• Home
  • Line#
  • Scopes#
  • Navigate#
  • Raw
  • Download
1 /*
2  * Copyright (c) 2022 Huawei Device Co., Ltd.
3  * Licensed under the Apache License, Version 2.0 (the "License");
4  * you may not use this file except in compliance with the License.
5  * You may obtain a copy of the License at
6  *
7  *     http://www.apache.org/licenses/LICENSE-2.0
8  *
9  * Unless required by applicable law or agreed to in writing, software
10  * distributed under the License is distributed on an "AS IS" BASIS,
11  * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
12  * See the License for the specific language governing permissions and
13  * limitations under the License.
14  */
15 
16 #include "uri_permission_manager_client.h"
17 
18 #include "hilog_wrapper.h"
19 #include "if_system_ability_manager.h"
20 #include "iservice_registry.h"
21 #include "system_ability_definition.h"
22 
23 namespace OHOS {
24 namespace AAFwk {
GrantUriPermission(const Uri & uri,unsigned int flag,const Security::AccessToken::AccessTokenID fromTokenId,const Security::AccessToken::AccessTokenID targetTokenId)25 bool UriPermissionManagerClient::GrantUriPermission(const Uri &uri, unsigned int flag,
26     const Security::AccessToken::AccessTokenID fromTokenId, const Security::AccessToken::AccessTokenID targetTokenId)
27 {
28     HILOG_DEBUG("UriPermissionManagerClient::GrantUriPermission is called.");
29     auto uriPermMgr = ConnectUriPermService();
30     if (uriPermMgr) {
31         return uriPermMgr->GrantUriPermission(uri, flag, fromTokenId, targetTokenId);
32     }
33     return false;
34 }
35 
VerifyUriPermission(const Uri & uri,unsigned int flag,const Security::AccessToken::AccessTokenID tokenId)36 bool UriPermissionManagerClient::VerifyUriPermission(const Uri &uri, unsigned int flag,
37     const Security::AccessToken::AccessTokenID tokenId)
38 {
39     HILOG_DEBUG("UriPermissionManagerClient::VerifyUriPermission is called.");
40     auto uriPermMgr = ConnectUriPermService();
41     if (uriPermMgr) {
42         return uriPermMgr->VerifyUriPermission(uri, flag, tokenId);
43     }
44     return false;
45 }
46 
RemoveUriPermission(const Security::AccessToken::AccessTokenID tokenId)47 void UriPermissionManagerClient::RemoveUriPermission(const Security::AccessToken::AccessTokenID tokenId)
48 {
49     HILOG_DEBUG("UriPermissionManagerClient::RemoveUriPermission is called.");
50     auto uriPermMgr = ConnectUriPermService();
51     if (uriPermMgr) {
52         uriPermMgr->RemoveUriPermission(tokenId);
53     }
54 }
55 
ConnectUriPermService()56 sptr<IUriPermissionManager> UriPermissionManagerClient::ConnectUriPermService()
57 {
58     HILOG_DEBUG("UriPermissionManagerClient::ConnectUriPermService is called.");
59     std::lock_guard<std::mutex> lock(mutex_);
60     if (uriPermMgr_ == nullptr) {
61         auto systemAbilityMgr = SystemAbilityManagerClient::GetInstance().GetSystemAbilityManager();
62         if (!systemAbilityMgr) {
63             HILOG_ERROR("Failed to get SystemAbilityManager.");
64             return nullptr;
65         }
66 
67         auto remoteObj = systemAbilityMgr->GetSystemAbility(URI_PERMISSION_MGR_SERVICE_ID);
68         if (!remoteObj || (uriPermMgr_ = iface_cast<IUriPermissionManager>(remoteObj)) == nullptr) {
69             HILOG_ERROR("Failed to get UriPermService.");
70             return nullptr;
71         }
72         auto self = shared_from_this();
73         const auto& onClearProxyCallback = [self] {
74             if (self) {
75                 self->ClearProxy();
76             }
77         };
78         sptr<UpmsDeathRecipient> recipient(new UpmsDeathRecipient(onClearProxyCallback));
79         uriPermMgr_->AsObject()->AddDeathRecipient(recipient);
80     }
81     HILOG_DEBUG("End UriPermissionManagerClient::ConnectUriPermService.");
82     return uriPermMgr_;
83 }
84 
ClearProxy()85 void UriPermissionManagerClient::ClearProxy()
86 {
87     HILOG_DEBUG("UriPermissionManagerClient::ClearProxy is called.");
88     std::lock_guard<std::mutex> lock(mutex_);
89     uriPermMgr_ = nullptr;
90 }
91 
OnRemoteDied(const wptr<IRemoteObject> & remote)92 void UriPermissionManagerClient::UpmsDeathRecipient::OnRemoteDied([[maybe_unused]] const wptr<IRemoteObject>& remote)
93 {
94     HILOG_ERROR("upms stub died.");
95     proxy_();
96 }
97 }  // namespace AAFwk
98 }  // namespace OHOS
99