|  | /* | 
|  | * | 
|  | *    Copyright (c) 2024 Project CHIP Authors | 
|  | *    All rights reserved. | 
|  | * | 
|  | *    Licensed under the Apache License, Version 2.0 (the "License"); | 
|  | *    you may not use this file except in compliance with the License. | 
|  | *    You may obtain a copy of the License at | 
|  | * | 
|  | *        http://www.apache.org/licenses/LICENSE-2.0 | 
|  | * | 
|  | *    Unless required by applicable law or agreed to in writing, software | 
|  | *    distributed under the License is distributed on an "AS IS" BASIS, | 
|  | *    WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. | 
|  | *    See the License for the specific language governing permissions and | 
|  | *    limitations under the License. | 
|  | */ | 
|  |  | 
|  | #include "AccessRestrictionProvider.h" | 
|  |  | 
|  | #include <algorithm> | 
|  | #include <lib/core/Global.h> | 
|  |  | 
|  | using namespace chip::Platform; | 
|  |  | 
|  | namespace chip { | 
|  | namespace Access { | 
|  |  | 
|  | void AccessRestrictionProvider::AddListener(Listener & listener) | 
|  | { | 
|  | if (mListeners == nullptr) | 
|  | { | 
|  | mListeners     = &listener; | 
|  | listener.mNext = nullptr; | 
|  | return; | 
|  | } | 
|  |  | 
|  | for (Listener * l = mListeners; /**/; l = l->mNext) | 
|  | { | 
|  | if (l == &listener) | 
|  | { | 
|  | return; | 
|  | } | 
|  |  | 
|  | if (l->mNext == nullptr) | 
|  | { | 
|  | l->mNext       = &listener; | 
|  | listener.mNext = nullptr; | 
|  | return; | 
|  | } | 
|  | } | 
|  | } | 
|  |  | 
|  | void AccessRestrictionProvider::RemoveListener(Listener & listener) | 
|  | { | 
|  | if (mListeners == &listener) | 
|  | { | 
|  | mListeners     = listener.mNext; | 
|  | listener.mNext = nullptr; | 
|  | return; | 
|  | } | 
|  |  | 
|  | for (Listener * l = mListeners; l != nullptr; l = l->mNext) | 
|  | { | 
|  | if (l->mNext == &listener) | 
|  | { | 
|  | l->mNext       = listener.mNext; | 
|  | listener.mNext = nullptr; | 
|  | return; | 
|  | } | 
|  | } | 
|  | } | 
|  |  | 
|  | CHIP_ERROR AccessRestrictionProvider::SetCommissioningEntries(const std::vector<Entry> & entries) | 
|  | { | 
|  | for (auto & entry : entries) | 
|  | { | 
|  | if (!mExceptionChecker.AreRestrictionsAllowed(entry.endpointNumber, entry.clusterId)) | 
|  | { | 
|  | ChipLogError(DataManagement, "AccessRestrictionProvider: invalid entry"); | 
|  | return CHIP_ERROR_INVALID_ARGUMENT; | 
|  | } | 
|  | } | 
|  |  | 
|  | mCommissioningEntries = entries; | 
|  |  | 
|  | for (Listener * listener = mListeners; listener != nullptr; listener = listener->mNext) | 
|  | { | 
|  | listener->MarkCommissioningRestrictionListChanged(); | 
|  | } | 
|  |  | 
|  | return CHIP_NO_ERROR; | 
|  | } | 
|  |  | 
|  | CHIP_ERROR AccessRestrictionProvider::SetEntries(const FabricIndex fabricIndex, const std::vector<Entry> & entries) | 
|  | { | 
|  | std::vector<Entry> updatedEntries; | 
|  |  | 
|  | for (auto & entry : entries) | 
|  | { | 
|  | if (!mExceptionChecker.AreRestrictionsAllowed(entry.endpointNumber, entry.clusterId)) | 
|  | { | 
|  | ChipLogError(DataManagement, "AccessRestrictionProvider: invalid entry"); | 
|  | return CHIP_ERROR_INVALID_ARGUMENT; | 
|  | } | 
|  |  | 
|  | Entry updatedEntry       = entry; | 
|  | updatedEntry.fabricIndex = fabricIndex; | 
|  | updatedEntries.push_back(updatedEntry); | 
|  | } | 
|  |  | 
|  | mFabricEntries[fabricIndex] = std::move(updatedEntries); | 
|  |  | 
|  | for (Listener * listener = mListeners; listener != nullptr; listener = listener->mNext) | 
|  | { | 
|  | listener->MarkRestrictionListChanged(fabricIndex); | 
|  | } | 
|  |  | 
|  | return CHIP_NO_ERROR; | 
|  | } | 
|  |  | 
|  | bool AccessRestrictionProvider::StandardAccessRestrictionExceptionChecker::AreRestrictionsAllowed(EndpointId endpoint, | 
|  | ClusterId cluster) | 
|  | { | 
|  | if (endpoint != kRootEndpointId && | 
|  | (cluster == app::Clusters::WiFiNetworkManagement::Id || cluster == app::Clusters::ThreadBorderRouterManagement::Id || | 
|  | cluster == app::Clusters::ThreadNetworkDirectory::Id)) | 
|  | { | 
|  | return true; | 
|  | } | 
|  |  | 
|  | return false; | 
|  | } | 
|  |  | 
|  | CHIP_ERROR AccessRestrictionProvider::CheckForCommissioning(const SubjectDescriptor & subjectDescriptor, | 
|  | const RequestPath & requestPath) | 
|  | { | 
|  | return DoCheck(mCommissioningEntries, subjectDescriptor, requestPath); | 
|  | } | 
|  |  | 
|  | CHIP_ERROR AccessRestrictionProvider::Check(const SubjectDescriptor & subjectDescriptor, const RequestPath & requestPath) | 
|  | { | 
|  | return DoCheck(mFabricEntries[subjectDescriptor.fabricIndex], subjectDescriptor, requestPath); | 
|  | } | 
|  |  | 
|  | CHIP_ERROR AccessRestrictionProvider::DoCheck(const std::vector<Entry> & entries, const SubjectDescriptor & subjectDescriptor, | 
|  | const RequestPath & requestPath) | 
|  | { | 
|  | if (!mExceptionChecker.AreRestrictionsAllowed(requestPath.endpoint, requestPath.cluster)) | 
|  | { | 
|  | ChipLogProgress(DataManagement, "AccessRestrictionProvider: skipping checks for unrestrictable request path"); | 
|  | return CHIP_NO_ERROR; | 
|  | } | 
|  |  | 
|  | ChipLogProgress(DataManagement, "AccessRestrictionProvider: action %d", to_underlying(requestPath.requestType)); | 
|  |  | 
|  | if (requestPath.requestType == RequestType::kRequestTypeUnknown) | 
|  | { | 
|  | ChipLogError(DataManagement, "AccessRestrictionProvider: RequestPath type is unknown"); | 
|  | return CHIP_ERROR_INVALID_ARGUMENT; | 
|  | } | 
|  |  | 
|  | // wildcard event subscriptions are allowed since wildcard is only used when setting up the subscription and | 
|  | // we want that request to succeed (when generating the report, this method will be called with the specific | 
|  | // event id). All other requests require an entity id | 
|  | if (!requestPath.entityId.has_value()) | 
|  | { | 
|  | if (requestPath.requestType == RequestType::kEventReadRequest) | 
|  | { | 
|  | return CHIP_NO_ERROR; | 
|  | } | 
|  | else | 
|  | { | 
|  | return CHIP_ERROR_INVALID_ARGUMENT; | 
|  | } | 
|  | } | 
|  |  | 
|  | for (auto & entry : entries) | 
|  | { | 
|  | if (entry.endpointNumber != requestPath.endpoint || entry.clusterId != requestPath.cluster) | 
|  | { | 
|  | continue; | 
|  | } | 
|  |  | 
|  | for (auto & restriction : entry.restrictions) | 
|  | { | 
|  | // A missing id is a wildcard | 
|  | bool idMatch = !restriction.id.HasValue() || restriction.id.Value() == requestPath.entityId.value(); | 
|  | if (!idMatch) | 
|  | { | 
|  | continue; | 
|  | } | 
|  |  | 
|  | switch (restriction.restrictionType) | 
|  | { | 
|  | case Type::kAttributeAccessForbidden: | 
|  | if (requestPath.requestType == RequestType::kAttributeReadRequest || | 
|  | requestPath.requestType == RequestType::kAttributeWriteRequest) | 
|  | { | 
|  | if (!IsGlobalAttribute(requestPath.entityId.value())) | 
|  | { | 
|  | return CHIP_ERROR_ACCESS_RESTRICTED_BY_ARL; | 
|  | } | 
|  | } | 
|  | break; | 
|  | case Type::kAttributeWriteForbidden: | 
|  | if (requestPath.requestType == RequestType::kAttributeWriteRequest) | 
|  | { | 
|  | if (!IsGlobalAttribute(requestPath.entityId.value())) | 
|  | { | 
|  | return CHIP_ERROR_ACCESS_RESTRICTED_BY_ARL; | 
|  | } | 
|  | } | 
|  | break; | 
|  | case Type::kCommandForbidden: | 
|  | if (requestPath.requestType == RequestType::kCommandInvokeRequest) | 
|  | { | 
|  | return CHIP_ERROR_ACCESS_RESTRICTED_BY_ARL; | 
|  | } | 
|  | break; | 
|  | case Type::kEventForbidden: | 
|  | if (requestPath.requestType == RequestType::kEventReadRequest) | 
|  | { | 
|  | return CHIP_ERROR_ACCESS_RESTRICTED_BY_ARL; | 
|  | } | 
|  | break; | 
|  | } | 
|  | } | 
|  | } | 
|  |  | 
|  | return CHIP_NO_ERROR; | 
|  | } | 
|  |  | 
|  | } // namespace Access | 
|  | } // namespace chip |