 retv_if(it == m_listeners.end(), -EINVAL);
397 retvm_if(!has_privileges(ch->get_fd(), m_listeners[id]->get_required_privileges()),
398 -EACCES, "Permission denied[%d, %s]",
399 id, m_listeners[id]->get_required_privileges().c_str());
402 case SENSORD_ATTRIBUTE_INTERVAL:
403 ret = m_listeners[id]->get_interval(value); break;
404 case SENSORD_ATTRIBUTE_MAX_BATCH_LATENCY:
405 ret = m_listeners[id]->get_max_batch_latency(value); break;
406 case SENSORD_ATTRIBUTE_PASSIVE_MODE:
407 // TODO : Are these features required?
410 case SENSORD_ATTRIBUTE_PAUSE_POLICY:
411 case SENSORD_ATTRIBUTE_AXIS_ORIENTATION:
413 ret = m_listeners[id]->get_attribute(attr, &value);
416 if (ret != OP_SUCCESS) {
417 _E("Failed to listener_get_attr_int");
421 cmd_listener_attr_int_t ret_buf;
423 ret_buf.listener_id = id;
424 ret_buf.attribute = attr;
425 ret_buf.value = value;
427 reply.enclose((char *)&ret_buf, sizeof(ret_buf));
428 reply.header()->err = OP_SUCCESS;
429 reply.set_type(CMD_LISTENER_GET_ATTR_INT);
430 ret = ch->send_sync(reply);
435 int server_channel_handler::listener_get_attr_str(ipc::channel *ch, ipc::message &msg)
438 cmd_listener_attr_str_t *buf;
440 buf = (cmd_listener_attr_str_t *) new(std::nothrow) char[msg.size()];
441 retvm_if(!buf, -ENOMEM, "Failed to allocate memory");
443 msg.disclose((char *)buf, msg.size());
445 id = buf->listener_id;
446 auto it = m_listeners.find(id);
447 auto attr = buf->attribute;
450 if (it == m_listeners.end()) {
454 if (!has_privileges(ch->get_fd(), m_listeners[id]->get_required_privileges())) {
455 _E("Permission denied[%d, %s]", id, m_listeners[id]->get_required_privileges().c_str());
461 int ret = m_listeners[id]->get_attribute(attr, &value, &len);
463 if (ret != OP_SUCCESS) {
464 _E("Failed to listener_get_attr_str");
468 cmd_listener_attr_str_t *reply_buf;
469 size_t size = sizeof(cmd_listener_attr_str_t) + len;
470 reply_buf = (cmd_listener_attr_str_t *) new(std::nothrow) char[size];
471 retvm_if(!reply_buf, -ENOMEM, "Failed to allocate memory");
473 reply_buf->attribute = attr;
474 memcpy(reply_buf->value, value, len);
475 reply_buf->len = len;
479 reply.enclose((char *)reply_buf, size);
480 reply.set_type(CMD_LISTENER_GET_ATTR_STR);
482 ret = ch->send_sync(reply);
488 int server_channel_handler::listener_get_data(channel *ch, message &msg)
491 cmd_listener_get_data_t buf;
496 msg.disclose((char *)&buf, sizeof(buf));
497 id = buf.listener_id;
499 auto it = m_listeners.find(id);
500 retv_if(it == m_listeners.end(), -EINVAL);
501 retvm_if(!has_privileges(ch->get_fd(), m_listeners[id]->get_required_privileges()),
502 -EACCES, "Permission denied[%d, %s]",
503 id, m_listeners[id]->get_required_privileges().c_str());
505 int ret = m_listeners[id]->get_data(&data, &len);
506 retv_if(ret < 0, ret);
508 memcpy(&buf.data, data, sizeof(sensor_data_t));
509 buf.len = sizeof(sensor_data_t);
511 reply.enclose((const char *)&buf, sizeof(cmd_listener_get_data_t));
512 reply.header()->err = OP_SUCCESS;
513 reply.header()->type = CMD_LISTENER_GET_DATA;
515 ch->send_sync(reply);
522 int server_channel_handler::listener_get_data_list(ipc::channel *ch, ipc::message &msg)
525 cmd_listener_get_data_list_t buf;
530 msg.disclose((char *)&buf, sizeof(buf));
531 id = buf.listener_id;
533 auto it = m_listeners.find(id);
534 retv_if(it == m_listeners.end(), -EINVAL);
535 retvm_if(!has_privileges(ch->get_fd(), m_listeners[id]->get_required_privileges()),
536 -EACCES, "Permission denied[%d, %s]",
537 id, m_listeners[id]->get_required_privileges().c_str());
539 int ret = m_listeners[id]->get_data(&data, &len);
540 retv_if(ret < 0, ret);
542 size_t reply_size = sizeof(cmd_listener_get_data_list_t) + len;
543 cmd_listener_get_data_list_t* reply_buf = (cmd_listener_get_data_list_t *) malloc(reply_size);
545 _E("Failed to allocate memory");
550 memcpy(reply_buf->data, data, len);
551 reply_buf->len = len;
552 reply_buf->data_count = len / sizeof(sensor_data_t);
553 reply.enclose((const char *)reply_buf, reply_size);
554 reply.header()->err = OP_SUCCESS;
555 reply.header()->type = CMD_LISTENER_GET_DATA_LIST;
557 ch->send_sync(reply);
566 int server_channel_handler::provider_connect(channel *ch, message &msg)
570 info.deserialize(msg.body(), msg.size());
574 application_sensor_handler *sensor;
575 sensor = new(std::nothrow) application_sensor_handler(info, ch);
576 retvm_if(!sensor, -ENOMEM, "Failed to allocate memory");
578 if (!m_manager->register_sensor(sensor)) {
584 m_app_sensors[ch] = sensor;
586 return send_reply(ch, OP_SUCCESS);
589 int server_channel_handler::provider_publish(channel *ch, message &msg)
591 auto it = m_app_sensors.find(ch);
592 retv_if(it == m_app_sensors.end(), -EINVAL);
594 size_t size = msg.header()->length;
595 void *data = (void *)malloc(size);
596 retvm_if(!data, -ENOMEM, "Failed to allocate memory");
598 msg.disclose(data, size);
600 it->second->publish((sensor_data_t*)data, size);
604 int server_channel_handler::has_privileges(channel *ch, message &msg)
606 sensor_handler *sensor;
607 cmd_has_privilege_t buf;
608 msg.disclose((char *)&buf, sizeof(buf));
610 sensor = m_manager->get_sensor(buf.sensor);
611 retv_if(!sensor, OP_ERROR);
613 sensor_info info = sensor->get_sensor_info();
615 if (!has_privileges(ch->get_fd(), info.get_privilege()))
618 return send_reply(ch, OP_SUCCESS);
621 int server_channel_handler::send_reply(channel *ch, int error)
623 message reply(error);
624 retvm_if(!ch->send_sync(reply), OP_ERROR, "Failed to send reply");
628 bool server_channel_handler::has_privilege(int fd, std::string &priv)
630 static permission_checker checker;
631 return checker.has_permission(fd, priv);
634 bool server_channel_handler::has_privileges(int fd, std::string priv)
636 std::vector<std::string> privileges;
637 privileges = utils::tokenize(priv, PRIV_DELIMITER);
639 for (auto it = privileges.begin(); it != privileges.end(); ++it) {
640 if (!has_privilege(fd, *it))