Fix static analyzer issues
[platform/core/appfw/pkgmgr-info.git] / src / pkgmgrinfo_db.c
index 805d2ed..453b5bc 100644 (file)
@@ -5,6 +5,7 @@
 #include <ctype.h>
 #include <sys/types.h>
 #include <sys/stat.h>
+#include <fcntl.h>
 #include <grp.h>
 #include <dirent.h>
 #include <libgen.h>
@@ -18,7 +19,6 @@
 #include "pkgmgrinfo_debug.h"
 #include "pkgmgrinfo_private.h"
 #include "pkgmgr_parser.h"
-#include "pkgmgr_parser_internal.h"
 
 #define QUERY_CREATE_TABLE_PACKAGE_CERT_INDEX_INFO \
        "CREATE TABLE IF NOT EXISTS package_cert_index_info( " \
@@ -29,6 +29,7 @@
 #define QUERY_CREATE_TABLE_PACKAGE_CERT_INFO \
        "CREATE TABLE IF NOT EXISTS package_cert_info( " \
        " package TEXT PRIMARY KEY, " \
+       " package_count INTEGER, " \
        " author_root_cert INTEGER, " \
        " author_im_cert INTEGER, " \
        " author_signer_cert INTEGER, " \
        " dist2_im_cert INTEGER, " \
        " dist2_signer_cert INTEGER)"
 
+#define QUERY_CREATE_TRIGGER_UPDATE_CERT_INFO \
+       "CREATE TRIGGER IF NOT EXISTS update_cert_info " \
+       "AFTER UPDATE ON package_cert_info " \
+       "WHEN (NEW.package_count = 0) " \
+       "BEGIN" \
+       " DELETE FROM package_cert_info WHERE package=OLD.package;" \
+       "END;"
+
+#define QUERY_CREATE_TRIGGER_UPDATE_CERT_INFO2 \
+       "CREATE TRIGGER IF NOT EXISTS update_cert_info2 " \
+       "AFTER UPDATE ON package_cert_info " \
+       "WHEN (NEW.package_count = OLD.package_count + 1) " \
+       "BEGIN" \
+       " UPDATE package_cert_index_info SET" \
+       "  cert_ref_count = cert_ref_count - 1" \
+       " WHERE cert_id = OLD.author_root_cert" \
+       "  OR cert_id = OLD.author_im_cert" \
+       "  OR cert_id = OLD.author_signer_cert" \
+       "  OR cert_id = OLD.dist_root_cert" \
+       "  OR cert_id = OLD.dist_im_cert" \
+       "  OR cert_id = OLD.dist_signer_cert" \
+       "  OR cert_id = OLD.dist2_root_cert" \
+       "  OR cert_id = OLD.dist2_im_cert" \
+       "  OR cert_id = OLD.dist2_signer_cert;" \
+       "END;"
+
 #define QUERY_CREATE_TRIGGER_DELETE_CERT_INFO \
        "CREATE TRIGGER IF NOT EXISTS delete_cert_info " \
        "AFTER DELETE ON package_cert_info " \
        " DELETE FROM package_cert_index_info WHERE cert_id = OLD.cert_id;" \
        "END;"
 
-#define QUERY_CREATE_TRIGGER_UPDATE_CERT_INFO_FORMAT \
-       "CREATE TRIGGER IF NOT EXISTS update_%s_info " \
-       "AFTER UPDATE ON package_cert_info " \
-       "WHEN (OLD.%s IS NOT NULL) " \
-       "BEGIN" \
-       " UPDATE package_cert_index_info SET" \
-       "  cert_ref_count = cert_ref_count - 1" \
-       " WHERE cert_id = OLD.%s;" \
-       "END;"
-
 __thread db_handle manifest_db;
 __thread db_handle cert_db;
 
@@ -85,6 +102,9 @@ static int _mkdir_for_user(const char* dir, uid_t uid, gid_t gid)
        int ret;
        char *fullpath;
        char *subpath;
+       char buf[1024];
+       int fd;
+       struct stat sb;
 
        fullpath = strdup(dir);
        if (fullpath == NULL)
@@ -108,10 +128,32 @@ static int _mkdir_for_user(const char* dir, uid_t uid, gid_t gid)
        }
 
        if (getuid() == ROOT_UID) {
-               ret = chown(dir, uid, gid);
-               if (ret == -1)
-                       _LOGE("FAIL : chown %s %d.%d, because %s", dir, uid,
-                                       gid, strerror(errno));
+               fd = open(dir, O_RDONLY);
+               if (fd == -1) {
+                       _LOGE("FAIL : open %s : %s", dir,
+                                       strerror_r(errno, buf, sizeof(buf)));
+                       return -1;
+               }
+               ret = fstat(fd, &sb);
+               if (ret == -1) {
+                       _LOGE("FAIL : fstat %s : %s", dir,
+                                       strerror_r(errno, buf, sizeof(buf)));
+                       close(fd);
+                       return -1;
+               }
+               if (S_ISLNK(sb.st_mode)) {
+                       _LOGE("FAIL : %s is symlink!", dir);
+                       close(fd);
+                       return -1;
+               }
+               ret = fchown(fd, uid, gid);
+               if (ret == -1) {
+                       _LOGE("FAIL : fchown %s %d.%d, because %s", dir, uid,
+                                       gid, strerror_r(errno, buf, sizeof(buf)));
+                       close(fd);
+                       return -1;
+               }
+               close(fd);
        }
 
        free(fullpath);
@@ -119,22 +161,29 @@ static int _mkdir_for_user(const char* dir, uid_t uid, gid_t gid)
        return 0;
 }
 
-static const char *_get_db_path(uid_t uid) {
-       const char *db_path = NULL;
-       if (uid != GLOBAL_USER && uid != ROOT_UID) {
-               tzplatform_set_user(uid);
-               db_path = tzplatform_getenv(TZ_USER_DB);
-               tzplatform_reset_user();
-       } else {
-               db_path = tzplatform_getenv(TZ_SYS_DB);
+static char *_get_db_path(uid_t uid)
+{
+       const char *db_path;
+       char path[PATH_MAX];
+
+       db_path = tzplatform_getenv(TZ_SYS_DB);
+       if (db_path == NULL) {
+               _LOGE("Failed to get TZ_SYS_DB path");
+               return NULL;
        }
-       return db_path;
+
+       if (uid == GLOBAL_USER || uid == ROOT_UID)
+               return strdup(db_path);
+
+       snprintf(path, sizeof(path), "%s/user/%d", db_path, uid);
+
+       return strdup(path);
 }
 
 static int __attach_and_create_view(sqlite3 *handle, const char *db, const char *tables[], uid_t uid)
 {
        int i;
-       char *err;
+       char *err = NULL;
        char query[MAX_QUERY_LEN];
 
        if (uid != GLOBAL_USER && uid != ROOT_UID) {
@@ -181,13 +230,6 @@ static int __exec_db_query(sqlite3 *db, char *query, sqlite_query_callback callb
 
 int _check_create_cert_db(sqlite3 *certdb)
 {
-       int i;
-       char buf[BUFSIZE];
-       static const char *columns[] = {
-               "author_root_cert", "author_im_cert", "author_signer_cert",
-               "dist_root_cert", "dist_im_cert", "dist_signer_cert",
-               "dist2_root_cert", "dist2_im_cert", "dist2_signer_cert",
-               NULL};
        int ret = 0;
        ret = __exec_db_query(certdb, QUERY_CREATE_TABLE_PACKAGE_CERT_INDEX_INFO, NULL, NULL);
        if (ret < 0)
@@ -195,19 +237,16 @@ int _check_create_cert_db(sqlite3 *certdb)
        ret = __exec_db_query(certdb, QUERY_CREATE_TABLE_PACKAGE_CERT_INFO, NULL, NULL);
        if (ret < 0)
                return ret;
+       ret = __exec_db_query(certdb, QUERY_CREATE_TRIGGER_UPDATE_CERT_INFO, NULL, NULL);
+       if (ret < 0)
+               return ret;
+       ret = __exec_db_query(certdb, QUERY_CREATE_TRIGGER_UPDATE_CERT_INFO2, NULL, NULL);
+       if (ret < 0)
+               return ret;
        ret = __exec_db_query(certdb, QUERY_CREATE_TRIGGER_DELETE_CERT_INFO, NULL, NULL);
        if (ret < 0)
                return ret;
        ret = __exec_db_query(certdb, QUERY_CREATE_TRIGGER_UPDATE_CERT_INDEX_INFO, NULL, NULL);
-
-       for (i = 0; columns[i] != NULL; i++) {
-               snprintf(buf, sizeof(buf),
-                               QUERY_CREATE_TRIGGER_UPDATE_CERT_INFO_FORMAT,
-                               columns[i], columns[i], columns[i]);
-               ret = __exec_db_query(certdb, buf, NULL, NULL);
-               if (ret < 0)
-                       return ret;
-       }
        return ret;
 }
 static gid_t _get_gid(const char *name)
@@ -233,80 +272,89 @@ API const char *getIconPath(uid_t uid, bool readonly)
        gid_t gid = ROOT_UID;
 
        if (uid != GLOBAL_USER && uid != ROOT_UID) {
-               tzplatform_set_user(uid);
-               path = tzplatform_mkpath(TZ_USER_ICONS, "/");
-               gid = _get_gid(tzplatform_getenv(TZ_SYS_USER_GROUP));
-               tzplatform_reset_user();
-       } else {
-               if (readonly)
-                       path = tzplatform_mkpath(TZ_SYS_RO_ICONS, "/");
-               else
-                       path = tzplatform_mkpath(TZ_SYS_RW_ICONS, "/");
+               _LOGD("not supported target user");
+               return NULL;
        }
 
-       // just allow certain users to create the icon directory if needed.
-       if (uid_caller == ROOT_UID || uid_caller == uid)
+       if (readonly)
+               path = tzplatform_mkpath(TZ_SYS_RO_ICONS, "/");
+
+       /* just allow certain users to create the icon directory if needed. */
+       if (path && (uid_caller == ROOT_UID  ||
+               uid_caller == APPFW_UID || uid_caller == uid))
                _mkdir_for_user(path, uid, gid);
 
        return path;
 }
 
-API const char *getUserPkgParserDBPath(void)
+API char *getUserPkgParserDBPath(void)
 {
-       return getUserPkgParserDBPathUID(GLOBAL_USER);
+       return getUserPkgParserDBPathUID(_getuid());
 }
 
-API const char *getUserPkgParserDBPathUID(uid_t uid)
+API char *getUserPkgParserDBPathUID(uid_t uid)
 {
-       const char *pkgmgr_parser_db = NULL;
+       char pkgmgr_parser_db[PATH_MAX];
        uid_t uid_caller = getuid();
        gid_t gid = ROOT_UID;
+       char *db_path;
+
+       db_path = _get_db_path(uid);
+       if (db_path == NULL) {
+               _LOGE("Failed to get db path %d", uid);
+               return NULL;
+       }
+       snprintf(pkgmgr_parser_db, sizeof(pkgmgr_parser_db),
+                       "%s/.pkgmgr_parser.db", db_path);
 
        if (uid != GLOBAL_USER && uid != ROOT_UID) {
                tzplatform_set_user(uid);
-               pkgmgr_parser_db = tzplatform_mkpath(TZ_USER_DB, ".pkgmgr_parser.db");
                gid = _get_gid(tzplatform_getenv(TZ_SYS_USER_GROUP));
                tzplatform_reset_user();
-       } else {
-               pkgmgr_parser_db = tzplatform_mkpath(TZ_SYS_DB, ".pkgmgr_parser.db");
        }
 
-       // just allow certain users to create the dbspace directory if needed.
-       if (uid_caller == ROOT_UID || uid_caller == uid) {
-               const char *db_path = _get_db_path(uid);
+       /* just allow certain users to create the dbspace directory if needed. */
+       if (uid_caller == ROOT_UID  || uid_caller == APPFW_UID || uid_caller == uid)
                _mkdir_for_user(db_path, uid, gid);
-       }
 
-       return pkgmgr_parser_db;
+       free(db_path);
+
+       return strdup(pkgmgr_parser_db);
 }
 
-API const char *getUserPkgCertDBPath(void)
+API char *getUserPkgCertDBPath(void)
 {
-        return getUserPkgCertDBPathUID(GLOBAL_USER);
+        return getUserPkgCertDBPathUID(_getuid());
 }
 
-API const char *getUserPkgCertDBPathUID(uid_t uid)
+API char *getUserPkgCertDBPathUID(uid_t uid)
 {
-       const char *pkgmgr_cert_db = NULL;
+       char pkgmgr_cert_db[PATH_MAX];
        uid_t uid_caller = getuid();
        gid_t gid = ROOT_UID;
+       char *db_path;
+
+       db_path = _get_db_path(uid);
+       if (db_path == NULL) {
+               _LOGE("Failed to get db path %d", uid);
+               return NULL;
+       }
+       snprintf(pkgmgr_cert_db, sizeof(pkgmgr_cert_db),
+                       "%s/.pkgmgr_cert.db", db_path);
 
        if (uid != GLOBAL_USER && uid != ROOT_UID) {
                tzplatform_set_user(uid);
-               pkgmgr_cert_db = tzplatform_mkpath(TZ_USER_DB, ".pkgmgr_cert.db");
                gid = _get_gid(tzplatform_getenv(TZ_SYS_USER_GROUP));
                tzplatform_reset_user();
-       } else {
-               pkgmgr_cert_db = tzplatform_mkpath(TZ_SYS_DB, ".pkgmgr_cert.db");
        }
 
-       // just allow certain users to create the dbspace directory if needed.
-       if (uid_caller == ROOT_UID || uid_caller == uid) {
-               const char *db_path = _get_db_path(uid);
+       /* just allow certain users to create the dbspace directory if needed. */
+       if (uid_caller == ROOT_UID || uid_caller == APPFW_UID || uid_caller == uid)
                _mkdir_for_user(db_path, uid, gid);
-       }
 
-       return pkgmgr_cert_db;
+       free(db_path);
+
+       return strdup(pkgmgr_cert_db);
 }
 
 API const char *getUserManifestPath(uid_t uid, bool readonly)
@@ -327,8 +375,8 @@ API const char *getUserManifestPath(uid_t uid, bool readonly)
                        path = tzplatform_mkpath(TZ_SYS_RW_PACKAGES, "/");
        }
 
-       // just allow certain users to create the icon directory if needed.
-       if (uid_caller == ROOT_UID || uid_caller == uid)
+       /* just allow certain users to create the icon directory if needed. */
+       if (uid_caller == ROOT_UID || uid_caller == APPFW_UID || uid_caller == uid)
                _mkdir_for_user(path, uid, gid);
 
        return path;
@@ -365,32 +413,48 @@ static const char *parserdb_tables[] = {
 int __open_manifest_db(uid_t uid, bool readonly)
 {
        int ret;
-       const char *user_pkg_parser;
+       char *user_pkg_parser;
        int flags;
 
        if (manifest_db.ref) {
-               manifest_db.ref ++;
+               manifest_db.ref++;
                return 0;
        }
 
        user_pkg_parser = getUserPkgParserDBPathUID(uid);
+       if (user_pkg_parser == NULL) {
+               _LOGE("Failed to get pkg parser db path - %d", uid);
+               return -1;
+       }
+
        if (access(user_pkg_parser, F_OK) != 0) {
                _LOGE("Manifest DB does not exists !!");
+               free(user_pkg_parser);
                return -1;
        }
 
        flags = readonly ? SQLITE_OPEN_READONLY : SQLITE_OPEN_READWRITE;
        ret = db_util_open_with_options(user_pkg_parser, &GET_DB(manifest_db),
                        flags, NULL);
-       retvm_if(ret != SQLITE_OK, -1, "connect db [%s] failed!\n",
-                       user_pkg_parser);
+       if (ret != SQLITE_OK) {
+               _LOGE("connect db [%s] failed!\n", user_pkg_parser);
+               free(user_pkg_parser);
+               return -1;
+       }
+
        manifest_db.ref++;
        if (readonly) {
                ret = __attach_and_create_view(GET_DB(manifest_db), MANIFEST_DB,
                                parserdb_tables, uid);
-               retvm_if(ret != SQLITE_OK, -1, "attach db [%s] failed!\n",
-                               user_pkg_parser);
+               if (ret != SQLITE_OK) {
+                       _LOGE("attach db [%s] failed!\n", user_pkg_parser);
+                       free(user_pkg_parser);
+                       return -1;
+               }
        }
+
+       free(user_pkg_parser);
+
        return 0;
 }
 
@@ -414,32 +478,47 @@ static const char *certdb_tables[] = {
 int __open_cert_db(uid_t uid, bool readonly)
 {
        int ret;
-       const char *user_cert_parser;
+       char *user_cert_parser;
        int flags;
 
        if (cert_db.ref) {
-               cert_db.ref ++;
+               cert_db.ref++;
                return 0;
        }
 
        user_cert_parser = getUserPkgCertDBPathUID(uid);
+       if (user_cert_parser == NULL) {
+               _LOGE("Failed to get pkg cert db path - %d", uid);
+               return -1;
+       }
+
        if (access(user_cert_parser, F_OK) != 0) {
                _LOGE("Cert DB does not exists !!");
+               free(user_cert_parser);
                return -1;
        }
 
        flags = readonly ? SQLITE_OPEN_READONLY : SQLITE_OPEN_READWRITE;
        ret = db_util_open_with_options(user_cert_parser, &GET_DB(cert_db),
                        flags, NULL);
-       retvm_if(ret != SQLITE_OK, -1, "connect db [%s] failed!",
-                       user_cert_parser);
+       if (ret != SQLITE_OK) {
+               _LOGE("connect db [%s] failed!", user_cert_parser);
+               free(user_cert_parser);
+               return -1;
+       }
        cert_db.ref++;
        if (readonly) {
                ret = __attach_and_create_view(GET_DB(cert_db), CERT_DB,
                                certdb_tables, uid);
-               retvm_if(ret != SQLITE_OK, -1, "attach db [%s] failed!",
-                               user_cert_parser);
+               if (ret != SQLITE_OK) {
+                       _LOGE("attach db [%s] failed!", user_cert_parser);
+                       free(user_cert_parser);
+                       return -1;
+               }
        }
+
+       free(user_cert_parser);
+
        return 0;
 }
 
@@ -457,188 +536,48 @@ void _save_column_str(sqlite3_stmt *stmt, int idx, char **str)
                *str = strdup(val);
 }
 
-API int pkgmgrinfo_pkginfo_set_state_enabled(const char *pkgid, bool enabled)
+API int pkgmgrinfo_pkginfo_set_usr_installed_storage(const char *pkgid, INSTALL_LOCATION location, const char *external_pkg_path, uid_t uid)
 {
-       /* Should be implemented later */
-       return 0;
-}
-
-API int pkgmgrinfo_appinfo_set_usr_state_enabled(const char *appid, bool enabled, uid_t uid)
-{
-       int ret;
-       char query[MAX_QUERY_LEN] = {'\0'};
-       char *error_message;
-
-       retvm_if(appid == NULL, PMINFO_R_EINVAL, "appid is NULL\n");
-
-       /* Open db.*/
-       ret = __open_manifest_db(uid, false);
-       if (ret != SQLITE_OK) {
-               _LOGE("connect db [%s] failed!\n", getUserPkgParserDBPathUID(uid));
-               return PMINFO_R_ERROR;
-       }
-
-       /*Begin transaction*/
-       ret = sqlite3_exec(GET_DB(manifest_db), "BEGIN EXCLUSIVE", NULL, NULL, NULL);
-       if (ret != SQLITE_OK) {
-               _LOGE("Failed to begin transaction\n");
-               __close_manifest_db();
-               return PMINFO_R_ERROR;
-       }
-       _LOGD("Transaction Begin\n");
-
-       memset(query, '\0', MAX_QUERY_LEN);
-       snprintf(query, MAX_QUERY_LEN,
-               "update package_app_info set app_enabled='%s' where app_id='%s'", enabled?"true":"false", appid);
-
-       if (SQLITE_OK !=
-           sqlite3_exec(GET_DB(manifest_db), query, NULL, NULL, &error_message)) {
-               _LOGE("Don't execute query = %s error message = %s\n", query,
-                      error_message);
-               sqlite3_free(error_message);
-               return PMINFO_R_ERROR;
-       }
-       sqlite3_free(error_message);
-
-       /*Commit transaction*/
-       ret = sqlite3_exec(GET_DB(manifest_db), "COMMIT", NULL, NULL, NULL);
-       if (ret != SQLITE_OK) {
-               _LOGE("Failed to commit transaction. Rollback now\n");
-               sqlite3_exec(GET_DB(manifest_db), "ROLLBACK", NULL, NULL, NULL);
-               __close_manifest_db();
-               return PMINFO_R_ERROR;
-       }
-       _LOGD("Transaction Commit and End\n");
-       __close_manifest_db();
-       return PMINFO_R_OK;
-}
-
-API int pkgmgrinfo_appinfo_set_state_enabled(const char *appid, bool enabled)
-{
-       return pkgmgrinfo_appinfo_set_usr_state_enabled(appid, enabled, GLOBAL_USER);
-}
-
-API int pkgmgrinfo_appinfo_set_usr_default_label(const char *appid, const char *label, uid_t uid)
-{
-       int ret;
-       char query[MAX_QUERY_LEN] = {'\0'};
-       char *error_message;
-
-       retvm_if(appid == NULL, PMINFO_R_EINVAL, "appid is NULL\n");
-
-       ret = __open_manifest_db(uid, false);
-       if (ret == -1) {
-               _LOGE("Fail to open manifest DB\n");
-               return PMINFO_R_ERROR;
-       }
-
-       /*Begin transaction*/
-       ret = sqlite3_exec(GET_DB(manifest_db), "BEGIN EXCLUSIVE", NULL, NULL, NULL);
-       if (ret != SQLITE_OK) {
-               _LOGE("Failed to begin transaction\n");
-               __close_manifest_db();
-               return PMINFO_R_ERROR;
-       }
-       _LOGD("Transaction Begin\n");
-
-       memset(query, '\0', MAX_QUERY_LEN);
-       snprintf(query, MAX_QUERY_LEN,
-               "update package_app_localized_info set app_label='%s' where app_id='%s' and app_locale='No Locale'", label, appid);
+       retvm_if(pkgid == NULL, PMINFO_R_EINVAL, "pkgid is NULL\n");
+       int ret = -1;
+       sqlite3 *pkgmgr_parser_db = NULL;
+       char *query = NULL;
+       char *db_path;
 
-       if (SQLITE_OK !=
-           sqlite3_exec(GET_DB(manifest_db), query, NULL, NULL, &error_message)) {
-               _LOGE("Don't execute query = %s error message = %s\n", query,
-                      error_message);
-               sqlite3_free(error_message);
+       db_path = getUserPkgParserDBPathUID(uid);
+       if (db_path == NULL) {
+               _LOGE("Failed to get pkg parser db path - %d", uid);
                return PMINFO_R_ERROR;
        }
 
-       /*Commit transaction*/
-       ret = sqlite3_exec(GET_DB(manifest_db), "COMMIT", NULL, NULL, NULL);
+       ret = db_util_open_with_options(db_path, &pkgmgr_parser_db,
+                       SQLITE_OPEN_READWRITE, NULL);
        if (ret != SQLITE_OK) {
-               _LOGE("Failed to commit transaction. Rollback now\n");
-               sqlite3_exec(GET_DB(manifest_db), "ROLLBACK", NULL, NULL, NULL);
-               __close_manifest_db();
+               _LOGE("connect db failed!");
+               free(db_path);
                return PMINFO_R_ERROR;
        }
-       _LOGD("Transaction Commit and End\n");
-       __close_manifest_db();
-       return PMINFO_R_OK;
-}
-
-API int pkgmgrinfo_appinfo_set_default_label(const char *appid, const char *label)
-{
-       return pkgmgrinfo_appinfo_set_usr_default_label(appid, label, GLOBAL_USER);
-}
-
-API int pkgmgrinfo_appinfo_set_usr_guestmode_visibility(pkgmgrinfo_appinfo_h handle, uid_t uid, bool status)
-{
-       const char *val;
-       int ret;
-       char query[MAX_QUERY_LEN] = {'\0'};
-       char *errmsg;
-       sqlite3 *pkgmgr_parser_db;
-
-       retvm_if(handle == NULL, PMINFO_R_EINVAL, "appinfo handle is NULL\n");
-
-       pkgmgr_appinfo_x *info = (pkgmgr_appinfo_x *)handle;
-       val = info->app_info->guestmode_visibility;
-       if (val) {
-               ret = db_util_open_with_options(getUserPkgParserDBPathUID(uid), &pkgmgr_parser_db,
-                               SQLITE_OPEN_READWRITE, NULL);
-               if (ret != SQLITE_OK) {
-                       _LOGE("DB Open Failed\n");
-                       return PMINFO_R_ERROR;
-               }
-
-               /*TODO: Write to DB here*/
-               if (status == true)
-                       snprintf(query, MAX_QUERY_LEN, "update package_app_info set app_guestmodevisibility = 'true' where app_id = '%s'", (char *)info->app_info->appid);
-               else
-                       snprintf(query, MAX_QUERY_LEN, "update package_app_info set app_guestmodevisibility = 'false' where app_id = '%s'", (char *)info->app_info->appid);
-
-               ret = sqlite3_exec(pkgmgr_parser_db, query, NULL, NULL, &errmsg);
-               sqlite3_close(pkgmgr_parser_db);
-               if (ret != SQLITE_OK) {
-                       _LOGE("DB update [%s] failed, error message = %s\n", query, errmsg);
-                       free(errmsg);
-                       return PMINFO_R_ERROR;
-               }
-       }
-       return PMINFO_R_OK;
-}
-
-API int pkgmgrinfo_appinfo_set_guestmode_visibility(pkgmgrinfo_appinfo_h handle, bool status)
-{
-       return pkgmgrinfo_appinfo_set_usr_guestmode_visibility(handle, GLOBAL_USER, status);
-}
-
-API int pkgmgrinfo_pkginfo_set_usr_installed_storage(const char *pkgid, INSTALL_LOCATION location, uid_t uid)
-{
-       retvm_if(pkgid == NULL, PMINFO_R_EINVAL, "pkgid is NULL\n");
-       int ret = -1;
-       sqlite3 *pkgmgr_parser_db = NULL;
-       char *query = NULL;
-
-       ret = db_util_open_with_options(getUserPkgParserDBPathUID(uid), &pkgmgr_parser_db,
-                       SQLITE_OPEN_READWRITE, NULL);
-       retvm_if(ret != SQLITE_OK, PMINFO_R_ERROR, "connect db failed!");
+       free(db_path);
 
        /*Begin transaction*/
-       // Setting Manifest DB
+       /* Setting Manifest DB */
        ret = sqlite3_exec(pkgmgr_parser_db, "BEGIN EXCLUSIVE", NULL, NULL, NULL);
        tryvm_if(ret != SQLITE_OK, ret = PMINFO_R_ERROR, "Failed to begin transaction\n");
        _LOGD("Transaction Begin\n");
 
-       // pkgcakge_info table
-       query = sqlite3_mprintf("update package_info set installed_storage=%Q where package=%Q", location?"installed_external":"installed_internal", pkgid);
+       /* pkgcakge_info table */
+       query = sqlite3_mprintf(
+                       "update package_info set installed_storage=%Q, external_path=%Q where package=%Q",
+                       location ? "installed_external" : "installed_internal", external_pkg_path, pkgid);
 
        ret = sqlite3_exec(pkgmgr_parser_db, query, NULL, NULL, NULL);
        tryvm_if(ret != SQLITE_OK, ret = PMINFO_R_ERROR, "Don't execute query = %s\n", query);
        sqlite3_free(query);
 
-       // package_app_info table
-       query = sqlite3_mprintf("update package_app_info set app_installed_storage=%Q where package=%Q", location?"installed_external":"installed_internal", pkgid);
+       /* package_app_info table */
+       query = sqlite3_mprintf(
+                       "update package_app_info set app_installed_storage=%Q, app_external_path=%Q where package=%Q",
+                       location ? "installed_external" : "installed_internal", external_pkg_path, pkgid);
 
        ret = sqlite3_exec(pkgmgr_parser_db, query, NULL, NULL, NULL);
        tryvm_if(ret != SQLITE_OK, ret = PMINFO_R_ERROR, "Don't execute query = %s\n", query);
@@ -659,7 +598,7 @@ catch:
        return ret;
 }
 
-API int pkgmgrinfo_pkginfo_set_installed_storage(const char *pkgid, INSTALL_LOCATION location)
+API int pkgmgrinfo_pkginfo_set_installed_storage(const char *pkgid, INSTALL_LOCATION location, const char *external_pkg_path)
 {
-       return pkgmgrinfo_pkginfo_set_usr_installed_storage(pkgid, location, GLOBAL_USER);
+       return pkgmgrinfo_pkginfo_set_usr_installed_storage(pkgid, location, external_pkg_path, _getuid());
 }