/*
- * Copyright (c) 2014 Samsung Electronics Co., Ltd All Rights Reserved
+ * Copyright (c) 2014-2015 Samsung Electronics Co., Ltd All Rights Reserved
*
* Licensed under the Apache License, Version 2.0 (the "License");
* you may not use this file except in compliance with the License.
/**
* @file src/service/logic/Logic.cpp
* @author Lukasz Wojciechowski <l.wojciechow@partner.samsung.com>
+ * @author Zofia Abramowska <z.abramowska@samsung.com>
+ * @author Pawel Wieczorek <p.wieczorek2@samsung.com>
* @version 1.0
* @brief This file implements main class of logic layer in cynara service
*/
+#include <csignal>
+#include <cinttypes>
+#include <functional>
+#include <memory>
+#include <vector>
+
#include <log/log.h>
#include <common.h>
+#include <log/log.h>
#include <exceptions/BucketNotExistsException.h>
#include <exceptions/DatabaseException.h>
#include <exceptions/DefaultBucketDeletionException.h>
#include <exceptions/InvalidBucketIdException.h>
#include <exceptions/PluginErrorException.h>
#include <exceptions/PluginNotFoundException.h>
-
-#include <signal.h>
-
-#include <main/Cynara.h>
+#include <exceptions/UnexpectedErrorException.h>
+#include <exceptions/UnknownPolicyTypeException.h>
#include <request/AdminCheckRequest.h>
+#include <request/AgentActionRequest.h>
+#include <request/AgentRegisterRequest.h>
#include <request/CancelRequest.h>
#include <request/CheckRequest.h>
+#include <request/DescriptionListRequest.h>
+#include <request/EraseRequest.h>
#include <request/InsertOrUpdateBucketRequest.h>
+#include <request/ListRequest.h>
#include <request/RemoveBucketRequest.h>
#include <request/RequestContext.h>
#include <request/SetPoliciesRequest.h>
#include <request/SignalRequest.h>
+#include <request/SimpleCheckRequest.h>
+#include <response/AdminCheckResponse.h>
+#include <response/AgentRegisterResponse.h>
#include <response/CancelResponse.h>
#include <response/CheckResponse.h>
#include <response/CodeResponse.h>
-#include <storage/Storage.h>
+#include <response/DescriptionListResponse.h>
+#include <response/ListResponse.h>
+#include <response/SimpleCheckResponse.h>
+#include <types/Policy.h>
+#include <main/Cynara.h>
+#include <agent/AgentManager.h>
#include <sockets/SocketManager.h>
+#include <storage/Storage.h>
+
+#include <cynara-plugin.h>
+
+#include <cynara-agent.h>
#include "Logic.h"
namespace Cynara {
-Logic::Logic() {
+
+Logic::Logic() : m_dbCorrupted(false) {
}
Logic::~Logic() {
}
void Logic::execute(RequestContextPtr context, AdminCheckRequestPtr request) {
- PolicyResult result = m_storage->checkPolicy(request->key(), request->startBucket(),
- request->recursive());
+ PolicyResult result;
+ bool bucketValid = true;
- context->returnResponse(context, std::make_shared<CheckResponse>(result,
- request->sequenceNumber()));
+ if (m_dbCorrupted) {
+ bucketValid = false;
+ } else {
+ try {
+ result = m_storage->checkPolicy(request->key(), request->startBucket(),
+ request->recursive());
+ } catch (const BucketNotExistsException &ex) {
+ bucketValid = false;
+ }
+ }
+
+ context->returnResponse(context, std::make_shared<AdminCheckResponse>(result, bucketValid,
+ m_dbCorrupted, request->sequenceNumber()));
+}
+
+void Logic::execute(RequestContextPtr context, AgentActionRequestPtr request) {
+ AgentTalkerPtr talkerPtr = m_agentManager->getTalker(context->responseQueue(),
+ request->sequenceNumber());
+ if (!talkerPtr) {
+ LOGD("Received response from agent with invalid request id: [%" PRIu16 "]",
+ request->sequenceNumber());
+ return;
+ }
+
+ CheckContextPtr checkContextPtr = m_checkRequestManager.getContext(talkerPtr);
+ if (!checkContextPtr) {
+ LOGE("No matching check context for agent talker.");
+ m_agentManager->removeTalker(talkerPtr);
+ return;
+ }
+
+ if (!checkContextPtr->cancelled()) {
+ PluginData data(request->data().begin(), request->data().end());
+ if (request->type() == CYNARA_MSG_TYPE_CANCEL) {
+ // Nothing to do for now
+ } else if (request->type() == CYNARA_MSG_TYPE_ACTION) {
+ update(checkContextPtr->m_key, checkContextPtr->m_checkId, data,
+ checkContextPtr->m_requestContext, checkContextPtr->m_plugin);
+ } else {
+ LOGE("Invalid response type [%d] in response from agent <%s>",
+ static_cast<int>(request->type()), talkerPtr->agentType().c_str());
+ // TODO: disconnect agent
+ }
+ }
+
+ m_agentManager->removeTalker(talkerPtr);
+ m_checkRequestManager.removeRequest(checkContextPtr);
+}
+
+void Logic::execute(RequestContextPtr context, AgentRegisterRequestPtr request) {
+ auto result = m_agentManager->registerAgent(request->agentType(), context->responseQueue());
+ context->returnResponse(context, std::make_shared<AgentRegisterResponse>(
+ result, request->sequenceNumber()));
}
void Logic::execute(RequestContextPtr context, CancelRequestPtr request) {
- // MOCKUP
+ CheckContextPtr checkContextPtr = m_checkRequestManager.getContext(context->responseQueue(),
+ request->sequenceNumber());
+ if (!checkContextPtr) {
+ LOGD("Cancel request id: [%" PRIu16 "] with no matching request in progress.",
+ request->sequenceNumber());
+ return;
+ }
+
+ if (checkContextPtr->cancelled())
+ return;
+
+ checkContextPtr->cancel();
+ checkContextPtr->m_agentTalker->cancel();
+
+ LOGD("Returning response for cancel request id: [%" PRIu16 "].", request->sequenceNumber());
context->returnResponse(context, std::make_shared<CancelResponse>(request->sequenceNumber()));
}
void Logic::execute(RequestContextPtr context, CheckRequestPtr request) {
PolicyResult result(PredefinedPolicyType::DENY);
- if (check(context, request->key(), result)) {
+ if (check(context, request->key(), request->sequenceNumber(), result)) {
+ m_auditLog.log(request->key(), result);
context->returnResponse(context, std::make_shared<CheckResponse>(result,
request->sequenceNumber()));
}
}
-bool Logic::check(RequestContextPtr context UNUSED, const PolicyKey &key,
- PolicyResult& result) {
- result = m_storage->checkPolicy(key);
+bool Logic::check(const RequestContextPtr &context, const PolicyKey &key,
+ ProtocolFrameSequenceNumber checkId, PolicyResult &result) {
+
+ if (m_checkRequestManager.getContext(context->responseQueue(), checkId)) {
+ LOGE("Check request for checkId: [%" PRIu16 "] is already processing", checkId);
+ return false;
+ }
+
+ result = (m_dbCorrupted ? PredefinedPolicyType::DENY : m_storage->checkPolicy(key));
switch (result.policyType()) {
case PredefinedPolicyType::ALLOW :
return true;
}
+ return pluginCheck(context, key, checkId, result);
+}
+
+bool Logic::pluginCheck(const RequestContextPtr &context, const PolicyKey &key,
+ ProtocolFrameSequenceNumber checkId, PolicyResult &result) {
+
+ LOGD("Trying to check policy: <%s> in plugin.", key.toString().c_str());
+
ExternalPluginPtr plugin = m_pluginManager->getPlugin(result.policyType());
if (!plugin) {
- throw PluginNotFoundException(result);
+ LOGE("Plugin not found for policy: [0x%x]", result.policyType());
+ result = PolicyResult(PredefinedPolicyType::DENY);
+ return true;
+ }
+
+ ServicePluginInterfacePtr servicePlugin =
+ std::dynamic_pointer_cast<ServicePluginInterface>(plugin);
+ if (!servicePlugin) {
+ result = PolicyResult(PredefinedPolicyType::DENY);
+ return true;
}
AgentType requiredAgent;
PluginData pluginData;
- auto ret = plugin->check(key.client().toString(), key.user().toString(),
- key.privilege().toString(), result, requiredAgent, pluginData);
+ auto ret = servicePlugin->check(key.client().toString(), key.user().toString(),
+ key.privilege().toString(), result, requiredAgent, pluginData);
switch (ret) {
- case ExternalPluginInterface::PluginStatus::ANSWER_READY:
+ case ServicePluginInterface::PluginStatus::ANSWER_READY:
return true;
- case ExternalPluginInterface::PluginStatus::ANSWER_NOTREADY:
- //todo send request to agent
- //context should be saved in plugin in order to return answer when ready
+ case ServicePluginInterface::PluginStatus::ANSWER_NOTREADY: {
+ result = PolicyResult(PredefinedPolicyType::DENY);
+ AgentTalkerPtr agentTalker = m_agentManager->createTalker(requiredAgent);
+ if (!agentTalker) {
+ LOGE("Required agent talker for: <%s> could not be created.",
+ requiredAgent.c_str());
+ return true;
+ }
+
+ if (!m_checkRequestManager.createContext(key, context, checkId, servicePlugin,
+ agentTalker)) {
+ LOGE("Check context for checkId: [%" PRIu16 "] could not be created.",
+ checkId);
+ m_agentManager->removeTalker(agentTalker);
+ return true;
+ }
+ agentTalker->send(pluginData);
+ }
return false;
default:
+ result = PolicyResult(PredefinedPolicyType::DENY);
+ return true;
+ }
+}
+
+bool Logic::update(const PolicyKey &key, ProtocolFrameSequenceNumber checkId,
+ const PluginData &agentData, const RequestContextPtr &context,
+ const ServicePluginInterfacePtr &plugin) {
+
+ LOGD("Check update: <%s>:[%" PRIu16 "]", key.toString().c_str(), checkId);
+
+ PolicyResult result;
+ bool answerReady = false;
+ auto ret = plugin->update(key.client().toString(), key.user().toString(),
+ key.privilege().toString(), agentData, result);
+ switch (ret) {
+ case ServicePluginInterface::PluginStatus::SUCCESS:
+ answerReady = true;
+ break;
+ case ServicePluginInterface::PluginStatus::ERROR:
+ result = PolicyResult(PredefinedPolicyType::DENY);
+ answerReady = true;
+ break;
+ default:
throw PluginErrorException(key);
}
+
+ if (answerReady && context->responseQueue()) {
+ m_auditLog.log(key, result);
+ context->returnResponse(context, std::make_shared<CheckResponse>(result, checkId));
+ return true;
+ }
+
+ return false;
+}
+
+void Logic::execute(RequestContextPtr context, DescriptionListRequestPtr request) {
+ auto descriptions = m_pluginManager->getPolicyDescriptions();
+ descriptions.insert(descriptions.begin(), predefinedPolicyDescr.begin(),
+ predefinedPolicyDescr.end());
+ context->returnResponse(context, std::make_shared<DescriptionListResponse>(descriptions,
+ m_dbCorrupted, request->sequenceNumber()));
+}
+
+void Logic::execute(RequestContextPtr context, EraseRequestPtr request) {
+ auto code = CodeResponse::Code::OK;
+
+ if (m_dbCorrupted) {
+ code = CodeResponse::Code::DB_CORRUPTED;
+ } else {
+ try {
+ m_storage->erasePolicies(request->startBucket(), request->recursive(), request->filter());
+ onPoliciesChanged();
+ } catch (const DatabaseException &ex) {
+ code = CodeResponse::Code::FAILED;
+ } catch (const BucketNotExistsException &ex) {
+ code = CodeResponse::Code::NO_BUCKET;
+ }
+ }
+
+ context->returnResponse(context, std::make_shared<CodeResponse>(code,
+ request->sequenceNumber()));
}
void Logic::execute(RequestContextPtr context, InsertOrUpdateBucketRequestPtr request) {
auto code = CodeResponse::Code::OK;
- try {
- m_storage->addOrUpdateBucket(request->bucketId(), request->result());
- onPoliciesChanged();
- } catch (const DatabaseException &ex) {
- code = CodeResponse::Code::FAILED;
- } catch (const DefaultBucketSetNoneException &ex) {
- code = CodeResponse::Code::NOT_ALLOWED;
- } catch (const InvalidBucketIdException &ex) {
- code = CodeResponse::Code::NOT_ALLOWED;
+ if (m_dbCorrupted) {
+ code = CodeResponse::Code::DB_CORRUPTED;
+ } else {
+ try {
+ checkSinglePolicyType(request->result().policyType(), true, true);
+ m_storage->addOrUpdateBucket(request->bucketId(), request->result());
+ onPoliciesChanged();
+ } catch (const DatabaseException &ex) {
+ code = CodeResponse::Code::FAILED;
+ } catch (const DefaultBucketSetNoneException &ex) {
+ code = CodeResponse::Code::NOT_ALLOWED;
+ } catch (const InvalidBucketIdException &ex) {
+ code = CodeResponse::Code::NOT_ALLOWED;
+ } catch (const UnknownPolicyTypeException &ex) {
+ code = CodeResponse::Code::NO_POLICY_TYPE;
+ }
}
context->returnResponse(context, std::make_shared<CodeResponse>(code,
request->sequenceNumber()));
}
+void Logic::execute(RequestContextPtr context, ListRequestPtr request) {
+ bool bucketValid = true;
+ std::vector<Policy> policies;
+
+ if (m_dbCorrupted) {
+ bucketValid = false;
+ } else {
+ try {
+ policies = m_storage->listPolicies(request->bucket(), request->filter());
+ } catch (const BucketNotExistsException &ex) {
+ bucketValid = false;
+ }
+ }
+
+ context->returnResponse(context, std::make_shared<ListResponse>(policies, bucketValid,
+ m_dbCorrupted, request->sequenceNumber()));
+}
+
void Logic::execute(RequestContextPtr context, RemoveBucketRequestPtr request) {
auto code = CodeResponse::Code::OK;
- try {
- m_storage->deleteBucket(request->bucketId());
- onPoliciesChanged();
- } catch (const DatabaseException &ex) {
- code = CodeResponse::Code::FAILED;
- } catch (const BucketNotExistsException &ex) {
- code = CodeResponse::Code::NO_BUCKET;
- } catch (const DefaultBucketDeletionException &ex) {
- code = CodeResponse::Code::NOT_ALLOWED;
+
+ if (m_dbCorrupted) {
+ code = CodeResponse::Code::DB_CORRUPTED;
+ } else {
+ try {
+ m_storage->deleteBucket(request->bucketId());
+ onPoliciesChanged();
+ } catch (const DatabaseException &ex) {
+ code = CodeResponse::Code::FAILED;
+ } catch (const BucketNotExistsException &ex) {
+ code = CodeResponse::Code::NO_BUCKET;
+ } catch (const DefaultBucketDeletionException &ex) {
+ code = CodeResponse::Code::NOT_ALLOWED;
+ }
}
+
context->returnResponse(context, std::make_shared<CodeResponse>(code,
request->sequenceNumber()));
}
void Logic::execute(RequestContextPtr context, SetPoliciesRequestPtr request) {
auto code = CodeResponse::Code::OK;
- try {
- m_storage->insertPolicies(request->policiesToBeInsertedOrUpdated());
- m_storage->deletePolicies(request->policiesToBeRemoved());
- onPoliciesChanged();
- } catch (const DatabaseException &ex) {
- code = CodeResponse::Code::FAILED;
- } catch (const BucketNotExistsException &ex) {
- code = CodeResponse::Code::NO_BUCKET;
+
+ if (m_dbCorrupted) {
+ code = CodeResponse::Code::DB_CORRUPTED;
+ } else {
+ try {
+ checkPoliciesTypes(request->policiesToBeInsertedOrUpdated(), true, false);
+ m_storage->insertPolicies(request->policiesToBeInsertedOrUpdated());
+ m_storage->deletePolicies(request->policiesToBeRemoved());
+ onPoliciesChanged();
+ } catch (const DatabaseException &ex) {
+ code = CodeResponse::Code::FAILED;
+ } catch (const BucketNotExistsException &ex) {
+ code = CodeResponse::Code::NO_BUCKET;
+ } catch (const UnknownPolicyTypeException &ex) {
+ code = CodeResponse::Code::NO_POLICY_TYPE;
+ }
}
+
context->returnResponse(context, std::make_shared<CodeResponse>(code,
request->sequenceNumber()));
}
-void Logic::contextClosed(RequestContextPtr context UNUSED) {
- //We don't care now, but we will
+void Logic::execute(RequestContextPtr context, SimpleCheckRequestPtr request) {
+ int retValue = CYNARA_API_SUCCESS;
+ PolicyResult result;
+ PolicyKey key = request->key();
+ result = m_storage->checkPolicy(key);
+
+ switch (result.policyType()) {
+ case PredefinedPolicyType::ALLOW:
+ LOGD("simple check of policy key <%s> returned ALLOW", key.toString().c_str());
+ break;
+ case PredefinedPolicyType::DENY:
+ LOGD("simple check of policy key <%s> returned DENY", key.toString().c_str());
+ break;
+ default: {
+ ExternalPluginPtr plugin = m_pluginManager->getPlugin(result.policyType());
+ if (!plugin) {
+ LOGE("Plugin not found for policy: [0x%x]", result.policyType());
+ result = PolicyResult(PredefinedPolicyType::DENY);
+ retValue = CYNARA_API_SUCCESS;
+ break;
+ }
+
+ ServicePluginInterfacePtr servicePlugin =
+ std::dynamic_pointer_cast<ServicePluginInterface>(plugin);
+ if (!servicePlugin) {
+ LOGE("Couldn't cast plugin pointer to ServicePluginInterface");
+ result = PolicyResult(PredefinedPolicyType::DENY);
+ retValue = CYNARA_API_SUCCESS;
+ break;
+ }
+
+ AgentType requiredAgent;
+ PluginData pluginData;
+ auto ret = servicePlugin->check(key.client().toString(), key.user().toString(),
+ key.privilege().toString(), result, requiredAgent,
+ pluginData);
+ switch (ret) {
+ case ServicePluginInterface::PluginStatus::ANSWER_READY:
+ LOGD("simple check of policy key <%s> in plugin returned [" PRIu16 "]",
+ key.toString().c_str(), result.policyType());
+ break;
+ case ServicePluginInterface::PluginStatus::ANSWER_NOTREADY:
+ retValue = CYNARA_API_ACCESS_NOT_RESOLVED;
+ break;
+ default:
+ result = PolicyResult(PredefinedPolicyType::DENY);
+ retValue = CYNARA_API_SUCCESS;
+ }
+ }
+ }
+ m_auditLog.log(request->key(), result);
+ context->returnResponse(context, std::make_shared<SimpleCheckResponse>(retValue, result,
+ request->sequenceNumber()));
+}
+
+void Logic::checkPoliciesTypes(const std::map<PolicyBucketId, std::vector<Policy>> &policies,
+ bool allowBucket, bool allowNone) {
+ for (const auto &group : policies) {
+ for (const auto &policy : group.second) {
+ checkSinglePolicyType(policy.result().policyType(), allowBucket, allowNone);
+ }
+ }
+}
+
+void Logic::checkSinglePolicyType(const PolicyType &policyType, bool allowBucket, bool allowNone) {
+ if (allowBucket && policyType == PredefinedPolicyType::BUCKET)
+ return;
+ if (allowNone && policyType == PredefinedPolicyType::NONE)
+ return;
+ for (const auto &descr : predefinedPolicyDescr) {
+ if (descr.type == policyType)
+ return;
+ }
+ m_pluginManager->checkPolicyType(policyType);
+}
+
+void Logic::contextClosed(RequestContextPtr context) {
+ LOGD("context closed");
+
+ LinkId linkId = context->responseQueue();
+
+ m_agentManager->cleanupAgent(linkId, [&](const AgentTalkerPtr &talker) -> void {
+ handleAgentTalkerDisconnection(talker); });
+
+ m_checkRequestManager.cancelRequests(linkId,
+ [&](const CheckContextPtr &checkContextPtr) -> void {
+ handleClientDisconnection(checkContextPtr); });
}
void Logic::onPoliciesChanged(void) {
m_storage->save();
m_socketManager->disconnectAllClients();
+ m_pluginManager->invalidateAll();
//todo remove all saved contexts (if there will be any saved contexts)
}
+void Logic::handleAgentTalkerDisconnection(const AgentTalkerPtr &agentTalkerPtr) {
+ CheckContextPtr checkContextPtr = m_checkRequestManager.getContext(agentTalkerPtr);
+ if (checkContextPtr == nullptr) {
+ LOGE("No matching check context for agent talker.");
+ return;
+ }
+
+ if (!checkContextPtr->cancelled() && checkContextPtr->m_requestContext->responseQueue()) {
+ PolicyResult result(PredefinedPolicyType::DENY);
+ m_auditLog.log(checkContextPtr->m_key, result);
+ checkContextPtr->m_requestContext->returnResponse(checkContextPtr->m_requestContext,
+ std::make_shared<CheckResponse>(result, checkContextPtr->m_checkId));
+ }
+
+ m_checkRequestManager.removeRequest(checkContextPtr);
+}
+
+void Logic::handleClientDisconnection(const CheckContextPtr &checkContextPtr) {
+ LOGD("Handle client disconnection");
+
+ if (!checkContextPtr->cancelled()) {
+ checkContextPtr->cancel();
+ checkContextPtr->m_agentTalker->cancel();
+ }
+}
+
} // namespace Cynara