1 /*
2 * Copyright (c) 2022 Huawei Device Co., Ltd.
3 * Licensed under the Apache License, Version 2.0 (the "License");
4 * you may not use this file except in compliance with the License.
5 * You may obtain a copy of the License at
6 *
7 * http://www.apache.org/licenses/LICENSE-2.0
8 *
9 * Unless required by applicable law or agreed to in writing, software
10 * distributed under the License is distributed on an "AS IS" BASIS,
11 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
12 * See the License for the specific language governing permissions and
13 * limitations under the License.
14 */
15
16 #include "token_sync_manager_service.h"
17
18 #include <securec.h>
19
20 #include "accesstoken_log.h"
21 #include "constant_common.h"
22 #include "device_info_repository.h"
23 #include "device_info.h"
24 #include "remote_command_manager.h"
25 #include "soft_bus_manager.h"
26 #include "system_ability_definition.h"
27
28 namespace OHOS {
29 namespace Security {
30 namespace AccessToken {
31 namespace {
32 static constexpr OHOS::HiviewDFX::HiLogLabel LABEL = {LOG_CORE, SECURITY_DOMAIN_ACCESSTOKEN, "TokenSyncManagerService"};
33 }
34
35 const bool REGISTER_RESULT =
36 SystemAbility::MakeAndRegisterAbility(DelayedSingleton<TokenSyncManagerService>::GetInstance().get());
37
TokenSyncManagerService()38 TokenSyncManagerService::TokenSyncManagerService()
39 : SystemAbility(SA_ID_TOKENSYNC_MANAGER_SERVICE, false), state_(ServiceRunningState::STATE_NOT_START)
40 {
41 ACCESSTOKEN_LOG_INFO(LABEL, "TokenSyncManagerService()");
42 }
43
~TokenSyncManagerService()44 TokenSyncManagerService::~TokenSyncManagerService()
45 {
46 ACCESSTOKEN_LOG_INFO(LABEL, "~TokenSyncManagerService()");
47 }
48
OnStart()49 void TokenSyncManagerService::OnStart()
50 {
51 if (state_ == ServiceRunningState::STATE_RUNNING) {
52 ACCESSTOKEN_LOG_INFO(LABEL, "TokenSyncManagerService has already started!");
53 return;
54 }
55 ACCESSTOKEN_LOG_INFO(LABEL, "TokenSyncManagerService is starting");
56 if (!Initialize()) {
57 ACCESSTOKEN_LOG_ERROR(LABEL, "Failed to initialize");
58 return;
59 }
60 state_ = ServiceRunningState::STATE_RUNNING;
61 bool ret = Publish(DelayedSingleton<TokenSyncManagerService>::GetInstance().get());
62 if (!ret) {
63 ACCESSTOKEN_LOG_ERROR(LABEL, "Failed to publish service!");
64 return;
65 }
66 (void)AddSystemAbilityListener(DISTRIBUTED_HARDWARE_DEVICEMANAGER_SA_ID);
67 ACCESSTOKEN_LOG_INFO(LABEL, "Congratulations, TokenSyncManagerService start successfully!");
68 }
69
OnStop()70 void TokenSyncManagerService::OnStop()
71 {
72 ACCESSTOKEN_LOG_INFO(LABEL, "Stop service");
73 state_ = ServiceRunningState::STATE_NOT_START;
74 SoftBusManager::GetInstance().Destroy();
75 }
76
OnAddSystemAbility(int32_t systemAbilityId,const std::string & deviceId)77 void TokenSyncManagerService::OnAddSystemAbility(int32_t systemAbilityId, const std::string& deviceId)
78 {
79 if (systemAbilityId == DISTRIBUTED_HARDWARE_DEVICEMANAGER_SA_ID) {
80 SoftBusManager::GetInstance().Initialize();
81 }
82 }
83
84 #ifdef EVENTHANDLER_ENABLE
GetSendEventHandler() const85 std::shared_ptr<AccessEventHandler> TokenSyncManagerService::GetSendEventHandler() const
86 {
87 return sendHandler_;
88 }
89
GetRecvEventHandler() const90 std::shared_ptr<AccessEventHandler> TokenSyncManagerService::GetRecvEventHandler() const
91 {
92 return recvHandler_;
93 }
94 #endif
95
GetRemoteHapTokenInfo(const std::string & deviceID,AccessTokenID tokenID)96 int TokenSyncManagerService::GetRemoteHapTokenInfo(const std::string& deviceID, AccessTokenID tokenID)
97 {
98 if (!DataValidator::IsDeviceIdValid(deviceID) || tokenID == 0) {
99 ACCESSTOKEN_LOG_INFO(LABEL, "Params is wrong.");
100 return TOKEN_SYNC_PARAMS_INVALID;
101 }
102 DeviceInfo devInfo;
103 bool result = DeviceInfoRepository::GetInstance().FindDeviceInfo(deviceID, DeviceIdType::UNKNOWN, devInfo);
104 if (!result) {
105 ACCESSTOKEN_LOG_INFO(LABEL, "FindDeviceInfo failed");
106 return TOKEN_SYNC_REMOTE_DEVICE_INVALID;
107 }
108 std::string udid = devInfo.deviceId.uniqueDeviceId;
109 const std::shared_ptr<SyncRemoteHapTokenCommand> syncRemoteHapTokenCommand =
110 RemoteCommandFactory::GetInstance().NewSyncRemoteHapTokenCommand(ConstantCommon::GetLocalDeviceId(),
111 deviceID, tokenID);
112
113 const int32_t resultCode = RemoteCommandManager::GetInstance().ExecuteCommand(udid, syncRemoteHapTokenCommand);
114 if (resultCode != Constant::SUCCESS) {
115 ACCESSTOKEN_LOG_INFO(LABEL,
116 "RemoteExecutorManager executeCommand SyncRemoteHapTokenCommand failed, return %{public}d", resultCode);
117 return TOKEN_SYNC_COMMAND_EXECUTE_FAILED;
118 }
119 ACCESSTOKEN_LOG_INFO(LABEL, "Get resultCode: %{public}d", resultCode);
120 return TOKEN_SYNC_SUCCESS;
121 }
122
DeleteRemoteHapTokenInfo(AccessTokenID tokenID)123 int TokenSyncManagerService::DeleteRemoteHapTokenInfo(AccessTokenID tokenID)
124 {
125 if (tokenID == 0) {
126 ACCESSTOKEN_LOG_INFO(LABEL, "Params is wrong, token id is invalid.");
127 return TOKEN_SYNC_PARAMS_INVALID;
128 }
129
130 std::vector<DeviceInfo> devices = DeviceInfoRepository::GetInstance().ListDeviceInfo();
131 std::string localUdid = ConstantCommon::GetLocalDeviceId();
132 for (const DeviceInfo& device : devices) {
133 if (device.deviceId.uniqueDeviceId == localUdid) {
134 ACCESSTOKEN_LOG_INFO(LABEL, "No need notify local device");
135 continue;
136 }
137 const std::shared_ptr<DeleteRemoteTokenCommand> deleteRemoteTokenCommand =
138 RemoteCommandFactory::GetInstance().NewDeleteRemoteTokenCommand(ConstantCommon::GetLocalDeviceId(),
139 device.deviceId.uniqueDeviceId, tokenID);
140
141 const int32_t resultCode = RemoteCommandManager::GetInstance().ExecuteCommand(
142 device.deviceId.uniqueDeviceId, deleteRemoteTokenCommand);
143 if (resultCode != Constant::SUCCESS) {
144 ACCESSTOKEN_LOG_INFO(LABEL,
145 "RemoteExecutorManager executeCommand DeleteRemoteTokenCommand failed, return %{public}d", resultCode);
146 continue;
147 }
148 ACCESSTOKEN_LOG_INFO(LABEL, "Get resultCode: %{public}d", resultCode);
149 }
150 return TOKEN_SYNC_SUCCESS;
151 }
152
UpdateRemoteHapTokenInfo(const HapTokenInfoForSync & tokenInfo)153 int TokenSyncManagerService::UpdateRemoteHapTokenInfo(const HapTokenInfoForSync& tokenInfo)
154 {
155 std::vector<DeviceInfo> devices = DeviceInfoRepository::GetInstance().ListDeviceInfo();
156 std::string localUdid = ConstantCommon::GetLocalDeviceId();
157 for (const DeviceInfo& device : devices) {
158 if (device.deviceId.uniqueDeviceId == localUdid) {
159 ACCESSTOKEN_LOG_INFO(LABEL, "No need notify local device");
160 continue;
161 }
162
163 const std::shared_ptr<UpdateRemoteHapTokenCommand> updateRemoteHapTokenCommand =
164 RemoteCommandFactory::GetInstance().NewUpdateRemoteHapTokenCommand(ConstantCommon::GetLocalDeviceId(),
165 device.deviceId.uniqueDeviceId, tokenInfo);
166
167 const int32_t resultCode = RemoteCommandManager::GetInstance().ExecuteCommand(
168 device.deviceId.uniqueDeviceId, updateRemoteHapTokenCommand);
169 if (resultCode != Constant::SUCCESS) {
170 ACCESSTOKEN_LOG_INFO(LABEL,
171 "RemoteExecutorManager executeCommand updateRemoteHapTokenCommand failed, return %{public}d",
172 resultCode);
173 continue;
174 }
175 ACCESSTOKEN_LOG_INFO(LABEL, "Get resultCode: %{public}d", resultCode);
176 }
177
178 return TOKEN_SYNC_SUCCESS;
179 }
180
Initialize()181 bool TokenSyncManagerService::Initialize()
182 {
183 #ifdef EVENTHANDLER_ENABLE
184 sendRunner_ = AppExecFwk::EventRunner::Create(true, AppExecFwk::ThreadMode::FFRT);
185 if (!sendRunner_) {
186 ACCESSTOKEN_LOG_ERROR(LABEL, "Failed to create a sendRunner.");
187 return false;
188 }
189
190 sendHandler_ = std::make_shared<AccessEventHandler>(sendRunner_);
191 recvRunner_ = AppExecFwk::EventRunner::Create(true, AppExecFwk::ThreadMode::FFRT);
192 if (!recvRunner_) {
193 ACCESSTOKEN_LOG_ERROR(LABEL, "Failed to create a recvRunner.");
194 return false;
195 }
196
197 recvHandler_ = std::make_shared<AccessEventHandler>(recvRunner_);
198 #endif
199 return true;
200 }
201 } // namespace AccessToken
202 } // namespace Security
203 } // namespace OHOS
204