#include <grpc/support/port_platform.h>
#ifndef GRPC_NO_BINDER
#include <grpcpp/security/binder_security_policy.h>
#ifdef GPR_ANDROID
#include <jni.h>
#include <unistd.h>
#include <grpc/support/log.h>
#include "src/core/ext/transport/binder/client/jni_utils.h"
#include "src/core/lib/gprpp/crash.h"
#endif
namespace grpc {
namespace experimental {
namespace binder {
UntrustedSecurityPolicy::UntrustedSecurityPolicy() = default;
UntrustedSecurityPolicy::~UntrustedSecurityPolicy() = default;
bool UntrustedSecurityPolicy::IsAuthorized(int) { return true; };
InternalOnlySecurityPolicy::InternalOnlySecurityPolicy() = default;
InternalOnlySecurityPolicy::~InternalOnlySecurityPolicy() = default;
#ifdef GPR_ANDROID
bool InternalOnlySecurityPolicy::IsAuthorized(int uid) {
return static_cast<uid_t>(uid) == getuid();
}
#else
bool InternalOnlySecurityPolicy::IsAuthorized(int) { return false; }
#endif
#ifdef GPR_ANDROID
namespace {
JNIEnv* GetEnv(JavaVM* vm) {
if (vm == nullptr) return nullptr;
JNIEnv* result = nullptr;
jint attach = vm->AttachCurrentThread(&result, nullptr);
GPR_ASSERT(JNI_OK == attach);
GPR_ASSERT(nullptr != result);
return result;
}
}
SameSignatureSecurityPolicy::SameSignatureSecurityPolicy(JavaVM* jvm,
jobject context)
: jvm_(jvm) {
GPR_ASSERT(jvm != nullptr);
GPR_ASSERT(context != nullptr);
JNIEnv* env = GetEnv(jvm_);
context_ = env->NewGlobalRef(context);
GPR_ASSERT(context_ != nullptr);
}
SameSignatureSecurityPolicy::~SameSignatureSecurityPolicy() {
JNIEnv* env = GetEnv(jvm_);
env->DeleteLocalRef(context_);
}
bool SameSignatureSecurityPolicy::IsAuthorized(int uid) {
JNIEnv* env = GetEnv(jvm_);
bool result = grpc_binder::IsSignatureMatch(env, context_, getuid(), uid);
if (result) {
gpr_log(GPR_INFO, "uid %d and uid %d passed SameSignature check", getuid(),
uid);
} else {
gpr_log(GPR_ERROR, "uid %d and uid %d failed SameSignature check", getuid(),
uid);
}
return result;
}
#endif
}
}
}
#endif