summaryrefslogtreecommitdiff
path: root/src/components/policy/policy_external/include/policy/policy_manager_impl.h
blob: 3837dda1faa26dfc1af81f808cf1d1138833dbba (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379
380
381
382
383
384
385
386
387
388
389
390
391
392
393
394
395
396
397
398
399
400
401
402
403
404
405
406
407
408
409
410
411
412
413
414
415
416
417
418
419
420
421
422
423
424
425
426
427
428
429
430
431
432
433
434
435
436
437
438
439
440
441
442
443
444
445
446
447
448
449
450
451
452
453
454
455
456
457
458
459
460
461
462
463
464
465
466
467
468
469
470
471
472
473
474
475
476
477
478
479
480
481
482
483
484
485
486
487
488
489
490
491
492
493
494
495
496
497
498
499
500
501
502
503
504
505
506
507
508
509
510
511
512
513
514
515
516
517
518
519
520
521
522
523
524
525
526
527
528
529
530
531
532
533
534
535
536
537
538
539
540
541
542
543
544
545
546
547
548
549
550
551
552
553
554
555
556
557
558
559
560
561
562
563
564
565
566
567
568
569
570
571
572
573
574
575
576
577
578
579
580
581
582
583
584
585
586
587
588
589
590
591
592
593
594
595
596
597
598
599
600
601
602
603
604
605
606
607
608
609
610
611
612
613
614
615
616
617
618
619
620
621
622
623
624
625
626
627
628
629
630
631
632
633
634
635
636
637
638
639
640
641
642
643
644
645
646
647
648
649
650
651
652
653
654
655
656
657
658
659
660
661
662
663
664
665
666
667
668
669
670
671
672
673
674
675
676
677
678
679
680
681
682
683
684
685
686
687
688
689
690
691
692
693
694
695
696
697
698
699
700
701
702
703
704
705
706
707
708
709
710
711
712
713
714
715
716
717
718
719
720
721
722
723
724
725
726
727
728
729
730
731
732
733
734
735
736
737
738
739
740
741
742
743
744
745
746
747
748
749
750
751
752
753
754
755
756
757
758
759
760
761
762
763
764
765
766
767
768
769
770
771
772
773
774
775
776
777
778
779
780
781
782
783
784
785
786
787
788
789
790
791
792
793
794
795
796
797
798
799
800
801
802
803
804
805
806
807
808
809
810
811
812
813
814
815
816
817
818
819
820
821
822
823
824
825
826
827
828
829
830
831
832
833
834
835
836
837
838
839
840
841
842
843
844
845
846
847
848
849
850
851
852
853
854
855
856
857
858
859
860
861
862
863
864
865
866
867
868
869
870
871
872
873
874
875
876
877
878
879
880
881
882
883
884
885
886
887
888
889
890
891
892
893
894
895
896
897
898
899
900
901
902
903
904
905
906
907
908
909
910
911
912
913
914
915
916
917
918
919
920
921
922
923
924
925
926
927
928
929
930
931
932
933
934
935
936
937
938
939
940
941
942
943
944
945
946
947
948
949
950
951
952
953
954
955
956
957
958
959
960
961
962
963
964
965
966
967
968
969
970
971
972
973
974
975
976
977
978
979
980
981
982
983
984
985
986
987
988
989
990
991
992
993
994
995
996
997
998
999
1000
1001
1002
1003
1004
1005
1006
1007
1008
1009
1010
1011
1012
1013
1014
1015
1016
1017
1018
1019
1020
1021
1022
1023
1024
1025
1026
1027
1028
1029
1030
1031
1032
1033
1034
1035
1036
1037
1038
1039
1040
1041
1042
1043
1044
1045
1046
1047
1048
1049
1050
1051
1052
1053
1054
1055
1056
1057
1058
1059
1060
1061
1062
1063
1064
1065
1066
1067
1068
1069
1070
1071
1072
1073
1074
1075
1076
1077
1078
1079
1080
1081
1082
1083
1084
1085
1086
1087
1088
1089
1090
1091
1092
1093
1094
1095
1096
1097
1098
1099
1100
1101
1102
/*
 Copyright (c) 2013, Ford Motor Company
 All rights reserved.

 Redistribution and use in source and binary forms, with or without
 modification, are permitted provided that the following conditions are met:

 Redistributions of source code must retain the above copyright notice, this
 list of conditions and the following disclaimer.

 Redistributions in binary form must reproduce the above copyright notice,
 this list of conditions and the following
 disclaimer in the documentation and/or other materials provided with the
 distribution.

 Neither the name of the Ford Motor Company nor the names of its contributors
 may be used to endorse or promote products derived from this software
 without specific prior written permission.

 THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS"
 AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
 IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
 ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT HOLDER OR CONTRIBUTORS BE
 LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
 CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
 SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
 INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
 CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
 ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
 POSSIBILITY OF SUCH DAMAGE.
 */

#ifndef SRC_COMPONENTS_POLICY_POLICY_EXTERNAL_INCLUDE_POLICY_POLICY_MANAGER_IMPL_H_
#define SRC_COMPONENTS_POLICY_POLICY_EXTERNAL_INCLUDE_POLICY_POLICY_MANAGER_IMPL_H_

#include <list>

#include "utils/lock.h"
#include "policy/policy_manager.h"
#include "policy/policy_table.h"
#include "policy/cache_manager_interface.h"
#include "policy/update_status_manager.h"
#include "policy/policy_table/functions.h"
#include "policy/usage_statistics/statistics_manager.h"
#include "policy/access_remote.h"
#include "policy/access_remote_impl.h"

namespace policy_table = rpc::policy_table_interface_base;

namespace policy {
struct CheckAppPolicy;

class PolicyManagerImpl : public PolicyManager {
 public:
  PolicyManagerImpl();
  explicit PolicyManagerImpl(bool in_memory);

  /**
   * @brief set_listener set new policy listener instance
   * @param listener new policy listener
   */
  void set_listener(PolicyListener* listener) OVERRIDE;

  /**
   * @brief listener get current policy listener instance
   * @return current policy listener
   */
  PolicyListener* listener() const {
    return listener_;
  }

  /**
   * @brief Inits Policy Table
   * @param file_name path to preloaded PT file
   * @param settings pointer to policy init settings
   * @return true if init is successful
   */
  bool InitPT(const std::string& file_name,
              const PolicySettings* settings) OVERRIDE;

  /**
   * @brief Updates Policy Table from binary message received from
   * mobile device. Saves to Policy Table diff between Policy Table
   * sent in snapshot and received Policy Table.
   * @param file name of file with update policy table
   * @param pt_content PTU as binary string
   * @return true if successfully
   */
  bool LoadPT(const std::string& file,
              const BinaryMessage& pt_content) OVERRIDE;

  /**
   * @brief Resets Policy Table
   * @param file_name Path to preloaded PT file
   * @return true if successfully
   */
  bool ResetPT(const std::string& file_name) OVERRIDE;

  /**
   * @brief Gets last URL for sending PTS to from PT itself
   * @param service_type Service specifies user of URL
   * @return last URL or empty string if endpoint entry is empty
   */
  std::string GetUpdateUrl(int service_type) OVERRIDE;

  /**
   * @brief Gets all URLs for sending PTS to from PT itself.
   * @param service_type Service specifies user of URL
   * @param out_end_points output vector of urls
   */
  void GetUpdateUrls(const uint32_t service_type,
                     EndpointUrls& out_end_points) OVERRIDE;
  void GetUpdateUrls(const std::string& service_type,
                     EndpointUrls& out_end_points) OVERRIDE;

  /**
   * @brief PTU is needed, for this PTS has to be formed and sent.
   */
  void RequestPTUpdate() OVERRIDE;

  /**
   * @brief Check if specified RPC for specified application
   * has permission to be executed in specified HMI Level
   * and also its permitted params.
   * @param app_id Id of application provided during registration
   * @param hmi_level Current HMI Level of application
   * @param rpc Name of RPC
   * @param rpc_params List of RPC params
   * @param result containing flag if HMI Level is allowed
   * and list of allowed params.
   */
  void CheckPermissions(const PTString& app_id,
                        const PTString& hmi_level,
                        const PTString& rpc,
                        const RPCParams& rpc_params,
                        CheckPermissionResult& result) OVERRIDE;

  /**
   * @brief Clear all record of user consents. Used during Factory Reset.
   * @return bool Success of operation
   */
  bool ResetUserConsent() OVERRIDE;

  /**
   * @brief Checks is PT exceeded kilometers
   * @param kilometers current kilometers at odometer
   * @return true if exceeded
   */
  void KmsChanged(int kilometers) OVERRIDE;

  /**
   * @brief Increments counter of ignition cycles
   */
  void IncrementIgnitionCycles() OVERRIDE;

  /**
   * @brief Exchange by hmi or mobile request
   * @return Current status of policy table
   */
  std::string ForcePTExchange() OVERRIDE;

  /**
   * @brief Exchange by user request
   * @return Current status of policy table
   */
  std::string ForcePTExchangeAtUserRequest() OVERRIDE;

  /**
   * @brief Returns current status of policy table for HMI
   * @return Current status of policy table
   */
  std::string GetPolicyTableStatus() const OVERRIDE;

  /**
   * @brief Resets retry sequence
   */
  void ResetRetrySequence() OVERRIDE;

  /**
   * @brief Gets timeout to wait before next retry updating PT
   * If timeout is less or equal to zero then the retry sequence is not need.
   * @return timeout in seconds
   */
  int NextRetryTimeout() OVERRIDE;

  /**
   * @brief Gets timeout to wait until receive response
   * @return timeout in seconds
   */
  uint32_t TimeoutExchangeMSec() OVERRIDE;

  /**
   * @brief List of timeouts in seconds between retries
   *        when attempt to update PT fails
   * @return List of delays between attempts.
   */
  const std::vector<int> RetrySequenceDelaysSeconds() OVERRIDE;

  /**
   * @brief Handler of exceeding timeout of exchanging policy table
   */
  void OnExceededTimeout() OVERRIDE;

  /**
   * @brief GetLockScreenIcon allows to obtain lock screen icon url;
   * @return url which point to the resourse where lock screen icon could be
   *obtained.
   */
  std::string GetLockScreenIconUrl() const OVERRIDE;

  /**
   * @brief Handler of PTS sending out
   */
  void OnUpdateStarted() OVERRIDE;

  /**
   * @brief Sets counter value that passed for receiving PT UPdate.
   */
  void PTUpdatedAt(Counters counter, int value) OVERRIDE;

  /**
   * @brief Refresh data about retry sequence from policy table
   */
  virtual void RefreshRetrySequence();

  /**
   * @brief Gets user consent for mobile device data connection
   * @param device_id Unique device identifier
   * @return status of device consent
   */
  DeviceConsent GetUserConsentForDevice(
      const std::string& device_id) const OVERRIDE;

  /**
   * @brief Gets user consent for application
   * @param device_id Device id
   * @param policy_app_id Unique application id
   * @param permissions Array of functional groups permissions
   */
  void GetUserConsentForApp(
      const std::string& device_id,
      const std::string& policy_app_id,
      std::vector<FunctionalGroupPermission>& permissions) OVERRIDE;

  /**
   * @brief Set user consent for mobile device data connection
   * @param device_id Unique device identifier
   * @param is_allowed User consent for usage device data connection
   */
  void SetUserConsentForDevice(const std::string& device_id,
                               const bool is_allowed) OVERRIDE;

  /**
   * @brief Update Application Policies as reaction
   * on User allowing/disallowing device this app is running on.
   * @param app_id Unique application id
   * @param is_device_allowed true if user allowing device otherwise false
   * @return true if operation was successful
   */
  bool ReactOnUserDevConsentForApp(const std::string& app_id,
                                   const bool is_device_allowed) OVERRIDE;

  /**
   * @brief Retrieves data from app_policies about app on its registration:
   * @param application_id - id of registered app
   * @param nicknames Synonyms for application
   * @param app_hmi_types Section on HMI where app can appear (Navigation, Phone
   * etc)
   */
  bool GetInitialAppData(const std::string& application_id,
                         StringArray* nicknames = NULL,
                         StringArray* app_hmi_types = NULL) OVERRIDE;

  /**
   * @brief Add's device to policy table
   * @param device_id        Device mac address
   * @param connection_type  Device connection type
   */
  void AddDevice(const std::string& device_id,
                 const std::string& connection_type) OVERRIDE;

  /**
   * @brief Stores device parameters received during application registration
   * to policy table
   * @param device_id Device mac address
   * @param device_info Received device parameters
   */
  void SetDeviceInfo(const std::string& device_id,
                     const DeviceInfo& device_info) OVERRIDE;

  /**
   * @brief Set user consent for application functional groups
   * @param permissions User-defined application group pemissions.
   * The permissions is not const reference because it may contains
   * valid data as well as invalid. So we will remove all invalid data
   * from this structure.
   * @param mode notification mode
   */
  void SetUserConsentForApp(const PermissionConsent& permissions,
                            const NotificationMode mode) OVERRIDE;

  /**
   * @brief Get default HMI level for application
   * @param policy_app_id Unique application id
   * @param default_hmi Default HMI level for application or empty, if value
   * was not set
   * @return true, if succedeed, otherwise - false
   */
  bool GetDefaultHmi(const std::string& policy_app_id,
                     std::string* default_hmi) const OVERRIDE;

  /**
   * @brief Get priority for application
   * @param policy_app_id Unique application id
   * @param priority Priority for application or empty, if value was not set
   * @return true, if succedeed, otherwise - false
   */
  bool GetPriority(const std::string& policy_app_id,
                   std::string* priority) const OVERRIDE;

  /**
   * @brief Get user friendly messages for given RPC messages and language
   * @param message_codes RPC message codes
   * @param language Language
   * @param active_hmi_language Currently active language
   * @return Array of structs with appropriate message parameters
   */
  std::vector<UserFriendlyMessage> GetUserFriendlyMessages(
      const std::vector<std::string>& message_code,
      const std::string& language,
      const std::string& active_hmi_language) OVERRIDE;

  /**
   * @brief Checks if the application is revoked
   * @param app_id application id
   * @return true if application is revoked
   */
  bool IsApplicationRevoked(const std::string& app_id) const OVERRIDE;

  /**
   * @brief Get resulting RPCs permissions for application which started on
   * specific device
   * @param device_id Device id
   * @param policy_app_id Unique application id
   * @param permissions Array of functional groups permissions
   */
  void GetPermissionsForApp(
      const std::string& device_id,
      const std::string& policy_app_id,
      std::vector<FunctionalGroupPermission>& permissions) OVERRIDE;

  /**
   * @brief Return device id, which hosts specific application
   * @param policy_app_id Application id, which is required to update device id
   */
  std::string& GetCurrentDeviceId(
      const std::string& policy_app_id) const OVERRIDE;

  /**
   * @brief Set current system language
   * @param language Language
   */
  void SetSystemLanguage(const std::string& language) OVERRIDE;

  /**
   * @brief Set data from GetSystemInfo response to policy table
   * @param ccpu_version CCPU version
   * @param wers_country_code WERS country code
   * @param language System language
   */
  void SetSystemInfo(const std::string& ccpu_version,
                     const std::string& wers_country_code,
                     const std::string& language) OVERRIDE;

  /**
   * @brief Runs necessary operations, which is depends on external system
   * state, e.g. getting system-specific parameters which are need to be
   * filled into policy table
   */
  void OnSystemReady() OVERRIDE;

  /**
   * @brief Get number of notification by priority
   * @param priority Specified priority
   * @return notification number
   */
  uint32_t GetNotificationsNumber(const std::string& priority) const OVERRIDE;

  /**
   * @brief Allows to update Vehicle Identification Number in policy table.
   * @param new value for the parameter.
   */
  void SetVINValue(const std::string& value) OVERRIDE;

  /**
   * @brief Gets specific application permissions changes since last policy
   * table update
   * @param policy_app_id Unique application id
   * @return Permissions changes
   */
  AppPermissions GetAppPermissionsChanges(
      const std::string& policy_app_id) OVERRIDE;

  /**
   * @brief Removes specific application permissions changes
   * @param app_id Unique application id
   */
  void RemovePendingPermissionChanges(const std::string& app_id) OVERRIDE;

  /**
   * @brief Send OnPermissionsUpdated for choosen application
   * @param application_id Unique application id
   */
  void SendNotificationOnPermissionsUpdated(
      const std::string& application_id) OVERRIDE;

  /**
   * @brief Removes unpaired device records and related records from DB
   * @return true, if succedeed, otherwise - false
   */
  bool CleanupUnpairedDevices() OVERRIDE;

  /**
   * @brief Check if app can keep context.
   * @param app_id Unique application id
   * @return true if app can keep context, otherwise - false
   */
  bool CanAppKeepContext(const std::string& app_id) const OVERRIDE;

  /**
   * @brief Check if app can steal focus.
   * @param app_id Unique application id
   * @return true if app can steal focus, otherwise - false
   */
  bool CanAppStealFocus(const std::string& app_id) const OVERRIDE;

  /**
   * @brief Marks device as upaired
   * @param device_id id device
   */
  void MarkUnpairedDevice(const std::string& device_id) OVERRIDE;

  /**
   * @brief Adds, application to the db or update existed one
   * run PTU if policy update is necessary for application.
   * @param application_id Unique application id
   * @param hmi_types application HMI types
   * @return function that will notify update manager about new application
   */
  StatusNotifier AddApplication(
      const std::string& application_id,
      const rpc::policy_table_interface_base::AppHmiTypes& hmi_types) OVERRIDE;

  /**
   * @brief Assigns new HMI types for specified application
   * @param application_id Unique application id
   * @param hmi_types new HMI types list
   */
  void SetDefaultHmiTypes(const std::string& application_id,
                          const std::vector<int>& hmi_types) OVERRIDE;

  /**
   * @brief Gets HMI types
   * @param application_id ID application
   * @param app_types list to save HMI types
   * @return true if policy has specific policy for this application
   */
  bool GetHMITypes(const std::string& application_id,
                   std::vector<int>* app_types) OVERRIDE;

  /**
   * @brief Setter for access_remote instance
   * @param access_remote pointer to new access_remote instance
   */
  void set_access_remote(std::shared_ptr<AccessRemote> access_remote) OVERRIDE;

  /**
   * @brief Sends notification about application HMI level changed
   * @param who application information structure
   */
  void SendHMILevelChanged(const ApplicationOnDevice& who);

  /**
   * @brief Sends notification if application permissions were changed
   * @param application_id Unique id of application
   */
  void OnPrimaryGroupsChanged(const std::string& application_id);

  /**
   * @brief Removes consent for application functional group
   * @param application_id Unique id of application
   * @param group_name application functional group name
   */
  virtual void RemoveAppConsentForGroup(const std::string& app_id,
                                        const std::string& group_name);

  /**
   * @brief Returns heart beat timeout
   * @param app_id application id
   * @return if timeout was set then value in milliseconds greater zero
   * otherwise heart beat for specific application isn't set
   */
  uint32_t HeartBeatTimeout(const std::string& app_id) const OVERRIDE;

  /**
   * @brief SaveUpdateStatusRequired allows to save update status.
   * @param is_update_needed true if update needed
   */
  void SaveUpdateStatusRequired(bool is_update_needed) OVERRIDE;

  /**
   * @brief Checks, if application has policy assigned w/o data consent
   * @param policy_app_id Unique application id
   * @return true, if policy assigned w/o data consent, otherwise -false
   */
  bool IsPredataPolicy(const std::string& policy_app_id) const OVERRIDE;

  /**
   * @brief Setter for cache_manager instance
   * @param cache_manager pointer to new cache_manager instance
   */
  void set_cache_manager(CacheManagerInterface* cache_manager);

  /**
   * @brief Handler on applications search started
   */
  void OnAppsSearchStarted() OVERRIDE;

  /**
   * @brief Handler on applications search completed
   * @param trigger_ptu contains true if PTU should be triggered
   */
  void OnAppsSearchCompleted(const bool trigger_ptu) OVERRIDE;

  /**
    * @brief Get state of request types for given application
    * @param policy_app_id Unique application id
    * @return request type state
    */
  RequestType::State GetAppRequestTypesState(
      const std::string& policy_app_id) const OVERRIDE;

  /**
   * @brief Get state of request subtypes for given application
   * @param policy_app_id Unique application id
   * @return request subtype state
   */
  RequestSubType::State GetAppRequestSubTypesState(
      const std::string& policy_app_id) const OVERRIDE;

  /**
   * @brief Gets request types for application
   * @param policy_app_id Unique application id
   * @return request types of application
   */
  const std::vector<std::string> GetAppRequestTypes(
      const std::string policy_app_id) const OVERRIDE;

  /**
    * @brief Gets request subtypes for application
    * @param policy_app_id Unique application id
    * @return request subtypes of application
    */
  const std::vector<std::string> GetAppRequestSubTypes(
      const std::string& policy_app_id) const OVERRIDE;

  /**
   * @brief Get information about vehicle
   * @return vehicle information
   */
  const VehicleInfo GetVehicleInfo() const OVERRIDE;

  /**
   * @brief OnAppRegisteredOnMobile allows to handle event when application were
   * succesfully registered on mobile device.
   * It will send OnAppPermissionSend notification and will try to start PTU. *
   * @param application_id registered application.
   */
  void OnAppRegisteredOnMobile(const std::string& application_id) OVERRIDE;

  void OnDeviceSwitching(const std::string& device_id_from,
                         const std::string& device_id_to) OVERRIDE;

  /**
   * @brief Gets meta information
   * @return meta information
   */
  const MetaInfo GetMetaInfo() const OVERRIDE;

  /**
   * @brief RetrieveCertificate Allows to obtain certificate in order
   * to start secure connection.
   * @return The certificate in PKCS#7 format.
   */
  std::string RetrieveCertificate() const OVERRIDE;

  /**
   * @brief HasCertificate check whether policy table has certificate
   * int module_config section.
   * @return true in case certificate exists, false otherwise
   */
  bool HasCertificate() const OVERRIDE;

  /**
   * @brief Sets decrypted certificate in policy table
   * @param certificate content of certificate
   */
  void SetDecryptedCertificate(const std::string& certificate) OVERRIDE;

  /**
   * @brief Getter for policy settings
   * @return policy settings instance
   */
  const PolicySettings& get_settings() const OVERRIDE;

  /**
   * @brief Finds the next URL that must be sent on OnSystemRequest retry
   * @param urls vector of vectors that contain urls for each application
   * @return Pair of policy application id and application url id from the
   * urls vector
   */
  AppIdURL GetNextUpdateUrl(const EndpointUrls& urls) OVERRIDE;

  /**
   * @brief Checks if there is existing URL in the EndpointUrls vector with
   * index saved in the policy manager and if not, it moves to the next
   * application index
   * @param rs contains the application index and url index from the
   * urls vector that are to be sent on the next OnSystemRequest
   * @param urls vector of vectors that contain urls for each application
   * @return Pair of application index and url index
   */
  AppIdURL RetrySequenceUrl(const struct RetrySequenceURL& rs,
                            const EndpointUrls& urls) const OVERRIDE;

  /**
   * @brief  Checks, if SDL needs to update it's policy table section
             "external_consent_status"
   * @param  ExternalConsent status
   * @return true if such check is needed, false - if not.
   */
  bool IsNeedToUpdateExternalConsentStatus(
      const ExternalConsentStatus& status) const OVERRIDE;

  /**
   * @brief Saves customer connectivity settings status
   * @param status ExternalConsent status
   * @return true if succeeded, otherwise - false
   */
  bool SetExternalConsentStatus(const ExternalConsentStatus& status) OVERRIDE;

  /**
   * @brief Gets customer connectivity settings status
   * @return ExternalConsent status
   */
  ExternalConsentStatus GetExternalConsentStatus() OVERRIDE;

#ifdef BUILD_TESTS
  /**
   * @brief Getter for cache_manager instance
   * @return cache_manager instance
   */
  inline CacheManagerInterfaceSPtr GetCache() {
    return cache_;
  }

  /**
   * @brief Setter for send_on_update_sent_out and wrong_ptu_update_received
   * @param send_on_update_sent_out new value of this flag
   * @param wrong_ptu_update_received new value of this flag
   */
  inline void SetSendOnUpdateFlags(const bool send_on_update_sent_out,
                                   const bool wrong_ptu_update_received) {
    send_on_update_sent_out_ = send_on_update_sent_out;
    wrong_ptu_update_received_ = wrong_ptu_update_received;
  }
#endif  // BUILD_TESTS

  // Interface StatisticsManager (begin)
  /**
   * @brief Increments global counter
   * @param type counter type
   */
  void Increment(usage_statistics::GlobalCounterId type) OVERRIDE;

  /**
   * @brief Increments specified application counter
   * @param app_id Unique ID of application
   * @param type application counter type
   */
  void Increment(const std::string& app_id,
                 usage_statistics::AppCounterId type) OVERRIDE;
  /**
   * @brief Sets specified application info value
   * @param app_id Unique ID of application
   * @param type application info type
   * @param value new value for counter
   */
  void Set(const std::string& app_id,
           usage_statistics::AppInfoId type,
           const std::string& value) OVERRIDE;

  /**
   * @brief Add seconds for specified application stopwatch
   * @param app_id Unique ID of application
   * @param type application stopwatch type
   * @param timespan_seconds seconds to add
   */
  void Add(const std::string& app_id,
           usage_statistics::AppStopwatchId type,
           int32_t timespan_seconds) OVERRIDE;
  // Interface StatisticsManager (end)

 protected:
  /**
   * @brief Parse policy table content and convert to PT object
   * @param pt_content binary content of PT
   * @return pointer to converted PT
   */
  virtual std::shared_ptr<policy_table::Table> Parse(
      const BinaryMessage& pt_content);

 private:
  /**
   * @brief Checks if PT update should be started and schedules it if needed
   */
  void CheckTriggers();

  /**
   * @brief Compares current applications policies to the updated one and
   * returns apporopriate result codes per application, which that are being
   * processed by sending notification to applications registered and to the
   * system
   * @param update Shared pointer to policy table udpate
   * @param snapshot Shared pointer to current copy of policy table
   * @return Collection per-application results
   */
  CheckAppPolicyResults CheckPermissionsChanges(
      const std::shared_ptr<policy_table::Table> update,
      const std::shared_ptr<policy_table::Table> snapshot);

  /**
   * @brief Processes results from policy table update analysis done by
   * CheckPermissionsChanges() by filling ApplicationsPoliciesActions struct
   * with actions which should be done for every application and passes them to
   * ProcessActionsForAppPolicies()
   * @param results Collection of per-application results
   * @param app_policies Reference to updated application policies section as
   * a data source for generating notifications data
   */
  void ProcessAppPolicyCheckResults(
      const CheckAppPolicyResults& results,
      const policy_table::ApplicationPolicies& app_policies);

  /**
   * @brief Processes actions filled in ProcessAppPolicyCheckResults() for every
   * application by sending OnPermissionChange and OnAppPermissionChanged
   * notifications and by checking consent where it needed
   * @param actions Reference to map with actions to be done or not for every
   * application
   * @param app_policies Reference to updated application policies section as
   * a data source for generating notifications data
   */
  void ProcessActionsForAppPolicies(
      const ApplicationsPoliciesActions& actions,
      const policy_table::ApplicationPolicies& app_policies);

  /**
   * @brief Fill structure to be sent with OnPermissionsChanged notification
   *
   * @param Policy table struct, which contains rpc functional groups data
   * @param List of rpc functional group names, which should be checked
   * @param group_permission User permissions for functional groups
   * @param Notification struct to be filled and sent
   */
  void PrepareNotificationData(
      const policy_table::FunctionalGroupings& groups,
      const policy_table::Strings& group_names,
      const std::vector<FunctionalGroupPermission>& group_permission,
      Permissions& notification_data);

  /**
   * @brief Validate PermissionConsent structure according to currently
   * assigned groups
   * @param permissions PermissionConsent structure that should be validated.
   * @return PermissonConsent struct, which contains no foreign groups
   */
  PermissionConsent EnsureCorrectPermissionConsent(
      const PermissionConsent& permissions_to_check);

  /**
   * @brief Allows to process case when added application is not present in
   * policy db.
   * @param policy application id.
   * @param cuuren consent for application's device.
   */
  void AddNewApplication(const std::string& application_id,
                         DeviceConsent device_consent);

  /**
   * @brief Allows to process case when added application is already
   * in policy db.
   * @param policy application id.
   * @param cuuren consent for application's device.
   */
  void PromoteExistedApplication(const std::string& application_id,
                                 DeviceConsent device_consent);

  /**
   * @brief Check if certain application already in policy db.
   * @param policy application id.
   * @return true if application presents false otherwise.
   */
  bool IsNewApplication(const std::string& application_id) const;

  /**
   * Checks existing and permissions of AppStorageFolder
   * @return true if AppStorageFolder exists and has permissions read/write
   */
  bool CheckAppStorageFolder() const;

  /**
   * @brief Checks whether need ask the permission of users
   * @return true if user consent is needed
   */
  virtual bool IsConsentNeeded(const std::string& app_id);

  /**
   * @brief Changes isConsentNeeded for app pending permissions, in case
   * user set permissions before app activation.
   * @param Unique app id
   * @param Current permissions for app
   */
  void CheckPendingPermissionsChanges(
      const std::string& policy_app_id,
      const std::vector<FunctionalGroupPermission>& current_permissions);

  /**
   * @brief StartPTExchange allows to start PTU. The function will check
   * if one is required and starts the update flow in only case when previous
   * condition is true.
   */
  void StartPTExchange() OVERRIDE;

  /**
   * @brief Checks is PT exceeded days
   * @return true if exceeded
   */
  bool ExceededDays() OVERRIDE;

  /**
   * @brief Checks is PT exceeded IgnitionCycles
   * @return true if exceeded
   */
  bool ExceededIgnitionCycles() OVERRIDE;

  /**
   * @brief Checks is specified policy table valid
   * @param policy_table pointer to policy table to check
   * @param type policy table type
   * @return true if policy table valid, otherwise false
   */
  bool IsPTValid(std::shared_ptr<policy_table::Table> policy_table,
                 policy_table::PolicyTableType type) const;

  /**
   * @brief Get resulting RPCs permissions for application which started on
   * specific device
   * @param device_id Device id
   * @param policy_app_id Unique application id
   * @param permissions Array of RPC param/HMI permissions
   */
  void GetPermissions(const std::string device_id,
                      const std::string application_id,
                      Permissions* data);

  /**
   * @brief Checks if module for application is present in policy table
   * @param app_id id of application
   * @param module type
   * @return true if module is present, otherwise - false
   */
  bool CheckModule(const PTString& app_id, const PTString& module) OVERRIDE;

  /**
   * @brief Send OnPermissionsChange notification to mobile app
   * when it's permissions are changed.
   * @param device_id Device on which app is running
   * @param application_id ID of app whose permissions are changed
   */
  void SendAppPermissionsChanged(const std::string& device_id,
                                 const std::string& application_id) OVERRIDE;

  /**
    * @brief Gets all allowed module types
    * @param policy_app_id unique identifier of application
    * @param modules list of allowed module types
    * @return true if application has allowed modules
    */
  bool GetModuleTypes(const std::string& policy_app_id,
                      std::vector<std::string>* modules) const OVERRIDE;

  /**
   * @brief Notify application about its permissions changes by preparing and
   * sending OnPermissionsChanged notification
   * @param policy_app_id Application id to send notification to
   * @param app_group_permissons Current permissions for groups assigned to
   * application
   */
  void NotifyPermissionsChanges(
      const std::string& policy_app_id,
      const std::vector<FunctionalGroupPermission>& app_group_permissions);

  /**
   * @brief Processes updated ExternalConsent status received via
   * OnAppPermissionConsent
   * notification by updating user consents and ExternalConsent consents for
   * registered and
   * known before by policy table (must have any user consent records)
   * @param groups_by_status Collection of ExternalConsent entities with their
   * statuses
   * @param processing_policy Defines whether consents timestamps must be
   * considered or external consents take over
   */
  void ProcessExternalConsentStatusUpdate(
      const GroupsByExternalConsentStatus& groups_by_status,
      const ConsentProcessingPolicy processing_policy);

  /**
   * @brief Processes ExternalConsent status for application registered
   * afterward, so its
   * user consents (if any) and ExternalConsent consents (if any) will be
   * updated
   * appropiately to current ExternalConsent status stored by policy table
   * @param application_id Application id
   * @param processing_policy Defines whether consents timestamps must be
   * considered or external consents take over
   */
  void ProcessExternalConsentStatusForApp(
      const std::string& application_id,
      const ConsentProcessingPolicy processing_policy);
  /**
   * @brief Directly updates user consent and ExternalConsent consents (if any)
   * for
   * application if it has assigned any of group from allowed or disallowed
   * lists
   * @param device_id Device id which is linked to application id
   * @param application_id Application id
   * @param allowed_groups List of group names allowed by current
   * ExternalConsent status
   * @param disallowed_groups List of group names disallwed by current
   * ExternalConsent status
   * @param processing_policy Defines whether consents timestamps have to be
   * considered or external consents take over
   */
  void UpdateAppConsentWithExternalConsent(
      const std::string& device_id,
      const std::string& application_id,
      const GroupsNames& allowed_groups,
      const GroupsNames& disallowed_groups,
      const ConsentProcessingPolicy processing_policy);

  typedef policy_table::ApplicationPolicies::value_type AppPoliciesValueType;

  /**
   * @brief Notifies system by sending OnAppPermissionChanged notification
   * @param app_policy Reference to application policy
   */
  void NotifySystem(const AppPoliciesValueType& app_policy) const;

  /**
   * @brief Sends OnPermissionChange notification to application if its
   * currently registered
   * @param app_policy Reference to application policy
   */
  void SendPermissionsToApp(const AppPoliciesValueType& app_policy);

  /**
   * @brief Gets groups names from collection of groups permissions
   * @param app_group_permissions Collection of groups permissions
   * @return Collection of group names
   */
  policy_table::Strings GetGroupsNames(
      const std::vector<FunctionalGroupPermission>& app_group_permissions)
      const;

  /**
   * @brief Calculates consents for groups based on mapped ExternalConsent
   * entities statuses
   * and groups containers where entities have been found
   * @param groups_by_external_consent ExternalConsent entities mapped to
   * functional groups names and
   * their containters where this entity has been found
   * @param out_allowed_groups List of groups allowed by ExternalConsent status
   * @param out_disallowed_groups List of groups disallowed by ExternalConsent
   * status
   */
  void CalculateGroupsConsentFromExternalConsent(
      const GroupsByExternalConsentStatus& groups_by_external_consent,
      GroupsNames& out_allowed_groups,
      GroupsNames& out_disallowed_groups) const;

  /**
   * @brief pointer to policy table listener for callbacks
   */
  PolicyListener* listener_;

  /**
   * @brief UpdateStatusManager instance for controlling PT status
   */
  UpdateStatusManager update_status_manager_;

  /**
   * @brief pointer to CacheManagerInterface instance for getting policy data
   */
  CacheManagerInterfaceSPtr cache_;
  /**
   * @brief pointer to AccessRemote instance for working with RC applications
   */
  std::shared_ptr<AccessRemote> access_remote_;

  /**
   * @brief lock guard for protecting applications list access
   */
  sync_primitives::Lock apps_registration_lock_;

  /**
   * @brief lock guard for protecting application permissions access
   */
  sync_primitives::Lock app_permissions_diff_lock_;

  /**
   * @brief Collection of parameters to be reported to the system with
   * SDL.ActivateApp response or OnAppPermissionsChanged notification
   * Being set during policy table update processing
   */
  typedef std::map<std::string, AppPermissions> PendingPermissions;
  PendingPermissions app_permissions_diff_;

  /**
   * @brief Timeout to wait response with UpdatePT
   */
  uint32_t retry_sequence_timeout_;

  /**
   * @brief Seconds between retries to update PT
   */
  std::vector<int> retry_sequence_seconds_;

  /**
   * @brief Current index trying of retry sequence
   */
  uint32_t retry_sequence_index_;

  /**
   * @brief Lock for guarding retry sequence
   */
  sync_primitives::Lock retry_sequence_lock_;

  /**
   * @brief Device id, which is used during PTU handling for specific
   * application
   */
  mutable std::string last_device_id_;

  /**
   * @brief Flag for checking first ignition cycle
   */
  bool ignition_check;

  /**
   * @brief Pointer to current policy settings structure
   */
  const PolicySettings* settings_;
  friend struct CheckAppPolicy;

  /**
   * @brief Pair of app index and url index from Endpoints vector
   * that contains all application URLs
   */
  RetrySequenceURL retry_sequence_url_;
  friend struct ProccessAppGroups;

  /**
   * @brief Flag for notifying that invalid PTU was received
   */
  bool wrong_ptu_update_received_;

  /**
   * @brief Flag for notifying that PTU was started
   */
  bool send_on_update_sent_out_;

  /**
   * @brief Flag for notifying that invalid PTU should be triggered
   */
  bool trigger_ptu_;
};

}  // namespace policy

#endif  // SRC_COMPONENTS_POLICY_POLICY_EXTERNAL_INCLUDE_POLICY_POLICY_MANAGER_IMPL_H_