From 87682f634201cec71eb7d520a6b7e4b8ed96db8c Mon Sep 17 00:00:00 2001 From: Jaemin Ryu Date: Thu, 10 Aug 2017 13:28:25 +0900 Subject: [PATCH] Add USB policy Change-Id: I2fdc934125a121080a939a97c4fb9f13e6eafa76 Signed-off-by: Jaemin Ryu --- CMakeLists.txt | 85 +++++++++++++++++++++++++++ api/CMakeLists.txt | 48 +++++++++++++++ api/dpm-usb.pc.in | 12 ++++ api/usb.cpp | 89 ++++++++++++++++++++++++++++ api/usb.h | 129 +++++++++++++++++++++++++++++++++++++++++ dpm-usb.manifest | 5 ++ packaging/dpm-usb.spec | 76 ++++++++++++++++++++++++ plugin/CMakeLists.txt | 33 +++++++++++ plugin/usb.cpp | 121 ++++++++++++++++++++++++++++++++++++++ 9 files changed, 598 insertions(+) create mode 100755 CMakeLists.txt create mode 100755 api/CMakeLists.txt create mode 100644 api/dpm-usb.pc.in create mode 100644 api/usb.cpp create mode 100644 api/usb.h create mode 100644 dpm-usb.manifest create mode 100755 packaging/dpm-usb.spec create mode 100755 plugin/CMakeLists.txt create mode 100644 plugin/usb.cpp diff --git a/CMakeLists.txt b/CMakeLists.txt new file mode 100755 index 0000000..acda325 --- /dev/null +++ b/CMakeLists.txt @@ -0,0 +1,85 @@ +# +# Copyright (c) 2017 Samsung Electronics Co., Ltd All Rights Reserved +# +# Licensed under the Apache License, Version 2.0 (the "License"); +# you may not use this file except in compliance with the License. +# You may obtain a copy of the License at +# +# http://www.apache.org/licenses/LICENSE-2.0 +# +# Unless required by applicable law or agreed to in writing, software +# distributed under the License is distributed on an "AS IS" BASIS, +# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +# See the License for the specific language governing permissions and +# limitations under the License. +# + +CMAKE_MINIMUM_REQUIRED(VERSION 2.8) + +PROJECT(dpm-usb) + +IF(NOT DEFINED VERSION) + SET(VERSION "0.0.1") +ENDIF(NOT DEFINED VERSION) + +INCLUDE(FindPkgConfig) + +IF(NOT CMAKE_BUILD_TYPE) + SET(CMAKE_BUILD_TYPE "DEBUG") +ENDIF(NOT CMAKE_BUILD_TYPE) + +SET(DPM_API ${PROJECT_SOURCE_DIR}/api) +SET(DPM_PLUGIN ${PROJECT_SOURCE_DIR}/plugin) + +IF("${CMAKE_CXX_COMPILER_ID}" STREQUAL "GNU" AND CMAKE_CXX_COMPILER_VERSION VERSION_LESS 4.7) + SET(CXX_STD "c++0x") +else() + SET(CXX_STD "c++11") +endif() + +SET(COMPILE_BASE_FLAGS "-g -fPIC -Werror -Wall -Wl,--as-needed -Wl,--no-whole-archive") +SET(CMAKE_C_FLAGS_PROFILING "${COMPILE_BASE_FLAGS} -O0 -pg") +SET(CMAKE_CXX_FLAGS_PROFILING "${COMPILE_BASE_FLAGS} -O0 -pg -std=${CXX_STD} -fno-rtti") +SET(CMAKE_C_FLAGS_DEBUG "${COMPILE_BASE_FLAGS} -O0 -ggdb") +SET(CMAKE_CXX_FLAGS_DEBUG "${COMPILE_BASE_FLAGS} -O0 -ggdb -std=${CXX_STD} -fno-rtti") +SET(CMAKE_C_FLAGS_RELEASE "${COMPILE_BASE_FLAGS} -O2 -DNDEBUG") +SET(CMAKE_CXX_FLAGS_RELEASE "${COMPILE_BASE_FLAGS} -O2 -DNDEBUG -std=${CXX_STD} -fno-rtti") +SET(CMAKE_C_FLAGS_CCOV "${COMPILE_BASE_FLAGS} -O0 --coverage") +SET(CMAKE_CXX_FLAGS_CCOV "${COMPILE_BASE_FLAGS} -O0 --coverage -std=${CXX_STD} -fno-rtti") + +IF(NOT DEFINED LIB_INSTALL_DIR) + SET(LIB_INSTALL_DIR "${CMAKE_INSTALL_LIBDIR}") +ENDIF(NOT DEFINED LIB_INSTALL_DIR) + +IF(NOT DEFINED INCLUDE_INSTALL_DIR) + SET(INCLUDE_INSTALL_DIR "${CMAKE_INSTALL_INCLUDEDIR}") +ENDIF(NOT DEFINED INCLUDE_INSTALL_DIR) + +IF(NOT DEFINED CONF_INSTALL_DIR) + SET(CONF_INSTALL_DIR "${SYSCONF_INSTALL_DIR}/dpm") +ENDIF(NOT DEFINED CONF_INSTALL_DIR) + +IF(NOT DEFINED DATA_INSTALL_DIR) + SET(DATA_INSTALL_DIR "${CMAKE_INSTALL_PREFIX}/share/dpm") +ENDIF(NOT DEFINED DATA_INSTALL_DIR) + +IF(NOT DEFINED DB_INSTALL_DIR) + SET(DB_INSTALL_DIR "${CMAKE_INSTALL_PREFIX}/dbspace") +ENDIF(NOT DEFINED DB_INSTALL_DIR) + +IF(NOT DEFINED RUN_INSTALL_DIR) + SET(RUN_INSTALL_DIR "/var/run") +ENDIF(NOT DEFINED RUN_INSTALL_DIR) + +IF(NOT DEFINED PAMD_INSTALL_DIR) + SET(PAMD_INSTALL_DIR "${SYSCONF_INSTALL_DIR}/pam.d") +ENDIF(NOT DEFINED PAMD_INSTALL_DIR) + +IF(NOT DEFINED SYSTEMD_UNIT_INSTALL_DIR) + SET(SYSTEMD_UNIT_INSTALL_DIR "${CMAKE_INSTALL_PREFIX}/lib/systemd/system") +ENDIF(NOT DEFINED SYSTEMD_UNIT_INSTALL_DIR) + +ADD_DEFINITIONS(-DUG_WAYLAND) + +ADD_SUBDIRECTORY(${DPM_PLUGIN}) +ADD_SUBDIRECTORY(${DPM_API}) diff --git a/api/CMakeLists.txt b/api/CMakeLists.txt new file mode 100755 index 0000000..4411af8 --- /dev/null +++ b/api/CMakeLists.txt @@ -0,0 +1,48 @@ +# +# Copyright (c) 2015 Samsung Electronics Co., Ltd All Rights Reserved +# +# Licensed under the Apache License, Version 2.0 (the "License"); +# you may not use this file except in compliance with the License. +# You may obtain a copy of the License at +# +# http://www.apache.org/licenses/LICENSE-2.0 +# +# Unless required by applicable law or agreed to in writing, software +# distributed under the License is distributed on an "AS IS" BASIS, +# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +# See the License for the specific language governing permissions and +# limitations under the License. +# +SET(TARGET ${PROJECT_NAME}) +SET(PC_FILE "${TARGET}.pc") + +SET(LIB_VERSION "${VERSION}") +SET(LIB_SOVERSION "0") + +SET(API_SOURCES "usb.cpp") +SET(API_HEADERS "usb.h") + +SET(DEPENDENCY klay + dpm-pil + capi-base-common + capi-system-info +) + +PKG_CHECK_MODULES(API_DEPS REQUIRED ${DEPENDENCY}) + +SET (CMAKE_SHARED_LINKER_FLAGS "${CMAKE_SHARED_LINKER_FLAGS} -Wl,-z,noexecstack") + +ADD_LIBRARY(${TARGET} SHARED ${API_SOURCES}) + +SET_TARGET_PROPERTIES(${TARGET} PROPERTIES COMPILE_FLAGS "-fvisibility=default") +SET_TARGET_PROPERTIES(${TARGET} PROPERTIES SOVERSION ${LIB_SOVERSION}) +SET_TARGET_PROPERTIES(${TARGET} PROPERTIES VERSION ${LIB_VERSION}) + +INCLUDE_DIRECTORIES(SYSTEM ${API_DEPS_INCLUDE_DIRS}) +TARGET_LINK_LIBRARIES(${TARGET} ${API_DEPS_LIBRARIES} pthread) + +CONFIGURE_FILE(${PC_FILE}.in ${CMAKE_BINARY_DIR}/${PC_FILE} @ONLY) + +INSTALL(FILES ${CMAKE_BINARY_DIR}/${PC_FILE} DESTINATION ${LIB_INSTALL_DIR}/pkgconfig) +INSTALL(TARGETS ${TARGET} DESTINATION ${LIB_INSTALL_DIR} COMPONENT RuntimeLibraries) +INSTALL(FILES ${API_HEADERS} DESTINATION ${INCLUDE_INSTALL_DIR}/dpm) diff --git a/api/dpm-usb.pc.in b/api/dpm-usb.pc.in new file mode 100644 index 0000000..0439db0 --- /dev/null +++ b/api/dpm-usb.pc.in @@ -0,0 +1,12 @@ +# Package Information for pkg-config + +prefix=@CMAKE_INSTALL_PREFIX@ +exec_prefix=@CMAKE_INSTALL_PREFIX@ +libdir=@LIB_INSTALL_DIR@ +includedir=@INCLUDE_INSTALL_DIR@ + +Name: USB policy module +Description: USB policy module for device policy manager +Version: @VERSION@ +Libs: -L${libdir} -ldpm-usb +Cflags: -I${includedir}/dpm diff --git a/api/usb.cpp b/api/usb.cpp new file mode 100644 index 0000000..1ce48f6 --- /dev/null +++ b/api/usb.cpp @@ -0,0 +1,89 @@ +/* + * Copyright (c) 2016 Samsung Electronics Co., Ltd All Rights Reserved + * + * Licensed under the Apache License, Version 2.0 (the "License"); + * you may not use this file except in compliance with the License. + * You may obtain a copy of the License at + * + * http://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, software + * distributed under the License is distributed on an "AS IS" BASIS, + * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + * See the License for the specific language governing permissions and + * limitations under the License + */ + +#include +#include + +#include + +#include "usb.h" + +EXPORT_API int dpm_usb_set_debugging_state(device_policy_manager_h handle, bool allow) +{ + RET_ON_FAILURE(handle, DPM_ERROR_INVALID_PARAMETER); + + DevicePolicyClient &client = GetDevicePolicyClient(handle); + + try { + Status status { -1 }; + status = client.methodCall("Usb::setDebuggingState", allow); + return status.get(); + } catch (...) { + return -1; + } +} + +EXPORT_API int dpm_usb_get_debugging_state(device_policy_manager_h handle, bool *is_allowed) +{ + RET_ON_FAILURE(handle, DPM_ERROR_INVALID_PARAMETER); + RET_ON_FAILURE(is_allowed, DPM_ERROR_INVALID_PARAMETER); + + DevicePolicyClient &client = GetDevicePolicyClient(handle); + + try { + Status status { true }; + status = client.methodCall("Usb::getDebuggingState"); + *is_allowed = status.get(); + } catch (...) { + return -1; + } + + return DPM_ERROR_NONE; +} + +EXPORT_API int dpm_usb_set_tethering_state(device_policy_manager_h handle, bool allow) +{ + RET_ON_FAILURE(handle, DPM_ERROR_INVALID_PARAMETER); + + DevicePolicyClient &client = GetDevicePolicyClient(handle); + + try { + Status status { -1 }; + status = client.methodCall("Usb::setTetheringState", allow); + return status.get(); + } catch (...) { + return -1; + } +} + +EXPORT_API int dpm_usb_get_tethering_state(device_policy_manager_h handle, bool *is_allowed) +{ + RET_ON_FAILURE(handle, DPM_ERROR_INVALID_PARAMETER); + RET_ON_FAILURE(is_allowed, DPM_ERROR_INVALID_PARAMETER); + + DevicePolicyClient &client = GetDevicePolicyClient(handle); + + try { + Status status { true }; + status = client.methodCall("Usb::getTetheringState"); + *is_allowed = status.get(); + } catch (...) { + return -1; + } + + return DPM_ERROR_NONE; +} + diff --git a/api/usb.h b/api/usb.h new file mode 100644 index 0000000..1304392 --- /dev/null +++ b/api/usb.h @@ -0,0 +1,129 @@ +/* + * Copyright (c) 2016 Samsung Electronics Co., Ltd All Rights Reserved + * + * Licensed under the Apache License, Version 2.0 (the "License"); + * you may not use this file except in compliance with the License. + * You may obtain a copy of the License at + * + * http://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, software + * distributed under the License is distributed on an "AS IS" BASIS, + * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + * See the License for the specific language governing permissions and + * limitations under the License + */ + +#ifndef __CAPI_DPM_USB_POLICY_H__ +#define __CAPI_DPM_USB_POLICY_H__ + +#include + +typedef void * device_policy_manager_h; + +/** + * @file usb.h + * @brief This file provides APIs to control usb functionality. + */ + +#ifdef __cplusplus +extern "C" { +#endif + +/** + * @addtogroup CAPI_DPM_USB_POLICY_MODULE + * @{ + */ + +/** + * @partner + * @brief Allows or disallows the usb debugging. + * @details An administrator can use this API to set whether the usb debugging + * is allowed or not. + * @since_tizen 3.0 + * @privlevel partner + * @privilege %http://tizen.org/privilege/dpm.debugging + * @param[in] handle Device policy manager handle + * @param[in] allow If true, allow the usb debugging, if false, disallow the usb + * debugging + * @return #DPM_ERROR_NONE on success, otherwise a negative value + * @retval #DPM_ERROR_NONE Successful + * @retval #DPM_ERROR_TIMED_OUT Time out + * @retval #DPM_ERROR_INVALID_PARAMETER Invalid parameter + * @retval #DPM_ERROR_PERMISSION_DENIED The application does not have + * the privilege to call this API + * @pre The handle must be created by dpm_manager_create(). + * @see dpm_manager_create() + * @see dpm_usb_get_debugging_state() + */ +int dpm_usb_set_debugging_state(device_policy_manager_h handle, bool allow); + +/** + * @brief Checks whether the usb debugging is allowed or not. + * @details An administrator can use this API to check whether the usb debugging + * is allowed or not. + * @since_tizen 3.0 + * @param[in] handle Device policy manager handle + * @param[out] is_allowed true if the usb debugging is allowed, false otherwise. + * @return #DPM_ERROR_NONE on success, otherwise a negative value + * @retval #DPM_ERROR_NONE Successful + * @retval #DPM_ERROR_TIMED_OUT Time out + * @retval #DPM_ERROR_INVALID_PARAMETER Invalid parameter + * @pre The handle must be created by dpm_manager_create(). + * @see dpm_manager_create() + * @see dpm_usb_set_debugging_state() + */ +int dpm_usb_get_debugging_state(device_policy_manager_h handle, bool *is_allowed); + +/** + * @partner + * @brief Allows or disallows user to change USB tethering settings. + * @details An administrator can use this API to allow or disallow user + * to change USB tethering settings. + * When disallowed, the UI is grayed out so user cannot change the state. + * @since_tizen 3.0 + * @privlevel partner + * @privilege %http://tizen.org/privilege/dpm.usb + * @param[in] handle Device policy manager handle + * @param[in] allow If true, allow USB tethering state change, + * if false, disallow USB tethering state change. + * @return #DPM_ERROR_NONE on success, otherwise a negative value + * @retval #DPM_ERROR_NONE Successful + * @retval #DPM_ERROR_TIMED_OUT Time out + * @retval #DPM_ERROR_INVALID_PARAMETER Invalid parameter + * @retval #DPM_ERROR_PERMISSION_DENIED The application does not have + * the privilege to call this API + * @pre The handle must be created by dpm_manager_create(). + * @see dpm_manager_create() + * @see dpm_usb_get_tethering_state() + */ +int dpm_usb_set_tethering_state(device_policy_manager_h handle, bool allow); + +/** + * @brief Checks whether the USB tethering state change is allowed. + * @details An administrator can use this API to check whether the USB tethering state change + * is allowed or not. + * If the USB tethering state change is disallowed, the UI is grayed out + * so user can not change its state. + * @since_tizen 3.0 + * @param[in] handle Device policy manager handle + * @param[out] is_allowed true if the change is allowed, false otherwise. + * @return #DPM_ERROR_NONE on success, otherwise a negative value + * @retval #DPM_ERROR_NONE Successful + * @retval #DPM_ERROR_TIMED_OUT Time out + * @retval #DPM_ERROR_INVALID_PARAMETER Invalid parameter + * @pre The handle must be created by dpm_manager_create(). + * @see dpm_manager_create() + * @see dpm_usb_set_tethering_state() + */ +int dpm_usb_get_tethering_state(device_policy_manager_h handle, bool *is_allowed); + +/** + * @} + */ + +#ifdef __cplusplus +} +#endif /* __cplusplus */ + +#endif /* __CAPI_DPM_USB_POLICY_H__ */ diff --git a/dpm-usb.manifest b/dpm-usb.manifest new file mode 100644 index 0000000..a76fdba --- /dev/null +++ b/dpm-usb.manifest @@ -0,0 +1,5 @@ + + + + + diff --git a/packaging/dpm-usb.spec b/packaging/dpm-usb.spec new file mode 100755 index 0000000..f979a20 --- /dev/null +++ b/packaging/dpm-usb.spec @@ -0,0 +1,76 @@ +Name: dpm-usb +Version: 1.0.1 +Release: 0 +License: Apache-2.0 +Source0: %{name}-%{version}.tar.gz +Summary: Tizen Device Policy Manager USB Policy Module +Group: Security/Other +BuildRequires: gcc +BuildRequires: cmake +BuildRequires: gettext-tools +BuildRequires: pkgconfig(klay) +BuildRequires: pkgconfig(dpm-pil) +BuildRequires: pkgconfig(capi-system-info) +BuildRequires: pkgconfig(capi-base-common) + +%description +The dpm-usb package provides USB policy module for device policy manager + +%files +%manifest dpm-usb.manifest +%defattr(644,root,root,755) +%attr(755,root,root) /opt/data/dpm/plugins/usb +%attr(755,root,root) %{_libdir}/libdpm-usb.so.%{version} +%{_libdir}/libdpm-usb.so.0 + +%prep +%setup -q + +%build +%{!?build_type:%define build_type "RELEASE"} + +%if %{build_type} == "DEBUG" || %{build_type} == "PROFILING" || %{build_type} == "CCOV" + CFLAGS="$CFLAGS -Wp,-U_FORTIFY_SOURCE" + CXXFLAGS="$CXXFLAGS -Wp,-U_FORTIFY_SOURCE" +%endif + +%cmake . -DVERSION=%{version} \ + -DCMAKE_BUILD_TYPE=%{build_type} \ + -DSCRIPT_INSTALL_DIR=%{_scriptdir} \ + -DSYSTEMD_UNIT_INSTALL_DIR=%{_unitdir} \ + -DDATA_INSTALL_DIR=%{TZ_SYS_DATA}/dpm \ + -DDB_INSTALL_DIR=%{TZ_SYS_DB} \ + -DRUN_INSTALL_DIR=%{TZ_SYS_RUN} \ + -DAPP_INSTALL_PREFIX="%{TZ_SYS_RO_APP}" \ + -DAPP_SHARE_PACKAGES_DIR="%{TZ_SYS_RO_PACKAGES}" \ + +make %{?jobs:-j%jobs} + +%install +%make_install + +%clean +rm -rf %{buildroot} + +%post + +%preun + +%postun + +## Devel Package ############################################################## +%package -n libdpm-usb-devel +Summary: Libraries and header files for device policy client development +Group: Development/Libraries +Requires: device-policy-manager = %{version}-%{release} + +%description -n libdpm-usb-devel +The libdpm-usb-devel package includes the libraries and header files necessary for +developing the DPM client program. + +%files -n libdpm-usb-devel +%manifest dpm-usb.manifest +%defattr(644,root,root,755) +%{_libdir}/libdpm-usb.so +%{_libdir}/pkgconfig/dpm-usb.pc +%{_includedir}/dpm diff --git a/plugin/CMakeLists.txt b/plugin/CMakeLists.txt new file mode 100755 index 0000000..728f98c --- /dev/null +++ b/plugin/CMakeLists.txt @@ -0,0 +1,33 @@ +# +# Copyright (c) 2015 Samsung Electronics Co., Ltd All Rights Reserved +# +# Licensed under the Apache License, Version 2.0 (the "License"); +# you may not use this file except in compliance with the License. +# You may obtain a copy of the License at +# +# http://www.apache.org/licenses/LICENSE-2.0 +# +# Unless required by applicable law or agreed to in writing, software +# distributed under the License is distributed on an "AS IS" BASIS, +# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +# See the License for the specific language governing permissions and +# limitations under the License. +# +SET(TARGET "dpm-plugin-usb") + +SET(PLUGIN_SOURCES "usb.cpp") + +SET(DEPENDENCY klay + dpm-pil +) + +PKG_CHECK_MODULES(PLUGIN_DEPS REQUIRED ${DEPENDENCY}) + +SET (CMAKE_SHARED_LINKER_FLAGS "${CMAKE_SHARED_LINKER_FLAGS} -Wl,-z,noexecstack") + +ADD_LIBRARY(${TARGET} SHARED ${PLUGIN_SOURCES}) +SET_TARGET_PROPERTIES(${TARGET} PROPERTIES COMPILE_FLAGS "-fvisibility=default") +INCLUDE_DIRECTORIES(SYSTEM ${PLUGIN_DEPS_INCLUDE_DIRS}) +TARGET_LINK_LIBRARIES(${TARGET} ${PLUGIN_DEPS_LIBRARIES}) + +INSTALL(FILES libdpm-plugin-usb.so RENAME usb DESTINATION /opt/data/dpm/plugins) diff --git a/plugin/usb.cpp b/plugin/usb.cpp new file mode 100644 index 0000000..db053ee --- /dev/null +++ b/plugin/usb.cpp @@ -0,0 +1,121 @@ +/* + * Copyright (c) 2016 Samsung Electronics Co., Ltd All Rights Reserved + * + * Licensed under the Apache License, Version 2.0 (the "License"); + * you may not use this file except in compliance with the License. + * You may obtain a copy of the License at + * + * http://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, software + * distributed under the License is distributed on an "AS IS" BASIS, + * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + * See the License for the specific language governing permissions and + * limitations under the License + */ + +#include + +#include +#include +#include +#include + +class DebuggingMode : public GlobalPolicy { +public: + DebuggingMode() : GlobalPolicy("usb-debugging") + { + PolicyEventNotifier::create("usb-debugging"); + } + + bool apply(const DataType& value) + { + int enable = value; + PolicyEventNotifier::emit("usb-debugging", enable ? "allowed" : "disallowed"); + return true; + } +}; + +class Tethering : public GlobalPolicy { +public: + Tethering() : GlobalPolicy("usb-tethering") + { + PolicyEventNotifier::create("usb-tethering"); + } + + bool apply(const DataType& value) + { + int enable = value; + PolicyEventNotifier::emit("usb-tethering", enable ? "allowed" : "disallowed"); + return true; + } +}; + +class Usb : public AbstractPolicyProvider { +public: + int setDebuggingState(bool enable); + bool getDebuggingState(); + + int setTetheringState(bool enable); + bool getTetheringState(); + +private: + DebuggingMode debugging; + Tethering tethering; +}; + + +int Usb::setDebuggingState(bool enable) +{ + try { + debugging.set(enable); + } catch (runtime::Exception& e) { + ERROR(e.what()); + return -1; + } + + return 0; +} + +bool Usb::getDebuggingState() +{ + return debugging.get(); +} + +int Usb::setTetheringState(bool enable) +{ + try { + tethering.set(enable); + } catch (runtime::Exception& e) { + ERROR(e.what()); + return -1; + } + + return 0; +} + +bool Usb::getTetheringState() +{ + return tethering.get(); +} + + +extern "C" { + +#define PRIVILEGE_USB "http://tizen.org/privilege/dpm.usb" +#define PRIVILEGE_DEBUGGING "http://tizen.org/privilege/dpm.debugging" + +AbstractPolicyProvider *PolicyFactory(PolicyControlContext& context) +{ + Usb *policy = new Usb(); + + context.expose(policy, PRIVILEGE_DEBUGGING, (int)(Usb::setDebuggingState)(bool)); + context.expose(policy, PRIVILEGE_USB, (int)(Usb::setTetheringState)(bool)); + + context.expose(policy, "", (bool)(Usb::getDebuggingState)()); + context.expose(policy, "", (bool)(Usb::getTetheringState)()); + + return policy; +} + +} // extern "C" -- 2.34.1