1 /*
2 * Copyright (c) 2022 Huawei Device Co., Ltd.
3 * Licensed under the Apache License, Version 2.0 (the "License");
4 * you may not use this file except in compliance with the License.
5 * You may obtain a copy of the License at
6 *
7 * http://www.apache.org/licenses/LICENSE-2.0
8 *
9 * Unless required by applicable law or agreed to in writing, software
10 * distributed under the License is distributed on an "AS IS" BASIS,
11 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
12 * See the License for the specific language governing permissions and
13 * limitations under the License.
14 */
15
16 #include "uri_permission_manager_stub.h"
17
18 #include "hilog_wrapper.h"
19
20 namespace OHOS {
21 namespace AAFwk {
OnRemoteRequest(uint32_t code,MessageParcel & data,MessageParcel & reply,MessageOption & option)22 int UriPermissionManagerStub::OnRemoteRequest(
23 uint32_t code, MessageParcel &data, MessageParcel &reply, MessageOption &option)
24 {
25 if (data.ReadInterfaceToken() != IUriPermissionManager::GetDescriptor()) {
26 HILOG_ERROR("InterfaceToken not equal IUriPermissionManager's descriptor.");
27 return ERR_INVALID_VALUE;
28 }
29 ErrCode errCode = ERR_OK;
30 switch (code) {
31 case UriPermMgrCmd::ON_GRANT_URI_PERMISSION : {
32 return HandleGrantUriPermission(data, reply);
33 }
34 case UriPermMgrCmd::ON_REVOKE_URI_PERMISSION : {
35 return HandleRevokeUriPermission(data, reply);
36 }
37 case UriPermMgrCmd::ON_REVOKE_ALL_URI_PERMISSION : {
38 return HandleRevokeAllUriPermission(data, reply);
39 }
40 case UriPermMgrCmd::ON_REVOKE_URI_PERMISSION_MANUALLY : {
41 return HandleRevokeUriPermissionManually(data, reply);
42 }
43 case UriPermMgrCmd::ON_CHECK_PERSISTABLE_URIPERMISSION_PROXY : {
44 return HandleCheckPerSiSTableUriPermissionProxy(data, reply);
45 }
46 case UriPermMgrCmd::ON_VERIFY_URI_PERMISSION : {
47 return HandleVerifyUriPermission(data, reply);
48 }
49 default:
50 return IPCObjectStub::OnRemoteRequest(code, data, reply, option);
51 }
52 return errCode;
53 }
54
HandleRevokeUriPermission(MessageParcel & data,MessageParcel & reply)55 int UriPermissionManagerStub::HandleRevokeUriPermission(MessageParcel &data, MessageParcel &reply)
56 {
57 auto tokenId = data.ReadInt32();
58 RevokeUriPermission(tokenId);
59 return ERR_OK;
60 }
61
HandleRevokeAllUriPermission(MessageParcel & data,MessageParcel & reply)62 int UriPermissionManagerStub::HandleRevokeAllUriPermission(MessageParcel &data, MessageParcel &reply)
63 {
64 auto tokenId = data.ReadInt32();
65 int result = RevokeAllUriPermissions(tokenId);
66 reply.WriteInt32(result);
67 return ERR_OK;
68 }
69
HandleGrantUriPermission(MessageParcel & data,MessageParcel & reply)70 int UriPermissionManagerStub::HandleGrantUriPermission(MessageParcel &data, MessageParcel &reply)
71 {
72 std::unique_ptr<Uri> uri(data.ReadParcelable<Uri>());
73 if (!uri) {
74 HILOG_ERROR("To read uri failed.");
75 return ERR_DEAD_OBJECT;
76 }
77 auto flag = data.ReadInt32();
78 auto targetBundleName = data.ReadString();
79 auto autoremove = data.ReadInt32();
80 auto appIndex = data.ReadInt32();
81 int result = GrantUriPermission(*uri, flag, targetBundleName, autoremove, appIndex);
82 reply.WriteInt32(result);
83 return ERR_OK;
84 }
85
HandleRevokeUriPermissionManually(MessageParcel & data,MessageParcel & reply)86 int UriPermissionManagerStub::HandleRevokeUriPermissionManually(MessageParcel &data, MessageParcel &reply)
87 {
88 std::unique_ptr<Uri> uri(data.ReadParcelable<Uri>());
89 if (!uri) {
90 HILOG_ERROR("To read uri failed.");
91 return ERR_DEAD_OBJECT;
92 }
93 auto bundleName = data.ReadString();
94 int result = RevokeUriPermissionManually(*uri, bundleName);
95 reply.WriteInt32(result);
96 return ERR_OK;
97 }
98
HandleCheckPerSiSTableUriPermissionProxy(MessageParcel & data,MessageParcel & reply)99 int UriPermissionManagerStub::HandleCheckPerSiSTableUriPermissionProxy(MessageParcel &data, MessageParcel &reply)
100 {
101 std::unique_ptr<Uri> uri(data.ReadParcelable<Uri>());
102 if (!uri) {
103 HILOG_ERROR("To read uri failed.");
104 return ERR_DEAD_OBJECT;
105 }
106 auto flag = data.ReadInt32();
107 auto tokenId = data.ReadInt32();
108 bool result = CheckPersistableUriPermissionProxy(*uri, flag, tokenId);
109 reply.WriteBool(result);
110 return ERR_OK;
111 }
112
HandleVerifyUriPermission(MessageParcel & data,MessageParcel & reply)113 int UriPermissionManagerStub::HandleVerifyUriPermission(MessageParcel &data, MessageParcel &reply)
114 {
115 std::unique_ptr<Uri> uri(data.ReadParcelable<Uri>());
116 if (!uri) {
117 HILOG_ERROR("To read uri failed.");
118 return ERR_DEAD_OBJECT;
119 }
120 auto flag = data.ReadInt32();
121 auto tokenId = data.ReadInt32();
122 bool result = VerifyUriPermission(*uri, flag, tokenId);
123 reply.WriteBool(result);
124 return ERR_OK;
125 }
126 } // namespace AAFwk
127 } // namespace OHOS
128