• Home
  • Line#
  • Scopes#
  • Navigate#
  • Raw
  • Download
1 /*
2  * Copyright (c) 2022 Huawei Device Co., Ltd.
3  * Licensed under the Apache License, Version 2.0 (the "License");
4  * you may not use this file except in compliance with the License.
5  * You may obtain a copy of the License at
6  *
7  *     http://www.apache.org/licenses/LICENSE-2.0
8  *
9  * Unless required by applicable law or agreed to in writing, software
10  * distributed under the License is distributed on an "AS IS" BASIS,
11  * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
12  * See the License for the specific language governing permissions and
13  * limitations under the License.
14  */
15 
16 #include "uri_permission_manager_stub.h"
17 
18 #include "hilog_wrapper.h"
19 
20 namespace OHOS {
21 namespace AAFwk {
OnRemoteRequest(uint32_t code,MessageParcel & data,MessageParcel & reply,MessageOption & option)22 int UriPermissionManagerStub::OnRemoteRequest(
23     uint32_t code, MessageParcel &data, MessageParcel &reply, MessageOption &option)
24 {
25     if (data.ReadInterfaceToken() != IUriPermissionManager::GetDescriptor()) {
26         HILOG_ERROR("InterfaceToken not equal IUriPermissionManager's descriptor.");
27         return ERR_INVALID_VALUE;
28     }
29     ErrCode errCode = ERR_OK;
30     switch (code) {
31         case UriPermMgrCmd::ON_GRANT_URI_PERMISSION : {
32             return HandleGrantUriPermission(data, reply);
33         }
34         case UriPermMgrCmd::ON_REVOKE_URI_PERMISSION : {
35             return HandleRevokeUriPermission(data, reply);
36         }
37         case UriPermMgrCmd::ON_REVOKE_ALL_URI_PERMISSION : {
38             return HandleRevokeAllUriPermission(data, reply);
39         }
40         case UriPermMgrCmd::ON_REVOKE_URI_PERMISSION_MANUALLY : {
41             return HandleRevokeUriPermissionManually(data, reply);
42         }
43         case UriPermMgrCmd::ON_CHECK_PERSISTABLE_URIPERMISSION_PROXY : {
44             return HandleCheckPerSiSTableUriPermissionProxy(data, reply);
45         }
46         case UriPermMgrCmd::ON_VERIFY_URI_PERMISSION : {
47             return HandleVerifyUriPermission(data, reply);
48         }
49         default:
50             return IPCObjectStub::OnRemoteRequest(code, data, reply, option);
51     }
52     return errCode;
53 }
54 
HandleRevokeUriPermission(MessageParcel & data,MessageParcel & reply)55 int UriPermissionManagerStub::HandleRevokeUriPermission(MessageParcel &data, MessageParcel &reply)
56 {
57     auto tokenId = data.ReadInt32();
58     RevokeUriPermission(tokenId);
59     return ERR_OK;
60 }
61 
HandleRevokeAllUriPermission(MessageParcel & data,MessageParcel & reply)62 int UriPermissionManagerStub::HandleRevokeAllUriPermission(MessageParcel &data, MessageParcel &reply)
63 {
64     auto tokenId = data.ReadInt32();
65     int result = RevokeAllUriPermissions(tokenId);
66     reply.WriteInt32(result);
67     return ERR_OK;
68 }
69 
HandleGrantUriPermission(MessageParcel & data,MessageParcel & reply)70 int UriPermissionManagerStub::HandleGrantUriPermission(MessageParcel &data, MessageParcel &reply)
71 {
72     std::unique_ptr<Uri> uri(data.ReadParcelable<Uri>());
73     if (!uri) {
74         HILOG_ERROR("To read uri failed.");
75         return ERR_DEAD_OBJECT;
76     }
77     auto flag = data.ReadInt32();
78     auto targetBundleName = data.ReadString();
79     auto autoremove = data.ReadInt32();
80     auto appIndex = data.ReadInt32();
81     int result = GrantUriPermission(*uri, flag, targetBundleName, autoremove, appIndex);
82     reply.WriteInt32(result);
83     return ERR_OK;
84 }
85 
HandleRevokeUriPermissionManually(MessageParcel & data,MessageParcel & reply)86 int UriPermissionManagerStub::HandleRevokeUriPermissionManually(MessageParcel &data, MessageParcel &reply)
87 {
88     std::unique_ptr<Uri> uri(data.ReadParcelable<Uri>());
89     if (!uri) {
90         HILOG_ERROR("To read uri failed.");
91         return ERR_DEAD_OBJECT;
92     }
93     auto bundleName = data.ReadString();
94     int result = RevokeUriPermissionManually(*uri, bundleName);
95     reply.WriteInt32(result);
96     return ERR_OK;
97 }
98 
HandleCheckPerSiSTableUriPermissionProxy(MessageParcel & data,MessageParcel & reply)99 int UriPermissionManagerStub::HandleCheckPerSiSTableUriPermissionProxy(MessageParcel &data, MessageParcel &reply)
100 {
101     std::unique_ptr<Uri> uri(data.ReadParcelable<Uri>());
102     if (!uri) {
103         HILOG_ERROR("To read uri failed.");
104         return ERR_DEAD_OBJECT;
105     }
106     auto flag = data.ReadInt32();
107     auto tokenId = data.ReadInt32();
108     bool result = CheckPersistableUriPermissionProxy(*uri, flag, tokenId);
109     reply.WriteBool(result);
110     return ERR_OK;
111 }
112 
HandleVerifyUriPermission(MessageParcel & data,MessageParcel & reply)113 int UriPermissionManagerStub::HandleVerifyUriPermission(MessageParcel &data, MessageParcel &reply)
114 {
115     std::unique_ptr<Uri> uri(data.ReadParcelable<Uri>());
116     if (!uri) {
117         HILOG_ERROR("To read uri failed.");
118         return ERR_DEAD_OBJECT;
119     }
120     auto flag = data.ReadInt32();
121     auto tokenId = data.ReadInt32();
122     bool result = VerifyUriPermission(*uri, flag, tokenId);
123     reply.WriteBool(result);
124     return ERR_OK;
125 }
126 }  // namespace AAFwk
127 }  // namespace OHOS
128