#define VALID_LAST_COUNT_FOR_EVENTNAME (VALID_COUNT_OF_EVENTNAME_TOKEN + 1)
#define MAX_COUNT_FOR_EVENTNAME_CHECK (VALID_LAST_COUNT_FOR_EVENTNAME + 1)
+#define REGULAR_USER 5000
+
#define FREE_AND_NULL(ptr) do { \
if (ptr) { \
free((void *)ptr); \
return ret;
}
+static bool __is_pkgmgr_signal_user_event(const char *event_name)
+{
+ int reserved_name_len = strlen(RESERVED_NAME_FOR_USER_PKGMGRSIGNAL);
+
+ if (strncmp(event_name, RESERVED_NAME_FOR_USER_PKGMGRSIGNAL, reserved_name_len) == 0)
+ return true;
+
+ return false;
+}
+
static int __check_interface_validation_user(char *interface_name)
{
int len = strlen(EVENT_SYSTEM_PREFIX);
if (!_initialized)
__initialize();
+ if (getuid() < REGULAR_USER)
+ return ES_R_OK;
+
if (__get_gdbus_shared_connection(&conn, G_BUS_TYPE_SYSTEM, ES_TYPE_SYSTEM) < 0) {
_E("getting gdbus-connetion error");
ret = ES_R_ERROR;
g_dbus_connection_signal_unsubscribe(conn, subscription_id);
__destroy_eventmap(em);
} else {
- if (__eventsystem_setup_trusted_peer(event_name,
- s_info.own_name_session_bus) < 0) {
+ if (!__is_pkgmgr_signal_user_event(event_name) &&
+ __eventsystem_setup_trusted_peer(event_name,
+ s_info.own_name_session_bus) < 0) {
_E("failed to setup trusted peer");
ret = ES_R_ERROR;
g_dbus_connection_signal_unsubscribe(conn, subscription_id);