} else if (result['status'] == 'error') {
var err = result['error'];
if (err) {
- throw new WebAPIException(err.name, err.message);
+ throw new WebAPIException(err);
}
return false;
}
// constructor of DataControlManager
}
+var privUtils_ = xwalk.utils;
-DataControlManager.prototype.getDataControlConsumer = function(providerId, dataId, type) {
- xwalk.utils.checkPrivilegeAccess(xwalk.utils.privilege.DATACONTROL_CONSUMER);
-
+var getDataControlConsumer = function(providerId, dataId, type) {
+ privUtils_.checkPrivilegeAccess(privUtils_.privilege.DATACONTROL_CONSUMER);
var args = validator_.validateArgs(arguments, [
{'name': 'providerId', 'type': types_.STRING},
{'name': 'dataId', 'type': types_.STRING},
} else if (type === 'MAP') {
returnObject = new MappedDataControlConsumer();
}
- SetReadOnlyProperty(returnObject, 'type', type); // read only property
- SetReadOnlyProperty(returnObject, 'providerId', providerId); // read only property
- SetReadOnlyProperty(returnObject, 'dataId', dataId); // read only property
+ SetReadOnlyProperty(returnObject, 'type', args.type); // read only property
+ SetReadOnlyProperty(returnObject, 'providerId', args.providerId); // read only property
+ SetReadOnlyProperty(returnObject, 'dataId', args.dataId); // read only property
return returnObject;
};
+DataControlManager.prototype.getDataControlConsumer = function(providerId, dataId, type) {
+ return getDataControlConsumer.apply(null, arguments);
+};
+
+
function DataControlConsumerObject() {
// constructor of DataControlConsumerObject
}
SQLDataControlConsumer.prototype.constructor = SQLDataControlConsumer;
SQLDataControlConsumer.prototype.insert = function(reqId, insertionData) {
- xwalk.utils.checkPrivilegeAccess(xwalk.utils.privilege.DATACONTROL_CONSUMER);
-
var args = validator_.validateArgs(arguments, [
{'name': 'reqId', 'type': types_.LONG},
{'name': 'insertionData', 'type': types_.DICTIONARY},
};
SQLDataControlConsumer.prototype.update = function(reqId, updateData, where) {
- xwalk.utils.checkPrivilegeAccess(xwalk.utils.privilege.DATACONTROL_CONSUMER);
-
var args = validator_.validateArgs(arguments, [
{'name': 'reqId', 'type': types_.LONG},
{'name': 'updateData', 'type': types_.DICTIONARY},
};
SQLDataControlConsumer.prototype.remove = function(reqId, where) {
- xwalk.utils.checkPrivilegeAccess(xwalk.utils.privilege.DATACONTROL_CONSUMER);
-
var args = validator_.validateArgs(arguments, [
{'name': 'reqId', 'type': types_.LONG},
{'name': 'where', 'type': types_.STRING},
};
SQLDataControlConsumer.prototype.select = function(reqId, columns, where, successCallback) {
- xwalk.utils.checkPrivilegeAccess(xwalk.utils.privilege.DATACONTROL_CONSUMER);
-
var args = validator_.validateArgs(arguments, [
{'name': 'reqId', 'type': types_.LONG},
{'name': 'columns', 'type': types_.ARRAY},
MappedDataControlConsumer.prototype.constructor = MappedDataControlConsumer;
MappedDataControlConsumer.prototype.addValue = function(reqId, key, value) {
- xwalk.utils.checkPrivilegeAccess(xwalk.utils.privilege.DATACONTROL_CONSUMER);
-
var args = validator_.validateArgs(arguments, [
{'name': 'reqId', 'type': types_.LONG},
{'name': 'key', 'type': types_.STRING},
};
MappedDataControlConsumer.prototype.removeValue = function(reqId, key, value, successCallback) {
- xwalk.utils.checkPrivilegeAccess(xwalk.utils.privilege.DATACONTROL_CONSUMER);
-
var args = validator_.validateArgs(arguments, [
{'name': 'reqId', 'type': types_.LONG},
{'name': 'key', 'type': types_.STRING},
};
MappedDataControlConsumer.prototype.getValue = function(reqId, key, successCallback) {
- xwalk.utils.checkPrivilegeAccess(xwalk.utils.privilege.DATACONTROL_CONSUMER);
-
var args = validator_.validateArgs(arguments, [
{'name': 'reqId', 'type': types_.LONG},
{'name': 'key', 'type': types_.STRING},
MappedDataControlConsumer.prototype.updateValue = function(
reqId, key, oldValue, newValue, successCallback) {
- xwalk.utils.checkPrivilegeAccess(xwalk.utils.privilege.DATACONTROL_CONSUMER);
-
var args = validator_.validateArgs(arguments, [
{'name': 'reqId', 'type': types_.LONG},
{'name': 'key', 'type': types_.STRING},
#include "common/picojson.h"
#include "common/logger.h"
+#include "common/tools.h"
#include "common/platform_exception.h"
#include "common/scope_exit.h"
namespace extension {
namespace datacontrol {
+namespace {
+// The privileges that required in Datacontrol API
+const std::string kPrivilegeDatacontrol = "http://tizen.org/privilege/datacontrol.consumer";
+
+} // namespace
+
using common::InvalidValuesException;
using common::TypeMismatchException;
using common::IOException;
void DatacontrolInstance::DataControlManagerGetdatacontrolconsumer(
const picojson::value& args, picojson::object& out) {
LoggerD("Enter");
+ CHECK_PRIVILEGE_ACCESS(kPrivilegeDatacontrol, &out);
+
CHECK_EXIST(args, "providerId", out)
CHECK_EXIST(args, "dataId", out)
}
void DatacontrolInstance::SQLDataControlConsumerInsert(
const picojson::value& args, picojson::object& out) {
LoggerD("Enter");
+ CHECK_PRIVILEGE_ACCESS(kPrivilegeDatacontrol, &out);
CHECK_EXIST(args, "callbackId", out)
CHECK_EXIST(args, "reqId", out)
CHECK_EXIST(args, "providerId", out)
void DatacontrolInstance::SQLDataControlConsumerUpdate(
const picojson::value& args, picojson::object& out) {
LoggerD("Enter");
+ CHECK_PRIVILEGE_ACCESS(kPrivilegeDatacontrol, &out);
CHECK_EXIST(args, "callbackId", out)
CHECK_EXIST(args, "reqId", out)
CHECK_EXIST(args, "where", out)
void DatacontrolInstance::SQLDataControlConsumerRemove(
const picojson::value& args, picojson::object& out) {
LoggerD("Enter");
+ CHECK_PRIVILEGE_ACCESS(kPrivilegeDatacontrol, &out);
CHECK_EXIST(args, "callbackId", out)
CHECK_EXIST(args, "reqId", out)
CHECK_EXIST(args, "where", out)
void DatacontrolInstance::SQLDataControlConsumerSelect(
const picojson::value& args, picojson::object& out) {
LoggerD("Enter");
+ CHECK_PRIVILEGE_ACCESS(kPrivilegeDatacontrol, &out);
CHECK_EXIST(args, "callbackId", out)
CHECK_EXIST(args, "reqId", out)
CHECK_EXIST(args, "columns", out)
const picojson::value& args,
picojson::object& out) {
LoggerD("Enter");
+ CHECK_PRIVILEGE_ACCESS(kPrivilegeDatacontrol, &out);
CHECK_EXIST(args, "callbackId", out)
CHECK_EXIST(args, "reqId", out)
CHECK_EXIST(args, "key", out)
void DatacontrolInstance::MappedDataControlConsumerRemovevalue(
const picojson::value& args, picojson::object& out) {
LoggerD("Enter");
+ CHECK_PRIVILEGE_ACCESS(kPrivilegeDatacontrol, &out);
CHECK_EXIST(args, "callbackId", out)
CHECK_EXIST(args, "reqId", out)
CHECK_EXIST(args, "key", out)
void DatacontrolInstance::MappedDataControlConsumerGetvalue(
const picojson::value& args, picojson::object& out) {
LoggerD("Enter");
+ CHECK_PRIVILEGE_ACCESS(kPrivilegeDatacontrol, &out);
CHECK_EXIST(args, "callbackId", out)
CHECK_EXIST(args, "reqId", out)
CHECK_EXIST(args, "key", out)
void DatacontrolInstance::MappedDataControlConsumerUpdatevalue(
const picojson::value& args, picojson::object& out) {
LoggerD("Enter");
+ CHECK_PRIVILEGE_ACCESS(kPrivilegeDatacontrol, &out);
CHECK_EXIST(args, "callbackId", out)
CHECK_EXIST(args, "reqId", out)
CHECK_EXIST(args, "key", out)