1 /*
2 * Copyright (c) 2022 Huawei Device Co., Ltd.
3 * Licensed under the Apache License, Version 2.0 (the "License");
4 * you may not use this file except in compliance with the License.
5 * You may obtain a copy of the License at
6 *
7 * http://www.apache.org/licenses/LICENSE-2.0
8 *
9 * Unless required by applicable law or agreed to in writing, software
10 * distributed under the License is distributed on an "AS IS" BASIS,
11 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
12 * See the License for the specific language governing permissions and
13 * limitations under the License.
14 */
15 #define LOG_TAG "UdmfServiceClient"
16 #include "udmf_service_client.h"
17
18 #include "iservice_registry.h"
19 #include "datamgr_service_proxy.h"
20 #include "system_ability_definition.h"
21 #include "udmf_utils.h"
22 #include "unified_data_helper.h"
23
24 #include "logger.h"
25
26 namespace OHOS {
27 namespace UDMF {
28 std::shared_ptr<UdmfServiceClient> UdmfServiceClient::instance_;
29 std::mutex UdmfServiceClient::mutex_;
30 sptr<DistributedKv::IKvStoreDataService> UdmfServiceClient::kvDataServiceProxy_;
31
UdmfServiceClient(const sptr<UdmfServiceProxy> & proxy)32 UdmfServiceClient::UdmfServiceClient(const sptr<UdmfServiceProxy> &proxy) : udmfProxy_(proxy)
33 {
34 LOG_INFO(UDMF_SERVICE, "construct");
35 }
36
GetInstance()37 std::shared_ptr<UdmfServiceClient> UdmfServiceClient::GetInstance()
38 {
39 std::lock_guard<decltype(mutex_)> lockGuard(mutex_);
40 if (instance_ != nullptr) {
41 return instance_;
42 }
43 sptr<DistributedKv::IKvStoreDataService> ability = GetDistributedKvDataService();
44 if (ability == nullptr) {
45 return nullptr;
46 }
47 sptr<IRemoteObject> service = ability->GetFeatureInterface("udmf");
48 if (service == nullptr) {
49 return nullptr;
50 }
51 sptr<UdmfServiceProxy> proxy = iface_cast<UdmfServiceProxy>(service);
52 if (proxy == nullptr) {
53 return nullptr;
54 }
55 instance_ = std::make_shared<UdmfServiceClient>(proxy);
56 return instance_;
57 }
58
GetDistributedKvDataService()59 sptr<DistributedKv::IKvStoreDataService> UdmfServiceClient::GetDistributedKvDataService()
60 {
61 if (kvDataServiceProxy_ != nullptr) {
62 return kvDataServiceProxy_;
63 }
64 LOG_INFO(UDMF_SERVICE, "create remote proxy.");
65 auto samgr = SystemAbilityManagerClient::GetInstance().GetSystemAbilityManager();
66 if (samgr == nullptr) {
67 LOG_ERROR(UDMF_SERVICE, "get samgr fail.");
68 return nullptr;
69 }
70
71 auto remote = samgr->CheckSystemAbility(DISTRIBUTED_KV_DATA_SERVICE_ABILITY_ID);
72 kvDataServiceProxy_ = iface_cast<DistributedKv::DataMgrServiceProxy>(remote);
73 if (kvDataServiceProxy_ == nullptr) {
74 LOG_ERROR(UDMF_SERVICE, "initialize proxy failed.");
75 return nullptr;
76 }
77 sptr<UdmfServiceClient::ServiceDeathRecipient> deathRecipientPtr = new (std::nothrow)ServiceDeathRecipient();
78 if (deathRecipientPtr == nullptr) {
79 return nullptr;
80 }
81 if ((remote->IsProxyObject()) && (!remote->AddDeathRecipient(deathRecipientPtr))) {
82 LOG_ERROR(UDMF_SERVICE, "Add death recipient fail!");
83 }
84 return kvDataServiceProxy_;
85 }
86
ServiceDeathRecipient()87 UdmfServiceClient::ServiceDeathRecipient::ServiceDeathRecipient()
88 {
89 LOG_INFO(UDMF_SERVICE, "Construct!");
90 }
91
~ServiceDeathRecipient()92 UdmfServiceClient::ServiceDeathRecipient::~ServiceDeathRecipient()
93 {
94 LOG_INFO(UDMF_SERVICE, "Destruct!");
95 }
96
OnRemoteDied(const wptr<IRemoteObject> & remote)97 void UdmfServiceClient::ServiceDeathRecipient::OnRemoteDied(const wptr<IRemoteObject> &remote)
98 {
99 LOG_WARN(UDMF_SERVICE, "DistributedDataService die!");
100 std::lock_guard<decltype(mutex_)> lockGuard(mutex_);
101 kvDataServiceProxy_ = nullptr;
102 instance_ = nullptr;
103 }
104
SetData(CustomOption & option,UnifiedData & unifiedData,std::string & key)105 int32_t UdmfServiceClient::SetData(CustomOption &option, UnifiedData &unifiedData, std::string &key)
106 {
107 LOG_DEBUG(UDMF_SERVICE, "start, tag: %{public}d", option.intention);
108 if (!UnifiedDataUtils::IsValidIntention(option.intention)) {
109 LOG_ERROR(UDMF_SERVICE, "Invalid intention");
110 return E_INVALID_PARAMETERS;
111 }
112
113 if (!unifiedData.IsValid()) {
114 LOG_ERROR(UDMF_SERVICE, "UnifiedData is invalid.");
115 return E_INVALID_PARAMETERS;
116 }
117 bool isSaInvoke = UTILS::IsTokenNative();
118 if (isSaInvoke && unifiedData.HasFileType()) {
119 LOG_ERROR(UDMF_SERVICE, "The setting data initiated by the SA cannot contain the file type");
120 return E_INVALID_PARAMETERS;
121 }
122 if (UnifiedDataHelper::ExceedKVSizeLimit(unifiedData)) {
123 auto status = UnifiedDataHelper::ProcessBigData(unifiedData, option.intention, isSaInvoke);
124 if (status != E_OK) {
125 LOG_ERROR(UDMF_SERVICE, "Process big data error, status = %{public}d", status);
126 return status;
127 }
128 }
129 return udmfProxy_->SetData(option, unifiedData, key);
130 }
131
GetData(const QueryOption & query,UnifiedData & unifiedData)132 int32_t UdmfServiceClient::GetData(const QueryOption &query, UnifiedData &unifiedData)
133 {
134 LOG_DEBUG(UDMF_SERVICE, "start, tag: %{public}s", query.key.c_str());
135 UnifiedKey key(query.key);
136 if (!key.IsValid()) {
137 LOG_ERROR(UDMF_SERVICE, "invalid key");
138 return E_INVALID_PARAMETERS;
139 }
140
141 auto err = udmfProxy_->GetData(query, unifiedData);
142 if (err == E_OK) {
143 if (UnifiedDataHelper::IsTempUData(unifiedData)) {
144 if (!UnifiedDataHelper::Unpack(unifiedData)) {
145 LOG_ERROR(UDMF_SERVICE, "failed to unpack unified data");
146 return E_FS_ERROR;
147 }
148 }
149 }
150 return err;
151 }
152
GetBatchData(const QueryOption & query,std::vector<UnifiedData> & unifiedDataSet)153 int32_t UdmfServiceClient::GetBatchData(const QueryOption &query, std::vector<UnifiedData> &unifiedDataSet)
154 {
155 LOG_DEBUG(UDMF_SERVICE, "start, tag: intention = %{public}d, key = %{public}s", query.intention, query.key.c_str());
156 auto find = UD_INTENTION_MAP.find(query.intention);
157 std::string intention = find == UD_INTENTION_MAP.end() ? intention : find->second;
158 UnifiedKey key(query.key);
159 if (!UnifiedDataUtils::IsValidOptions(key, intention)) {
160 LOG_ERROR(UDMF_SERVICE, "invalid option, query.key: %{public}s, intention: %{public}s", query.key.c_str(),
161 intention.c_str());
162 return E_INVALID_PARAMETERS;
163 }
164 std::vector<UnifiedData> tempDataSet {};
165 auto err = udmfProxy_->GetBatchData(query, tempDataSet);
166 if (err != E_OK) {
167 return err;
168 }
169 for (auto &data : tempDataSet) {
170 if (UnifiedDataHelper::IsTempUData(data)) {
171 if (!UnifiedDataHelper::Unpack(data)) {
172 LOG_ERROR(UDMF_SERVICE, "failed to unpack unified data");
173 return E_FS_ERROR;
174 }
175 }
176 unifiedDataSet.emplace_back(data);
177 }
178 return E_OK;
179 }
180
UpdateData(const QueryOption & query,UnifiedData & unifiedData)181 int32_t UdmfServiceClient::UpdateData(const QueryOption &query, UnifiedData &unifiedData)
182 {
183 LOG_DEBUG(UDMF_SERVICE, "start, tag: %{public}s", query.key.c_str());
184 UnifiedKey key(query.key);
185 if (!key.IsValid() || !UnifiedDataUtils::IsPersist(key.intention)) {
186 LOG_ERROR(UDMF_SERVICE, "invalid key, key.intention: %{public}s", key.intention.c_str());
187 return E_INVALID_PARAMETERS;
188 }
189
190 if (!unifiedData.IsValid()) {
191 LOG_ERROR(UDMF_SERVICE, "UnifiedData is invalid.");
192 return E_INVALID_PARAMETERS;
193 }
194 if (UnifiedDataHelper::ExceedKVSizeLimit(unifiedData)) {
195 if (!UnifiedDataHelper::Pack(unifiedData)) {
196 LOG_ERROR(UDMF_SERVICE, "Failed to pack unified data.");
197 return E_FS_ERROR;
198 }
199 }
200 return udmfProxy_->UpdateData(query, unifiedData);
201 }
202
DeleteData(const QueryOption & query,std::vector<UnifiedData> & unifiedDataSet)203 int32_t UdmfServiceClient::DeleteData(const QueryOption &query, std::vector<UnifiedData> &unifiedDataSet)
204 {
205 LOG_DEBUG(UDMF_SERVICE, "start, tag: intention = %{public}d, key = %{public}s", query.intention, query.key.c_str());
206 auto find = UD_INTENTION_MAP.find(query.intention);
207 std::string intention = find == UD_INTENTION_MAP.end() ? intention : find->second;
208 UnifiedKey key(query.key);
209 if (!UnifiedDataUtils::IsValidOptions(key, intention)) {
210 LOG_ERROR(UDMF_SERVICE, "invalid option, query.key: %{public}s, intention: %{public}s", query.key.c_str(),
211 intention.c_str());
212 return E_INVALID_PARAMETERS;
213 }
214 return udmfProxy_->DeleteData(query, unifiedDataSet);
215 }
216
GetSummary(const QueryOption & query,Summary & summary)217 int32_t UdmfServiceClient::GetSummary(const QueryOption &query, Summary &summary)
218 {
219 LOG_DEBUG(UDMF_SERVICE, "start, tag: %{public}s", query.key.c_str());
220 UnifiedKey key(query.key);
221 if (!key.IsValid()) {
222 LOG_ERROR(UDMF_SERVICE, "invalid key");
223 return E_INVALID_PARAMETERS;
224 }
225 return udmfProxy_->GetSummary(query, summary);
226 }
227
AddPrivilege(const QueryOption & query,Privilege & privilege)228 int32_t UdmfServiceClient::AddPrivilege(const QueryOption &query, Privilege &privilege)
229 {
230 LOG_DEBUG(UDMF_SERVICE, "start, key: %{public}s", query.key.c_str());
231 UnifiedKey key(query.key);
232 if (!key.IsValid()) {
233 LOG_ERROR(UDMF_SERVICE, "invalid key");
234 return E_INVALID_PARAMETERS;
235 }
236 return udmfProxy_->AddPrivilege(query, privilege);
237 }
238
Sync(const QueryOption & query,const std::vector<std::string> & devices)239 int32_t UdmfServiceClient::Sync(const QueryOption &query, const std::vector<std::string> &devices)
240 {
241 LOG_DEBUG(UDMF_SERVICE, "start, key: %{public}s", query.key.c_str());
242 UnifiedKey key(query.key);
243 if (!key.IsValid()) {
244 LOG_ERROR(UDMF_SERVICE, "invalid key");
245 return E_INVALID_PARAMETERS;
246 }
247 return udmfProxy_->Sync(query, devices);
248 }
249
IsRemoteData(const QueryOption & query,bool & result)250 int32_t UdmfServiceClient::IsRemoteData(const QueryOption &query, bool &result)
251 {
252 LOG_DEBUG(UDMF_SERVICE, "start, key: %{public}s", query.key.c_str());
253 UnifiedKey key(query.key);
254 if (!key.IsValid()) {
255 LOG_ERROR(UDMF_SERVICE, "invalid key");
256 return E_INVALID_PARAMETERS;
257 }
258 return udmfProxy_->IsRemoteData(query, result);
259 }
260
SetAppShareOption(const std::string & intention,int32_t shareOption)261 int32_t UdmfServiceClient::SetAppShareOption(const std::string &intention, int32_t shareOption)
262 {
263 LOG_DEBUG(UDMF_SERVICE, "start, intention: %{public}s, shareOption: %{public}d",
264 intention.c_str(), shareOption);
265 if (intention.empty() || shareOption < IN_APP || shareOption > CROSS_APP) {
266 LOG_ERROR(UDMF_SERVICE, "invalid parameters");
267 return E_INVALID_PARAMETERS;
268 }
269 return udmfProxy_->SetAppShareOption(intention, shareOption);
270 }
271
GetAppShareOption(const std::string & intention,int32_t & shareOption)272 int32_t UdmfServiceClient::GetAppShareOption(const std::string &intention, int32_t &shareOption)
273 {
274 LOG_DEBUG(UDMF_SERVICE, "start, intention: %{public}s", intention.c_str());
275 if (intention.empty()) {
276 LOG_ERROR(UDMF_SERVICE, "invalid parameters");
277 return E_INVALID_PARAMETERS;
278 }
279 return udmfProxy_->GetAppShareOption(intention, shareOption);
280 }
281
RemoveAppShareOption(const std::string & intention)282 int32_t UdmfServiceClient::RemoveAppShareOption(const std::string &intention)
283 {
284 LOG_DEBUG(UDMF_SERVICE, "start, intention: %{public}s", intention.c_str());
285 if (intention.empty()) {
286 LOG_ERROR(UDMF_SERVICE, "invalid parameters");
287 return E_INVALID_PARAMETERS;
288 }
289 return udmfProxy_->RemoveAppShareOption(intention);
290 }
291
ObtainAsynProcess(AsyncProcessInfo & processInfo)292 int32_t UdmfServiceClient::ObtainAsynProcess(AsyncProcessInfo& processInfo)
293 {
294 return udmfProxy_->ObtainAsynProcess(processInfo);
295 }
296
ClearAsynProcessByKey(const std::string & businessUdKey)297 int32_t UdmfServiceClient::ClearAsynProcessByKey(const std::string &businessUdKey)
298 {
299 return udmfProxy_->ClearAsynProcessByKey(businessUdKey);
300 }
301 } // namespace UDMF
302 } // namespace OHOS