Prepare service for database corruption handling
[platform/core/security/cynara.git] / src / service / logic / Logic.cpp
index ca56d64..a6e3c12 100644 (file)
@@ -1,5 +1,5 @@
 /*
- * Copyright (c) 2014 Samsung Electronics Co., Ltd All Rights Reserved
+ * Copyright (c) 2014-2015 Samsung Electronics Co., Ltd All Rights Reserved
  *
  *    Licensed under the Apache License, Version 2.0 (the "License");
  *    you may not use this file except in compliance with the License.
 /**
  * @file        src/service/logic/Logic.cpp
  * @author      Lukasz Wojciechowski <l.wojciechow@partner.samsung.com>
+ * @author      Zofia Abramowska <z.abramowska@samsung.com>
+ * @author      Pawel Wieczorek <p.wieczorek2@samsung.com>
  * @version     1.0
  * @brief       This file implements main class of logic layer in cynara service
  */
 
+#include <csignal>
+#include <cinttypes>
+#include <functional>
+#include <memory>
+#include <vector>
+
 #include <log/log.h>
 #include <common.h>
+#include <log/log.h>
 #include <exceptions/BucketNotExistsException.h>
 #include <exceptions/DatabaseException.h>
 #include <exceptions/DefaultBucketDeletionException.h>
 #include <exceptions/InvalidBucketIdException.h>
 #include <exceptions/PluginErrorException.h>
 #include <exceptions/PluginNotFoundException.h>
-
-#include <signal.h>
-
-#include <main/Cynara.h>
+#include <exceptions/UnexpectedErrorException.h>
+#include <exceptions/UnknownPolicyTypeException.h>
 #include <request/AdminCheckRequest.h>
+#include <request/AgentActionRequest.h>
+#include <request/AgentRegisterRequest.h>
 #include <request/CancelRequest.h>
 #include <request/CheckRequest.h>
+#include <request/DescriptionListRequest.h>
+#include <request/EraseRequest.h>
 #include <request/InsertOrUpdateBucketRequest.h>
+#include <request/ListRequest.h>
 #include <request/RemoveBucketRequest.h>
 #include <request/RequestContext.h>
 #include <request/SetPoliciesRequest.h>
 #include <request/SignalRequest.h>
+#include <request/SimpleCheckRequest.h>
+#include <response/AdminCheckResponse.h>
+#include <response/AgentRegisterResponse.h>
 #include <response/CancelResponse.h>
 #include <response/CheckResponse.h>
 #include <response/CodeResponse.h>
-#include <storage/Storage.h>
+#include <response/DescriptionListResponse.h>
+#include <response/ListResponse.h>
+#include <response/SimpleCheckResponse.h>
+#include <types/Policy.h>
 
+#include <main/Cynara.h>
+#include <agent/AgentManager.h>
 #include <sockets/SocketManager.h>
+#include <storage/Storage.h>
+
+#include <cynara-plugin.h>
+
+#include <cynara-agent.h>
 
 #include "Logic.h"
 
 namespace Cynara {
-Logic::Logic() {
+
+Logic::Logic() : m_dbCorrupted(false) {
 }
 
 Logic::~Logic() {
@@ -69,29 +95,101 @@ void Logic::execute(RequestContextPtr context UNUSED, SignalRequestPtr request)
 }
 
 void Logic::execute(RequestContextPtr context, AdminCheckRequestPtr request) {
-    PolicyResult result = m_storage->checkPolicy(request->key(), request->startBucket(),
-                                                 request->recursive());
+    PolicyResult result;
+    bool bucketValid = true;
 
-    context->returnResponse(context, std::make_shared<CheckResponse>(result,
-                            request->sequenceNumber()));
+    if (m_dbCorrupted) {
+        bucketValid = false;
+    } else {
+        try {
+            result = m_storage->checkPolicy(request->key(), request->startBucket(),
+                                            request->recursive());
+        } catch (const BucketNotExistsException &ex) {
+            bucketValid = false;
+        }
+    }
+
+    context->returnResponse(context, std::make_shared<AdminCheckResponse>(result, bucketValid,
+                            m_dbCorrupted, request->sequenceNumber()));
+}
+
+void Logic::execute(RequestContextPtr context, AgentActionRequestPtr request) {
+    AgentTalkerPtr talkerPtr = m_agentManager->getTalker(context->responseQueue(),
+                                                         request->sequenceNumber());
+    if (!talkerPtr) {
+        LOGD("Received response from agent with invalid request id: [%" PRIu16 "]",
+             request->sequenceNumber());
+        return;
+    }
+
+    CheckContextPtr checkContextPtr = m_checkRequestManager.getContext(talkerPtr);
+    if (!checkContextPtr) {
+        LOGE("No matching check context for agent talker.");
+        m_agentManager->removeTalker(talkerPtr);
+        return;
+    }
+
+    if (!checkContextPtr->cancelled()) {
+        PluginData data(request->data().begin(), request->data().end());
+        if (request->type() == CYNARA_MSG_TYPE_CANCEL) {
+            // Nothing to do for now
+        } else if (request->type() == CYNARA_MSG_TYPE_ACTION) {
+            update(checkContextPtr->m_key, checkContextPtr->m_checkId, data,
+                   checkContextPtr->m_requestContext, checkContextPtr->m_plugin);
+        } else {
+            LOGE("Invalid response type [%d] in response from agent <%s>",
+                 static_cast<int>(request->type()), talkerPtr->agentType().c_str());
+            // TODO: disconnect agent
+        }
+    }
+
+    m_agentManager->removeTalker(talkerPtr);
+    m_checkRequestManager.removeRequest(checkContextPtr);
+}
+
+void Logic::execute(RequestContextPtr context, AgentRegisterRequestPtr request) {
+    auto result = m_agentManager->registerAgent(request->agentType(), context->responseQueue());
+    context->returnResponse(context, std::make_shared<AgentRegisterResponse>(
+                            result, request->sequenceNumber()));
 }
 
 void Logic::execute(RequestContextPtr context, CancelRequestPtr request) {
-    // MOCKUP
+    CheckContextPtr checkContextPtr = m_checkRequestManager.getContext(context->responseQueue(),
+                                                                       request->sequenceNumber());
+    if (!checkContextPtr) {
+        LOGD("Cancel request id: [%" PRIu16 "] with no matching request in progress.",
+             request->sequenceNumber());
+        return;
+    }
+
+    if (checkContextPtr->cancelled())
+        return;
+
+    checkContextPtr->cancel();
+    checkContextPtr->m_agentTalker->cancel();
+
+    LOGD("Returning response for cancel request id: [%" PRIu16 "].", request->sequenceNumber());
     context->returnResponse(context, std::make_shared<CancelResponse>(request->sequenceNumber()));
 }
 
 void Logic::execute(RequestContextPtr context, CheckRequestPtr request) {
     PolicyResult result(PredefinedPolicyType::DENY);
-    if (check(context, request->key(), result)) {
+    if (check(context, request->key(), request->sequenceNumber(), result)) {
+        m_auditLog.log(request->key(), result);
         context->returnResponse(context, std::make_shared<CheckResponse>(result,
                                 request->sequenceNumber()));
     }
 }
 
-bool Logic::check(RequestContextPtr context UNUSED, const PolicyKey &key,
-                  PolicyResult& result) {
-    result = m_storage->checkPolicy(key);
+bool Logic::check(const RequestContextPtr &context, const PolicyKey &key,
+                  ProtocolFrameSequenceNumber checkId, PolicyResult &result) {
+
+    if (m_checkRequestManager.getContext(context->responseQueue(), checkId)) {
+        LOGE("Check request for checkId: [%" PRIu16 "] is already processing", checkId);
+        return false;
+    }
+
+    result = (m_dbCorrupted ? PredefinedPolicyType::DENY : m_storage->checkPolicy(key));
 
     switch (result.policyType()) {
         case PredefinedPolicyType::ALLOW :
@@ -102,86 +200,330 @@ bool Logic::check(RequestContextPtr context UNUSED, const PolicyKey &key,
             return true;
     }
 
+    return pluginCheck(context, key, checkId, result);
+}
+
+bool Logic::pluginCheck(const RequestContextPtr &context, const PolicyKey &key,
+                        ProtocolFrameSequenceNumber checkId, PolicyResult &result) {
+
+    LOGD("Trying to check policy: <%s> in plugin.", key.toString().c_str());
+
     ExternalPluginPtr plugin = m_pluginManager->getPlugin(result.policyType());
     if (!plugin) {
-        throw PluginNotFoundException(result);
+        LOGE("Plugin not found for policy: [0x%x]", result.policyType());
+        result = PolicyResult(PredefinedPolicyType::DENY);
+        return true;
+    }
+
+    ServicePluginInterfacePtr servicePlugin =
+            std::dynamic_pointer_cast<ServicePluginInterface>(plugin);
+    if (!servicePlugin) {
+        result = PolicyResult(PredefinedPolicyType::DENY);
+        return true;
     }
 
     AgentType requiredAgent;
     PluginData pluginData;
 
-    auto ret = plugin->check(key.client().toString(), key.user().toString(),
-                             key.privilege().toString(), result, requiredAgent, pluginData);
+    auto ret = servicePlugin->check(key.client().toString(), key.user().toString(),
+                                    key.privilege().toString(), result, requiredAgent, pluginData);
 
     switch (ret) {
-        case ExternalPluginInterface::PluginStatus::ANSWER_READY:
+        case ServicePluginInterface::PluginStatus::ANSWER_READY:
             return true;
-        case ExternalPluginInterface::PluginStatus::ANSWER_NOTREADY:
-            //todo send request to agent
-            //context should be saved in plugin in order to return answer when ready
+        case ServicePluginInterface::PluginStatus::ANSWER_NOTREADY: {
+                result = PolicyResult(PredefinedPolicyType::DENY);
+                AgentTalkerPtr agentTalker = m_agentManager->createTalker(requiredAgent);
+                if (!agentTalker) {
+                    LOGE("Required agent talker for: <%s> could not be created.",
+                         requiredAgent.c_str());
+                    return true;
+                }
+
+                if (!m_checkRequestManager.createContext(key, context, checkId, servicePlugin,
+                                                         agentTalker)) {
+                    LOGE("Check context for checkId: [%" PRIu16 "] could not be created.",
+                         checkId);
+                    m_agentManager->removeTalker(agentTalker);
+                    return true;
+                }
+                agentTalker->send(pluginData);
+            }
             return false;
         default:
+            result = PolicyResult(PredefinedPolicyType::DENY);
+            return true;
+    }
+}
+
+bool Logic::update(const PolicyKey &key, ProtocolFrameSequenceNumber checkId,
+                   const PluginData &agentData, const RequestContextPtr &context,
+                   const ServicePluginInterfacePtr &plugin) {
+
+    LOGD("Check update: <%s>:[%" PRIu16 "]", key.toString().c_str(), checkId);
+
+    PolicyResult result;
+    bool answerReady = false;
+    auto ret = plugin->update(key.client().toString(), key.user().toString(),
+                              key.privilege().toString(), agentData, result);
+    switch (ret) {
+        case ServicePluginInterface::PluginStatus::SUCCESS:
+            answerReady = true;
+            break;
+        case ServicePluginInterface::PluginStatus::ERROR:
+            result = PolicyResult(PredefinedPolicyType::DENY);
+            answerReady = true;
+            break;
+        default:
             throw PluginErrorException(key);
     }
+
+    if (answerReady && context->responseQueue()) {
+        m_auditLog.log(key, result);
+        context->returnResponse(context, std::make_shared<CheckResponse>(result, checkId));
+        return true;
+    }
+
+    return false;
+}
+
+void Logic::execute(RequestContextPtr context, DescriptionListRequestPtr request) {
+    auto descriptions = m_pluginManager->getPolicyDescriptions();
+    descriptions.insert(descriptions.begin(), predefinedPolicyDescr.begin(),
+                        predefinedPolicyDescr.end());
+    context->returnResponse(context, std::make_shared<DescriptionListResponse>(descriptions,
+                            m_dbCorrupted, request->sequenceNumber()));
+}
+
+void Logic::execute(RequestContextPtr context, EraseRequestPtr request) {
+    auto code = CodeResponse::Code::OK;
+
+    if (m_dbCorrupted) {
+        code = CodeResponse::Code::DB_CORRUPTED;
+    } else {
+        try {
+            m_storage->erasePolicies(request->startBucket(), request->recursive(), request->filter());
+            onPoliciesChanged();
+        } catch (const DatabaseException &ex) {
+            code = CodeResponse::Code::FAILED;
+        } catch (const BucketNotExistsException &ex) {
+            code = CodeResponse::Code::NO_BUCKET;
+        }
+    }
+
+    context->returnResponse(context, std::make_shared<CodeResponse>(code,
+                            request->sequenceNumber()));
 }
 
 void Logic::execute(RequestContextPtr context, InsertOrUpdateBucketRequestPtr request) {
     auto code = CodeResponse::Code::OK;
 
-    try {
-        m_storage->addOrUpdateBucket(request->bucketId(), request->result());
-        onPoliciesChanged();
-    } catch (const DatabaseException &ex) {
-        code = CodeResponse::Code::FAILED;
-    } catch (const DefaultBucketSetNoneException &ex) {
-        code = CodeResponse::Code::NOT_ALLOWED;
-    } catch (const InvalidBucketIdException &ex) {
-        code = CodeResponse::Code::NOT_ALLOWED;
+    if (m_dbCorrupted) {
+        code = CodeResponse::Code::DB_CORRUPTED;
+    } else {
+        try {
+            checkSinglePolicyType(request->result().policyType(), true, true);
+            m_storage->addOrUpdateBucket(request->bucketId(), request->result());
+            onPoliciesChanged();
+        } catch (const DatabaseException &ex) {
+            code = CodeResponse::Code::FAILED;
+        } catch (const DefaultBucketSetNoneException &ex) {
+            code = CodeResponse::Code::NOT_ALLOWED;
+        } catch (const InvalidBucketIdException &ex) {
+            code = CodeResponse::Code::NOT_ALLOWED;
+        } catch (const UnknownPolicyTypeException &ex) {
+            code = CodeResponse::Code::NO_POLICY_TYPE;
+        }
     }
 
     context->returnResponse(context, std::make_shared<CodeResponse>(code,
                             request->sequenceNumber()));
 }
 
+void Logic::execute(RequestContextPtr context, ListRequestPtr request) {
+    bool bucketValid = true;
+    std::vector<Policy> policies;
+
+    if (m_dbCorrupted) {
+        bucketValid = false;
+    } else {
+        try {
+            policies = m_storage->listPolicies(request->bucket(), request->filter());
+        } catch (const BucketNotExistsException &ex) {
+            bucketValid = false;
+        }
+    }
+
+    context->returnResponse(context, std::make_shared<ListResponse>(policies, bucketValid,
+                            m_dbCorrupted, request->sequenceNumber()));
+}
+
 void Logic::execute(RequestContextPtr context, RemoveBucketRequestPtr request) {
     auto code = CodeResponse::Code::OK;
-    try {
-        m_storage->deleteBucket(request->bucketId());
-        onPoliciesChanged();
-    } catch (const DatabaseException &ex) {
-        code = CodeResponse::Code::FAILED;
-    } catch (const BucketNotExistsException &ex) {
-        code = CodeResponse::Code::NO_BUCKET;
-    } catch (const DefaultBucketDeletionException &ex) {
-        code = CodeResponse::Code::NOT_ALLOWED;
+
+    if (m_dbCorrupted) {
+        code = CodeResponse::Code::DB_CORRUPTED;
+    } else {
+        try {
+            m_storage->deleteBucket(request->bucketId());
+            onPoliciesChanged();
+        } catch (const DatabaseException &ex) {
+            code = CodeResponse::Code::FAILED;
+        } catch (const BucketNotExistsException &ex) {
+            code = CodeResponse::Code::NO_BUCKET;
+        } catch (const DefaultBucketDeletionException &ex) {
+            code = CodeResponse::Code::NOT_ALLOWED;
+        }
     }
+
     context->returnResponse(context, std::make_shared<CodeResponse>(code,
                             request->sequenceNumber()));
 }
 
 void Logic::execute(RequestContextPtr context, SetPoliciesRequestPtr request) {
     auto code = CodeResponse::Code::OK;
-    try {
-        m_storage->insertPolicies(request->policiesToBeInsertedOrUpdated());
-        m_storage->deletePolicies(request->policiesToBeRemoved());
-        onPoliciesChanged();
-    } catch (const DatabaseException &ex) {
-        code = CodeResponse::Code::FAILED;
-    } catch (const BucketNotExistsException &ex) {
-        code = CodeResponse::Code::NO_BUCKET;
+
+    if (m_dbCorrupted) {
+        code = CodeResponse::Code::DB_CORRUPTED;
+    } else {
+        try {
+            checkPoliciesTypes(request->policiesToBeInsertedOrUpdated(), true, false);
+            m_storage->insertPolicies(request->policiesToBeInsertedOrUpdated());
+            m_storage->deletePolicies(request->policiesToBeRemoved());
+            onPoliciesChanged();
+        } catch (const DatabaseException &ex) {
+            code = CodeResponse::Code::FAILED;
+        } catch (const BucketNotExistsException &ex) {
+            code = CodeResponse::Code::NO_BUCKET;
+        } catch (const UnknownPolicyTypeException &ex) {
+            code = CodeResponse::Code::NO_POLICY_TYPE;
+        }
     }
+
     context->returnResponse(context, std::make_shared<CodeResponse>(code,
                             request->sequenceNumber()));
 }
 
-void Logic::contextClosed(RequestContextPtr context UNUSED) {
-    //We don't care now, but we will
+void Logic::execute(RequestContextPtr context, SimpleCheckRequestPtr request) {
+    int retValue = CYNARA_API_SUCCESS;
+    PolicyResult result;
+    PolicyKey key = request->key();
+    result = m_storage->checkPolicy(key);
+
+    switch (result.policyType()) {
+    case PredefinedPolicyType::ALLOW:
+        LOGD("simple check of policy key <%s> returned ALLOW", key.toString().c_str());
+        break;
+    case PredefinedPolicyType::DENY:
+        LOGD("simple check of policy key <%s> returned DENY", key.toString().c_str());
+        break;
+    default: {
+        ExternalPluginPtr plugin = m_pluginManager->getPlugin(result.policyType());
+        if (!plugin) {
+            LOGE("Plugin not found for policy: [0x%x]", result.policyType());
+            result = PolicyResult(PredefinedPolicyType::DENY);
+            retValue = CYNARA_API_SUCCESS;
+            break;
+        }
+
+        ServicePluginInterfacePtr servicePlugin =
+                std::dynamic_pointer_cast<ServicePluginInterface>(plugin);
+        if (!servicePlugin) {
+            LOGE("Couldn't cast plugin pointer to ServicePluginInterface");
+            result = PolicyResult(PredefinedPolicyType::DENY);
+            retValue = CYNARA_API_SUCCESS;
+            break;
+        }
+
+        AgentType requiredAgent;
+        PluginData pluginData;
+        auto ret = servicePlugin->check(key.client().toString(), key.user().toString(),
+                                        key.privilege().toString(), result, requiredAgent,
+                                        pluginData);
+        switch (ret) {
+        case ServicePluginInterface::PluginStatus::ANSWER_READY:
+            LOGD("simple check of policy key <%s> in plugin returned [" PRIu16 "]",
+                 key.toString().c_str(), result.policyType());
+            break;
+        case ServicePluginInterface::PluginStatus::ANSWER_NOTREADY:
+            retValue = CYNARA_API_ACCESS_NOT_RESOLVED;
+            break;
+        default:
+            result = PolicyResult(PredefinedPolicyType::DENY);
+            retValue = CYNARA_API_SUCCESS;
+        }
+    }
+    }
+    m_auditLog.log(request->key(), result);
+    context->returnResponse(context, std::make_shared<SimpleCheckResponse>(retValue, result,
+                                                                  request->sequenceNumber()));
+}
+
+void Logic::checkPoliciesTypes(const std::map<PolicyBucketId, std::vector<Policy>> &policies,
+                               bool allowBucket, bool allowNone) {
+    for (const auto &group : policies) {
+        for (const auto &policy : group.second) {
+            checkSinglePolicyType(policy.result().policyType(), allowBucket, allowNone);
+        }
+    }
+}
+
+void Logic::checkSinglePolicyType(const PolicyType &policyType, bool allowBucket, bool allowNone) {
+    if (allowBucket && policyType == PredefinedPolicyType::BUCKET)
+        return;
+    if (allowNone && policyType == PredefinedPolicyType::NONE)
+        return;
+    for (const auto &descr : predefinedPolicyDescr) {
+        if (descr.type == policyType)
+            return;
+    }
+    m_pluginManager->checkPolicyType(policyType);
+}
+
+void Logic::contextClosed(RequestContextPtr context) {
+    LOGD("context closed");
+
+    LinkId linkId = context->responseQueue();
+
+    m_agentManager->cleanupAgent(linkId, [&](const AgentTalkerPtr &talker) -> void {
+                                 handleAgentTalkerDisconnection(talker); });
+
+    m_checkRequestManager.cancelRequests(linkId,
+                                         [&](const CheckContextPtr &checkContextPtr) -> void {
+                                         handleClientDisconnection(checkContextPtr); });
 }
 
 void Logic::onPoliciesChanged(void) {
     m_storage->save();
     m_socketManager->disconnectAllClients();
+    m_pluginManager->invalidateAll();
     //todo remove all saved contexts (if there will be any saved contexts)
 }
 
+void Logic::handleAgentTalkerDisconnection(const AgentTalkerPtr &agentTalkerPtr) {
+    CheckContextPtr checkContextPtr = m_checkRequestManager.getContext(agentTalkerPtr);
+    if (checkContextPtr == nullptr) {
+        LOGE("No matching check context for agent talker.");
+        return;
+    }
+
+    if (!checkContextPtr->cancelled() && checkContextPtr->m_requestContext->responseQueue()) {
+        PolicyResult result(PredefinedPolicyType::DENY);
+        m_auditLog.log(checkContextPtr->m_key, result);
+        checkContextPtr->m_requestContext->returnResponse(checkContextPtr->m_requestContext,
+                std::make_shared<CheckResponse>(result, checkContextPtr->m_checkId));
+    }
+
+    m_checkRequestManager.removeRequest(checkContextPtr);
+}
+
+void Logic::handleClientDisconnection(const CheckContextPtr &checkContextPtr) {
+    LOGD("Handle client disconnection");
+
+    if (!checkContextPtr->cancelled()) {
+        checkContextPtr->cancel();
+        checkContextPtr->m_agentTalker->cancel();
+    }
+}
+
 } // namespace Cynara