*/
#include <widget_uninstall/task_smack.h>
+#include <widget_uninstall/job_widget_uninstall.h>
#include <widget_uninstall/uninstaller_context.h>
#include <dpl/log/log.h>
#include <dpl/optional_typedefs.h>
LogInfo(
"------------------------> SMACK: Jobs::WidgetUninstall::TaskSmack::Step()");
#ifdef WRT_SMACK_ENABLED
- try {
- WrtDB::WidgetDAOReadOnly dao(m_context.widgetConfig.tzAppid);
- TizenAppId tzAppid = dao.getTizenAppId();
- const char *devCap = "";
- int result = handle_access_control_conf_forWAC(
- DPL::ToUTF8String(tzAppid).c_str(),
- NULL,
- OPERATION_UNINSTALL);
- Assert(result == PC_OPERATION_SUCCESS && "access control setup failed");
- } catch (WrtDB::WidgetDAOReadOnly::Exception) {
- Assert(false && "can't access widget data");
+ int result = app_revoke_permissions(m_context.tzPkgid.c_str());
+ if (PC_OPERATION_SUCCESS != result) {
+ LogError("Revoke permissions failure : " << result);
}
m_context.job->UpdateProgress(
- UninstallerContext::INSTALL_SMACK_ENABLE,
+ UninstallerContext::UNINSTALL_SMACK_ENABLE,
"Widget SMACK Enabled");
#endif
}