*/
#include <fstream>
-#include <regex>
#include <json/json.h>
#include <pkgmgr-info.h>
#include <pkgmgr_installer_info.h>
#define __XSTR(x) #x
#define __STR(x) __XSTR(x)
static const char* __DOTNET_DIR = __STR(DOTNET_DIR);
+static const char* __READ_ONLY_APP_UPDATE_DIR = __STR(READ_ONLY_APP_UPDATE_DIR);
#undef __STR
#undef __XSTR
std::vector<std::string> removeNuget;
try {
for (auto& nuget : bf::recursive_directory_iterator(__DOTNET_DIR)) {
- bool isExist = false;
std::string nugetPath = nuget.path().string();
+ if (!bf::is_directory(nugetPath) ||
+ nugetPath.find(TLC_LIBRARIES_DIR) != std::string::npos ||
+ nugetPath.find(__READ_ONLY_APP_UPDATE_DIR) != std::string::npos) {
+ continue;
+ }
+
+ bool isExist = false;
for (auto& restore : restore_nuget) {
- if (!bf::is_directory(nugetPath) || nugetPath.find(TLC_LIBRARIES_DIR) != std::string::npos) {
- isExist = true;
- break;
- }
- if (!strcmp(nugetPath.c_str(), restore.c_str()) ||
- !strcmp(nugetPath.c_str(), restore.substr(0, restore.rfind('/')).c_str())) {
+ if (nugetPath == restore || nugetPath == getBaseName(restore)) {
isExist = true;
break;
}
for (auto& rm : removeNuget) {
if (!removeAll(rm)) {
- fprintf(stderr, "Failed to remove of %s\n", rm.c_str());
+ _SERR("Failed to remove of %s", rm.c_str());
}
}
removeNuget.clear();
} catch (const bf::filesystem_error& error) {
- fprintf(stderr, "Failed to recursive directory: %s\n", error.what());
+ _SERR("Failed to recursive directory: %s", error.what());
return;
}
}
// callback function of "pkgmgrinfo_appinfo_metadata_filter_foreach"
-static int restoreTACDBCb(pkgmgrinfo_appinfo_h handle, void *userData)
+static int tac_restoreDBCb(pkgmgrinfo_appinfo_h handle, void *userData)
{
char *pkgId = NULL;
char *root = NULL;
int ret = pkgmgrinfo_appinfo_get_pkgid(handle, &pkgId);
if (ret != PMINFO_R_OK) {
- fprintf(stderr, "Failed to get pkgid\n");
+ _SERR("Failed to get pkgid");
return -1;
}
ret = pkgmgrinfo_appinfo_get_root_path(handle, &root);
if (ret != PMINFO_R_OK) {
- fprintf(stderr, "Failed to get root path\n");
+ _SERR("Failed to get root path");
return -1;
}
rootPath = std::string(root);
ret = pkgmgrinfo_appinfo_get_exec(handle, &exec);
if (ret != PMINFO_R_OK) {
- fprintf(stderr, "Failed to get exec name\n");
+ _SERR("Failed to get exec name");
return -1;
}
execName = std::string(exec).substr(std::string(exec).rfind('/') + 1);
for (auto& npAssembly : depsJsonParser(rootPath, execName)) {
std::string nugetPackage = npAssembly.substr(0, npAssembly.rfind(':'));
std::string assemblyName = npAssembly.substr(npAssembly.rfind(':') + 1);
- if (bf::exists(tacDir) && bf::exists(concatPath(tacDir, assemblyName))) {
+ if (exist(tacDir) && exist(concatPath(tacDir, assemblyName))) {
parserData.push_back(nugetPackage);
}
}
char *sql = sqlite3_mprintf(
"INSERT INTO TAC (PKGID, NUGET, NAME, VERSION) " \
"VALUES (%Q, %Q, %Q, %Q);", pkgId, nuget.c_str(), name.c_str(), version.c_str());
- dbInsert(tac_db, TAC_APP_LIST_RESTORE_DB, sql);
+ insertDB(tac_db, sql);
restore_nuget.push_back(concatPath(__DOTNET_DIR, nuget));
sqlite3_free(sql);
}
return 0;
}
-tac_error_e restoreTACDB()
+tac_error_e tac_restoreDB()
{
if (!removeFile(TAC_APP_LIST_RESTORE_DB)) {
- fprintf(stderr, "Failed to remove of %s\n", TAC_APP_LIST_RESTORE_DB);
+ _SERR("Failed to remove of %s", TAC_APP_LIST_RESTORE_DB);
return TAC_ERROR_UNKNOWN;
}
std::string dbRestoreJournal = TAC_APP_LIST_RESTORE_DB + std::string("-journal");
if (!removeFile(dbRestoreJournal)) {
- fprintf(stderr, "Failed to remove of %s\n", dbRestoreJournal.c_str());
+ _SERR("Failed to remove of %s", dbRestoreJournal.c_str());
return TAC_ERROR_UNKNOWN;
}
- tac_db = dbCreate(TAC_APP_LIST_RESTORE_DB, CREATE_TAC_DB_TABLE);
+ tac_db = createDB(TAC_APP_LIST_RESTORE_DB, CREATE_TAC_DB_TABLE);
if (!tac_db) {
- fprintf(stderr, "Sqlite create error\n");
+ _SERR("Sqlite create error");
return TAC_ERROR_UNKNOWN;
}
+ sqlite3_exec(tac_db, "BEGIN;", NULL, NULL, NULL);
pkgmgrinfo_appinfo_metadata_filter_h handle;
int ret = pkgmgrinfo_appinfo_metadata_filter_create(&handle);
return TAC_ERROR_UNKNOWN;
}
- ret = pkgmgrinfo_appinfo_metadata_filter_add(handle, TAC_METADATA_KEY, METADATA_VALUE);
+ ret = pkgmgrinfo_appinfo_metadata_filter_add(handle, TAC_METADATA_KEY, METADATA_VALUE_TRUE);
if (ret != PMINFO_R_OK) {
pkgmgrinfo_appinfo_metadata_filter_destroy(handle);
return TAC_ERROR_UNKNOWN;
}
- ret = pkgmgrinfo_appinfo_metadata_filter_foreach(handle, restoreTACDBCb, NULL);
- if (ret != PMINFO_R_OK) {
- fprintf(stderr, "Failed pkgmgrinfo_appinfo_metadata_filter_foreach\n");
+ ret = pkgmgrMDFilterForeach(handle, tac_restoreDBCb, NULL);
+ if (ret != 0) {
pkgmgrinfo_appinfo_metadata_filter_destroy(handle);
return TAC_ERROR_UNKNOWN;
}
- fprintf(stdout, "Success pkgmgrinfo_appinfo_metadata_filter_foreach\n");
pkgmgrinfo_appinfo_metadata_filter_destroy(handle);
if (tac_db) {
- dbClose(tac_db);
+ closeDB(tac_db);
tac_db = NULL;
}
- const uid_t g_uid = 301; // app_fw
- const gid_t g_gid = 301; // app_fw
-
if (!copyFile(TAC_APP_LIST_RESTORE_DB, TAC_APP_LIST_DB)) {
- fprintf(stderr, "Failed to copy of %s\n", TAC_APP_LIST_DB);
+ _SERR("Failed to copy of %s", TAC_APP_LIST_DB);
return TAC_ERROR_UNKNOWN;
}
if (!removeFile(TAC_APP_LIST_RESTORE_DB)) {
- fprintf(stderr, "Failed to remove of %s\n", TAC_APP_LIST_RESTORE_DB);
+ _SERR("Failed to remove of %s", TAC_APP_LIST_RESTORE_DB);
return TAC_ERROR_UNKNOWN;
}
- if (chown(TAC_APP_LIST_DB, g_uid, g_gid) == -1) {
- fprintf(stderr, "Failed to change owner and group name\n");
- }
std::string dbJournal = TAC_APP_LIST_DB + std::string("-journal");
if (!copyFile(dbRestoreJournal, dbJournal)) {
- fprintf(stderr, "Failed to copy of %s\n", dbJournal.c_str());
+ _SERR("Failed to copy of %s", dbJournal.c_str());
return TAC_ERROR_UNKNOWN;
}
if (!removeFile(dbRestoreJournal)) {
- fprintf(stderr, "Failed to remove of %s\n", dbRestoreJournal.c_str());
+ _SERR("Failed to remove of %s", dbRestoreJournal.c_str());
return TAC_ERROR_UNKNOWN;
}
- if (chown(dbJournal.c_str(), g_uid, g_gid) == -1) {
- fprintf(stderr, "Failed to change owner and group name\n");
- }
cleanupDirectory();
{
std::string rootPath = getRootPath(pkgId);
if (rootPath.empty()) {
- fprintf(stderr, "Failed to get root path from [%s]\n", pkgId.c_str());
+ _SERR("Failed to get root path from [%s]", pkgId.c_str());
return TAC_ERROR_INVALID_PACKAGE;
}
std::string binDir = concatPath(rootPath, "bin");
std::string tacDir = concatPath(binDir, TAC_SYMLINK_SUB_DIR);
std::string binNIDir = concatPath(binDir, APP_NI_SUB_DIR);
- if (bf::exists(tacDir)) {
+ if (exist(tacDir)) {
try {
for (auto& symlinkAssembly : bf::recursive_directory_iterator(tacDir)) {
std::string symPath = symlinkAssembly.path().string();
std::string fileName = symlinkAssembly.path().filename().string();
- if (bf::is_symlink(symPath)) {
+ if (isSymlinkFile(symPath)) {
std::string originPath = bf::read_symlink(symPath).string();
if (!isNativeImage(symPath)) {
std::string dllPath = concatPath(binDir, fileName);
if (!copyFile(originPath, dllPath)) {
- fprintf(stderr, "Failed to copy of %s\n", dllPath.c_str());
+ _SERR("Failed to copy of %s", dllPath.c_str());
return TAC_ERROR_UNKNOWN;
}
copySmackAndOwnership(binDir.c_str(), concatPath(binDir, fileName).c_str());
} else {
std::string niPath = concatPath(binNIDir, fileName);
if (!copyFile(originPath, niPath)) {
- fprintf(stderr, "Failed to copy of %s\n", niPath.c_str());
+ _SERR("Failed to copy of %s", niPath.c_str());
return TAC_ERROR_UNKNOWN;
}
copySmackAndOwnership(binDir.c_str(), niPath.c_str());
}
}
if (!removeAll(tacDir)) {
- fprintf(stderr, "Failed to remove of %s\n", tacDir.c_str());
+ _SERR("Failed to remove of %s", tacDir.c_str());
return TAC_ERROR_UNKNOWN;
}
} catch (const bf::filesystem_error& error) {
- fprintf(stderr, "Failed to recursive directory: %s\n", error.what());
+ _SERR("Failed to recursive directory: %s", error.what());
return TAC_ERROR_UNKNOWN;
}
}
{
std::string rootPath = getRootPath(pkgId);
if (rootPath.empty()) {
- fprintf(stderr, "Failed to get root path from [%s]\n", pkgId.c_str());
+ _SERR("Failed to get root path from [%s]", pkgId.c_str());
return TAC_ERROR_INVALID_PACKAGE;
}
std::string execName = getExecName(pkgId);
if (execName.empty()) {
- fprintf(stderr, "Failed to get exec name from [%s]\n", pkgId.c_str());
+ _SERR("Failed to get exec name from [%s]", pkgId.c_str());
return TAC_ERROR_INVALID_PACKAGE;
}
std::string metaValue = getMetadataValue(pkgId, TAC_METADATA_KEY);
if (metaValue.empty()) {
- fprintf(stderr, "Failed to get metadata from [%s]\n", pkgId.c_str());
+ _SERR("Failed to get metadata from [%s]", pkgId.c_str());
return TAC_ERROR_INVALID_PACKAGE;
}
- if (!strcmp(metaValue.c_str(), "true")) {
+ if (!strcmp(metaValue.c_str(), METADATA_VALUE_TRUE)) {
std::string binDir = concatPath(rootPath, "bin");
std::string tacDir = concatPath(binDir, TAC_SYMLINK_SUB_DIR);
std::string binNIDir = concatPath(binDir, APP_NI_SUB_DIR);
- if (!bf::exists(tacDir)) {
+ if (!exist(tacDir)) {
if (!createDir(tacDir)) {
- fprintf(stderr, "Cannot create directory: %s\n", tacDir.c_str());
+ _SERR("Cannot create directory: %s", tacDir.c_str());
return TAC_ERROR_UNKNOWN;
}
copySmackAndOwnership(binDir.c_str(), tacDir.c_str());
std::string nugetPackage = npAssembly.substr(0, npAssembly.rfind(':'));
std::string assemblyName = npAssembly.substr(npAssembly.rfind(':') + 1);
std::string nugetPath = concatPath(__DOTNET_DIR, nugetPackage);
- if (bf::exists(nugetPath)) {
+ if (exist(nugetPath)) {
std::string originPath = concatPath(nugetPath, assemblyName);
- if (bf::exists(originPath)) {
+ if (exist(originPath)) {
enableNuget.push_back(originPath);
}
}
}
+ bs::error_code error;
for (auto& originPath : enableNuget) {
- if (bf::exists(originPath)) {
+ if (exist(originPath)) {
std::string fileName = originPath.substr(originPath.rfind('/') + 1);
- std::string NIFileName = fileName.substr(0, fileName.rfind(".dll")) + ".ni.dll";
- if (bf::exists(binNIDir)) {
- std::string originNIPath = originPath.substr(0, originPath.rfind(".dll")) + ".ni.dll";
- if (bf::exists(originNIPath)) {
- bf::create_symlink(originNIPath, concatPath(tacDir, NIFileName));
- fprintf(stdout, "%s symbolic link file generated successfully.\n", concatPath(tacDir, NIFileName).c_str());
+ std::string NIFileName = changeExtension(fileName, "dll", "ni.dll");
+ if (exist(binNIDir)) {
+ std::string originNIPath = changeExtension(originPath, "dll", "ni.dll");
+ if (exist(originNIPath)) {
+ bf::create_symlink(originNIPath, concatPath(tacDir, NIFileName), error);
+ if (error) {
+ _SERR("Failed to create symlink %s file", concatPath(tacDir, NIFileName).c_str());
+ return TAC_ERROR_UNKNOWN;
+ }
+ _SOUT("%s symbolic link file generated successfully.", concatPath(tacDir, NIFileName).c_str());
copySmackAndOwnership(tacDir.c_str(), concatPath(tacDir, NIFileName).c_str(), true);
if (!removeFile(concatPath(binNIDir, NIFileName))) {
- fprintf(stderr, "Failed to remove of %s\n", concatPath(binNIDir, NIFileName).c_str());
+ _SERR("Failed to remove of %s", concatPath(binNIDir, NIFileName).c_str());
return TAC_ERROR_UNKNOWN;
}
}
}
- bf::create_symlink(originPath, concatPath(tacDir, fileName));
- fprintf(stdout, "%s symbolic link file generated successfully.\n", concatPath(tacDir, fileName).c_str());
+ bf::create_symlink(originPath, concatPath(tacDir, fileName), error);
+ if (error) {
+ _SERR("Failed to create symlink %s file", concatPath(tacDir, fileName).c_str());
+ return TAC_ERROR_UNKNOWN;
+ }
+ _SOUT("%s symbolic link file generated successfully.", concatPath(tacDir, fileName).c_str());
copySmackAndOwnership(tacDir.c_str(), concatPath(tacDir, fileName).c_str(), true);
if (!removeFile(concatPath(binDir, fileName))) {
- fprintf(stderr, "Failed to remove of %s\n", concatPath(binDir, fileName).c_str());
+ _SERR("Failed to remove of %s", concatPath(binDir, fileName).c_str());
return TAC_ERROR_UNKNOWN;
}
}
}
if (enableNuget.empty()) {
if (!removeAll(tacDir)) {
- fprintf(stderr, "Failed to remove of %s\n", tacDir.c_str());
+ _SERR("Failed to remove of %s", tacDir.c_str());
}
}
enableNuget.clear();
}
} else {
- fprintf(stderr, "The metadata key is missing or the metadata value is false of [%s]\n", pkgId.c_str());
+ _SERR("The metadata key is missing or the metadata value is false of [%s]", pkgId.c_str());
}
return TAC_ERROR_NONE;
}
std::vector<std::string> depsJsonParser(const std::string& rootPath, const std::string& execName)
{
std::vector<std::string> parserData;
- std::string depsJsonName = execName.substr(0, execName.rfind(".dll")) + ".deps.json";
+ std::string depsJsonName = changeExtension(execName, "dll", "deps.json");
std::string depsJsonPath = concatPath(rootPath, depsJsonName);
try {
- if (bf::exists(depsJsonPath)) {
+ if (exist(depsJsonPath)) {
std::ifstream ifs(depsJsonPath);
Json::CharReaderBuilder reader;
Json::Value root;
std::vector<std::string> getLibrariesInfo(const std::string& rootPath)
{
std::vector<std::string> LibrariesInfo;
- std::vector<std::string> unusedDir;
- std::string runtimesDir = concatPath(rootPath, "bin/runtimes");
- if (!bf::exists(runtimesDir))
+ std::string binDir = concatPath(rootPath, "bin");
+ if (!exist(binDir))
return LibrariesInfo;
- char buffer[128];
- sprintf(buffer, "(tizen|linux|unix|base|any)(.\\d.\\d.\\d)?(-%s)?", ARCHITECTURE_IDENTIFIER);
- std::regex pattern(buffer);
-
- try {
- for (auto& path : bf::recursive_directory_iterator(runtimesDir)) {
- std::string filepath = path.path().string();
- std::size_t pos = filepath.rfind("/runtimes/");
- if (pos != std::string::npos) {
- std::string targetDir = filepath.substr(pos + 10);
- if (!std::regex_match(targetDir.substr(0, targetDir.find('/')), pattern)) {
- if (isDirectory(filepath))
- unusedDir.push_back(filepath);
- continue;
- }
- }
- if (filepath.rfind(".so") == std::string::npos)
- continue;
-
+ auto convert = [&LibrariesInfo](const std::string& filepath, const std::string& filename) {
+ if (filepath.rfind(".so") != std::string::npos) {
std::string buffer = SHA256(filepath);
LibrariesInfo.push_back(filepath + ":" + buffer);
- _INFO("Library : [%s] / SHA256 : [%s]", filepath.substr(filepath.rfind('/') + 1).c_str(), buffer.c_str());
- }
- } catch (const bf::filesystem_error& error) {
- _ERR("Failed to recursive directory: %s", error.what());
- }
-
- for (auto& path : unusedDir) {
- if (!removeAll(path)) {
- _ERR("Failed to remove of %s", path.c_str());
+ _INFO("Library : [%s] / SHA256 : [%s]", filename.c_str(), buffer.c_str());
}
- }
- unusedDir.clear();
+ };
+ scanFilesInDirectory(binDir, convert, -1);
return LibrariesInfo;
}
// callback function of "pkgmgrinfo_appinfo_metadata_filter_foreach"
-static int restoreTLCDBCb(pkgmgrinfo_appinfo_h handle, void *userData)
+static int tlc_restoreDBCb(pkgmgrinfo_appinfo_h handle, void *userData)
{
char *pkgId = NULL;
char *root = NULL;
int ret = pkgmgrinfo_appinfo_get_pkgid(handle, &pkgId);
if (ret != PMINFO_R_OK) {
- fprintf(stderr, "Failed to get pkgid\n");
+ _SERR("Failed to get pkgid");
return -1;
}
ret = pkgmgrinfo_appinfo_get_root_path(handle, &root);
if (ret != PMINFO_R_OK) {
- fprintf(stderr, "Failed to get root path\n");
+ _SERR("Failed to get root path");
return -1;
}
rootPath = std::string(root);
for (auto& librarySha : getLibrariesInfo(rootPath)) {
std::string library = librarySha.substr(0, librarySha.find(':'));
- if (bf::exists(library)) {
+ if (exist(library)) {
std::string fileSha = library.substr(library.rfind('/') + 1) + ".." + librarySha.substr(librarySha.find(':') + 1);
char *sql = sqlite3_mprintf("INSERT INTO TLC (PKGID, LIBRARY) VALUES (%Q, %Q);", pkgId, fileSha.c_str());
- dbInsert(tlc_db, TLC_APP_LIST_RESTORE_DB, sql);
+ insertDB(tlc_db, sql);
restore_library.push_back(fileSha);
sqlite3_free(sql);
}
return 0;
}
-tac_error_e restoreTLCDB()
+tac_error_e tlc_restoreDB()
{
if (!removeFile(TLC_APP_LIST_RESTORE_DB)) {
- fprintf(stderr, "Failed to remove of %s\n", TLC_APP_LIST_RESTORE_DB);
+ _SERR("Failed to remove of %s", TLC_APP_LIST_RESTORE_DB);
return TAC_ERROR_UNKNOWN;
}
std::string dbRestoreJournal = TLC_APP_LIST_RESTORE_DB + std::string("-journal");
if (!removeFile(dbRestoreJournal)) {
- fprintf(stderr, "Failed to remove of %s\n", dbRestoreJournal.c_str());
+ _SERR("Failed to remove of %s", dbRestoreJournal.c_str());
return TAC_ERROR_UNKNOWN;
}
- tlc_db = dbCreate(TLC_APP_LIST_RESTORE_DB, CREATE_TLC_DB_TABLE);
+ tlc_db = createDB(TLC_APP_LIST_RESTORE_DB, CREATE_TLC_DB_TABLE);
if (!tlc_db) {
- fprintf(stderr, "Sqlite create error\n");
+ _SERR("Sqlite create error");
return TAC_ERROR_UNKNOWN;
}
+ sqlite3_exec(tlc_db, "BEGIN;", NULL, NULL, NULL);
pkgmgrinfo_appinfo_metadata_filter_h handle;
int ret = pkgmgrinfo_appinfo_metadata_filter_create(&handle);
return TAC_ERROR_UNKNOWN;
}
- ret = pkgmgrinfo_appinfo_metadata_filter_add(handle, TAC_METADATA_KEY, METADATA_VALUE);
+ ret = pkgmgrinfo_appinfo_metadata_filter_add(handle, TAC_METADATA_KEY, METADATA_VALUE_TRUE);
if (ret != PMINFO_R_OK) {
pkgmgrinfo_appinfo_metadata_filter_destroy(handle);
return TAC_ERROR_UNKNOWN;
}
- ret = pkgmgrinfo_appinfo_metadata_filter_foreach(handle, restoreTLCDBCb, NULL);
- if (ret != PMINFO_R_OK) {
- fprintf(stderr, "Failed pkgmgrinfo_appinfo_metadata_filter_foreach\n");
+ ret = pkgmgrMDFilterForeach(handle, tlc_restoreDBCb, NULL);
+ if (ret != 0) {
pkgmgrinfo_appinfo_metadata_filter_destroy(handle);
return TAC_ERROR_UNKNOWN;
}
- fprintf(stdout, "Success pkgmgrinfo_appinfo_metadata_filter_foreach\n");
pkgmgrinfo_appinfo_metadata_filter_destroy(handle);
if (tlc_db) {
- dbClose(tlc_db);
+ closeDB(tlc_db);
tlc_db = NULL;
}
- const uid_t g_uid = 301; // app_fw
- const gid_t g_gid = 301; // app_fw
-
if (!copyFile(TLC_APP_LIST_RESTORE_DB, TLC_APP_LIST_DB)) {
- fprintf(stderr, "Failed to copy of %s\n", TLC_APP_LIST_DB);
+ _SERR("Failed to copy of %s", TLC_APP_LIST_DB);
return TAC_ERROR_UNKNOWN;
}
if (!removeFile(TLC_APP_LIST_RESTORE_DB)) {
- fprintf(stderr, "Failed to remove of %s\n", TLC_APP_LIST_RESTORE_DB);
+ _SERR("Failed to remove of %s", TLC_APP_LIST_RESTORE_DB);
return TAC_ERROR_UNKNOWN;
}
- if (chown(TLC_APP_LIST_DB, g_uid, g_gid) == -1) {
- fprintf(stderr, "Failed to change owner and group name\n");
- }
std::string dbJournal = TLC_APP_LIST_DB + std::string("-journal");
if (!copyFile(dbRestoreJournal, dbJournal)) {
- fprintf(stderr, "Failed to copy of %s\n", dbJournal.c_str());
+ _SERR("Failed to copy of %s", dbJournal.c_str());
return TAC_ERROR_UNKNOWN;
}
if (!removeFile(dbRestoreJournal)) {
- fprintf(stderr, "Failed to remove of %s\n", dbRestoreJournal.c_str());
+ _SERR("Failed to remove of %s", dbRestoreJournal.c_str());
return TAC_ERROR_UNKNOWN;
}
- if (chown(dbJournal.c_str(), g_uid, g_gid) == -1) {
- fprintf(stderr, "Failed to change owner and group name\n");
- }
auto convert = [](const std::string& path, const std::string& filename) {
bool isExist = false;