From: Przemyslaw Ciezkowski
Date: Mon, 11 May 2015 10:09:37 +0000 (+0200)
Subject: [KeyManager] Added permission checks
X-Git-Tag: submit/tizen_tv/20150603.064601~1^2~38
X-Git-Url: http://review.tizen.org/git/?a=commitdiff_plain;h=83d94e7ce125535715470b49a69216587a736845;p=platform%2Fcore%2Fapi%2Fwebapi-plugins.git
[KeyManager] Added permission checks
Change-Id: Icc7fd601fb43e3ee1c38766bf7d51e0f256242bd
Signed-off-by: Przemyslaw Ciezkowski
---
diff --git a/src/keymanager/keymanager_api.js b/src/keymanager/keymanager_api.js
index 87390da4..45a0deee 100644
--- a/src/keymanager/keymanager_api.js
+++ b/src/keymanager/keymanager_api.js
@@ -80,6 +80,7 @@ function Key(name, password, extractable, keyType, rawKey) {
}
Key.prototype.save = function() {
+ xwalk.utils.checkPrivilegeAccess(xwalk.utils.privilege.KEYMANAGER);
var args = validator.validateArgs(arguments, [
{
name: 'rawKey',
@@ -114,6 +115,7 @@ Key.prototype.save = function() {
};
Key.prototype.remove = function() {
+ xwalk.utils.checkPrivilegeAccess(xwalk.utils.privilege.KEYMANAGER);
var ret = native.callSync('KeyManager_removeKey', {
key: this
});
@@ -144,6 +146,7 @@ function Certificate(name, password, extractable, rawCert) {
}
Certificate.prototype.save = function() {
+ xwalk.utils.checkPrivilegeAccess(xwalk.utils.privilege.KEYMANAGER);
var args = validator.validateArgs(arguments, [
{
name: 'rawCert',
@@ -177,6 +180,7 @@ Certificate.prototype.save = function() {
};
Certificate.prototype.loadFromFile = function() {
+ xwalk.utils.checkPrivilegeAccess(xwalk.utils.privilege.KEYMANAGER);
var args = validator.validateArgs(arguments, [
{
name: 'fileURI',
@@ -216,6 +220,7 @@ Certificate.prototype.loadFromFile = function() {
};
Certificate.prototype.remove = function() {
+ xwalk.utils.checkPrivilegeAccess(xwalk.utils.privilege.KEYMANAGER);
var ret = native.callSync('KeyManager_removeCertificate', {
certificate: this
});
@@ -246,6 +251,7 @@ function Data(name, password, extractable, rawData) {
}
Data.prototype.save = function() {
+ xwalk.utils.checkPrivilegeAccess(xwalk.utils.privilege.KEYMANAGER);
var args = validator.validateArgs(arguments, [
{
name: 'rawData',
@@ -279,6 +285,7 @@ Data.prototype.save = function() {
};
Data.prototype.remove = function() {
+ xwalk.utils.checkPrivilegeAccess(xwalk.utils.privilege.KEYMANAGER);
var ret = native.callSync('KeyManager_removeData', {
data: this
});
@@ -292,6 +299,7 @@ function KeyManager() {
}
KeyManager.prototype.generateKeyPair = function() {
+ xwalk.utils.checkPrivilegeAccess(xwalk.utils.privilege.KEYMANAGER);
var args = validator.validateArgs(arguments, [
{
name: "privKeyName",
@@ -352,6 +360,7 @@ KeyManager.prototype.generateKeyPair = function() {
};
KeyManager.prototype.loadFromPKCS12File = function() {
+ xwalk.utils.checkPrivilegeAccess(xwalk.utils.privilege.KEYMANAGER);
var args = validator.validateArgs(arguments, [
{
name: 'fileURI',
@@ -398,6 +407,7 @@ KeyManager.prototype.loadFromPKCS12File = function() {
};
KeyManager.prototype.getKey = function() {
+ xwalk.utils.checkPrivilegeAccess(xwalk.utils.privilege.KEYMANAGER);
var args = validator.validateArgs(arguments, [
{
name: "name",
@@ -422,6 +432,7 @@ KeyManager.prototype.getKey = function() {
};
KeyManager.prototype.getKeyAliasList = function() {
+ xwalk.utils.checkPrivilegeAccess(xwalk.utils.privilege.KEYMANAGER);
var ret = native.callSync('KeyManager_getKeyAliasList', {});
if (native.isFailure(ret)) {
throw native.getErrorObject(ret);
@@ -430,6 +441,7 @@ KeyManager.prototype.getKeyAliasList = function() {
};
KeyManager.prototype.getCertificate = function() {
+ xwalk.utils.checkPrivilegeAccess(xwalk.utils.privilege.KEYMANAGER);
var args = validator.validateArgs(arguments, [
{
name: "name",
@@ -453,6 +465,7 @@ KeyManager.prototype.getCertificate = function() {
};
KeyManager.prototype.getCertificatesAliasList = function() {
+ xwalk.utils.checkPrivilegeAccess(xwalk.utils.privilege.KEYMANAGER);
var ret = native.callSync('KeyManager_getCertificatesAliasList', {});
if (native.isFailure(ret)) {
throw native.getErrorObject(ret);
@@ -461,6 +474,7 @@ KeyManager.prototype.getCertificatesAliasList = function() {
};
KeyManager.prototype.getData = function() {
+ xwalk.utils.checkPrivilegeAccess(xwalk.utils.privilege.KEYMANAGER);
var args = validator.validateArgs(arguments, [
{
name: "name",
@@ -484,6 +498,7 @@ KeyManager.prototype.getData = function() {
};
KeyManager.prototype.getDataAliasList = function() {
+ xwalk.utils.checkPrivilegeAccess(xwalk.utils.privilege.KEYMANAGER);
var ret = native.callSync('KeyManager_getDataAliasList', {});
if (native.isFailure(ret)) {
throw native.getErrorObject(ret);
@@ -492,6 +507,7 @@ KeyManager.prototype.getDataAliasList = function() {
};
KeyManager.prototype.allowAccessControl = function() {
+ xwalk.utils.checkPrivilegeAccess(xwalk.utils.privilege.KEYMANAGER);
var args = validator.validateArgs(arguments, [
{
name: "dataName",
@@ -532,6 +548,7 @@ KeyManager.prototype.allowAccessControl = function() {
};
KeyManager.prototype.denyAccessControl = function() {
+ xwalk.utils.checkPrivilegeAccess(xwalk.utils.privilege.KEYMANAGER);
var args = validator.validateArgs(arguments, [
{
name: "dataName",
@@ -566,6 +583,7 @@ KeyManager.prototype.denyAccessControl = function() {
};
KeyManager.prototype.createSignature = function() {
+ xwalk.utils.checkPrivilegeAccess(xwalk.utils.privilege.KEYMANAGER);
var args = validator.validateArgs(arguments, [
{
name: "message",
@@ -621,6 +639,7 @@ KeyManager.prototype.createSignature = function() {
};
KeyManager.prototype.verifySignature = function() {
+ xwalk.utils.checkPrivilegeAccess(xwalk.utils.privilege.KEYMANAGER);
var args = validator.validateArgs(arguments, [
{
name: "signature",
diff --git a/src/utils/utils_api.js b/src/utils/utils_api.js
index 239e7d32..f28571d6 100644
--- a/src/utils/utils_api.js
+++ b/src/utils/utils_api.js
@@ -93,6 +93,7 @@ function Utils() {
FILESYSTEM_WRITE: 'http://tizen.org/privilege/filesystem.write',
HEALTHINFO: 'http://tizen.org/privilege/healthinfo',
INTERNET: 'http://tizen.org/privilege/internet',
+ KEYMANAGER: 'http://tizen.org/privilege/keymanager',
LED: 'http://tizen.org/privilege/led',
LOCATION: 'http://tizen.org/privilege/location',
MEDIACONTROLLER_READ: 'http://tizen.org/privilege/mediacontroller.read',