From 94eb2b0661b8539ccea217d06f239e6bfde5cd40 Mon Sep 17 00:00:00 2001 From: Woochanlee Date: Wed, 7 Jul 2021 16:18:34 +0900 Subject: [PATCH] bootstrap: Delete privacy_privilege for location, mediastroge It's not need on current status Change-Id: I122319a2bab50c463a4305f2a72bdadfa29357e7 --- org.tizen.aurum-bootstrap/meson.build | 1 - org.tizen.aurum-bootstrap/src/BootstrapServer.cc | 64 ------------------------ 2 files changed, 65 deletions(-) diff --git a/org.tizen.aurum-bootstrap/meson.build b/org.tizen.aurum-bootstrap/meson.build index d4da42d..41d8472 100644 --- a/org.tizen.aurum-bootstrap/meson.build +++ b/org.tizen.aurum-bootstrap/meson.build @@ -54,7 +54,6 @@ bootstrap_svr_dep += [ dependency('capi-appfw-service-application'), dependency('capi-system-system-settings'), dependency('capi-base-utils-i18n'), - dependency('capi-privacy-privilege-manager'), ] endif diff --git a/org.tizen.aurum-bootstrap/src/BootstrapServer.cc b/org.tizen.aurum-bootstrap/src/BootstrapServer.cc index 827fcee..3415218 100644 --- a/org.tizen.aurum-bootstrap/src/BootstrapServer.cc +++ b/org.tizen.aurum-bootstrap/src/BootstrapServer.cc @@ -3,7 +3,6 @@ #include "bootstrap.h" #include -#include #include #include @@ -12,9 +11,6 @@ #include "AurumServiceImpl.h" #include "config.h" -#define PRIV_MEDIASTORAGE "http://tizen.org/privilege/mediastorage" -#define PRIV_LOCATION "http://tizen.org/privilege/location" - using namespace grpc; typedef struct _ServiceContext { @@ -40,63 +36,6 @@ _grpc_thread_func (gpointer data) return NULL; } -static void -reponse_cb(ppm_call_cause_e cause, ppm_request_result_e result, - const char *privilege, void *user_data) -{ - if (cause == PRIVACY_PRIVILEGE_MANAGER_CALL_CAUSE_ERROR) { - LOGI("PPM Error PRIVACY_PRIVILEGE_MANAGER_CALL_CAUSE_ERROR"); - return; - } - - switch (result) { - case PRIVACY_PRIVILEGE_MANAGER_REQUEST_RESULT_ALLOW_FOREVER: - LOGI("priv:%s PRIVACY_PRIVILEGE_MANAGER_REQUEST_RESULT_ALLOW_FOREVER", privilege); - break; - case PRIVACY_PRIVILEGE_MANAGER_REQUEST_RESULT_DENY_FOREVER: - LOGI("priv:%s PRIVACY_PRIVILEGE_MANAGER_REQUEST_RESULT_ALLOW_FOREVER", privilege); - break; - case PRIVACY_PRIVILEGE_MANAGER_REQUEST_RESULT_DENY_ONCE: - LOGI("priv:%s PRIVACY_PRIVILEGE_MANAGER_REQUEST_RESULT_ALLOW_FOREVER", privilege); - break; - default: - LOGI("priv:%s default", privilege); - break; - } -} - -static void -check_permission(char *path_privilege) -{ - ppm_check_result_e result; - int ret; - LOGI("path_privilege = %s",path_privilege); - ret = ppm_check_permission(path_privilege, &result); - - if (ret == PRIVACY_PRIVILEGE_MANAGER_ERROR_NONE) { - switch (result) { - case PRIVACY_PRIVILEGE_MANAGER_CHECK_RESULT_ALLOW: - break; - - case PRIVACY_PRIVILEGE_MANAGER_CHECK_RESULT_DENY: - LOGI("PRIVACY_PRIVILEGE_MANAGER_CHECK_RESULT_DENY"); - ; - break; - - case PRIVACY_PRIVILEGE_MANAGER_CHECK_RESULT_ASK: - LOGI("PRIVACY_PRIVILEGE_MANAGER_CHECK_RESULT_ASK"); - ppm_request_permission(path_privilege, reponse_cb, NULL); - break; - - default: - break; - } - } else { - LOGI("Error to check permission[0x%x]", ret); - } -} - - static bool _service_app_create(void *data) { ServiceContext *ctx = (ServiceContext*)data; @@ -104,9 +43,6 @@ static bool _service_app_create(void *data) ctx->loop = g_main_loop_new ( NULL , FALSE ); ctx->thread = g_thread_new("grpc_thread", _grpc_thread_func, ctx); - check_permission(PRIV_LOCATION); - check_permission(PRIV_MEDIASTORAGE); - return true; } -- 2.7.4