From 15aee0eb3b54c35a1e03f57f7a64ad00e9678f97 Mon Sep 17 00:00:00 2001 From: Andrzej Popowski Date: Thu, 19 Mar 2015 15:24:42 +0100 Subject: [PATCH] [Datacontrol] - Checking privileges added Change-Id: Ibfcf123269461a931fd9672696940009c1bfb409 Signed-off-by: Andrzej Popowski --- src/datacontrol/datacontrol_instance.cc | 12 +++++++++++- 1 file changed, 11 insertions(+), 1 deletion(-) diff --git a/src/datacontrol/datacontrol_instance.cc b/src/datacontrol/datacontrol_instance.cc index 254db4c1..5ee8f912 100644 --- a/src/datacontrol/datacontrol_instance.cc +++ b/src/datacontrol/datacontrol_instance.cc @@ -24,7 +24,7 @@ namespace datacontrol { namespace { // The privileges that required in Datacontrol API -const std::string kPrivilegeDatacontrol = ""; +const std::string kPrivilegeDatacontrol = "http://tizen.org/privilege/datacontrol.consumer"; } // namespace @@ -483,6 +483,8 @@ int DatacontrolInstance::RunSQLDataControlJob(const std::string& providerId, void DatacontrolInstance::DataControlManagerGetdatacontrolconsumer( const picojson::value& args, picojson::object& out) { + CHECK_PRIVILEGE_ACCESS(kPrivilegeDatacontrol, &out); + CHECK_EXIST(args, "providerId", out) CHECK_EXIST(args, "dataId", out) @@ -491,6 +493,7 @@ void DatacontrolInstance::DataControlManagerGetdatacontrolconsumer( } void DatacontrolInstance::SQLDataControlConsumerInsert( const picojson::value& args, picojson::object& out) { + CHECK_PRIVILEGE_ACCESS(kPrivilegeDatacontrol, &out); CHECK_EXIST(args, "callbackId", out) CHECK_EXIST(args, "reqId", out) CHECK_EXIST(args, "providerId", out) @@ -562,6 +565,7 @@ void DatacontrolInstance::SQLDataControlConsumerInsert( } void DatacontrolInstance::SQLDataControlConsumerUpdate( const picojson::value& args, picojson::object& out) { + CHECK_PRIVILEGE_ACCESS(kPrivilegeDatacontrol, &out); CHECK_EXIST(args, "callbackId", out) CHECK_EXIST(args, "reqId", out) CHECK_EXIST(args, "where", out) @@ -637,6 +641,7 @@ void DatacontrolInstance::SQLDataControlConsumerUpdate( void DatacontrolInstance::SQLDataControlConsumerRemove( const picojson::value& args, picojson::object& out) { + CHECK_PRIVILEGE_ACCESS(kPrivilegeDatacontrol, &out); CHECK_EXIST(args, "callbackId", out) CHECK_EXIST(args, "reqId", out) CHECK_EXIST(args, "where", out) @@ -669,6 +674,7 @@ void DatacontrolInstance::SQLDataControlConsumerRemove( void DatacontrolInstance::SQLDataControlConsumerSelect( const picojson::value& args, picojson::object& out) { + CHECK_PRIVILEGE_ACCESS(kPrivilegeDatacontrol, &out); CHECK_EXIST(args, "callbackId", out) CHECK_EXIST(args, "reqId", out) CHECK_EXIST(args, "columns", out) @@ -729,6 +735,7 @@ void DatacontrolInstance::SQLDataControlConsumerSelect( void DatacontrolInstance::MappedDataControlConsumerAddvalue( const picojson::value& args, picojson::object& out) { + CHECK_PRIVILEGE_ACCESS(kPrivilegeDatacontrol, &out); CHECK_EXIST(args, "callbackId", out) CHECK_EXIST(args, "reqId", out) CHECK_EXIST(args, "key", out) @@ -764,6 +771,7 @@ void DatacontrolInstance::MappedDataControlConsumerAddvalue( } void DatacontrolInstance::MappedDataControlConsumerRemovevalue( const picojson::value& args, picojson::object& out) { + CHECK_PRIVILEGE_ACCESS(kPrivilegeDatacontrol, &out); CHECK_EXIST(args, "callbackId", out) CHECK_EXIST(args, "reqId", out) CHECK_EXIST(args, "key", out) @@ -799,6 +807,7 @@ void DatacontrolInstance::MappedDataControlConsumerRemovevalue( } void DatacontrolInstance::MappedDataControlConsumerGetvalue( const picojson::value& args, picojson::object& out) { + CHECK_PRIVILEGE_ACCESS(kPrivilegeDatacontrol, &out); CHECK_EXIST(args, "callbackId", out) CHECK_EXIST(args, "reqId", out) CHECK_EXIST(args, "key", out) @@ -831,6 +840,7 @@ void DatacontrolInstance::MappedDataControlConsumerGetvalue( } void DatacontrolInstance::MappedDataControlConsumerUpdatevalue( const picojson::value& args, picojson::object& out) { + CHECK_PRIVILEGE_ACCESS(kPrivilegeDatacontrol, &out); CHECK_EXIST(args, "callbackId", out) CHECK_EXIST(args, "reqId", out) CHECK_EXIST(args, "key", out) -- 2.34.1