1 /*
2  * Copyright (c) 2022-2024 Huawei Device Co., Ltd.
3  * Licensed under the Apache License, Version 2.0 (the "License");
4  * you may not use this file except in compliance with the License.
5  * You may obtain a copy of the License at
6  *
7  *     http://www.apache.org/licenses/LICENSE-2.0
8  *
9  * Unless required by applicable law or agreed to in writing, software
10  * distributed under the License is distributed on an "AS IS" BASIS,
11  * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
12  * See the License for the specific language governing permissions and
13  * limitations under the License.
14  */
15 
16 #include "distributed_sched_test_util.h"
17 
18 #include <future>
19 
20 #include "accesstoken_kit.h"
21 #include "bundle_installer_interface.h"
22 #include "if_system_ability_manager.h"
23 #include "iservice_registry.h"
24 #include "nativetoken_kit.h"
25 #include "nocopyable.h"
26 #include "status_receiver_host.h"
27 #include "status_receiver_interface.h"
28 #include "system_ability_definition.h"
29 #include "token_setproc.h"
30 
31 #include "dtbschedmgr_log.h"
32 
33 namespace OHOS {
34 namespace DistributedSchedule {
35 using namespace AppExecFwk;
36 namespace {
37 const std::string TAG = "DistributedSchedUtil";
38 const char* DISTSCHED_PROCESS_NAME = "distributedsched";
39 constexpr int32_t DMS_LOAD_SA_TIMEOUT_MS = 10000;
40 constexpr int32_t USER_ID = 100;
41 constexpr int32_t PERMS_NUM = 4;
42 constexpr int32_t FAILED_RETURN = -1;
43 }
44 
45 class StatusReceiverImpl : public StatusReceiverHost {
46 public:
47     StatusReceiverImpl();
48     ~StatusReceiverImpl() override;
49     void OnStatusNotify(const int progress) override;
50     void OnFinished(const int32_t resultCode, const std::string &resultMsg) override;
51 
52 private:
53     mutable std::promise<std::string> resultMsgSignal_;
54     int iProgress_ = 0;
55 
56     DISALLOW_COPY_AND_MOVE(StatusReceiverImpl);
57 };
58 
StatusReceiverImpl()59 StatusReceiverImpl::StatusReceiverImpl()
60 {
61     HILOGI("create status receiver instance");
62 }
63 
~StatusReceiverImpl()64 StatusReceiverImpl::~StatusReceiverImpl()
65 {
66     HILOGI("destroy status receiver instance");
67 }
68 
OnStatusNotify(const int progress)69 void StatusReceiverImpl::OnStatusNotify(const int progress)
70 {
71     iProgress_ = progress;
72     HILOGI("OnStatusNotify progress:%{public}d", progress);
73 }
74 
OnFinished(const int32_t resultCode,const std::string & resultMsg)75 void StatusReceiverImpl::OnFinished(const int32_t resultCode, const std::string &resultMsg)
76 {
77     HILOGI("on finished result is %{public}d, %{public}s", resultCode, resultMsg.c_str());
78     resultMsgSignal_.set_value(resultMsg);
79 }
80 
81 sptr<IRemoteObject> DistributedSchedUtil::remote_ = nullptr;
82 std::mutex DistributedSchedUtil::remoteMutex_;
83 std::condition_variable DistributedSchedUtil::remoteConVar_;
84 
MockPermission()85 void DistributedSchedUtil::MockPermission()
86 {
87     static const char *perms[] = {
88         "ohos.permission.ABILITY_BACKGROUND_COMMUNICATION",
89         "ohos.permission.ACCESS_SERVICE_DM",
90         "ohos.permission.DISTRIBUTED_DATASYNC",
91         "ohos.permission.RUNNING_STATE_OBSERVER"
92 
93     };
94     MockProcessAndPermission(DISTSCHED_PROCESS_NAME, perms, PERMS_NUM);
95 }
96 
MockBundlePermission()97 void DistributedSchedUtil::MockBundlePermission()
98 {
99     static const char *perms[] = {
100         "ohos.permission.GET_BUNDLE_INFO_PRIVILEGED"
101     };
102     MockProcessAndPermission("DistributedSchedPermissionTest", perms, sizeof(perms) / sizeof(perms[0]));
103 }
104 
MockManageMissions()105 void DistributedSchedUtil::MockManageMissions()
106 {
107     static const char *perms[] = {
108         "ohos.permission.MANAGE_MISSIONS"
109     };
110     MockProcessAndPermission("DistributedSchedPermissionTest", perms, sizeof(perms) / sizeof(perms[0]));
111 }
112 
MockProcess(const char * processName)113 void DistributedSchedUtil::MockProcess(const char* processName)
114 {
115     MockProcessAndPermission(processName);
116 }
117 
GetBundleManager()118 sptr<AppExecFwk::IBundleMgr> DistributedSchedUtil::GetBundleManager()
119 {
120     sptr<ISystemAbilityManager> samgrProxy = SystemAbilityManagerClient::GetInstance().GetSystemAbilityManager();
121     if (samgrProxy == nullptr) {
122         return nullptr;
123     }
124     sptr<IRemoteObject> bmsProxy = samgrProxy->GetSystemAbility(BUNDLE_MGR_SERVICE_SYS_ABILITY_ID);
125     if (bmsProxy == nullptr) {
126         HILOGE("failed to get bms from samgr");
127         return nullptr;
128     }
129     return iface_cast<AppExecFwk::IBundleMgr>(bmsProxy);
130 }
131 
MockProcessAndPermission(const char * processName,const char * perms[],int32_t permsNum)132 void DistributedSchedUtil::MockProcessAndPermission(const char* processName, const char *perms[], int32_t permsNum)
133 {
134     uint64_t tokenId;
135     NativeTokenInfoParams infoInstance = {
136         .dcapsNum = 0,
137         .permsNum = permsNum,
138         .aclsNum = 0,
139         .dcaps = nullptr,
140         .perms = perms,
141         .acls = nullptr,
142         .processName = processName,
143         .aplStr = "system_core",
144     };
145     tokenId = GetAccessTokenId(&infoInstance);
146     SetSelfTokenID(tokenId);
147     OHOS::Security::AccessToken::AccessTokenKit::ReloadNativeTokenInfo();
148 }
149 
LoadDistributedSchedService()150 bool DistributedSchedUtil::LoadDistributedSchedService()
151 {
152     std::unique_lock<std::mutex> lock(remoteMutex_);
153     sptr<DistributedSchedLoadCallback> loadCallback(new DistributedSchedLoadCallback());
154     if (loadCallback == nullptr) {
155         HILOGE("loadCallback is nullptr");
156         return false;
157     }
158     auto samgrProxy = SystemAbilityManagerClient::GetInstance().GetSystemAbilityManager();
159     if (samgrProxy == nullptr) {
160         HILOGE("get samgr failed");
161         return false;
162     }
163     int32_t ret = samgrProxy->LoadSystemAbility(DISTRIBUTED_SCHED_SA_ID, loadCallback);
164     if (ret != ERR_OK) {
165         HILOGE("load dms SA failed");
166         return false;
167     }
168     auto waitStatus = remoteConVar_.wait_for(lock, std::chrono::milliseconds(DMS_LOAD_SA_TIMEOUT_MS),
169         []() { return remote_ != nullptr; });
170     if (!waitStatus) {
171         HILOGE("dms SA load timeout");
172         return false;
173     }
174     return true;
175 }
176 
LoadSystemAbilitySuccessNotify(const sptr<IRemoteObject> & remoteObject)177 void DistributedSchedUtil::LoadSystemAbilitySuccessNotify(const sptr<IRemoteObject>& remoteObject)
178 {
179     std::lock_guard<std::mutex> lock(remoteMutex_);
180     remote_ = remoteObject;
181     remoteConVar_.notify_one();
182 }
183 
LoadSystemAbilityFailNotify()184 void DistributedSchedUtil::LoadSystemAbilityFailNotify()
185 {
186     std::lock_guard<std::mutex> lock(remoteMutex_);
187     remote_ = nullptr;
188 }
189 
OnLoadSystemAbilitySuccess(int32_t systemAbilityId,const sptr<IRemoteObject> & remoteObject)190 void DistributedSchedLoadCallback::OnLoadSystemAbilitySuccess(
191     int32_t systemAbilityId, const sptr<IRemoteObject> &remoteObject)
192 {
193     HILOGD("called.");
194     DistributedSchedUtil::LoadSystemAbilitySuccessNotify(remoteObject);
195 }
196 
OnLoadSystemAbilityFail(int32_t systemAbilityId)197 void DistributedSchedLoadCallback::OnLoadSystemAbilityFail(int32_t systemAbilityId)
198 {
199     HILOGD("called.");
200     DistributedSchedUtil::LoadSystemAbilityFailNotify();
201 }
202 }
203 }