1 /*
2  * Copyright (c) 2022 Huawei Device Co., Ltd.
3  * Licensed under the Apache License, Version 2.0 (the "License");
4  * you may not use this file except in compliance with the License.
5  * You may obtain a copy of the License at
6  *
7  *     http://www.apache.org/licenses/LICENSE-2.0
8  *
9  * Unless required by applicable law or agreed to in writing, software
10  * distributed under the License is distributed on an "AS IS" BASIS,
11  * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
12  * See the License for the specific language governing permissions and
13  * limitations under the License.
14  */
15 
16 #include "token_sync_manager_service.h"
17 
18 #include <securec.h>
19 
20 #include "accesstoken_log.h"
21 #include "constant_common.h"
22 #include "device_info_repository.h"
23 #include "device_info.h"
24 #include "remote_command_manager.h"
25 #include "soft_bus_manager.h"
26 #include "system_ability_definition.h"
27 
28 namespace OHOS {
29 namespace Security {
30 namespace AccessToken {
31 namespace {
32 static constexpr OHOS::HiviewDFX::HiLogLabel LABEL = {LOG_CORE, SECURITY_DOMAIN_ACCESSTOKEN, "TokenSyncManagerService"};
33 }
34 
35 const bool REGISTER_RESULT =
36     SystemAbility::MakeAndRegisterAbility(DelayedSingleton<TokenSyncManagerService>::GetInstance().get());
37 
TokenSyncManagerService()38 TokenSyncManagerService::TokenSyncManagerService()
39     : SystemAbility(SA_ID_TOKENSYNC_MANAGER_SERVICE, false), state_(ServiceRunningState::STATE_NOT_START)
40 {
41     ACCESSTOKEN_LOG_INFO(LABEL, "TokenSyncManagerService()");
42 }
43 
~TokenSyncManagerService()44 TokenSyncManagerService::~TokenSyncManagerService()
45 {
46     ACCESSTOKEN_LOG_INFO(LABEL, "~TokenSyncManagerService()");
47 }
48 
OnStart()49 void TokenSyncManagerService::OnStart()
50 {
51     if (state_ == ServiceRunningState::STATE_RUNNING) {
52         ACCESSTOKEN_LOG_INFO(LABEL, "TokenSyncManagerService has already started!");
53         return;
54     }
55     ACCESSTOKEN_LOG_INFO(LABEL, "TokenSyncManagerService is starting");
56     if (!Initialize()) {
57         ACCESSTOKEN_LOG_ERROR(LABEL, "Failed to initialize");
58         return;
59     }
60     state_ = ServiceRunningState::STATE_RUNNING;
61     bool ret = Publish(DelayedSingleton<TokenSyncManagerService>::GetInstance().get());
62     if (!ret) {
63         ACCESSTOKEN_LOG_ERROR(LABEL, "Failed to publish service!");
64         return;
65     }
66     (void)AddSystemAbilityListener(DISTRIBUTED_HARDWARE_DEVICEMANAGER_SA_ID);
67     ACCESSTOKEN_LOG_INFO(LABEL, "Congratulations, TokenSyncManagerService start successfully!");
68 }
69 
OnStop()70 void TokenSyncManagerService::OnStop()
71 {
72     ACCESSTOKEN_LOG_INFO(LABEL, "Stop service");
73     state_ = ServiceRunningState::STATE_NOT_START;
74     SoftBusManager::GetInstance().Destroy();
75 }
76 
OnAddSystemAbility(int32_t systemAbilityId,const std::string & deviceId)77 void TokenSyncManagerService::OnAddSystemAbility(int32_t systemAbilityId, const std::string& deviceId)
78 {
79     if (systemAbilityId == DISTRIBUTED_HARDWARE_DEVICEMANAGER_SA_ID) {
80         SoftBusManager::GetInstance().Initialize();
81     }
82 }
83 
84 #ifdef EVENTHANDLER_ENABLE
GetSendEventHandler() const85 std::shared_ptr<AccessEventHandler> TokenSyncManagerService::GetSendEventHandler() const
86 {
87     return sendHandler_;
88 }
89 
GetRecvEventHandler() const90 std::shared_ptr<AccessEventHandler> TokenSyncManagerService::GetRecvEventHandler() const
91 {
92     return recvHandler_;
93 }
94 #endif
95 
GetRemoteHapTokenInfo(const std::string & deviceID,AccessTokenID tokenID)96 int TokenSyncManagerService::GetRemoteHapTokenInfo(const std::string& deviceID, AccessTokenID tokenID)
97 {
98     if (!DataValidator::IsDeviceIdValid(deviceID) || tokenID == 0) {
99         ACCESSTOKEN_LOG_INFO(LABEL, "Params is wrong.");
100         return TOKEN_SYNC_PARAMS_INVALID;
101     }
102     DeviceInfo devInfo;
103     bool result = DeviceInfoRepository::GetInstance().FindDeviceInfo(deviceID, DeviceIdType::UNKNOWN, devInfo);
104     if (!result) {
105         ACCESSTOKEN_LOG_INFO(LABEL, "FindDeviceInfo failed");
106         return TOKEN_SYNC_REMOTE_DEVICE_INVALID;
107     }
108     std::string udid = devInfo.deviceId.uniqueDeviceId;
109     const std::shared_ptr<SyncRemoteHapTokenCommand> syncRemoteHapTokenCommand =
110         RemoteCommandFactory::GetInstance().NewSyncRemoteHapTokenCommand(ConstantCommon::GetLocalDeviceId(),
111         deviceID, tokenID);
112 
113     const int32_t resultCode = RemoteCommandManager::GetInstance().ExecuteCommand(udid, syncRemoteHapTokenCommand);
114     if (resultCode != Constant::SUCCESS) {
115         ACCESSTOKEN_LOG_INFO(LABEL,
116             "RemoteExecutorManager executeCommand SyncRemoteHapTokenCommand failed, return %{public}d", resultCode);
117         return TOKEN_SYNC_COMMAND_EXECUTE_FAILED;
118     }
119     ACCESSTOKEN_LOG_INFO(LABEL, "Get resultCode: %{public}d", resultCode);
120     return TOKEN_SYNC_SUCCESS;
121 }
122 
DeleteRemoteHapTokenInfo(AccessTokenID tokenID)123 int TokenSyncManagerService::DeleteRemoteHapTokenInfo(AccessTokenID tokenID)
124 {
125     if (tokenID == 0) {
126         ACCESSTOKEN_LOG_INFO(LABEL, "Params is wrong, token id is invalid.");
127         return TOKEN_SYNC_PARAMS_INVALID;
128     }
129 
130     std::vector<DeviceInfo> devices = DeviceInfoRepository::GetInstance().ListDeviceInfo();
131     std::string localUdid = ConstantCommon::GetLocalDeviceId();
132     for (const DeviceInfo& device : devices) {
133         if (device.deviceId.uniqueDeviceId == localUdid) {
134             ACCESSTOKEN_LOG_INFO(LABEL, "No need notify local device");
135             continue;
136         }
137         const std::shared_ptr<DeleteRemoteTokenCommand> deleteRemoteTokenCommand =
138             RemoteCommandFactory::GetInstance().NewDeleteRemoteTokenCommand(ConstantCommon::GetLocalDeviceId(),
139             device.deviceId.uniqueDeviceId, tokenID);
140 
141         const int32_t resultCode = RemoteCommandManager::GetInstance().ExecuteCommand(
142             device.deviceId.uniqueDeviceId, deleteRemoteTokenCommand);
143         if (resultCode != Constant::SUCCESS) {
144             ACCESSTOKEN_LOG_INFO(LABEL,
145                 "RemoteExecutorManager executeCommand DeleteRemoteTokenCommand failed, return %{public}d", resultCode);
146             continue;
147         }
148         ACCESSTOKEN_LOG_INFO(LABEL, "Get resultCode: %{public}d", resultCode);
149     }
150     return TOKEN_SYNC_SUCCESS;
151 }
152 
UpdateRemoteHapTokenInfo(const HapTokenInfoForSync & tokenInfo)153 int TokenSyncManagerService::UpdateRemoteHapTokenInfo(const HapTokenInfoForSync& tokenInfo)
154 {
155     std::vector<DeviceInfo> devices = DeviceInfoRepository::GetInstance().ListDeviceInfo();
156     std::string localUdid = ConstantCommon::GetLocalDeviceId();
157     for (const DeviceInfo& device : devices) {
158         if (device.deviceId.uniqueDeviceId == localUdid) {
159             ACCESSTOKEN_LOG_INFO(LABEL, "No need notify local device");
160             continue;
161         }
162 
163         const std::shared_ptr<UpdateRemoteHapTokenCommand> updateRemoteHapTokenCommand =
164             RemoteCommandFactory::GetInstance().NewUpdateRemoteHapTokenCommand(ConstantCommon::GetLocalDeviceId(),
165             device.deviceId.uniqueDeviceId, tokenInfo);
166 
167         const int32_t resultCode = RemoteCommandManager::GetInstance().ExecuteCommand(
168             device.deviceId.uniqueDeviceId, updateRemoteHapTokenCommand);
169         if (resultCode != Constant::SUCCESS) {
170             ACCESSTOKEN_LOG_INFO(LABEL,
171                 "RemoteExecutorManager executeCommand updateRemoteHapTokenCommand failed, return %{public}d",
172                 resultCode);
173             continue;
174         }
175         ACCESSTOKEN_LOG_INFO(LABEL, "Get resultCode: %{public}d", resultCode);
176     }
177 
178     return TOKEN_SYNC_SUCCESS;
179 }
180 
Initialize()181 bool TokenSyncManagerService::Initialize()
182 {
183 #ifdef EVENTHANDLER_ENABLE
184     sendRunner_ = AppExecFwk::EventRunner::Create(true, AppExecFwk::ThreadMode::FFRT);
185     if (!sendRunner_) {
186         ACCESSTOKEN_LOG_ERROR(LABEL, "Failed to create a sendRunner.");
187         return false;
188     }
189 
190     sendHandler_ = std::make_shared<AccessEventHandler>(sendRunner_);
191     recvRunner_ = AppExecFwk::EventRunner::Create(true, AppExecFwk::ThreadMode::FFRT);
192     if (!recvRunner_) {
193         ACCESSTOKEN_LOG_ERROR(LABEL, "Failed to create a recvRunner.");
194         return false;
195     }
196 
197     recvHandler_ = std::make_shared<AccessEventHandler>(recvRunner_);
198 #endif
199     return true;
200 }
201 } // namespace AccessToken
202 } // namespace Security
203 } // namespace OHOS
204