DataControlManager.prototype.getDataControlConsumer = function(providerId, dataId, type) {
+ xwalk.utils.checkPrivilegeAccess(xwalk.utils.privilege.DATACONTROL_CONSUMER);
+
var args = validator_.validateArgs(arguments, [
{'name': 'providerId', 'type': types_.STRING},
{'name': 'dataId', 'type': types_.STRING},
SQLDataControlConsumer.prototype.constructor = SQLDataControlConsumer;
SQLDataControlConsumer.prototype.insert = function(reqId, insertionData) {
+ xwalk.utils.checkPrivilegeAccess(xwalk.utils.privilege.DATACONTROL_CONSUMER);
+
var args = validator_.validateArgs(arguments, [
{'name': 'reqId', 'type': types_.LONG},
{'name': 'insertionData', 'type': types_.DICTIONARY},
};
SQLDataControlConsumer.prototype.update = function(reqId, updateData, where) {
+ xwalk.utils.checkPrivilegeAccess(xwalk.utils.privilege.DATACONTROL_CONSUMER);
+
var args = validator_.validateArgs(arguments, [
{'name': 'reqId', 'type': types_.LONG},
{'name': 'updateData', 'type': types_.DICTIONARY},
};
SQLDataControlConsumer.prototype.remove = function(reqId, where) {
+ xwalk.utils.checkPrivilegeAccess(xwalk.utils.privilege.DATACONTROL_CONSUMER);
+
var args = validator_.validateArgs(arguments, [
{'name': 'reqId', 'type': types_.LONG},
{'name': 'where', 'type': types_.STRING},
};
SQLDataControlConsumer.prototype.select = function(reqId, columns, where, successCallback) {
+ xwalk.utils.checkPrivilegeAccess(xwalk.utils.privilege.DATACONTROL_CONSUMER);
+
var args = validator_.validateArgs(arguments, [
{'name': 'reqId', 'type': types_.LONG},
{'name': 'columns', 'type': types_.ARRAY},
MappedDataControlConsumer.prototype.constructor = MappedDataControlConsumer;
MappedDataControlConsumer.prototype.addValue = function(reqId, key, value) {
+ xwalk.utils.checkPrivilegeAccess(xwalk.utils.privilege.DATACONTROL_CONSUMER);
+
var args = validator_.validateArgs(arguments, [
{'name': 'reqId', 'type': types_.LONG},
{'name': 'key', 'type': types_.STRING},
};
MappedDataControlConsumer.prototype.removeValue = function(reqId, key, value, successCallback) {
+ xwalk.utils.checkPrivilegeAccess(xwalk.utils.privilege.DATACONTROL_CONSUMER);
+
var args = validator_.validateArgs(arguments, [
{'name': 'reqId', 'type': types_.LONG},
{'name': 'key', 'type': types_.STRING},
};
MappedDataControlConsumer.prototype.getValue = function(reqId, key, successCallback) {
+ xwalk.utils.checkPrivilegeAccess(xwalk.utils.privilege.DATACONTROL_CONSUMER);
+
var args = validator_.validateArgs(arguments, [
{'name': 'reqId', 'type': types_.LONG},
{'name': 'key', 'type': types_.STRING},
MappedDataControlConsumer.prototype.updateValue = function(
reqId, key, oldValue, newValue, successCallback) {
+ xwalk.utils.checkPrivilegeAccess(xwalk.utils.privilege.DATACONTROL_CONSUMER);
+
var args = validator_.validateArgs(arguments, [
{'name': 'reqId', 'type': types_.LONG},
{'name': 'key', 'type': types_.STRING},
namespace extension {
namespace datacontrol {
-namespace {
-// The privileges that required in Datacontrol API
-const std::string kPrivilegeDatacontrol = "http://tizen.org/privilege/datacontrol.consumer";
-
-} // namespace
-
using common::InvalidValuesException;
using common::TypeMismatchException;
using common::IOException;
void DatacontrolInstance::DataControlManagerGetdatacontrolconsumer(
const picojson::value& args, picojson::object& out) {
- CHECK_PRIVILEGE_ACCESS(kPrivilegeDatacontrol, &out);
-
CHECK_EXIST(args, "providerId", out)
CHECK_EXIST(args, "dataId", out)
}
void DatacontrolInstance::SQLDataControlConsumerInsert(
const picojson::value& args, picojson::object& out) {
- CHECK_PRIVILEGE_ACCESS(kPrivilegeDatacontrol, &out);
CHECK_EXIST(args, "callbackId", out)
CHECK_EXIST(args, "reqId", out)
CHECK_EXIST(args, "providerId", out)
}
void DatacontrolInstance::SQLDataControlConsumerUpdate(
const picojson::value& args, picojson::object& out) {
- CHECK_PRIVILEGE_ACCESS(kPrivilegeDatacontrol, &out);
CHECK_EXIST(args, "callbackId", out)
CHECK_EXIST(args, "reqId", out)
CHECK_EXIST(args, "where", out)
void DatacontrolInstance::SQLDataControlConsumerRemove(
const picojson::value& args, picojson::object& out) {
- CHECK_PRIVILEGE_ACCESS(kPrivilegeDatacontrol, &out);
CHECK_EXIST(args, "callbackId", out)
CHECK_EXIST(args, "reqId", out)
CHECK_EXIST(args, "where", out)
void DatacontrolInstance::SQLDataControlConsumerSelect(
const picojson::value& args, picojson::object& out) {
- CHECK_PRIVILEGE_ACCESS(kPrivilegeDatacontrol, &out);
CHECK_EXIST(args, "callbackId", out)
CHECK_EXIST(args, "reqId", out)
CHECK_EXIST(args, "columns", out)
void DatacontrolInstance::MappedDataControlConsumerAddvalue(
const picojson::value& args,
picojson::object& out) {
- CHECK_PRIVILEGE_ACCESS(kPrivilegeDatacontrol, &out);
CHECK_EXIST(args, "callbackId", out)
CHECK_EXIST(args, "reqId", out)
CHECK_EXIST(args, "key", out)
}
void DatacontrolInstance::MappedDataControlConsumerRemovevalue(
const picojson::value& args, picojson::object& out) {
- CHECK_PRIVILEGE_ACCESS(kPrivilegeDatacontrol, &out);
CHECK_EXIST(args, "callbackId", out)
CHECK_EXIST(args, "reqId", out)
CHECK_EXIST(args, "key", out)
}
void DatacontrolInstance::MappedDataControlConsumerGetvalue(
const picojson::value& args, picojson::object& out) {
- CHECK_PRIVILEGE_ACCESS(kPrivilegeDatacontrol, &out);
CHECK_EXIST(args, "callbackId", out)
CHECK_EXIST(args, "reqId", out)
CHECK_EXIST(args, "key", out)
}
void DatacontrolInstance::MappedDataControlConsumerUpdatevalue(
const picojson::value& args, picojson::object& out) {
- CHECK_PRIVILEGE_ACCESS(kPrivilegeDatacontrol, &out);
CHECK_EXIST(args, "callbackId", out)
CHECK_EXIST(args, "reqId", out)
CHECK_EXIST(args, "key", out)