1 /*
2 * Copyright (c) 2022 Huawei Device Co., Ltd.
3 * Licensed under the Apache License, Version 2.0 (the "License");
4 * you may not use this file except in compliance with the License.
5 * You may obtain a copy of the License at
6 *
7 * http://www.apache.org/licenses/LICENSE-2.0
8 *
9 * Unless required by applicable law or agreed to in writing, software
10 * distributed under the License is distributed on an "AS IS" BASIS,
11 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
12 * See the License for the specific language governing permissions and
13 * limitations under the License.
14 */
15
16 #include "uri_permission_manager_client.h"
17
18 #include "hilog_wrapper.h"
19 #include "if_system_ability_manager.h"
20 #include "iservice_registry.h"
21 #include "system_ability_definition.h"
22
23 namespace OHOS {
24 namespace AAFwk {
GrantUriPermission(const Uri & uri,unsigned int flag,const Security::AccessToken::AccessTokenID fromTokenId,const Security::AccessToken::AccessTokenID targetTokenId)25 bool UriPermissionManagerClient::GrantUriPermission(const Uri &uri, unsigned int flag,
26 const Security::AccessToken::AccessTokenID fromTokenId, const Security::AccessToken::AccessTokenID targetTokenId)
27 {
28 HILOG_DEBUG("UriPermissionManagerClient::GrantUriPermission is called.");
29 auto uriPermMgr = ConnectUriPermService();
30 if (uriPermMgr) {
31 return uriPermMgr->GrantUriPermission(uri, flag, fromTokenId, targetTokenId);
32 }
33 return false;
34 }
35
VerifyUriPermission(const Uri & uri,unsigned int flag,const Security::AccessToken::AccessTokenID tokenId)36 bool UriPermissionManagerClient::VerifyUriPermission(const Uri &uri, unsigned int flag,
37 const Security::AccessToken::AccessTokenID tokenId)
38 {
39 HILOG_DEBUG("UriPermissionManagerClient::VerifyUriPermission is called.");
40 auto uriPermMgr = ConnectUriPermService();
41 if (uriPermMgr) {
42 return uriPermMgr->VerifyUriPermission(uri, flag, tokenId);
43 }
44 return false;
45 }
46
RemoveUriPermission(const Security::AccessToken::AccessTokenID tokenId)47 void UriPermissionManagerClient::RemoveUriPermission(const Security::AccessToken::AccessTokenID tokenId)
48 {
49 HILOG_DEBUG("UriPermissionManagerClient::RemoveUriPermission is called.");
50 auto uriPermMgr = ConnectUriPermService();
51 if (uriPermMgr) {
52 uriPermMgr->RemoveUriPermission(tokenId);
53 }
54 }
55
ConnectUriPermService()56 sptr<IUriPermissionManager> UriPermissionManagerClient::ConnectUriPermService()
57 {
58 HILOG_DEBUG("UriPermissionManagerClient::ConnectUriPermService is called.");
59 std::lock_guard<std::mutex> lock(mutex_);
60 if (uriPermMgr_ == nullptr) {
61 auto systemAbilityMgr = SystemAbilityManagerClient::GetInstance().GetSystemAbilityManager();
62 if (!systemAbilityMgr) {
63 HILOG_ERROR("Failed to get SystemAbilityManager.");
64 return nullptr;
65 }
66
67 auto remoteObj = systemAbilityMgr->GetSystemAbility(URI_PERMISSION_MGR_SERVICE_ID);
68 if (!remoteObj || (uriPermMgr_ = iface_cast<IUriPermissionManager>(remoteObj)) == nullptr) {
69 HILOG_ERROR("Failed to get UriPermService.");
70 return nullptr;
71 }
72 auto self = shared_from_this();
73 const auto& onClearProxyCallback = [self] {
74 if (self) {
75 self->ClearProxy();
76 }
77 };
78 sptr<UpmsDeathRecipient> recipient(new UpmsDeathRecipient(onClearProxyCallback));
79 uriPermMgr_->AsObject()->AddDeathRecipient(recipient);
80 }
81 HILOG_DEBUG("End UriPermissionManagerClient::ConnectUriPermService.");
82 return uriPermMgr_;
83 }
84
ClearProxy()85 void UriPermissionManagerClient::ClearProxy()
86 {
87 HILOG_DEBUG("UriPermissionManagerClient::ClearProxy is called.");
88 std::lock_guard<std::mutex> lock(mutex_);
89 uriPermMgr_ = nullptr;
90 }
91
OnRemoteDied(const wptr<IRemoteObject> & remote)92 void UriPermissionManagerClient::UpmsDeathRecipient::OnRemoteDied([[maybe_unused]] const wptr<IRemoteObject>& remote)
93 {
94 HILOG_ERROR("upms stub died.");
95 proxy_();
96 }
97 } // namespace AAFwk
98 } // namespace OHOS
99