#include <sys/types.h>
#include <sys/wait.h>
#include <sys/stat.h>
-#include <dirent.h>
#include <sys/types.h>
-#include <fcntl.h>
+#include <sys/signalfd.h>
#include <signal.h>
+#include <grp.h>
+#include <fcntl.h>
#include <glib.h>
#include <gio/gio.h>
+#include <aul.h>
#include <pkgmgr-info.h>
#include <pkgmgr/pkgmgr_parser_db.h>
#include <tzplatform_config.h>
#include <drm-tizen-apps.h>
+#ifdef TIZEN_FEATURE_CSR
+#include <csr-content-screening.h>
+#endif
#include "pkgmgr_installer.h"
#include "pkgmgr-server.h"
-#include "pm-queue.h"
+#include "queue.h"
#include "package-manager.h"
-#define BUFMAX 128
-#define NO_MATCHING_FILE 11
-
#define OWNER_ROOT 0
#define GLOBAL_USER tzplatform_getuid(TZ_SYS_GLOBALAPP_USER)
+#define APPFW_UID 301
+
+
+#define EXT_STORAGE_GROUP 10001
+#define EXT_STORAGE_APPDATA_GROUP 10002
+#define MEDIA_STORAGE_GROUP 10502
+#define ARRAY_SIZE(array) (sizeof(array) / sizeof(array[0]))
+#define MAX_LONGLONG_LENGTH 32
typedef struct {
char **env;
gid_t gid;
} user_ctx;
+typedef struct {
+ uid_t uid;
+ char *cmd;
+ int pid;
+} pkgcmd_data;
/*
8 bit value to represent maximum 8 backends.
Each bit position corresponds to a queue slot which
is dynamically determined.
*/
-char backend_busy = 0;
+static char backend_busy = 0;
extern int num_of_backends;
-struct signal_info_t {
- pid_t pid;
- int status;
-};
-
-static int pipe_sig[2];
-static GIOChannel *pipe_io;
-static guint pipe_wid;
-
-backend_info *begin;
-extern queue_info_map *start;
-extern int entries;
-
-GMainLoop *mainloop = NULL;
-
-
-/* operation_type */
-typedef enum {
- OPERATION_INSTALL = 0,
- OPERATION_UNINSTALL,
- OPERATION_ACTIVATE,
- OPERATION_REINSTALL,
- OPERATION_MAX
-} OPERATION_TYPE;
+static GIOChannel *sio;
+static guint swid;
+static GHashTable *backend_info_table;
+static GMainLoop *mainloop;
static int __check_backend_status_for_exit(void);
static int __check_queue_status_for_exit(void);
static int __is_backend_busy(int position);
static void __set_backend_busy(int position);
static void __set_backend_free(int position);
-static void sighandler(int signo);
gboolean exit_server(void *data);
-/* To check whether a particular backend is free/busy*/
+/* To check whether a particular backend is free/busy */
static int __is_backend_busy(int position)
{
- return backend_busy & 1<<position;
+ return backend_busy & (1 << position);
}
-/*To set a particular backend as busy*/
+/* To set a particular backend as busy */
static void __set_backend_busy(int position)
{
- backend_busy = backend_busy | 1<<position;
+ backend_busy = backend_busy | (1 << position);
}
-/*To set a particular backend as free */
+/* To set a particular backend as free */
static void __set_backend_free(int position)
{
- backend_busy = backend_busy & ~(1<<position);
-}
-
-static int __is_global(uid_t uid)
-{
- return (uid == OWNER_ROOT || uid == GLOBAL_USER) ? 1 : 0;
-}
-
-static const char *__get_recovery_file_path(uid_t uid)
-{
- const char *path;
-
- if (!__is_global(uid))
- tzplatform_set_user(uid);
-
- path = tzplatform_getenv(__is_global(uid)
- ? TZ_SYS_RW_PACKAGES : TZ_USER_PACKAGES);
-
- tzplatform_reset_user();
-
- return path;
+ backend_busy = backend_busy & ~(1 << position);
}
-static void __set_recovery_mode(uid_t uid, char *pkgid, char *pkg_type)
+static gboolean getsize_io_handler(GIOChannel *io, GIOCondition cond,
+ gpointer data)
{
- char recovery_file[MAX_PKG_NAME_LEN] = { 0, };
- char buffer[MAX_PKG_NAME_LEN] = { 0 };
- char *pkgid_tmp = NULL;
- FILE *rev_file = NULL;
-
- if (pkgid == NULL) {
- DBG("pkgid is null\n");
- return;
- }
+ GError *err = NULL;
+ GIOStatus s;
+ gsize len;
+ char buf[MAX_LONGLONG_LENGTH];
+ long long result = 0;
+ struct backend_job *job = (struct backend_job *)data;
- /*if pkgid has a "/"charactor, that is a path name for installation, then extract pkgid from absolute path*/
- if (strstr(pkgid, "/")) {
- pkgid_tmp = strrchr(pkgid, '/') + 1;
- if (pkgid_tmp == NULL) {
- DBG("pkgid_tmp[%s] is null\n", pkgid);
- return;
- }
- snprintf(recovery_file, sizeof(recovery_file), "%s/%s", __get_recovery_file_path(uid), pkgid_tmp);
+ s = g_io_channel_read_chars(io, (gchar *)buf, sizeof(buf), &len, &err);
+ if (s != G_IO_STATUS_NORMAL) {
+ ERR("getsize fd read failed: %s", err->message);
+ g_error_free(err);
+ result = -1;
} else {
- snprintf(recovery_file, sizeof(recovery_file), "%s/%s", __get_recovery_file_path(uid), pkgid);
- }
-
- rev_file = fopen(recovery_file, "w");
- if (rev_file== NULL) {
- DBG("rev_file[%s] is null\n", recovery_file);
- return;
+ if (strlen(buf) == 0) {
+ ERR("empty result");
+ result = -1;
+ } else {
+ result = atoll(buf);
+ }
}
- snprintf(buffer, MAX_PKG_NAME_LEN, "pkgid : %s\n", pkgid);
- fwrite(buffer, sizeof(char), strlen(buffer), rev_file);
+ _return_value_to_caller(job->req_id, g_variant_new("(ix)",
+ (result < 0) ? PKGMGR_R_ERROR : PKGMGR_R_OK, result));
- fclose(rev_file);
-}
-
-static void __unset_recovery_mode(uid_t uid, char *pkgid, char *pkg_type)
-{
- int ret = -1;
- char recovery_file[MAX_PKG_NAME_LEN] = { 0, };
- char *pkgid_tmp = NULL;
+ unlink(job->extra->getsize_fifo);
+ free(job->extra->getsize_fifo);
+ job->extra->getsize_fifo = NULL;
- if (pkgid == NULL) {
- DBG("pkgid is null\n");
- return;
- }
-
- /*if pkgid has a "/"charactor, that is a path name for installation, then extract pkgid from absolute path*/
- if (strstr(pkgid, "/")) {
- pkgid_tmp = strrchr(pkgid, '/') + 1;
- if (pkgid_tmp == NULL) {
- DBG("pkgid_tmp[%s] is null\n", pkgid);
- return;
- }
- snprintf(recovery_file, sizeof(recovery_file), "%s/%s", __get_recovery_file_path(uid), pkgid_tmp);
- } else {
- snprintf(recovery_file, sizeof(recovery_file), "%s/%s", __get_recovery_file_path(uid), pkgid);
- }
-
- ret = remove(recovery_file);
- if (ret < 0)
- DBG("remove recovery_file[%s] fail\n", recovery_file);
+ return FALSE;
}
-static void __send_app_signal(uid_t uid, const char *req_id,
- const char *pkgid, const char *appid,
- const char *key, const char *val, int req_type)
+static int __setup_size_info_io(struct backend_job *job)
{
- pkgmgr_installer *pi;
-
- pi = pkgmgr_installer_new();
- if (!pi) {
- DBG("Failure in creating the pkgmgr_installer object");
- return;
- }
+ guint getsize_wid;
- if (pkgmgr_installer_set_uid(pi, uid))
- goto catch;
- if (req_type == PKGMGR_REQUEST_TYPE_ENABLE_GLOBAL_APP_FOR_UID
- || req_type == PKGMGR_REQUEST_TYPE_ENABLE_APP) {
- if (pkgmgr_installer_set_request_type(pi, PKGMGR_REQ_ENABLE_APP))
- goto catch;
- } else if (req_type == PKGMGR_REQUEST_TYPE_DISABLE_GLOBAL_APP_FOR_UID
- || req_type == PKGMGR_REQUEST_TYPE_DISABLE_APP) {
- if (pkgmgr_installer_set_request_type(pi, PKGMGR_REQ_DISABLE_APP))
- goto catch;
- } else {
- DBG("Unsupported req_type[%d]", req_type);
- goto catch;
+ job->extra->getsize_fd = open(job->extra->getsize_fifo,
+ O_RDONLY | O_NONBLOCK);
+ if (job->extra->getsize_fd < 0) {
+ ERR("failed to open the fifo(%s), errno(%d)",
+ job->extra->getsize_fifo, errno);
+ return -1;
}
- if (pkgmgr_installer_set_session_id(pi, req_id))
- goto catch;
- pkgmgr_installer_send_app_signal(pi, "app", pkgid, appid, key, val);
-
-catch:
- pkgmgr_installer_free(pi);
-
- return;
-}
-
-static void send_fail_signal(char *pname, char *ptype, char *args)
-{
- DBG("send_fail_signal start\n");
- gboolean ret_parse;
- gint argcp;
- gchar **argvp;
- GError *gerr = NULL;
- pkgmgr_installer *pi;
- pi = pkgmgr_installer_new();
- if (!pi) {
- DBG("Failure in creating the pkgmgr_installer object");
- return;
- }
- ret_parse = g_shell_parse_argv(args,
- &argcp, &argvp, &gerr);
- if (FALSE == ret_parse) {
- DBG("Failed to split args: %s", args);
- DBG("messsage: %s", gerr->message);
- pkgmgr_installer_free(pi);
- return;
+ job->extra->getsize_io = g_io_channel_unix_new(job->extra->getsize_fd);
+ if (!job->extra->getsize_io)
+ return -1;
+ g_io_channel_set_encoding(job->extra->getsize_io, NULL, NULL);
+ g_io_channel_set_buffered(job->extra->getsize_io, FALSE);
+ getsize_wid = g_io_add_watch(job->extra->getsize_io,
+ G_IO_IN, getsize_io_handler, job);
+ if (!getsize_wid) {
+ ERR("failed to add io watch");
+ return -1;
}
- pkgmgr_installer_receive_request(pi, argcp, argvp);
- pkgmgr_installer_send_signal(pi, ptype, pname, "end", "fail");
- pkgmgr_installer_free(pi);
- return;
+ return 0;
}
-static gboolean pipe_io_handler(GIOChannel *io, GIOCondition cond, gpointer data)
+static gboolean __signal_handler(GIOChannel *io, GIOCondition cond,
+ gpointer data)
{
- int x;
GError *err = NULL;
GIOStatus s;
gsize len;
- struct signal_info_t info;
- backend_info *ptr = begin;
+ struct signalfd_siginfo fdsi;
+ struct backend_job *job;
+ pid_t pid;
+ int status;
- s = g_io_channel_read_chars(io, (gchar *)&info, sizeof(struct signal_info_t), &len, &err);
- if (s != G_IO_STATUS_NORMAL) {
- ERR("Signal pipe read failed: %s", err->message);
+ s = g_io_channel_read_chars(io, (gchar *)&fdsi,
+ sizeof(struct signalfd_siginfo), &len, &err);
+ if (s != G_IO_STATUS_NORMAL || len != sizeof(struct signalfd_siginfo)) {
+ ERR("Signal read failed");
g_error_free(err);
return TRUE;
}
- for (x = 0; x < num_of_backends; x++, ptr++) {
- if (ptr && ptr->pid == info.pid)
- break;
- }
-
- if (x == num_of_backends) {
+ pid = waitpid(-1, &status, WNOHANG);
+ job = (struct backend_job *)g_hash_table_lookup(backend_info_table,
+ (gconstpointer)pid);
+ if (job == NULL) {
ERR("Unknown child exit");
return -1;
}
- __set_backend_free(x);
- __unset_recovery_mode(ptr->uid, ptr->pkgid, ptr->pkgtype);
- if (WIFSIGNALED(info.status) || WEXITSTATUS(info.status)) {
- send_fail_signal(ptr->pkgid, ptr->pkgtype, ptr->args);
- DBG("backend[%s] exit with error", ptr->pkgtype);
+ __set_backend_free(job->backend_slot);
+ if (WIFSIGNALED(status)) {
+ _send_fail_signal(job);
+ INFO("backend[%s][%d] exit with signal[%d]", job->backend_type,
+ pid, WTERMSIG(status));
+ } else if (WEXITSTATUS(status)) {
+ INFO("backend[%s][%d] exit with error", job->backend_type, pid);
} else {
- DBG("backend[%s] exit", ptr->pkgtype);
+ INFO("backend[%s][%d] exit", job->backend_type, pid);
}
+ if (job->extra) {
+ if (job->extra->getsize_fifo) {
+ ERR("invalid backend close");
+ _return_value_to_caller(job->req_id,
+ g_variant_new("(ix)", PKGMGR_R_ERROR, -1));
+ }
+ }
+
+ g_hash_table_remove(backend_info_table, (gconstpointer)pid);
g_idle_add(queue_job, NULL);
return TRUE;
static int __init_backend_info(void)
{
- backend_info *ptr;
-
- /*Allocate memory for holding pid, pkgtype and pkgid*/
- ptr = (backend_info*)calloc(num_of_backends, sizeof(backend_info));
- if (ptr == NULL) {
- DBG("Malloc Failed\n");
- return -1;
- }
- begin = ptr;
-
- if (pipe(pipe_sig)) {
- ERR("create pipe failed");
- return -1;
- }
-
- pipe_io = g_io_channel_unix_new(pipe_sig[0]);
- g_io_channel_set_encoding(pipe_io, NULL, NULL);
- g_io_channel_set_buffered(pipe_io, FALSE);
- pipe_wid = g_io_add_watch(pipe_io, G_IO_IN, pipe_io_handler, NULL);
+ backend_info_table = g_hash_table_new_full(g_direct_hash,
+ g_direct_equal, NULL,
+ (GDestroyNotify)_free_backend_job);
return 0;
}
static void __fini_backend_info(void)
{
- g_source_remove(pipe_wid);
- g_io_channel_unref(pipe_io);
- close(pipe_sig[0]);
- close(pipe_sig[1]);
-
/*Free backend info */
- free(begin);
-}
-
-static void sighandler(int signo)
-{
- struct signal_info_t info;
- char buf[1024] = {0, };
-
- info.pid = waitpid(-1, &info.status, WNOHANG);
- if (write(pipe_sig[1], &info, sizeof(struct signal_info_t)) < 0)
- ERR("failed to write result: %s", strerror_r(errno, buf, sizeof(buf)));
+ g_hash_table_destroy(backend_info_table);
}
static int __register_signal_handler(void)
{
- static int sig_reg = 0;
- struct sigaction act;
+ sigset_t mask;
+ int sfd;
- if (sig_reg)
- return 0;
+ sigemptyset(&mask);
+ sigaddset(&mask, SIGCHLD);
- act.sa_handler = sighandler;
- sigemptyset(&act.sa_mask);
- act.sa_flags = SA_NOCLDSTOP;
- if (sigaction(SIGCHLD, &act, NULL) < 0) {
- ERR("signal: SIGCHLD failed\n");
+ if (sigprocmask(SIG_BLOCK, &mask, NULL) == -1) {
+ ERR("sigprocmask failed");
return -1;
}
+ sfd = signalfd(-1, &mask, SFD_NONBLOCK);
+ if (sfd == -1) {
+ ERR("signalfd failed");
+ return -1;
+ }
+
+ sio = g_io_channel_unix_new(sfd);
+ g_io_channel_set_close_on_unref(sio, TRUE);
+ g_io_channel_set_encoding(sio, NULL, NULL);
+ g_io_channel_set_buffered(sio, FALSE);
+ swid = g_io_add_watch(sio, G_IO_IN, __signal_handler, NULL);
+
g_timeout_add_seconds(2, exit_server, NULL);
- sig_reg = 1;
return 0;
}
static int __check_backend_status_for_exit(void)
{
- int i = 0;
- for(i = 0; i < num_of_backends; i++)
- {
- if (!__is_backend_busy(i))
- continue;
- else
+ int i;
+ for (i = 0; i < num_of_backends; i++) {
+ if (__is_backend_busy(i))
return 0;
}
return 1;
static int __check_queue_status_for_exit(void)
{
- pm_queue_data *head[MAX_QUEUE_NUM] = {NULL,};
- queue_info_map *ptr = NULL;
- ptr = start;
- int i = 0;
- int c = 0;
- int slot = -1;
- for(i = 0; i < entries; i++)
- {
- if (ptr->queue_slot <= slot) {
- ptr++;
- continue;
- }
- else {
- head[c] = ptr->head;
- slot = ptr->queue_slot;
- c++;
- ptr++;
- }
- }
- for(i = 0; i < num_of_backends; i++)
- {
- if (!head[i])
- continue;
- else
+ int i;
+ for (i = 0; i < num_of_backends; i++) {
+ if (_is_queue_empty(i) == 0)
return 0;
}
return 1;
gboolean exit_server(void *data)
{
- DBG("exit_server Start\n");
+ DBG("exit_server Start");
if (__check_backend_status_for_exit() &&
__check_queue_status_for_exit()) {
- if (!getenv("PMS_STANDALONE")) {
- g_main_loop_quit(mainloop);
- return FALSE;
- }
+ g_main_loop_quit(mainloop);
+ return FALSE;
}
return TRUE;
}
-static int __pkgcmd_read_proc(const char *path, char *buf, int size)
-{
- int fd;
- int ret;
- if (buf == NULL || path == NULL)
- return -1;
- fd = open(path, O_RDONLY);
- if (fd < 0)
- return -1;
- ret = read(fd, buf, size - 1);
- if (ret <= 0) {
- close(fd);
- return -1;
- } else
- buf[ret] = 0;
- close(fd);
- return ret;
-}
-
-static int __pkgcmd_find_pid_by_cmdline(const char *dname,
- const char *cmdline, const char *apppath)
-{
- int pid = 0;
-
- if (strcmp(cmdline, apppath) == 0) {
- pid = atoi(dname);
- if (pid != getpgid(pid))
- pid = 0;
- }
- return pid;
-}
-
-static int __pkgcmd_proc_iter_kill_cmdline(const char *apppath, int option)
+#ifdef TIZEN_FEATURE_CSR
+static int __check_csr(const char *path)
{
- DIR *dp;
- struct dirent dentry, *result;
- int pid;
- int ret;
- char buf[1024] = {'\0'};
- int pgid;
+ csr_cs_context_h context = NULL;
+ csr_cs_malware_h detected = NULL;
+ int ret = -1;
- dp = opendir("/proc");
- if (dp == NULL) {
+ ret = csr_cs_context_create(&context);
+ if (ret != CSR_ERROR_NONE) {
+ ERR("Failed to create csr context");
return -1;
}
- for (ret = readdir_r(dp, &dentry, &result);
- ret == 0 && result != NULL;
- ret = readdir_r(dp, &dentry, &result)) {
- if (!isdigit(dentry.d_name[0]))
- continue;
-
- snprintf(buf, sizeof(buf), "/proc/%s/cmdline", dentry.d_name);
- ret = __pkgcmd_read_proc(buf, buf, sizeof(buf));
- if (ret <= 0)
- continue;
+ if (context) {
+ ret = csr_cs_scan_file(context, path, &detected);
+ DBG("CSR result[%d]", ret);
- pid = __pkgcmd_find_pid_by_cmdline(dentry.d_name, buf, apppath);
- if (pid > 0) {
- if (option == 0) {
- closedir(dp);
- return pid;
- }
- pgid = getpgid(pid);
- if (pgid <= 1) {
- closedir(dp);
- return -1;
- }
- if (killpg(pgid, SIGKILL) < 0) {
- closedir(dp);
- return -1;
- }
- closedir(dp);
- return pid;
+ csr_cs_context_destroy(context);
+ if (detected != NULL) {
+ ERR("CSR Denied[%s] Installation", path);
+ return -1;
}
}
- closedir(dp);
+
return 0;
}
+#endif
-static void __make_pid_info_file(char *req_key, int pid)
+static int __kill_app(char *appid, uid_t uid)
{
- FILE* file;
- int fd;
- char buf[MAX_PKG_TYPE_LEN] = {0};
- char info_file[PATH_MAX] = {'\0'};
+ int ret;
+ int pid;
+ int is_running;
- if(req_key == NULL)
- return;
+ is_running = aul_app_is_running_for_uid(appid, uid);
+ /* app is not running */
+ if (!is_running)
+ return 0;
- snprintf(info_file, PATH_MAX, "/tmp/pkgmgr/%s", req_key);
+ pid = aul_app_get_pid_for_uid(appid, uid);
+ if (pid == -1)
+ return -1;
- DBG("info_path(%s)", info_file);
- file = fopen(info_file, "w");
- if (file == NULL) {
- ERR("Couldn't open the file(%s)", info_file);
- return;
+ ret = aul_terminate_pid_for_uid(pid, uid);
+ if (ret != AUL_R_OK) {
+ ERR("failed to terminate app(%d)", appid);
+ return -1;
}
- snprintf(buf, MAX_PKG_TYPE_LEN, "%d\n", pid);
- fwrite(buf, 1, strlen(buf), file);
-
- fflush(file);
- fd = fileno(file);
- fsync(fd);
- fclose(file);
+ return 0;
}
-static int __kill_app(char *appid, uid_t uid)
+static int __check_app(char *appid, uid_t uid)
{
- pkgmgrinfo_appinfo_h appinfo;
- int ret = PMINFO_R_ERROR;
- char *exec = NULL;
-
- ret = pkgmgrinfo_appinfo_get_usr_appinfo(appid, uid, &appinfo);
- if (ret != PMINFO_R_OK)
- return PMINFO_R_ERROR;
+ int pid;
+ int is_running;
- ret = pkgmgrinfo_appinfo_get_exec(appinfo, &exec);
- if (ret != PMINFO_R_OK) {
- pkgmgrinfo_appinfo_destroy_appinfo(appinfo);
- return PMINFO_R_ERROR;
- }
+ is_running = aul_app_is_running_for_uid(appid, uid);
+ if (!is_running)
+ return 0;
- ret = __pkgcmd_proc_iter_kill_cmdline(exec, 1);
- if (ret != PMINFO_R_OK) {
- DBG("failed to kill app[%s], exec[%s]", appid, exec);
- }
+ pid = aul_app_get_pid_for_uid(appid, uid);
- pkgmgrinfo_appinfo_destroy_appinfo(appinfo);
- return ret;
+ return pid;
}
static int __pkgcmd_app_cb(const pkgmgrinfo_appinfo_h handle, void *user_data)
{
char *pkgid;
+ char *appid;
char *exec;
int ret;
- int pid = -1;
+ pkgcmd_data *pdata = (pkgcmd_data *)user_data;
if (handle == NULL) {
perror("appinfo handle is NULL\n");
perror("Failed to get app exec path\n");
exit(1);
}
+ ret = pkgmgrinfo_appinfo_get_appid(handle, &appid);
+ if (ret) {
+ perror("Failed to get appid\n");
+ exit(1);
+ }
ret = pkgmgrinfo_appinfo_get_pkgid(handle, &pkgid);
if (ret) {
perror("Failed to get pkgid\n");
exit(1);
}
- if (strcmp(user_data, "kill") == 0)
- pid = __pkgcmd_proc_iter_kill_cmdline(exec, 1);
- else if(strcmp(user_data, "check") == 0)
- pid = __pkgcmd_proc_iter_kill_cmdline(exec, 0);
-
- __make_pid_info_file(pkgid, pid);
+ if (strcmp(pdata->cmd, "kill") == 0) {
+ pdata->pid = __check_app(appid, pdata->uid);
+ if (pdata->pid > 0)
+ ret = __kill_app(appid, pdata->uid);
+ } else if (strcmp(pdata->cmd, "check") == 0) {
+ pdata->pid = __check_app(appid, pdata->uid);
+ }
return 0;
}
-void free_user_context(user_ctx* ctx)
+void free_user_context(user_ctx *ctx)
{
char **env = NULL;
int i = 0;
if (!ctx)
return;
env = ctx->env;
- //env variable ends by NULL element
+ /* env variable ends by NULL element */
while (env[i]) {
free(env[i]);
i++;
int i = 0;
int res = 0;
char **env = NULL;
+ int n;
+ gid_t *groups;
+
if (!ctx)
- return -1;;
- if (setgid(ctx->gid)) {
- ERR("setgid failed: %d", errno);
+ return -1;
+
+ if (ctx->uid != APPFW_UID) {
+ if (setuid(ctx->uid)) {
+ ERR("setuid failed: %d", errno);
+ return -1;
+ }
+
+ if (setgid(ctx->gid)) {
+ ERR("setgid failed: %d", errno);
+ return -1;
+ }
+ }
+
+ n = getgroups(0, NULL);
+ if (n < 0) {
+ ERR("Failed to get the number of supplementary group IDs");
return -1;
}
- if (setuid(ctx->uid)) {
- ERR("setuid failed: %d", errno);
+
+ groups = (gid_t *)calloc(1, sizeof(gid_t) * (n + 3));
+ if (groups == NULL) {
+ ERR("out of memory");
return -1;
}
+
+ n = getgroups(n, groups);
+ if (n < 0) {
+ ERR("Failed to get list of supplementary group IDs");
+ free(groups);
+ return -1;
+ }
+
+ groups[n++] = EXT_STORAGE_GROUP;
+ groups[n++] = EXT_STORAGE_APPDATA_GROUP;
+ groups[n++] = MEDIA_STORAGE_GROUP;
+
+ if (setgroups(n, groups) < 0) {
+ ERR("setgroups failed: %d", errno);
+ free(groups);
+ return -1;
+ }
+ free(groups);
+
env = ctx->env;
- //env variable ends by NULL element
+ /* env variable ends by NULL element */
while (env[i]) {
if (putenv(env[i]) != 0)
res = -1;
ret = -1;
break;
}
- // Build environment context
+ /* Build environment context */
len = snprintf(NULL, 0, "HOME=%s", pwd.pw_dir);
env[0] = (char *)malloc((len + 1) * sizeof(char));
- if(env[0] == NULL) {
+ if (env[0] == NULL) {
ret = -1;
break;
}
snprintf(env[0], len + 1, "HOME=%s", pwd.pw_dir);
len = snprintf(NULL, 0, "USER=%s", pwd.pw_name);
env[1] = (char *)malloc((len + 1) * sizeof(char));
- if(env[1] == NULL) {
+ if (env[1] == NULL) {
ret = -1;
break;
}
free(context_res);
context_res = NULL;
i = 0;
- //env variable ends by NULL element
+ /* env variable ends by NULL element */
while (env && env[i]) {
free(env[i]);
i++;
ret_parse = g_shell_parse_argv(args, &argcp, &argvp, &gerr);
if (FALSE == ret_parse) {
- DBG("Failed to split args: %s", args);
- DBG("messsage: %s", gerr->message);
+ ERR("Failed to split args: %s", args);
+ ERR("messsage: %s", gerr->message);
exit(1);
}
user_ctx *ctx = (user_ctx *)user_data;
if (set_environement(ctx))
- DBG("Failed to set env for the user : %d", ctx->uid);
+ ERR("Failed to set env for the user : %d", ctx->uid);
}
static int __fork_and_exec_with_args(char **argv, uid_t uid)
{
- user_ctx* user_context;
+ user_ctx *user_context;
GError *error = NULL;
gboolean ret;
int pid;
user_context = get_user_context(uid);
if (!user_context) {
- DBG("Failed to getenv for the user : %d", uid);
+ ERR("Failed to getenv");
return -1;
}
if (ret != TRUE) {
ERR("Failed to excute backend: %s", error->message);
g_error_free(error);
+ free_user_context(user_context);
+ return -1;
}
free_user_context(user_context);
return pid;
}
-static int __change_item_info(pm_dbus_msg *item, uid_t uid)
+static int __change_job_info(struct backend_job *job, uid_t uid,
+ bool *is_global)
{
int ret = 0;
char *pkgid = NULL;
- bool is_global = false;
pkgmgrinfo_appinfo_h handle = NULL;
-
- switch (item->req_type) {
- case PKGMGR_REQUEST_TYPE_DISABLE_APP:
- case PKGMGR_REQUEST_TYPE_DISABLE_GLOBAL_APP_FOR_UID:
- ret = pkgmgrinfo_appinfo_get_usr_appinfo(item->pkgid, uid, &handle);
- break;
-
- case PKGMGR_REQUEST_TYPE_ENABLE_APP:
- case PKGMGR_REQUEST_TYPE_ENABLE_GLOBAL_APP_FOR_UID:
- ret = pkgmgrinfo_appinfo_get_usr_disabled_appinfo(item->pkgid, uid, &handle);
- break;
-
- default:
+ if (job->req_type != REQUEST_TYPE_DISABLE_APP &&
+ job->req_type != REQUEST_TYPE_DISABLE_GLOBAL_APP_FOR_UID &&
+ job->req_type != REQUEST_TYPE_ENABLE_APP_SPLASH_SCREEN &&
+ job->req_type != REQUEST_TYPE_DISABLE_APP_SPLASH_SCREEN &&
+ job->req_type != REQUEST_TYPE_ENABLE_APP &&
+ job->req_type != REQUEST_TYPE_ENABLE_GLOBAL_APP_FOR_UID)
return PMINFO_R_ERROR;
- }
+ ret = pkgmgrinfo_appinfo_get_usr_all_appinfo(job->pkgid, uid, &handle);
if (ret != PMINFO_R_OK)
return PMINFO_R_ERROR;
- ret = pkgmgrinfo_appinfo_is_global(handle, &is_global);
+ ret = pkgmgrinfo_appinfo_is_global(handle, is_global);
if (ret != PMINFO_R_OK)
goto catch;
- if ((item->req_type == PKGMGR_REQUEST_TYPE_DISABLE_APP
- || item->req_type == PKGMGR_REQUEST_TYPE_ENABLE_APP)
- && is_global) {
- ret = PMINFO_R_ERROR;
- goto catch;
- } else if ((item->req_type == PKGMGR_REQUEST_TYPE_DISABLE_GLOBAL_APP_FOR_UID
- || item->req_type == PKGMGR_REQUEST_TYPE_ENABLE_GLOBAL_APP_FOR_UID)
- && !is_global) {
- ret = PMINFO_R_ERROR;
- goto catch;
+ if ((job->req_type == REQUEST_TYPE_DISABLE_GLOBAL_APP_FOR_UID ||
+ job->req_type ==
+ REQUEST_TYPE_ENABLE_GLOBAL_APP_FOR_UID) &&
+ !*is_global) {
+ ret = PMINFO_R_ERROR;
+ goto catch;
}
ret = pkgmgrinfo_appinfo_get_pkgid(handle, &pkgid);
if (ret != PMINFO_R_OK)
goto catch;
- strncpy(item->appid, item->pkgid, sizeof(item->pkgid) - 1);
- memset((item->pkgid),0,MAX_PKG_NAME_LEN);
- strncpy(item->pkgid, pkgid, sizeof(item->pkgid) - 1);
+ free(job->appid);
+ job->appid = strdup(job->pkgid);
+ free(job->pkgid);
+ job->pkgid = strdup(pkgid);
catch:
pkgmgrinfo_appinfo_destroy_appinfo(handle);
return ret;
}
-static int __process_install(pm_dbus_msg *item)
+static int __process_install(struct backend_job *job)
+{
+ char *backend_cmd;
+ char **argv;
+ char args[MAX_PKG_ARGS_LEN];
+ gchar *req_id;
+ gchar *pkgid;
+ int pid;
+
+ backend_cmd = job->backend_path;
+ if (backend_cmd == NULL)
+ return -1;
+
+ req_id = g_shell_quote(job->req_id);
+ pkgid = g_shell_quote(job->pkgid);
+ if (!req_id || !pkgid)
+ return -1;
+
+ snprintf(args, sizeof(args), "%s -k %s -i %s -u %d %s", backend_cmd,
+ req_id, pkgid, (int)job->target_uid, job->args);
+
+ argv = __generate_argv(args);
+
+ pid = __fork_and_exec_with_args(argv, APPFW_UID);
+ g_strfreev(argv);
+ g_free(req_id);
+ g_free(pkgid);
+
+ return pid;
+}
+
+static int __process_mount_install(struct backend_job *job)
{
char *backend_cmd;
char **argv;
- char args[MAX_PKG_ARGS_LEN] = {'\0', };
+ char args[MAX_PKG_ARGS_LEN];
+ gchar *req_id;
+ gchar *pkgid;
int pid;
- backend_cmd = _get_backend_cmd(item->pkg_type);
+ backend_cmd = job->backend_path;
if (backend_cmd == NULL)
return -1;
- snprintf(args, sizeof(args), "%s -k %s -i %s %s", backend_cmd,
- item->req_id, item->pkgid, item->args);
+ req_id = g_shell_quote(job->req_id);
+ pkgid = g_shell_quote(job->pkgid);
+ if (!req_id || !pkgid)
+ return -1;
+
+ snprintf(args, sizeof(args), "%s -k %s -w %s -u %d %s", backend_cmd,
+ req_id, pkgid, (int)job->target_uid, job->args);
argv = __generate_argv(args);
- pid = __fork_and_exec_with_args(argv, item->uid);
+ pid = __fork_and_exec_with_args(argv, APPFW_UID);
g_strfreev(argv);
- free(backend_cmd);
+ g_free(req_id);
+ g_free(pkgid);
return pid;
}
-static int __process_reinstall(pm_dbus_msg *item)
+static int __process_reinstall(struct backend_job *job)
{
char *backend_cmd;
char **argv;
char args[MAX_PKG_ARGS_LEN];
+ gchar *req_id;
+ gchar *pkgid;
int pid;
- backend_cmd = _get_backend_cmd(item->pkg_type);
+ backend_cmd = job->backend_path;
if (backend_cmd == NULL)
return -1;
- snprintf(args, sizeof(args), "%s -k %s -r %s", backend_cmd,
- item->req_id, item->pkgid);
+ req_id = g_shell_quote(job->req_id);
+ pkgid = g_shell_quote(job->pkgid);
+ if (!req_id || !pkgid)
+ return -1;
+
+ snprintf(args, sizeof(args), "%s -k %s -r %s -u %d", backend_cmd,
+ req_id, pkgid, (int)job->target_uid);
argv = __generate_argv(args);
- pid = __fork_and_exec_with_args(argv, item->uid);
+ pid = __fork_and_exec_with_args(argv, APPFW_UID);
g_strfreev(argv);
- free(backend_cmd);
+ g_free(req_id);
+ g_free(pkgid);
return pid;
}
-static int __process_uninstall(pm_dbus_msg *item)
+static int __process_uninstall(struct backend_job *job)
{
char *backend_cmd;
char **argv;
char args[MAX_PKG_ARGS_LEN];
int pid;
- backend_cmd = _get_backend_cmd(item->pkg_type);
+ backend_cmd = job->backend_path;
if (backend_cmd == NULL)
return -1;
- snprintf(args, sizeof(args), "%s -k %s -d %s", backend_cmd,
- item->req_id, item->pkgid);
+ snprintf(args, sizeof(args), "%s -k %s -d %s -u %d", backend_cmd,
+ job->req_id, job->pkgid, (int)job->target_uid);
argv = __generate_argv(args);
- pid = __fork_and_exec_with_args(argv, item->uid);
+ pid = __fork_and_exec_with_args(argv, APPFW_UID);
g_strfreev(argv);
- free(backend_cmd);
return pid;
}
-static int __process_move(pm_dbus_msg *item)
+static int __process_move(struct backend_job *job)
{
char *backend_cmd;
char **argv;
char args[MAX_PKG_ARGS_LEN];
int pid;
- backend_cmd = _get_backend_cmd(item->pkg_type);
+ backend_cmd = job->backend_path;
if (backend_cmd == NULL)
return -1;
- /* TODO: set movetype */
- snprintf(args, sizeof(args), "%s -k %s -m %s -t %s", backend_cmd,
- item->req_id, item->pkgid, item->args);
+ snprintf(args, sizeof(args), "%s -k %s -m %s -u %d -t %s", backend_cmd,
+ job->req_id, job->pkgid, (int)job->target_uid, job->args);
argv = __generate_argv(args);
- pid = __fork_and_exec_with_args(argv, item->uid);
+ pid = __fork_and_exec_with_args(argv, APPFW_UID);
g_strfreev(argv);
- free(backend_cmd);
return pid;
}
-static int __process_enable_pkg(pm_dbus_msg *item)
+static int __process_enable_pkg(struct backend_job *job)
{
- /* TODO */
- return 0;
+ char *backend_cmd;
+ char **argv;
+ char args[MAX_PKG_ARGS_LEN];
+ pkgmgrinfo_pkginfo_h pkginfo_h;
+ bool is_readonly;
+ bool is_global;
+ int ret;
+ int pid;
+
+ backend_cmd = job->backend_path;
+ if (backend_cmd == NULL)
+ return -1;
+
+ ret = pkgmgrinfo_pkginfo_get_usr_disabled_pkginfo(
+ job->pkgid, job->target_uid, &pkginfo_h);
+ if (ret != PMINFO_R_OK) {
+ ERR("Failed to get appinfo");
+ return -1;
+ }
+
+ ret = pkgmgrinfo_pkginfo_is_global(pkginfo_h, &is_global);
+ if (ret != PMINFO_R_OK) {
+ ERR("Failed to get global value");
+ pkgmgrinfo_pkginfo_destroy_pkginfo(pkginfo_h);
+ return -1;
+ }
+
+ if ((is_global && job->target_uid != GLOBAL_USER) ||
+ (!is_global && job->target_uid == GLOBAL_USER)) {
+ ERR("Invalid attempt to enable pkg");
+ pkgmgrinfo_pkginfo_destroy_pkginfo(pkginfo_h);
+ return -1;
+ }
+
+ ret = pkgmgrinfo_pkginfo_is_readonly(pkginfo_h, &is_readonly);
+ if (ret != PMINFO_R_OK) {
+ ERR("Failed to get readonly value");
+ pkgmgrinfo_pkginfo_destroy_pkginfo(pkginfo_h);
+ return -1;
+ }
+
+ snprintf(args, sizeof(args), "%s -k %s -u %d -A %s %s",
+ backend_cmd, job->req_id, (int)job->target_uid,
+ job->pkgid, (is_readonly) ? "--preload" : "");
+ argv = __generate_argv(args);
+ pid = __fork_and_exec_with_args(argv, APPFW_UID);
+
+ g_strfreev(argv);
+ pkgmgrinfo_pkginfo_destroy_pkginfo(pkginfo_h);
+
+ return pid;
}
-static int __process_disable_pkg(pm_dbus_msg *item)
+static int __process_disable_pkg(struct backend_job *job)
{
- /* TODO */
- return 0;
+ char *backend_cmd;
+ char **argv;
+ char args[MAX_PKG_ARGS_LEN];
+ pkgmgrinfo_pkginfo_h pkginfo_h;
+ bool is_readonly;
+ bool is_global;
+ int ret;
+ int pid;
+
+ backend_cmd = job->backend_path;
+ if (backend_cmd == NULL)
+ return -1;
+
+ ret = pkgmgrinfo_pkginfo_get_usr_pkginfo(
+ job->pkgid, job->target_uid, &pkginfo_h);
+ if (ret != PMINFO_R_OK) {
+ ERR("Failed to get appinfo");
+ return -1;
+ }
+
+ ret = pkgmgrinfo_pkginfo_is_global(pkginfo_h, &is_global);
+ if (ret != PMINFO_R_OK) {
+ ERR("Failed to get global value");
+ pkgmgrinfo_pkginfo_destroy_pkginfo(pkginfo_h);
+ return -1;
+ }
+
+ if ((is_global && job->target_uid != GLOBAL_USER) ||
+ (!is_global && job->target_uid == GLOBAL_USER)) {
+ ERR("Invalid attempt to disable pkg");
+ pkgmgrinfo_pkginfo_destroy_pkginfo(pkginfo_h);
+ return -1;
+ }
+
+ ret = pkgmgrinfo_pkginfo_is_readonly(pkginfo_h, &is_readonly);
+ if (ret != PMINFO_R_OK) {
+ ERR("Failed to get readonly value");
+ pkgmgrinfo_pkginfo_destroy_pkginfo(pkginfo_h);
+ return -1;
+ }
+
+ snprintf(args, sizeof(args), "%s -k %s -u %d -D %s %s",
+ backend_cmd, job->req_id, (int)job->target_uid,
+ job->pkgid, (is_readonly) ? "--preload" : "");
+ argv = __generate_argv(args);
+
+ pid = __fork_and_exec_with_args(argv, APPFW_UID);
+
+ g_strfreev(argv);
+
+ pkgmgrinfo_pkginfo_destroy_pkginfo(pkginfo_h);
+ return pid;
}
-static int __process_enable_app(pm_dbus_msg *item)
+static int __process_enable_app(struct backend_job *job)
{
int ret = -1;
+ bool is_global = false;
- __send_app_signal(item->uid, item->req_id, item->pkgid, item->pkgid,
- PKGMGR_INSTALLER_START_KEY_STR,
- PKGMGR_INSTALLER_APP_ENABLE_EVENT_STR, item->req_type);
-
- /* get actual pkgid and replace it to appid which is currently stored at pkgid variable */
- ret = __change_item_info(item, item->uid);
- if (ret != PMINFO_R_OK || strlen(item->appid) == 0) {
- __send_app_signal(item->uid, item->req_id, item->pkgid, item->pkgid,
- PKGMGR_INSTALLER_END_KEY_STR, PKGMGR_INSTALLER_FAIL_EVENT_STR,
- item->req_type);
+ /* get actual pkgid and replace it to appid which is currently stored
+ * at pkgid variable
+ */
+ ret = __change_job_info(job, job->target_uid, &is_global);
+ if (ret != PMINFO_R_OK || strlen(job->appid) == 0) {
+ _send_app_signal(job->target_uid, job->req_id, job->pkgid, job->pkgid,
+ PKGMGR_INSTALLER_START_KEY_STR,
+ PKGMGR_INSTALLER_APP_ENABLE_EVENT_STR,
+ job->req_type);
+ _send_app_signal(job->target_uid, job->req_id, job->pkgid, job->pkgid,
+ PKGMGR_INSTALLER_END_KEY_STR,
+ PKGMGR_INSTALLER_FAIL_EVENT_STR,
+ job->req_type);
return ret;
}
- ret = pkgmgr_parser_update_app_disable_info_in_usr_db(item->appid, item->uid, 0);
+ _send_app_signal(job->target_uid, job->req_id, job->pkgid, job->appid,
+ PKGMGR_INSTALLER_START_KEY_STR,
+ PKGMGR_INSTALLER_APP_ENABLE_EVENT_STR, job->req_type);
+
+ ret = pkgmgr_parser_update_app_disable_info_in_usr_db(job->appid,
+ job->target_uid, 0);
if (ret != PMINFO_R_OK)
- __send_app_signal(item->uid, item->req_id, item->pkgid, item->appid,
- PKGMGR_INSTALLER_END_KEY_STR, PKGMGR_INSTALLER_FAIL_EVENT_STR,
- item->req_type);
+ _send_app_signal(job->target_uid, job->req_id, job->pkgid, job->appid,
+ PKGMGR_INSTALLER_END_KEY_STR,
+ PKGMGR_INSTALLER_FAIL_EVENT_STR,
+ job->req_type);
else
- __send_app_signal(item->uid, item->req_id, item->pkgid, item->appid,
- PKGMGR_INSTALLER_END_KEY_STR, PKGMGR_INSTALLER_OK_EVENT_STR,
- item->req_type);
-
+ _send_app_signal(job->target_uid, job->req_id, job->pkgid, job->appid,
+ PKGMGR_INSTALLER_END_KEY_STR,
+ PKGMGR_INSTALLER_OK_EVENT_STR,
+ job->req_type);
return ret;
}
-static int __process_disable_app(pm_dbus_msg *item)
+static int __process_disable_app(struct backend_job *job)
{
int ret = -1;
+ bool is_global = false;
- __send_app_signal(item->uid, item->req_id, item->pkgid, item->pkgid,
- PKGMGR_INSTALLER_START_KEY_STR,
- PKGMGR_INSTALLER_APP_DISABLE_EVENT_STR, item->req_type);
-
- /* get actual pkgid and replace it to appid which is currently stored at pkgid variable */
- ret = __change_item_info(item, item->uid);
- if (ret != PMINFO_R_OK || strlen(item->appid) == 0) {
- __send_app_signal(item->uid, item->req_id, item->pkgid, item->pkgid,
- PKGMGR_INSTALLER_END_KEY_STR, PKGMGR_INSTALLER_FAIL_EVENT_STR,
- item->req_type);
+ /* get actual pkgid and replace it to appid which is currently stored
+ * at pkgid variable
+ */
+ ret = __change_job_info(job, job->target_uid, &is_global);
+ if (ret != PMINFO_R_OK || strlen(job->appid) == 0) {
+ _send_app_signal(job->target_uid, job->req_id, job->pkgid, job->pkgid,
+ PKGMGR_INSTALLER_START_KEY_STR,
+ PKGMGR_INSTALLER_APP_DISABLE_EVENT_STR,
+ job->req_type);
+ _send_app_signal(job->target_uid, job->req_id, job->pkgid, job->pkgid,
+ PKGMGR_INSTALLER_END_KEY_STR,
+ PKGMGR_INSTALLER_FAIL_EVENT_STR,
+ job->req_type);
return ret;
}
- ret = __kill_app(item->appid, item->uid);
- if (ret != PMINFO_R_OK) {
- __send_app_signal(item->uid, item->req_id, item->pkgid, item->appid,
- PKGMGR_INSTALLER_END_KEY_STR, PKGMGR_INSTALLER_FAIL_EVENT_STR,
- item->req_type);
+ _send_app_signal(job->target_uid, job->req_id, job->pkgid, job->appid,
+ PKGMGR_INSTALLER_START_KEY_STR,
+ PKGMGR_INSTALLER_APP_DISABLE_EVENT_STR, job->req_type);
+
+ ret = __kill_app(job->appid, job->target_uid);
+ if (ret != 0) {
+ _send_app_signal(job->target_uid, job->req_id, job->pkgid, job->appid,
+ PKGMGR_INSTALLER_END_KEY_STR,
+ PKGMGR_INSTALLER_FAIL_EVENT_STR,
+ job->req_type);
}
- ret = pkgmgr_parser_update_app_disable_info_in_usr_db(item->appid, item->uid, 1);
+ ret = pkgmgr_parser_update_app_disable_info_in_usr_db(job->appid,
+ job->target_uid, 1);
if (ret != PMINFO_R_OK)
- __send_app_signal(item->uid, item->req_id, item->pkgid, item->appid,
- PKGMGR_INSTALLER_END_KEY_STR, PKGMGR_INSTALLER_FAIL_EVENT_STR,
- item->req_type);
+ _send_app_signal(job->target_uid, job->req_id, job->pkgid, job->appid,
+ PKGMGR_INSTALLER_END_KEY_STR,
+ PKGMGR_INSTALLER_FAIL_EVENT_STR,
+ job->req_type);
else
- __send_app_signal(item->uid, item->req_id, item->pkgid, item->appid,
- PKGMGR_INSTALLER_END_KEY_STR, PKGMGR_INSTALLER_OK_EVENT_STR,
- item->req_type);
+ _send_app_signal(job->target_uid, job->req_id, job->pkgid, job->appid,
+ PKGMGR_INSTALLER_END_KEY_STR,
+ PKGMGR_INSTALLER_OK_EVENT_STR,
+ job->req_type);
return ret;
}
-static int __process_enable_global_app_for_uid(pm_dbus_msg *item)
+static int __process_enable_global_app_for_uid(struct backend_job *job)
{
int ret = -1;
+ bool is_global = true;
- __send_app_signal(item->uid, item->req_id, item->pkgid, item->pkgid,
- PKGMGR_INSTALLER_START_KEY_STR,
- PKGMGR_INSTALLER_GLOBAL_APP_ENABLE_FOR_UID, item->req_type);
-
- /* get actual pkgid and replace it to appid which is currently stored at pkgid variable */
- ret = __change_item_info(item, item->uid);
- if (ret != PMINFO_R_OK || strlen(item->appid) == 0) {
- __send_app_signal(item->uid, item->req_id, item->pkgid, item->pkgid,
- PKGMGR_INSTALLER_END_KEY_STR, PKGMGR_INSTALLER_FAIL_EVENT_STR,
- item->req_type);
+ /* get actual pkgid and replace it to appid which is currently stored
+ * at pkgid variable
+ */
+ ret = __change_job_info(job, job->target_uid, &is_global);
+ if (ret != PMINFO_R_OK || strlen(job->appid) == 0) {
+ _send_app_signal(job->target_uid, job->req_id, job->pkgid, job->pkgid,
+ PKGMGR_INSTALLER_START_KEY_STR,
+ PKGMGR_INSTALLER_APP_ENABLE_EVENT_STR,
+ job->req_type);
+ _send_app_signal(job->target_uid, job->req_id, job->pkgid, job->pkgid,
+ PKGMGR_INSTALLER_END_KEY_STR,
+ PKGMGR_INSTALLER_FAIL_EVENT_STR,
+ job->req_type);
return ret;
}
- ret = pkgmgr_parser_update_global_app_disable_for_uid_info_in_db(item->appid, item->uid, 0);
+ _send_app_signal(job->target_uid, job->req_id, job->pkgid, job->appid,
+ PKGMGR_INSTALLER_START_KEY_STR,
+ PKGMGR_INSTALLER_APP_ENABLE_EVENT_STR,
+ job->req_type);
+
+ ret = pkgmgr_parser_update_global_app_disable_for_uid_info_in_db(
+ job->appid, job->target_uid, 0);
if (ret != PMINFO_R_OK)
- __send_app_signal(item->uid, item->req_id, item->pkgid, item->appid,
- PKGMGR_INSTALLER_END_KEY_STR, PKGMGR_INSTALLER_FAIL_EVENT_STR,
- item->req_type);
+ _send_app_signal(job->target_uid, job->req_id, job->pkgid, job->appid,
+ PKGMGR_INSTALLER_END_KEY_STR,
+ PKGMGR_INSTALLER_FAIL_EVENT_STR,
+ job->req_type);
else
- __send_app_signal(item->uid, item->req_id, item->pkgid, item->appid,
- PKGMGR_INSTALLER_END_KEY_STR, PKGMGR_INSTALLER_OK_EVENT_STR,
- item->req_type);
+ _send_app_signal(job->target_uid, job->req_id, job->pkgid, job->appid,
+ PKGMGR_INSTALLER_END_KEY_STR,
+ PKGMGR_INSTALLER_OK_EVENT_STR,
+ job->req_type);
return ret;
}
-static int __process_disable_global_app_for_uid(pm_dbus_msg *item)
+static int __process_disable_global_app_for_uid(struct backend_job *job)
{
int ret = -1;
+ bool is_global = true;
- __send_app_signal(item->uid, item->req_id,
- item->pkgid, item->pkgid,
- PKGMGR_INSTALLER_START_KEY_STR,
- PKGMGR_INSTALLER_GLOBAL_APP_DISABLE_FOR_UID, item->req_type);
-
- /* get actual pkgid and replace it to appid which is currently stored at pkgid variable */
- ret = __change_item_info(item, GLOBAL_USER);
- if (ret != PMINFO_R_OK || strlen(item->appid) == 0) {
- __send_app_signal(item->uid, item->req_id, item->pkgid, item->pkgid,
- PKGMGR_INSTALLER_END_KEY_STR, PKGMGR_INSTALLER_FAIL_EVENT_STR,
- item->req_type);
+ /* get actual pkgid and replace it to appid which is currently stored
+ * at pkgid variable
+ */
+ ret = __change_job_info(job, GLOBAL_USER, &is_global);
+ if (ret != PMINFO_R_OK || strlen(job->appid) == 0) {
+ _send_app_signal(job->target_uid, job->req_id,
+ job->pkgid, job->pkgid,
+ PKGMGR_INSTALLER_START_KEY_STR,
+ PKGMGR_INSTALLER_APP_DISABLE_EVENT_STR,
+ job->req_type);
+ _send_app_signal(job->target_uid, job->req_id, job->pkgid, job->pkgid,
+ PKGMGR_INSTALLER_END_KEY_STR,
+ PKGMGR_INSTALLER_FAIL_EVENT_STR,
+ job->req_type);
return ret;
}
- ret = __kill_app(item->appid, item->uid);
- ret = pkgmgr_parser_update_global_app_disable_for_uid_info_in_db(item->appid,
- item->uid, 1);
+ _send_app_signal(job->target_uid, job->req_id,
+ job->pkgid, job->appid,
+ PKGMGR_INSTALLER_START_KEY_STR,
+ PKGMGR_INSTALLER_APP_DISABLE_EVENT_STR,
+ job->req_type);
+
+ ret = __kill_app(job->appid, job->target_uid);
+ ret = pkgmgr_parser_update_global_app_disable_for_uid_info_in_db(
+ job->appid, job->target_uid, 1);
if (ret != PMINFO_R_OK)
- __send_app_signal(item->uid, item->req_id, item->pkgid, item->appid,
- PKGMGR_INSTALLER_END_KEY_STR, PKGMGR_INSTALLER_FAIL_EVENT_STR,
- item->req_type);
+ _send_app_signal(job->target_uid, job->req_id, job->pkgid, job->appid,
+ PKGMGR_INSTALLER_END_KEY_STR,
+ PKGMGR_INSTALLER_FAIL_EVENT_STR,
+ job->req_type);
else
- __send_app_signal(item->uid, item->req_id, item->pkgid, item->appid,
- PKGMGR_INSTALLER_END_KEY_STR, PKGMGR_INSTALLER_OK_EVENT_STR,
- item->req_type);
+ _send_app_signal(job->target_uid, job->req_id, job->pkgid, job->appid,
+ PKGMGR_INSTALLER_END_KEY_STR,
+ PKGMGR_INSTALLER_OK_EVENT_STR,
+ job->req_type);
return ret;
}
-static int __process_getsize(pm_dbus_msg *item)
+static int __process_getsize(struct backend_job *job)
{
- static const char *backend_cmd = "/usr/bin/pkg_getsize";
+ static const char backend_cmd[] = "/usr/bin/pkg_getsize";
char **argv;
char args[MAX_PKG_ARGS_LEN];
int pid;
- snprintf(args, sizeof(args), "%s %s %s -k %s", backend_cmd, item->pkgid,
- item->args, item->req_id);
+ snprintf(args, sizeof(args), "%s %s %s %d -k %s -u %d",
+ backend_cmd, job->pkgid, job->args, job->caller_uid,
+ job->req_id, job->target_uid);
argv = __generate_argv(args);
- pid = __fork_and_exec_with_args(argv, item->uid);
+ pid = __fork_and_exec_with_args(argv, APPFW_UID);
g_strfreev(argv);
return pid;
}
-static int __process_cleardata(pm_dbus_msg *item)
+static int __process_getsize_sync(struct backend_job *job)
{
- char *backend_cmd;
+ static const char backend_cmd[] = "/usr/bin/pkg_getsize";
char **argv;
char args[MAX_PKG_ARGS_LEN];
+ char fifo_path[PATH_MAX];
int pid;
- backend_cmd = _get_backend_cmd(item->pkg_type);
- if (backend_cmd == NULL)
- return -1;
+ snprintf(fifo_path, sizeof(fifo_path), "/tmp/pkgmgr/%s",
+ job->req_id);
- /* TODO: set movetype */
- snprintf(args, sizeof(args), "%s -k %s -c %s", backend_cmd,
- item->req_id, item->pkgid);
- argv = __generate_argv(args);
+ job->extra = calloc(1, sizeof(struct job_extra_info));
+ if (!job->extra) {
+ ERR("memory alloc failed");
+ goto error;
+ }
- pid = __fork_and_exec_with_args(argv, item->uid);
+ job->extra->getsize_fifo = strdup(fifo_path);
+ if (!job->extra->getsize_fifo) {
+ ERR("out of memory");
+ goto error;
+ }
+
+ if (mkfifo(job->extra->getsize_fifo, 0600) < 0) {
+ ERR("failed to mkfifo");
+ goto error;
+ }
+
+ snprintf(args, sizeof(args), "%s %s %s %d -k %s -u %d --sync",
+ backend_cmd, job->pkgid, job->args, job->caller_uid,
+ job->req_id, job->target_uid);
+ argv = __generate_argv(args);
+ pid = __fork_and_exec_with_args(argv, APPFW_UID);
g_strfreev(argv);
- free(backend_cmd);
+
+ if (pid < 0) {
+ ERR("failed to execute backend");
+ goto error;
+ }
+ if (__setup_size_info_io(job) < 0) {
+ ERR("failed to setup io handler");
+ goto error;
+ }
return pid;
+
+error:
+ _return_value_to_caller(job->req_id,
+ g_variant_new("(ix)", PKGMGR_R_ERROR, -1));
+ return -1;
}
-static int __process_clearcache(pm_dbus_msg *item)
+static int __process_cleardata(struct backend_job *job)
{
- static const char *backend_cmd = "/usr/bin/pkg_clearcache";
+ static const char *backend_cmd = "/usr/bin/pkg_cleardata";
char **argv;
char args[MAX_PKG_ARGS_LEN];
int pid;
- snprintf(args, sizeof(args), "%s %s", backend_cmd, item->pkgid);
+ if ((int)job->target_uid < REGULAR_USER)
+ return -1;
+
+ snprintf(args, sizeof(args), "%s -d -n %s -u %d",
+ backend_cmd, job->pkgid, job->target_uid);
argv = __generate_argv(args);
- pid = __fork_and_exec_with_args(argv, item->uid);
+ pid = __fork_and_exec_with_args(argv, APPFW_UID);
g_strfreev(argv);
+ return pid;
+}
+static int __process_clearcache(struct backend_job *job)
+{
+ static const char *backend_cmd = "/usr/bin/pkg_cleardata";
+ char **argv;
+ char args[MAX_PKG_ARGS_LEN];
+ int pid;
+
+ if ((int)job->target_uid < REGULAR_USER)
+ return -1;
+
+ snprintf(args, sizeof(args), "%s -c -n %s -u %d",
+ backend_cmd, job->pkgid, job->target_uid);
+ argv = __generate_argv(args);
+ pid = __fork_and_exec_with_args(argv, APPFW_UID);
+
+ g_strfreev(argv);
return pid;
}
-static int __process_kill(pm_dbus_msg *item)
+static int __process_kill(struct backend_job *job)
{
int ret;
pkgmgrinfo_pkginfo_h handle;
+ pkgcmd_data *pdata;
- ret = pkgmgrinfo_pkginfo_get_usr_pkginfo(item->pkgid, item->uid,
+ ret = pkgmgrinfo_pkginfo_get_usr_pkginfo(job->pkgid, job->target_uid,
&handle);
if (ret < 0) {
ERR("Failed to get handle");
+ _return_value_to_caller(job->req_id,
+ g_variant_new("(ii)", PKGMGR_R_ERROR, 0));
return -1;
}
+ pdata = calloc(1, sizeof(pkgcmd_data));
+ if (pdata == NULL) {
+ ERR("memory alloc failed");
+ _return_value_to_caller(job->req_id,
+ g_variant_new("(ii)", PKGMGR_R_ENOMEM, 0));
+ return -1;
+ }
+ pdata->cmd = strdup("kill");
+ if (pdata->cmd == NULL) {
+ ERR("out of memory");
+ _return_value_to_caller(job->req_id,
+ g_variant_new("(ii)", PKGMGR_R_ENOMEM, 0));
+ free(pdata);
+ return -1;
+ }
+ pdata->uid = job->target_uid;
ret = pkgmgrinfo_appinfo_get_usr_list(handle, PMINFO_ALL_APP,
- __pkgcmd_app_cb, "kill", item->uid);
+ __pkgcmd_app_cb, pdata, job->target_uid);
+
+ _return_value_to_caller(job->req_id,
+ g_variant_new("(ii)", PKGMGR_R_OK, pdata->pid));
+
+ free(pdata->cmd);
+ free(pdata);
pkgmgrinfo_pkginfo_destroy_pkginfo(handle);
if (ret < 0) {
ERR("pkgmgrinfo_appinfo_get_list() failed");
return 0;
}
-static int __process_check(pm_dbus_msg *item)
+static int __process_check(struct backend_job *job)
{
int ret;
pkgmgrinfo_pkginfo_h handle;
+ pkgcmd_data *pdata;
- ret = pkgmgrinfo_pkginfo_get_usr_pkginfo(item->pkgid, item->uid,
+ ret = pkgmgrinfo_pkginfo_get_usr_pkginfo(job->pkgid, job->target_uid,
&handle);
if (ret < 0) {
ERR("Failed to get handle");
+ _return_value_to_caller(job->req_id,
+ g_variant_new("(ii)", PKGMGR_R_ERROR, 0));
return -1;
}
+ pdata = calloc(1, sizeof(pkgcmd_data));
+ if (pdata == NULL) {
+ ERR("memory alloc failed");
+ _return_value_to_caller(job->req_id,
+ g_variant_new("(ii)", PKGMGR_R_ENOMEM, 0));
+ return -1;
+ }
+ pdata->cmd = strdup("check");
+ if (pdata->cmd == NULL) {
+ ERR("out of memory");
+ _return_value_to_caller(job->req_id,
+ g_variant_new("(ii)", PKGMGR_R_ENOMEM, 0));
+ free(pdata);
+ return -1;
+ }
+ pdata->uid = job->target_uid;
ret = pkgmgrinfo_appinfo_get_usr_list(handle, PMINFO_ALL_APP,
- __pkgcmd_app_cb, "check", item->uid);
+ __pkgcmd_app_cb, pdata, job->target_uid);
+
+ _return_value_to_caller(job->req_id,
+ g_variant_new("(ii)", PKGMGR_R_OK, pdata->pid));
+
+ free(pdata->cmd);
+ free(pdata);
pkgmgrinfo_pkginfo_destroy_pkginfo(handle);
if (ret < 0) {
ERR("pkgmgrinfo_appinfo_get_list() failed");
return 0;
}
-static int __process_generate_license_request(pm_dbus_msg *item)
+static int __process_generate_license_request(struct backend_job *job)
{
int ret;
char *resp_data;
char license_url[MAX_PKG_ARGS_LEN];
unsigned int license_url_len;
- resp_data = item->args;
+ resp_data = job->args;
req_data_len = sizeof(req_data);
license_url_len = sizeof(license_url);
req_data, &req_data_len, license_url, &license_url_len);
if (ret != TADC_SUCCESS) {
ERR("drm_tizen_generate_license_request failed: %d", ret);
- __return_value_to_caller(item->req_id, g_variant_new("(iss)",
+ _return_value_to_caller(job->req_id, g_variant_new("(iss)",
PKGMGR_R_ESYSTEM, "", ""));
return -1;
}
- __return_value_to_caller(item->req_id,
+ _return_value_to_caller(job->req_id,
g_variant_new("(iss)", PKGMGR_R_OK, req_data,
license_url));
return 0;
}
-static int __process_register_license(pm_dbus_msg *item)
+static int __process_register_license(struct backend_job *job)
{
int ret;
char *resp_data;
- resp_data = item->args;
+ resp_data = job->args;
ret = drm_tizen_register_license(resp_data, strlen(resp_data));
if (ret != TADC_SUCCESS) {
ERR("drm_tizen_register_license failed: %d", ret);
- __return_value_to_caller(item->req_id,
+ _return_value_to_caller(job->req_id,
g_variant_new("(i)", PKGMGR_R_ESYSTEM));
return -1;
}
- __return_value_to_caller(item->req_id,
+ _return_value_to_caller(job->req_id,
g_variant_new("(i)", PKGMGR_R_OK));
return 0;
}
-static int __process_decrypt_package(pm_dbus_msg *item)
+static int __process_decrypt_package(struct backend_job *job)
{
int ret;
char *drm_file_path;
char *decrypted_file_path;
- drm_file_path = item->pkgid;
- decrypted_file_path = item->args;
+ drm_file_path = job->pkgid;
+ decrypted_file_path = job->args;
/* TODO: check ownership of decrypted file */
ret = drm_tizen_decrypt_package(drm_file_path, strlen(drm_file_path),
decrypted_file_path, strlen(decrypted_file_path));
if (ret != TADC_SUCCESS) {
ERR("drm_tizen_register_license failed: %d", ret);
- __return_value_to_caller(item->req_id,
+ _return_value_to_caller(job->req_id,
g_variant_new("(i)", PKGMGR_R_ESYSTEM));
return -1;
}
- __return_value_to_caller(item->req_id,
+ _return_value_to_caller(job->req_id,
g_variant_new("(i)", PKGMGR_R_OK));
return 0;
}
-static int __process_add_blacklist(pm_dbus_msg *item)
+static int __process_update_app_splash_screen(struct backend_job *job, int flag)
+{
+ int ret;
+ bool is_global = false;
+ const char *val;
+
+ ret = __change_job_info(job, job->target_uid, &is_global);
+ if (ret != PMINFO_R_OK || strlen(job->appid) == 0)
+ return -1;
+
+ val = flag ? PKGMGR_INSTALLER_APP_ENABLE_SPLASH_SCREEN_EVENT_STR :
+ PKGMGR_INSTALLER_APP_DISABLE_SPLASH_SCREEN_EVENT_STR;
+ _send_app_signal(job->target_uid, job->req_id, job->pkgid, job->appid,
+ PKGMGR_INSTALLER_START_KEY_STR, val, job->req_type);
+
+ if (is_global)
+ ret = pkgmgr_parser_update_global_app_splash_screen_display_info_in_usr_db(job->appid, job->target_uid, flag);
+ else
+ ret = pkgmgr_parser_update_app_splash_screen_display_info_in_usr_db(
+ job->appid, job->target_uid, flag);
+ if (ret != PMINFO_R_OK)
+ _send_app_signal(job->target_uid, job->req_id, job->pkgid,
+ job->appid, PKGMGR_INSTALLER_END_KEY_STR,
+ PKGMGR_INSTALLER_FAIL_EVENT_STR,
+ job->req_type);
+ else
+ _send_app_signal(job->target_uid, job->req_id, job->pkgid,
+ job->appid, PKGMGR_INSTALLER_END_KEY_STR,
+ PKGMGR_INSTALLER_OK_EVENT_STR,
+ job->req_type);
+
+ return ret;
+}
+
+static int __process_set_restriction_mode(struct backend_job *job)
{
int ret;
+ int mode;
- ret = __add_blacklist(item->uid, item->pkgid);
+ mode = atoi(job->args);
+ ret = _set_restriction_mode(job->target_uid, job->pkgid, mode);
- __return_value_to_caller(item->req_id,
+ _return_value_to_caller(job->req_id,
g_variant_new("(i)", ret));
return ret;
}
-static int __process_remove_blacklist(pm_dbus_msg *item)
+static int __process_unset_restriction_mode(struct backend_job *job)
{
int ret;
+ int mode;
- ret = __remove_blacklist(item->uid, item->pkgid);
+ mode = atoi(job->args);
+ ret = _unset_restriction_mode(job->target_uid, job->pkgid, mode);
- __return_value_to_caller(item->req_id,
+ _return_value_to_caller(job->req_id,
g_variant_new("(i)", ret));
return ret;
}
-static int __process_check_blacklist(pm_dbus_msg *item)
+static int __process_get_restriction_mode(struct backend_job *job)
{
int ret;
- int result = 0;
+ int mode = -1;
+
+ ret = _get_restriction_mode(job->target_uid, job->pkgid, &mode);
+
+ _return_value_to_caller(job->req_id,
+ g_variant_new("(ii)", mode, ret));
- ret = __check_blacklist(item->uid, item->pkgid, &result);
+ return ret;
+}
- __return_value_to_caller(item->req_id,
- g_variant_new("(ii)", result, ret));
+static int __process_set_app_label(struct backend_job *job)
+{
+ int ret;
+
+ ret = pkgmgr_parser_update_app_label_info_in_usr_db(job->pkgid,
+ job->target_uid, job->args);
+ _return_value_to_caller(job->req_id, g_variant_new("(i)", ret));
return ret;
}
+static int __process_migrate_external_image(struct backend_job *job)
+{
+ char *backend_cmd;
+ char **argv;
+ char args[MAX_PKG_ARGS_LEN];
+ int pid;
+
+ backend_cmd = job->backend_path;
+ if (backend_cmd == NULL)
+ return -1;
+
+ snprintf(args, sizeof(args), "%s -k %s --migrate-extimg %s -u %d %s",
+ backend_cmd, job->req_id, job->pkgid,
+ (int)job->target_uid, job->args);
+
+ argv = __generate_argv(args);
+
+ pid = __fork_and_exec_with_args(argv, APPFW_UID);
+ g_strfreev(argv);
+
+ return pid;
+}
+
+static int __post_process(int ret, int x, struct backend_job *job)
+{
+ if (ret < 0) {
+ __set_backend_free(x);
+ _free_backend_job(job);
+ } else {
+ g_hash_table_insert(backend_info_table, (gpointer)ret,
+ (gpointer)job);
+ }
+ return 0;
+}
+
gboolean queue_job(void *data)
{
- pm_dbus_msg *item = NULL;
- backend_info *ptr;
+ struct backend_job *job = NULL;
int x;
int ret;
/* Pop a job from queue */
- for (x = 0, ptr = begin; x < num_of_backends; x++, ptr++) {
+ for (x = 0; x < num_of_backends; x++) {
if (__is_backend_busy(x))
continue;
- item = _pm_queue_pop(x);
- if (item && item->req_type != -1)
+ job = _pop_queue(x);
+ if (job)
break;
- free(item);
}
/* all backend messages queue are empty or busy */
- if (x == num_of_backends)
+ if (x == num_of_backends || job == NULL) {
+ DBG("no job available");
return FALSE;
+ }
- /*save pkg type and pkg name for future*/
- strncpy(ptr->pkgtype, item->pkg_type, MAX_PKG_TYPE_LEN-1);
- strncpy(ptr->pkgid, item->pkgid, MAX_PKG_NAME_LEN-1);
- strncpy(ptr->args, item->args, MAX_PKG_ARGS_LEN-1);
- memset((item->appid),0,MAX_PKG_NAME_LEN);
- ptr->uid = item->uid;
- DBG("handle request type [%d]", item->req_type);
+ /* set current backend job */
+ DBG("handle request type [%d]", job->req_type);
- switch (item->req_type) {
- case PKGMGR_REQUEST_TYPE_INSTALL:
+#ifdef TIZEN_FEATURE_CSR
+ if (job->req_type == REQUEST_TYPE_INSTALL ||
+ job->req_type == REQUEST_TYPE_MOUNT_INSTALL ||
+ job->req_type == REQUEST_TYPE_REINSTALL) {
+ ret = __check_csr(job->pkgid);
+ if (ret != 0) {
+ ret = -1;
+ _send_fail_signal(job);
+ _free_backend_job(job);
+ return TRUE;
+ }
+ }
+#endif
+
+ switch (job->req_type) {
+ case REQUEST_TYPE_INSTALL:
__set_backend_busy(x);
- __set_recovery_mode(item->uid, item->pkgid, item->pkg_type);
- ret = __process_install(item);
+ ret = __process_install(job);
+ __post_process(ret, x, job);
break;
- case PKGMGR_REQUEST_TYPE_REINSTALL:
+ case REQUEST_TYPE_MOUNT_INSTALL:
__set_backend_busy(x);
- __set_recovery_mode(item->uid, item->pkgid, item->pkg_type);
- ret = __process_reinstall(item);
+ ret = __process_mount_install(job);
+ __post_process(ret, x, job);
break;
- case PKGMGR_REQUEST_TYPE_UNINSTALL:
+ case REQUEST_TYPE_REINSTALL:
__set_backend_busy(x);
- __set_recovery_mode(item->uid, item->pkgid, item->pkg_type);
- ret = __process_uninstall(item);
+ ret = __process_reinstall(job);
+ __post_process(ret, x, job);
break;
- case PKGMGR_REQUEST_TYPE_MOVE:
+ case REQUEST_TYPE_UNINSTALL:
__set_backend_busy(x);
- __set_recovery_mode(item->uid, item->pkgid, item->pkg_type);
- ret = __process_move(item);
+ ret = __process_uninstall(job);
+ __post_process(ret, x, job);
break;
- case PKGMGR_REQUEST_TYPE_ENABLE_PKG:
- ret = __process_enable_pkg(item);
+ case REQUEST_TYPE_MOVE:
+ __set_backend_busy(x);
+ ret = __process_move(job);
+ __post_process(ret, x, job);
break;
- case PKGMGR_REQUEST_TYPE_DISABLE_PKG:
- ret = __process_disable_pkg(item);
+ case REQUEST_TYPE_ENABLE_PKG:
+ __set_backend_busy(x);
+ ret = __process_enable_pkg(job);
+ if (ret < 0)
+ _send_fail_signal(job);
+ __post_process(ret, x, job);
break;
- case PKGMGR_REQUEST_TYPE_ENABLE_APP:
- ret = __process_enable_app(item);
+ case REQUEST_TYPE_DISABLE_PKG:
+ __set_backend_busy(x);
+ ret = __process_disable_pkg(job);
+ if (ret < 0)
+ _send_fail_signal(job);
+ __post_process(ret, x, job);
break;
- case PKGMGR_REQUEST_TYPE_DISABLE_APP:
- ret = __process_disable_app(item);
+ case REQUEST_TYPE_ENABLE_APP:
+ ret = __process_enable_app(job);
+ _free_backend_job(job);
+ break;
+ case REQUEST_TYPE_DISABLE_APP:
+ ret = __process_disable_app(job);
+ _free_backend_job(job);
+ break;
+ case REQUEST_TYPE_GETSIZE:
+ __set_backend_busy(x);
+ ret = __process_getsize(job);
+ __post_process(ret, x, job);
break;
- case PKGMGR_REQUEST_TYPE_GETSIZE:
+ case REQUEST_TYPE_GETSIZE_SYNC:
__set_backend_busy(x);
- ret = __process_getsize(item);
+ ret = __process_getsize_sync(job);
+ if (ret < 0)
+ __free_extra_info(job);
+ __post_process(ret, x, job);
break;
- case PKGMGR_REQUEST_TYPE_CLEARDATA:
+ case REQUEST_TYPE_CLEARDATA:
__set_backend_busy(x);
- ret = __process_cleardata(item);
+ ret = __process_cleardata(job);
+ __post_process(ret, x, job);
break;
- case PKGMGR_REQUEST_TYPE_CLEARCACHE:
+ case REQUEST_TYPE_CLEARCACHE:
__set_backend_busy(x);
- ret = __process_clearcache(item);
+ ret = __process_clearcache(job);
+ __post_process(ret, x, job);
break;
- case PKGMGR_REQUEST_TYPE_ENABLE_GLOBAL_APP_FOR_UID:
- ret = __process_enable_global_app_for_uid(item);
+ case REQUEST_TYPE_ENABLE_GLOBAL_APP_FOR_UID:
+ ret = __process_enable_global_app_for_uid(job);
+ _free_backend_job(job);
break;
- case PKGMGR_REQUEST_TYPE_DISABLE_GLOBAL_APP_FOR_UID:
- ret = __process_disable_global_app_for_uid(item);
+ case REQUEST_TYPE_DISABLE_GLOBAL_APP_FOR_UID:
+ ret = __process_disable_global_app_for_uid(job);
+ _free_backend_job(job);
break;
- case PKGMGR_REQUEST_TYPE_KILL:
- ret = __process_kill(item);
+ case REQUEST_TYPE_KILL:
+ ret = __process_kill(job);
+ _free_backend_job(job);
break;
- case PKGMGR_REQUEST_TYPE_CHECK:
- ret = __process_check(item);
+ case REQUEST_TYPE_CHECK:
+ ret = __process_check(job);
+ _free_backend_job(job);
break;
- case PKGMGR_REQUEST_TYPE_GENERATE_LICENSE_REQUEST:
- ret = __process_generate_license_request(item);
+ case REQUEST_TYPE_GENERATE_LICENSE_REQUEST:
+ ret = __process_generate_license_request(job);
+ _free_backend_job(job);
break;
- case PKGMGR_REQUEST_TYPE_REGISTER_LICENSE:
- ret = __process_register_license(item);
+ case REQUEST_TYPE_REGISTER_LICENSE:
+ ret = __process_register_license(job);
+ _free_backend_job(job);
break;
- case PKGMGR_REQUEST_TYPE_DECRYPT_PACKAGE:
- ret = __process_decrypt_package(item);
+ case REQUEST_TYPE_DECRYPT_PACKAGE:
+ ret = __process_decrypt_package(job);
+ _free_backend_job(job);
break;
- case PKGMGR_REQUEST_TYPE_ADD_BLACKLIST:
- ret = __process_add_blacklist(item);
+ case REQUEST_TYPE_ENABLE_APP_SPLASH_SCREEN:
+ ret = __process_update_app_splash_screen(job, 1);
+ _free_backend_job(job);
break;
- case PKGMGR_REQUEST_TYPE_REMOVE_BLACKLIST:
- ret = __process_remove_blacklist(item);
+ case REQUEST_TYPE_DISABLE_APP_SPLASH_SCREEN:
+ ret = __process_update_app_splash_screen(job, 0);
+ _free_backend_job(job);
break;
- case PKGMGR_REQUEST_TYPE_CHECK_BLACKLIST:
- ret = __process_check_blacklist(item);
+ case REQUEST_TYPE_SET_RESTRICTION_MODE:
+ ret = __process_set_restriction_mode(job);
+ _free_backend_job(job);
+ break;
+ case REQUEST_TYPE_UNSET_RESTRICTION_MODE:
+ ret = __process_unset_restriction_mode(job);
+ _free_backend_job(job);
+ break;
+ case REQUEST_TYPE_GET_RESTRICTION_MODE:
+ ret = __process_get_restriction_mode(job);
+ _free_backend_job(job);
+ break;
+ case REQUEST_TYPE_SET_APP_LABEL:
+ ret = __process_set_app_label(job);
+ _free_backend_job(job);
+ break;
+ case REQUEST_TYPE_MIGRATE_EXTERNAL_IMAGE:
+ __set_backend_busy(x);
+ ret = __process_migrate_external_image(job);
+ __post_process(ret, x, job);
break;
default:
ret = -1;
break;
}
- ptr->pid = ret;
- free(item);
-
- return FALSE;
-}
-
-#define IS_WHITESPACE(CHAR) \
-((CHAR == ' ' || CHAR == '\t' || CHAR == '\r' || CHAR == '\n') ? TRUE : FALSE)
-
-void _app_str_trim(char *input)
-{
- char *trim_str = input;
-
- if (input == NULL)
- return;
-
- while (*input != 0) {
- if (!IS_WHITESPACE(*input)) {
- *trim_str = *input;
- trim_str++;
- }
- input++;
- }
-
- *trim_str = 0;
- return;
-}
-
-char *_get_backend_cmd(char *type)
-{
- FILE *fp = NULL;
- char buffer[1024] = { 0 };
- char *command = NULL;
- int size = 0;
- fp = fopen(PKG_CONF_PATH, "r");
- if (fp == NULL) {
- return NULL;
- }
-
- char *path = NULL;
- while (fgets(buffer, 1024, fp) != NULL) {
- if (buffer[0] == '#')
- continue;
-
- _app_str_trim(buffer);
-
- if ((path = strstr(buffer, PKG_BACKEND)) != NULL) {
- DBG("buffer [%s]", buffer);
- path = path + strlen(PKG_BACKEND);
- DBG("path [%s]", path);
-
- command =
- (char *)malloc(sizeof(char) * strlen(path) +
- strlen(type) + 1);
- if (command == NULL) {
- fclose(fp);
- return NULL;
- }
-
- size = strlen(path) + strlen(type) + 1;
- snprintf(command, size, "%s%s", path, type);
- command[strlen(path) + strlen(type)] = '\0';
- DBG("command [%s]", command);
-
- if (fp != NULL)
- fclose(fp);
-
- return command;
- }
-
- memset(buffer, 0x00, 1024);
- }
-
- if (fp != NULL)
- fclose(fp);
-
- return NULL; /* cannot find proper command */
+ return TRUE;
}
int main(int argc, char *argv[])
{
- FILE *fp_status = NULL;
- char buf[32] = { 0, };
- pid_t pid;
- char *backend_cmd = NULL;
- char *backend_name = NULL;
int r;
DBG("server start");
- if (argv[1] && (strcmp(argv[1], "init") == 0)) {
- /* if current status is "processing",
- execute related backend with '-r' option */
- if (!(fp_status = fopen(STATUS_FILE, "r")))
- return 0; /*if file is not exist, terminated. */
- /* if processing <-- unintended termination */
- if (fgets(buf, 32, fp_status) &&
- strcmp(buf, "processing") == 0) {
- pid = fork();
- if (pid == 0) { /* child */
- if (fgets(buf, 32, fp_status))
- backend_cmd = _get_backend_cmd(buf);
- if (!backend_cmd) { /* if NULL, */
- DBG("fail to get backend command");
- goto err;
- }
- backend_name =
- strrchr(backend_cmd, '/');
- if (!backend_name) {
- DBG("fail to get backend name");
- goto err;
- }
-
- execl(backend_cmd, backend_name, "-r",
- NULL);
- if (backend_cmd)
- free(backend_cmd);
- fprintf(fp_status, " ");
-err:
- fclose(fp_status);
- exit(13);
- } else if (pid < 0) { /* error */
- DBG("fork fail");
- fclose(fp_status);
- return 0;
- } else { /* parent */
-
- DBG("parent end\n");
- fprintf(fp_status, " ");
- fclose(fp_status);
- return 0;
- }
- }
+ if (__register_signal_handler()) {
+ ERR("failed to register signal handler");
+ return -1;
}
- r = _pm_queue_init();
+ r = _init_backend_queue();
if (r) {
- DBG("Queue Initialization Failed\n");
+ ERR("Queue Initialization Failed");
return -1;
}
r = __init_backend_info();
if (r) {
- DBG("backend info init failed");
+ ERR("backend info init failed");
return -1;
}
- r = __init_request_handler();
+ r = _init_request_handler();
if (r) {
ERR("dbus init failed");
return -1;
}
- if (__register_signal_handler()) {
- ERR("failed to register signal handler");
- return -1;
- }
-
-#if !GLIB_CHECK_VERSION(2,35,0)
+#if !GLIB_CHECK_VERSION(2, 35, 0)
g_type_init();
#endif
mainloop = g_main_loop_new(NULL, FALSE);
g_main_loop_run(mainloop);
DBG("Quit main loop.");
- __fini_request_handler();
+ _fini_request_handler();
__fini_backend_info();
- _pm_queue_final();
+ _fini_backend_queue();
+
+ g_source_remove(swid);
+ g_io_channel_unref(sio);
DBG("package manager server terminated.");