BuildRequires: pkgconfig(cmocka)
BuildRequires: pkgconfig(gtest)
BuildRequires: pkgconfig(gmock)
+BuildRequires: pkgconfig(security-manager)
Requires: %{name}-tools = %{version}-%{release}
%{?systemd_requires}
return G_SOURCE_REMOVE;
}
- if (!syscommon_proc_is_app(dl->pid)) {
+ if (!deviced_apps_check_is_app(dl->pid)) {
/* For daemon, no need to ask resourced if it is abnormal lock */
// TODO: is it correct?
broadcast_lock_watchdog_expired(dl->pid, dl->state, NULL, dl->time);
dlog
bundle
capi-system-info
- eventsystem)
+ eventsystem
+ security-manager)
FILE(GLOB SHARED_SRCS "*.c")
ADD_LIBRARY(deviced-common-private SHARED ${SHARED_SRCS})
*/
#include <stdarg.h>
+#include <security-manager/app-runtime.h>
#include <libsyscommon/libgdbus.h>
#include <libsyscommon/bitmap.h>
#include <system/syscommon-plugin-deviced-common-interface.h>
_E("Invalid as=%d", as);
}
+int deviced_apps_check_is_app(pid_t pid)
+{
+ bool is_app = false;
+ int ret;
+
+ ret = security_manager_is_app_from_pid(pid, &is_app);
+ if (ret != SECURITY_MANAGER_SUCCESS)
+ return -1;
+
+ return is_app;
+}
+
static void __CONSTRUCTOR__ initialize(void)
{
init_bm_background();
int remove_notification(char *type, int id);
void set_app_state(pid_t pid, enum application_state as);
bool is_app_background (pid_t pid);
+int deviced_apps_check_is_app(pid_t pid);
#endif /* __APPS_H__ */
#include "shared/devices.h"
#include "shared/device-notifier.h"
#include "shared/common.h"
+#include "shared/apps.h"
#include "tzip-utility.h"
#define PACKAGE_UNPACK_PATH "/opt/usr/share/package-unpacked"
}
pid = gdbus_connection_get_sender_pid(conn, sender);
- if (syscommon_proc_is_app(pid) != 0) {
+ if (deviced_apps_check_is_app(pid) != 0) {
_E("PID(%d) is not privileged to use tzip.", pid);
ret = -EPERM;
goto out;
}
pid = gdbus_connection_get_sender_pid(conn, sender);
- if (syscommon_proc_is_app(pid) != 0) {
+ if (deviced_apps_check_is_app(pid) != 0) {
_E("PID(%d) is not privileged to use tzip.", pid);
ret = -EPERM;
goto out;
libsyscommon
bundle
capi-system-info
- eventsystem)
+ eventsystem
+ security-manager)
SET(WRAP_FLAGS "-Wl,--wrap=dlopen")
SET(WRAP_FLAGS "${WRAP_FLAGS} -Wl,--wrap=access")