auth_adaptor_error("Login returns success but access_token is NULL");
ret = AUTH_ADAPTOR_ERROR_PLUGIN_INTERNAL;
- if (NULL != error_code)
- {
+ if (NULL != error_code) {
*error_code = auth_adaptor_create_error_code((int64_t) AUTH_ADAPTOR_ERROR_PLUGIN_INTERNAL,
"Plugin returns Login success but access_token is Empty");
}
{
push_adaptor_info("Check push connection");
- if ((NULL == context) || (NULL == is_connected)){
+ if ((NULL == context) || (NULL == is_connected)) {
return PUSH_ADAPTOR_ERROR_INVALID_ARGUMENT;
}
return ret;
}
-struct __login_request_context
-{
+struct __login_request_context {
void *callback;
void *user_data;
};
-static void __dbus_login_result_callback (GObject *source_object,
+static void __dbus_login_result_callback(GObject *source_object,
GAsyncResult *res,
gpointer user_data)
{
service_adaptor_plugin_h plugin = NULL;
plugin = (service_adaptor_plugin_h) calloc(1, sizeof(service_adaptor_plugin_s));
char *_plugin_uri = strdup(plugin_uri);
- if ((NULL == plugin) || (NULL == _plugin_uri)){
+ if ((NULL == plugin) || (NULL == _plugin_uri)) {
free(plugin);
free(_plugin_uri);
return SERVICE_ADAPTOR_ERROR_UNKNOWN;
int _get_result_code(long long int error_code)
{
switch (error_code) {
- case SERVICE_ADAPTOR_PROTOCOL_RETURN_CODE_NONE:
- return SERVICE_ADAPTOR_ERROR_NONE;
- case SERVICE_ADAPTOR_PROTOCOL_RETURN_CODE_COMMON_NO_DATA:
- sac_error("SERVICE_ADAPTOR_ERROR_NO_DATA");
- return SERVICE_ADAPTOR_ERROR_NO_DATA;
- case SERVICE_ADAPTOR_PROTOCOL_RETURN_CODE_COMMON_TIMED_OUT:
- sac_error("SERVICE_ADAPTOR_ERROR_TIMED_OUT");
- return SERVICE_ADAPTOR_ERROR_TIMED_OUT;
- case SERVICE_ADAPTOR_PROTOCOL_RETURN_CODE_COMMON_NOT_SUPPORTED:
- sac_error("SERVICE_ADAPTOR_ERROR_NOT_SUPPORTED");
- return SERVICE_ADAPTOR_ERROR_NOT_SUPPORTED;
- case SERVICE_ADAPTOR_PROTOCOL_RETURN_CODE_COMMON_PERMISSION_DENIED:
- sac_error("SERVICE_ADAPTOR_ERROR_PERMISSION_DENIED");
- return SERVICE_ADAPTOR_ERROR_PERMISSION_DENIED;
-
- case SERVICE_ADAPTOR_PROTOCOL_RETURN_CODE_AUTH_NOT_AUTHORIZED:
- sac_error("SERVICE_ADAPTOR_ERROR_NOT_AUTHORIZED");
- return SERVICE_ADAPTOR_ERROR_NOT_AUTHORIZED;
-
- case SERVICE_ADAPTOR_PROTOCOL_RETURN_CODE_MESSAGE_NETWORK:
- sac_error("SERVICE_ADAPTOR_ERROR_NETWORK");
- return SERVICE_ADAPTOR_ERROR_NETWORK;
-
- default:
- sac_error("SERVICE_ADAPTOR_ERROR_PLUGIN_FAILED");
- return SERVICE_ADAPTOR_ERROR_PLUGIN_FAILED;
+ case SERVICE_ADAPTOR_PROTOCOL_RETURN_CODE_NONE:
+ return SERVICE_ADAPTOR_ERROR_NONE;
+ case SERVICE_ADAPTOR_PROTOCOL_RETURN_CODE_COMMON_NO_DATA:
+ sac_error("SERVICE_ADAPTOR_ERROR_NO_DATA");
+ return SERVICE_ADAPTOR_ERROR_NO_DATA;
+ case SERVICE_ADAPTOR_PROTOCOL_RETURN_CODE_COMMON_TIMED_OUT:
+ sac_error("SERVICE_ADAPTOR_ERROR_TIMED_OUT");
+ return SERVICE_ADAPTOR_ERROR_TIMED_OUT;
+ case SERVICE_ADAPTOR_PROTOCOL_RETURN_CODE_COMMON_NOT_SUPPORTED:
+ sac_error("SERVICE_ADAPTOR_ERROR_NOT_SUPPORTED");
+ return SERVICE_ADAPTOR_ERROR_NOT_SUPPORTED;
+ case SERVICE_ADAPTOR_PROTOCOL_RETURN_CODE_COMMON_PERMISSION_DENIED:
+ sac_error("SERVICE_ADAPTOR_ERROR_PERMISSION_DENIED");
+ return SERVICE_ADAPTOR_ERROR_PERMISSION_DENIED;
+
+ case SERVICE_ADAPTOR_PROTOCOL_RETURN_CODE_AUTH_NOT_AUTHORIZED:
+ sac_error("SERVICE_ADAPTOR_ERROR_NOT_AUTHORIZED");
+ return SERVICE_ADAPTOR_ERROR_NOT_AUTHORIZED;
+
+ case SERVICE_ADAPTOR_PROTOCOL_RETURN_CODE_MESSAGE_NETWORK:
+ sac_error("SERVICE_ADAPTOR_ERROR_NETWORK");
+ return SERVICE_ADAPTOR_ERROR_NETWORK;
+
+ default:
+ sac_error("SERVICE_ADAPTOR_ERROR_PLUGIN_FAILED");
+ return SERVICE_ADAPTOR_ERROR_PLUGIN_FAILED;
}
}
{
SAL_FN_CALL;
- USER_DATA_DEFINE(_ipc_state_data_t, _callback_data) = (USER_DATA_TYPE(_ipc_state_data_t) *)user_data;
+ USER_DATA_DEFINE(_ipc_state_data_t, _callback_data) = (USER_DATA_TYPE(_ipc_state_data_t)*)user_data;
service_provider_channel_cb callback = (service_provider_channel_cb)USER_DATA_ELEMENT(_callback_data, 0);
void *_user_data = (void *)USER_DATA_ELEMENT(_callback_data, 1);
SAL_FN_END;
}
-API int service_provider_set_storage_provider (storage_provider_s *storage_provider, void *user_data)
+API int service_provider_set_storage_provider(storage_provider_s *storage_provider, void *user_data)
{
SAL_FN_CALL;
static
void plugin_internal_ConfigData_cbMapStrSectionFreeData(gpointer data);
+#if 0
/**
* @brief Function passed to g_hash_table_foreach().
* Function is called for each key/value pair.
void plugin_internal_ConfigData_cbMapStrSectionCopy(gpointer key,
gpointer value,
gpointer user_data);
+
+
/**
* @brief Function passed to g_list_foreach().
* The function called for each element's data.
static
gpointer plugin_internal_ConfigData_cbListSectionCopy(gconstpointer data,
gpointer user_data);
+#endif
/**
* @brief The function to be called to free each element's data.
char separator);
/* Public */
+#if 0
/**
* @brief ...
*
plugin_internal_ConfigData_hasSection(const plugin_internal_ConfigData *self,
const char *section);
+
/**
* @brief This method assumes that the given section exists. Use hasSection()
* first, or use hasSectionAndKey() instead.
plugin_internal_ConfigData_hasKey(const plugin_internal_ConfigData *self,
const char *section,
const char *key);
+#endif
/**
* @brief ...
const char *section,
const char *key);
+#if 0
/**
* @brief ...
*
static
PluginConfigType
plugin_internal_ConfigData_getType(const plugin_internal_ConfigData *self);
+#endif
/**
* @brief ...
}
ConfigParserState state;
+ state.current_section = NULL;
while ((read = getline(&line, &len, fp)) != -1) {
/* printf("Retrieved line of length %zu :\n", read); */
return self;
}
+#if 0
/******************************************************************************/
static
void plugin_internal_ConfigData_cbMapStrSectionEntryCopy(gpointer key,
}
/******************************************************************************/
+
static
void plugin_internal_ConfigData_cbMapStrSectionCopy(gpointer key,
gpointer value,
}
/******************************************************************************/
+#endif
+
#if 0
static
plugin_internal_ConfigData *
g_hash_table_insert(state->current_section, strdup(key), strdup(value));
}
- if (NULL != key) {
+ if (NULL != key) {
free(key);
key = NULL;
}
endfunc;
}
-
+#if 0
/******************************************************************************/
static
bool
endfunc;
return result;
}
+#endif
/******************************************************************************
* PUBLIC
******************************************************************************/
+#if 0
static
bool
plugin_internal_ConfigData_hasSection(const plugin_internal_ConfigData *self,
endfunc;
return result;
}
-
+#endif
/******************************************************************************/
static
bool
return result;
}
+#if 0
/******************************************************************************/
static
const char *
endfunc;
return result;
}
+#endif
/******************************************************************************/
static
static
int plugin_Config_getInt(plugin_Config *self, const char *section, const char *key);
+#if 0
/**
* @brief From _loaded configuration, gets double value attached to given key.
*
**/
static
double getDouble(plugin_Config *self, const char *section, const char *key);
+#endif
/******************************************************************************
* Definitiions (methods of Config class)
char *ipc_g_variant_dup_contact_string(GVariant *string)
{
- char *ret = g_variant_dup_string(string, NULL);
+ char *ret = g_variant_dup_string(string, NULL);
const int contact_protocol_padding_length = 1;
- if (0 == strcmp(ret, "")) {
- free(ret);
- ret = NULL;
- } else if (0 < strlen(ret)) {
+ if (0 == strcmp(ret, "")) {
+ free(ret);
+ ret = NULL;
+ } else if (0 < strlen(ret)) {
char *dummy = ret;
ret = strdup((dummy + contact_protocol_padding_length));
free(dummy);
}
- return ret;
+ return ret;
}
} _push_data_s;
static void g_bus_async_ready_callback(GObject *source_object,
- GAsyncResult *res,
- gpointer user_data)
+ GAsyncResult *res,
+ gpointer user_data)
{
service_adaptor_debug("[START] Push dbus proxy creation callback");
GDBusProxy *_proxy = (GDBusProxy *) source_object;
(x)->extra_cloud_meta = NULL; } while (0)
#define FILE_INFO_CLEAR(x) do {\
- (x)->plugin_uri = NULL;\
- (x)->object_id = NULL;\
- (x)->storage_path = NULL;\
- (x)->file_size = 0ULL;\
+ (x)->plugin_uri = NULL;\
+ (x)->object_id = NULL;\
+ (x)->storage_path = NULL;\
+ (x)->file_size = 0ULL;\
\
(x)->revision = -1;\
(x)->timestamp = 0ULL;\
static GList *g_push_activate_list = NULL;
-static GMutex g_push_activate_mutex;
+/* static GMutex g_push_activate_mutex; */
static GMutex g_push_reconnect_mutex;
* Internal function prototype
*************************************************/
+#ifdef SA_PUSH_ON_DEMAND_ENABLE
static push_activate_h _create_push_handle_by_service_file(service_file_h file);
static void _add_push_service_file(const char *service_file_name);
static void _load_all_push_service_file(void);
static void _unload_all_push_service_file(void);
+#endif
static void push_data_dbus_activate_callback(const char *app_id, const char *session_info, long long int timestamp, const char *data, const char *message);
/*************************************************
* Internal function definition
*************************************************/
-
+#ifdef SA_PUSH_ON_DEMAND_ENABLE
static push_activate_h _create_push_handle_by_service_file(service_file_h file)
{
service_adaptor_debug("<Start> %s", __FUNCTION__);
service_adaptor_debug("<End> %s", __FUNCTION__);
}
+
static void _unload_all_push_service_file(void)
{
service_adaptor_debug("<Start> %s", __FUNCTION__);
service_adaptor_debug("<End> %s", __FUNCTION__);
}
+
static void _add_push_service_file(const char *service_file_name)
{
service_adaptor_debug("<Start> %s", __FUNCTION__);
service_adaptor_debug("<End> %s", __FUNCTION__);
}
+#endif
/***********************************************************
******************************************************************************/
#define __init_context_info_s(x) do { \
- (x).user_id = NULL; \
- (x).app_id = NULL; \
- (x).service_id = 0U; \
- (x).imsi = NULL; \
- (x).duid = NULL; \
- (x).msisdn = NULL; \
- (x).access_token = NULL; \
- (x).refresh_token = NULL; \
- (x).property = NULL; \
- } while (0)
+ (x).user_id = NULL; \
+ (x).app_id = NULL; \
+ (x).service_id = 0U; \
+ (x).imsi = NULL; \
+ (x).duid = NULL; \
+ (x).msisdn = NULL; \
+ (x).access_token = NULL; \
+ (x).refresh_token = NULL; \
+ (x).property = NULL; \
+ } while (0)
/******************************************************************************
}
static void __glog_handler_cb(const gchar *log_domain,
- GLogLevelFlags log_level,
- const gchar *message,
- gpointer user_data)
+ GLogLevelFlags log_level,
+ const gchar *message,
+ gpointer user_data)
{
- service_adaptor_error("============================================================");
- service_adaptor_error("============================================================");
- service_adaptor_error("================== Critical GLib Error =====================");
- service_adaptor_error("============================================================");
- service_adaptor_error("============================================================");
- service_adaptor_error("=== Log Domain : %s", log_domain);
- service_adaptor_error("=== Level : %d", (int)log_level);
- service_adaptor_error("=== Message : %s", message);
- service_adaptor_error("============================================================");
- service_adaptor_error("============================================================");
+ service_adaptor_error("============================================================");
+ service_adaptor_error("============================================================");
+ service_adaptor_error("================== Critical GLib Error =====================");
+ service_adaptor_error("============================================================");
+ service_adaptor_error("============================================================");
+ service_adaptor_error("=== Log Domain : %s", log_domain);
+ service_adaptor_error("=== Level : %d", (int)log_level);
+ service_adaptor_error("=== Message : %s", message);
+ service_adaptor_error("============================================================");
+ service_adaptor_error("============================================================");
}
static void glog_handler_init()
* Internal function prototype
*************************************************/
-static client_data_s *__client_data_create(void);
+/* static client_data_s *__client_data_create(void); */
static void __client_data_free(void *data);
* Internal function definition
*************************************************/
+/*
static client_data_s *__client_data_create(void)
{
client_data_s *data = (client_data_s *) calloc(1, sizeof(client_data_s));
}
return data;
}
+*/
static void __client_data_free(void *data)
{
static int __get_dir_path(const char *path, char **dir_path)
{
- if ((NULL == path) || ('/' != path[0]) || (1 >= strlen(path))) {
+ if ((NULL == path) || ('/' != path[0]) || (1 >= strlen(path))) {
/* path must be absolute path (starts with '/') */
__set_last_error("[Permission checker] Path must be absolute path (starts with '/')");
- return -1;
- }
+ return -1;
+ }
- char *full_path = strdup(path);
- if (NULL == full_path) {
+ char *full_path = strdup(path);
+ if (NULL == full_path) {
/* dup failed */
__set_last_error("[Permission checker] Internal error");
- return -1;
- } else if (full_path[strlen(full_path) - 1] == '/') {
+ return -1;
+ } else if (full_path[strlen(full_path) - 1] == '/') {
/* if full_path is "/abc/d/" -> "abc/d" */
- full_path[strlen(full_path) - 1] = '\0';
- }
+ full_path[strlen(full_path) - 1] = '\0';
+ }
- char *base = strrchr(full_path, '/');
- if (base == full_path) {
+ char *base = strrchr(full_path, '/');
+ if (base == full_path) {
/* if full_path is "/abc" */
- *dir_path = strdup("/");
- } else if (NULL != base) {
+ *dir_path = strdup("/");
+ } else if (NULL != base) {
/* expected case */
- *dir_path = strndup(full_path, (base - full_path));
- } else {
+ *dir_path = strndup(full_path, (base - full_path));
+ } else {
__set_last_error("[Permission checker] Invalid path (Can not parse string)");
- free(full_path);
- return -1;
- }
- free(full_path);
+ free(full_path);
+ return -1;
+ }
+ free(full_path);
- return 0;
+ return 0;
}
{
int ret;
char *target_label = NULL;
- char *check_permission = NULL;
+ /* char *check_permission = NULL; */
service_adaptor_debug("service_handle(%s), path(%s)", service_handle_name, path);
if (NULL == path) {
__set_last_error("[Permission checker] Invalid path");
/* Check to 'r' permission to path */
/*
check_permission = "r";
- service_adaptor_info("[serice-adaptor] check path execute permission : <path : %s> <right : %s>", path, check_permission);
+ service_adaptor_info("[serice-adaptor] check path execute permission : <path : %s> <right : %s>", path, check_permission);
free(target_label);
target_label = NULL;
ret = smack_getlabel(path, &target_label, SMACK_LABEL_ACCESS);
int client_checker_check_access_right_create(const char *service_handle_name, const char *path)
{
int ret;
- char *target_label = NULL;
- char *check_permission = NULL;
+ /* char *target_label = NULL; */
+ /* char *check_permission = NULL; */
service_adaptor_debug("service_handle(%s), path(%s)", service_handle_name, path);
if (NULL == path) {
return -801;
}
service_adaptor_info("=== === === return %s === === ===",
- (g_ping_watcher_stop == TRUE)?"TRUE":"FALSE");
+ (g_ping_watcher_stop == TRUE) ? "TRUE" : "FALSE");
#ifdef PEERS_INFO_DEBUG
}