• Home
  • Line#
  • Scopes#
  • Navigate#
  • Raw
  • Download
1 /*
2  * Copyright (c) 2022 Huawei Device Co., Ltd.
3  * Licensed under the Apache License, Version 2.0 (the "License");
4  * you may not use this file except in compliance with the License.
5  * You may obtain a copy of the License at
6  *
7  *     http://www.apache.org/licenses/LICENSE-2.0
8  *
9  * Unless required by applicable law or agreed to in writing, software
10  * distributed under the License is distributed on an "AS IS" BASIS,
11  * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
12  * See the License for the specific language governing permissions and
13  * limitations under the License.
14  */
15 #define LOG_TAG "UdmfServiceClient"
16 #include "udmf_service_client.h"
17 
18 #include "iservice_registry.h"
19 #include "datamgr_service_proxy.h"
20 #include "system_ability_definition.h"
21 #include "udmf_utils.h"
22 #include "unified_data_helper.h"
23 
24 #include "logger.h"
25 
26 namespace OHOS {
27 namespace UDMF {
28 std::shared_ptr<UdmfServiceClient> UdmfServiceClient::instance_;
29 std::mutex UdmfServiceClient::mutex_;
30 sptr<DistributedKv::IKvStoreDataService> UdmfServiceClient::kvDataServiceProxy_;
31 
UdmfServiceClient(const sptr<UdmfServiceProxy> & proxy)32 UdmfServiceClient::UdmfServiceClient(const sptr<UdmfServiceProxy> &proxy) : udmfProxy_(proxy)
33 {
34     LOG_INFO(UDMF_SERVICE, "construct");
35 }
36 
GetInstance()37 std::shared_ptr<UdmfServiceClient> UdmfServiceClient::GetInstance()
38 {
39     std::lock_guard<decltype(mutex_)> lockGuard(mutex_);
40     if (instance_ != nullptr) {
41         return instance_;
42     }
43     sptr<DistributedKv::IKvStoreDataService> ability = GetDistributedKvDataService();
44     if (ability == nullptr) {
45         return nullptr;
46     }
47     sptr<IRemoteObject> service = ability->GetFeatureInterface("udmf");
48     if (service == nullptr) {
49         return nullptr;
50     }
51     sptr<UdmfServiceProxy> proxy = iface_cast<UdmfServiceProxy>(service);
52     if (proxy == nullptr) {
53         return nullptr;
54     }
55     instance_ = std::make_shared<UdmfServiceClient>(proxy);
56     return instance_;
57 }
58 
GetDistributedKvDataService()59 sptr<DistributedKv::IKvStoreDataService> UdmfServiceClient::GetDistributedKvDataService()
60 {
61     if (kvDataServiceProxy_ != nullptr) {
62         return kvDataServiceProxy_;
63     }
64     LOG_INFO(UDMF_SERVICE, "create remote proxy.");
65     auto samgr = SystemAbilityManagerClient::GetInstance().GetSystemAbilityManager();
66     if (samgr == nullptr) {
67         LOG_ERROR(UDMF_SERVICE, "get samgr fail.");
68         return nullptr;
69     }
70 
71     auto remote = samgr->CheckSystemAbility(DISTRIBUTED_KV_DATA_SERVICE_ABILITY_ID);
72     kvDataServiceProxy_ = iface_cast<DistributedKv::DataMgrServiceProxy>(remote);
73     if (kvDataServiceProxy_ == nullptr) {
74         LOG_ERROR(UDMF_SERVICE, "initialize proxy failed.");
75         return nullptr;
76     }
77     sptr<UdmfServiceClient::ServiceDeathRecipient> deathRecipientPtr = new (std::nothrow)ServiceDeathRecipient();
78     if (deathRecipientPtr == nullptr) {
79         return nullptr;
80     }
81     if ((remote->IsProxyObject()) && (!remote->AddDeathRecipient(deathRecipientPtr))) {
82         LOG_ERROR(UDMF_SERVICE, "Add death recipient fail!");
83     }
84     return kvDataServiceProxy_;
85 }
86 
ServiceDeathRecipient()87 UdmfServiceClient::ServiceDeathRecipient::ServiceDeathRecipient()
88 {
89     LOG_INFO(UDMF_SERVICE, "Construct!");
90 }
91 
~ServiceDeathRecipient()92 UdmfServiceClient::ServiceDeathRecipient::~ServiceDeathRecipient()
93 {
94     LOG_INFO(UDMF_SERVICE, "Destruct!");
95 }
96 
OnRemoteDied(const wptr<IRemoteObject> & remote)97 void UdmfServiceClient::ServiceDeathRecipient::OnRemoteDied(const wptr<IRemoteObject> &remote)
98 {
99     LOG_WARN(UDMF_SERVICE, "DistributedDataService die!");
100     std::lock_guard<decltype(mutex_)> lockGuard(mutex_);
101     kvDataServiceProxy_ = nullptr;
102     instance_ = nullptr;
103 }
104 
SetData(CustomOption & option,UnifiedData & unifiedData,std::string & key)105 int32_t UdmfServiceClient::SetData(CustomOption &option, UnifiedData &unifiedData, std::string &key)
106 {
107     LOG_DEBUG(UDMF_SERVICE, "start, tag: %{public}d", option.intention);
108     if (!UnifiedDataUtils::IsValidIntention(option.intention)) {
109         LOG_ERROR(UDMF_SERVICE, "Invalid intention");
110         return E_INVALID_PARAMETERS;
111     }
112 
113     if (!unifiedData.IsValid()) {
114         LOG_ERROR(UDMF_SERVICE, "UnifiedData is invalid.");
115         return E_INVALID_PARAMETERS;
116     }
117     bool isSaInvoke = UTILS::IsTokenNative();
118     if (isSaInvoke && unifiedData.HasFileType()) {
119         LOG_ERROR(UDMF_SERVICE, "The setting data initiated by the SA cannot contain the file type");
120         return E_INVALID_PARAMETERS;
121     }
122     if (UnifiedDataHelper::ExceedKVSizeLimit(unifiedData)) {
123         auto status = UnifiedDataHelper::ProcessBigData(unifiedData, option.intention, isSaInvoke);
124         if (status != E_OK) {
125             LOG_ERROR(UDMF_SERVICE, "Process big data error, status = %{public}d", status);
126             return status;
127         }
128     }
129     return udmfProxy_->SetData(option, unifiedData, key);
130 }
131 
GetData(const QueryOption & query,UnifiedData & unifiedData)132 int32_t UdmfServiceClient::GetData(const QueryOption &query, UnifiedData &unifiedData)
133 {
134     LOG_DEBUG(UDMF_SERVICE, "start, tag: %{public}s", query.key.c_str());
135     UnifiedKey key(query.key);
136     if (!key.IsValid()) {
137         LOG_ERROR(UDMF_SERVICE, "invalid key");
138         return E_INVALID_PARAMETERS;
139     }
140 
141     auto err = udmfProxy_->GetData(query, unifiedData);
142     if (err == E_OK) {
143         if (UnifiedDataHelper::IsTempUData(unifiedData)) {
144             if (!UnifiedDataHelper::Unpack(unifiedData)) {
145                 LOG_ERROR(UDMF_SERVICE, "failed to unpack unified data");
146                 return E_FS_ERROR;
147             }
148         }
149     }
150     return err;
151 }
152 
GetBatchData(const QueryOption & query,std::vector<UnifiedData> & unifiedDataSet)153 int32_t UdmfServiceClient::GetBatchData(const QueryOption &query, std::vector<UnifiedData> &unifiedDataSet)
154 {
155     LOG_DEBUG(UDMF_SERVICE, "start, tag: intention = %{public}d, key = %{public}s", query.intention, query.key.c_str());
156     auto find = UD_INTENTION_MAP.find(query.intention);
157     std::string intention = find == UD_INTENTION_MAP.end() ? intention : find->second;
158     UnifiedKey key(query.key);
159     if (!UnifiedDataUtils::IsValidOptions(key, intention)) {
160         LOG_ERROR(UDMF_SERVICE, "invalid option, query.key: %{public}s, intention: %{public}s", query.key.c_str(),
161             intention.c_str());
162         return E_INVALID_PARAMETERS;
163     }
164     std::vector<UnifiedData> tempDataSet {};
165     auto err = udmfProxy_->GetBatchData(query, tempDataSet);
166     if (err != E_OK) {
167         return err;
168     }
169     for (auto &data : tempDataSet) {
170         if (UnifiedDataHelper::IsTempUData(data)) {
171             if (!UnifiedDataHelper::Unpack(data)) {
172                 LOG_ERROR(UDMF_SERVICE, "failed to unpack unified data");
173                 return E_FS_ERROR;
174             }
175         }
176         unifiedDataSet.emplace_back(data);
177     }
178     return E_OK;
179 }
180 
UpdateData(const QueryOption & query,UnifiedData & unifiedData)181 int32_t UdmfServiceClient::UpdateData(const QueryOption &query, UnifiedData &unifiedData)
182 {
183     LOG_DEBUG(UDMF_SERVICE, "start, tag: %{public}s", query.key.c_str());
184     UnifiedKey key(query.key);
185     if (!key.IsValid() || !UnifiedDataUtils::IsPersist(key.intention)) {
186         LOG_ERROR(UDMF_SERVICE, "invalid key, key.intention: %{public}s", key.intention.c_str());
187         return E_INVALID_PARAMETERS;
188     }
189 
190     if (!unifiedData.IsValid()) {
191         LOG_ERROR(UDMF_SERVICE, "UnifiedData is invalid.");
192         return E_INVALID_PARAMETERS;
193     }
194     if (UnifiedDataHelper::ExceedKVSizeLimit(unifiedData)) {
195         if (!UnifiedDataHelper::Pack(unifiedData)) {
196             LOG_ERROR(UDMF_SERVICE, "Failed to pack unified data.");
197             return E_FS_ERROR;
198         }
199     }
200     return udmfProxy_->UpdateData(query, unifiedData);
201 }
202 
DeleteData(const QueryOption & query,std::vector<UnifiedData> & unifiedDataSet)203 int32_t UdmfServiceClient::DeleteData(const QueryOption &query, std::vector<UnifiedData> &unifiedDataSet)
204 {
205     LOG_DEBUG(UDMF_SERVICE, "start, tag: intention = %{public}d, key = %{public}s", query.intention, query.key.c_str());
206     auto find = UD_INTENTION_MAP.find(query.intention);
207     std::string intention = find == UD_INTENTION_MAP.end() ? intention : find->second;
208     UnifiedKey key(query.key);
209     if (!UnifiedDataUtils::IsValidOptions(key, intention)) {
210         LOG_ERROR(UDMF_SERVICE, "invalid option, query.key: %{public}s, intention: %{public}s", query.key.c_str(),
211             intention.c_str());
212         return E_INVALID_PARAMETERS;
213     }
214     return udmfProxy_->DeleteData(query, unifiedDataSet);
215 }
216 
GetSummary(const QueryOption & query,Summary & summary)217 int32_t UdmfServiceClient::GetSummary(const QueryOption &query, Summary &summary)
218 {
219     LOG_DEBUG(UDMF_SERVICE, "start, tag: %{public}s", query.key.c_str());
220     UnifiedKey key(query.key);
221     if (!key.IsValid()) {
222         LOG_ERROR(UDMF_SERVICE, "invalid key");
223         return E_INVALID_PARAMETERS;
224     }
225     return udmfProxy_->GetSummary(query, summary);
226 }
227 
AddPrivilege(const QueryOption & query,Privilege & privilege)228 int32_t UdmfServiceClient::AddPrivilege(const QueryOption &query, Privilege &privilege)
229 {
230     LOG_DEBUG(UDMF_SERVICE, "start, key: %{public}s", query.key.c_str());
231     UnifiedKey key(query.key);
232     if (!key.IsValid()) {
233         LOG_ERROR(UDMF_SERVICE, "invalid key");
234         return E_INVALID_PARAMETERS;
235     }
236     return udmfProxy_->AddPrivilege(query, privilege);
237 }
238 
Sync(const QueryOption & query,const std::vector<std::string> & devices)239 int32_t UdmfServiceClient::Sync(const QueryOption &query, const std::vector<std::string> &devices)
240 {
241     LOG_DEBUG(UDMF_SERVICE, "start, key: %{public}s", query.key.c_str());
242     UnifiedKey key(query.key);
243     if (!key.IsValid()) {
244         LOG_ERROR(UDMF_SERVICE, "invalid key");
245         return E_INVALID_PARAMETERS;
246     }
247     return udmfProxy_->Sync(query, devices);
248 }
249 
IsRemoteData(const QueryOption & query,bool & result)250 int32_t UdmfServiceClient::IsRemoteData(const QueryOption &query, bool &result)
251 {
252     LOG_DEBUG(UDMF_SERVICE, "start, key: %{public}s", query.key.c_str());
253     UnifiedKey key(query.key);
254     if (!key.IsValid()) {
255         LOG_ERROR(UDMF_SERVICE, "invalid key");
256         return E_INVALID_PARAMETERS;
257     }
258     return udmfProxy_->IsRemoteData(query, result);
259 }
260 
SetAppShareOption(const std::string & intention,int32_t shareOption)261 int32_t UdmfServiceClient::SetAppShareOption(const std::string &intention, int32_t shareOption)
262 {
263     LOG_DEBUG(UDMF_SERVICE, "start, intention: %{public}s, shareOption: %{public}d",
264               intention.c_str(), shareOption);
265     if (intention.empty() || shareOption < IN_APP || shareOption > CROSS_APP) {
266         LOG_ERROR(UDMF_SERVICE, "invalid parameters");
267         return E_INVALID_PARAMETERS;
268     }
269     return udmfProxy_->SetAppShareOption(intention, shareOption);
270 }
271 
GetAppShareOption(const std::string & intention,int32_t & shareOption)272 int32_t UdmfServiceClient::GetAppShareOption(const std::string &intention, int32_t &shareOption)
273 {
274     LOG_DEBUG(UDMF_SERVICE, "start, intention: %{public}s", intention.c_str());
275     if (intention.empty()) {
276         LOG_ERROR(UDMF_SERVICE, "invalid parameters");
277         return E_INVALID_PARAMETERS;
278     }
279     return udmfProxy_->GetAppShareOption(intention, shareOption);
280 }
281 
RemoveAppShareOption(const std::string & intention)282 int32_t UdmfServiceClient::RemoveAppShareOption(const std::string &intention)
283 {
284     LOG_DEBUG(UDMF_SERVICE, "start, intention: %{public}s", intention.c_str());
285     if (intention.empty()) {
286         LOG_ERROR(UDMF_SERVICE, "invalid parameters");
287         return E_INVALID_PARAMETERS;
288     }
289     return udmfProxy_->RemoveAppShareOption(intention);
290 }
291 
ObtainAsynProcess(AsyncProcessInfo & processInfo)292 int32_t UdmfServiceClient::ObtainAsynProcess(AsyncProcessInfo& processInfo)
293 {
294     return udmfProxy_->ObtainAsynProcess(processInfo);
295 }
296 
ClearAsynProcessByKey(const std::string & businessUdKey)297 int32_t UdmfServiceClient::ClearAsynProcessByKey(const std::string &businessUdKey)
298 {
299     return udmfProxy_->ClearAsynProcessByKey(businessUdKey);
300 }
301 } // namespace UDMF
302 } // namespace OHOS