ConnectionFromClient.cpp 12 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336
  1. /*
  2. * Copyright (c) 2021, Andreas Kling <kling@serenityos.org>
  3. *
  4. * SPDX-License-Identifier: BSD-2-Clause
  5. */
  6. #include "ConnectionFromClient.h"
  7. #include <ConfigServer/ConfigClientEndpoint.h>
  8. #include <LibCore/ConfigFile.h>
  9. #include <LibCore/FileWatcher.h>
  10. #include <LibCore/Timer.h>
  11. namespace ConfigServer {
  12. static HashMap<int, RefPtr<ConnectionFromClient>> s_connections;
  13. struct CachedDomain {
  14. DeprecatedString domain;
  15. NonnullRefPtr<Core::ConfigFile> config;
  16. RefPtr<Core::FileWatcher> watcher;
  17. };
  18. static HashMap<DeprecatedString, NonnullOwnPtr<CachedDomain>> s_cache;
  19. static constexpr int s_disk_sync_delay_ms = 5'000;
  20. static void for_each_monitoring_connection(DeprecatedString const& domain, ConnectionFromClient* excluded_connection, Function<void(ConnectionFromClient&)> callback)
  21. {
  22. for (auto& it : s_connections) {
  23. if (it.value->is_monitoring_domain(domain) && (!excluded_connection || it.value != excluded_connection))
  24. callback(*it.value);
  25. }
  26. }
  27. static Core::ConfigFile& ensure_domain_config(DeprecatedString const& domain)
  28. {
  29. auto it = s_cache.find(domain);
  30. if (it != s_cache.end())
  31. return *it->value->config;
  32. auto config = Core::ConfigFile::open_for_app(domain, Core::ConfigFile::AllowWriting::Yes).release_value_but_fixme_should_propagate_errors();
  33. // FIXME: Use a single FileWatcher with multiple watches inside.
  34. auto watcher_or_error = Core::FileWatcher::create(InodeWatcherFlags::Nonblock);
  35. VERIFY(!watcher_or_error.is_error());
  36. auto result = watcher_or_error.value()->add_watch(config->filename(), Core::FileWatcherEvent::Type::ContentModified);
  37. VERIFY(!result.is_error());
  38. watcher_or_error.value()->on_change = [config, domain](auto&) {
  39. auto new_config = Core::ConfigFile::open(config->filename(), Core::ConfigFile::AllowWriting::Yes).release_value_but_fixme_should_propagate_errors();
  40. for (auto& group : config->groups()) {
  41. for (auto& key : config->keys(group)) {
  42. if (!new_config->has_key(group, key)) {
  43. for_each_monitoring_connection(domain, nullptr, [&domain, &group, &key](ConnectionFromClient& connection) {
  44. connection.async_notify_removed_key(domain, group, key);
  45. });
  46. }
  47. }
  48. }
  49. // FIXME: Detect type of keys.
  50. for (auto& group : new_config->groups()) {
  51. for (auto& key : new_config->keys(group)) {
  52. auto old_value = config->read_entry(group, key);
  53. auto new_value = new_config->read_entry(group, key);
  54. if (old_value != new_value) {
  55. for_each_monitoring_connection(domain, nullptr, [&domain, &group, &key, &new_value](ConnectionFromClient& connection) {
  56. connection.async_notify_changed_string_value(domain, group, key, new_value);
  57. });
  58. }
  59. }
  60. }
  61. // FIXME: Refactor this whole thing so that we don't need a cache lookup here.
  62. s_cache.get(domain).value()->config = new_config;
  63. };
  64. auto cache_entry = make<CachedDomain>(domain, config, watcher_or_error.release_value());
  65. s_cache.set(domain, move(cache_entry));
  66. return *config;
  67. }
  68. ConnectionFromClient::ConnectionFromClient(NonnullOwnPtr<Core::Stream::LocalSocket> client_socket, int client_id)
  69. : IPC::ConnectionFromClient<ConfigClientEndpoint, ConfigServerEndpoint>(*this, move(client_socket), client_id)
  70. , m_sync_timer(Core::Timer::create_single_shot(s_disk_sync_delay_ms, [this]() { sync_dirty_domains_to_disk(); }).release_value_but_fixme_should_propagate_errors())
  71. {
  72. s_connections.set(client_id, *this);
  73. }
  74. void ConnectionFromClient::die()
  75. {
  76. s_connections.remove(client_id());
  77. m_sync_timer->stop();
  78. sync_dirty_domains_to_disk();
  79. }
  80. void ConnectionFromClient::pledge_domains(Vector<DeprecatedString> const& domains)
  81. {
  82. if (m_has_pledged) {
  83. did_misbehave("Tried to pledge domains twice.");
  84. return;
  85. }
  86. m_has_pledged = true;
  87. for (auto& domain : domains)
  88. m_pledged_domains.set(domain);
  89. }
  90. void ConnectionFromClient::monitor_domain(DeprecatedString const& domain)
  91. {
  92. if (m_has_pledged && !m_pledged_domains.contains(domain)) {
  93. did_misbehave("Attempt to monitor non-pledged domain");
  94. return;
  95. }
  96. m_monitored_domains.set(domain);
  97. }
  98. bool ConnectionFromClient::validate_access(DeprecatedString const& domain, DeprecatedString const& group, DeprecatedString const& key)
  99. {
  100. if (!m_has_pledged)
  101. return true;
  102. if (m_pledged_domains.contains(domain))
  103. return true;
  104. did_misbehave(DeprecatedString::formatted("Blocked attempt to access domain '{}', group={}, key={}", domain, group, key).characters());
  105. return false;
  106. }
  107. void ConnectionFromClient::sync_dirty_domains_to_disk()
  108. {
  109. if (m_dirty_domains.is_empty())
  110. return;
  111. auto dirty_domains = move(m_dirty_domains);
  112. dbgln("Syncing {} dirty domains to disk", dirty_domains.size());
  113. for (auto domain : dirty_domains) {
  114. auto& config = ensure_domain_config(domain);
  115. if (auto result = config.sync(); result.is_error()) {
  116. dbgln("Failed to write config '{}' to disk: {}", domain, result.error());
  117. // Put it back in the list since it's still dirty.
  118. m_dirty_domains.set(domain);
  119. }
  120. }
  121. }
  122. Messages::ConfigServer::ListConfigKeysResponse ConnectionFromClient::list_config_keys(DeprecatedString const& domain, DeprecatedString const& group)
  123. {
  124. if (!validate_access(domain, group, ""))
  125. return Vector<DeprecatedString> {};
  126. auto& config = ensure_domain_config(domain);
  127. return { config.keys(group) };
  128. }
  129. Messages::ConfigServer::ListConfigGroupsResponse ConnectionFromClient::list_config_groups(DeprecatedString const& domain)
  130. {
  131. if (!validate_access(domain, "", ""))
  132. return Vector<DeprecatedString> {};
  133. auto& config = ensure_domain_config(domain);
  134. return { config.groups() };
  135. }
  136. Messages::ConfigServer::ReadStringValueResponse ConnectionFromClient::read_string_value(DeprecatedString const& domain, DeprecatedString const& group, DeprecatedString const& key)
  137. {
  138. if (!validate_access(domain, group, key))
  139. return nullptr;
  140. auto& config = ensure_domain_config(domain);
  141. if (!config.has_key(group, key))
  142. return Optional<DeprecatedString> {};
  143. return Optional<DeprecatedString> { config.read_entry(group, key) };
  144. }
  145. Messages::ConfigServer::ReadI32ValueResponse ConnectionFromClient::read_i32_value(DeprecatedString const& domain, DeprecatedString const& group, DeprecatedString const& key)
  146. {
  147. if (!validate_access(domain, group, key))
  148. return nullptr;
  149. auto& config = ensure_domain_config(domain);
  150. if (!config.has_key(group, key))
  151. return Optional<i32> {};
  152. return Optional<i32> { config.read_num_entry(group, key) };
  153. }
  154. Messages::ConfigServer::ReadU32ValueResponse ConnectionFromClient::read_u32_value(DeprecatedString const& domain, DeprecatedString const& group, DeprecatedString const& key)
  155. {
  156. if (!validate_access(domain, group, key))
  157. return nullptr;
  158. auto& config = ensure_domain_config(domain);
  159. if (!config.has_key(group, key))
  160. return Optional<u32> {};
  161. return Optional<u32> { config.read_num_entry<u32>(group, key) };
  162. }
  163. Messages::ConfigServer::ReadBoolValueResponse ConnectionFromClient::read_bool_value(DeprecatedString const& domain, DeprecatedString const& group, DeprecatedString const& key)
  164. {
  165. if (!validate_access(domain, group, key))
  166. return nullptr;
  167. auto& config = ensure_domain_config(domain);
  168. if (!config.has_key(group, key))
  169. return Optional<bool> {};
  170. return Optional<bool> { config.read_bool_entry(group, key) };
  171. }
  172. void ConnectionFromClient::start_or_restart_sync_timer()
  173. {
  174. if (m_sync_timer->is_active())
  175. m_sync_timer->restart();
  176. else
  177. m_sync_timer->start();
  178. }
  179. void ConnectionFromClient::write_string_value(DeprecatedString const& domain, DeprecatedString const& group, DeprecatedString const& key, DeprecatedString const& value)
  180. {
  181. if (!validate_access(domain, group, key))
  182. return;
  183. auto& config = ensure_domain_config(domain);
  184. if (config.has_key(group, key) && config.read_entry(group, key) == value)
  185. return;
  186. config.write_entry(group, key, value);
  187. m_dirty_domains.set(domain);
  188. start_or_restart_sync_timer();
  189. for_each_monitoring_connection(domain, this, [&domain, &group, &key, &value](ConnectionFromClient& connection) {
  190. connection.async_notify_changed_string_value(domain, group, key, value);
  191. });
  192. }
  193. void ConnectionFromClient::write_i32_value(DeprecatedString const& domain, DeprecatedString const& group, DeprecatedString const& key, i32 value)
  194. {
  195. if (!validate_access(domain, group, key))
  196. return;
  197. auto& config = ensure_domain_config(domain);
  198. if (config.has_key(group, key) && config.read_num_entry(group, key) == value)
  199. return;
  200. config.write_num_entry(group, key, value);
  201. m_dirty_domains.set(domain);
  202. start_or_restart_sync_timer();
  203. for_each_monitoring_connection(domain, this, [&domain, &group, &key, &value](ConnectionFromClient& connection) {
  204. connection.async_notify_changed_i32_value(domain, group, key, value);
  205. });
  206. }
  207. void ConnectionFromClient::write_u32_value(DeprecatedString const& domain, DeprecatedString const& group, DeprecatedString const& key, u32 value)
  208. {
  209. if (!validate_access(domain, group, key))
  210. return;
  211. auto& config = ensure_domain_config(domain);
  212. if (config.has_key(group, key) && config.read_num_entry<u32>(group, key) == value)
  213. return;
  214. config.write_num_entry(group, key, value);
  215. m_dirty_domains.set(domain);
  216. start_or_restart_sync_timer();
  217. for_each_monitoring_connection(domain, this, [&domain, &group, &key, &value](ConnectionFromClient& connection) {
  218. connection.async_notify_changed_u32_value(domain, group, key, value);
  219. });
  220. }
  221. void ConnectionFromClient::write_bool_value(DeprecatedString const& domain, DeprecatedString const& group, DeprecatedString const& key, bool value)
  222. {
  223. if (!validate_access(domain, group, key))
  224. return;
  225. auto& config = ensure_domain_config(domain);
  226. if (config.has_key(group, key) && config.read_bool_entry(group, key) == value)
  227. return;
  228. config.write_bool_entry(group, key, value);
  229. m_dirty_domains.set(domain);
  230. start_or_restart_sync_timer();
  231. for_each_monitoring_connection(domain, this, [&domain, &group, &key, &value](ConnectionFromClient& connection) {
  232. connection.async_notify_changed_bool_value(domain, group, key, value);
  233. });
  234. }
  235. void ConnectionFromClient::remove_key_entry(DeprecatedString const& domain, DeprecatedString const& group, DeprecatedString const& key)
  236. {
  237. if (!validate_access(domain, group, key))
  238. return;
  239. auto& config = ensure_domain_config(domain);
  240. if (!config.has_key(group, key))
  241. return;
  242. config.remove_entry(group, key);
  243. m_dirty_domains.set(domain);
  244. start_or_restart_sync_timer();
  245. for_each_monitoring_connection(domain, this, [&domain, &group, &key](ConnectionFromClient& connection) {
  246. connection.async_notify_removed_key(domain, group, key);
  247. });
  248. }
  249. void ConnectionFromClient::remove_group_entry(DeprecatedString const& domain, DeprecatedString const& group)
  250. {
  251. if (!validate_access(domain, group, {}))
  252. return;
  253. auto& config = ensure_domain_config(domain);
  254. if (!config.has_group(group))
  255. return;
  256. config.remove_group(group);
  257. m_dirty_domains.set(domain);
  258. start_or_restart_sync_timer();
  259. for_each_monitoring_connection(domain, this, [&domain, &group](ConnectionFromClient& connection) {
  260. connection.async_notify_removed_group(domain, group);
  261. });
  262. }
  263. void ConnectionFromClient::add_group_entry(DeprecatedString const& domain, DeprecatedString const& group)
  264. {
  265. if (!validate_access(domain, group, {}))
  266. return;
  267. auto& config = ensure_domain_config(domain);
  268. if (config.has_group(group))
  269. return;
  270. config.add_group(group);
  271. m_dirty_domains.set(domain);
  272. start_or_restart_sync_timer();
  273. for_each_monitoring_connection(domain, this, [&domain, &group](ConnectionFromClient& connection) {
  274. connection.async_notify_added_group(domain, group);
  275. });
  276. }
  277. }