2 * Copyright (c) 2019 Samsung Electronics Co., Ltd All Rights Reserved
4 * Licensed under the Apache License, Version 2.0 (the License);
5 * you may not use this file except in compliance with the License.
6 * You may obtain a copy of the License at
8 * http://www.apache.org/licenses/LICENSE-2.0
10 * Unless required by applicable law or agreed to in writing, software
11 * distributed under the License is distributed on an AS IS BASIS,
12 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13 * See the License for the specific language governing permissions and
14 * limitations under the License.
18 #include <json/json.h>
19 #include <pkgmgr-info.h>
20 #include <pkgmgr_installer_info.h>
24 #include "tac_common.h"
25 #include "db_manager.h"
30 #define LOG_TAG "DOTNET_INSTALLER_PLUGIN"
33 #define __STR(x) __XSTR(x)
34 static const char* __DOTNET_DIR = __STR(DOTNET_DIR);
35 static const char* __READ_ONLY_APP_UPDATE_DIR = __STR(READ_ONLY_APP_UPDATE_DIR);
39 static sqlite3 *tac_db = NULL;
40 static sqlite3 *tlc_db = NULL;
41 std::vector<std::string> restore_nuget;
42 std::vector<std::string> restore_library;
44 static void cleanupDirectory()
46 std::vector<std::string> removeNuget;
48 for (auto& nuget : bf::recursive_directory_iterator(__DOTNET_DIR)) {
49 std::string nugetPath = nuget.path().string();
50 if (!bf::is_directory(nugetPath) ||
51 nugetPath.find(TLC_LIBRARIES_DIR) != std::string::npos ||
52 nugetPath.find(__READ_ONLY_APP_UPDATE_DIR) != std::string::npos) {
57 for (auto& restore : restore_nuget) {
58 if (nugetPath == restore || nugetPath == getBaseName(restore)) {
64 removeNuget.push_back(nugetPath);
68 for (auto& rm : removeNuget) {
70 _SERR("Failed to remove of %s", rm.c_str());
74 } catch (const bf::filesystem_error& error) {
75 _SERR("Failed to recursive directory: %s", error.what());
80 // callback function of "pkgmgrinfo_appinfo_metadata_filter_foreach"
81 static int tac_restoreDBCb(pkgmgrinfo_appinfo_h handle, void *userData)
89 int ret = pkgmgrinfo_appinfo_get_pkgid(handle, &pkgId);
90 if (ret != PMINFO_R_OK) {
91 _SERR("Failed to get pkgid");
95 enableTACPackage(std::string(pkgId));
97 ret = pkgmgrinfo_appinfo_get_root_path(handle, &root);
98 if (ret != PMINFO_R_OK) {
99 _SERR("Failed to get root path");
102 rootPath = std::string(root);
104 ret = pkgmgrinfo_appinfo_get_exec(handle, &exec);
105 if (ret != PMINFO_R_OK) {
106 _SERR("Failed to get exec name");
109 execName = std::string(exec).substr(std::string(exec).rfind('/') + 1);
111 std::vector<std::string> parserData;
112 std::string binDir = concatPath(rootPath, "bin");
113 std::string tacDir = concatPath(binDir, TAC_SYMLINK_SUB_DIR);
114 for (auto& npAssembly : depsJsonParser(rootPath, execName)) {
115 std::string nugetPackage = npAssembly.substr(0, npAssembly.rfind(':'));
116 std::string assemblyName = npAssembly.substr(npAssembly.rfind(':') + 1);
117 if (exist(tacDir) && exist(concatPath(tacDir, assemblyName))) {
118 parserData.push_back(nugetPackage);
121 std::sort(parserData.begin(), parserData.end());
122 parserData.erase(unique(parserData.begin(), parserData.end()), parserData.end());
124 for (auto& nuget : parserData) {
126 std::string name = nuget.substr(0, nuget.find('/'));
127 std::string version = nuget.substr(nuget.rfind('/') + 1);
128 char *sql = sqlite3_mprintf(
129 "INSERT INTO TAC (PKGID, NUGET, NAME, VERSION) " \
130 "VALUES (%Q, %Q, %Q, %Q);", pkgId, nuget.c_str(), name.c_str(), version.c_str());
131 insertDB(tac_db, sql);
132 restore_nuget.push_back(concatPath(__DOTNET_DIR, nuget));
140 tac_error_e tac_restoreDB()
142 if (!removeFile(TAC_APP_LIST_RESTORE_DB)) {
143 _SERR("Failed to remove of %s", TAC_APP_LIST_RESTORE_DB);
144 return TAC_ERROR_UNKNOWN;
147 std::string dbRestoreJournal = TAC_APP_LIST_RESTORE_DB + std::string("-journal");
148 if (!removeFile(dbRestoreJournal)) {
149 _SERR("Failed to remove of %s", dbRestoreJournal.c_str());
150 return TAC_ERROR_UNKNOWN;
153 tac_db = createDB(TAC_APP_LIST_RESTORE_DB, CREATE_TAC_DB_TABLE);
155 _SERR("Sqlite create error");
156 return TAC_ERROR_UNKNOWN;
158 sqlite3_exec(tac_db, "BEGIN;", NULL, NULL, NULL);
160 pkgmgrinfo_appinfo_metadata_filter_h handle;
161 int ret = pkgmgrinfo_appinfo_metadata_filter_create(&handle);
162 if (ret != PMINFO_R_OK) {
163 return TAC_ERROR_UNKNOWN;
166 ret = pkgmgrinfo_appinfo_metadata_filter_add(handle, TAC_METADATA_KEY, METADATA_VALUE);
167 if (ret != PMINFO_R_OK) {
168 pkgmgrinfo_appinfo_metadata_filter_destroy(handle);
169 return TAC_ERROR_UNKNOWN;
172 ret = pkgmgrMDFilterForeach(handle, tac_restoreDBCb, NULL);
174 pkgmgrinfo_appinfo_metadata_filter_destroy(handle);
175 return TAC_ERROR_UNKNOWN;
178 pkgmgrinfo_appinfo_metadata_filter_destroy(handle);
185 if (!copyFile(TAC_APP_LIST_RESTORE_DB, TAC_APP_LIST_DB)) {
186 _SERR("Failed to copy of %s", TAC_APP_LIST_DB);
187 return TAC_ERROR_UNKNOWN;
189 if (!removeFile(TAC_APP_LIST_RESTORE_DB)) {
190 _SERR("Failed to remove of %s", TAC_APP_LIST_RESTORE_DB);
191 return TAC_ERROR_UNKNOWN;
194 std::string dbJournal = TAC_APP_LIST_DB + std::string("-journal");
195 if (!copyFile(dbRestoreJournal, dbJournal)) {
196 _SERR("Failed to copy of %s", dbJournal.c_str());
197 return TAC_ERROR_UNKNOWN;
199 if (!removeFile(dbRestoreJournal)) {
200 _SERR("Failed to remove of %s", dbRestoreJournal.c_str());
201 return TAC_ERROR_UNKNOWN;
206 return TAC_ERROR_NONE;
209 tac_error_e disableTACPackage(const std::string& pkgId)
211 std::string rootPath = getRootPath(pkgId);
212 if (rootPath.empty()) {
213 _SERR("Failed to get root path from [%s]", pkgId.c_str());
214 return TAC_ERROR_INVALID_PACKAGE;
217 std::string binDir = concatPath(rootPath, "bin");
218 std::string tacDir = concatPath(binDir, TAC_SYMLINK_SUB_DIR);
219 std::string binNIDir = concatPath(binDir, APP_NI_SUB_DIR);
222 for (auto& symlinkAssembly : bf::recursive_directory_iterator(tacDir)) {
223 std::string symPath = symlinkAssembly.path().string();
224 std::string fileName = symlinkAssembly.path().filename().string();
225 if (bf::is_symlink(symPath)) {
226 std::string originPath = bf::read_symlink(symPath).string();
227 if (!isNativeImage(symPath)) {
228 std::string dllPath = concatPath(binDir, fileName);
229 if (!copyFile(originPath, dllPath)) {
230 _SERR("Failed to copy of %s", dllPath.c_str());
231 return TAC_ERROR_UNKNOWN;
233 copySmackAndOwnership(binDir.c_str(), concatPath(binDir, fileName).c_str());
235 std::string niPath = concatPath(binNIDir, fileName);
236 if (!copyFile(originPath, niPath)) {
237 _SERR("Failed to copy of %s", niPath.c_str());
238 return TAC_ERROR_UNKNOWN;
240 copySmackAndOwnership(binDir.c_str(), niPath.c_str());
244 if (!removeAll(tacDir)) {
245 _SERR("Failed to remove of %s", tacDir.c_str());
246 return TAC_ERROR_UNKNOWN;
248 } catch (const bf::filesystem_error& error) {
249 _SERR("Failed to recursive directory: %s", error.what());
250 return TAC_ERROR_UNKNOWN;
253 return TAC_ERROR_NONE;
256 tac_error_e enableTACPackage(const std::string& pkgId)
258 std::string rootPath = getRootPath(pkgId);
259 if (rootPath.empty()) {
260 _SERR("Failed to get root path from [%s]", pkgId.c_str());
261 return TAC_ERROR_INVALID_PACKAGE;
264 std::string execName = getExecName(pkgId);
265 if (execName.empty()) {
266 _SERR("Failed to get exec name from [%s]", pkgId.c_str());
267 return TAC_ERROR_INVALID_PACKAGE;
270 std::string metaValue = getMetadataValue(pkgId, TAC_METADATA_KEY);
271 if (metaValue.empty()) {
272 _SERR("Failed to get metadata from [%s]", pkgId.c_str());
273 return TAC_ERROR_INVALID_PACKAGE;
276 if (!strcmp(metaValue.c_str(), "true")) {
277 std::string binDir = concatPath(rootPath, "bin");
278 std::string tacDir = concatPath(binDir, TAC_SYMLINK_SUB_DIR);
279 std::string binNIDir = concatPath(binDir, APP_NI_SUB_DIR);
280 if (!exist(tacDir)) {
281 if (!createDir(tacDir)) {
282 _SERR("Cannot create directory: %s", tacDir.c_str());
283 return TAC_ERROR_UNKNOWN;
285 copySmackAndOwnership(binDir.c_str(), tacDir.c_str());
287 std::vector<std::string> enableNuget;
288 for (auto& npAssembly : depsJsonParser(rootPath, execName)) {
289 std::string nugetPackage = npAssembly.substr(0, npAssembly.rfind(':'));
290 std::string assemblyName = npAssembly.substr(npAssembly.rfind(':') + 1);
291 std::string nugetPath = concatPath(__DOTNET_DIR, nugetPackage);
292 if (exist(nugetPath)) {
293 std::string originPath = concatPath(nugetPath, assemblyName);
294 if (exist(originPath)) {
295 enableNuget.push_back(originPath);
300 for (auto& originPath : enableNuget) {
301 if (exist(originPath)) {
302 std::string fileName = originPath.substr(originPath.rfind('/') + 1);
303 std::string NIFileName = changeExtension(fileName, "dll", "ni.dll");
304 if (exist(binNIDir)) {
305 std::string originNIPath = changeExtension(originPath, "dll", "ni.dll");
306 if (exist(originNIPath)) {
307 bf::create_symlink(originNIPath, concatPath(tacDir, NIFileName));
308 _SOUT("%s symbolic link file generated successfully.", concatPath(tacDir, NIFileName).c_str());
309 copySmackAndOwnership(tacDir.c_str(), concatPath(tacDir, NIFileName).c_str(), true);
311 if (!removeFile(concatPath(binNIDir, NIFileName))) {
312 _SERR("Failed to remove of %s", concatPath(binNIDir, NIFileName).c_str());
313 return TAC_ERROR_UNKNOWN;
317 bf::create_symlink(originPath, concatPath(tacDir, fileName));
318 _SOUT("%s symbolic link file generated successfully.", concatPath(tacDir, fileName).c_str());
319 copySmackAndOwnership(tacDir.c_str(), concatPath(tacDir, fileName).c_str(), true);
321 if (!removeFile(concatPath(binDir, fileName))) {
322 _SERR("Failed to remove of %s", concatPath(binDir, fileName).c_str());
323 return TAC_ERROR_UNKNOWN;
327 if (enableNuget.empty()) {
328 if (!removeAll(tacDir)) {
329 _SERR("Failed to remove of %s", tacDir.c_str());
335 _SERR("The metadata key is missing or the metadata value is false of [%s]", pkgId.c_str());
337 return TAC_ERROR_NONE;
340 //Parser the .deps.json file to get nuget information.
341 std::vector<std::string> depsJsonParser(const std::string& rootPath, const std::string& execName)
343 std::vector<std::string> parserData;
344 std::string depsJsonName = changeExtension(execName, "dll", "deps.json");
345 std::string depsJsonPath = concatPath(rootPath, depsJsonName);
347 if (exist(depsJsonPath)) {
348 std::ifstream ifs(depsJsonPath);
349 Json::CharReaderBuilder reader;
353 if (!Json::parseFromStream(reader, ifs, &root, &error)) {
354 _ERR("Failed to parse of deps.json");
358 const Json::Value runtimeTargetName = root["runtimeTarget"]["name"];
359 const Json::Value nugetPackages = root["targets"][runtimeTargetName.asString().c_str()];
360 std::vector<std::string> appDependencies;
361 for (auto& nuget : nugetPackages.getMemberNames()) {
362 if (strstr(nuget.c_str(), (execName.substr(0, execName.find(".Tizen."))).c_str()) != NULL ||
363 strstr(nuget.c_str(), (execName.substr(0, execName.find(".dll"))).c_str()) != NULL) {
364 const Json::Value assemblies = nugetPackages[nuget.c_str()]["runtime"];
365 if (assemblies != Json::nullValue) {
366 const Json::Value dependencies = nugetPackages[nuget.c_str()]["dependencies"];
367 for (auto& dependency : dependencies.getMemberNames()) {
368 appDependencies.push_back(dependency);
373 for (auto& nuget : nugetPackages.getMemberNames()) {
374 //Skip the nuget package related to Tizen
375 if (strstr(nuget.c_str(), TIZEN_DOTNET_NUGET) == NULL &&
376 strstr(nuget.c_str(), TIZEN_DOTNET_SDK_NUGET) == NULL &&
377 strstr(nuget.c_str(), (execName.substr(0, execName.find(".Tizen."))).c_str()) == NULL &&
378 strstr(nuget.c_str(), (execName.substr(0, execName.find(".dll"))).c_str()) == NULL) {
379 const Json::Value assemblies = nugetPackages[nuget.c_str()]["runtime"];
380 if (assemblies != Json::nullValue) {
381 const Json::Value dependencies = nugetPackages[nuget.c_str()]["dependencies"];
382 bool hasDependency = false;
383 for (auto& dependency : dependencies.getMemberNames()) {
384 //Skip the nugget package that is dependent on another nuget package
385 if (strstr(dependency.c_str(), TIZEN_DOTNET_NUGET) == NULL &&
386 strstr(dependency.c_str(), NET_STANDARD_LIBRARY_NUGET) == NULL) {
387 hasDependency = true;
388 for (auto& ad : appDependencies) {
389 if (!strcmp(ad.c_str(), dependency.c_str())) {
390 hasDependency = true;
393 hasDependency = false;
396 if (hasDependency) break;
399 if (!hasDependency) {
400 // handle assembly even though that is included in the TPA.
401 for (auto& assembly : assemblies.getMemberNames()) {
402 std::string assemblyName = assembly.substr(assembly.rfind('/') + 1);
403 parserData.push_back(nuget + ":" + assemblyName);
404 _INFO("Nuget : [%s] / Assembly : [%s]", nuget.c_str(), assemblyName.c_str());
410 appDependencies.clear();
414 } catch (const Json::LogicError& error) {
415 _ERR("Failed to parse Json: %s", error.what());
420 std::vector<std::string> getLibrariesInfo(const std::string& rootPath)
422 std::vector<std::string> LibrariesInfo;
423 std::string binDir = concatPath(rootPath, "bin");
425 return LibrariesInfo;
427 auto convert = [&LibrariesInfo](const std::string& filepath, const std::string& filename) {
428 if (filepath.rfind(".so") != std::string::npos) {
429 std::string buffer = SHA256(filepath);
430 LibrariesInfo.push_back(filepath + ":" + buffer);
431 _INFO("Library : [%s] / SHA256 : [%s]", filename.c_str(), buffer.c_str());
434 scanFilesInDirectory(binDir, convert, -1);
436 return LibrariesInfo;
439 // callback function of "pkgmgrinfo_appinfo_metadata_filter_foreach"
440 static int tlc_restoreDBCb(pkgmgrinfo_appinfo_h handle, void *userData)
444 std::string rootPath;
446 int ret = pkgmgrinfo_appinfo_get_pkgid(handle, &pkgId);
447 if (ret != PMINFO_R_OK) {
448 _SERR("Failed to get pkgid");
452 ret = pkgmgrinfo_appinfo_get_root_path(handle, &root);
453 if (ret != PMINFO_R_OK) {
454 _SERR("Failed to get root path");
457 rootPath = std::string(root);
459 for (auto& librarySha : getLibrariesInfo(rootPath)) {
460 std::string library = librarySha.substr(0, librarySha.find(':'));
461 if (exist(library)) {
462 std::string fileSha = library.substr(library.rfind('/') + 1) + ".." + librarySha.substr(librarySha.find(':') + 1);
463 char *sql = sqlite3_mprintf("INSERT INTO TLC (PKGID, LIBRARY) VALUES (%Q, %Q);", pkgId, fileSha.c_str());
464 insertDB(tlc_db, sql);
465 restore_library.push_back(fileSha);
472 tac_error_e tlc_restoreDB()
474 if (!removeFile(TLC_APP_LIST_RESTORE_DB)) {
475 _SERR("Failed to remove of %s", TLC_APP_LIST_RESTORE_DB);
476 return TAC_ERROR_UNKNOWN;
479 std::string dbRestoreJournal = TLC_APP_LIST_RESTORE_DB + std::string("-journal");
480 if (!removeFile(dbRestoreJournal)) {
481 _SERR("Failed to remove of %s", dbRestoreJournal.c_str());
482 return TAC_ERROR_UNKNOWN;
485 tlc_db = createDB(TLC_APP_LIST_RESTORE_DB, CREATE_TLC_DB_TABLE);
487 _SERR("Sqlite create error");
488 return TAC_ERROR_UNKNOWN;
490 sqlite3_exec(tlc_db, "BEGIN;", NULL, NULL, NULL);
492 pkgmgrinfo_appinfo_metadata_filter_h handle;
493 int ret = pkgmgrinfo_appinfo_metadata_filter_create(&handle);
494 if (ret != PMINFO_R_OK) {
495 return TAC_ERROR_UNKNOWN;
498 ret = pkgmgrinfo_appinfo_metadata_filter_add(handle, TAC_METADATA_KEY, METADATA_VALUE);
499 if (ret != PMINFO_R_OK) {
500 pkgmgrinfo_appinfo_metadata_filter_destroy(handle);
501 return TAC_ERROR_UNKNOWN;
504 ret = pkgmgrMDFilterForeach(handle, tlc_restoreDBCb, NULL);
506 pkgmgrinfo_appinfo_metadata_filter_destroy(handle);
507 return TAC_ERROR_UNKNOWN;
510 pkgmgrinfo_appinfo_metadata_filter_destroy(handle);
517 if (!copyFile(TLC_APP_LIST_RESTORE_DB, TLC_APP_LIST_DB)) {
518 _SERR("Failed to copy of %s", TLC_APP_LIST_DB);
519 return TAC_ERROR_UNKNOWN;
521 if (!removeFile(TLC_APP_LIST_RESTORE_DB)) {
522 _SERR("Failed to remove of %s", TLC_APP_LIST_RESTORE_DB);
523 return TAC_ERROR_UNKNOWN;
526 std::string dbJournal = TLC_APP_LIST_DB + std::string("-journal");
527 if (!copyFile(dbRestoreJournal, dbJournal)) {
528 _SERR("Failed to copy of %s", dbJournal.c_str());
529 return TAC_ERROR_UNKNOWN;
531 if (!removeFile(dbRestoreJournal)) {
532 _SERR("Failed to remove of %s", dbRestoreJournal.c_str());
533 return TAC_ERROR_UNKNOWN;
536 auto convert = [](const std::string& path, const std::string& filename) {
537 bool isExist = false;
538 for (auto& library : restore_library) {
539 if (!strcmp(filename.c_str(), library.c_str())) {
545 if (!removeFile(path)) {
546 _ERR("Failed to remove of %s", path.c_str());
551 scanFilesInDirectory(concatPath(__DOTNET_DIR, TLC_LIBRARIES_DIR), convert, 0);
553 return TAC_ERROR_NONE;