* limitations under the License.
*/
/*
- * @file privacy_list_view.c
- * @author Yunjin Lee (yunjin-.lee@samsung.com)
- * @version 1.0
+ * @file privacy_list_view.c
+ * @author Yunjin Lee (yunjin-.lee@samsung.com)
+ * @version 1.0
* @brief
*/
elm_genlist_item_class_free(itc);
evas_object_show(genlist);
- /* Change "Privacy Setting" to proper DID : use dgettext() */
Elm_Object_Item *nf_it = elm_naviframe_item_push(ad->nf, dgettext("privacy-setting", PRIVACY_MENU_SETTING), common_back_btn_add(ad), NULL, genlist, NULL);
elm_object_item_domain_text_translatable_set(nf_it, PACKAGE, EINA_TRUE);
static char* gl_text_get_cb(void *data, Evas_Object *obj, const char *part)
{
item_data_s *id = data;
- /* TBD: Use dgettext when menu string is replaced by DID */
lreturn_if(!strcmp(part, "elm.text"), , strdup(id->title), "selected menu = %s", id->title);
return "FAIL";
}
elm_genlist_item_class_free(itc);
evas_object_show(genlist);
- /* Change "Privacy & Safety" to proper DID : use dgettext() */
- char* title = dgettext("privacy-setting", "IDS_ST_HEADER_PRIVACY_AND_SAFETY_ABB");
+ char* title = dgettext("privacy-setting", PRIVACY_MENU_SETTING);
Elm_Object_Item *nf_it = elm_naviframe_item_push(ad->nf, title, common_back_btn_add(ad), NULL, genlist, NULL);
elm_object_item_domain_text_translatable_set(nf_it, PACKAGE, EINA_TRUE);
* limitations under the License.
*/
/*
- * @file privacy_package_list_view.c
- * @author Yunjin Lee (yunjin-.lee@samsung.com)
- * @version 1.0
+ * @file privacy_package_list_view.c
+ * @author Yunjin Lee (yunjin-.lee@samsung.com)
+ * @version 1.0
* @brief
*/
for (i = 0; i < pp_policy_size; ++i) {
char* result = (char*)security_manager_policy_entry_get_level(pp_policy[i]);
log_if(result == NULL, 1, "security_manager_policy_entry_get_level failed. No policy is declared for pkgid: %s, appid: %s, privilege: %s", pkg_data->pkgid, appid, privilege_name);
+ LOGD("policy status = %s", result);
if (strcmp("Allow", result) == 0) {
pkg_data->status = EINA_TRUE;
break;
- } else if (strcmp("Deny", result) == 0) {/* TBD: Handle AskUser case? */
+ } else if (strcmp("Deny", result) == 0 || strcmp("Ask user", result) == 0) {
pkg_data->status = EINA_FALSE;
break;
} else {
char* level;
if (id->status) {
- level = "Deny";
+ level = "Ask user";
id->status = false;
} else {
level = "Allow";
/* Make policy entries to update according to the number of privilege and appid of package */
policy_entry *entry[entry_num];
int entry_index = 0;
- /* TBD: Modify appid to pkgid : remove for loop */
for (ll = pkg_data->applist; ll != NULL; ll = ll->next) {
char* appid = (char*)ll->data;
for (lll = pkg_data->privlist; lll != NULL; lll = lll->next) {
ret = security_manager_policy_entry_new(&entry[entry_index]);
log_if(ret != SECURITY_MANAGER_SUCCESS, 1, "security_manager_policy_entry_new failed. ret = %d", ret);
log_if(entry[entry_index] == NULL, 1, "security_manager_policy_entry_new failed failed. creation of new policy entry did not allocate memory");
- /* TBD: Modify appid to pkgid */
ret = security_manager_policy_entry_set_application(entry[entry_index], appid);
log_if(ret != SECURITY_MANAGER_SUCCESS, 1, "security_manager_policy_entry_set_application failed. ret = %d", ret);
ret = security_manager_policy_entry_set_privilege(entry[entry_index], privilege_name);
}
}
-/* TBD: Modify appid to pkgid : remove following function */
static int pkg_app_list_cb(pkgmgrinfo_appinfo_h pkg_handle, void* user_data)
{
char* appid = NULL;