2 * Copyright (c) 2021 Samsung Electronics Co., Ltd All Rights Reserved
4 * Licensed under the Apache License, Version 2.0 (the "License");
5 * you may not use this file except in compliance with the License.
6 * You may obtain a copy of the License at
8 * http://www.apache.org/licenses/LICENSE-2.0
10 * Unless required by applicable law or agreed to in writing, software
11 * distributed under the License is distributed on an "AS IS" BASIS,
12 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13 * See the License for the specific language governing permissions and
14 * limitations under the License.
17 #include "db_handle_provider.hh"
22 #include <sys/types.h>
24 #include <tzplatform_config.h>
30 #include "cache_flag.hh"
31 #include "utils/logging.hh"
33 #include "pkgmgr-info.h"
34 #include "pkgmgrinfo_debug.h"
35 #include "pkgmgrinfo_internal.h"
36 #include "pkgmgrinfo_private.h"
41 #define LOG_TAG "PKGMGR_INFO"
45 uid_t globaluser_uid = -1;
47 uid_t GetGlobalUID() {
48 if (globaluser_uid == (uid_t)-1)
49 globaluser_uid = tzplatform_getuid(TZ_SYS_GLOBALAPP_USER);
51 return globaluser_uid;
54 uid_t ConvertUID(uid_t uid) {
55 if (uid < REGULAR_USER)
56 return GetGlobalUID();
61 bool GetModifiedTime(const char* dbpath, timespec* t) {
62 if (dbpath == nullptr || t == nullptr) {
63 LOG(ERROR) << "Invalid argument";
68 if (stat(dbpath, &attr)) {
69 LOG(ERROR) << "Fail to get status from file "
70 << dbpath << " errno : " << errno;
79 static const std::string global_parser_memdb_path =
80 "file:parserdb?mode=memory&cache=shared";
82 static const std::string cert_memdb_path =
83 "file:certdb?mode=memory&cache=shared";
87 namespace pkgmgr_server {
90 std::unordered_map<uid_t, std::unique_ptr<DBHandleProvider>>
91 DBHandleProvider::provider_map_;
92 bool DBHandleProvider::is_global_memdb_set_ = false;
93 std::unique_ptr<sqlite3, decltype(sqlite3_close_v2)*>
94 DBHandleProvider::global_parser_memdb_handle_(nullptr,
96 std::unique_ptr<sqlite3, decltype(sqlite3_close_v2)*>
97 DBHandleProvider::cert_memdb_handle_(nullptr, sqlite3_close_v2);
98 std::string DBHandleProvider::global_parser_filedb_path_;
99 std::string DBHandleProvider::cert_filedb_path_;
100 std::unordered_set<pid_t> DBHandleProvider::writer_pid_list_;
101 std::recursive_mutex DBHandleProvider::lock_;
102 std::shared_mutex DBHandleProvider::pid_list_lock_;
104 DBHandleProvider::DBHandleProvider(uid_t uid)
106 is_user_memdb_set_(false),
107 parser_memdb_handle_(nullptr, sqlite3_close_v2) {
110 if (global_parser_filedb_path_.empty()) {
111 tmp_path = getUserPkgParserDBPathUID(GetGlobalUID());
112 global_parser_filedb_path_ = tmp_path;
116 if (cert_filedb_path_.empty()) {
117 tmp_path = getUserPkgCertDBPath();
118 cert_filedb_path_ = tmp_path;
122 tmp_path = getUserPkgParserDBPathUID(uid_);
123 user_parser_filedb_path_ = tmp_path;
126 user_parser_memdb_path_ = "file:parserdb" +
127 std::to_string(static_cast<int>(uid_)) +
128 "?mode=memory&cache=shared";
131 DBHandleProvider& DBHandleProvider::GetInst(uid_t uid) {
132 static std::shared_mutex singleton_lock_;
133 std::shared_lock<std::shared_mutex> s(singleton_lock_);
135 uid = ConvertUID(uid);
136 auto it = provider_map_.find(uid);
137 if (it != provider_map_.end())
138 return *(it->second);
141 std::unique_lock<std::shared_mutex> u(singleton_lock_);
142 auto& prov = provider_map_[uid];
144 prov.reset(new DBHandleProvider(uid));
149 bool DBHandleProvider::IsCrashedWriteRequest() {
150 std::unique_lock<std::shared_mutex> u(pid_list_lock_);
152 if (writer_pid_list_.empty())
156 LOG(DEBUG) << "Check process count : " << writer_pid_list_.size();
157 std::vector<pid_t> remove_pids;
158 for (pid_t pid : writer_pid_list_) {
159 std::string status_path = "/proc/" + std::to_string(pid) + "/status";
161 int fd = open(status_path.c_str(), O_RDONLY);
163 LOG(ERROR) << "Process is crashed : " << pid;
164 remove_pids.push_back(pid);
171 for (pid_t pid : remove_pids)
172 writer_pid_list_.erase(pid);
177 std::vector<std::pair<std::string, uid_t>> DBHandleProvider::GetParserDBPath(
178 pid_t pid, bool write) {
179 std::unique_lock<std::recursive_mutex> u(lock_);
180 std::vector<std::pair<std::string, uid_t>> db_path_list;
182 if (is_user_memdb_set_ != is_global_memdb_set_)
183 is_global_memdb_set_ ? SetMemoryMode(pid) : UnsetMemoryMode(pid);
185 if (IsMemoryDBActive(pid, write)) {
186 if (uid_ > REGULAR_USER)
187 db_path_list.emplace_back(std::make_pair(user_parser_memdb_path_, uid_));
189 db_path_list.emplace_back(
190 std::make_pair(global_parser_memdb_path, GetGlobalUID()));
192 if (uid_ > REGULAR_USER)
193 db_path_list.emplace_back(std::make_pair(user_parser_filedb_path_, uid_));
195 db_path_list.emplace_back(
196 std::make_pair(global_parser_filedb_path_, GetGlobalUID()));
199 if (db_path_list.size() == 1) {
200 LOG(DEBUG) << "global db path : " << db_path_list[0].first;
202 LOG(DEBUG) << "local db path : " << db_path_list[0].first;
203 LOG(DEBUG) << "global db path : " << db_path_list[1].first;
209 std::string DBHandleProvider::GetCertDBPath(pid_t pid, bool write) {
210 std::unique_lock<std::recursive_mutex> u(lock_);
211 if (is_user_memdb_set_ != is_global_memdb_set_)
212 is_global_memdb_set_ ? SetMemoryMode(pid) : UnsetMemoryMode(pid);
214 if (IsMemoryDBActive(pid, write))
215 return cert_memdb_path;
217 return cert_filedb_path_;
220 sqlite3* DBHandleProvider::CreateMemoryDBHandle(const std::string& filedb_path,
221 const std::string& memorydb_path) {
222 sqlite3* memorydb = nullptr;
223 sqlite3* filedb = nullptr;
224 int ret = sqlite3_open_v2(memorydb_path.c_str(), &memorydb,
225 SQLITE_OPEN_READONLY | SQLITE_OPEN_URI, nullptr);
226 if (ret != SQLITE_OK) {
227 LOG(ERROR) << "Failed to open memory DB " << ret << ": " << memorydb_path;
231 ret = sqlite3_open_v2(filedb_path.c_str(), &filedb, SQLITE_OPEN_READONLY,
233 if (ret != SQLITE_OK) {
234 LOG(ERROR) << "Failed to open file DB " << ret << ": " << filedb_path;
235 sqlite3_close_v2(memorydb);
239 sqlite3_backup* backup =
240 sqlite3_backup_init(memorydb, "main", filedb, "main");
241 if (backup == nullptr) {
242 LOG(ERROR) << "Failed to backup for memory DB";
243 sqlite3_close_v2(memorydb);
244 sqlite3_close_v2(filedb);
248 sqlite3_backup_step(backup, -1);
249 sqlite3_backup_finish(backup);
250 sqlite3_close_v2(filedb);
254 void DBHandleProvider::SetMemoryMode(pid_t pid) {
255 std::unique_lock<std::recursive_mutex> u(lock_);
256 if (is_global_memdb_set_ && is_user_memdb_set_)
260 CreateMemoryDBHandle(user_parser_filedb_path_, user_parser_memdb_path_);
261 if (parser_db != nullptr)
262 parser_memdb_handle_.reset(parser_db);
264 if (is_user_memdb_set_ == is_global_memdb_set_) {
265 sqlite3* global_parser_file_db = CreateMemoryDBHandle(
266 global_parser_filedb_path_, global_parser_memdb_path);
267 if (global_parser_file_db)
268 global_parser_memdb_handle_.reset(global_parser_file_db);
271 CreateMemoryDBHandle(cert_filedb_path_, cert_memdb_path);
272 if (cert_db != nullptr)
273 cert_memdb_handle_.reset(cert_db);
278 is_user_memdb_set_ = true;
279 is_global_memdb_set_ = true;
280 LOG(DEBUG) << "Set Memory mode : Memory";
283 void DBHandleProvider::UnsetMemoryMode(pid_t pid) {
284 std::unique_lock<std::recursive_mutex> u(lock_);
285 if (!is_global_memdb_set_ && !is_user_memdb_set_)
288 parser_memdb_handle_.reset(nullptr);
289 cert_memdb_handle_.reset(nullptr);
290 global_parser_memdb_handle_.reset(nullptr);
293 LOG(ERROR) << "Given pid is not exists in pid list : " << pid;
295 is_user_memdb_set_ = false;
296 is_global_memdb_set_ = false;
298 LOG(DEBUG) << "Set Memory mode : File";
301 bool DBHandleProvider::IsMemoryDBActive(pid_t pid, bool write) {
302 std::unique_lock<std::shared_mutex> u(pid_list_lock_);
303 if (!is_user_memdb_set_)
309 if (writer_pid_list_.find(pid) != writer_pid_list_.end())
315 void DBHandleProvider::TrimCache() {
316 std::unique_lock<std::recursive_mutex> u(lock_);
321 void DBHandleProvider::ReleaseCache() {
322 auto lock = CacheFlag::GetWriterLock();
323 CacheFlag::SetStatus(CacheFlag::Status::PREPARING);
327 pending_pkg_.clear();
328 pkg_app_map_.clear();
329 CacheFlag::SetStatus(CacheFlag::Status::UNPREPARED);
334 bool DBHandleProvider::IsWriter(pid_t pid) {
335 std::unique_lock<std::shared_mutex> s(pid_list_lock_);
336 return writer_pid_list_.find(pid) != writer_pid_list_.end();
339 int DBHandleProvider::UpdateCache(const tizen_base::Database& db, pid_t pid,
340 uid_t uid, bool write, const std::string& locale) {
343 pending_pkg_.clear();
344 pkg_app_map_.clear();
346 const char* dbpath = sqlite3_db_filename(db.GetRaw(), "main");
347 bool is_inmemory_db = false;
348 if (dbpath == nullptr || strlen(dbpath) == 0) {
349 LOG(INFO) << "database is inmemory db";
350 is_inmemory_db = true;
353 timespec start_time = { 0, };
354 timespec end_time = { 0, };
355 if (!is_inmemory_db && !GetModifiedTime(dbpath, &start_time))
356 return PMINFO_R_ERROR;
358 pkgmgrinfo_filter_x tmp_filter = { 0, };
359 tmp_filter.cache_flag = true;
360 std::map<std::string, std::shared_ptr<package_x>> pkgs;
361 int ret = internal::GetPkgInfo(db, &tmp_filter, uid_, locale, pkgs);
362 if (ret == PMINFO_R_OK) {
363 for (auto& [key, val] : pkgs)
364 AddPackage(std::move(key), std::move(val));
367 if (!is_inmemory_db && !GetModifiedTime(dbpath, &end_time))
368 return PMINFO_R_ERROR;
370 if (start_time.tv_sec != end_time.tv_sec ||
371 start_time.tv_nsec != end_time.tv_nsec) {
372 LOG(ERROR) << "Database(" << dbpath << ") modification was detected";
373 return PMINFO_R_ERROR;
376 std::vector<std::shared_ptr<application_x>> app_list;
377 ret = internal::GetAppInfo(db, &tmp_filter, uid_, uid, locale, app_list);
379 if (!is_inmemory_db && !GetModifiedTime(dbpath, &end_time))
380 return PMINFO_R_ERROR;
382 if (start_time.tv_sec != end_time.tv_sec ||
383 start_time.tv_nsec != end_time.tv_nsec) {
384 LOG(ERROR) << "Database(" << dbpath << ") modification was detected";
385 return PMINFO_R_ERROR;
388 if (ret == PMINFO_R_OK) {
389 for (auto& app : app_list) {
390 auto it = pkg_map_.find(app->package);
391 if (it == pkg_map_.end()) {
392 LOG(ERROR) << "Can not find package from pkg_map";
393 return PMINFO_R_ERROR;
396 app->privileges = it->second->privileges;
397 std::string appid = app->appid;
398 AddApplication(std::move(appid), std::move(app));
407 inline bool CheckPkgFilters(pkgmgrinfo_filter_x* filter,
408 const std::shared_ptr<package_x>& info) {
409 for (auto* it = filter->list; it != nullptr; it = g_slist_next(it)) {
410 auto node = reinterpret_cast<pkgmgrinfo_node_x*>(it->data);
411 auto* checker = FilterCheckerProvider::GetInst().
412 GetPkgFilterChecker(node->prop);
413 if (!checker->CheckFilter(node, info.get()))
420 std::vector<std::shared_ptr<package_x>> DBHandleProvider::GetPackages(
421 pid_t pid, pkgmgrinfo_filter_x* filter,
422 const std::string& package) {
423 std::vector<std::shared_ptr<package_x>> ret;
425 if (internal::CheckPackageStorageStatus(filter)) {
426 if (pkgmgrinfo_pkginfo_filter_add_bool(filter,
427 PMINFO_PKGINFO_PROP_PACKAGE_CHECK_STORAGE, true) != PMINFO_R_OK) {
428 LOG(ERROR) << "Fail to add check storage value to filter";
432 if (package.empty()) {
433 for (auto& info : pkg_map_) {
434 if (CheckPkgFilters(filter, info.second))
435 ret.push_back(info.second);
438 auto map_it = pkg_map_.find(package);
439 if (map_it != pkg_map_.end() && CheckPkgFilters(filter, map_it->second))
440 ret.push_back(map_it->second);
446 void DBHandleProvider::AddPackage(std::string package,
447 std::shared_ptr<package_x> info) {
448 pkg_map_[package] = std::move(info);
451 inline bool CheckAppFilters(pkgmgrinfo_filter_x* filter,
452 const std::shared_ptr<application_x>& info,
453 const std::unordered_map<std::string, std::string>& metadata_map) {
454 for (auto* it = filter->list; it != nullptr; it = g_slist_next(it)) {
455 auto node = reinterpret_cast<pkgmgrinfo_node_x*>(it->data);
456 auto* checker = FilterCheckerProvider::GetInst().
457 GetAppFilterChecker(node->prop);
458 if (!checker->CheckFilter(node, info.get()))
463 if (!metadata_map.empty()) {
465 for (auto* it = info->metadata; it != nullptr; it = g_list_next(it)) {
466 auto* node = reinterpret_cast<metadata_x*>(it->data);
467 if (node->key != nullptr) {
468 auto metadata = metadata_map.find(node->key);
469 if (metadata == metadata_map.end())
472 if (metadata->second.empty() ||
473 strcmp(node->value ? node->value : "",
474 metadata->second.c_str()) == 0)
483 std::vector<std::shared_ptr<application_x>> DBHandleProvider::GetApplications(
484 pid_t pid, pkgmgrinfo_filter_x* filter,
485 const std::string& app) {
486 /* make metadata filter map */
487 std::unordered_map<std::string, std::string> metadata_map;
488 for (auto* it = filter->list_metadata; it != nullptr; it = g_slist_next(it)) {
489 auto node = reinterpret_cast<pkgmgrinfo_metadata_node_x*>(it->data);
490 if (node->key == nullptr)
493 metadata_map[node->key] = (node->value ? node->value : "");
496 std::vector<std::shared_ptr<application_x>> ret;
497 if (internal::CheckAppStorageStatus(filter)) {
498 if (pkgmgrinfo_appinfo_filter_add_bool(filter,
499 PMINFO_APPINFO_PROP_APP_CHECK_STORAGE, true) != PMINFO_R_OK) {
500 LOG(ERROR) << "Fail to add check storage value to filter";
506 for (auto& info : app_map_) {
507 if (CheckAppFilters(filter, info.second, metadata_map))
508 ret.push_back(info.second);
511 auto map_it = app_map_.find(app);
512 if (map_it != app_map_.end() &&
513 CheckAppFilters(filter, map_it->second, metadata_map))
514 ret.push_back(map_it->second);
520 void DBHandleProvider::AddApplication(std::string app,
521 std::shared_ptr<application_x> info) {
522 pkg_app_map_[info->package].emplace(app);
523 app_map_[app] = std::move(info);
526 void DBHandleProvider::InsertPID(pid_t pid) {
527 std::unique_lock<std::shared_mutex> u(pid_list_lock_);
529 writer_pid_list_.insert(pid);
532 bool DBHandleProvider::ErasePID(pid_t pid) {
533 std::unique_lock<std::shared_mutex> u(pid_list_lock_);
535 return writer_pid_list_.erase(pid) == 1;
538 void DBHandleProvider::RegisterPendingPackageInfo(package_x* info) {
539 if (!info || !info->package)
542 pending_pkg_.emplace(info->package);
545 void DBHandleProvider::UpdatePendingPackageInfo(const tizen_base::Database& db,
546 pid_t pid, uid_t uid, const std::string& locale) {
547 pkgmgrinfo_filter_x tmp_filter = { 0, };
548 pkgmgrinfo_node_x node = {
549 .prop = E_PMINFO_PKGINFO_PROP_PACKAGE_ID
551 tmp_filter.cache_flag = true;
552 tmp_filter.list = g_slist_append(tmp_filter.list, (gpointer)&node);
553 std::map<std::string, std::shared_ptr<package_x>> pkgs;
554 for (const auto& pkg : pending_pkg_) {
556 for (auto& appid : pkg_app_map_[pkg]) {
557 app_map_.erase(appid);
560 pkg_app_map_.erase(pkg);
561 node.value = const_cast<char*>(pkg.c_str());
562 internal::GetPkgInfo(db, &tmp_filter, uid_, locale, pkgs);
565 for (auto& [key, val] : pkgs)
566 AddPackage(key, val);
568 node.prop = E_PMINFO_APPINFO_PROP_APP_PACKAGE;
569 for (auto& [key, val] : pkgs) {
570 node.value = val->package;
571 std::vector<std::shared_ptr<application_x>> app_list;
572 internal::GetAppInfo(db, &tmp_filter, uid_, uid, locale, app_list);
574 for (auto& app : app_list) {
575 app->privileges = val->privileges;
576 std::string appid = app->appid;
577 AddApplication(std::move(appid), std::move(app));
581 g_slist_free(tmp_filter.list);
582 pending_pkg_.clear();
585 bool DBHandleProvider::UpdateCachePkg(const tizen_base::Database& db, uid_t uid,
586 const std::string& pkgid, const std::string& locale) {
587 pkgmgrinfo_filter_x tmp_filter = { 0, };
588 pkgmgrinfo_node_x node = {
589 .prop = E_PMINFO_PKGINFO_PROP_PACKAGE_ID,
590 .value = const_cast<char*>(pkgid.c_str())
592 tmp_filter.cache_flag = true;
593 tmp_filter.list = g_slist_append(tmp_filter.list, (gpointer)&node);
594 std::map<std::string, std::shared_ptr<package_x>> pkgs;
595 internal::GetPkgInfo(db, &tmp_filter, uid_, locale, pkgs);
596 for (auto& [key, val] : pkgs) {
597 AddPackage(key, val);
598 for (auto& appid : pkg_app_map_[key]) {
599 app_map_.erase(appid);
602 pkg_app_map_.erase(key);
603 std::vector<std::shared_ptr<application_x>> app_list;
604 node.prop = E_PMINFO_APPINFO_PROP_APP_PACKAGE;
605 node.value = const_cast<char*>(key.c_str());
606 internal::GetAppInfo(db, &tmp_filter, uid_, uid, locale, app_list);
607 for (auto& app : app_list) {
608 app->privileges = val->privileges;
609 std::string appid = app->appid;
610 AddApplication(std::move(appid), std::move(app));
617 bool DBHandleProvider::UpdateCacheApp(const tizen_base::Database& db, uid_t uid,
618 const std::string& appid, const std::string& locale) {
619 pkgmgrinfo_filter_x tmp_filter = { 0, };
620 pkgmgrinfo_node_x node = {
621 .prop = E_PMINFO_APPINFO_PROP_APP_ID,
622 .value = const_cast<char*>(appid.c_str())
624 tmp_filter.cache_flag = true;
625 tmp_filter.list = g_slist_append(tmp_filter.list, (gpointer)&node);
627 std::vector<std::shared_ptr<application_x>> app_list;
628 app_map_.erase(appid);
629 internal::GetAppInfo(db, &tmp_filter, uid_, uid, locale, app_list);
630 g_slist_free(tmp_filter.list);
632 for (auto& app : app_list) {
633 auto it = pkg_map_.find(app->package);
634 if (it == pkg_map_.end()) {
635 LOG(ERROR) << "Can not find package from pkg_map";
639 pkg_app_map_[app->package].erase(app->appid);
640 app->privileges = it->second->privileges;
641 std::string appid = app->appid;
642 AddApplication(std::move(appid), std::move(app));
648 bool DBHandleProvider::UpdateCacheAppByPkgid(const tizen_base::Database& db,
649 uid_t uid, const std::string& pkgid, const std::string& locale) {
650 auto it = pkg_map_.find(pkgid);
651 if (it == pkg_map_.end()) {
652 LOG(ERROR) << "Can not find package from pkg_map";
656 auto& pkg = it->second;
657 pkgmgrinfo_filter_x tmp_filter = { 0, };
658 pkgmgrinfo_node_x node = {
659 .prop = E_PMINFO_APPINFO_PROP_APP_PACKAGE,
660 .value = pkg->package
663 tmp_filter.cache_flag = true;
664 tmp_filter.list = g_slist_append(tmp_filter.list, (gpointer)&node);
666 std::vector<std::shared_ptr<application_x>> app_list;
667 internal::GetAppInfo(db, &tmp_filter, uid_, uid, locale, app_list);
669 for (auto& appid : pkg_app_map_[pkgid]) {
670 app_map_.erase(appid);
672 pkg_app_map_.erase(pkgid);
674 for (auto& app : app_list) {
675 app->privileges = pkg->privileges;
676 std::string appid = app->appid;
677 AddApplication(std::move(appid), std::move(app));
680 g_slist_free(tmp_filter.list);
684 } // namespace database
685 } // namespace pkgmgr_server