4 * Copyright (c) 2017 Samsung Electronics Co., Ltd.
6 * Licensed under the Apache License, Version 2.0 (the "License");
7 * you may not use this file except in compliance with the License.
8 * You may obtain a copy of the License at
10 * http://www.apache.org/licenses/LICENSE-2.0
12 * Unless required by applicable law or agreed to in writing, software
13 * distributed under the License is distributed on an "AS IS" BASIS,
14 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
15 * See the License for the specific language governing permissions and
16 * limitations under the License.
20 #include "server_channel_handler.h"
22 #include <sensor_log.h>
23 #include <sensor_info.h>
24 #include <sensor_handler.h>
25 #include <sensor_utils.h>
26 #include <command_types.h>
28 #include "permission_checker.h"
30 #define PRIV_DELIMINATOR ";"
32 using namespace sensor;
35 server_channel_handler::server_channel_handler(sensor_manager *manager)
40 server_channel_handler::~server_channel_handler()
44 void server_channel_handler::connected(channel *ch)
48 void server_channel_handler::disconnected(channel *ch)
50 auto it = m_listener_ids.find(ch);
51 ret_if(it == m_listener_ids.end());
53 _I("Disconnected listener[%u]", it->second);
55 delete m_listeners[it->second];
56 m_listeners.erase(it->second);
57 m_listener_ids.erase(ch);
60 void server_channel_handler::read(channel *ch, message &msg)
65 case CMD_MANAGER_SENSOR_LIST:
66 err = manager_get_sensor_list(ch, msg); break;
67 case CMD_LISTENER_CONNECT:
68 err = listener_connect(ch, msg); break;
69 case CMD_LISTENER_DISCONNECT:
70 err = listener_disconnect(ch, msg); break;
71 case CMD_LISTENER_START:
72 err = listener_start(ch, msg); break;
73 case CMD_LISTENER_STOP:
74 err = listener_stop(ch, msg); break;
75 case CMD_LISTENER_ATTR_INT:
76 err = listener_attr_int(ch, msg); break;
77 case CMD_LISTENER_ATTR_STR:
78 err = listener_attr_str(ch, msg); break;
79 case CMD_LISTENER_GET_DATA:
80 err = listener_get_data(ch, msg); break;
81 case CMD_PROVIDER_CONNECT:
82 err = provider_connect(ch, msg); break;
83 case CMD_PROVIDER_DISCONNECT:
84 err = provider_disconnect(ch, msg); break;
85 case CMD_PROVIDER_PUBLISH:
86 err = provider_post(ch, msg); break;
87 case CMD_HAS_PRIVILEGE:
88 err = has_privileges(ch, msg); break;
94 ch->send_sync(&reply);
98 int server_channel_handler::manager_get_sensor_list(channel *ch, message &msg)
104 size = m_manager->serialize(ch->get_fd(), &bytes);
105 retv_if(size < 0, size);
107 reply.enclose((const char *)bytes, size);
108 reply.header()->err = OP_SUCCESS;
109 ch->send_sync(&reply);
116 int server_channel_handler::listener_connect(channel *ch, message &msg)
118 static uint32_t listener_id = 1;
119 cmd_listener_connect_t buf;
121 msg.disclose((char *)&buf);
123 sensor_listener_proxy *listener;
124 listener = new(std::nothrow) sensor_listener_proxy(listener_id,
125 buf.sensor, m_manager, ch);
126 retvm_if(!listener, OP_ERROR, "Failed to allocate memory");
127 retvm_if(!has_privileges(ch->get_fd(), listener->get_required_privileges()),
128 -EACCES, "Permission denied");
130 buf.listener_id = listener_id;
133 reply.enclose((const char *)&buf, sizeof(buf));
134 reply.header()->err = OP_SUCCESS;
136 if (!ch->send_sync(&reply))
139 _I("Connected sensor_listener[fd(%d) -> id(%u)]", ch->get_fd(), listener_id);
140 m_listeners[listener_id] = listener;
141 m_listener_ids[ch] = listener_id;
147 int server_channel_handler::listener_disconnect(channel *ch, message &msg)
149 auto it = m_listener_ids.find(ch);
150 retv_if(it == m_listener_ids.end(), -EINVAL);
152 uint32_t id = it->second;
154 retvm_if(!has_privileges(ch->get_fd(), m_listeners[id]->get_required_privileges()),
155 -EACCES, "Permission denied");
157 delete m_listeners[id];
158 m_listeners.erase(id);
159 m_listener_ids.erase(ch);
161 _D("Disconnected sensor_listener[%u]", id);
163 return send_reply(ch, OP_SUCCESS);
166 int server_channel_handler::listener_start(channel *ch, message &msg)
168 cmd_listener_start_t buf;
169 msg.disclose((char *)&buf);
170 uint32_t id = buf.listener_id;
172 auto it = m_listeners.find(id);
173 retv_if(it == m_listeners.end(), -EINVAL);
174 retvm_if(!has_privileges(ch->get_fd(), m_listeners[id]->get_required_privileges()),
175 -EACCES, "Permission denied");
177 int ret = m_listeners[id]->start();
178 retv_if(ret < 0, ret);
180 return send_reply(ch, OP_SUCCESS);
183 int server_channel_handler::listener_stop(channel *ch, message &msg)
185 cmd_listener_stop_t buf;
186 msg.disclose((char *)&buf);
187 uint32_t id = buf.listener_id;
189 auto it = m_listeners.find(id);
190 retv_if(it == m_listeners.end(), -EINVAL);
191 retvm_if(!has_privileges(ch->get_fd(), m_listeners[id]->get_required_privileges()),
192 -EACCES, "Permission denied");
194 int ret = m_listeners[id]->stop();
195 retv_if(ret < 0, ret);
197 return send_reply(ch, OP_SUCCESS);
200 int server_channel_handler::listener_attr_int(channel *ch, message &msg)
202 cmd_listener_attr_int_t buf;
203 msg.disclose((char *)&buf);
204 uint32_t id = buf.listener_id;
206 int ret = OP_SUCCESS;
208 auto it = m_listeners.find(id);
209 retv_if(it == m_listeners.end(), -EINVAL);
210 retvm_if(!has_privileges(ch->get_fd(), m_listeners[id]->get_required_privileges()),
211 -EACCES, "Permission denied");
213 switch (buf.attribute) {
214 case SENSORD_ATTRIBUTE_INTERVAL:
215 ret = m_listeners[id]->set_interval(buf.value); break;
216 case SENSORD_ATTRIBUTE_MAX_BATCH_LATENCY:
217 ret = m_listeners[id]->set_max_batch_latency(buf.value); break;
218 case SENSORD_ATTRIBUTE_PASSIVE_MODE:
219 ret = m_listeners[id]->set_passive_mode(buf.value); break;
220 case SENSORD_ATTRIBUTE_PAUSE_POLICY:
221 case SENSORD_ATTRIBUTE_AXIS_ORIENTATION:
223 ret = m_listeners[id]->set_attribute(buf.attribute, buf.value);
225 /* TODO : check return value */
227 _W("Return : %d", ret);
229 return send_reply(ch, OP_SUCCESS);
232 int server_channel_handler::listener_attr_str(channel *ch, message &msg)
234 cmd_listener_attr_str_t buf;
235 msg.disclose((char *)&buf);
236 uint32_t id = buf.listener_id;
238 auto it = m_listeners.find(id);
239 retv_if(it == m_listeners.end(), -EINVAL);
240 retvm_if(!has_privileges(ch->get_fd(), m_listeners[id]->get_required_privileges()),
241 -EACCES, "Permission denied");
243 int ret = m_listeners[id]->set_attribute(buf.attribute, buf.value, buf.len);
244 retv_if(ret < 0, ret);
246 return send_reply(ch, OP_SUCCESS);
249 int server_channel_handler::listener_get_data(channel *ch, message &msg)
252 cmd_listener_get_data_t buf;
257 msg.disclose((char *)&buf);
258 id = buf.listener_id;
260 auto it = m_listeners.find(id);
261 retv_if(it == m_listeners.end(), -EINVAL);
262 retvm_if(!has_privileges(ch->get_fd(), m_listeners[id]->get_required_privileges()),
263 -EACCES, "Permission denied");
265 int ret = m_listeners[id]->get_data(&data, &len);
266 retv_if(ret < 0, ret);
268 memcpy(&buf.data, data, sizeof(sensor_data_t));
269 buf.len = sizeof(sensor_data_t);
271 reply.enclose((const char *)&buf, sizeof(cmd_listener_get_data_t));
272 reply.header()->err = OP_SUCCESS;
273 reply.header()->type = CMD_LISTENER_GET_DATA;
275 ch->send_sync(&reply);
282 int server_channel_handler::provider_connect(channel *ch, message &msg)
284 return send_reply(ch, OP_ERROR);
287 int server_channel_handler::provider_disconnect(channel *ch, message &msg)
289 return send_reply(ch, OP_ERROR);
292 int server_channel_handler::provider_post(channel *ch, message &msg)
294 return send_reply(ch, OP_ERROR);
297 int server_channel_handler::has_privileges(channel *ch, message &msg)
299 sensor_handler *sensor;
300 cmd_has_privilege_t buf;
301 msg.disclose((char *)&buf);
303 sensor = m_manager->get_sensor(buf.sensor);
304 retv_if(!sensor, OP_ERROR);
306 sensor_info info = sensor->get_sensor_info();
308 if (!has_privileges(ch->get_fd(), info.get_privilege()))
311 return send_reply(ch, OP_SUCCESS);
314 int server_channel_handler::send_reply(channel *ch, int error)
316 message reply(error);
317 retvm_if(!ch->send_sync(&reply), OP_ERROR, "Failed to send reply");
321 bool server_channel_handler::has_privilege(int fd, std::string &priv)
323 static permission_checker checker;
324 return checker.has_permission(fd, priv);
327 bool server_channel_handler::has_privileges(int fd, std::string priv)
329 std::vector<std::string> privileges;
330 privileges = utils::tokenize(priv, PRIV_DELIMINATOR);
332 for (auto it = privileges.begin(); it != privileges.end(); ++it) {
333 if (!has_privilege(fd, *it))