14 #include <tzplatform_config.h>
17 #include "pkgmgr-info.h"
18 #include "pkgmgrinfo_debug.h"
19 #include "pkgmgrinfo_private.h"
20 #include "pkgmgr_parser.h"
21 #include "pkgmgr_parser_internal.h"
23 #define QUERY_CREATE_TABLE_PACKAGE_CERT_INDEX_INFO \
24 "CREATE TABLE IF NOT EXISTS package_cert_index_info( " \
25 " cert_info TEXT UNIQUE, " \
26 " cert_id INTEGER PRIMARY_KEY, " \
27 " cert_ref_count INTEGER NOT NULL)"
29 #define QUERY_CREATE_TABLE_PACKAGE_CERT_INFO \
30 "CREATE TABLE IF NOT EXISTS package_cert_info( " \
31 " package TEXT PRIMARY KEY, " \
32 " author_root_cert INTEGER NOT NULL, " \
33 " author_im_cert INTEGER NOT NULL, " \
34 " author_signer_cert INTEGER NOT NULL, " \
35 " dist_root_cert INTEGER NOT NULL, " \
36 " dist_im_cert INTEGER NOT NULL, " \
37 " dist_signer_cert INTEGER NOT NULL, " \
38 " dist2_root_cert INTEGER NOT NULL, " \
39 " dist2_im_cert INTEGER NOT NULL, " \
40 " dist2_signer_cert INTEGER NOT NULL)"
42 #define QUERY_CREATE_TRIGGER_DELETE_CERT_INFO \
43 "CREATE TRIGGER IF NOT EXISTS delete_cert_info " \
44 "AFTER DELETE ON package_cert_info " \
46 " UPDATE package_cert_index_info SET" \
47 " cert_ref_count = cert_ref_count - 1" \
48 " WHERE cert_id = OLD.author_root_cert" \
49 " OR cert_id = OLD.author_im_cert" \
50 " OR cert_id = OLD.author_signer_cert" \
51 " OR cert_id = OLD.dist_root_cert" \
52 " OR cert_id = OLD.dist_im_cert" \
53 " OR cert_id = OLD.dist_signer_cert" \
54 " OR cert_id = OLD.dist2_root_cert" \
55 " OR cert_id = OLD.dist2_im_cert" \
56 " OR cert_id = OLD.dist2_signer_cert;" \
59 #define QUERY_CREATE_TRIGGER_UPDATE_CERT_INDEX_INFO \
60 "CREATE TRIGGER IF NOT EXISTS update_cert_index_info " \
61 "AFTER UPDATE ON package_cert_index_info " \
62 "WHEN ((SELECT cert_ref_count FROM package_cert_index_info " \
63 " WHERE cert_id = OLD.cert_id) = 0) "\
65 " DELETE FROM package_cert_index_info WHERE cert_id = OLD.cert_id;" \
67 __thread db_handle manifest_db;
68 __thread db_handle cert_db;
70 typedef int (*sqlite_query_callback)(void *data, int ncols, char **coltxt, char **colname);
72 static int _mkdir_for_user(const char* dir, uid_t uid, gid_t gid)
78 fullpath = strdup(dir);
81 subpath = dirname(fullpath);
82 if (strlen(subpath) > 1 && strcmp(subpath, fullpath) != 0) {
83 ret = _mkdir_for_user(fullpath, uid, gid);
90 ret = mkdir(dir, S_IRWXU | S_IRGRP | S_IXGRP | S_IXOTH);
91 if (ret && errno != EEXIST) {
94 } else if (ret && errno == EEXIST) {
99 if (getuid() == ROOT_UID) {
100 ret = chown(dir, uid, gid);
102 _LOGE("FAIL : chown %s %d.%d, because %s", dir, uid,
103 gid, strerror(errno));
111 static const char *_get_db_path(uid_t uid) {
112 const char *db_path = NULL;
113 if (uid != GLOBAL_USER && uid != ROOT_UID) {
114 tzplatform_set_user(uid);
115 db_path = tzplatform_getenv(TZ_USER_DB);
116 tzplatform_reset_user();
118 db_path = tzplatform_getenv(TZ_SYS_DB);
123 static int __attach_and_create_view(sqlite3 *handle, const char *db, const char *tables[], uid_t uid)
127 char query[MAX_QUERY_LEN];
129 if (uid != GLOBAL_USER && uid != ROOT_UID) {
130 snprintf(query, sizeof(query), "ATTACH DATABASE '%s' AS Global", db);
131 if (SQLITE_OK != sqlite3_exec(handle, query, NULL, NULL, &err)) {
132 _LOGD("Don't execute query = %s error message = %s\n", query, err);
138 for (i = 0; tables[i]; i++) {
139 if (uid != GLOBAL_USER && uid != ROOT_UID)
140 snprintf(query, sizeof(query), "CREATE TEMP VIEW '%s' AS SELECT * \
141 FROM (SELECT *,0 AS for_all_users FROM main.'%s' UNION \
142 SELECT *,1 AS for_all_users FROM Global.'%s')",
143 tables[i], tables[i], tables[i]);
145 snprintf(query, sizeof(query), "CREATE TEMP VIEW '%s' AS SELECT * \
146 FROM (SELECT *,1 AS for_all_users FROM main.'%s')",
147 tables[i], tables[i]);
148 if (SQLITE_OK != sqlite3_exec(handle, query, NULL, NULL, &err)) {
149 _LOGD("Don't execute query = %s error message = %s\n", query, err);
157 static int __exec_db_query(sqlite3 *db, char *query, sqlite_query_callback callback, void *data)
159 char *error_message = NULL;
160 int ret = sqlite3_exec(db, query, callback, data, &error_message);
161 if (SQLITE_OK != ret) {
162 _LOGE("Don't execute query = %s error message = %s ret = %d\n", query,
164 sqlite3_free(error_message);
167 sqlite3_free(error_message);
171 int _check_create_cert_db(sqlite3 *certdb)
174 ret = __exec_db_query(certdb, QUERY_CREATE_TABLE_PACKAGE_CERT_INDEX_INFO, NULL, NULL);
177 ret = __exec_db_query(certdb, QUERY_CREATE_TABLE_PACKAGE_CERT_INFO, NULL, NULL);
180 ret = __exec_db_query(certdb, QUERY_CREATE_TRIGGER_DELETE_CERT_INFO, NULL, NULL);
183 ret = __exec_db_query(certdb, QUERY_CREATE_TRIGGER_UPDATE_CERT_INDEX_INFO, NULL, NULL);
186 static gid_t _get_gid(const char *name)
193 ret = getgrnam_r(name, &entry, buf, sizeof(buf), &ge);
194 if (ret || ge == NULL) {
195 _LOGE("fail to get gid of %s", name);
202 API const char *getIconPath(uid_t uid)
204 const char *path = NULL;
205 uid_t uid_caller = getuid();
206 gid_t gid = ROOT_UID;
208 if (uid != GLOBAL_USER && uid != ROOT_UID) {
209 tzplatform_set_user(uid);
210 path = tzplatform_mkpath(TZ_USER_ICONS, "/");
211 gid = _get_gid(tzplatform_getenv(TZ_SYS_USER_GROUP));
212 tzplatform_reset_user();
214 path = tzplatform_mkpath(TZ_SYS_RW_ICONS, "/");
217 // just allow certain users to create the icon directory if needed.
218 if (uid_caller == ROOT_UID || uid_caller == uid)
219 _mkdir_for_user(path, uid, gid);
224 API const char *getUserPkgParserDBPath(void)
226 return getUserPkgParserDBPathUID(GLOBAL_USER);
229 API const char *getUserPkgParserDBPathUID(uid_t uid)
231 const char *pkgmgr_parser_db = NULL;
232 uid_t uid_caller = getuid();
233 gid_t gid = ROOT_UID;
235 if (uid != GLOBAL_USER && uid != ROOT_UID) {
236 tzplatform_set_user(uid);
237 pkgmgr_parser_db = tzplatform_mkpath(TZ_USER_DB, ".pkgmgr_parser.db");
238 gid = _get_gid(tzplatform_getenv(TZ_SYS_USER_GROUP));
239 tzplatform_reset_user();
241 pkgmgr_parser_db = tzplatform_mkpath(TZ_SYS_DB, ".pkgmgr_parser.db");
244 // just allow certain users to create the dbspace directory if needed.
245 if (uid_caller == ROOT_UID || uid_caller == uid) {
246 const char *db_path = _get_db_path(uid);
247 _mkdir_for_user(db_path, uid, gid);
250 return pkgmgr_parser_db;
253 API const char *getUserPkgCertDBPath(void)
255 return getUserPkgCertDBPathUID(GLOBAL_USER);
258 API const char *getUserPkgCertDBPathUID(uid_t uid)
260 const char *pkgmgr_cert_db = NULL;
261 uid_t uid_caller = getuid();
262 gid_t gid = ROOT_UID;
264 if (uid != GLOBAL_USER && uid != ROOT_UID) {
265 tzplatform_set_user(uid);
266 pkgmgr_cert_db = tzplatform_mkpath(TZ_USER_DB, ".pkgmgr_cert.db");
267 gid = _get_gid(tzplatform_getenv(TZ_SYS_USER_GROUP));
268 tzplatform_reset_user();
270 pkgmgr_cert_db = tzplatform_mkpath(TZ_SYS_DB, ".pkgmgr_cert.db");
273 // just allow certain users to create the dbspace directory if needed.
274 if (uid_caller == ROOT_UID || uid_caller == uid) {
275 const char *db_path = _get_db_path(uid);
276 _mkdir_for_user(db_path, uid, gid);
279 return pkgmgr_cert_db;
282 API const char *getUserDesktopPath(uid_t uid)
284 const char *path = NULL;
285 uid_t uid_caller = getuid();
286 gid_t gid = ROOT_UID;
288 if (uid != GLOBAL_USER && uid != ROOT_UID) {
289 tzplatform_set_user(uid);
290 path = tzplatform_mkpath(TZ_USER_DESKTOP, "/");
291 gid = _get_gid(tzplatform_getenv(TZ_SYS_USER_GROUP));
292 tzplatform_reset_user();
294 path = tzplatform_mkpath(TZ_SYS_RW_DESKTOP_APP, "/");
297 // just allow certain users to create the icon directory if needed.
298 if (uid_caller == ROOT_UID || uid_caller == uid)
299 _mkdir_for_user(path, uid, gid);
304 API const char *getUserManifestPath(uid_t uid)
306 const char *path = NULL;
307 uid_t uid_caller = getuid();
308 gid_t gid = ROOT_UID;
310 if (uid != GLOBAL_USER && uid != ROOT_UID) {
311 tzplatform_set_user(uid);
312 path = tzplatform_mkpath(TZ_USER_PACKAGES, "/");
313 gid = _get_gid(tzplatform_getenv(TZ_SYS_USER_GROUP));
314 tzplatform_reset_user();
316 path = tzplatform_mkpath(TZ_SYS_RW_PACKAGES, "/");
319 // just allow certain users to create the icon directory if needed.
320 if (uid_caller == ROOT_UID || uid_caller == uid)
321 _mkdir_for_user(path, uid, gid);
326 int __close_manifest_db(void)
328 if (manifest_db.ref) {
329 if (--manifest_db.ref == 0)
330 sqlite3_close(GET_DB(manifest_db));
336 static const char *parserdb_tables[] = {
337 "package_app_app_category",
339 "package_app_app_control",
340 "package_app_localized_info",
341 "package_app_app_metadata",
342 "package_app_share_allowed",
343 "package_app_app_permission",
344 "package_app_share_request",
346 "package_app_data_control",
347 "package_localized_info",
348 "package_app_icon_section_info",
349 "package_privilege_info",
350 "package_app_image_info",
354 int __open_manifest_db(uid_t uid, bool readonly)
357 const char *user_pkg_parser;
360 if (manifest_db.ref) {
365 user_pkg_parser = getUserPkgParserDBPathUID(uid);
366 if (access(user_pkg_parser, F_OK) != 0) {
367 _LOGE("Manifest DB does not exists !!");
371 flags = readonly ? SQLITE_OPEN_READONLY : SQLITE_OPEN_READWRITE;
372 ret = db_util_open_with_options(user_pkg_parser, &GET_DB(manifest_db),
374 retvm_if(ret != SQLITE_OK, -1, "connect db [%s] failed!\n",
378 ret = __attach_and_create_view(GET_DB(manifest_db), MANIFEST_DB,
379 parserdb_tables, uid);
380 retvm_if(ret != SQLITE_OK, -1, "attach db [%s] failed!\n",
386 int __close_cert_db(void)
389 if (--cert_db.ref == 0)
390 sqlite3_close_v2(GET_DB(cert_db));
393 _LOGE("Certificate DB is already closed !!\n");
397 static const char *certdb_tables[] = {
398 "package_cert_index_info",
403 int __open_cert_db(uid_t uid, bool readonly)
406 const char *user_cert_parser;
414 user_cert_parser = getUserPkgCertDBPathUID(uid);
415 if (access(user_cert_parser, F_OK) != 0) {
416 _LOGE("Cert DB does not exists !!");
420 flags = readonly ? SQLITE_OPEN_READONLY : SQLITE_OPEN_READWRITE;
421 ret = db_util_open_with_options(user_cert_parser, &GET_DB(cert_db),
423 retvm_if(ret != SQLITE_OK, -1, "connect db [%s] failed!",
427 ret = __attach_and_create_view(GET_DB(cert_db), CERT_DB,
429 retvm_if(ret != SQLITE_OK, -1, "attach db [%s] failed!",
435 void _save_column_int(sqlite3_stmt *stmt, int idx, int *i)
437 *i = sqlite3_column_int(stmt, idx);
440 void _save_column_str(sqlite3_stmt *stmt, int idx, const char **str)
444 val = (const char *)sqlite3_column_text(stmt, idx);
449 API int pkgmgrinfo_pkginfo_set_state_enabled(const char *pkgid, bool enabled)
451 /* Should be implemented later */
455 API int pkgmgrinfo_appinfo_set_usr_state_enabled(const char *appid, bool enabled, uid_t uid)
458 char query[MAX_QUERY_LEN] = {'\0'};
461 retvm_if(appid == NULL, PMINFO_R_EINVAL, "appid is NULL\n");
464 ret = __open_manifest_db(uid, false);
465 if (ret != SQLITE_OK) {
466 _LOGE("connect db [%s] failed!\n", getUserPkgParserDBPathUID(uid));
467 return PMINFO_R_ERROR;
470 /*Begin transaction*/
471 ret = sqlite3_exec(GET_DB(manifest_db), "BEGIN EXCLUSIVE", NULL, NULL, NULL);
472 if (ret != SQLITE_OK) {
473 _LOGE("Failed to begin transaction\n");
474 __close_manifest_db();
475 return PMINFO_R_ERROR;
477 _LOGD("Transaction Begin\n");
479 memset(query, '\0', MAX_QUERY_LEN);
480 snprintf(query, MAX_QUERY_LEN,
481 "update package_app_info set app_enabled='%s' where app_id='%s'", enabled?"true":"false", appid);
484 sqlite3_exec(GET_DB(manifest_db), query, NULL, NULL, &error_message)) {
485 _LOGE("Don't execute query = %s error message = %s\n", query,
487 sqlite3_free(error_message);
488 return PMINFO_R_ERROR;
490 sqlite3_free(error_message);
492 /*Commit transaction*/
493 ret = sqlite3_exec(GET_DB(manifest_db), "COMMIT", NULL, NULL, NULL);
494 if (ret != SQLITE_OK) {
495 _LOGE("Failed to commit transaction. Rollback now\n");
496 sqlite3_exec(GET_DB(manifest_db), "ROLLBACK", NULL, NULL, NULL);
497 __close_manifest_db();
498 return PMINFO_R_ERROR;
500 _LOGD("Transaction Commit and End\n");
501 __close_manifest_db();
505 API int pkgmgrinfo_appinfo_set_state_enabled(const char *appid, bool enabled)
507 return pkgmgrinfo_appinfo_set_usr_state_enabled(appid, enabled, GLOBAL_USER);
510 API int pkgmgrinfo_appinfo_set_usr_default_label(const char *appid, const char *label, uid_t uid)
513 char query[MAX_QUERY_LEN] = {'\0'};
516 retvm_if(appid == NULL, PMINFO_R_EINVAL, "appid is NULL\n");
518 ret = __open_manifest_db(uid, false);
520 _LOGE("Fail to open manifest DB\n");
521 return PMINFO_R_ERROR;
524 /*Begin transaction*/
525 ret = sqlite3_exec(GET_DB(manifest_db), "BEGIN EXCLUSIVE", NULL, NULL, NULL);
526 if (ret != SQLITE_OK) {
527 _LOGE("Failed to begin transaction\n");
528 __close_manifest_db();
529 return PMINFO_R_ERROR;
531 _LOGD("Transaction Begin\n");
533 memset(query, '\0', MAX_QUERY_LEN);
534 snprintf(query, MAX_QUERY_LEN,
535 "update package_app_localized_info set app_label='%s' where app_id='%s' and app_locale='No Locale'", label, appid);
538 sqlite3_exec(GET_DB(manifest_db), query, NULL, NULL, &error_message)) {
539 _LOGE("Don't execute query = %s error message = %s\n", query,
541 sqlite3_free(error_message);
542 return PMINFO_R_ERROR;
545 /*Commit transaction*/
546 ret = sqlite3_exec(GET_DB(manifest_db), "COMMIT", NULL, NULL, NULL);
547 if (ret != SQLITE_OK) {
548 _LOGE("Failed to commit transaction. Rollback now\n");
549 sqlite3_exec(GET_DB(manifest_db), "ROLLBACK", NULL, NULL, NULL);
550 __close_manifest_db();
551 return PMINFO_R_ERROR;
553 _LOGD("Transaction Commit and End\n");
554 __close_manifest_db();
558 API int pkgmgrinfo_appinfo_set_default_label(const char *appid, const char *label)
560 return pkgmgrinfo_appinfo_set_usr_default_label(appid, label, GLOBAL_USER);
563 API int pkgmgrinfo_appinfo_set_usr_guestmode_visibility(pkgmgrinfo_appinfo_h handle, uid_t uid, bool status)
567 char query[MAX_QUERY_LEN] = {'\0'};
569 sqlite3 *pkgmgr_parser_db;
571 retvm_if(handle == NULL, PMINFO_R_EINVAL, "appinfo handle is NULL\n");
573 pkgmgr_appinfo_x *info = (pkgmgr_appinfo_x *)handle;
574 val = info->app_info->guestmode_visibility;
576 ret = db_util_open_with_options(getUserPkgParserDBPathUID(uid), &pkgmgr_parser_db,
577 SQLITE_OPEN_READWRITE, NULL);
578 if (ret != SQLITE_OK) {
579 _LOGE("DB Open Failed\n");
580 return PMINFO_R_ERROR;
583 /*TODO: Write to DB here*/
585 snprintf(query, MAX_QUERY_LEN, "update package_app_info set app_guestmodevisibility = 'true' where app_id = '%s'", (char *)info->app_info->appid);
587 snprintf(query, MAX_QUERY_LEN, "update package_app_info set app_guestmodevisibility = 'false' where app_id = '%s'", (char *)info->app_info->appid);
589 ret = sqlite3_exec(pkgmgr_parser_db, query, NULL, NULL, &errmsg);
590 sqlite3_close(pkgmgr_parser_db);
591 if (ret != SQLITE_OK) {
592 _LOGE("DB update [%s] failed, error message = %s\n", query, errmsg);
594 return PMINFO_R_ERROR;
600 API int pkgmgrinfo_appinfo_set_guestmode_visibility(pkgmgrinfo_appinfo_h handle, bool status)
602 return pkgmgrinfo_appinfo_set_usr_guestmode_visibility(handle, GLOBAL_USER, status);
605 API int pkgmgrinfo_pkginfo_set_usr_installed_storage(const char *pkgid, INSTALL_LOCATION location, uid_t uid)
607 retvm_if(pkgid == NULL, PMINFO_R_EINVAL, "pkgid is NULL\n");
610 sqlite3 *pkgmgr_parser_db = NULL;
613 ret = db_util_open_with_options(getUserPkgParserDBPathUID(uid), &pkgmgr_parser_db,
614 SQLITE_OPEN_READWRITE, NULL);
615 retvm_if(ret != SQLITE_OK, PMINFO_R_ERROR, "connect db failed!");
617 /*Begin transaction*/
618 // Setting Manifest DB
619 ret = sqlite3_exec(pkgmgr_parser_db, "BEGIN EXCLUSIVE", NULL, NULL, NULL);
620 tryvm_if(ret != SQLITE_OK, ret = PMINFO_R_ERROR, "Failed to begin transaction\n");
621 _LOGD("Transaction Begin\n");
623 // pkgcakge_info table
624 query = sqlite3_mprintf("update package_info set installed_storage=%Q where package=%Q", location?"installed_external":"installed_internal", pkgid);
626 ret = sqlite3_exec(pkgmgr_parser_db, query, NULL, NULL, NULL);
627 tryvm_if(ret != SQLITE_OK, ret = PMINFO_R_ERROR, "Don't execute query = %s\n", query);
630 // package_app_info table
631 query = sqlite3_mprintf("update package_app_info set app_installed_storage=%Q where package=%Q", location?"installed_external":"installed_internal", pkgid);
633 ret = sqlite3_exec(pkgmgr_parser_db, query, NULL, NULL, NULL);
634 tryvm_if(ret != SQLITE_OK, ret = PMINFO_R_ERROR, "Don't execute query = %s\n", query);
636 /*Commit transaction*/
637 ret = sqlite3_exec(pkgmgr_parser_db, "COMMIT", NULL, NULL, NULL);
638 if (ret != SQLITE_OK) {
639 _LOGE("Failed to commit transaction. Rollback now\n");
640 ret = sqlite3_exec(pkgmgr_parser_db, "ROLLBACK", NULL, NULL, NULL);
641 tryvm_if(ret != SQLITE_OK, ret = PMINFO_R_ERROR, "Don't execute query = %s\n", query);
643 _LOGD("Transaction Commit and End\n");
647 sqlite3_close(pkgmgr_parser_db);
652 API int pkgmgrinfo_pkginfo_set_installed_storage(const char *pkgid, INSTALL_LOCATION location)
654 return pkgmgrinfo_pkginfo_set_usr_installed_storage(pkgid, location, GLOBAL_USER);