SET(INCLUDEDIR ${INCLUDE_INSTALL_DIR})
INCLUDE(FindPkgConfig)
-pkg_check_modules(privacy-manager-client REQUIRED dlog sqlite3 dbus-1 dbus-glib-1 db-util pkgmgr-info)
+pkg_check_modules(privacy-manager-client REQUIRED dlog sqlite3 dbus-1 dbus-glib-1 db-util pkgmgr-info libtzplatform-config)
FOREACH(flag ${pkgs_CFLAGS})
SET(EXTRA_CFLAGS "${EXTRA_CFLAGS} ${flag}")
{
static const std::string PrivacyQuery = "SELECT IS_ENABLED from PrivacyInfo where PKG_ID=? and PRIVACY_ID=?";
- openDb(PRIVACY_DB_PATH.c_str(), pDbH, SQLITE_OPEN_READONLY);
+ openDb(PRIVACY_DB_PATH, pDbH, SQLITE_OPEN_READONLY);
prepareDb(pDbH, PrivacyQuery.c_str(), pPrivacyStmt);
int res = sqlite3_bind_text(pPrivacyStmt.get(), 1, pkgId.c_str(), -1, SQLITE_TRANSIENT);
TryReturn( res == 0, PRIV_MGR_ERROR_DB_ERROR, , "sqlite3_bind_text : %d", res);
pkgCacheMap.clear();
- openDb(PRIVACY_DB_PATH.c_str(), pDbH, SQLITE_OPEN_READONLY);
+ openDb(PRIVACY_DB_PATH, pDbH, SQLITE_OPEN_READONLY);
prepareDb(pDbH, PrivacyQuery.c_str(), pPrivacyStmt);
int res = sqlite3_bind_text(pPrivacyStmt.get(), 1, pkgId.c_str(), -1, SQLITE_TRANSIENT);
TryReturn( res == SQLITE_OK, PRIV_MGR_ERROR_DB_ERROR, , "sqlite3_bind_text : %d", res);
#include <string>
#include <privacy_manager_client_types.h>
+#include <tzplatform_config.h>
-static const std::string PRIVACY_DB_PATH("/opt/dbspace/.privacy.db");
-static const std::string PRIVACY_INFO_DB_PATH("/opt/dbspace/.privacylist.db");
+#define PRIVACY_DB_PATH tzplatform_mkpath(TZ_SYS_DB,".privacy.db")
+#define PRIVACY_INFO_DB_PATH tzplatform_mkpath(TZ_SYS_DB,".privacylist.db")
static const std::string SERVER_ADDRESS ("/tmp/privacy_manager_server");
static const std::string DBUS_PATH("/privacy_manager/dbus_notification");
static const std::string DBUS_SIGNAL_INTERFACE("org.tizen.privacy_manager.signal");
{
static const std::string query = std::string("UPDATE PrivacyInfo set IS_ENABLED =? where PKG_ID=? and PRIVACY_ID=?");
- openDb(PRIVACY_DB_PATH.c_str(), pDbHandler, SQLITE_OPEN_READWRITE);
+ openDb(PRIVACY_DB_PATH, pDbHandler, SQLITE_OPEN_READWRITE);
prepareDb(pDbHandler, query.c_str(), pStmt);
int res = sqlite3_bind_int(pStmt.get(), 1, enabled);
{
std::string query = "SELECT PKG_ID from PackageInfo";
- openDb(PRIVACY_DB_PATH.c_str(), pDbHandler, SQLITE_OPEN_READONLY);
+ openDb(PRIVACY_DB_PATH, pDbHandler, SQLITE_OPEN_READONLY);
prepareDb(pDbHandler, query.c_str(), pStmt);
while ( sqlite3_step(pStmt.get()) == SQLITE_ROW )
{
static const std::string query = "SELECT PRIVACY_ID, IS_ENABLED from PrivacyInfo where PKG_ID=?";
- openDb(PRIVACY_DB_PATH.c_str(), pDbHandler, SQLITE_OPEN_READONLY);
+ openDb(PRIVACY_DB_PATH, pDbHandler, SQLITE_OPEN_READONLY);
prepareDb(pDbHandler, query.c_str(), pStmt);
int res = sqlite3_bind_text(pStmt.get(), 1, pkgId.c_str(), -1, SQLITE_TRANSIENT);
static const std::string pkgInfoQuery("INSERT INTO PackageInfo(PKG_ID, IS_SET) VALUES(?, ?)");
static const std::string privacyQuery("INSERT INTO PrivacyInfo(PKG_ID, PRIVACY_ID, IS_ENABLED) VALUES(?, ?, ?)");
- openDb(PRIVACY_DB_PATH.c_str(), pDbHandler, SQLITE_OPEN_READWRITE);
+ openDb(PRIVACY_DB_PATH, pDbHandler, SQLITE_OPEN_READWRITE);
prepareDb(pDbHandler, pkgInfoQuery.c_str(), pPkgInfoStmt);
int res = sqlite3_bind_text(pPkgInfoStmt.get(), 1, pkgId.c_str(), -1, SQLITE_TRANSIENT);
int res;
- openDb(PRIVACY_DB_PATH.c_str(), pDbHandler, SQLITE_OPEN_READWRITE);
+ openDb(PRIVACY_DB_PATH, pDbHandler, SQLITE_OPEN_READWRITE);
prepareDb(pDbHandler, pkgInfoQuery.c_str(), pPkgInfoStmt);
res = sqlite3_bind_text(pPkgInfoStmt.get(), 1, pkgId.c_str(), -1, SQLITE_TRANSIENT);
return 0;
}
- openDb(PRIVACY_DB_PATH.c_str(), pDbHandler, SQLITE_OPEN_READONLY);
+ openDb(PRIVACY_DB_PATH, pDbHandler, SQLITE_OPEN_READONLY);
prepareDb(pDbHandler, query.c_str(), pStmt);
int res = sqlite3_bind_text(pStmt.get(), 1, pkgId.c_str(), -1, SQLITE_TRANSIENT);
int res;
- openDb(PRIVACY_DB_PATH.c_str(), pDbHandler, SQLITE_OPEN_READWRITE);
+ openDb(PRIVACY_DB_PATH, pDbHandler, SQLITE_OPEN_READWRITE);
prepareDb(pDbHandler, query.c_str(), pStmt);
res = sqlite3_bind_int(pStmt.get(), 1, prompted? 1 : 0);
{
std::string sql = std::string("SELECT PKG_ID, IS_ENABLED from PrivacyInfo where PRIVACY_ID=?");
- openDb(PRIVACY_DB_PATH.c_str(), pDbHandler, SQLITE_OPEN_READWRITE);
+ openDb(PRIVACY_DB_PATH, pDbHandler, SQLITE_OPEN_READWRITE);
prepareDb(pDbHandler, sql.c_str(), pStmt);
SECURE_LOGD("privacy id : %s", privacyId.c_str());
static const std::string sqlPrivilege("SELECT PRIVILEGE_ID, PRIVACY_ID from PrivilegeToPrivacyTable");
static const std::string sqlPrivacyInfo("SELECT FEATURE FROM PrivacyInfo where PRIVACY_ID=?");
- openDb(PRIVACY_INFO_DB_PATH.c_str(), pDbHandler, SQLITE_OPEN_READONLY);
+ openDb(PRIVACY_INFO_DB_PATH, pDbHandler, SQLITE_OPEN_READONLY);
prepareDb(pDbHandler, sqlPrivilege.c_str(), pStmtPrivilege);
int res;
initialize();
}
- openDb(PRIVACY_INFO_DB_PATH.c_str(), pDbHandler, SQLITE_OPEN_READONLY);
+ openDb(PRIVACY_INFO_DB_PATH, pDbHandler, SQLITE_OPEN_READONLY);
prepareDb(pDbHandler, sql.c_str(), pStmt);
int res;
std::string sql = std::string("SELECT STR_MODULE_ID, STR_NAME_ID from PrivacyInfo where PRIVACY_ID=?");
- openDb(PRIVACY_INFO_DB_PATH.c_str(), pDbHandler, SQLITE_OPEN_READONLY);
+ openDb(PRIVACY_INFO_DB_PATH, pDbHandler, SQLITE_OPEN_READONLY);
prepareDb(pDbHandler, sql.c_str(), pStmt);
int res = sqlite3_bind_text(pStmt.get(), 1, privacyId.c_str(), -1, SQLITE_TRANSIENT);
std::string sql = std::string("SELECT STR_MODULE_ID, STR_NAME_ID from PrivacyInfo where PRIVACY_ID=?");
- openDb(PRIVACY_INFO_DB_PATH.c_str(), pDbHandler, SQLITE_OPEN_READONLY);
+ openDb(PRIVACY_INFO_DB_PATH, pDbHandler, SQLITE_OPEN_READONLY);
prepareDb(pDbHandler, sql.c_str(), pStmt);
int res = sqlite3_bind_text(pStmt.get(), 1, privacyId.c_str(), -1, SQLITE_TRANSIENT);
BuildRequires: pkgconfig(pkgmgr-info)
BuildRequires: pkgconfig(sqlite3)
BuildRequires: pkgconfig(capi-system-info)
+BuildRequires: pkgconfig(libtzplatform-config)
Requires(post): /sbin/ldconfig
Requires(postun): /sbin/ldconfig
%install
mkdir -p %{buildroot}%{_prefix}/bin
cp res/usr/bin/* %{buildroot}%{_bindir}/
-mkdir -p %{buildroot}/opt/dbspace
-cp res/opt/dbspace/.privacylist.db /%{buildroot}/opt/dbspace/
+mkdir -p %{buildroot}%{TZ_SYS_DB}
+cp res/opt/dbspace/.privacylist.db /%{buildroot}%{TZ_SYS_DB}
mkdir -p %{buildroot}%{_datadir}/privacy-manager/
cp res/usr/share/privacy-manager/privacy-filter-list.ini %{buildroot}%{_datadir}/privacy-manager/
/sbin/ldconfig
echo "Check privacy DB"
-if [ ! -f /opt/dbspace/.privacy.db ]
+if [ ! -f %{TZ_SYS_DB}/.privacy.db ]
then
echo "Create privacy DB"
- /usr/bin/privacy_manager_create_clean_db.sh
+ %{_bindir}/privacy_manager_create_clean_db.sh
fi
%postun -p /sbin/ldconfig
%license LICENSE.APLv2
%manifest privacy-manager-server.manifest
%{_libdir}/libprivacy-manager-server.so*
-/opt/dbspace/.privacylist.db
+%{TZ_SYS_DB}/.privacylist.db
/usr/bin/*
%files -n privacy-manager-server-devel
# See the License for the specific language governing permissions and
# limitations under the License.
#
+source /etc/tizen-platform.conf
for name in privacy
do
- rm -f /opt/dbspace/.$name.db
- rm -f /opt/dbspace/.$name.db-journal
+ rm -f ${TZ_SYS_DB}/.$name.db
+ rm -f ${TZ_SYS_DB}/.$name.db-journal
SQL="PRAGMA journal_mode = PERSIST;"
- sqlite3 /opt/dbspace/.$name.db "$SQL"
+ sqlite3 ${TZ_SYS_DB}/.$name.db "$SQL"
SQL=".read /usr/bin/"$name"_db.sql"
- sqlite3 /opt/dbspace/.$name.db "$SQL"
- touch /opt/dbspace/.$name.db-journal
- chown 0:0 /opt/dbspace/.$name.db
- chown 0:0 /opt/dbspace/.$name.db-journal
- chmod 664 /opt/dbspace/.$name.db
- chmod 664 /opt/dbspace/.$name.db-journal
+ sqlite3 ${TZ_SYS_DB}/.$name.db "$SQL"
+ touch ${TZ_SYS_DB}/.$name.db-journal
+ chown root:root ${TZ_SYS_DB}/.$name.db
+ chown root:root ${TZ_SYS_DB}/.$name.db-journal
+ chmod 664 ${TZ_SYS_DB}/.$name.db
+ chmod 664 ${TZ_SYS_DB}/.$name.db-journal
done
SET(INCLUDEDIR "\${prefix}/include")
INCLUDE(FindPkgConfig)
-pkg_check_modules(pkgs REQUIRED dlog sqlite3 dbus-1 dbus-glib-1 db-util pkgmgr-info capi-system-info)
+pkg_check_modules(pkgs REQUIRED dlog sqlite3 dbus-1 dbus-glib-1 db-util pkgmgr-info capi-system-info libtzplatform-config)
FOREACH(flag ${pkgs_CFLAGS})
SET(EXTRA_CFLAGS "${EXTRA_CFLAGS} ${flag}")