summaryrefslogtreecommitdiff
path: root/src/components/policy/policy_external/include/policy/access_remote_impl.h
blob: 749edd6ce2e6b2e89457c51d9bea79caf3695460 (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
/*
 * Copyright (c) 2015, Ford Motor Company
 * All rights reserved.
 *
 * Redistribution and use in source and binary forms, with or without
 * modification, are permitted provided that the following conditions are met:
 *
 * Redistributions of source code must retain the above copyright notice, this
 * list of conditions and the following disclaimer.
 *
 * Redistributions in binary form must reproduce the above copyright notice,
 * this list of conditions and the following
 * disclaimer in the documentation and/or other materials provided with the
 * distribution.
 *
 * Neither the name of the Ford Motor Company nor the names of its contributors
 * may be used to endorse or promote products derived from this software
 * without specific prior written permission.
 *
 * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS"
 * AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
 * ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT HOLDER OR CONTRIBUTORS BE
 * LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
 * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
 * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
 * INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
 * CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
 * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
 * POSSIBILITY OF SUCH DAMAGE.
 */
#ifndef SRC_COMPONENTS_POLICY_POLICY_EXTERNAL_INCLUDE_POLICY_ACCESS_REMOTE_IMPL_H_
#define SRC_COMPONENTS_POLICY_POLICY_EXTERNAL_INCLUDE_POLICY_ACCESS_REMOTE_IMPL_H_

#include <map>
#include "policy/policy_table/types.h"
#include "utils/macro.h"
#include "utils/shared_ptr.h"
#include "policy/access_remote.h"
#include "policy/cache_manager.h"

using policy_table::FunctionalGroupings;

namespace policy {

class AccessRemoteImpl : public AccessRemote {
 public:
  AccessRemoteImpl();
  explicit AccessRemoteImpl(utils::SharedPtr<CacheManager> cache);

  virtual void Init();
  virtual void Enable();
  virtual void Disable();
  virtual bool IsEnabled() const;

  virtual void Allow(const Subject& who, const Object& what);
  virtual void Deny(const Subject& who, const Object& what);
  virtual void Reset(const Subject& who);
  virtual void Reset(const Object& what);
  virtual void Reset();
  virtual TypeAccess Check(const Subject& who, const Object& what) const;
  virtual bool CheckModuleType(const PTString& app_id,
                               policy_table::ModuleType module) const;
  virtual void SetDefaultHmiTypes(const Subject& who,
                                  const std::vector<int>& hmi_types);
  virtual const policy_table::Strings& GetGroups(const Subject& who);
  virtual bool GetPermissionsForApp(const std::string& device_id,
                                    const std::string& app_id,
                                    FunctionalIdType& group_types);
  virtual bool IsAppRemoteControl(const Subject& who);
  virtual bool GetModuleTypes(const std::string& policy_app_id,
                              std::vector<std::string>* modules);

 private:
  typedef std::map<Subject, TypeAccess> AccessControlRow;
  typedef std::map<Object, AccessControlRow> AccessControlList;
  typedef std::map<Subject, policy_table::AppHMITypes> HMIList;
  inline void set_enabled(bool value);
  inline bool country_consent() const;
  const policy_table::AppHMITypes& HmiTypes(const Subject& who);
  void GetGroupsIds(const std::string& device_id,
                    const std::string& app_id,
                    FunctionalGroupIDs& grops_ids);
  bool IsAllowed(const policy_table::AccessModules& modules,
                 const std::string& module_name,
                 const std::string& rpc_name,
                 RemoteControlParams* input) const;
  bool CompareParameters(const policy_table::Strings& parameters,
                         RemoteControlParams* input) const;
  utils::SharedPtr<CacheManager> cache_;
  bool enabled_;
  AccessControlList acl_;
  HMIList hmi_types_;

  friend struct Erase;
  friend struct IsTypeAccess;

#ifdef BUILD_TESTS
  FRIEND_TEST(AccessRemoteImplTest, KeyMapTest);
  FRIEND_TEST(AccessRemoteImplTest, Allow);
  FRIEND_TEST(AccessRemoteImplTest, Deny);
  FRIEND_TEST(AccessRemoteImplTest, ChangeAccess);
  FRIEND_TEST(AccessRemoteImplTest, ResetBySubject);
  FRIEND_TEST(AccessRemoteImplTest, ResetByObject);
  FRIEND_TEST(AccessRemoteImplTest, CheckAllowed);
  FRIEND_TEST(AccessRemoteImplTest, CheckDisallowed);
  FRIEND_TEST(AccessRemoteImplTest, CheckManual);
  FRIEND_TEST(AccessRemoteImplTest, CheckModuleType);
  FRIEND_TEST(AccessRemoteImplTest, EnableDisable);
  FRIEND_TEST(AccessRemoteImplTest, SetDefaultHmiTypes);
  FRIEND_TEST(AccessRemoteImplTest, GetGroups);
#endif  // BUILD_TESTS
};

}  // namespace policy

#endif  // SRC_COMPONENTS_POLICY_POLICY_EXTERNAL_INCLUDE_POLICY_ACCESS_REMOTE_IMPL_H_