Apply runtime askuser-disable on new API 07/111307/2 accepted/tizen/3.0/common/20170120.102445 accepted/tizen/3.0/ivi/20170120.073521 accepted/tizen/3.0/mobile/20170120.073430 accepted/tizen/3.0/tv/20170120.073447 accepted/tizen/3.0/wearable/20170120.073503 accepted/tizen/common/20170123.181849 accepted/tizen/ivi/20170120.082321 accepted/tizen/mobile/20170120.082312 accepted/tizen/tv/20170120.082315 accepted/tizen/wearable/20170120.082318 submit/tizen/20170120.062744 submit/tizen_3.0/20170120.062730
authorYunjin Lee <yunjin-.lee@samsung.com>
Fri, 20 Jan 2017 06:17:00 +0000 (15:17 +0900)
committerYunjin Lee <yunjin-.lee@samsung.com>
Fri, 20 Jan 2017 06:24:58 +0000 (15:24 +0900)
Change-Id: I9871901ef1c0e12cbf53ae021df69b4e974ad711
Signed-off-by: Yunjin Lee <yunjin-.lee@samsung.com>
capi/src/privilege_db_manager.c
tool/CMakeLists.txt

index 5dc8f6c..74a1588 100755 (executable)
@@ -543,6 +543,11 @@ int privilege_db_manager_is_privacy_white_list(const char* pkgid, const char* pr
 #ifdef DISABLE_ASKUSER
        return 1;
 #endif
+       if (access(ASKUSER_RUNTIME_DISABLE_PATH, F_OK) == 0) {
+               _LOGD("askuser is disabled in run-time.");
+               return 1;
+       }
+
        sqlite3 *db = NULL;
        sqlite3_stmt *stmt = NULL;
        int ret = __initialize_db(PRIVILEGE_DB_TYPE_INFO, &db, PRIVILEGE_DB_MANAGER_PACKAGE_TYPE_CORE);
index 5c3f40c..d9dc8ad 100755 (executable)
@@ -30,6 +30,7 @@ ADD_DEFINITIONS(-DPRIVILEGE_INFO_WRT_DB_PATH="wrt_privilege_info.db")
 ADD_DEFINITIONS(-DPRIVILEGE_MAPPING_CORE_DB_PATH="core_privilege_mapping.db")
 ADD_DEFINITIONS(-DPRIVILEGE_MAPPING_WRT_DB_PATH="wrt_privilege_mapping.db")
 ADD_DEFINITIONS(-DPRIVILEGE_POLICY_DB_PATH="policy.db")
+ADD_DEFINITIONS(-DASKUSER_RUNTIME_DISABLE_PATH="${TZ_SYS_SHARE}/askuser_disable")
 
 SET(CMAKE_C_FLAGS "${CMAKE_C_FLAGS} ${EXTRA_CFLAGS}")